Sample records for based threat evaluation

  1. Where Local and National Evaluators Meet: Unintended Threats to Ethical Evaluation Practice

    ERIC Educational Resources Information Center

    Rodi, Michael S.; Paget, Kathleen D.

    2007-01-01

    The ethical work of program evaluators is based on a covenant of honesty and transparency among stakeholders. Yet even under the most favorable evaluation conditions, threats to ethical standards exist and muddle that covenant. Unfortunately, ethical issues associated with different evaluation structures and contracting arrangements have received…

  2. A novel two-stage evaluation system based on a Group-G1 approach to identify appropriate emergency treatment technology schemes in sudden water source pollution accidents.

    PubMed

    Qu, Jianhua; Meng, Xianlin; Hu, Qi; You, Hong

    2016-02-01

    Sudden water source pollution resulting from hazardous materials has gradually become a major threat to the safety of the urban water supply. Over the past years, various treatment techniques have been proposed for the removal of the pollutants to minimize the threat of such pollutions. Given the diversity of techniques available, the current challenge is how to scientifically select the most desirable alternative for different threat degrees. Therefore, a novel two-stage evaluation system was developed based on a circulation-correction improved Group-G1 method to determine the optimal emergency treatment technology scheme, considering the areas of contaminant elimination in both drinking water sources and water treatment plants. In stage 1, the threat degree caused by the pollution was predicted using a threat evaluation index system and was subdivided into four levels. Then, a technique evaluation index system containing four sets of criteria weights was constructed in stage 2 to obtain the optimum treatment schemes corresponding to the different threat levels. The applicability of the established evaluation system was tested by a practical cadmium-contaminated accident that occurred in 2012. The results show this system capable of facilitating scientific analysis in the evaluation and selection of emergency treatment technologies for drinking water source security.

  3. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model adaptation (learning). The increasingly complex demands facing analysts evaluating activity threatening to the security of the United States make the family of agent-based data collection (fusion) a promising area. This paper will discuss a system to support the collection and evaluation of potential threat activity as well as an approach fro presentation of the information.

  4. A Developmental Perspective on the Virginia Student Threat Assessment Guidelines

    ERIC Educational Resources Information Center

    Cornell, Dewey G.

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed to help multidisciplinary school-based teams use a decision tree to evaluate student threats and take appropriate preventive action. A main goal of this approach is to allow school-based teams to recognize and respond to the developmental complexities of children and adolescents…

  5. Evaluative threat and ambulatory blood pressure: cardiovascular effects of social stress in daily experience.

    PubMed

    Smith, Timothy W; Birmingham, Wendy; Uchino, Bert N

    2012-11-01

    Physiological effects of social evaluation are central in models of psychosocial influences on physical health. Experimental manipulations of evaluative threat evoke substantial cardiovascular and neuroendocrine responses in laboratory studies, but only preliminary evidence is available regarding naturally occurring evaluative threats in daily life. In such nonexperimental ambulatory studies, it is essential to distinguish effects of evaluative threat from related constructs known to alter stress, such as ability perceptions and concerns about appearance. 94 married, working couples (mean age 29.2 years) completed a 1-day (8 a.m. to 10 p.m.) ambulatory blood pressure protocol with random interval-contingent measurements using a Suntech monitor and Palm Pilot-based measures of control variables and momentary experiences of social-evaluative threat, concerns about appearance, and perceived ability. In hierarchical analyses for couples and multiple measurement occasions (Proc Mixed; SAS) and controlling individual differences (BMI, age, income) and potential confounds (e.g., posture, activity), higher reports of social-evaluative threat were associated with higher concurrent systolic (estimate = .87, SE = .34) and diastolic blood pressure (estimate = 1.06; SE = .26), both p < .02. Effects of social-evaluative threat remained significant when perceived ability and appearance concerns were controlled. Naturally occurring social-evaluative threat during daily activity is associated with increased systolic and diastolic blood pressure. Given associations between ambulatory blood pressure and risk of cardiovascular disease, the findings support conceptual models of threats to the social self as a potentially important influence on physical health.

  6. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  7. Reduction of Decision-Making Time in the Air Defense Management

    DTIC Science & Technology

    2013-06-01

    Cohen, Freeman, & Thompson, 1997), “Threat Evaluation and Weapon Allocation” ( Turan , 2012) and Evaluating the Performance of TEWA Systems (Fredrik...uses these threat values to propose weapon allocation ( Turan , 2012). Turan studied only static based weapon-target allocation. She evaluates and... Turan : - Proximity parameters (CPA, Time to CPA, CPA in units of time, time before hit, distance), - Capability parameters (target type, weapon

  8. Threat evaluation for impact assessment in situation analysis systems

    NASA Astrophysics Data System (ADS)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization approaches based on neural networks and other mathematical techniques.

  9. Determining the Requisite Components of Visual Threat Detection to Improve Operational Performance

    DTIC Science & Technology

    2014-04-01

    cognitive processes, and may be enhanced by focusing training development on the principle components such as causal reasoning. The second report will...discuss the development and evaluation of a research-based training exemplar. Visual threat detection pervades many military contexts, but is also... developing computer-controlled exercises to study the primary components of visual threat detection. Similarly, civilian law enforcement officers were

  10. Confucian Values as a Buffer Against Age-Based Stereotype Threat for Chinese Older Adults.

    PubMed

    Tan, Shyuan Ching; Barber, Sarah J

    2018-05-16

    Research has shown that stereotype threat can impair older adults' memory in Western cultures. We tested whether this also occurs for older adults from the East Asian Chinese culture. We also tested whether an intervention that highlighted Confucian principles would protect Chinese older adults from stereotype threat's detrimental effects. Culturally-Chinese older adults residing in the United States completed a memory test either under age-based stereotype threat about cognitive decline or not. Prior to this, some participants were also reminded of Confucian traditions of filial piety and were assured these values had been transmitted to the younger generation. Stereotype threat impaired Chinese older adults' memory performance. However, our intervention was effective in eliminating this deficit. When the Chinese participants were reminded of the Confucian principle of filial piety they did not exhibit stereotype threat effects. Confirming that younger adults have an obligation to respect their elders can eliminate the social-evaluative pressure of stereotype threat for Chinese older adults. These findings are noteworthy since population aging is happening at an unprecedented pace in East Asia. Although our results suggest that stereotype threat can adversely affect older adults' cognitive performance in these societies, we also identify a culturally-based intervention to alleviate this impairment.

  11. Overview of Threats and Failure Models for Safety-Relevant Computer-Based Systems

    NASA Technical Reports Server (NTRS)

    Torres-Pomales, Wilfredo

    2015-01-01

    This document presents a high-level overview of the threats to safety-relevant computer-based systems, including (1) a description of the introduction and activation of physical and logical faults; (2) the propagation of their effects; and (3) function-level and component-level error and failure mode models. These models can be used in the definition of fault hypotheses (i.e., assumptions) for threat-risk mitigation strategies. This document is a contribution to a guide currently under development that is intended to provide a general technical foundation for designers and evaluators of safety-relevant systems.

  12. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    PubMed Central

    Zhang, Tianyang; Xi, Sisi; Jin, Yan; Wu, Yanhong

    2017-01-01

    Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1). Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2). The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming. PMID:29081755

  13. Are Older Adults Perceived as A Threat to Society? Exploring Perceived Age-Based Threats in 29 Nations.

    PubMed

    Ayalon, Liat

    2017-08-05

    The present study adds to the current body of literature by simultaneously examining the public perception of young and old people as posing realistic threats (e.g., to the group's power, resources, and welfare) and symbolic threats (e.g., to one's world view, belief system and values). The fourth wave of the European Social Survey was administered to individuals from 29 countries. Analysis is based on 56,170 individuals, who had data on the four relevant indicators. The study relied on a latent profile analysis to develop a typology of perceived realistic and symbolic threats to society by younger and older adults. A three-profile solution indicated that the perception of older and younger adults as threats to society often co-occurs. Sociodemographic characteristics at the individual-level and the Gini coefficient (e.g., an inequality indicator) at the country-level had differential associations with the profiles identified. The study calls for a more balanced approach which evaluates attitudes toward both younger and older adults as potential sources of threat. Attention should be paid to individual- and national-level characteristics associated with age-based threats (e.g., the perception of a group, defined by its chronological age, as threatening). © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  14. Asynchronous threat awareness by observer trials using crowd simulation

    NASA Astrophysics Data System (ADS)

    Dunau, Patrick; Huber, Samuel; Stein, Karin U.; Wellig, Peter

    2016-10-01

    The last few years showed that a high risk of asynchronous threats is given in every day life. Especially in large crowds a high probability of asynchronous attacks is evident. High observational abilities to detect threats are desirable. Consequently highly trained security and observation personal is needed. This paper evaluates the effectiveness of a training methodology to enhance performance of observation personnel engaging in a specific target identification task. For this purpose a crowd simulation video is utilized. The study first provides a measurement of the base performance before the training sessions. Furthermore a training procedure will be performed. Base performance will then be compared to the after training performance in order to look for a training effect. A thorough evaluation of both the training sessions as well as the overall performance will be done in this paper. A specific hypotheses based metric is used. Results will be discussed in order to provide guidelines for the design of training for observational tasks.

  15. Anxiety and Threat-Related Attention: Cognitive-Motivational Framework and Treatment.

    PubMed

    Mogg, Karin; Bradley, Brendan P

    2018-03-01

    Research in experimental psychopathology and cognitive theories of anxiety highlight threat-related attention biases (ABs) and underpin the development of a computer-delivered treatment for anxiety disorders: attention-bias modification (ABM) training. Variable effects of ABM training on anxiety and ABs generate conflicting research recommendations, novel ABM training procedures, and theoretical controversy. This article summarises an updated cognitive-motivational framework, integrating proposals from cognitive models of anxiety and attention, as well as evidence of ABs. Interactions between motivational salience-driven and goal-directed influences on multiple cognitive processes (e.g., stimulus evaluation, inhibition, switching, orienting) underlie anxiety and the variable manifestations of ABs (orienting towards and away from threat; threat-distractor interference). This theoretical analysis also considers ABM training as cognitive skill training, describes a conceptual framework for evaluating/developing novel ABM training procedures, and complements network-based research on reciprocal anxiety-cognition relationships. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.

  16. Potential Stereotype Threat and Face Validity Effects on Cognitive-Based Test Performance in the Classroom

    ERIC Educational Resources Information Center

    Hollis-Sawyer, Lisa A.; Sawyer, Thomas P., Jr.

    2008-01-01

    Evaluation is an inherent part of education for an increasingly diverse student population. Confidence in one's test-taking skills, and the associated testing environment, needs to be examined from a perspective that combines the concept of Bandurian self-efficacy with the concept of stereotype threat reactions in a diverse student sample. Factors…

  17. Soil Quality Indicator: a new concept

    NASA Astrophysics Data System (ADS)

    Barão, Lúcia; Basch, Gottlieb

    2017-04-01

    During the last century, cultivated soils have been intensively exploited for food and feed production. This exploitation has compromised the soils' natural functions and many of the soil-mediated ecosystems services, including its production potential for agriculture. Also, soils became increasingly vulnerable and less resilient to a wide range of threats. To overcome this situation, new and better management practices are needed to prevent soil from degradation. However, to adopt the best management practices in a specific location, it is necessary to evaluate the soil quality status first. Different soil quality indicators have been suggested over the last decades in order to evaluate the soil status, and those are often based on the performance of soil chemical, physical and biological properties. However, the direct link between these properties and the associated soil functions or soil vulnerability to threats appears more difficult to be established. This present work is part of the iSQAPER project- Interactive Soil Quality Assessment in Europe and China for Agricultural Productivity and Environmental Resilience, where new soil quality concepts are explored to provide better information regarding the effects of the most promising agricultural management practices on soil quality. We have developed a new conceptual soil quality indicator which determines the soil quality status, regarding its vulnerability towards different threats. First, different indicators were specifically developed for each of the eight threats considered - Erosion, SOM decline, Poor Structure, Poor water holding capacity, Compaction, N-Leaching, Soil-borne pests and diseases and Salinization. As an example for the case of Erosion, the RUSLE equation for the estimate of the soil annual loss was used. Secondly, a reference classification was established for each indicator to integrate all possible results into a Good, Intermediate or Bad classification. Finally, all indicators were combined to return a single evaluation of the soil status, using different techniques that are dependent on the final use of the soil quality indicator. Some of the advantages of this new concept include the evaluation of soil quality based on its vulnerability to threats, together with the evaluation of soil properties in a given context while also suggesting soil management practices that are directly capable to mitigate soil vulnerability towards specific threats. Keywords: Soil Quality, Agriculture, Sustainability, Soil threats

  18. The Trier Social Stress Test as a paradigm to study how people respond to threat in social interactions

    PubMed Central

    Frisch, Johanna U.; Häusser, Jan A.; Mojzisch, Andreas

    2015-01-01

    In our lives, we face countless situations in which we are observed and evaluated by our social interaction partners. Social-evaluative threat is frequently associated with strong neurophysiological stress reactions, in particular, an increase in cortisol levels. Yet, social variables do not only cause stress, but they can also buffer the neurophysiological stress response. Furthermore, social variables can themselves be affected by the threat or the threat-induced neurophysiological stress response. In order to study this complex interplay of social-evaluative threat, social processes and neurophysiological stress responses, a paradigm is needed that (a) reliably induces high levels of social-evaluative threat and (b) is extremely adaptable to the needs of the researcher. The Trier Social Stress Test (TSST) is a well-established paradigm in biopsychology that induces social-evaluative threat in the laboratory by subjecting participants to a mock job-interview. In this review, we aim at demonstrating the potential of the TSST for studying the complex interplay of social-evaluative threat, social processes and neurophysiological stress responses. PMID:25698987

  19. Common IED exploitation target set ontology

    NASA Astrophysics Data System (ADS)

    Russomanno, David J.; Qualls, Joseph; Wowczuk, Zenovy; Franken, Paul; Robinson, William

    2010-04-01

    The Common IED Exploitation Target Set (CIEDETS) ontology provides a comprehensive semantic data model for capturing knowledge about sensors, platforms, missions, environments, and other aspects of systems under test. The ontology also includes representative IEDs; modeled as explosives, camouflage, concealment objects, and other background objects, which comprise an overall threat scene. The ontology is represented using the Web Ontology Language and the SPARQL Protocol and RDF Query Language, which ensures portability of the acquired knowledge base across applications. The resulting knowledge base is a component of the CIEDETS application, which is intended to support the end user sensor test and evaluation community. CIEDETS associates a system under test to a subset of cataloged threats based on the probability that the system will detect the threat. The associations between systems under test, threats, and the detection probabilities are established based on a hybrid reasoning strategy, which applies a combination of heuristics and simplified modeling techniques. Besides supporting the CIEDETS application, which is focused on efficient and consistent system testing, the ontology can be leveraged in a myriad of other applications, including serving as a knowledge source for mission planning tools.

  20. Hazards and accessibility: combining and visualizing threat and open infrastructure data for disaster management

    NASA Astrophysics Data System (ADS)

    Tost, Jordi; Ehmel, Fabian; Heidmann, Frank; Olen, Stephanie M.; Bookhagen, Bodo

    2018-05-01

    The assessment of natural hazards and risk has traditionally been built upon the estimation of threat maps, which are used to depict potential danger posed by a particular hazard throughout a given area. But when a hazard event strikes, infrastructure is a significant factor that can determine if the situation becomes a disaster. The vulnerability of the population in a region does not only depend on the area's local threat, but also on the geographical accessibility of the area. This makes threat maps by themselves insufficient for supporting real-time decision-making, especially for those tasks that involve the use of the road network, such as management of relief operations, aid distribution, or planning of evacuation routes, among others. To overcome this problem, this paper proposes a multidisciplinary approach divided in two parts. First, data fusion of satellite-based threat data and open infrastructure data from OpenStreetMap, introducing a threat-based routing service. Second, the visualization of this data through cartographic generalization and schematization. This emphasizes critical areas along roads in a simple way and allows users to visually evaluate the impact natural hazards may have on infrastructure. We develop and illustrate this methodology with a case study of landslide threat for an area in Colombia.

  1. Evaluating robustness in rank-based risk assessments of freshwater ecosystems

    USGS Publications Warehouse

    Mattson, K.M.; Angermeier, Paul

    2007-01-01

    Conservation planning aims to protect biodiversity by sustainng the natural physical, chemical, and biological processes within representative ecosystems. Often data to measure these components are inadequate or unavailable. The impact of human activities on ecosystem processes complicates integrity assessments and might alter ecosystem organization at multiple spatial scales. Freshwater conservation targets, such as populations and communities, are influenced by both intrinsic aquatic properties and the surrounding landscape, and locally collected data might not accurately reflect potential impacts. We suggest that changes in five major biotic drivers—energy sources, physical habitat, flow regime, water quality, and biotic interactions—might be used as surrogates to inform conservation planners of the ecological integrity of freshwater ecosystems. Threats to freshwater systems might be evaluated based on their impact to these drivers to provide an overview of potential risk to conservation targets. We developed a risk-based protocol, the Ecological Risk Index (ERI), to identify watersheds with least/most risk to conservation targets. Our protocol combines risk-based components, specifically the frequency and severity of human-induced stressors, with biotic drivers and mappable land- and water-use data to provide a summary of relative risk to watersheds. We illustrate application of our protocol with a case study of the upper Tennessee River basin, USA. Differences in risk patterns among the major drainages in the basin reflect dominant land uses, such as mining and agriculture. A principal components analysis showed that localized, moderately severe threats accounted for most of the threat composition differences among our watersheds. We also found that the relative importance of threats is sensitive to the spatial grain of the analysis. Our case study demonstrates that the ERI is useful for evaluating the frequency and severity of ecosystemwide risk, which can inform local and regional conservation planning.

  2. Risk analysis of information security in a mobile instant messaging and presence system for healthcare.

    PubMed

    Bønes, Erlend; Hasvold, Per; Henriksen, Eva; Strandenaes, Thomas

    2007-09-01

    Instant messaging (IM) is suited for immediate communication because messages are delivered almost in real time. Results from studies of IM use in enterprise work settings make us believe that IM based services may prove useful also within the healthcare sector. However, today's public instant messaging services do not have the level of information security required for adoption of IM in healthcare. We proposed MedIMob, our own architecture for a secure enterprise IM service for use in healthcare. MedIMob supports IM clients on mobile devices in addition to desktop based clients. Security threats were identified in a risk analysis of the MedIMob architecture. The risk analysis process consists of context identification, threat identification, analysis of consequences and likelihood, risk evaluation, and proposals for risk treatment. The risk analysis revealed a number of potential threats to the information security of a service like this. Many of the identified threats are general when dealing with mobile devices and sensitive data; others are threats which are more specific to our service and architecture. Individual threats identified in the risks analysis are discussed and possible counter measures presented. The risk analysis showed that most of the proposed risk treatment measures must be implemented to obtain an acceptable risk level; among others blocking much of the additional functionality of the smartphone. To conclude on the usefulness of this IM service, it will be evaluated in a trial study of the human-computer interaction. Further work also includes an improved design of the proposed MedIMob architecture. 2006 Elsevier Ireland Ltd

  3. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risksmore » of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.« less

  4. Multi-stage ranking of emergency technology alternatives for water source pollution accidents using a fuzzy group decision making tool.

    PubMed

    Qu, Jianhua; Meng, Xianlin; You, Hong

    2016-06-05

    Due to the increasing number of unexpected water source pollution events, selection of the most appropriate disposal technology for a specific pollution scenario is of crucial importance to the security of urban water supplies. However, the formulation of the optimum option is considerably difficult owing to the substantial uncertainty of such accidents. In this research, a multi-stage technical screening and evaluation tool is proposed to determine the optimal technique scheme, considering the areas of pollutant elimination both in drinking water sources and water treatment plants. In stage 1, a CBR-based group decision tool was developed to screen available technologies for different scenarios. Then, the threat degree caused by the pollution was estimated in stage 2 using a threat evaluation system and was partitioned into four levels. For each threat level, a corresponding set of technique evaluation criteria weights was obtained using Group-G1. To identify the optimization alternatives corresponding to the different threat levels, an extension of TOPSIS, a multi-criteria interval-valued trapezoidal fuzzy decision making technique containing the four arrays of criteria weights, to a group decision environment was investigated in stage 3. The effectiveness of the developed tool was elaborated by two actual thallium-contaminated scenarios associated with different threat levels. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. 'I'm Black and I'm Proud': A Majority Ecological Context Protects Affective Aspects of Black Identity Under Stereotype Threat.

    PubMed

    Oliver, Andre'; Andemeskel, Ghilamichael; King, Carlise R; Wallace, Lyndsey; McDougal, Serie; Monteiro, Kenneth P; Ben-Zeev, Avi

    2017-12-01

    We provide evidence that stereotype threat, a phenomenon that causes stigmatized individuals to experience group-based evaluative concerns (Steele in Am Psychol 52:613-629, 1997; Whistling Vivaldi and other clues to how stereotypes affect us, W.W. Norton, New York, 2010), impacts affective aspects of Black identity as a function of majority versus minority ecological contexts. Black/African-American students, enrolled in either Africana Studies (Black ecological majority) or Psychology (Black ecological minority), completed private and public regard subscales from the Multidimensional Inventory of Black Identity (Sellers et al. in Pers Soc Psychol Rev 2:18-39, 1998) at baseline (Time 1) and after being randomly assigned to a stereotype threat or no-threat/control condition (Time 2). In threat, participants were introduced to a 'puzzle' task as diagnostic of intellectual abilities, whereas in no-threat the same task was introduced as culture fair, such that people from different racial/ethnic groups had performed similarly on this task in the past. In Psychology, students under threat exhibited a simultaneous decrease and increase in private and public regard, respectively, a pattern shown in the literature to be associated with discrimination-based distress and lesser well-being in Black ecological minority environments. In contrast, Africana Studies students' racial identity under threat remained intact. We discuss the protective effects of Africana Studies on racial identity and implications for educational reform.

  6. ‘I’m Black and I’m Proud’: A Majority Ecological Context Protects Affective Aspects of Black Identity Under Stereotype Threat

    PubMed Central

    Oliver, Andre’; Andemeskel, Ghilamichael; King, Carlise R.; Wallace, Lyndsey; McDougal, Serie; Monteiro, Kenneth P.

    2018-01-01

    We provide evidence that stereotype threat, a phenomenon that causes stigmatized individuals to experience group-based evaluative concerns (Steele in Am Psychol 52:613–629, 1997; Whistling Vivaldi and other clues to how stereotypes affect us, W.W. Norton, New York, 2010), impacts affective aspects of Black identity as a function of majority versus minority ecological contexts. Black/African-American students, enrolled in either Africana Studies (Black ecological majority) or Psychology (Black ecological minority), completed private and public regard subscales from the Multidimensional Inventory of Black Identity (Sellers et al. in Pers Soc Psychol Rev 2:18–39, 1998) at baseline (Time 1) and after being randomly assigned to a stereotype threat or no-threat/control condition (Time 2). In threat, participants were introduced to a ‘puzzle’ task as diagnostic of intellectual abilities, whereas in no-threat the same task was introduced as culture fair, such that people from different racial/ethnic groups had performed similarly on this task in the past. In Psychology, students under threat exhibited a simultaneous decrease and increase in private and public regard, respectively, a pattern shown in the literature to be associated with discrimination-based distress and lesser well-being in Black ecological minority environments. In contrast, Africana Studies students’ racial identity under threat remained intact. We discuss the protective effects of Africana Studies on racial identity and implications for educational reform. PMID:29657583

  7. Men Respond Too: The Effects of a Social-Evaluative Body Image Threat on Shame and Cortisol in University Men

    PubMed Central

    Lamarche, Larkin; Ozimok, Brianne; Gammage, Kimberley L.; Muir, Cameron

    2017-01-01

    Framed within social self-preservation theory, the present study investigated men’s psychobiological responses to social-evaluative body image threats. University men (n = 66) were randomly assigned to either a high or low social-evaluative body image threat condition. Participants provided saliva samples (to assess cortisol) and completed measures of state body shame prior to and following their condition, during which anthropometric and strength measures were assessed. Baseline corrected values indicated men in the high social-evaluative body image threat condition had higher body shame and cortisol than men in the low social-evaluative body image threat condition. These findings suggest that social evaluation in the context of situations that threaten body image leads to potentially negative psychobiological responses in college men. PMID:28891388

  8. Men Respond Too: The Effects of a Social-Evaluative Body Image Threat on Shame and Cortisol in University Men.

    PubMed

    Lamarche, Larkin; Ozimok, Brianne; Gammage, Kimberley L; Muir, Cameron

    2017-11-01

    Framed within social self-preservation theory, the present study investigated men's psychobiological responses to social-evaluative body image threats. University men ( n = 66) were randomly assigned to either a high or low social-evaluative body image threat condition. Participants provided saliva samples (to assess cortisol) and completed measures of state body shame prior to and following their condition, during which anthropometric and strength measures were assessed. Baseline corrected values indicated men in the high social-evaluative body image threat condition had higher body shame and cortisol than men in the low social-evaluative body image threat condition. These findings suggest that social evaluation in the context of situations that threaten body image leads to potentially negative psychobiological responses in college men.

  9. Linking terrestrial and marine conservation planning and threats analysis.

    PubMed

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  10. An Evaluation of Test Speededness in an Assessment for Third-Grade Gifted Students

    ERIC Educational Resources Information Center

    Hailey, Emily; Callahan, Carolyn M.; Azano, Amy; Moon, Tonya R.

    2012-01-01

    Reliability and validity are integral concepts in assessment design. Test speededness, the influence of time constraints on test taker performance, is often an overlooked threat to reliability and validity, especially in classroom-based testing. The purpose of this study is to evaluate the degree of test speededness of classroom-based assessments…

  11. ESTIMATING SAMPLE REQUIREMENTS FOR FIELD EVALUATIONS OF PESTICIDE LEACHING

    EPA Science Inventory

    A method is presented for estimating the number of samples needed to evaluate pesticide leaching threats to ground water at a desired level of precision. Sample size projections are based on desired precision (exhibited as relative tolerable error), level of confidence (90 or 95%...

  12. Dreading the boards: stress response to a competitive audition characterized by social-evaluative threat.

    PubMed

    Boyle, Neil Bernard; Lawton, Clare; Arkbage, Karin; Thorell, Lars; Dye, Louise

    2013-01-01

    The capacity of psychosocial stressors to provoke the hypothalamic-pituitary-adrenal axis has been demonstrated to vary depending upon a number of psychological factors. Laboratory stressors characterized by social-evaluative threat are proposed to be the most efficacious in the elicitation of a cortisol stress response. Salivary cortisol, cardiovascular, and subjective responses of 16 healthy adults facing a naturalistic stressor characterized by social-evaluative threat (competitive performance auditions) were examined. Audition exposure was sufficient to provoke significant cortisol, arterial blood pressure (systolic and diastolic), and subjective stress responses. Cortisol response reactivity (area under the curve with respect to increase [AUCi]) also correlated with participants' subjective rating of social-evaluative threat. The competitive performance audition context is therefore considered a promising context in which to further explore cortisol responsivity to social-evaluative threat.

  13. Avoidance temperament and social-evaluative threat in college students' math performance: a mediation model of math and test anxiety.

    PubMed

    Liew, Jeffrey; Lench, Heather C; Kao, Grace; Yeh, Yu-Chen; Kwok, Oi-man

    2014-01-01

    Standardized testing has become a common form of student evaluation with high stakes, and limited research exists on understanding the roles of students' personality traits and social-evaluative threat on their academic performance. This study examined the roles of avoidance temperament (i.e., fear and behavioral inhibition) and evaluative threat (i.e., fear of failure and being viewed as unintelligent) in standardized math test and course grades in college students. Undergraduate students (N=184) from a large public university were assessed on temperamental fear and behavioral inhibition. They were then given 15 minutes to complete a standardized math test. After the test, students provided data on evaluative threat and their math performance (scores on standardized college entrance exam and average grades in college math courses). Results indicate that avoidance temperament was linked to social-evaluative threat and low standardized math test scores. Furthermore, evaluative threat mediated the influence of avoidance temperament on both types of math performance. Results have educational and clinical implications, particularly for students at risk for test anxiety and underperformance. Interventions targeting emotion regulation and stress management skills may help individuals reduce their math and test anxieties.

  14. Intelligent image processing for machine safety

    NASA Astrophysics Data System (ADS)

    Harvey, Dennis N.

    1994-10-01

    This paper describes the use of intelligent image processing as a machine guarding technology. One or more color, linear array cameras are positioned to view the critical region(s) around a machine tool or other piece of manufacturing equipment. The image data is processed to provide indicators of conditions dangerous to the equipment via color content, shape content, and motion content. The data from these analyses is then sent to a threat evaluator. The purpose of the evaluator is to determine if a potentially machine-damaging condition exists based on the analyses of color, shape, and motion, and on `knowledge' of the specific environment of the machine. The threat evaluator employs fuzzy logic as a means of dealing with uncertainty in the vision data.

  15. Automating Risk Analysis of Software Design Models

    PubMed Central

    Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P.

    2014-01-01

    The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance. PMID:25136688

  16. Automating risk analysis of software design models.

    PubMed

    Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P

    2014-01-01

    The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.

  17. Affective State Influences Perception by Affecting Decision Parameters Underlying Bias and Sensitivity

    PubMed Central

    Lynn, Spencer K.; Zhang, Xuan; Barrett, Lisa Feldman

    2012-01-01

    Studies of the effect of affect on perception often show consistent directional effects of a person’s affective state on perception. Unpleasant emotions have been associated with a “locally focused” style of stimulus evaluation, and positive emotions with a “globally focused” style. Typically, however, studies of affect and perception have not been conducted under the conditions of perceptual uncertainty and behavioral risk inherent to perceptual judgments outside the laboratory. We investigated the influence of perceivers’ experience affect (valence and arousal) on the utility of social threat perception by combining signal detection theory and behavioral economics. We created three perceptual decision environments that systematically differed with respect to factors that underlie uncertainty and risk: the base rate of threat, the costs of incorrect identification threat, and the perceptual similarity of threats and non-threats. We found that no single affective state yielded the best performance on the threat perception task across the three environments. Unpleasant valence promoted calibration of response bias to base rate and costs, high arousal promoted calibration of perceptual sensitivity to perceptual similarity, and low arousal was associated with an optimal adjustment of bias to sensitivity. However, the strength of these associations was conditional upon the difficulty of attaining optimal bias and high sensitivity, such that the effect of the perceiver’s affective state on perception differed with the cause and/or level of uncertainty and risk. PMID:22251054

  18. A longitudinal path analysis of peer victimization, threat appraisals to the self, and aggression, anxiety, and depression among urban African American adolescents.

    PubMed

    Taylor, Katherine A; Sullivan, Terri N; Kliewer, Wendy

    2013-02-01

    Threat appraisals-individuals' perceptions of how stressful situations may threaten their well-being-are an important but understudied mechanism that could explain links between peer victimization and adjustment. The goal of the present study was to examine relationships between physical and relational victimization by peers, threats to the self, and aggression, anxiety, and depression to better understand the cognitive evaluations that make youth vulnerable to negative adjustment. The sample comprised two cohorts of African American adolescents (N = 326; 54 % female; M = 12.1; SD = 1.6) and their maternal caregivers, who participated in three waves of a longitudinal study. Path models revealed significant direct effects from Time 1 relational victimization, but not physical victimization, to Time 2 threat appraisals (i.e., negative self-evaluations and negative evaluations by others), controlling for Time 1 threat appraisals. Significant direct effects were found from Time 2 threats of negative evaluations by others to Time 3 youth-reported aggression, controlling for Time 1 and Time 2 aggression. Significant direct effects also were found from Time 2 threats of negative self-evaluations to T3 youth-reported depression, controlling for Time 1 and Time 2 depression. Overall, findings highlight the need to consider the role of threats to the self in pathways from peer victimization to adjustment and the implications these appraisals have for youth prevention and intervention efforts.

  19. The effects of in-vehicle and infrastructure-based collision warnings at signalized intersections

    DOT National Transportation Integrated Search

    2009-12-01

    The potential effectiveness of warnings to drivers of the imminent threat of a collision with a red light violator was evaluated in an experiment that used a driving simulator. Three warnings were tested: (1) an infrastructure-based warning that imme...

  20. Evaluating the Effectiveness of a School-Based Cognitive Behavioural Therapy Intervention for Anxiety in Adolescents Diagnosed with Autism Spectrum Disorder

    ERIC Educational Resources Information Center

    Luxford, Sarah; Hadwin, Julie A.; Kovshoff, Hanna

    2017-01-01

    This study evaluated the effectiveness of a school-based Cognitive Behavioural Therapy (CBT) on symptoms of anxiety, social worry and social responsiveness, and indices of attentional control and attentional biases to threat in adolescents diagnosed with Autism Spectrum Disorder. Thirty-five young people (11-14 years; IQ > 70) with ASD and…

  1. MANPRINT Methods Monograph: Aiding the Development of Manpower-Based System Evaluation

    DTIC Science & Technology

    1989-06-01

    zone below tree level where threats are known to be (the actual number of threats may vary). Weather conditions are VFR. The helicopter pops up to...12.0 Replace 13.3 Bearing, connecting Inspect 6.2 Replace 6.2 0105 Camshaft Inspect 7.2 Replace 7.2 Cover, cylinder head Inspect .2 (valve cover...matrix to analyze the data and identify task clusters. . Outputs and Use of Cluster Analysis 1. Hierarchical cluster tree (taxonomy) of system tasks will

  2. Non-Lethal Weapons Effectiveness Assessment Development and Verification Study (Etude d’evaluation, de developpement et de verification de l’efficacite des armes non letales)

    DTIC Science & Technology

    2009-10-01

    will guarantee a solid base for the future. The content of this publication has been reproduced directly from material supplied by RTO or the...intensity threat involving a local population wanting to break into the camp to steal material and food supplies ; and • A higher intensity threat...combatant evacuation opeations, distribute emergency supplies , and evacuate/ relocate refugees and displaced persons. Specified NLW-relevant tasks are

  3. Autonomic Nervous System Responses to Hearing-Related Demand and Evaluative Threat.

    PubMed

    Mackersie, Carol L; Kearney, Lucia

    2017-10-12

    This paper consists of 2 parts. The purpose of Part 1 was to review the potential influence of internal (person-related) factors on listening effort. The purpose of Part 2 was to present, in support of Part 1, preliminary data illustrating the interactive effects of an external factor (task demand) and an internal factor (evaluative threat) on autonomic nervous system measures. For Part 1, we provided a brief narrative review of motivation and stress as modulators of listening effort. For Part 2, we described preliminary data from a study using a repeated-measures (2 × 2) design involving manipulations of task demand (high, low) and evaluative threat (high, low). The low-demand task consisted of repetition of sentences from a narrative. The high-demand task consisted of answering questions about the narrative, requiring both comprehension and recall. During the high evaluative threat condition, participants were filmed and told that their video recordings would be evaluated by a panel of experts. During the low evaluative threat condition, no filming occurred; participants were instructed to "do your best." Skin conductance (sympathetic nervous system activity) and heart rate variability (HRV, parasympathetic activity) were measured during the listening tasks. The HRV measure was the root mean square of successive differences of adjacent interbeat intervals. Twelve adults with hearing loss participated. Skin conductance increased and HRV decreased relative to baseline (no task) for all listening conditions. Skin conductance increased significantly with an increase in evaluative threat, but only for the more demanding task. There was no significant change in HRV in response to increasing evaluative threat or task demand. Listening effort may be influenced by factors other than task difficulty, as reviewed in Part 1. This idea is supported by the preliminary data indicating that the sympathetic nervous system response to task demand is modulated by social evaluative threat. More work is needed to determine the relative contributions of motivation and emotional stress on physiological responses during listening tasks.

  4. Why Don't We Ask? A Complementary Method for Assessing the Status of Great Apes

    PubMed Central

    Meijaard, Erik; Mengersen, Kerrie; Buchori, Damayanti; Nurcahyo, Anton; Ancrenaz, Marc; Wich, Serge; Atmoko, Sri Suci Utami; Tjiu, Albertus; Prasetyo, Didik; Nardiyono; Hadiprakarsa, Yokyok; Christy, Lenny; Wells, Jessie; Albar, Guillaume; Marshall, Andrew J.

    2011-01-01

    Species conservation is difficult. Threats to species are typically high and immediate. Effective solutions for counteracting these threats, however, require synthesis of high quality evidence, appropriately targeted activities, typically costly implementation, and rapid re-evaluation and adaptation. Conservation management can be ineffective if there is insufficient understanding of the complex ecological, political, socio-cultural, and economic factors that underlie conservation threats. When information about these factors is incomplete, conservation managers may be unaware of the most urgent threats or unable to envision all consequences of potential management strategies. Conservation research aims to address the gap between what is known and what knowledge is needed for effective conservation. Such research, however, generally addresses a subset of the factors that underlie conservation threats, producing a limited, simplistic, and often biased view of complex, real world situations. A combination of approaches is required to provide the complete picture necessary to engage in effective conservation. Orangutan conservation (Pongo spp.) offers an example: standard conservation assessments employ survey methods that focus on ecological variables, but do not usually address the socio-cultural factors that underlie threats. Here, we evaluate a complementary survey method based on interviews of nearly 7,000 people in 687 villages in Kalimantan, Indonesia. We address areas of potential methodological weakness in such surveys, including sampling and questionnaire design, respondent biases, statistical analyses, and sensitivity of resultant inferences. We show that interview-based surveys can provide cost-effective and statistically robust methods to better understand poorly known populations of species that are relatively easily identified by local people. Such surveys provide reasonably reliable estimates of relative presence and relative encounter rates of such species, as well as quantifying the main factors that threaten them. We recommend more extensive use of carefully designed and implemented interview surveys, in conjunction with more traditional field methods. PMID:21483859

  5. Effects of a Community-Based HIV Risk Reduction Intervention Among HIV-Positive Individuals: Results of a Quasi-Experimental Study in Nepal.

    PubMed

    Poudel, Krishna C; Buchanan, David R; Poudel-Tandukar, Kalpana

    2015-06-01

    We evaluated the efficacy of a sexual risk reduction intervention utilizing protection motivation and social cognitive theories to address knowledge, threat and coping appraisals, and condom use intentions among HIV-positive individuals in Nepal. Using a quasi-experimental research design, we assigned 277 participants to intervention (n=146) and control (n=131) groups. The intervention group received six sessions on sexual risk reduction strategies and the control group six sessions on medication adherence, smoking, and mental health. Data were collected at baseline and immediately after the intervention. Results indicate that the sexual risk reduction intervention produced a significant increase in HIV transmission knowledge, perceived threat and coping appraisals, and intentions to use condoms with regular, HIV-positive, and HIV-negative partners. The positive effects of the intervention remained significant after adjusting for baseline scores and other potential confounders. In conclusion, our theory-based sexual risk reduction intervention was effective in improving HIV transmission knowledge, perceived threat and coping appraisals, and condom use intentions. Further studies are needed to evaluate the long-term efficacy of the intervention in increasing protection motivation and maintaining preventive behaviors.

  6. Tropical montane cloud forests: current threats and opportunities for their conservation and sustainable management in Mexico.

    PubMed

    Toledo-Aceves, Tarin; Meave, Jorge A; González-Espinosa, Mario; Ramírez-Marcial, Neptalí

    2011-03-01

    Tropical montane cloud forests (TMCF) are among the most threatened ecosystems globally in spite of their high strategic value for sustainable development due to the key role played by these forests in hydrological cycle maintenance and as reservoirs of endemic biodiversity. Resources for effective conservation and management programs are rarely sufficient, and criteria must be applied to prioritize TMCF for conservation action. This paper reports a priority analysis of the 13 main regions of TMCF distribution in Mexico, based on four criteria: (1) forest quality, (2) threats to forest permanence, (3) threats to forest integrity, and (4) opportunities for conservation. Due to the diverse socio-environmental conditions of the local communities living in Mexican TMCF regions, their associated social characteristics were also evaluated to provide a background for the planning of conservation actions. A set of indicators was defined for the measurement of each criterion. To assign priority values for subregions within each main region, an international team of 40 participants evaluated all the indicators using multicriteria decision-making analysis. This procedure enabled the identification of 15 subregions of critical priority, 17 of high priority, and 10 of medium priority; three more were not analysed due to lack of information. The evaluation revealed a number of subjects that had hitherto been undetected and that may prove useful for prioritization efforts in other regions where TMCF is similarly documented and faces equally severe threats. Based on this analysis, key recommendations are outlined to advance conservation objectives in those TMCF areas that are subjected to high pressure on forest resources. Copyright © 2010 Elsevier Ltd. All rights reserved.

  7. Responsibility/Threat Overestimation Moderates the Relationship Between Contamination-Based Disgust and Obsessive-Compulsive Concerns About Sexual Orientation.

    PubMed

    Ching, Terence H W; Williams, Monnica T; Siev, Jedidiah; Olatunji, Bunmi O

    2018-05-01

    Disgust has been shown to perform a "disease-avoidance" function in contamination fears. However, no studies have examined the relevance of disgust to obsessive-compulsive (OC) concerns about sexual orientation (e.g., fear of one's sexual orientation transforming against one's will, and compulsive avoidance of same-sex and/or gay or lesbian individuals to prevent that from happening). Therefore, we investigated whether the specific domain of contamination-based disgust (i.e., evoked by the perceived threat of transmission of essences between individuals) predicted OC concerns about sexual orientation, and whether this effect was moderated/amplified by obsessive beliefs, in evaluation of a "sexual orientation transformation-avoidance" function. We recruited 283 self-identified heterosexual college students (152 females, 131 males; mean age = 20.88 years, SD = 3.19) who completed three measures assessing disgust, obsessive beliefs, and OC concerns about sexual orientation. Results showed that contamination-based disgust (β = .17), responsibility/threat overestimation beliefs (β = .15), and their interaction (β = .17) each uniquely predicted OC concerns about sexual orientation, ts = 2.22, 2.50, and 2.90, ps < .05. Post hoc probing indicated that high contamination-based disgust accompanied by strong responsibility/threat overestimation beliefs predicted more severe OC concerns about sexual orientation, β = .48, t = 3.24, p < .001. The present study, therefore, provided preliminary evidence for a "sexual orientation transformation-avoidance" process underlying OC concerns about sexual orientation in heterosexual college students, which is facilitated by contamination-based disgust, and exacerbated by responsibility/threat overestimation beliefs. Treatment for OC concerns about sexual orientation should target such beliefs.

  8. Targeting Fear of Spiders with Control-, Acceptance-, and Information-Based Approaches

    ERIC Educational Resources Information Center

    Wagener, Alexandra L.; Zettle, Robert D.

    2011-01-01

    The relative impact of control-, acceptance-, and information-based approaches in targeting a midlevel fear of spiders among college students was evaluated. Participants listened to a brief protocol presenting one of the three approaches before completing the Perceived-Threat Behavioral Approach Test (PT-BAT; Cochrane, Barnes-Holmes, &…

  9. Social status determines how we monitor and evaluate our performance

    PubMed Central

    Kostermans, Evelien; Milivojevic, Branka; De Cremer, David

    2012-01-01

    Since people with low status are more likely to experience social evaluative threat and are therefore more inclined to monitor for these threats and inhibit approach behaviour, we expected that low-status subjects would be more engaged in evaluating their own performance, compared with high-status subjects. We created a highly salient social hierarchy based on the performance of a simple time estimation task. Subjects could achieve high, middle or low status while performing this task simultaneously with other two players who were either higher or lower in status. Subjects received feedback on their own performance, as well as on the performance of the other two players simultaneously. Electroencephalography (EEG) was recorded from all three participants. The results showed that medial frontal negativity (an event-related potential reflecting performance evaluation) was significantly enhanced for low-status subjects. Implications for status-related differences in goal-directed behaviour are discussed. PMID:21421733

  10. Regional Value Analysis at Threat Evaluation

    DTIC Science & Technology

    2014-06-01

    targets based on information entropy and fuzzy optimization theory. in Industrial Engineering and Engineering Management (IEEM), 2011 IEEE...Assignment by Virtual Permutation and Tabu Search Heuristics. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 2010

  11. 49 CFR 1542.307 - Incident management.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Incident management. (a) Each airport operator must establish procedures to evaluate bomb threats, threats... operations, including specific bomb threats to aircraft and airport facilities. (c) Airport operators...

  12. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.

    PubMed

    Dutt, Varun; Ahn, Young-Suk; Gonzalez, Cleotilde

    2013-06-01

    To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors. Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early). For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy. Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.

  13. Case study comparison of functional vs. organic stability approaches for assessing threat potential at closed landfills in the USA.

    PubMed

    O'Donnell, Sean T; Caldwell, Michael D; Barlaz, Morton A; Morris, Jeremy W F

    2018-05-01

    Municipal solid waste (MSW) landfills in the USA are regulated under Subtitle D of the Resource Conservation and Recovery Act (RCRA), which includes the requirement to protect human health and the environment (HHE) during the post-closure care (PCC) period. Several approaches have been published for assessment of potential threats to HHE. These approaches can be broadly divided into organic stabilization, which establishes an inert waste mass as the ultimate objective, and functional stability, which considers long-term emissions in the context of minimizing threats to HHE in the absence of active controls. The objective of this research was to conduct a case study evaluation of a closed MSW landfill using long-term data on landfill gas (LFG) production, leachate quality, site geology, and solids decomposition. Evaluations based on both functional and organic stability criteria were compared. The results showed that longer periods of LFG and leachate management would be required using organic stability criteria relative to an approach based on functional stability. These findings highlight the somewhat arbitrary and overly stringent nature of assigning universal stability criteria without due consideration of the landfill's hydrogeologic setting and potential environmental receptors. This supports previous studies that advocated for transition to a passive or inactive control stage based on a performance-based functional stability framework as a defensible mechanism for optimizing and ending regulatory PCC. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. Ecosystem Risk Assessment Using the Comprehensive Assessment of Risk to Ecosystems (CARE) Tool

    NASA Astrophysics Data System (ADS)

    Battista, W.; Fujita, R.; Karr, K.

    2016-12-01

    Effective Ecosystem Based Management requires a localized understanding of the health and functioning of a given system as well as of the various factors that may threaten the ongoing ability of the system to support the provision of valued services. Several risk assessment models are available that can provide a scientific basis for understanding these factors and for guiding management action, but these models focus mainly on single species and evaluate only the impacts of fishing in detail. We have developed a new ecosystem risk assessment model - the Comprehensive Assessment of Risk to Ecosystems (CARE) - that allows analysts to consider the cumulative impact of multiple threats, interactions among multiple threats that may result in synergistic or antagonistic impacts, and the impacts of a suite of threats on whole-ecosystem productivity and functioning, as well as on specific ecosystem services. The CARE model was designed to be completed in as little as two hours, and uses local and expert knowledge where data are lacking. The CARE tool can be used to evaluate risks facing a single site; to compare multiple sites for the suitability or necessity of different management options; or to evaluate the effects of a proposed management action aimed at reducing one or more risks. This analysis can help users identify which threats are the most important at a given site, and therefore where limited management resources should be targeted. CARE can be applied to virtually any system, and can be modified as knowledge is gained or to better match different site characteristics. CARE builds on previous ecosystem risk assessment tools to provide a comprehensive assessment of fishing and non-fishing threats that can be used to inform environmental management decisions across a broad range of systems.

  15. Ecosystem Risk Assessment Using the Comprehensive Assessment of Risk to Ecosystems (CARE) Tool

    NASA Astrophysics Data System (ADS)

    Battista, W.; Fujita, R.; Karr, K.

    2016-02-01

    Effective Ecosystem Based Management requires a localized understanding of the health and functioning of a given system as well as of the various factors that may threaten the ongoing ability of the system to support the provision of valued services. Several risk assessment models are available that can provide a scientific basis for understanding these factors and for guiding management action, but these models focus mainly on single species and evaluate only the impacts of fishing in detail. We have developed a new ecosystem risk assessment model - the Comprehensive Assessment of Risk to Ecosystems (CARE) - that allows analysts to consider the cumulative impact of multiple threats, interactions among multiple threats that may result in synergistic or antagonistic impacts, and the impacts of a suite of threats on whole-ecosystem productivity and functioning, as well as on specific ecosystem services. The CARE model was designed to be completed in as little as two hours, and uses local and expert knowledge where data are lacking. The CARE tool can be used to evaluate risks facing a single site; to compare multiple sites for the suitability or necessity of different management options; or to evaluate the effects of a proposed management action aimed at reducing one or more risks. This analysis can help users identify which threats are the most important at a given site, and therefore where limited management resources should be targeted. CARE can be applied to virtually any system, and can be modified as knowledge is gained or to better match different site characteristics. CARE builds on previous ecosystem risk assessment tools to provide a comprehensive assessment of fishing and non-fishing threats that can be used to inform environmental management decisions across a broad range of systems.

  16. System for ranking relative threats of U.S. volcanoes

    USGS Publications Warehouse

    Ewert, J.W.

    2007-01-01

    A methodology to systematically rank volcanic threat was developed as the basis for prioritizing volcanoes for long-term hazards evaluations, monitoring, and mitigation activities. A ranking of 169 volcanoes in the United States and the Commonwealth of the Northern Mariana Islands (U.S. volcanoes) is presented based on scores assigned for various hazard and exposure factors. Fifteen factors define the hazard: Volcano type, maximum known eruptive explosivity, magnitude of recent explosivity within the past 500 and 5,000 years, average eruption-recurrence interval, presence or potential for a suite of hazardous phenomena (pyroclastic flows, lahars, lava flows, tsunami, flank collapse, hydrothermal explosion, primary lahar), and deformation, seismic, or degassing unrest. Nine factors define exposure: a measure of ground-based human population in hazard zones, past fatalities and evacuations, a measure of airport exposure, a measure of human population on aircraft, the presence of power, transportation, and developed infrastructure, and whether or not the volcano forms a significant part of a populated island. The hazard score and exposure score for each volcano are multiplied to give its overall threat score. Once scored, the ordered list of volcanoes is divided into five overall threat categories from very high to very low. ?? 2007 ASCE.

  17. Affective state influences perception by affecting decision parameters underlying bias and sensitivity.

    PubMed

    Lynn, Spencer K; Zhang, Xuan; Barrett, Lisa Feldman

    2012-08-01

    Studies of the effect of affect on perception often show consistent directional effects of a person's affective state on perception. Unpleasant emotions have been associated with a "locally focused" style of stimulus evaluation, and positive emotions with a "globally focused" style. Typically, however, studies of affect and perception have not been conducted under the conditions of perceptual uncertainty and behavioral risk inherent to perceptual judgments outside the laboratory. We investigated the influence of perceivers' experienced affect (valence and arousal) on the utility of social threat perception by combining signal detection theory and behavioral economics. We compared 3 perceptual decision environments that systematically differed with respect to factors that underlie uncertainty and risk: the base rate of threat, the costs of incorrect identification threat, and the perceptual similarity of threats and nonthreats. We found that no single affective state yielded the best performance on the threat perception task across the 3 environments. Unpleasant valence promoted calibration of response bias to base rate and costs, high arousal promoted calibration of perceptual sensitivity to perceptual similarity, and low arousal was associated with an optimal adjustment of bias to sensitivity. However, the strength of these associations was conditional upon the difficulty of attaining optimal bias and high sensitivity, such that the effect of the perceiver's affective state on perception differed with the cause and/or level of uncertainty and risk.

  18. Fisk-based criteria to support validation of detection methods for drinking water and air.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonell, M.; Bhattacharyya, M.; Finster, M.

    2009-02-18

    This report was prepared to support the validation of analytical methods for threat contaminants under the U.S. Environmental Protection Agency (EPA) National Homeland Security Research Center (NHSRC) program. It is designed to serve as a resource for certain applications of benchmark and fate information for homeland security threat contaminants. The report identifies risk-based criteria from existing health benchmarks for drinking water and air for potential use as validation targets. The focus is on benchmarks for chronic public exposures. The priority sources are standard EPA concentration limits for drinking water and air, along with oral and inhalation toxicity values. Many contaminantsmore » identified as homeland security threats to drinking water or air would convert to other chemicals within minutes to hours of being released. For this reason, a fate analysis has been performed to identify potential transformation products and removal half-lives in air and water so appropriate forms can be targeted for detection over time. The risk-based criteria presented in this report to frame method validation are expected to be lower than actual operational targets based on realistic exposures following a release. Note that many target criteria provided in this report are taken from available benchmarks without assessing the underlying toxicological details. That is, although the relevance of the chemical form and analogues are evaluated, the toxicological interpretations and extrapolations conducted by the authoring organizations are not. It is also important to emphasize that such targets in the current analysis are not health-based advisory levels to guide homeland security responses. This integrated evaluation of chronic public benchmarks and contaminant fate has identified more than 200 risk-based criteria as method validation targets across numerous contaminants and fate products in drinking water and air combined. The gap in directly applicable values is considerable across the full set of threat contaminants, so preliminary indicators were developed from other well-documented benchmarks to serve as a starting point for validation efforts. By this approach, at least preliminary context is available for water or air, and sometimes both, for all chemicals on the NHSRC list that was provided for this evaluation. This means that a number of concentrations presented in this report represent indirect measures derived from related benchmarks or surrogate chemicals, as described within the many results tables provided in this report.« less

  19. Flexible methods for segmentation evaluation: results from CT-based luggage screening.

    PubMed

    Karimi, Seemeen; Jiang, Xiaoqian; Cosman, Pamela; Martz, Harry

    2014-01-01

    Imaging systems used in aviation security include segmentation algorithms in an automatic threat recognition pipeline. The segmentation algorithms evolve in response to emerging threats and changing performance requirements. Analysis of segmentation algorithms' behavior, including the nature of errors and feature recovery, facilitates their development. However, evaluation methods from the literature provide limited characterization of the segmentation algorithms. To develop segmentation evaluation methods that measure systematic errors such as oversegmentation and undersegmentation, outliers, and overall errors. The methods must measure feature recovery and allow us to prioritize segments. We developed two complementary evaluation methods using statistical techniques and information theory. We also created a semi-automatic method to define ground truth from 3D images. We applied our methods to evaluate five segmentation algorithms developed for CT luggage screening. We validated our methods with synthetic problems and an observer evaluation. Both methods selected the same best segmentation algorithm. Human evaluation confirmed the findings. The measurement of systematic errors and prioritization helped in understanding the behavior of each segmentation algorithm. Our evaluation methods allow us to measure and explain the accuracy of segmentation algorithms.

  20. Incorporating climate and ocean change into extinction risk assessments for 82 coral species.

    PubMed

    Brainard, Russell E; Weijerman, Mariska; Eakin, C Mark; McElhany, Paul; Miller, Margaret W; Patterson, Matt; Piniak, Gregory A; Dunlap, Matthew J; Birkeland, Charles

    2013-12-01

    Many marine invertebrate species facing potential extinction have uncertain taxonomies and poorly known demographic and ecological traits. Uncertainties are compounded when potential extinction drivers are climate and ocean changes whose effects on even widespread and abundant species are only partially understood. The U.S. Endangered Species Act mandates conservation management decisions founded on the extinction risk to species based on the best available science at the time of consideration-requiring prompt action rather than awaiting better information. We developed an expert-opinion threat-based approach that entails a structured voting system to assess extinction risk from climate and ocean changes and other threats to 82 coral species for which population status and threat response information was limited. Such methods are urgently needed because constrained budgets and manpower will continue to hinder the availability of desired data for many potentially vulnerable marine species. Significant species-specific information gaps and uncertainties precluded quantitative assessments of habitat loss or population declines and necessitated increased reliance on demographic characteristics and threat vulnerabilities at genus or family levels. Adapting some methods (e.g., a structured voting system) used during other assessments and developing some new approaches (e.g., integrated assessment of threats and demographic characteristics), we rated the importance of threats contributing to coral extinction risk and assessed those threats against population status and trend information to evaluate each species' extinction risk over the 21st century. This qualitative assessment resulted in a ranking with an uncertainty range for each species according to their estimated likelihood of extinction. We offer guidance on approaches for future biological extinction risk assessments, especially in cases of data-limited species likely to be affected by global-scale threats. Incorporación del Cambio Climático y Oceánico en Estudios de Riesgo de Extinción para 82 Especies de Coral. © 2013 Society for Conservation Biology.

  1. Integrating human impacts and ecological integrity into a risk-based protocol for conservation planning

    USGS Publications Warehouse

    Mattson, K.M.; Angermeier, P.L.

    2007-01-01

    Conservation planning aims to protect biodiversity by sustainng the natural physical, chemical, and biological processes within representative ecosystems. Often data to measure these components are inadequate or unavailable. The impact of human activities on ecosystem processes complicates integrity assessments and might alter ecosystem organization at multiple spatial scales. Freshwater conservation targets, such as populations and communities, are influenced by both intrinsic aquatic properties and the surrounding landscape, and locally collected data might not accurately reflect potential impacts. We suggest that changes in five major biotic drivers-energy sources, physical habitat, flow regime, water quality, and biotic interactions-might be used as surrogates to inform conservation planners of the ecological integrity of freshwater ecosystems. Threats to freshwater systems might be evaluated based on their impact to these drivers to provide an overview of potential risk to conservation targets. We developed a risk-based protocol, the Ecological Risk Index (ERI), to identify watersheds with least/most risk to conservation targets. Our protocol combines risk-based components, specifically the frequency and severity of human-induced stressors, with biotic drivers and mappable land- and water-use data to provide a summary of relative risk to watersheds. We illustrate application of our protocol with a case study of the upper Tennessee River basin, USA. Differences in risk patterns among the major drainages in the basin reflect dominant land uses, such as mining and agriculture. A principal components analysis showed that localized, moderately severe threats accounted for most of the threat composition differences among our watersheds. We also found that the relative importance of threats is sensitive to the spatial grain of the analysis. Our case study demonstrates that the ERI is useful for evaluating the frequency and severity of ecosystemwide risk, which can inform local and regional conservation planning. ?? 2006 Springer Science+Business Media, Inc.

  2. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  3. Mediators of Stereotype Threat Induced by Diagnostic Testing by Stereotype Relevant Out-Group Evaluators: The Roles of Evaluator's Racial Fairness and Support on Performance Outcome

    ERIC Educational Resources Information Center

    Wilburn, Grady Akile

    2010-01-01

    There is an abundance of research that examines the social-psychological phenomenon called stereotype threat. There is not, however, a conclusive understanding of the processes and mechanisms that operate within stereotype threat that produce reduced performance in a negative stereotype relevant area. This dissertation proposes that there are…

  4. The Effectiveness of Victimization Prevention Instruction: An Evaluation of Children's Responses to Actual Threats and Assaults.

    ERIC Educational Resources Information Center

    Finkelhor, David; And Others

    1995-01-01

    Interviews with 2,000 youths (ages 10-16) and their caretakers examined whether instruction at school or home about how to prevent victimization impacted on children's behavior in real victimization attempts. Children exposed to comprehensive school-based or home-based instruction were more likely to use recommended self-protection strategies and…

  5. Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities

    DOE PAGES

    Solodov, Alexander; Williams, Adam; Al Hanaei, Sara; ...

    2017-04-18

    Unmanned aerial vehicles (UAV) are among the major growing technologies that have many beneficial applications, yet they can also pose a significant threat. Recently, several incidents occurred with UAVs violating privacy of the public and security of sensitive facilities, including several nuclear power plants in France. The threat of UAVs to the security of nuclear facilities is of great importance and is the focus of this work. This paper presents an overview of UAV technology and classification, as well as its applications and potential threats. We show several examples of recent security incidents involving UAVs in France, USA, and Unitedmore » Arab Emirates. Further, the potential threats to nuclear facilities and measures to prevent them are evaluated. The importance of measures for detection, delay, and response (neutralization) of UAVs at nuclear facilities are discussed. An overview of existing technologies along with their strength and weaknesses are shown. Finally, the results of a gap analysis in existing approaches and technologies is presented in the form of potential technological and procedural areas for research and development. Furthermore based on this analysis, directions for future work in the field can be devised and prioritized.« less

  6. Selected considerations of implementation of the GNSS

    NASA Astrophysics Data System (ADS)

    Cwiklak, Janusz; Fellner, Andrzej; Fellner, Radoslaw; Jafernik, Henryk; Sledzinski, Janusz

    2014-05-01

    The article describes analysis of the safety and risk for the implementation of precise approach procedures (Localizer Performance and Vertical Guidance - LPV) with GNSS sensor at airports in Warsaw and Katowice. There were used some techniques of the identification of threats (inducing controlled flight into terrain, landing accident, mid-air collision) and evaluations methods based on Fault Tree Analysis, probability of the risk, safety risk evaluation matrix and Functional Hazard Assesment. Also safety goals were determined. Research led to determine probabilities of appearing of threats, as well as allow compare them with regard to the ILS. As a result of conducting the Preliminary System Safety Assessment (PSSA), there were defined requirements essential to reach the required level of the safety. It is worth to underline, that quantitative requirements were defined using FTA.

  7. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less

  8. A combined emitter threat assessment method based on ICW-RCM

    NASA Astrophysics Data System (ADS)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  9. Change-based threat detection in urban environments with a forward-looking camera

    NASA Astrophysics Data System (ADS)

    Morton, Kenneth, Jr.; Ratto, Christopher; Malof, Jordan; Gunter, Michael; Collins, Leslie; Torrione, Peter

    2012-06-01

    Roadside explosive threats continue to pose a significant risk to soldiers and civilians in conflict areas around the world. These objects are easy to manufacture and procure, but due to their ad hoc nature, they are difficult to reliably detect using standard sensing technologies. Although large roadside explosive hazards may be difficult to conceal in rural environments, urban settings provide a much more complicated background where seemingly innocuous objects (e.g., piles of trash, roadside debris) may be used to obscure threats. Since direct detection of all innocuous objects would flag too many objects to be of use, techniques must be employed to reduce the number of alarms generated and highlight only a limited subset of possibly threatening regions for the user. In this work, change detection techniques are used to reduce false alarm rates and increase detection capabilities for possible threat identification in urban environments. The proposed model leverages data from multiple video streams collected over the same regions by first applying video aligning and then using various distance metrics to detect changes based on image keypoints in the video streams. Data collected at an urban warfare simulation range at an Eastern US test site was used to evaluate the proposed approach, and significant reductions in false alarm rates compared to simpler techniques are illustrated.

  10. Reactivity to unpredictable threat as a treatment target for fear-based anxiety disorders.

    PubMed

    Gorka, S M; Lieberman, L; Klumpp, H; Kinney, K L; Kennedy, A E; Ajilore, O; Francis, J; Duffecy, J; Craske, M G; Nathan, J; Langenecker, S; Shankman, S A; Phan, K L

    2017-10-01

    Heightened reactivity to unpredictable threat (U-threat) is a core individual difference factor underlying fear-based psychopathology. Little is known, however, about whether reactivity to U-threat is a stable marker of fear-based psychopathology or if it is malleable to treatment. The aim of the current study was to address this question by examining differences in reactivity to U-threat within patients before and after 12-weeks of selective serotonin reuptake inhibitors (SSRIs) or cognitive-behavioral therapy (CBT). Participants included patients with principal fear (n = 22) and distress/misery disorders (n = 29), and a group of healthy controls (n = 21) assessed 12-weeks apart. A well-validated threat-of-shock task was used to probe reactivity to predictable (P-) and U-threat and startle eyeblink magnitude was recorded as an index of defensive responding. Across both assessments, individuals with fear-based disorders displayed greater startle magnitude to U-threat relative to healthy controls and distress/misery patients (who did not differ). From pre- to post-treatment, startle magnitude during U-threat decreased only within the fear patients who received CBT. Moreover, within fear patients, the magnitude of decline in startle to U-threat correlated with the magnitude of decline in fear symptoms. For the healthy controls, startle to U-threat across the two time points was highly reliable and stable. Together, these results indicate that startle to U-threat characterizes fear disorder patients and is malleable to treatment with CBT but not SSRIs within fear patients. Startle to U-threat may therefore reflect an objective, psychophysiological indicator of fear disorder status and CBT treatment response.

  11. Buffers or Boosters? The Role of HRM Practices in Older Workers' Experience of Stereotype Threat.

    PubMed

    Oliveira, Eduardo André da Silva; Cabral-Cardoso, Carlos José

    2018-01-02

    Building on the social identity approach and the HRM literature, this two-wave cross-sectional study examined the effects of negative age-based metastereotypes on the age-based stereotype threat experience of older workers and on organizational disidentification. The moderator role of HRM practices in the relationship between negative age-based metastereotypes and age-based stereotype threat was also investigated. Older workers survey results (n = 469) from 14 manufacturing companies indicated that negative age-based metastereotypes correlate positively with stereotype threat. Moderation results showed that age-awareness HRM practices (training for older workers) reinforced age-based stereotype threat, whereas general HRM practices (recognition and respect) impaired it. The article suggests that the combination of age-based metastereotypes with a stereotype threat framework contributes to further understand older workers' beliefs and attitudes. It also indicates that to be effective, HRM practices should emphasize positive social identities older workers share with their colleagues, rather than giving older workers special treatment that may, after all, reinforce stigmatization.

  12. Perturbed threat monitoring following a traumatic event predicts risk for post-traumatic stress disorder.

    PubMed

    Naim, R; Wald, I; Lior, A; Pine, D S; Fox, N A; Sheppes, G; Halpern, P; Bar-Haim, Y

    2014-07-01

    Post-traumatic stress disorder (PTSD) is a chronic and difficult to treat psychiatric disorder. Objective, performance-based diagnostic markers that uniquely index risk for PTSD above and beyond subjective self-report markers could inform attempts to improve prevention and early intervention. We evaluated the predictive value of threat-related attention bias measured immediately after a potentially traumatic event, as a risk marker for PTSD at a 3-month follow-up. We measured the predictive contribution of attentional threat bias above and beyond that of the more established marker of risk for PTSD, self-reported psychological dissociation. Dissociation symptoms and threat-related attention bias were measured in 577 motor vehicle accident (MVA) survivors (mean age = 35.02 years, 356 males) within 24 h of admission to an emergency department (ED) of a large urban hospital. PTSD symptoms were assessed at a 3-month follow-up using the Clinician-Administered PTSD Scale (CAPS). Self-reported dissociation symptoms significantly accounted for 16% of the variance in PTSD at follow-up, and attention bias toward threat significantly accounted for an additional 4% of the variance in PTSD. Threat-related attention bias can be reliably measured in the context of a hospital ED and significantly predicts risk for later PTSD. Possible mechanisms underlying the association between threat bias following a potentially traumatic event and risk for PTSD are discussed. The potential application of an attention bias modification treatment (ABMT) tailored to reduce risk for PTSD is suggested.

  13. Interparental Relationship Sensitivity Leads to Adolescent Internalizing Problems: Different Genotypes, Different Pathways

    PubMed Central

    Schlomer, Gabriel L.; Fosco, Gregory M.; Cleveland, H. H.; Vandenbergh, David J.; Feinberg, Mark E.

    2015-01-01

    Several studies have established that child interparental conflict evaluations link parent relationship functioning and adolescent adjustment. Using differential susceptibility theory and its vantage sensitivity complement as their framework, the authors examined differences between adolescents who vary in the DRD4 7 repeat genotype (i.e. 7+ vs. 7−) in how both interparental conflict and positivity affect adolescents’ evaluations of interparental conflict (i.e., threat appraisals) and how these evaluations affect internalizing problems. Results from longitudinal multiple-group path models using PROSPER data (N = 452) supported the hypothesis that threat appraisals for 7+ adolescents would be more affected by perceptions of interparental positivity compared to 7− adolescents; however, threat appraisals for 7+ adolescents were also less affected by interparental conflict. Among 7− adolescents, interparental conflict perceptions were associated with higher threat appraisals, and no association was found for perceptions of positivity. For adolescents of both genotypes, higher threat was associated with greater internalizing problems. PMID:25843974

  14. Annual National Test and Evaluation Conference (27th) Held in Tampa, Florida on March 14-17, 2011

    DTIC Science & Technology

    2011-03-17

    Based Test & Evaluation PETALLINGFRAGMENTATION RADIAL FRACTUREBRITTLE FRACTURE DUCTILE HOLE GROWTH PLUGGING THREAT VELOCITY MATERIAL MATERIAL V50 TYPE...Less Complex Less Costly Testing More Complex More Costly PETALLINGFRAGMENTATION RADIAL FRACTUREBRITTLE FRACTURE DUCTILE HOLE GROWTH PLUGGING...Reversible injuries; medical attention required 3 Serious Fracture of skull, penetration < 2 cm Reversible injuries; hospitalization required 4 Severe

  15. Asymdystopia: The Threat of Small Biases in Evaluations of Education Interventions That Need to Be Powered to Detect Small Impacts. NCEE 2018-4002

    ERIC Educational Resources Information Center

    Deke, John; Wei, Thomas; Kautz, Tim

    2017-01-01

    Evaluators of education interventions are increasingly designing studies to detect impacts much smaller than the 0.20 standard deviations that Cohen (1988) characterized as "small." While the need to detect smaller impacts is based on compelling arguments that such impacts are substantively meaningful, the drive to detect smaller impacts…

  16. Evaluating Threats in Multinational Marine Ecosystems: A Coast Salish First Nations and Tribal Perspective.

    PubMed

    Gaydos, Joseph K; Thixton, Sofie; Donatuto, Jamie

    2015-01-01

    Despite the merit of managing natural resources on the scale of ecosystems, evaluating threats and managing risk in ecosystems that span multiple countries or jurisdictions can be challenging. This requires each government involved to consider actions in concert with actions being taken in other countries by co-managing entities. Multiple proposed fossil fuel-related and port development projects in the Salish Sea, a 16,925 km2 inland sea shared by Washington State (USA), British Columbia (Canada), and Indigenous Coast Salish governments, have the potential to increase marine vessel traffic and negatively impact natural resources. There is no legal mandate or management mechanism requiring a comprehensive review of the potential cumulative impacts of these development activities throughout the Salish Sea and across the international border. This project identifies ongoing and proposed energy-related development projects that will increase marine vessel traffic in the Salish Sea and evaluates the threats each project poses to natural resources important to the Coast Salish. While recognizing that Coast Salish traditions identify all species as important and connected, we used expert elicitation to identify 50 species upon which we could evaluate impact. These species were chosen because Coast Salish depend upon them heavily for harvest revenue or as a staple food source, they were particularly culturally or spiritually significant, or they were historically part of Coast Salish lifeways. We identified six development projects, each of which had three potential impacts (pressures) associated with increased marine vessel traffic: oil spill, vessel noise and vessel strike. Projects varied in their potential for localized impacts (pressures) including shoreline development, harbor oil spill, pipeline spill, coal dust accumulation and nearshore LNG explosion. Based on available published data, impact for each pressure/species interaction was rated as likely, possible or unlikely. Impacts are likely to occur in 23 to 28% of the possible pressure/species scenarios and are possible in another 15 to 28% additional pressure/species interactions. While it is not clear which impacts will be additive, synergistic, or potentially antagonistic, studies that manipulate multiple stressors in marine ecosystems suggest that threats associated with these six projects are likely to have an overall additive or even synergistic interaction and therefore impact species of major cultural importance to the Coast Salish, an important concept that would be lost by merely evaluating each project independently. Failure to address multiple impacts will affect the Coast Salish and the 7 million other people that also depend on this ecosystem. These findings show the value of evaluating multiple threats, and ultimately conducting risk assessments at the scale of ecosystems and highlight the serious need for managers of multinational ecosystems to actively collaborate on evaluating threats, assessing risk, and managing resources.

  17. Evaluating Threats in Multinational Marine Ecosystems: A Coast Salish First Nations and Tribal Perspective

    PubMed Central

    Gaydos, Joseph K.; Thixton, Sofie; Donatuto, Jamie

    2015-01-01

    Despite the merit of managing natural resources on the scale of ecosystems, evaluating threats and managing risk in ecosystems that span multiple countries or jurisdictions can be challenging. This requires each government involved to consider actions in concert with actions being taken in other countries by co-managing entities. Multiple proposed fossil fuel-related and port development projects in the Salish Sea, a 16,925 km2 inland sea shared by Washington State (USA), British Columbia (Canada), and Indigenous Coast Salish governments, have the potential to increase marine vessel traffic and negatively impact natural resources. There is no legal mandate or management mechanism requiring a comprehensive review of the potential cumulative impacts of these development activities throughout the Salish Sea and across the international border. This project identifies ongoing and proposed energy-related development projects that will increase marine vessel traffic in the Salish Sea and evaluates the threats each project poses to natural resources important to the Coast Salish. While recognizing that Coast Salish traditions identify all species as important and connected, we used expert elicitation to identify 50 species upon which we could evaluate impact. These species were chosen because Coast Salish depend upon them heavily for harvest revenue or as a staple food source, they were particularly culturally or spiritually significant, or they were historically part of Coast Salish lifeways. We identified six development projects, each of which had three potential impacts (pressures) associated with increased marine vessel traffic: oil spill, vessel noise and vessel strike. Projects varied in their potential for localized impacts (pressures) including shoreline development, harbor oil spill, pipeline spill, coal dust accumulation and nearshore LNG explosion. Based on available published data, impact for each pressure/species interaction was rated as likely, possible or unlikely. Impacts are likely to occur in 23 to 28% of the possible pressure/species scenarios and are possible in another 15 to 28% additional pressure/species interactions. While it is not clear which impacts will be additive, synergistic, or potentially antagonistic, studies that manipulate multiple stressors in marine ecosystems suggest that threats associated with these six projects are likely to have an overall additive or even synergistic interaction and therefore impact species of major cultural importance to the Coast Salish, an important concept that would be lost by merely evaluating each project independently. Failure to address multiple impacts will affect the Coast Salish and the 7 million other people that also depend on this ecosystem. These findings show the value of evaluating multiple threats, and ultimately conducting risk assessments at the scale of ecosystems and highlight the serious need for managers of multinational ecosystems to actively collaborate on evaluating threats, assessing risk, and managing resources. PMID:26691860

  18. Evaluating Hospital-Based Surveillance for Outbreak Detection in Bangladesh: Analysis of Healthcare Utilization Data

    PubMed Central

    Nikolay, Birgit; Salje, Henrik; Sturm-Ramirez, Katharine; Azziz-Baumgartner, Eduardo; Homaira, Nusrat; Iuliano, A. Danielle; Paul, Repon C.; Hossain, M. Jahangir; Cauchemez, Simon; Gurley, Emily S.

    2017-01-01

    Background The International Health Regulations outline core requirements to ensure the detection of public health threats of international concern. Assessing the capacity of surveillance systems to detect these threats is crucial for evaluating a country’s ability to meet these requirements. Methods and Findings We propose a framework to evaluate the sensitivity and representativeness of hospital-based surveillance and apply it to severe neurological infectious diseases and fatal respiratory infectious diseases in Bangladesh. We identified cases in selected communities within surveillance hospital catchment areas using key informant and house-to-house surveys and ascertained where cases had sought care. We estimated the probability of surveillance detecting different sized outbreaks by distance from the surveillance hospital and compared characteristics of cases identified in the community and cases attending surveillance hospitals. We estimated that surveillance detected 26% (95% CI 18%–33%) of severe neurological disease cases and 18% (95% CI 16%–21%) of fatal respiratory disease cases residing at 10 km distance from a surveillance hospital. Detection probabilities decreased markedly with distance. The probability of detecting small outbreaks (three cases) dropped below 50% at distances greater than 26 km for severe neurological disease and at distances greater than 7 km for fatal respiratory disease. Characteristics of cases attending surveillance hospitals were largely representative of all cases; however, neurological disease cases aged <5 y or from the lowest socioeconomic group and fatal respiratory disease cases aged ≥60 y were underrepresented. Our estimates of outbreak detection rely on suspected cases that attend a surveillance hospital receiving laboratory confirmation of disease and being reported to the surveillance system. The extent to which this occurs will depend on disease characteristics (e.g., severity and symptom specificity) and surveillance resources. Conclusion We present a new approach to evaluating the sensitivity and representativeness of hospital-based surveillance, making it possible to predict its ability to detect emerging threats. PMID:28095468

  19. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    DTIC Science & Technology

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  20. Flexible methods for segmentation evaluation: Results from CT-based luggage screening

    PubMed Central

    Karimi, Seemeen; Jiang, Xiaoqian; Cosman, Pamela; Martz, Harry

    2017-01-01

    BACKGROUND Imaging systems used in aviation security include segmentation algorithms in an automatic threat recognition pipeline. The segmentation algorithms evolve in response to emerging threats and changing performance requirements. Analysis of segmentation algorithms’ behavior, including the nature of errors and feature recovery, facilitates their development. However, evaluation methods from the literature provide limited characterization of the segmentation algorithms. OBJECTIVE To develop segmentation evaluation methods that measure systematic errors such as oversegmentation and undersegmentation, outliers, and overall errors. The methods must measure feature recovery and allow us to prioritize segments. METHODS We developed two complementary evaluation methods using statistical techniques and information theory. We also created a semi-automatic method to define ground truth from 3D images. We applied our methods to evaluate five segmentation algorithms developed for CT luggage screening. We validated our methods with synthetic problems and an observer evaluation. RESULTS Both methods selected the same best segmentation algorithm. Human evaluation confirmed the findings. The measurement of systematic errors and prioritization helped in understanding the behavior of each segmentation algorithm. CONCLUSIONS Our evaluation methods allow us to measure and explain the accuracy of segmentation algorithms. PMID:24699346

  1. The measurement of threat orientations.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Bovin, Michelle J

    2006-01-01

    To develop measures of 3 threat orientations that affect responses to health behavior messages. In Study 1, college students (N = 47) completed items assessing threat orientations and health behaviors. In Study 2, college students and community adults (N = 110) completed the threat orientation items and measures of convergent and discriminant validity. In Study 1, the control-based, denial-based, and heightened-sensitivity-based threat orientation scales demonstrated good internal consistency and correlated with engagement in health behaviors. In Study 2, the convergent and discriminant validity of the 3 measures was established. The 3 scales have good internal reliability and construct validity.

  2. A Principal Component Analysis/Fuzzy Comprehensive Evaluation for Rockburst Potential in Kimberlite

    NASA Astrophysics Data System (ADS)

    Pu, Yuanyuan; Apel, Derek; Xu, Huawei

    2018-02-01

    Kimberlite is an igneous rock which sometimes bears diamonds. Most of the diamonds mined in the world today are found in kimberlite ores. Burst potential in kimberlite has not been investigated, because kimberlite is mostly mined using open-pit mining, which poses very little threat of rock bursting. However, as the mining depth keeps increasing, the mines convert to underground mining methods, which can pose a threat of rock bursting in kimberlite. This paper focuses on the burst potential of kimberlite at a diamond mine in northern Canada. A combined model with the methods of principal component analysis (PCA) and fuzzy comprehensive evaluation (FCE) is developed to process data from 12 different locations in kimberlite pipes. Based on calculated 12 fuzzy evaluation vectors, 8 locations show a moderate burst potential, 2 locations show no burst potential, and 2 locations show strong and violent burst potential, respectively. Using statistical principles, a Mahalanobis distance is adopted to build a comprehensive fuzzy evaluation vector for the whole mine and the final evaluation for burst potential is moderate, which is verified by a practical rockbursting situation at mine site.

  3. How social context moderates the self-evaluative emotions experienced due to health risk behaviour.

    PubMed

    Grob, Judith D M; Dijkstra, Arie; de Groot, Carla

    2011-10-01

    When people are confronted with the potential negative physical outcomes of their own health risk behaviour, they experience a self-threat. This threat is felt as negative self-evaluative emotions. We hypothesise that the threat will lead to more private self-evaluative emotions (e.g. regret) in a private social context, whereas more public self-evaluative emotions (e.g. embarrassment) will be felt in a public social context with negative norms. Consistent with our hypotheses, we show that participants anticipate feeling more private self-evaluative emotions when confronted with the negative consequences of their unhealthy behaviour when alone, and more public self-evaluative emotions when in a group (Study 1). They further anticipate more public self-evaluative emotions in response to a health self-threat when the group norm is negative, and more private self-evaluative emotions when the group norm is lenient (Study 2). Finally, in a cross-sectional study amongst smokers, we show that private but not public negative self-evaluative emotions concerning their own smoking habits are positively correlated with the intent to quit smoking (Study 3). These studies show that a distinction needs to be made between public and private self-evaluative emotions, in terms of their antecedents and effects. Theoretical implications and further lines of research are discussed.

  4. Design and Analysis of Cost-Efficient Sensor Deployment for Tracking Small UAS with Agent-Based Modeling.

    PubMed

    Shin, Sangmi; Park, Seongha; Kim, Yongho; Matson, Eric T

    2016-04-22

    Recently, commercial unmanned aerial systems (UAS) have gained popularity. However, these UAS are potential threats to people in terms of safety in public places, such as public parks or stadiums. To reduce such threats, we consider a design, modeling, and evaluation of a cost-efficient sensor system that detects and tracks small UAS. In this research, we focus on discovering the best sensor deployments by simulating different types and numbers of sensors in a designated area, which provide reasonable detection rates at low costs. Also, the system should cover the crowded areas more thoroughly than vacant areas to reduce direct threats to people underneath. This research study utilized the Agent-Based Modeling (ABM) technique to model a system consisting of independent and heterogeneous agents that interact with each other. Our previous work presented the ability to apply ABM to analyze the sensor configurations with two types of radars in terms of cost-efficiency. The results from the ABM simulation provide a list of candidate configurations and deployments that can be referred to for applications in the real world environment.

  5. Design and Analysis of Cost-Efficient Sensor Deployment for Tracking Small UAS with Agent-Based Modeling

    PubMed Central

    Shin, Sangmi; Park, Seongha; Kim, Yongho; Matson, Eric T.

    2016-01-01

    Recently, commercial unmanned aerial systems (UAS) have gained popularity. However, these UAS are potential threats to people in terms of safety in public places, such as public parks or stadiums. To reduce such threats, we consider a design, modeling, and evaluation of a cost-efficient sensor system that detects and tracks small UAS. In this research, we focus on discovering the best sensor deployments by simulating different types and numbers of sensors in a designated area, which provide reasonable detection rates at low costs. Also, the system should cover the crowded areas more thoroughly than vacant areas to reduce direct threats to people underneath. This research study utilized the Agent-Based Modeling (ABM) technique to model a system consisting of independent and heterogeneous agents that interact with each other. Our previous work presented the ability to apply ABM to analyze the sensor configurations with two types of radars in terms of cost-efficiency. The results from the ABM simulation provide a list of candidate configurations and deployments that can be referred to for applications in the real world environment. PMID:27110790

  6. Development of a matrix to evaluate the threat of biological agents used for bioterrorism.

    PubMed

    Tegnell, A; Van Loock, F; Baka, A; Wallyn, S; Hendriks, J; Werner, A; Gouvras, G

    2006-10-01

    Adequate public health preparedness for bioterrorism includes the elaboration of an agreed list of biological and chemical agents that might be used in an attack or as threats of deliberate release. In the absence of counterterrorism intelligence information, public health authorities can also base their preparedness on the agents for which the national health structures would be most vulnerable. This article aims to describe a logical method and the characteristics of the variables to be brought in a weighing process to reach a priority list for preparedness. The European Union, in the aftermath of the anthrax events of October 2001 in the United States, set up a task force of experts from multiple member states to elaborate and implement a health security programme. One of the first tasks of this task force was to come up with a list of priority threats. The model, presented here, allows Web-based updates for newly identified agents and for the changes occurring in preventive measures for agents already listed. The same model also allows the identification of priority protection action areas.

  7. Suppressed anger, evaluative threat, and cardiovascular reactivity: a tripartite profile approach.

    PubMed

    Jorgensen, Randall S; Kolodziej, Monika E

    2007-11-01

    Despite decades of theory and research implicating suppressed anger in the development of cardiovascular disorders involving cardiovascular reactivity (CVR), to date the theoretical components of low anger expression, guilt feelings over agonistic reactions, and defensive strivings to avoid social disapproval have not been used conjointly to profile suppressed anger for the prediction of CVR. The purpose of this study, then, was to cluster analyze measures of anger expression, hostility guilt, and social defensiveness to create a suppressed anger profile (low anger expression, high hostility guilt, high social defensiveness) and a non-suppressed profile from a sample of college males. Social evaluative threat may be a potent stressor for people who defensively suppress anger expression. Thus, to examine the combined effects of suppressed anger and social evaluative threat, participants, prior to telling a story to a Thematic Apperception Card (TAT), were randomly assigned to either a high-threat (story will be compared to stories created by the mentally ill) or a low-threat condition (story used to study effects of talking on cardiovascular responses). Blood pressure (BP) and heart rate (HR) were monitored during a rest period and the subsequent TAT card period. As predicted, suppressed anger males in the high-threat condition showed the highest levels of diastolic BP and HR change from the rest period. The suppressed anger group's systolic BP reactivity was independent of threat manipulation. Research implications are discussed.

  8. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  9. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  10. 78 FR 34031 - Burned Area Emergency Response, Forest Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-06

    ...) Evaluate potential threats to critical values; (2) determine the risk level for each threat; (3) identify... actions that meet the objectives; (6) evaluate potential response actions on likelihood for timely... stabilization actions. Improved the descriptive guidelines for employing response actions involving...

  11. Consistent approach to describing aircraft HIRF protection

    NASA Technical Reports Server (NTRS)

    Rimbey, P. R.; Walen, D. B.

    1995-01-01

    The high intensity radiated fields (HIRF) certification process as currently implemented is comprised of an inconsistent combination of factors that tend to emphasize worst case scenarios in assessing commercial airplane certification requirements. By examining these factors which include the process definition, the external HIRF environment, the aircraft coupling and corresponding internal fields, and methods of measuring equipment susceptibilities, activities leading to an approach to appraising airplane vulnerability to HIRF are proposed. This approach utilizes technically based criteria to evaluate the nature of the threat, including the probability of encountering the external HIRF environment. No single test or analytic method comprehensively addresses the full HIRF threat frequency spectrum. Additional tools such as statistical methods must be adopted to arrive at more realistic requirements to reflect commercial aircraft vulnerability to the HIRF threat. Test and analytic data are provided to support the conclusions of this report. This work was performed under NASA contract NAS1-19360, Task 52.

  12. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    PubMed

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  13. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    PubMed Central

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  14. Defensive platform size and survivability. [Platform survivability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Canavan, Gregory H.

    1988-06-01

    This report discusses the survivability of space platforms, concentrating on space based kinetic energy interceptors. It evaluates the efficacy of hardening, maneuver, self-defense, and deception in extending the survivability of platforms of varying sizes to expected threats, concluding that they should be adequate in the near and mid terms.

  15. Partial Identification of Treatment Effects: Applications to Generalizability

    ERIC Educational Resources Information Center

    Chan, Wendy

    2016-01-01

    Results from large-scale evaluation studies form the foundation of evidence-based policy. The randomized experiment is often considered the gold standard among study designs because the causal impact of a treatment or intervention can be assessed without threats of confounding from external variables. Policy-makers have become increasingly…

  16. Conventional and New Ways of Governing Forest Threats: A Study of Stakeholder Coherence in Sweden.

    PubMed

    Eriksson, Louise

    2018-01-01

    Based on a framework for analyzing stakeholder coherence horizontally and vertically, the present study examined the governance of forest threats in Sweden. Opinions of forest risk governance in stakeholder groups with and without a connection to private forestry were compared (n = 2496) and the opinions were analyzed in relation to current governance practices. More specifically, forest threat appraisals, trust in the Swedish Forest Agency (SFA), and the acceptability of forest risk policy measures directed at private forest owners were assessed. Results revealed an overall coherence between different stakeholders in this context. However, the groups differed in, for example, the acceptability of the hypothetical regulative measure aiming to reduce damages threatening the forest long-term (e.g., climate change). Furthermore, an extensive use of advice for a fee may challenge particularly the internal, but also the external, legitimacy of forest risk governance. The forest owner stakeholder group showed lower threat appraisals when evaluating threat to one's own forest rather than to the Swedish forest, except regarding browsing by animals. Regulations were not disapproved of in any of the stakeholder groups, although the forest owner group generally displayed higher acceptability of encouraging measures compared to the general public. Trust in the SFA was furthermore confirmed as an important driver of policy acceptability, and higher threat appraisals of novel threats, such as climate change and fire, resulted in a higher acceptability of measures less central or new in this context. The value of analyzing stakeholder coherence for natural resource management and governance is discussed.

  17. Conventional and New Ways of Governing Forest Threats: A Study of Stakeholder Coherence in Sweden

    NASA Astrophysics Data System (ADS)

    Eriksson, Louise

    2018-01-01

    Based on a framework for analyzing stakeholder coherence horizontally and vertically, the present study examined the governance of forest threats in Sweden. Opinions of forest risk governance in stakeholder groups with and without a connection to private forestry were compared ( n = 2496) and the opinions were analyzed in relation to current governance practices. More specifically, forest threat appraisals, trust in the Swedish Forest Agency (SFA), and the acceptability of forest risk policy measures directed at private forest owners were assessed. Results revealed an overall coherence between different stakeholders in this context. However, the groups differed in, for example, the acceptability of the hypothetical regulative measure aiming to reduce damages threatening the forest long-term (e.g., climate change). Furthermore, an extensive use of advice for a fee may challenge particularly the internal, but also the external, legitimacy of forest risk governance. The forest owner stakeholder group showed lower threat appraisals when evaluating threat to one's own forest rather than to the Swedish forest, except regarding browsing by animals. Regulations were not disapproved of in any of the stakeholder groups, although the forest owner group generally displayed higher acceptability of encouraging measures compared to the general public. Trust in the SFA was furthermore confirmed as an important driver of policy acceptability, and higher threat appraisals of novel threats, such as climate change and fire, resulted in a higher acceptability of measures less central or new in this context. The value of analyzing stakeholder coherence for natural resource management and governance is discussed.

  18. Evaluation of coping resources and self-esteem as moderators of the relationship between threat appraisals and avoidance of activities after traumatic brain injury.

    PubMed

    Riley, Gerard A; Dennis, Rebecca K; Powell, Theresa

    2010-12-01

    It is not uncommon for people after a traumatic brain injury (TBI) to develop anxieties about possible negative outcomes (i.e., threat appraisals) in relation to participating in valued activities. Some respond to this anxiety by avoiding the activities, but others maintain their participation. The present study investigated two factors that may help explain this variation across individuals in their response to threat appraisals - self-esteem and the evaluation of coping resources. Forty-one individuals with a TBI completed the Avoidance and Threat Appraisals Questionnaire, the Rosenberg Self-Esteem Scale and the Coping Resources Questionnaire. The study's hypotheses were supported: Those low in self-esteem, and those with a negative evaluation of their ability to cope with the TBI, were significantly more likely to respond to threat appraisals with avoidance. Those whose injury was more recent and those whose injury was the result of an assault were also more likely to respond with avoidance. The theoretical and therapeutic implications of these results are discussed.

  19. Startle Potentiation to Uncertain Threat as a Psychophysiological Indicator of Fear-based Psychopathology: An Examination across Multiple Internalizing Disorders

    PubMed Central

    Gorka, Stephanie M.; Lieberman, Lynne; Shankman, Stewart A.; Phan, K. Luan

    2016-01-01

    Heightened reactivity to uncertain threat (U-threat) is an important individual difference factor that may characterize fear-based internalizing psychopathologies (IPs) and distinguish them from distress/misery IPs. To date, however, the majority of existing research examining reactivity to U-threat has been within individuals with panic disorder and major depressive disorder (MDD) and no prior study has directly tested this hypothesis across multiple IPs. The current study therefore explored whether heightened reactivity to U-threat is a psychophysiological indicator of fear-based psychopathology across five groups: current 1) social anxiety disorder (SAD), 2) specific phobia (SP), 3) generalized anxiety disorder (GAD), 4) MDD, and 5) individuals with no history of psychopathology (controls). All 160 adults completed a well-validated threat-of-shock task designed to probe responses to predictable (P-) and U-threat. Startle eyeblink potentiation was recorded as an index of aversive arousal. Results indicated that individuals with SAD and SP evidenced greater startle potentiation to U-threat, but not P-threat, relative to individuals with GAD, MDD and controls (who did not differ). The current findings, along with the prior panic disorder and MDD literature, suggest that heightened reactivity to U-threat is a psychophysiological indicator of fear-based disorders and could represent a neurobiological organizing principle for internalizing psychopathology. The findings also suggest that individuals with fear disorders generally display a hypersensitivity to uncertain aversive events, which could contribute to their psychopathology. PMID:27868423

  20. Categorizing threat : building and using a generic threat matrix.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and ismore » not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.« less

  1. Exploring the Structure of Human Defensive Responses from Judgments of Threat Scenarios

    PubMed Central

    Harrison, Laura A.; Ahn, Curie; Adolphs, Ralph

    2015-01-01

    How humans react to threats is a topic of broad theoretical importance, and also relevant for understanding anxiety disorders. Many animal threat reactions exhibit a common structure, a finding supported by human evaluations of written threat scenarios that parallel patterns of rodent defensive behavior to actual threats. Yet the factors that underlie these shared behavioral patterns remain unclear. Dimensional accounts rooted in Darwin’s conception of antithesis explain many defensive behaviors. Across species, it is also clear that defensive reactions depend on specific situational factors, a feature long emphasized by psychological appraisal theories. Our study sought to extend prior investigations of human judgments of threat to a broader set of threats, including natural disasters, threats from animals, and psychological (as opposed to physical) threats. Our goal was to test whether dimensional and specific patterns of threat evaluation replicate across different threat classes. 85 healthy adult subjects selected descriptions of defensive behaviors that indicated how they would react to 29 threatening scenarios. Scenarios differed with respect to ten factors, e.g., perceived dangerousness or escapability. Across scenarios, we correlated these factor ratings with the pattern of defensive behaviors subjects endorsed. A decision tree hierarchically organized these correlation patterns to successfully predict each scenario’s most common reaction, both for the original sample of subjects and a separate replication group (n = 22). At the top of the decision tree, degree of dangerousness interacted with threat type (physical or psychological) to predict dimensional approach/avoidance behavior. Subordinate nodes represented specific defensive responses evoked by particular contexts. Our ecological approach emphasizes the interplay of situational factors in evoking a broad range of threat reactions. Future studies could test predictions made by our results to help understand pathological threat processing, such as seen in anxiety disorders, and could begin to test underlying neural mechanisms. PMID:26296201

  2. Using resilience and resistance concepts to manage persistent threats to sagebrush ecosystems and greater sage-grouse

    USGS Publications Warehouse

    Chambers, Jeanne C.; Maestas, Jeremy D.; Pyke, David A.; Boyd, Chad S.; Pellant, Mike; Wuenschel, Amarina

    2017-01-01

    Conservation of imperiled species often demands addressing a complex suite of threats that undermine species viability. Regulatory approaches, such as the US Endangered Species Act (1973), tend to focus on anthropogenic threats through adoption of policies and regulatory mechanisms. However, persistent ecosystem-based threats, such as invasive species and altered disturbance regimes, remain critical issues for most at-risk species considered to be conservation-reliant. We describe an approach for addressing persistent ecosystem threats to at-risk species based on ecological resilience and resistance concepts that is currently being used to conserve greater sage-grouse (Centrocercus urophasianus)and sagebrush ecosystems. The approach links biophysical indicators of ecosystem resilience and resistance with species-specific population and habitat requisites in a risk-based framework to identify priority areas for management and guide allocation of resources to manage persistent ecosystem-based threats. US federal land management and natural resource agencies have adopted this framework as a foundation for prioritizing sage-grouse conservation resources and determining effective restoration and management strategies. Because threats and strategies to address them cross-cut program areas, an integrated approach that includes wildland fire operations, postfire rehabilitation, fuels management, and habitat restoration is being used. We believe this approach is applicable to species conservation in other largely intact ecosystems with persistent, ecosystem-based threats.

  3. Assessing the antecedents and consequences of threat appraisal of an acute psychosocial stressor: the role of optimism, displacement behavior, and physiological responses.

    PubMed

    Zandara, Martina; Villada, Carolina; Hidalgo, Vanesa; Salvador, Alicia

    2018-03-13

    The feeling of stress is increasing in today's societies, particularly in young adults subjected to social evaluative situations in highly competitive academic and work contexts. Threat appraisal is a primary and fundamental reaction when people face a stressful situation. The aim of this study was to investigate the role of dispositional optimism as an antecedent and displacement behavior as a consequence of threat appraisal of a social-evaluative situation of stress. A second objective was to verify the moderating role of physiological responses to stress (heart rate and cortisol reactivity) in the relationship between threat appraisal and displacement behavior. To do this, we combined the Trier Social Stress Test (TSST) with ethological analysis, self-report questionnaires, and physiological data. As expected, people who scored higher on dispositional optimism perceived stress as less threatening, and a higher perception of threat was positively related to displacement behavior patterns. Moreover, the results showed that threat appraisal fully mediates the relationship between dispositional optimism and displacement behavior, and that only heart rate reactivity (not cortisol) moderates the relationship between threat appraisal and displacement behavior.

  4. Direction of attention bias to threat relates to differences in fear acquisition and extinction in anxious children.

    PubMed

    Waters, Allison M; Kershaw, Rachel

    2015-01-01

    Anxious children show attention biases towards and away from threat stimuli. Moreover, threat avoidance compared to vigilance predicts a poorer outcome from exposure-based treatments, such as cognitive-behavioural therapy (CBT), yet the mechanisms underlying this differential response are unclear. Pavlovian fear conditioning is a widely accepted theory to explain the acquisition and extinction of fear, including exposure-based treatments, such as CBT. In typical fear conditioning experiments, anxious children have shown larger physiological responses to an aversive unconditional stimulus (i.e., US on CS+ trials) and to non-reinforced stimuli (CS-) during fear acquisition and to both CSs during fear extinction compared to non-anxious peers. This study examined whether threat avoidance compared to threat vigilance was related to differences in fear acquisition and extinction in anxious children. Thirty-four clinically-anxious children completed a visual probe task including angry-neutral face pairs to determine the direction of threat attention bias as well as a discriminant conditioning and extinction task in which a geometric shape CS+ was paired with an aversive tone US, while the CS- geometric shape was always presented alone during acquisition trials. Both CSs were presented alone during extinction trials. Fear acquisition and extinction were indexed by skin conductance responses (SCR) and subjective measures. Children were classified as threat vigilant (N = 18) and threat avoidant (n = 16) based on the direction of threat attention bias on the visual probe task. During acquisition, threat avoidant relative to threat vigilant anxious children displayed larger orienting SCRs to both CSs during the first block of trials and larger third interval SCRs to the US on CS+ trials as well as on CS- trials. During extinction, threat avoidant anxious children showed delayed extinction of SCRs to both the CS+ and CS- and reported higher subjective anxiety ratings after extinction compared to threat vigilant anxious children. Threat avoidant anxious children may be more reactive physiologically to novel cues and to stimuli that become associated with threat and this may interfere with extinction learning. These findings could help explain previous evidence that threat avoidant anxious children do not respond as well as threat vigilant anxious children to exposure-based CBT. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. Cardiovascular and cortisol reactions to acute psychological stress under conditions of high versus low social evaluative threat: associations with the type D personality construct.

    PubMed

    Bibbey, Adam; Carroll, Douglas; Ginty, Annie T; Phillips, Anna C

    2015-06-01

    Social evaluative threat is an important factor in the cardiovascular response to mental stress. This study examined whether Type D personality, characterized by social inhibition and negative affectivity, is associated with an adverse cardiovascular response to a non-social and social evaluative threat. A total of 2300 students were screened for Type D personality, and 130 were selected for a nonsocial stress exposure condition (31 Type D, 30 non-Type D: 52% female) or a condition high in social evaluative threat (35 Type D, 34 non-Type D: 55% female). Systolic (SBP) and diastolic blood pressure (DBP), heart rate (HR), and salivary cortisol were measured. Social evaluative threat resulted in higher cardiovascular responses than the nonsocial challenge (SBP, p = .001, η = 0.092;DBP, p = .006, η = 0.058;HR, p = .006, η = 0.059). The greatest cardiovascular stress reactions were exhibited by Type D participants in the high social evaluation condition; reflected in significant group by condition interactions for SBP (F(1,126) = 7.29, p = .008, η = 0.055), DBP (F(1,126) = 5.23, p = .024, η = 0.040), and HR (F(1,126) = 5.04, p = .027, η = 0.038) reactivity. Only Type Ds in the social condition mounted a positive cortisol response (F(1,33) = 5.07, p = .031, η = 0.133). Type D individuals show different stress reactions depending on the social evaluative nature of the stress exposure. These findings suggest that dysregulation of the stress response in social situations potentially increases cardiovascular disease risk.

  6. EVALUATION OF WATER MONITORING INSTRUMENTATION AT EPA'S WATER AWARENESS TECHNOLOGY EVALUATION RESEARCH SECURITY CENTER

    EPA Science Inventory

    The safety and security of distribution systems has come under reassessment in the past year. Several chemical and biological agents have been identified that might constitute a credible threat against water supply systems. There have also been a few reported threats against wate...

  7. Extending the explanatory utility of the EPPM beyond fear-based persuasion.

    PubMed

    Lewis, Ioni; Watson, Barry; White, Katherine M

    2013-01-01

    In the 20 years since its inception, the Extended Parallel Process Model (EPPM) has attracted much empirical support. Currently, and unsurprisingly, given that is a model of fear-based persuasion, the EPPM's explanatory utility has been based only upon fear-based messages. However, an argument is put forth herein that draws upon existing evidence that the EPPM may be an efficacious framework for explaining the persuasive process and outcomes of emotion-based messages more broadly when such messages are addressing serious health topics. For the current study, four different types of emotional appeals were purposefully devised and included a fear-, an annoyance/agitation-, a pride-, and a humor-based message. All messages addressed the serious health issue of road safety, and in particular the risky behavior of speeding. Participants (n = 551) were exposed to only one of the four messages and subsequently provided responses within a survey. A series of 2 (threat: low, high) × 2 (efficacy: low, high) analysis of variance was conducted for each of the appeals based on the EPPM's message outcomes of acceptance and rejection. Support was found for the EPPM with a number of main effects of threat and efficacy emerging, reflecting that, irrespective of emotional appeal type, high levels of threat and efficacy enhanced message outcomes via maximizing acceptance and minimizing rejection. Theoretically, the findings provide support for the explanatory utility of the EPPM for emotion-based health messages more broadly. In an applied sense, the findings highlight the value of adopting the EPPM as a framework when devising and evaluating emotion-based health messages for serious health topics.

  8. Soldiers Under Threat: An Exploration of the Effect of Real Threat on Soldier’s Perceptions, Attitudes and Morale

    DTIC Science & Technology

    2009-01-01

    collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and... operations , it is imperative to understand the psychological and social dynamics that play a role in dealing with threat during international peace...their self- evaluation of operational readiness. So far studies on the effect of threat on soldiers’ attitudes have been conducted using the classic

  9. Performance improvement through quality evaluations of sterile cactus moths, Cactoblastis cactorum (Lepidoptera: Pyralidae), mass-reared at two insectaries

    USDA-ARS?s Scientific Manuscript database

    A bi-national program was established by Mexico and the United States to mitigate the threat of Cactoblastis cactorum (Berg) (Lepidoptera: Pyralidae), an invasive herbivore from South America, to native Opuntia spp. biodiversity and Opuntia-based industries. Mass-rearing, sterilization, and transpo...

  10. Evaluation of predicted Medfly (Ceratitis capitata) quarantine length in the United States utilizing degree-day and agent-based models

    USDA-ARS?s Scientific Manuscript database

    Invasions by pest insects pose a significant threat to agriculture worldwide. In the case of Ceratitis capitata incursions on the US mainland, where it is not officially established, repeated detections are followed by quarantines to eliminate the invading population. However, it is notoriously diff...

  11. An Ecological Regional Analysis of South Carolina

    ERIC Educational Resources Information Center

    Young, Frank W.; Robinson, Kenneth

    2011-01-01

    This study of the counties of South Carolina introduces a limited purpose, modifiable technology that is designed to reproduce the rapid discovery strategy of the natural sciences. It uses factor analysis to identify types of communities and the threats they face, and evaluates their success in dealing with these by comparisons based on…

  12. The School Psychologist's Role in Leading Multidisciplinary School-Based Threat Assessment Teams

    ERIC Educational Resources Information Center

    Kelly, Shawna Rader

    2018-01-01

    School psychologists have long been regarded for their expertise in the assessment, evaluation, and delivery of mental and behavioral health services for children in schools. Given the growing attention to school safety, crisis prevention, and crisis intervention, school psychologists are also increasingly called upon to assist with systems-level…

  13. Startle potentiation to uncertain threat as a psychophysiological indicator of fear-based psychopathology: An examination across multiple internalizing disorders.

    PubMed

    Gorka, Stephanie M; Lieberman, Lynne; Shankman, Stewart A; Phan, K Luan

    2017-01-01

    Heightened reactivity to uncertain threat (U-threat) is an important individual difference factor that may characterize fear-based internalizing psychopathologies (IPs) and distinguish them from distress/misery IPs. To date, however, the majority of existing research examining reactivity to U-threat has been within individuals with panic disorder and major depressive disorder (MDD) and no prior study has directly tested this hypothesis across multiple IPs. The current study therefore explored whether heightened reactivity to U-threat is a psychophysiological indicator of fear-based psychopathology across 5 groups: current (a) social anxiety disorder (SAD); (b) specific phobia (SP); (c) generalized anxiety disorder (GAD); (d) MDD; and (c) individuals with no history of psychopathology (controls). All 160 adults completed a well-validated threat-of-shock task designed to probe responses to predictable (P-) and U-threat. Startle eyeblink potentiation was recorded as an index of aversive arousal. Results indicated that individuals with SAD and SP evidenced greater startle potentiation to U-threat, but not P-threat, relative to individuals with GAD, MDD, and controls (who did not differ). The current findings, along with the prior panic disorder and MDD literature, suggest that heightened reactivity to U-threat is a psychophysiological indicator of fear-based disorders and could represent a neurobiological organizing principle for internalizing psychopathology. The findings also suggest that individuals with fear disorders generally display a hypersensitivity to uncertain aversive events, which could contribute to their psychopathology. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  14. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  15. A risk-based approach to evaluating wildlife demographics for management in a changing climate: A case study of the Lewis's Woodpecker

    Treesearch

    Erin Towler; Victoria A. Saab; Richard S. Sojda; Katherine Dickinson; Cindy L. Bruyere; Karen R. Newlon

    2012-01-01

    Given the projected threat that climate change poses to biodiversity, the need for proactive response efforts is clear. However, integrating uncertain climate change information into conservation planning is challenging, and more explicit guidance is needed. To this end, this article provides a specific example of how a risk-based approach can be used to incorporate a...

  16. A School-Based, Teacher-Mediated Prevention Program (Erase-Stress) for Reducing Terror-Related Traumatic Reactions in Israeli Youth: A Quasi-Randomized Controlled Trial

    ERIC Educational Resources Information Center

    Gelkopf, Marc; Berger, Rony

    2009-01-01

    Background: Since September 2000 Israeli children have been exposed to a large number of terrorist attacks. A universal, school-based intervention for dealing with the threat of terrorism as well as with terror-related symptoms, ERASE-Stress (ES), was evaluated in a male religious middle school in southern Israel. The program was administered by…

  17. Psychophysiological and Behavioral Responses to a Novel Intruder Threat Task for Children on the Autism Spectrum

    ERIC Educational Resources Information Center

    South, Mikle; Taylor, Katherine M.; Newton, Tiffani; Christensen, Megan; Jamison, Nathan K.; Chamberlain, Paul; Johnston, Oliver; Crowley, Michael J.; Higley, J. Dee

    2017-01-01

    We measured skin conductance response (SCR) to escalating levels of a direct social threat from a novel, ecologically-relevant experimental paradigm, the Intruder Threat Task. We simultaneously evaluated the contribution of social symptom severity and behavioral movement. Children with AS group showed less psychophysiological reactivity to social…

  18. Development, Evaluation, and Future Directions of the Virginia Student Threat Assessment Guidelines

    ERIC Educational Resources Information Center

    Cornell, Dewey; Allen, Korrie

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed in response to studies of school shootings conducted by the U.S. Federal Bureau of Investigation, U.S. Secret Service, and U.S. Department of Education that recommended schools should adopt a threat assessment approach to prevent targeted violence. This article reviews the…

  19. How Stereotype Threat Affects Healthy Older Adults' Performance on Clinical Assessments of Cognitive Decline: The Key Role of Regulatory Fit.

    PubMed

    Barber, Sarah J; Mather, Mara; Gatz, Margaret

    2015-11-01

    Stereotype threat can impair older adults' performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments' reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat's negative effects. By using a loss-avoidance frame, stereotype threat's negative effects can be attenuated or even eliminated. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  20. Perceptions of Risk Factors for School Violence: Concordance with FBI Risk Profile

    ERIC Educational Resources Information Center

    Wetterneck, Chad; Sass, Daniel A.; Davies, W. Hobart

    2004-01-01

    The Federal Bureau of Investigation (FBI, 2000) recently released a report on common background characteristics of school shooters, which also stressed the importance of evaluating the reality of threat. The present study evaluated respondents' ability to discriminate between an unrealistic and a realistic threat and between a low and high risk…

  1. Perceptions of Risk Factors for School Violence: Concordance with FBI Risk Profile

    ERIC Educational Resources Information Center

    Wetterneck, Chad; Sass, Daniel A.; Davies, W. Hobart

    2005-01-01

    The Federal Bureau of Investigation (FBI, 2000) recently released a report on common background characteristics of school shooters, which also stressed the importance of evaluating the reality of threat. The present study evaluated respondents' ability to discriminate between an unrealistic and a realistic threat and between a low and high risk…

  2. Value-Added Models for Teacher Preparation Programs: Validity and Reliability Threats, and a Manageable Alternative

    ERIC Educational Resources Information Center

    Brady, Michael P.; Heiser, Lawrence A.; McCormick, Jazarae K.; Forgan, James

    2016-01-01

    High-stakes standardized student assessments are increasingly used in value-added evaluation models to connect teacher performance to P-12 student learning. These assessments are also being used to evaluate teacher preparation programs, despite validity and reliability threats. A more rational model linking student performance to candidates who…

  3. Global Conservation Priorities for Marine Turtles

    PubMed Central

    Wallace, Bryan P.; DiMatteo, Andrew D.; Bolten, Alan B.; Chaloupka, Milani Y.; Hutchinson, Brian J.; Abreu-Grobois, F. Alberto; Mortimer, Jeanne A.; Seminoff, Jeffrey A.; Amorocho, Diego; Bjorndal, Karen A.; Bourjea, Jérôme; Bowen, Brian W.; Briseño Dueñas, Raquel; Casale, Paolo; Choudhury, B. C.; Costa, Alice; Dutton, Peter H.; Fallabrino, Alejandro; Finkbeiner, Elena M.; Girard, Alexandre; Girondot, Marc; Hamann, Mark; Hurley, Brendan J.; López-Mendilaharsu, Milagros; Marcovaldi, Maria Angela; Musick, John A.; Nel, Ronel; Pilcher, Nicolas J.; Troëng, Sebastian; Witherington, Blair; Mast, Roderic B.

    2011-01-01

    Where conservation resources are limited and conservation targets are diverse, robust yet flexible priority-setting frameworks are vital. Priority-setting is especially important for geographically widespread species with distinct populations subject to multiple threats that operate on different spatial and temporal scales. Marine turtles are widely distributed and exhibit intra-specific variations in population sizes and trends, as well as reproduction and morphology. However, current global extinction risk assessment frameworks do not assess conservation status of spatially and biologically distinct marine turtle Regional Management Units (RMUs), and thus do not capture variations in population trends, impacts of threats, or necessary conservation actions across individual populations. To address this issue, we developed a new assessment framework that allowed us to evaluate, compare and organize marine turtle RMUs according to status and threats criteria. Because conservation priorities can vary widely (i.e. from avoiding imminent extinction to maintaining long-term monitoring efforts) we developed a “conservation priorities portfolio” system using categories of paired risk and threats scores for all RMUs (n = 58). We performed these assessments and rankings globally, by species, by ocean basin, and by recognized geopolitical bodies to identify patterns in risk, threats, and data gaps at different scales. This process resulted in characterization of risk and threats to all marine turtle RMUs, including identification of the world's 11 most endangered marine turtle RMUs based on highest risk and threats scores. This system also highlighted important gaps in available information that is crucial for accurate conservation assessments. Overall, this priority-setting framework can provide guidance for research and conservation priorities at multiple relevant scales, and should serve as a model for conservation status assessments and priority-setting for widespread, long-lived taxa. PMID:21969858

  4. An Ecosystem Evaluation Framework for Global Seamount Conservation and Management

    PubMed Central

    Taranto, Gerald H.; Kvile, Kristina Ø.; Pitcher, Tony J.; Morato, Telmo

    2012-01-01

    In the last twenty years, several global targets for protection of marine biodiversity have been adopted but have failed. The Convention on Biological Diversity (CBD) aims at preserving 10% of all the marine biomes by 2020. For achieving this goal, ecologically or biologically significant areas (EBSA) have to be identified in all biogeographic regions. However, the methodologies for identifying the best suitable areas are still to be agreed. Here, we propose a framework for applying the CBD criteria to locate potential ecologically or biologically significant seamount areas based on the best information currently available. The framework combines the likelihood of a seamount constituting an EBSA and its level of human impact and can be used at global, regional and local scales. This methodology allows the classification of individual seamounts into four major portfolio conservation categories which can help optimize management efforts toward the protection of the most suitable areas. The framework was tested against 1000 dummy seamounts and satisfactorily assigned seamounts to proper EBSA and threats categories. Additionally, the framework was applied to eight case study seamounts that were included in three out of four portfolio categories: areas highly likely to be identified as EBSA with high degree of threat; areas highly likely to be EBSA with low degree of threat; and areas with a low likelihood of being EBSA with high degree of threat. This framework will allow managers to identify seamount EBSAs and to prioritize their policies in terms of protecting undisturbed areas, disturbed areas for recovery of habitats and species, or both based on their management objectives. It also identifies seamount EBSAs and threats considering different ecological groups in both pelagic and benthic communities. Therefore, this framework may represent an important tool to mitigate seamount biodiversity loss and to achieve the 2020 CBD goals. PMID:22905190

  5. An ecosystem evaluation framework for global seamount conservation and management.

    PubMed

    Taranto, Gerald H; Kvile, Kristina Ø; Pitcher, Tony J; Morato, Telmo

    2012-01-01

    In the last twenty years, several global targets for protection of marine biodiversity have been adopted but have failed. The Convention on Biological Diversity (CBD) aims at preserving 10% of all the marine biomes by 2020. For achieving this goal, ecologically or biologically significant areas (EBSA) have to be identified in all biogeographic regions. However, the methodologies for identifying the best suitable areas are still to be agreed. Here, we propose a framework for applying the CBD criteria to locate potential ecologically or biologically significant seamount areas based on the best information currently available. The framework combines the likelihood of a seamount constituting an EBSA and its level of human impact and can be used at global, regional and local scales. This methodology allows the classification of individual seamounts into four major portfolio conservation categories which can help optimize management efforts toward the protection of the most suitable areas. The framework was tested against 1000 dummy seamounts and satisfactorily assigned seamounts to proper EBSA and threats categories. Additionally, the framework was applied to eight case study seamounts that were included in three out of four portfolio categories: areas highly likely to be identified as EBSA with high degree of threat; areas highly likely to be EBSA with low degree of threat; and areas with a low likelihood of being EBSA with high degree of threat. This framework will allow managers to identify seamount EBSAs and to prioritize their policies in terms of protecting undisturbed areas, disturbed areas for recovery of habitats and species, or both based on their management objectives. It also identifies seamount EBSAs and threats considering different ecological groups in both pelagic and benthic communities. Therefore, this framework may represent an important tool to mitigate seamount biodiversity loss and to achieve the 2020 CBD goals.

  6. Self-evaluative emotions and expectations about self-evaluative emotions in health-behaviour change.

    PubMed

    Dijkstra, Arie; Buunk, Abraham P

    2008-03-01

    Engaging in a behaviour that has negative physical consequences is considered to be a threat to the self because it makes the self appear inadequate and non-adaptive. This self-threat is experienced as self-evaluative emotions. The self-threat can be removed by refraining from the unhealthy behaviour. The experience of self-threat influences behaviour because it contributes to expectations about the occurrence of self-evaluative emotions in the case of behaviour change. The results of Study 1, conducted among 503 smokers, showed that self-evaluative emotions were the central predictor of quitting activity during a 7-month period, among measures related to the negative consequences of smoking. The results of Study 2, conducted among 409 smokers, showed that expectations about the self-evaluative emotions that follow quitting smoking predicted quitting activity during a 9-month period and that these expectations partly mediated the relation between self-evaluative emotions and quitting. The results of Study 3, conducted among 255 smokers, showed that information on the negative outcomes of smoking led to quitting activity only when there was room to change self-evaluative outcome expectations. In addition, increases in these expectations predicted quitting activity during a 6-month period. The results suggest that negative self-evaluative emotions are a central motive to change unhealthy behaviour and that self-evaluative outcome expectations govern the behaviour change. The results can be understood within Steele's (1999) Self-affirmation theory.

  7. Global DEM Errors Underpredict Coastal Vulnerability to Sea Level Rise and Flooding

    NASA Astrophysics Data System (ADS)

    Kulp, Scott; Strauss, Benjamin

    2016-04-01

    Elevation data based on NASA's Shuttle Radar Topography Mission (SRTM) have been widely used to evaluate threats from global sea level rise, storm surge, and coastal floods. However, SRTM data are known to include large vertical errors in densely urban or densely vegetated areas. The errors may propagate to derived land and population exposure assessments. We compare assessments based on SRTM data against references employing high-accuracy bare-earth elevation data generated from lidar data available for coastal areas of the United States. We find that both 1-arcsecond and 3-arcsecond horizontal resolution SRTM data systemically underestimate exposure across all assessed spatial scales and up to at least 10m above the high tide line. At 3m, 1-arcsecond SRTM underestimates U.S. population exposure by more than 60%, and under-predicts population exposure in 90% of coastal states, 87% of counties, and 83% of municipalities. These fractions increase with elevation, but error medians and variability fall to lower levels, with national exposure underestimated by just 24% at 10m. Results using 3-arcsecond SRTM are extremely similar. Coastal analyses based on SRTM data thus appear to greatly underestimate sea level and flood threats, especially at lower elevations. However, SRTM-based estimates may usefully be regarded as providing lower bounds to actual threats. We additionally assess the performance of NOAA's Global Land One-km Base Elevation Project (GLOBE), another publicly-available global DEM, but do not reach any definitive conclusion because of the spatial heterogeneity in its quality.

  8. Disarming the Threat to Feminist Identification: An Application of Personal Construct Theory to Measurement and Intervention

    ERIC Educational Resources Information Center

    Moradi, Bonnie; Martin, Annelise; Brewster, Melanie E.

    2012-01-01

    Many individuals endorse feminist values but do not identify as feminist. The present set of studies tests the concept of threat, grounded in G. A. Kelly's personal construct theory of personality, as a potential factor in feminist nonidentification. Study 1 introduces the theoretically grounded "Feminist Threat Index" and evaluates its…

  9. Betty Petersen Memorial Library - NCWCP Publications - NWS

    Science.gov Websites

    (.PDF file) 254 1982 Smith W. 1-2 Day Comparative BWB and LFM Threat Scores and Bias 1971 - 1982 (.PDF Stackpole J. Tracton M. S. Comparative Evaluation of ECMWF and NMC Spectral Forecasts February - July 1982 file) 269 1983 Smith W. 1-2 Day Comparative BWB and LFM Threat Scores, No Precipitation Threat Scores

  10. Interdependent selves show face-induced facilitation of error processing: cultural neuroscience of self-threat

    PubMed Central

    Kitayama, Shinobu

    2014-01-01

    The fundamentally social nature of humans is revealed in their exquisitely high sensitivity to potentially negative evaluations held by others. At present, however, little is known about neurocortical correlates of the response to such social-evaluative threat. Here, we addressed this issue by showing that mere exposure to an image of a watching face is sufficient to automatically evoke a social-evaluative threat for those who are relatively high in interdependent self-construal. Both European American and Asian participants performed a flanker task while primed with a face (vs control) image. The relative increase of the error-related negativity (ERN) in the face (vs control) priming condition became more pronounced as a function of interdependent (vs independent) self-construal. Relative to European Americans, Asians were more interdependent and, as predicted, they showed a reliably stronger ERN in the face (vs control) priming condition. Our findings suggest that the ERN can serve as a robust empirical marker of self-threat that is closely modulated by socio-cultural variables. PMID:23160814

  11. How Moral Threat Shapes Laypersons' Engagement With Science.

    PubMed

    Bender, Jens; Rothmund, Tobias; Nauroth, Peter; Gollwitzer, Mario

    2016-12-01

    Laypersons' engagement with science has grown over the last decade, especially in Internet environments. While this development has many benefits, scientists also face the challenge of devaluation and public criticism by laypersons. Embedding this phenomenon in social-psychological theories and research on value-behavior correspondence, we investigated moral threat as a factor influencing laypersons' engagement with science. Across three studies, we hypothesized and found that moral values shape the way laypersons evaluate and communicate about science when these values are threatened in a given situation and central to people's self-concept. However, prior research on the underlying mechanism of moral threat effects cannot fully rule out value salience as an alternative explanation. To close this gap, we situationally induced value salience while varying the degree of moral threat (Study 3). Our findings indicate that moral threat amplifies the influence of moral values on laypersons' evaluation of science above and beyond value salience. © 2016 by the Society for Personality and Social Psychology, Inc.

  12. How do we choose the best model? The impact of cross-validation design on model evaluation for buried threat detection in ground penetrating radar

    NASA Astrophysics Data System (ADS)

    Malof, Jordan M.; Reichman, Daniël.; Collins, Leslie M.

    2018-04-01

    A great deal of research has been focused on the development of computer algorithms for buried threat detection (BTD) in ground penetrating radar (GPR) data. Most recently proposed BTD algorithms are supervised, and therefore they employ machine learning models that infer their parameters using training data. Cross-validation (CV) is a popular method for evaluating the performance of such algorithms, in which the available data is systematically split into ܰ disjoint subsets, and an algorithm is repeatedly trained on ܰ-1 subsets and tested on the excluded subset. There are several common types of CV in BTD, which vary principally upon the spatial criterion used to partition the data: site-based, lane-based, region-based, etc. The performance metrics obtained via CV are often used to suggest the superiority of one model over others, however, most studies utilize just one type of CV, and the impact of this choice is unclear. Here we employ several types of CV to evaluate algorithms from a recent large-scale BTD study. The results indicate that the rank-order of the performance of the algorithms varies substantially depending upon which type of CV is used. For example, the rank-1 algorithm for region-based CV is the lowest ranked algorithm for site-based CV. This suggests that any algorithm results should be interpreted carefully with respect to the type of CV employed. We discuss some potential interpretations of performance, given a particular type of CV.

  13. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    ERIC Educational Resources Information Center

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  14. Drone Defense System Architecture for U.S. Navy Strategic Facilities

    DTIC Science & Technology

    2017-09-01

    evaluation and weapons assignment (TEWA) to properly address threats. This report follows a systems engineering process to develop a software architecture...C-UAS requires a central system to connect these new and existing systems. The central system uses data fusion and threat evaluation and weapons...30  Table 6.  Decision Type Descriptions .......................................................................40  Table 7

  15. Physiological Response to Social Evaluative Threat in Adolescents with Autism Spectrum Disorder

    ERIC Educational Resources Information Center

    Edmiston, E. Kale; Jones, Robin M.; Corbett, Blythe A.

    2016-01-01

    The Trier Social Stress Test (TSST) was employed to study response to social evaluative threat in male adolescents with Autism Spectrum Disorder (ASD, n = 21) and typical development (n = 13). Participants wore a mobile electrocardiogram to collect heart rate data. There were significant group effects on respiratory sinus arrhythmia (RSA), a…

  16. Radiation anomaly detection algorithms for field-acquired gamma energy spectra

    NASA Astrophysics Data System (ADS)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Wolff, Ron; Guss, Paul; Mitchell, Stephen

    2015-08-01

    The Remote Sensing Laboratory (RSL) is developing a tactical, networked radiation detection system that will be agile, reconfigurable, and capable of rapid threat assessment with high degree of fidelity and certainty. Our design is driven by the needs of users such as law enforcement personnel who must make decisions by evaluating threat signatures in urban settings. The most efficient tool available to identify the nature of the threat object is real-time gamma spectroscopic analysis, as it is fast and has a very low probability of producing false positive alarm conditions. Urban radiological searches are inherently challenged by the rapid and large spatial variation of background gamma radiation, the presence of benign radioactive materials in terms of the normally occurring radioactive materials (NORM), and shielded and/or masked threat sources. Multiple spectral anomaly detection algorithms have been developed by national laboratories and commercial vendors. For example, the Gamma Detector Response and Analysis Software (GADRAS) a one-dimensional deterministic radiation transport software capable of calculating gamma ray spectra using physics-based detector response functions was developed at Sandia National Laboratories. The nuisance-rejection spectral comparison ratio anomaly detection algorithm (or NSCRAD), developed at Pacific Northwest National Laboratory, uses spectral comparison ratios to detect deviation from benign medical and NORM radiation source and can work in spite of strong presence of NORM and or medical sources. RSL has developed its own wavelet-based gamma energy spectral anomaly detection algorithm called WAVRAD. Test results and relative merits of these different algorithms will be discussed and demonstrated.

  17. Contingency planning for Phytophthora ramorum outbreaks: progress report work package 7, EU RAPRA project

    Treesearch

    M.H.C.G. Steeghs

    2008-01-01

    As part of the EU project ?Risk analysis for Phytophthora ramorum, a recently recognised pathogen threat to Europe and the cause of Sudden Oak Death in the USA? (acronym RAPRA) outbreak scenarios are defined and existing strategies for eradication and containment of Phytophthora ramorum evaluated. Based on the current knowledge...

  18. Base Redevelopment Planning for BRAC Sites

    DTIC Science & Technology

    2006-05-01

    or the private sector, also may supplement core staff responsibilities. Pro - fessional consultants may provide legal, planning, real estate...Opportunities, and Threats ( SWOT ) Analysis: An evaluation of a community’s economic, social, and physical environmental strengths, weaknesses, opportunities...in this area compare to those elsewhere? Forecasted changes in employment and population trends can be translated into pro - jected demand for housing

  19. Taking the Missing Propensity into Account When Estimating Competence Scores: Evaluation of Item Response Theory Models for Nonignorable Omissions

    ERIC Educational Resources Information Center

    Köhler, Carmen; Pohl, Steffi; Carstensen, Claus H.

    2015-01-01

    When competence tests are administered, subjects frequently omit items. These missing responses pose a threat to correctly estimating the proficiency level. Newer model-based approaches aim to take nonignorable missing data processes into account by incorporating a latent missing propensity into the measurement model. Two assumptions are typically…

  20. Hillslope treatment effectiveness monitoring on Horseshoe 2 and Monument Fires

    Treesearch

    Carly Gibson; Ann Youberg; Marc Stamer

    2013-01-01

    Between February and July, 2011, over 360,000 acres burned across the Coronado National Forest during one of the most active fire seasons in recorded history. Burned Area Emergency Response (BAER) Teams evaluated post-fire watershed conditions and prescribed treatments based on threats to known values at risk. Hillslope stabilization treatments were prescribed and...

  1. Small threat and contraband detection with TNA-based systems.

    PubMed

    Shaw, T J; Brown, D; D'Arcy, J; Liu, F; Shea, P; Sivakumar, M; Gozani, T

    2005-01-01

    The detection of small threats, such as explosives, drugs, and chemical weapons, concealed or encased in surrounding material, is a major concern in areas from security checkpoints to UneXploded Ordnance (UXO) clearance. Techniques such as X-ray and trace detection are often ineffectual in these applications. Thermal neutron analysis (TNA) provides an effective method for detecting concealed threats. This paper shows the effectiveness of Ancore's SPEDS, based on TNA, in detecting concealed liquid threats and differentiating live from inert mortar shells.

  2. The spatial distribution of threats to plant species with extremely small populations

    NASA Astrophysics Data System (ADS)

    Wang, Chunjing; Zhang, Jing; Wan, Jizhong; Qu, Hong; Mu, Xianyun; Zhang, Zhixiang

    2017-03-01

    Many biological conservationists take actions to conserve plant species with extremely small populations (PSESP) in China; however, there have been few studies on the spatial distribution of threats to PSESP. Hence, we selected distribution data of PSESP and made a map of the spatial distribution of threats to PSESP in China. First, we used the weight assignment method to evaluate the threat risk to PSESP at both country and county scales. Second, we used a geographic information system to map the spatial distribution of threats to PSESP, and explored the threat factors based on linear regression analysis. Finally, we suggested some effective conservation options. We found that the PSESP with high values of protection, such as the plants with high scientific research values and ornamental plants, were threatened by over-exploitation and utilization, habitat fragmentation, and a small sized wild population in broad-leaved forests and bush fallows. We also identified some risk hotspots for PSESP in China. Regions with low elevation should be given priority for ex- and in-situ conservation. Moreover, climate change should be considered for conservation of PSESP. To avoid intensive over-exploitation or utilization and habitat fragmentation, in-situ conservation should be practiced in regions with high temperatures and low temperature seasonality, particularly in the high risk hotspots for PSESP that we proposed. Ex-situ conservation should be applied in these same regions, and over-exploitation and utilization of natural resources should be prevented. It is our goal to apply the concept of PSESP to the global scale in the future.

  3. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    PubMed

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  4. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  5. Worker training for new threats: a proposed framework.

    PubMed

    Mitchell, Clifford S; Doyle, Mary L; Moran, John B; Lippy, Bruce; Hughes, Joseph T; Lum, Max; Agnew, Jacqueline

    2004-11-01

    In an effort to identify health and safety training needs for various groups of workers related to weapons of mass destruction, including chemical, biological, radiological, and nuclear weapons and high yield explosives (CBRNE), a conference, "Worker Training in a New Era: Responding to New Threats," was held at the Johns Hopkins Bloomberg School of Public Health in October 2002. Two questions were addressed: Which general skills and knowledge are common to all workers who might be exposed to terrorist threats from CBRNE weapons? What are the particular skills and knowledge relevant to these threats that are specific to workers in different sectors? Thirteen core components for pre- and post-event training were identified. Pre-event training applies to all workers. Post-event training applies to selected personnel including first responders, skilled support personnel, and other workers involved in these operations. Recommendations to improve worker safety training related to preparedness include: identify specific competencies for worker pre- and post-event training; coordinate Federal policy on worker training for CBRNE hazards; adopt federal guidelines or standards on worker training for new CBRNE threats, based on the competencies and coordinated Federal policy; conduct an inventory of training programs and other resources that could be used or adapted for use for new threats; and develop new training content and methods for pre- and post-event training to address specific competencies. Given the possibility for the introduction of CBRNE threats into the workplace, all workers need some training in the potential hazards involved: the individual worker's specific role in an emergency; incident command; activation of the emergency notification system; use of personal protective equipment (PPE); and safe evacuation of the workplace. While some occupational sectors have developed effective training related to these new threats, there is a need to develop, implement, and evaluate training programs across many different sectors of the workforce. Copyright 2004 Wiley-Liss, Inc.

  6. From Presidential Protection to Campus Security: A Brief History of Threat Assessment in North American Schools and Colleges

    ERIC Educational Resources Information Center

    Randazzo, Marisa R.; Cameron, J. Kevin

    2012-01-01

    This article provides a brief history of the development of behavioral threat assessment within colleges and universities in the United States and Canada, from the original Secret Service model used to evaluate threats against the U.S. president, to its adaptations for workplace settings and United States and Canadian secondary schools, to its…

  7. How Stereotype Threat Affects Healthy Older Adults’ Performance on Clinical Assessments of Cognitive Decline: The Key Role of Regulatory Fit

    PubMed Central

    Mather, Mara; Gatz, Margaret

    2015-01-01

    Objectives. Stereotype threat can impair older adults’ performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments’ reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Method. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Results. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Discussion. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat’s negative effects. By using a loss-avoidance frame, stereotype threat’s negative effects can be attenuated or even eliminated. PMID:25752896

  8. Social evaluative threat with verbal performance feedback alters neuroendocrine response to stress.

    PubMed

    Phan, Jenny M; Schneider, Ekaterina; Peres, Jeremy; Miocevic, Olga; Meyer, Vanessa; Shirtcliff, Elizabeth A

    2017-11-01

    Laboratory stress tasks such as the Trier Social Stress Test (TSST) have provided a key piece to the puzzle for how psychosocial stress impacts the hypothalamic-pituitary-adrenal axis, other stress-responsive biomarkers, and ultimately wellbeing. These tasks are thought to work through biopsychosocial processes, specifically social evaluative threat and the uncontrollability heighten situational demands. The present study integrated an experimental modification to the design of the TSST to probe whether additional social evaluative threat, via negative verbal feedback about speech performance, can further alter stress reactivity in 63 men and women. This TSST study confirmed previous findings related to stress reactivity and stress recovery but extended this literature in several ways. First, we showed that additional social evaluative threat components, mid-task following the speech portion of the TSST, were still capable of enhancing the psychosocial stressor. Second, we considered stress-reactive hormones beyond cortisol to include dehydroepiandrosterone (DHEA) and testosterone, and found these hormones were also stress-responsive, and their release was coupled with one another. Third, we explored whether gain- and loss-framing incentive instructions, meant to influence performance motivation by enhancing the personal relevance of task performance, impacted hormonal reactivity. Results showed that each hormone was stress reactive and further had different responses to the modified TSST compared to the original TSST. Beyond the utility of showing how the TSST can be modified with heightened social evaluative threat and incentive-framing instructions, this study informs about how these three stress-responsive hormones have differential responses to the demands of a challenge and a stressor. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Eliciting and maintaining ruminative thought: the role of social-evaluative threat.

    PubMed

    Zoccola, Peggy M; Dickerson, Sally S; Lam, Suman

    2012-08-01

    This study tested whether a performance stressor characterized by social-evaluative threat (SET) elicits more rumination than a stressor without this explicit evaluative component and whether this difference persists minutes, hours, and days later. The mediating role of shame-related cognition and emotion (SRCE) was also examined. During a laboratory visit, 144 undergraduates (50% female) were randomly assigned to complete a speech stressor in a social-evaluative threat condition (SET; n = 86), in which an audience was present, or a nonexplicit social-evaluative threat condition (ne-SET; n = 58), in which they were alone in a room. Participants completed measures of stressor-related rumination 10 and 40 min posttask, later that night, and upon returning to the laboratory 3-5 days later. SRCE and other emotions experienced during the stressor (fear, anger, and sadness) were assessed immediately posttask. As hypothesized, the SET speech stressor elicited more rumination than the ne-SET speech stressor, and these differences persisted for 3-5 days. SRCE-but not other specific negative emotions or general emotional arousal-mediated the effect of stressor context on rumination. Stressors characterized by SET may be likely candidates for eliciting and maintaining ruminative thought immediately and also days later, potentially by eliciting shame-related emotions and cognitions.

  10. Statement of Work Third Party Algorithm Development and Evaluation of Detection of Liquid Explosives in Dual-Energy Digital Radiographic/TIP Ready X-ray Images - Public Version

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nekoogar, F; Martz, Jr., H E

    2009-09-23

    The purpose of this statement of work is for third party collaborators to train, validate and have Lawrence Livermore National Security, LLC (LLNS) evaluate algorithms to detect liquid threats in digital radiography (DR)/TIP Ready X-ray (TRX) images that will be provided by LLNS through the Transportation and Security Administration (TSA). LLNS will provide a set of images with threat(s) to determine detection rates and non-threat images from airports to determine false alarm rates. A key including a bounding box showing the locations of the threats and non-threats will be provided for the images. It is expected that the Subcontractor shallmore » use half of the images with their keys for training the algorithms and the other half shall be used for validation (third party evaluation) purposes. The Subcontractor shall not use the key to the second half of the data other than for the validation and reporting of the performance of its algorithm (not for training). The Subcontractor has 45 business days from the receipt of datasets and the Subcontract to: (1) Run their detection/classification algorithms on the data; (2) Deliver a final report describing their performance by generating Receiver Operator Characteristic (ROC) curves using their algorithm; and (3) Deliver a copy of the third party's executable software (already trained and validated by the datasets) to LLNL accompanied by a user manual. LLNS will evaluate the performance of the same algorithm on another separate set of data. LLNS evaluation of the Subcontractor's algorithm will be documented in a final report within 30 days of receiving the executable code. This report will be sent to TSA and the report may be disseminated to the Subcontract at TSA's discretion.« less

  11. Activity Learning as a Foundation for Security Monitoring in Smart Homes.

    PubMed

    Dahmen, Jessamyn; Thomas, Brian L; Cook, Diane J; Wang, Xiaobo

    2017-03-31

    Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed.

  12. From avoidance to approach: The influence of threat-of-shock on reward-based decision making.

    PubMed

    Bublatzky, Florian; Alpers, Georg W; Pittig, Andre

    2017-09-01

    Potential threat can prime defensive responding and avoidance behavior, which may result in the loss of rewards. When aversive consequences do not occur, avoidance should, thus, be quickly overcome in healthy individuals. This study examined the impact of threat anticipation on reward-based decisions. Sixty-five participants completed a decision-making task in which they had to choose between high- and low-reward options. To model an approach-avoidance conflict, the high-reward option was contingent with a threat-of-shock cue; the low-reward option was contingent with a safety cue. In control trials, decisions were made without threat/safety instructions. Overall, behavioral data documented a typical preference for the profitable option. Importantly, under threat-of-shock, participants initially avoided the profitable option (i.e., safe, but less profitable choices). However, when they experienced that shocks did actually not occur, participants overcame initial avoidance in favor of larger gains. Furthermore, autonomic arousal (skin conductance and heart rate responses) was elevated during threat cues compared to safety and non-threatening control cues. Taken together, threat-of-shock was associated with behavioral consequences: initially, participants avoided threat-related options but made more profitable decisions as they experienced no aversive consequences. Although socially acquired threat contingencies are typically stable, incentives for approach can help to overcome threat-related avoidance. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Zika Virus in Ontario: Evaluating a Rapid Risk Assessment Tool for Emerging Infectious Disease Threats.

    PubMed

    Van Meer, Ryan; Hohenadel, Karin; Fitzgerald-Husek, Alanna; Warshawsky, Bryna; Sider, Doug; Schwartz, Brian; Nelder, Mark P

    To determine the Ontario-specific risk of local and travel-related Zika virus transmission in the context of a public health emergency of international concern, Public Health Ontario (PHO) completed a rapid risk assessment (RRA) on January 29, 2016, using a newly developed RRA guidance tool. The RRA concluded that risk of local mosquito-borne transmission was low, with a high risk of imported cases through travel. The RRA was updated 3 times based on predetermined triggers. An independent evaluation assessed both the application of the RRA guidance tool (process evaluation) and the usefulness of the RRA (outcome evaluation). We conducted face-to-face, semi-structured interviews with 7 individuals who participated in the creation or review of the Zika virus RRA and 4 end-users at PHO and the Ministry of Health and Long-Term Care. An inductive thematic analysis of responses was undertaken, whereby themes were directly informed by the data. The process evaluation determined that most steps outlined in the RRA guidance tool were adhered to, including forming a cross-functional writing team, clarifying the scope and describing context, completing the RRA summary report, and updating the RRA based on predefined triggers. The outcome evaluation found that end-users judged the Zika virus RRA as evidence-informed, useful, consistent, and timely. The evaluation established that the locally tailored guidance tool, adapted from national and international approaches to RRAs, facilitated a systematic, evidence-informed, and timely formal RRA process at PHO for the Zika virus RRA, which met the needs of end-users. Based on the evaluation, PHO will modify future RRAs by incorporating some flexibility into the literature review process to support timeliness of the RRA, explicitly describing the limitations of studies used to inform the RRA, and refining risk algorithms to better suit emerging infectious disease threats. It is anticipated that these refinements will improve upon the timely assessment of novel or reemerging infectious diseases.

  14. An Initial Investigation into the Role of Stereotype Threat in the Test Performance of College Students with Learning Disabilities

    ERIC Educational Resources Information Center

    May, Alison L.; Stone, C. Addison

    2014-01-01

    In a quasi-experimental evaluation of the possible role of stereotype threat in the academic performance of college students with learning disabilities (LD), students with (N = 29) and without (N = 62) identified LD took a simulated Verbal GRE® task in one of two conditions modeled after those used in past stereotype threat (ST) research. The task…

  15. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  16. Science You Can Use Bulletin: Wildfire triage: Targeting mitigation based on social, economic, and ecological values

    Treesearch

    Karl Malcolm; Matthew Thompson; Dave Calkin; Mark Finney; Alan Ager

    2012-01-01

    Evaluating the risks of wildfire relative to the valuable resources found in any managed landscape requires an interdisciplinary approach. Researchers at the Rocky Mountain Research Station and Western Wildland Threat Assessment Center developed such a process, using a combination of techniques rooted in fire modeling and ecology, economics, decision sciences, and the...

  17. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    PubMed

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil biota. Copyright © 2015 The Authors. Published by Elsevier B.V. All rights reserved.

  18. Conceptualizing threats to tobacco control from international economic agreements: the Brazilian experience.

    PubMed

    Drope, Jeffrey; McGrady, Benn; Bialous, Stella Aguinaga; Lencucha, Raphael; Silva, Vera Luiza da Costa E

    2017-10-19

    Using the results of dozens of interviews with key actors involved in tobacco control policymaking, we examine these actors' perceptions of threats to tobacco control policy efforts from international economic policies on trade and investment. We also evaluate, from a legal perspective, the genuine threats that exist or potential challenges that economic policies may pose to the Brazilian government's public health efforts. We find that most actors did not perceive these economic policies as a major threat to tobacco control. Objectively, we found that some threats do exist. For example, Brazil's attempt to ban most tobacco additives and flavorings continues to met resistance at the World Trade Organization.

  19. Fuzzy logic based sensor performance evaluation of vehicle mounted metal detector systems

    NASA Astrophysics Data System (ADS)

    Abeynayake, Canicious; Tran, Minh D.

    2015-05-01

    Vehicle Mounted Metal Detector (VMMD) systems are widely used for detection of threat objects in humanitarian demining and military route clearance scenarios. Due to the diverse nature of such operational conditions, operational use of VMMD without a proper understanding of its capability boundaries may lead to heavy causalities. Multi-criteria fitness evaluations are crucial for determining capability boundaries of any sensor-based demining equipment. Evaluation of sensor based military equipment is a multi-disciplinary topic combining the efforts of researchers, operators, managers and commanders having different professional backgrounds and knowledge profiles. Information acquired through field tests usually involves uncertainty, vagueness and imprecision due to variations in test and evaluation conditions during a single test or series of tests. This report presents a fuzzy logic based methodology for experimental data analysis and performance evaluation of VMMD. This data evaluation methodology has been developed to evaluate sensor performance by consolidating expert knowledge with experimental data. A case study is presented by implementing the proposed data analysis framework in a VMMD evaluation scenario. The results of this analysis confirm accuracy, practicability and reliability of the fuzzy logic based sensor performance evaluation framework.

  20. Attention Bias Modification (ABM): Review of Effects of Multisession ABM Training on Anxiety and Threat-Related Attention in High-Anxious Individuals

    PubMed Central

    Mogg, Karin; Waters, Allison M.; Bradley, Brendan P.

    2017-01-01

    Attention bias modification (ABM) aims to reduce anxiety by reducing attention bias (AB) to threat; however, effects on anxiety and AB are variable. This review examines 34 studies assessing effects of multisession-ABM on both anxiety and AB in high-anxious individuals. Methods include ABM-threat-avoidance (promoting attention-orienting away from threat), ABM-positive-search (promoting explicit, goal-directed attention-search for positive/nonthreat targets among negative/threat distractors), and comparison conditions (e.g., control-attention training combining threat-cue exposure and attention-task practice without AB-modification). Findings indicate anxiety reduction often occurs during both ABM-threat-avoidance and control-attention training; anxiety reduction is not consistently accompanied by AB reduction; anxious individuals often show no pretraining AB in orienting toward threat; and ABM-positive-search training appears promising in reducing anxiety. Methodological and theoretical issues are discussed concerning ABM paradigms, comparison conditions, and AB assessment. ABM methods combining explicit goal-directed attention-search for nonthreat/positive information and effortful threat-distractor inhibition (promoting top-down cognitive control during threat-cue exposure) warrant further evaluation. PMID:28752017

  1. The need to rationalize and prioritize threatening processes used to determine threat status in the IUCN Red List.

    PubMed

    Hayward, Matt W

    2009-12-01

    Thorough evaluation has made the International Union for Conservation of Nature (IUCN) Red List the most widely used and accepted authority on the conservation status of biodiversity. Although the system used to determine risk of extinction is rigorously and objectively applied, the list of threatening processes affecting a species is far more subjectively determined and has not had adequate review. I reviewed the threats listed in the IUCN Red List for randomly selected groups within the three most threatened orders of mammals: Artiodactyla, Carnivora, and Primates. These groups are taxonomically related and often ecologically similar, so I expected they would suffer relatively similar threats. Hominoid primates and all other terrestrial fauna faced similar threats, except for bovine artiodactyls and large, predatory carnivores, which faced significantly different threats. Although the status of bovines and hominoids and the number of threats affecting them were correlated, this was not the case for large carnivores. Most notable, however, was the great variation in the threats affecting individual members of each group. For example, the endangered European bison (Bison bonasus) has no threatening processes listed for it, and the lion (Panthera leo) is the only large predator listed as threatened with extinction by civil war. Some threatening processes appear spurious for the conservation of the species, whereas other seemingly important factors are not recorded as threats. The subjective nature of listing threatening processes, via expert opinion, results in substantial biases that may be allayed by independent peer review, use of technical manuals, consensus among multiple assessors, incorporation of probability modeling via decision-tree analysis, and adequate coordination among evaluators. The primary focus should be on species-level threats rather than population-level threats because the IUCN Red List is a global assessment and smaller-scale threats are more appropriate for national status assessments. Until conservationists agree on the threats affecting species and their relative importance, conservation action and success will be hampered by scattering scarce resources too widely and often by implementing conflicting strategies.

  2. On a simulation study of cyber attacks on vehicle-to-infrastructure communication (V2I) in Intelligent Transportation System (ITS)

    NASA Astrophysics Data System (ADS)

    Ekedebe, Nnanna; Yu, Wei; Song, Houbing; Lu, Chao

    2015-05-01

    An intelligent transportation system (ITS) is one typical cyber-physical system (CPS) that aims to provide efficient, effective, reliable, and safe driving experiences with minimal congestion and effective traffic flow management. In order to achieve these goals, various ITS technologies need to work synergistically. Nonetheless, ITS's reliance on wireless connectivity makes it vulnerable to cyber threats. Thus, it is critical to understand the impact of cyber threats on ITS. In this paper, using real-world transportation dataset, we evaluated the consequences of cyber threats - attacks against service availability by jamming the communication channel of ITS. In this way, we can have a better understanding of the importance of ensuring adequate security respecting safety and life-critical ITS applications before full and expensive real-world deployments. Our experimental data shows that cyber threats against service availability could adversely affect traffic efficiency and safety performances evidenced by exacerbated travel time, fuel consumed, and other evaluated performance metrics as the communication network is compromised. Finally, we discuss a framework to make ITS secure and more resilient against cyber threats.

  3. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers.

    PubMed

    Carey, Rachel N; Sarma, Kiran M

    2016-07-27

    Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These 'threat appeals' feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62) examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81) investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Findings suggest that threat-based road safety communications that target affective (fear) and cognitive (perceived efficacy) mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Silva, Consuelo Juanita

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or datamore » to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.« less

  5. Geodiversity assessment in urban areas

    NASA Astrophysics Data System (ADS)

    Ilic, Marina; Stojković, Sanja; Rundić, Ljupko; Ćalić, Jelena; Sandić, Dejan

    2017-04-01

    Conflict over natural resources figured prominently in the urban areas. On the one hand there is a constant need for space for the construction of new buildings for housing, agriculture and industrial production, and on the other hand the resources need protection because of the threat of degradation or even complete destruction. Considering the fact that urbanization is one of the most serious threats to geodiversity, it is important that this issue is taken into account in spatial development plans and georesource management strategies in urban areas. The geodiversity, as well as natural resource, must be managed in a sustainable manner in which it is very important its protection. The mapping of specific categories of geodiversity (geological, geomorphological, hydrological and soil) on the basis of quantitative assessment with the use of Geographic Information Systems (GIS) can allow spatial planners and managers to take further steps that would reduce threats and protect the natural values. This work presents the application of geodiversity evaluation method by using the geodiversity index (Gd), based on the quantity of abiotic elements and relief roughness within a spatial unit in the case of the City of Belgrade, Serbia. The acquired results are analyzed in the context of sustainable use of georesources and the threats to which geodiversity is exposed due to the development of the city.

  6. Using resilience and resistance concepts to manage persistent threats to sagebrush ecosystems and greater sage-grouse

    Treesearch

    Jeanne C. Chambers; Jeremy D. Maestas; David A. Pyke; Chad S. Boyd; Mike Pellant; Amarina Wuenschel

    2017-01-01

    Conservation of imperiled species often demands addressing a complex suite of threats that undermine species viability. Regulatory approaches, such as the US Endangered Species Act (1973), tend to focus on anthropogenic threats through adoption of policies and regulatory mechanisms. However, persistent ecosystem-based threats, such as invasive species and altered...

  7. Sabotage at Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Purvis, James W.

    1999-07-21

    Recently there has been a noted worldwide increase in violent actions including attempted sabotage at nuclear power plants. Several organizations, such as the International Atomic Energy Agency and the US Nuclear Regulatory Commission, have guidelines, recommendations, and formal threat- and risk-assessment processes for the protection of nuclear assets. Other examples are the former Defense Special Weapons Agency, which used a risk-assessment model to evaluate force-protection security requirements for terrorist incidents at DOD military bases. The US DOE uses a graded approach to protect its assets based on risk and vulnerability assessments. The Federal Aviation Administration and Federal Bureau of Investigationmore » conduct joint threat and vulnerability assessments on high-risk US airports. Several private companies under contract to government agencies use formal risk-assessment models and methods to identify security requirements. The purpose of this paper is to survey these methods and present an overview of all potential types of sabotage at nuclear power plants. The paper discusses emerging threats and current methods of choice for sabotage--especially vehicle bombs and chemical attacks. Potential consequences of sabotage acts, including economic and political; not just those that may result in unacceptable radiological exposure to the public, are also discussed. Applicability of risk-assessment methods and mitigation techniques are also presented.« less

  8. Emerging Infectious Threats to the Blood Supply: Seroepidemiological Studies in Iran – a Review

    PubMed Central

    Karimi, Gharib; Gharehbaghian, Ahmad; Tafti, Mohammad Fallah; Vafaiyan, Vida

    2013-01-01

    Summary The risk of transfusion-transmitted infections has been greatly reduced by improvements in donor screening and testing. However, newly recognized blood-borne infectious agents can be threats to blood safety. In order to evaluate the prevalence some of these agents in blood donors, a systematic review was conducted. Data were obtained from published papers related to HGV, Torque Teno virus (TTV), HTLV, West Nile virus (WNV) and SEN virus (SEN-V). Based on these studies, the prevalence of HGV varied from 1 to 8.6% for anti-E2 and from 0 to 4.8% for HGV RNA. The prevalence of TTV DNA and HTLV-I varied from 2.7 to 79.5% and from 0.013 to 2.3%, respectively. The WNV-specific IgM antibody and WNV RNA are negative in blood donors. Prevalence rates of SEN-V in Iranian blood donors range from 23 to 90.8%. Consequences of these infectious agents for blood safety are different. Thus, the need to perform laboratory screening as well as effectiveness and efficiency of laboratory tests depend on pathogenicity level and epidemiological conditions of emerging infections. However, being prepared based on the current level of risk and interventions to reduce the risk can be effective in reducing the potential threat for blood supply. PMID:23922546

  9. Scaling range sizes to threats for robust predictions of risks to biodiversity.

    PubMed

    Keith, David A; Akçakaya, H Resit; Murray, Nicholas J

    2018-04-01

    Assessments of risk to biodiversity often rely on spatial distributions of species and ecosystems. Range-size metrics used extensively in these assessments, such as area of occupancy (AOO), are sensitive to measurement scale, prompting proposals to measure them at finer scales or at different scales based on the shape of the distribution or ecological characteristics of the biota. Despite its dominant role in red-list assessments for decades, appropriate spatial scales of AOO for predicting risks of species' extinction or ecosystem collapse remain untested and contentious. There are no quantitative evaluations of the scale-sensitivity of AOO as a predictor of risks, the relationship between optimal AOO scale and threat scale, or the effect of grid uncertainty. We used stochastic simulation models to explore risks to ecosystems and species with clustered, dispersed, and linear distribution patterns subject to regimes of threat events with different frequency and spatial extent. Area of occupancy was an accurate predictor of risk (0.81<|r|<0.98) and performed optimally when measured with grid cells 0.1-1.0 times the largest plausible area threatened by an event. Contrary to previous assertions, estimates of AOO at these relatively coarse scales were better predictors of risk than finer-scale estimates of AOO (e.g., when measurement cells are <1% of the area of the largest threat). The optimal scale depended on the spatial scales of threats more than the shape or size of biotic distributions. Although we found appreciable potential for grid-measurement errors, current IUCN guidelines for estimating AOO neutralize geometric uncertainty and incorporate effective scaling procedures for assessing risks posed by landscape-scale threats to species and ecosystems. © 2017 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  10. Gender-, Race-, and Income-Based Stereotype Threat: The Effects of Multiple Stigmatized Aspects of Identity on Math Performance and Working Memory Function

    ERIC Educational Resources Information Center

    Tine, Michele; Gotlieb, Rebecca

    2013-01-01

    This study compared the relative impact of gender-, race-, and income-based stereotype threat and examined if individuals with multiple stigmatized aspects of identity experience a larger stereotype threat effect on math performance and working memory function than people with one stigmatized aspect of identity. Seventy-one college students of the…

  11. Satellite Data Aid Monitoring of Nation's Forests

    NASA Technical Reports Server (NTRS)

    2014-01-01

    The USDA Forest Service’s Asheville, North Carolina-based Eastern Forest Environmental Threat Assessment Center and Prineville, Oregon-based Western Wildlands Environmental Threat Assessment Center partnered with Stennis Space Center and other agencies to create an early warning system to identify, characterize, and track disturbances from potential forest threats. The result was ForWarn, which is now being used by federal and state forest and natural resource managers.

  12. [Exercise scenario of a highly contagious, life-threatening disease in intercontinental aviation : a case report in the context of the International Health Regulations (IHR)].

    PubMed

    Stich, Heribert; Guggemos, W; Mühlhaus, A; Wicklein, B; Dietl, J; Hoffmann, A; Leiwering, J; Frangoulidis, D; Zange, S; Königstein, B; Ippisch, S

    2015-07-01

    The International Health Regulations (IHR) 2005 were conformed to German law on July 20, 2007 and described in detail by the Implementing Act (IHR DG). According to these legal bases, "designated airports" must maintain special capacities for protection against health threats, and are also responsible for performing regular IHR exercises. Representation of the optimization of established operational concepts of various professions to manage infectious biological threats without obstruction of international travel, and mediation of experience to IHR professionals. An exercise based on the case scenario of a travel-related febrile illness was performed at Munich International Airport on November 11, 2013. Preparations took 6 months and the exercise itself lasted nearly 12 h. The follow-up lasted an additional 9 months. A qualitative and quantitative evaluation of the exercise was completed. From an Individual Medicine and Public Health perspective, modular work structures and risk communication functioned adequately. The medical examination of passengers was also well managed. Areas requiring further optimization included arrival/departure times of external actors, transport of the index patient to hospital and protective measures for individual participants. Overall, a defined biological threat scenario representing a double infection with two highly pathogenic germs was handled satisfactorily without affecting international air travel. Modular supply components are an effective and forward-looking means in protection against threats occurring at airports. Key success factors include sufficient staff mobility, immediate self-protection of actors involved, effective risk communication and a strong overall coordination and monitoring of the situation.

  13. Eight habitats, 38 threats and 55 experts: Assessing ecological risk in a multi-use marine region

    PubMed Central

    Jones, Alice R.; Deveney, Marty R.; Ward, Tim M.; Gillanders, Bronwyn M.

    2017-01-01

    Identifying the relative risk human activities pose to a habitat, and the ecosystem services they provide, can guide management prioritisation and resource allocation. Using a combination of expert elicitation to assess the probable effect of a threat and existing data to assess the level of threat exposure, we conducted a risk assessment for 38 human-mediated threats to eight marine habitats (totalling 304 threat-habitat combinations) in Spencer Gulf, Australia. We developed a score-based survey to collate expert opinion and assess the relative effect of each threat to each habitat, as well as a novel and independent measure of knowledge-based uncertainty. Fifty-five experts representing multiple sectors and institutions participated in the study, with 6 to 15 survey responses per habitat (n = 81 surveys). We identified key threats specific to each habitat; overall, climate change threats received the highest risk rankings, with nutrient discharge identified as a key local-scale stressor. Invasive species and most fishing-related threats, which are commonly identified as major threats to the marine environment, were ranked as low-tier threats to Spencer Gulf, emphasising the importance of regionally-relevant assessments. Further, we identified critical knowledge gaps and quantified uncertainty scores for each risk. Our approach will facilitate prioritisation of resource allocation in a region of increasing social, economic and environmental importance, and can be applied to marine regions where empirical data are lacking. PMID:28489912

  14. 49 CFR 1542.307 - Incident management.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Incident management. 1542.307 Section 1542.307 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... Incident management. (a) Each airport operator must establish procedures to evaluate bomb threats, threats...

  15. 49 CFR 1542.307 - Incident management.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Incident management. 1542.307 Section 1542.307 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... Incident management. (a) Each airport operator must establish procedures to evaluate bomb threats, threats...

  16. 49 CFR 1542.307 - Incident management.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Incident management. 1542.307 Section 1542.307 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... Incident management. (a) Each airport operator must establish procedures to evaluate bomb threats, threats...

  17. 49 CFR 1542.307 - Incident management.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Incident management. 1542.307 Section 1542.307 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... Incident management. (a) Each airport operator must establish procedures to evaluate bomb threats, threats...

  18. Toward a Survivability/Lethality Analysis Directorate (SLAD) Methodology for Conducting System of Systems Analysis (SoSA)

    DTIC Science & Technology

    2011-06-01

    alternative technologies early in the product life cycle. Use case 3 reflects SLAD’s response to changes in the way the Army acquires technical...development on the one hand, and to systems evaluated for production and deployment on the other. Together, these three use cases provide the Army...Package E x a m p le P ro b le m Mission based SLVA of networked-enabled small units subject to one or more threats. Mission based early

  19. Constructing paths through social networks for disease surveillance

    NASA Astrophysics Data System (ADS)

    Greene, Marjorie

    2011-06-01

    Global health security needs better information on biological threats such as pandemics and bioterrorism that pose ever-increasing dangers for the health of populations worldwide. A vast amount of real-time information about infectious disease outbreaks is found in various forms of Web-based data streams. There are advantages and disadvantages of Internet-based surveillance and it has been suggested that an important research area will be to evaluate the application of technologies that will provide benefits to outbreak disease control at local, national, and international levels.

  20. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    NASA Astrophysics Data System (ADS)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  1. Object detection in MOUT: evaluation of a hybrid approach for confirmation and rejection of object detection hypotheses

    NASA Astrophysics Data System (ADS)

    Manger, Daniel; Metzler, Jürgen

    2014-03-01

    Military Operations in Urban Terrain (MOUT) require the capability to perceive and to analyze the situation around a patrol in order to recognize potential threats. A permanent monitoring of the surrounding area is essential in order to appropriately react to the given situation, where one relevant task is the detection of objects that can pose a threat. Especially the robust detection of persons is important, as in MOUT scenarios threats usually arise from persons. This task can be supported by image processing systems. However, depending on the scenario, person detection in MOUT can be challenging, e.g. persons are often occluded in complex outdoor scenes and the person detection also suffers from low image resolution. Furthermore, there are several requirements on person detection systems for MOUT such as the detection of non-moving persons, as they can be a part of an ambush. Existing detectors therefore have to operate on single images with low thresholds for detection in order to not miss any person. This, in turn, leads to a comparatively high number of false positive detections which renders an automatic vision-based threat detection system ineffective. In this paper, a hybrid detection approach is presented. A combination of a discriminative and a generative model is examined. The objective is to increase the accuracy of existing detectors by integrating a separate hypotheses confirmation and rejection step which is built by a discriminative and generative model. This enables the overall detection system to make use of both the discriminative power and the capability to detect partly hidden objects with the models. The approach is evaluated on benchmark data sets generated from real-world image sequences captured during MOUT exercises. The extension shows a significant improvement of the false positive detection rate.

  2. The Perceived Threat of Affirmative Action Policy

    DTIC Science & Technology

    1975-06-06

    as- sumption was made that affirmative action threat was a phenomenon which was separate and distinct from general racial feelings. The...the respond- ents. However, affirmative action threat was found to be differentially related to general racial feelings at the .001 confidence...level. Thus, affirmative action threat feelings were not independent from general racial feelings. Based on the findings of this study, it was

  3. DoD Comprehensive Military Unmanned Aerial Vehicle Smart Device Ground Control Station Threat Model

    DTIC Science & Technology

    2015-04-01

    design , imple- mentation, and test evaluation were interviewed to evaluate the existing gaps in the DoD processes for cybersecurity. This group exposed...such as antenna design and signal reception have made satellite communication networks a viable solution for smart devices on the battlefield...DoD Comprehensive Military Unmanned AERIAL VEHICLE SMART DEVICE GROUND CONTROL STATION THREAT MODEL  Image designed by Diane Fleischer Report

  4. Towards Designing an Integrated Architecture for NEO Characterization, Mitigation, Scientific Evaluation, and Resource Utilization

    NASA Technical Reports Server (NTRS)

    Adams, Robert B.; LaPointe, Michael; Wilks, Rod; Allen, Brian

    2009-01-01

    This poster reviews the planning and design for an integrated architecture for characterization, mitigation, scientific evaluation and resource utilization of near earth objects. This includes tracks to observe and characterize the nature of the threat posed by a NEO, and deflect if a significant threat is posed. The observation stack can also be used for a more complete scientific analysis of the NEO.

  5. 77 FR 271 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-04

    ... Threat Reduction Agency, 1680 Texas Street SE., Kirtland Air Force Base, Albuquerque, NM 87117-5669... Threat Reduction Agency, 1680 Texas Street SE., Kirtland Air Force Base, Albuquerque, NM 87117-5669...

  6. Perspective: The Stealth of Implicit Bias in Chemical Engineering Education, Its Threat to Diversity, and What Professors Can Do to Promote an Inclusive Future

    ERIC Educational Resources Information Center

    Farrell, Stephanie; Minerick, Adrienne R.

    2018-01-01

    Many educators hold fairness and egalitarianism as core values that they strive to uphold in their professional work and personal lives, and they hope that they evaluate and support students based strictly on student potential and achievement. However, everyone holds unconscious beliefs about social and identity groups. This implicit (unconscious)…

  7. Self-Esteem and threats to self: implications for self-construals and interpersonal perceptions.

    PubMed

    Vohs, K D; Heatherton, T F

    2001-12-01

    In 4 studies, the authors examined interpersonal perceptions as a function of self-construals and ego threats for those with high and low self-esteem. Previous research (T. F. Heatherton & K. D. Vohs, 2000a) found that after threat, high self-esteem people were rated as less likable by an unacquainted dyad partner, whereas low self-esteem people were rated as more likable. Study I showed that after threat, high self-esteem people seek competency feedback, whereas low self-esteem people seek interpersonal feedback. Study 2 showed that high self-esteem people become more independent after threat, whereas low self-esteem people become more interdependent. Study 3 linked differences in independence versus interdependence to interpersonal evaluations. Study 4 found that differences in independent and interdependent self-construals statistically accounted for differences in likability and personality perceptions of high and low self-esteem people after threat. Thus, the combination of threat and self-esteem alters people's focus on different self-aspects, which consequently leads to different interpersonal appraisals.

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garner, W.V.

    The problem investigated here is how Soviet perceptions of particular military threats, in this case from NATO's new INF missiles, affect their arms control negotiating policy. This study most closely examines Soviet writings in the 1979-83 period and relies on extensive interviewing, sponsored by IREX, at the Soviet Academy of Sciences Institutes. It attempts to distinguish between Soviet portrayals and real perceptions of the military and political threats from the 1983 INF deployments. It explores how such Soviet assessments interrelate with Soviet military doctrine and broader foreign policy strategies, and how perceptions might differ among Soviet analysts and officials. Itmore » is divided into six chapters: (1) Historical Perspectives; (2) Soviet Threat Portrayals; (3) Evaluating Soviet Threat Portrayals; (4) Soviet Military Doctrine and the INF Threat; (5) Soviet Political-Military Interests at the INF Negotiations; (6) The Soviet Net Assessment. The study finds that Soviet threat portrayals are loosely consistent with Soviet perceptions of the potential threat, especially from an extended-range Pershing missile against their National Command Authorities.« less

  9. Activity Learning as a Foundation for Security Monitoring in Smart Homes

    PubMed Central

    Dahmen, Jessamyn; Thomas, Brian L.; Cook, Diane J.; Wang, Xiaobo

    2017-01-01

    Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed. PMID:28362342

  10. Detection of person borne IEDs using multiple cooperative sensors

    NASA Astrophysics Data System (ADS)

    MacIntosh, Scott; Deming, Ross; Hansen, Thorkild; Kishan, Neel; Tang, Ling; Shea, Jing; Lang, Stephen

    2011-06-01

    The use of multiple cooperative sensors for the detection of person borne IEDs is investigated. The purpose of the effort is to evaluate the performance benefits of adding multiple sensor data streams into an aided threat detection algorithm, and a quantitative analysis of which sensor data combinations improve overall detection performance. Testing includes both mannequins and human subjects with simulated suicide bomb devices of various configurations, materials, sizes and metal content. Aided threat recognition algorithms are being developed to test detection performance of individual sensors against combined fused sensors inputs. Sensors investigated include active and passive millimeter wave imaging systems, passive infrared, 3-D profiling sensors and acoustic imaging. The paper describes the experimental set-up and outlines the methodology behind a decision fusion algorithm-based on the concept of a "body model".

  11. Best practices in ranking communicable disease threats: a literature review, 2015.

    PubMed

    O'Brien, Eleanor Charlotte; Taft, Rachel; Geary, Katie; Ciotti, Massimo; Suk, Jonathan E

    2016-04-28

    The threat of serious, cross-border communicable disease outbreaks in Europe poses a significant challenge to public health and emergency preparedness because the relative likelihood of these threats and the pathogens involved are constantly shifting in response to a range of changing disease drivers. To inform strategic planning by enabling effective resource allocation to manage the consequences of communicable disease outbreaks, it is useful to be able to rank and prioritise pathogens. This paper reports on a literature review which identifies and evaluates the range of methods used for risk ranking. Searches were performed across biomedical and grey literature databases, supplemented by reference harvesting and citation tracking. Studies were selected using transparent inclusion criteria and underwent quality appraisal using a bespoke checklist based on the AGREE II criteria. Seventeen studies were included in the review, covering five methodologies. A narrative analysis of the selected studies suggests that no single methodology was superior. However, many of the methods shared common components, around which a 'best-practice' framework was formulated. This approach is intended to help inform decision makers' choice of an appropriate risk-ranking study design.

  12. A Novel Fiber Optic Based Surveillance System for Prevention of Pipeline Integrity Threats.

    PubMed

    Tejedor, Javier; Macias-Guarasa, Javier; Martins, Hugo F; Piote, Daniel; Pastor-Graells, Juan; Martin-Lopez, Sonia; Corredera, Pedro; Gonzalez-Herraez, Miguel

    2017-02-12

    This paper presents a novel surveillance system aimed at the detection and classification of threats in the vicinity of a long gas pipeline. The sensing system is based on phase-sensitive optical time domain reflectometry ( ϕ -OTDR) technology for signal acquisition and pattern recognition strategies for threat identification. The proposal incorporates contextual information at the feature level and applies a system combination strategy for pattern classification. The contextual information at the feature level is based on the tandem approach (using feature representations produced by discriminatively-trained multi-layer perceptrons) by employing feature vectors that spread different temporal contexts. The system combination strategy is based on a posterior combination of likelihoods computed from different pattern classification processes. The system operates in two different modes: (1) machine + activity identification, which recognizes the activity being carried out by a certain machine, and (2) threat detection, aimed at detecting threats no matter what the real activity being conducted is. In comparison with a previous system based on the same rigorous experimental setup, the results show that the system combination from the contextual feature information improves the results for each individual class in both operational modes, as well as the overall classification accuracy, with statistically-significant improvements.

  13. CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6

    DTIC Science & Technology

    2012-12-01

    Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for

  14. Modeling Electrostatic Fields Generated by Internal Charging of Materials in Space Radiation Environments

    NASA Technical Reports Server (NTRS)

    Minow, Joseph I.

    2011-01-01

    Internal charging is a risk to spacecraft in energetic electron environments. DICTAT, NU MIT computational codes are the most widely used engineering tools for evaluating internal charging of insulator materials exposed to these environments. Engineering tools are designed for rapid evaluation of ESD threats, but there is a need for more physics based models for investigating the science of materials interactions with energetic electron environments. Current tools are limited by the physics included in the models and ease of user implementation .... additional development work is needed to improve models.

  15. Identifying key conservation threats to Alpine birds through expert knowledge

    PubMed Central

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  16. Evaluation of appropriate sensor specifications for space based ballistic missile detection

    NASA Astrophysics Data System (ADS)

    Schweitzer, Caroline; Stein, Karin; Wendelstein, Norbert

    2012-10-01

    The detection and tracking of ballistic missiles (BMs) during launch or cloud break using satellite based electro-optical (EO) sensors is a promising possibility for pre-instructing early warning and fire control radars. However, the successful detection of a BM is depending on the applied infrared (IR)-channel, as emission and reflection of threat and background vary in different spectral (IR-) bands and for different observation scenarios. In addition, the spatial resolution of the satellite based system also conditions the signal-to-clutter-ratio (SCR) and therefore the predictability of the flight path. Generally available satellite images provide data in spectral bands, which are suitable for remote sensing applications and earth surface observations. However, in the fields of BM early warning, these bands are not of interest making the simulation of background data essential. The paper focuses on the analysis of IR-bands suitable for missile detection by trading off the suppression of background signature against threat signal strength. This comprises a radiometric overview of the background radiation in different spectral bands for different climates and seasons as well as for various cloud types and covers. A brief investigation of the BM signature and its trajectory within a threat scenario is presented. Moreover, the influence on the SCR caused by different observation scenarios and varying spatial resolution are pointed out. The paper also introduces the software used for simulating natural background spectral radiance images, MATISSE ("Advanced Modeling of the Earth for Environment and Scenes Simulation") by ONERA [1].

  17. Nonlinear secret image sharing scheme.

    PubMed

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  18. Nonlinear Secret Image Sharing Scheme

    PubMed Central

    Shin, Sang-Ho; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2⁡m⌉ bit-per-pixel (bpp), respectively. PMID:25140334

  19. Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.

    In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they can be assessed. A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. A complementary Personality Factor modeling approach was developedmore » based on analysis to derive relevant personality characteristics from word use. Several implementations of the psychosocial model were evaluated by comparing their agreement with judgments of human resources and management professionals; the personality factor modeling approach was examined using email samples. If implemented in an operational setting, these models should be part of a set of management tools for employee assessment to identify employees who pose a greater insider threat.« less

  20. Pattern-Based Design of Insider Threat Programs

    DTIC Science & Technology

    2014-12-01

    also applied these models to develop best practices and technical controls for mitigating insider threat. In some cases of in- sider threat...departing insiders might take valuable IP with them. One set of practices and controls designed to reduce the risk of insider IP theft is based on case data...describing this set of practices and controls helps to balance the costs of monitoring employee behavior for suspicious actions against the risk of

  1. Perceived clinician-patient communication in the emergency department and subsequent post-traumatic stress symptoms in patients evaluated for acute coronary syndrome.

    PubMed

    Chang, Bernard P; Sumner, Jennifer A; Haerizadeh, Myrta; Carter, Eileen; Edmondson, Donald

    2016-09-01

    Evaluation for a potentially life-threatening cardiac event in the emergency department (ED) is a stressful experience that can result in symptoms of post-traumatic stress disorder, which are associated with increased risk of morbidity and mortality in patients. No study has tested whether good clinician-patient communication in the ED is associated with better psychological outcomes in these individuals and whether it can mitigate other risk factors for post-traumatic stress symptoms (PSS) such as perception of life threat and vulnerability in the ED. Data were analysed from 474 participants in the Reactions to Acute Care and Hospitalization (REACH) study, an observational cohort study of ED predictors of medical and psychological outcomes after evaluation for suspected acute coronary syndrome. Participants were recruited from November 2013 to January 2015 at a single-site academic medical centre (New York-Presbyterian-Columbia University Medical Center). Participants reported threat perceptions in the ED and provided information on their perceptions of clinician-patient communication using the Interpersonal Process of Care Survey. PSS were assessed using the Acute Stress Disorder Scale during follow-up. 474 subjects were enrolled in the study. Median length of follow-up was 3 days after ED presentation, range 0-30 days, 80% within 8 days. Perceptions of good clinician-patient communication in the ED were associated with lower PSS, whereas increased threat perception was associated with higher PSS. A significant interaction between clinician-patient communication and threat perception on PSS suggested that patients with higher threat perception benefited most from good clinician-patient communication. Our study found an association between good clinician-patient communication in the ED during evaluation of potentially life-threatening cardiac events and decreased subsequent post-traumatic stress reactions. This association is particularly marked for patients who perceive the greatest degree of life threat and vulnerability during evaluation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  2. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    PubMed Central

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of care. An actual shortage of funding of personnel to coordinate the assessment process is the most important threat. Conclusion The BelRAI-software allows standardized transmural information transfer and the centralization of medical, allied health professionals and nursing data. It is strictly secured and follows strict privacy regulations, allowing hospitals to optimize (transmural) communication and interaction. However, weaknesses and threats exist and must be tackled in order to promote large scale implementation. PMID:24007312

  3. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting.

    PubMed

    Devriendt, Els; Wellens, Nathalie I H; Flamaing, Johan; Declercq, Anja; Moons, Philip; Boonen, Steven; Milisen, Koen

    2013-09-05

    The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons' medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients' data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. The primary strengths of the BelRAI-system were a structured overview of the patients' condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of care. An actual shortage of funding of personnel to coordinate the assessment process is the most important threat. The BelRAI-software allows standardized transmural information transfer and the centralization of medical, allied health professionals and nursing data. It is strictly secured and follows strict privacy regulations, allowing hospitals to optimize (transmural) communication and interaction. However, weaknesses and threats exist and must be tackled in order to promote large scale implementation.

  4. Understanding the role of injury/illness sensitivity and anxiety sensitivity in (automatic) pain processing: an examination using the extrinsic affective simon task.

    PubMed

    Vancleef, Linda M G; Peters, Madelon L; Gilissen, Susan M P; De Jong, Peter J

    2007-07-01

    Three fundamental fears are assumed to underlie psychopathology: Anxiety Sensitivity (AS), Injury/illness sensitivity (IS), and Fear of Negative Evaluation (FNE). Both AS and IS may form risk factors for the development and exacerbation of chronic pain. The current research examines the relation between these fears and automatic threat appraisal for pain-related stimuli. Study 1 (n=48) additionally examined content-specific associations of AS and FNE with the automatic threat appraisal of, respectively, panic and social evaluative cues. Study 2 (n=60) additionally focused on the association of IS and AS with the engagement in health protecting behavior, and the use of health care services. Both studies found evidence for an automatic threat appraisal of aversive stimuli. Study 2 demonstrated a positive association between the automatic threat appraisal for pain-related stimuli and individuals' IS levels. IS was found to be the single best predictor of the tendency to engage in health protecting behavior, whereas AS was the single best predictor of the reported use of health care services. This study contributes to the field of knowledge on putative risk factors for chronic pain. Results demonstrate an automatic threat appraisal toward pain-related stimuli that is related to vulnerability traits for pain. This automatic threat appraisal might initiate relatively spontaneous (nonstrategic) pain-maintaining behavioral responses.

  5. The Impact of Threat Appeals on Fear Arousal and Driver Behavior: A Meta-Analysis of Experimental Research 1990–2011

    PubMed Central

    Carey, Rachel N.; McDermott, Daragh T.; Sarma, Kiran M.

    2013-01-01

    The existing empirical research exploring the impact of threat appeals on driver behavior has reported inconsistent findings. In an effort to provide an up-to-date synthesis of the experimental findings, meta-analytic techniques were employed to examine the impact of threat-based messages on fear arousal and on lab-based indices of driving behavior. Experimental studies (k = 13, N = 3044), conducted between 1990 and 2011, were included in the analyses. The aims of the current analysis were (a) to examine whether or not the experimental manipulations had a significant impact on evoked fear, (b) to examine the impact of threat appeals on three distinct indices of driving, and (c) to identify moderators and mediators of the relationship between fear and driving outcomes. Large effects emerged for the level of fear evoked, with experimental groups reporting increased fear arousal in comparison to control groups (r = .64, n = 619, p<.01). The effect of threat appeals on driving outcomes, however, was not significant (r = .03, p = .17). This analysis of the experimental literature indicates that threat appeals can lead to increased fear arousal, but do not appear to have the desired impact on driving behavior. We discuss these findings in the context of threat-based road safety campaigns and future directions for experimental research in this area. PMID:23690955

  6. The impact of threat appeals on fear arousal and driver behavior: a meta-analysis of experimental research 1990-2011.

    PubMed

    Carey, Rachel N; McDermott, Daragh T; Sarma, Kiran M

    2013-01-01

    The existing empirical research exploring the impact of threat appeals on driver behavior has reported inconsistent findings. In an effort to provide an up-to-date synthesis of the experimental findings, meta-analytic techniques were employed to examine the impact of threat-based messages on fear arousal and on lab-based indices of driving behavior. Experimental studies (k = 13, N = 3044), conducted between 1990 and 2011, were included in the analyses. The aims of the current analysis were (a) to examine whether or not the experimental manipulations had a significant impact on evoked fear, (b) to examine the impact of threat appeals on three distinct indices of driving, and (c) to identify moderators and mediators of the relationship between fear and driving outcomes. Large effects emerged for the level of fear evoked, with experimental groups reporting increased fear arousal in comparison to control groups (r = .64, n = 619, p<.01). The effect of threat appeals on driving outcomes, however, was not significant (r = .03, p = .17). This analysis of the experimental literature indicates that threat appeals can lead to increased fear arousal, but do not appear to have the desired impact on driving behavior. We discuss these findings in the context of threat-based road safety campaigns and future directions for experimental research in this area.

  7. A Global Evaluation of Coral Reef Management Performance: Are MPAs Producing Conservation and Socio-Economic Improvements?

    NASA Astrophysics Data System (ADS)

    Hargreaves-Allen, Venetia; Mourato, Susana; Milner-Gulland, Eleanor Jane

    2011-04-01

    There is a consensus that Marine Protected Area (MPA) performance needs regular evaluation against clear criteria, incorporating counterfactual comparisons of ecological and socio-economic performance. However, these evaluations are scarce at the global level. We compiled self-reports from managers and researchers of 78 coral reef-based MPAs world-wide, on the conservation and welfare improvements that their MPAs provide. We developed a suite of performance measures including fulfilment of design and management criteria, achievement of aims, the cessation of banned or destructive activities, change in threats, and measurable ecological and socio-economic changes in outcomes, which we evaluated with respect to the MPA's age, geographical location and main aims. The sample was found to be broadly representative of MPAs generally, and suggests that many MPAs do not achieve certain fundamental aims including improvements in coral cover over time (in 25% of MPAs), and conflict reduction (in 25%). However, the large majority demonstrated improvements in terms of slowing coral loss, reducing destructive uses and increasing tourism and local employment, despite many being small, underfunded and facing multiple large scale threats beyond the control of managers. However spatial comparisons suggest that in some regions MPAs are simply mirroring outside changes, with demonstrates the importance of testing for additionality. MPA benefits do not appear to increase linearly over time. In combination with other management efforts and regulations, especially those relating to large scale threat reduction and targeted fisheries and conflict resolution instruments, MPAs are an important tool to achieve coral reef conservation globally. Given greater resources and changes which incorporate best available science, such as larger MPAs and no-take areas, networks and reduced user pressure, it is likely that performance could further be enhanced. Performance evaluation should test for the generation of additional ecological and socio-economic improvements over time and compared to unmanaged areas as part of an adaptive management regime.

  8. Conservation Status and Threat Assessments for North American Crop Wild Relatives

    USDA-ARS?s Scientific Manuscript database

    Conservation status and threat assessments evaluate species’ relative risks of extinction globally, regionally, nationally, or locally, and estimate the degree to which populations of species are already safeguarded in existing conservation systems, with the aim of exposing the critical gaps in curr...

  9. Camera formation and more, but what comes next? an analysis of volcanic threat of Nisyros island, Greece

    NASA Astrophysics Data System (ADS)

    Winson, A.; Kinvig, H.; Gottsmann, J.; Partington, E.; Geyer, A.

    2008-10-01

    We present an analysis of volcanic threat of Nisyros island (Greece) based on a catalogue of questions compiled for the USGS National Volcano Early Warning System (NVEWS). We find that the score puts Nisyros in the league of volcanoes posing a very high threat. US volcanoes with a comparable threat level include Mt. St. Helens, Augustine and the Long Valley caldera.

  10. Maintaining Space Superiority

    DTIC Science & Technology

    2014-02-01

    object that may present a threat to his or h er satellites must still provide direction that responds to that threat This article discusses a dilemma...space-based threats .ŕ The Air Force achieves space superiority by conducting operations that support the war fighter (space force enhancement); by...the space era, threats and issues have arisen to chal- lenge US operations in these areas. Indeed, as declared in the National Security Space Strategy

  11. Evaluating and ranking the vulnerability of global marine ecosystems to anthropogenic threats.

    PubMed

    Halpern, Benjamin S; Selkoe, Kimberly A; Micheli, Fiorenza; Kappel, Carrie V

    2007-10-01

    Marine ecosystems are threatened by a suite of anthropogenic stressors. Mitigating multiple threats is a daunting task, particularly when funding constraints limit the number of threats that can be addressed. Threats are typically assessed and prioritized via expert opinion workshops that often leave no record of the rationale for decisions, making it difficult to update recommendations with new information. We devised a transparent, repeatable, and modifiable method for collecting expert opinion that describes and documents how threats affect marine ecosystems. Experts were asked to assess the functional impact, scale, and frequency of a threat to an ecosystem; the resistance and recovery time of an ecosystem to a threat; and the certainty of these estimates. To quantify impacts of 38 distinct anthropogenic threats on 23 marine ecosystems, we surveyed 135 experts from 19 different countries. Survey results showed that all ecosystems are threatened by at least nine threats and that nine ecosystems are threatened by >90% of existing threats. The greatest threats (highest impact scores) were increasing sea temperature, demersal destructive fishing, and point-source organic pollution. Rocky reef, coral reef, hard-shelf, mangrove, and offshore epipelagic ecosystems were identified as the most threatened. These general results, however, may be partly influenced by the specific expertise and geography of respondents, and should be interpreted with caution. This approach to threat analysis can identify the greatest threats (globally or locally), most widespread threats, most (or least) sensitive ecosystems, most (or least) threatened ecosystems, and other metrics of conservation value. Additionally, it can be easily modified, updated as new data become available, and scaled to local or regional settings, which would facilitate informed and transparent conservation priority setting.

  12. Neural Bases of Social Anxiety Disorder: Emotional Reactivity and Cognitive Regulation During Social and Physical Threat

    PubMed Central

    Goldin, Philippe R.; Manber, Tali; Hakimi, Shabnam; Canli, Turhan; Gross, James J.

    2014-01-01

    Context Social anxiety disorder is thought to involve emotional hyper-reactivity, cognitive distortions, and ineffective emotion regulation. While the neural bases of emotional reactivity to social stimuli have been described, the neural bases of emotional reactivity and cognitive regulation during social and physical threat, and their relationship to social anxiety symptom severity, have yet to be investigated. Objective This study investigated behavioral and neural correlates of emotional reactivity and cognitive regulation in patients and controls during processing of social and physical threat stimuli. Design Participants were trained to implement cognitive-linguistic regulation of emotional reactivity induced by social (harsh facial expressions) and physical (violent scenes) threat while undergoing functional magnetic resonance imaging and providing behavioral ratings of negative emotion experience. Setting Academic psychology department. Participants 15 adults with social anxiety disorder and 17 demographically-matched healthy controls. Main Outcome Measures Blood oxygen level dependent signal and negative emotion ratings. Results Behaviorally, patients reported greater negative emotion than controls during social and physical threat, but showed equivalent reduction in negative emotion following cognitive regulation. Neurally, viewing social threat resulted in greater emotion-related neural responses in patients than controls, with social anxiety symptom severity related to activity in a network of emotion and attention processing regions in patients only. Viewing physical threat produced no between-group differences. Regulation during social threat resulted in greater cognitive and attention regulation-related brain activation in controls compared to patients. Regulation during physical threat produced greater cognitive control-related response (i.e., right DLPFC) in patients compared to controls. Conclusions Compared to controls, patients demonstrated exaggerated negative emotion reactivity and reduced cognitive regulation related neural activation, specifically for social threat stimuli. These findings help to elucidate potential neural mechanisms of emotion regulation that might serve as biomarkers for interventions for social anxiety disorder. PMID:19188539

  13. Nowhere to Hide: The Growing Threat to Air Bases

    DTIC Science & Technology

    2013-06-01

    May–June 2013 Air & Space Power Journal | 30 Feature Nowhere to Hide The Growing Threat to Air Bases Col Shannon W. Caudill, USAF Maj Benjamin R...May–June 2013 Air & Space Power Journal | 33 Caudill & Jacobson Nowhere to Hide Feature The Growing Precision of Indirect Fire IDF has become the...personnel.22 More troubling still is the growing threat from within the ranks of American personnel. On 11 May 2009, five American military mem- bers

  14. Threats to desert tortoise populations: a critical review of the literature

    USGS Publications Warehouse

    Boarman, William I.

    2002-01-01

    Decision in resource management are generally based on a combination of sociopolitical, economic, and environmental factors, and may be biased by personal values. These three components often contradict each other resulting in controversy. Controversies can usually be reduced when solid scientific evidence is used to support or refute a decision. However, it is important to recognize that data often do little to alter antagonists' positions when differences in values are the bases if the dispute. But, supporting data can make the decision more defensible, both legally and ethically, especially if the data supporting all opposing viewpoints are included in the decision-making process. Resource management decisions must be made using the best scientific information currently available. However, scientific data vary in two important measures of quality: reliability and validity. The reliability of the data is a measure of the degree to which the observations or conclusion can be repeated. Validity of the data is a measure of the degree to which the observation or conclusion reflects what actually occurs in nature. How the data are collected strongly affects the reliability of validity of ecological conclusions that can be made. Research data potentially relevant to management come from different sources, and the source often provides clues to the reliability and, to a certain extent, validity of data. Understanding the quality of data being used to make management decisions helps to separate the philosophical or value-based aspects of arguments from the objective ones, thus helping to clarify the decisions and judgments that need to be made. The West Mojave Plan is a multispecies, bioregional plan for the management of natural resources within a 9.4 million-acre area of the Mojave Desert in California. The plan addresses the legal requirements for the recovery of the desert tortoise (Gopherus agazzizii), a threatened species, but also covers an additional approximately 80 species of plants and animals assigned special status by the Bureau of Land Management, U. S. Fish and Wildlife Service, and California Department of Fish and Game. Within the planning area, 28 separate jurisdictions (counties, cities, towns, military installations, etc.) seek programmatic prescriptions that will facilitate streamlined environmental review, result in expedited authorization for development projects, and protect listed and unlisted species into the foreseeable future to avoid or minimize conflicts between proposed development and species' conservation and recovery. All of the scientific data available concerning the biology and management of these approximately 80 species and their habitats must be evaluated to develop a scientifically credible plan. This document provides an overview and evaluation of the knowledge of the major threats to the persistence and recovery of desert tortoise populations. I was specifically asked to evaluate the scientific veracity of the data and reports available. I summarize the data presently available with particular focus on the West Mojave Desert, evaluate the scientific integrity of the data. and identify major gaps in the available knowledge. I do not attempt to provide in-depth details on each study or threat; for more details I encourage the reader to consult the individual papers or reports city throughout this report (many of which are available at most university libraries and at the West Mojave Plan office in Riverside, California). I also do not attempt to characterize or evaluate the past or present management actions, except where they have direct bearing on evaluation of threats, nor do I attempt, for the most part, to acquire, generate, or evaluate new or existing, but uninterpreted data.

  15. Design and Engineering of a Multi-Target (Multiplex) DNA Simulant to Evaluate Nulceic Acid Based Assays for Detection of Biological Threat Agents

    DTIC Science & Technology

    2006-11-01

    mallei , Burkholderia pseudomallei and Variola virus (smallpox virus). A chimera of 2040 bp was engineered to produce PCR amplicons of different sizes...potential bio-warfare use have been completely sequenced, B. mallei , the etiologic agent of glanders , and B. pseudomallei, causative agent of... Burkholderia mallei Nierman et al, 2004 Burkholderia pseudomallei Holden et al, 2004 Burkholderia thailandensis

  16. Adolescents expressing school massacre threats online: something to be extremely worried about?

    PubMed Central

    2012-01-01

    Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic. PMID:23241433

  17. Attention Training and the Threat Bias: An ERP Study

    PubMed Central

    O’Toole, Laura; Dennis, Tracy A.

    2011-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these changes remain unclear. To address this issue, 49 non-anxious adults were randomly assigned to either attentional training toward or training away from threat using a modified version of the dot probe task. Behavioral measures of attentional biases were also generated pre- and post-training using the dot probe task. Event-related potentials (ERPs) were generated to threat and non-threat face pairs and probes during pre- and post-training assessments. Effects of training on behavioral measures of the threat bias were significant, but only for those participants showing pre-training biases. Attention training also influenced early spatial attention, as measured by post-training P1 amplitudes to cues. Results illustrate the importance of taking pre-training attention biases in non-anxious individuals into account when evaluating the effects of attention training and tracking physiological changes in attention following training. PMID:22083026

  18. Missile airframe simulation testbed: MANPADS (MAST-M) for test and evaluation of aircraft survivability equipment

    NASA Astrophysics Data System (ADS)

    Clements, Jim; Robinson, Richard; Bunt, Leslie; Robinson, Joe

    2011-06-01

    A number of techniques have been utilized to evaluate the performance of Aircraft Survivability Equipment (ASE) against threat Man-Portable Air Defense Systems (MANPADS). These techniques include flying actual threat MANPADS against stationary ASE with simulated aircraft signatures, testing installed ASE systems against simulated threat signatures, and laboratory hardware-in-the-loop (HWIL) testing with simulated aircraft and simulated missile signatures. All of these tests lack the realism of evaluating installed ASE against in-flight MANPADS on a terminal homing intercept path toward the actual ASE equipped aircraft. This limitation is due primarily to the current inability to perform non-destructive MANPADS/Aircraft flight testing. The U.S. Army Aviation and Missile Research and Development and Engineering Center (AMRDEC) is working to overcome this limitation with the development of a recoverable surrogate MANPADS missile system capable of engaging aircraft equipped with ASE while guaranteeing collision avoidance with the test aircraft. Under its Missile Airframe Simulation Testbed - MANPADS (MAST-M) program, the AMRDEC is developing a surrogate missile system which will utilize actual threat MANPADS seeker/guidance sections to control the flight of a surrogate missile which will perform a collision avoidance and recovery maneuver prior to intercept to insure non-destructive test and evaluation of the ASE and reuse of the MANPADS seeker/guidance section. The remainder of this paper provides an overview of this development program and intended use.

  19. EVALUATION OF SENSOR AND MONITORS TO DETECT CHANGES IN WATER QUALITY

    EPA Science Inventory

    The safety and security of distribution systems has come under reassessment in the past year. Several chemical and biological agents have been identified that might constitute a credible threat against water supply systems. There have also been a few reported threats against wate...

  20. Evaluation of an Inexpensive Field Test for Ruling Out the Presence of Biological Threat Agents in Suspicious Powders

    DTIC Science & Technology

    2006-02-01

    4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply... responders frequently are faced with suspicious white powders, which are suspected to be biological threats such as anthrax; therefore, a need exists for an... responders for use in the differentiation of a true threat from a hoax. 15. SUBJECT TERMS Suspicious white powders Anthrax Pre-screening 16. SECURITY

  1. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  2. Griffin 2.0 - Development and Evaluation of an Occupant Protection Platform with Active-Blast Mitigation and Crew Floor Isolation

    DTIC Science & Technology

    2016-11-15

    and they include 1) threat size, 2) threat burial depth, 3) soil composition, 4) vehicle standoff, 5) hull geometry, and 6) vehicle mass. However...crucial in engaging as much of the mass as possible. Another feature of the Griffin architecture is the continuous monocoque hull design that...underbody threats up to 200% MRAP Objective (Pratt & Miller Engineering, 2015). Next a low-deformation hull needs to be utilized that will

  3. Reactions to a health threat: dispositional threat orientations and message characteristics.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Gonzalez, Amelia; Denison, Elizabeth

    2011-05-01

    This study explored the interactive effects of dispositional threat orientation, type of message, and having children on reactions to a message about exposure to bisphenol A (BPA) in plastics. The study used a 2 (message: Fear Arousal or Plain)×2 (parenting status: child or no child)×2 (threat orientation: high or low) mixed factorial design. Adults (N= 200) recruited via the Internet completed measures of threat orientations, reported whether they were a parent, and read either a low or high fear-arousal message about the risks of BPA exposure. They then completed measures of reactions to the message (perceived susceptibility to BPA effects, negative emotions, and behavioural intentions to engage in protection). Depending on threat orientations, the fear arousal version of the message and parenthood had strikingly different effects, ranging from no effect (for those high in a control-based approach) to prompting change (for those low in a control-based approach) to counterproductive (for those high in an optimistic denial approach). These findings suggest that considering individual differences and their interactions with situational factors could improve both the predictive ability of threat protection theories and the delivery of messages intended to change behaviour. ©2010 The British Psychological Society.

  4. The Cybercitizen Dimension: A Quantitative Study Using a Threat Avoidance Perspective

    ERIC Educational Resources Information Center

    Manzano, Debbie L.

    2012-01-01

    The importance of information security is understated and theory-based empirical research that explains computer users voluntary IT threat avoidance behavior is lacking. Most existing information security research on individual behaviors has been focused in organizational settings where the threat avoidance behavior is mandatory and dictated by…

  5. The Ingenuity Imperative

    ERIC Educational Resources Information Center

    Hansen, John W.

    2005-01-01

    The author discusses three threats to the American way of life: the first threat is related to human and technological growth; the second is a new division of labor; and the third threat is security and safety. The author suggests two solutions to address these challenges: (1) better technological planning and decisions based on technological…

  6. Interfacing a biosurveillance portal and an international network of institutional analysts to detect biological threats.

    PubMed

    Riccardo, Flavia; Shigematsu, Mika; Chow, Catherine; McKnight, C Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray

    2014-01-01

    The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an international network and, more specifically, how it was further developed in the EAR project.

  7. Interfacing a Biosurveillance Portal and an International Network of Institutional Analysts to Detect Biological Threats

    PubMed Central

    Shigematsu, Mika; Chow, Catherine; McKnight, C. Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray

    2014-01-01

    The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an international network and, more specifically, how it was further developed in the EAR project. PMID:25470464

  8. Violent Extremism, Community-Based Violence Prevention, and Mental Health Professionals.

    PubMed

    Weine, Stevan M; Stone, Andrew; Saeed, Aliya; Shanfield, Stephen; Beahrs, John; Gutman, Alisa; Mihajlovic, Aida

    2017-01-01

    New community-based initiatives being developed to address violent extremism in the United States are utilizing mental health services and leadership. This article reviews current approaches to preventing violent extremism, the contribution that mental illness and psychosocial problems can make to violent extremism, and the rationale for integrating mental health strategies into preventing violent extremism. The authors describe a community-based targeted violence prevention model and the potential roles of mental health professionals. This model consists of a multidisciplinary team that assesses at-risk individuals with comprehensive threat and behavioral evaluations, arranges for ongoing support and treatment, conducts follow-up evaluations, and offers outreach, education, and resources for communities. This model would enable mental health professionals in local communities to play key roles in preventing violent extremism through their practice and leadership.

  9. DoD Force & Infrastructure Categories: A FYDP-Based Conceptual Model of Department of Defense Programs and Resources

    DTIC Science & Technology

    2002-09-01

    Support 0605160D Counterproliferation Support (H) 0901502A Service Support to DTSA 0901502F Service Support to DTSA 0901502N Service Support to DTSA ...Base Operations Support 0901502A Service Support to DTSA (1F2C) Int’l Engagement & Threat Reduction 0901502F Service Support to DTSA (1F2C...Int’l Engagement & Threat Reduction 0901502N Service Support to DTSA (1F2C) Int’l Engagement & Threat Reduction 0901503A Service Support to OSD

  10. On the experience of feeling powerful: perceived power moderates the effect of stereotype threat on women's math performance.

    PubMed

    Van Loo, Katie J; Rydell, Robert J

    2013-03-01

    This research examined whether feeling powerful can eliminate the deleterious effect of stereotype threat (i.e., concerns about confirming a negative self-relevant stereotype) on women's math performance. In Experiments 1 and 2, priming women with high power buffered them from reduced math performance in response to stereotype threat instructions, whereas women in the low and control power conditions showed poorer math performance in response to threat. Experiment 3 found that working memory capacity is one mechanism through which power moderates the effect of threat on women's math performance. In the low and control power conditions, women showed reduced working memory capacity in response to stereotype threat, accounting for threat's effect on performance. In contrast, women in the high power condition did not show reductions in working memory capacity or math performance in response to threat. This work demonstrates that perceived power moderates stereotype threat-based performance effects and explains why this occurs.

  11. Assessment of pilot workload with the introduction of an airborne threat-alert system

    NASA Technical Reports Server (NTRS)

    Battiste, Vernol; Bortolussi, Michael R.

    1989-01-01

    Simulated line operations were used to assess the value of the TCAS on the pilot's ability to avoid a collision and to determine the effects of various display configurations and information contents on the flight-crew performance and workload. The crew flew a Phase II Link/Boeing 727 simulator in a simulated ATC environment. Four levels of collision avoidance information were evaluated using the following TCAS display formats: no TCAS information, TCAS information with no traffic display information, TCAS information with threat-activated traffic display information, and TCAS information with a full-time traffic display of threat information. It was found that the use of a threat-activated TCAS display significantly reduced the first officers' workload was significantly reduced by the threat-activated TCAS display, as were the workloads of the captain and the second officer.

  12. Salivary cortisol and behavioral response to social evaluative threat in adolescents with autism spectrum disorder.

    PubMed

    Edmiston, E Kale; Blain, Scott D; Corbett, Blythe A

    2017-02-01

    Autism Spectrum Disorder (ASD) is a neurodevelopmental disorder characterized by deficits in social behavior. One possible explanation for social communication deficits in ASD could be differences in biological systems that support responses to environmental stimuli. If so, it is unclear if differences in the arousal response to social stimuli in ASD are due to reduced interest in social information, or to an increased stress response. The hypothalamic pituitary adrenal axis facilitates arousal and the stress response to sensory input, including social stimuli. Previous research shows blunted cortisol response to social evaluative threat in children with ASD. The majority of prior work has focused on children with ASD, but adolescents with ASD are understudied. The adolescent period is of interest, as this developmental epoch is associated with increased salience of social evaluative threat in typically developing (TD) populations. In this study, we employed the Trier Social Stress Test (TSST), a laboratory paradigm that involves exposure to social evaluative threat, to study the cortisol and behavioral response to social evaluative threat in ASD and TD adolescents. Salivary cortisol data were collected at six time points before and after the TSST. Behavioral data were collected using video recordings of the TSST, which were then operationalized and coded. Paired sample t-tests were used to calculate within-group cortisol response to the TSST. Cortisol significantly increased in response to the TSST in the TD group but not the ASD group. The TD group showed a trend for more self-soothing behaviors during the stressor than the ASD group. The lack of a cortisol response to the TSST in the ASD group suggests that the TSST is not interpreted as stressful or salient for ASD adolescents. Autism Res 2017, 10: 346-358. © 2016 International Society for Autism Research, Wiley Periodicals, Inc. © 2016 International Society for Autism Research, Wiley Periodicals, Inc.

  13. Reducing Threats to Validity by Design in a Nonrandomized Experiment of a School-Wide Prevention Model

    ERIC Educational Resources Information Center

    Sørlie, Mari-Anne; Ogden, Terje

    2014-01-01

    This paper reviews literature on the rationale, challenges, and recommendations for choosing a nonequivalent comparison (NEC) group design when evaluating intervention effects. After reviewing frequently addressed threats to validity, the paper describes recommendations for strengthening the research design and how the recommendations were…

  14. Evaluating the Effectiveness of School Instrumental Programs.

    ERIC Educational Resources Information Center

    Holtz, Glenn

    2001-01-01

    Describes the analysis of "Strengths and Weaknesses and Opportunities and Threats" (SWOT). Discusses the study, "Gemeinhardt 4," that used the SWOT analysis to determine 13 different types of music programs. Addresses how music teachers can utilize this information. Includes other sections such as, "Possible Solution to Music Program Threats."…

  15. Development of a Standard Test Scenario to Evaluate the Effectiveness of Portable Fire Extinguishers on Lithium-ion Battery Fires

    NASA Technical Reports Server (NTRS)

    Juarez, Alfredo; Harper, Susan A.; Hirsch, David B.; Carriere, Thierry

    2013-01-01

    Many sources of fuel are present aboard current spacecraft, with one especially hazardous source of stored energy: lithium ion batteries. Lithium ion batteries are a very hazardous form of fuel due to their self-sustaining combustion once ignited, for example, by an external heat source. Batteries can become extremely energetic fire sources due to their high density electrochemical energy content that may, under duress, be violently converted to thermal energy and fire in the form of a thermal runaway. Currently, lithium ion batteries are the preferred types of batteries aboard international spacecraft and therefore are routinely installed, collectively forming a potentially devastating fire threat to a spacecraft and its crew. Currently NASA is developing a fine water mist portable fire extinguisher for future use on international spacecraft. As its development ensues, a need for the standard evaluation of various types of fire extinguishers against this potential threat is required to provide an unbiased means of comparing between fire extinguisher technologies and ranking them based on performance.

  16. Photoacoustic spectroscopy for trace vapor detection and standoff detection of explosives

    NASA Astrophysics Data System (ADS)

    Holthoff, Ellen L.; Marcus, Logan S.; Pellegrino, Paul M.

    2016-05-01

    The Army is investigating several spectroscopic techniques (e.g., infrared spectroscopy) that could allow for an adaptable sensor platform. Current sensor technologies, although reasonably sized, are geared to more classical chemical threats, and the ability to expand their capabilities to a broader range of emerging threats is uncertain. Recently, photoacoustic spectroscopy (PAS), employed in a sensor format, has shown enormous potential to address these ever-changing threats. PAS is one of the more flexible IR spectroscopy variants, and that flexibility allows for the construction of sensors that are designed for specific tasks. PAS is well suited for trace detection of gaseous and condensed media. Recent research has employed quantum cascade lasers (QCLs) in combination with MEMS-scale photoacoustic cell designs. The continuous tuning capability of QCLs over a broad wavelength range in the mid-infrared spectral region greatly expands the number of compounds that can be identified. We will discuss our continuing evaluation of QCL technology as it matures in relation to our ultimate goal of a universal compact chemical sensor platform. Finally, expanding on our previously reported photoacoustic detection of condensed phase samples, we are investigating standoff photoacoustic chemical detection of these materials. We will discuss the evaluation of a PAS sensor that has been designed around increasing operator safety during detection and identification of explosive materials by performing sensing operations at a standoff distance. We investigate a standoff variant of PAS based upon an interferometric sensor by examining the characteristic absorption spectra of explosive hazards collected at 1 m.

  17. The Practice of Campus-Based Threat Assessment: An Overview

    ERIC Educational Resources Information Center

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  18. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    PubMed

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  19. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. PMID:23736227

  20. Research on the method of information system risk state estimation based on clustering particle filter

    NASA Astrophysics Data System (ADS)

    Cui, Jia; Hong, Bei; Jiang, Xuepeng; Chen, Qinghua

    2017-05-01

    With the purpose of reinforcing correlation analysis of risk assessment threat factors, a dynamic assessment method of safety risks based on particle filtering is proposed, which takes threat analysis as the core. Based on the risk assessment standards, the method selects threat indicates, applies a particle filtering algorithm to calculate influencing weight of threat indications, and confirms information system risk levels by combining with state estimation theory. In order to improve the calculating efficiency of the particle filtering algorithm, the k-means cluster algorithm is introduced to the particle filtering algorithm. By clustering all particles, the author regards centroid as the representative to operate, so as to reduce calculated amount. The empirical experience indicates that the method can embody the relation of mutual dependence and influence in risk elements reasonably. Under the circumstance of limited information, it provides the scientific basis on fabricating a risk management control strategy.

  1. Evaluating a fear appeal message to reduce alcohol use among "Greeks".

    PubMed

    Moscato, S; Black, D R; Blue, C L; Mattson, M; Galer-Unti, R A; Coster, D C

    2001-01-01

    To evaluate the impact of a fear appeal message on college students' drinking behavior using the extended parallel process model. A survey was administered to a random sample of undergraduates (n=224) in 38 national fraternal organizations. Both perceived efficacy and perceived threat were significantly correlated with drinking behavior. There was a significant difference both in drinking behavior and attendance at alcohol-free events between those who heard and those who did not hear the message. Theoretically based fear appeal messages may be a useful way to promote responsible drinking among college students.

  2. Department of the Navy Supporting Data for Fiscal Year 1983 Budget Estimates Descriptive Summaries Submitted to Congress February 1982. Research, Development, Test & Evaluation, Navy. Book 1 of 3. Technology Base, Advanced Technology Development, Strategic Programs.

    DTIC Science & Technology

    1982-02-01

    optimization methods have been developed for problems in production and distribution modeling including design and evaluation of storage alternatives under...and winds using high frequency , X-band doppler, pulse -limited, and Delta-K radars. Development of millimeter-wave radiometric imaging systems and...generic system design concept for a system capable of defending the Fleet from the high angle threat 1.4 The first model of the drive system for a

  3. The new social marketing challenge to promote radon testing.

    PubMed

    DiPofi, J A; LaTour, M S; Henthorne, T L

    2001-01-01

    As part of a project funded by the Environmental Protection Agency, exploratory qualitative analysis was conducted to gain insight into perceptions of the threat of radon in the Karst geological region (i.e., Northern Alabama, Central Tennessee, Central Kentucky). Based on health practitioner input, it was clear that the tenets of Protection Motivation Theory (PMT) and the probing afforded by focus group research would provide greatly needed theory-based insight into the public reactions (or lack thereof) to the threat posed by radon. Qualitative research findings of this project are discussed as well as preliminary recommendations are provided to advance the protection motivation theory research agenda for promoting awareness of the threat of radon and to influence appropriate response to that threat.

  4. Threat driven modeling framework using petri nets for e-learning system.

    PubMed

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  5. Reactivity to uncertain threat as a familial vulnerability factor for alcohol use disorder.

    PubMed

    Gorka, S M; Hee, D; Lieberman, L; Mittal, V A; Phan, K L; Shankman, S A

    2016-12-01

    When sober, problematic drinkers display exaggerated reactivity to threats that are uncertain (U-threat). Since this aversive affective state can be alleviated via acute alcohol intoxication, it has been posited that individuals who exhibit heightened reactivity to U-threat at baseline are motivated to use alcohol as a means of avoidance-based coping, setting the stage for excessive drinking. To date, however, no study has attempted to characterize the dispositional nature of exaggerated reactivity to U-threat and test whether it is a vulnerability factor or exclusively a disease marker of problematic alcohol use. The current investigation utilized a family study design to address these gaps by examining whether (1) reactivity to U-threat is associated with risk for problematic alcohol use, defined by family history of alcohol use disorder (AUD) and (2) reactivity to U-threat is correlated amongst adult biological siblings. A total of 157 families, and 458 individuals, participated in the study and two biological siblings completed a threat-of-shock task designed to probe reactivity to U-threat and predictable threat (P-threat). Startle potentiation was collected as an index of aversive responding. Within biological siblings, startle potentiation to U-threat [intraclass correlation (ICC) = 0.35] and P-threat (ICC = 0.63) was significantly correlated. In addition, independent of an individuals' own AUD status, startle potentiation to U-threat, but not P-threat, was positively associated with risk for AUD (i.e. AUD family history). This suggests that heightened reactivity to U-threat may be a familial vulnerability factor for problematic drinking and a novel prevention target for AUD.

  6. The anatomy of a (potential) disaster: Volcanoes, behavior, and population viability of the short-tailed albatross (Phoebastria albatrus)

    USGS Publications Warehouse

    Finkelstein, M.E.; Wolf, S.; Goldman, M.; Doak, D.F.; Sievert, P.R.; Balogh, G.; Hasegawa, H.

    2010-01-01

    Catastrophic events, either from natural (e.g., hurricane) or human-induced (e.g., forest clear-cut) processes, are a well-known threat to wild populations. However, our lack of knowledge about population-level effects of catastrophic events has inhibited the careful examination of how catastrophes affect population growth and persistence. For the critically endangered short-tailed albatross (Phoebastria albatrus), episodic volcanic eruptions are considered a serious catastrophic threat since approximately 80% of the global population of ???2500 birds (in 2006) currently breeds on an active volcano, Torishima Island. We evaluated how short-tailed albatross population persistence is affected by the catastrophic threat of a volcanic eruption relative to chronic threats. We also provide an example for overcoming the seemingly overwhelming problems created by modelling the population dynamics of a species with limited demographic data by incorporating uncertainty in our analysis. As such, we constructed a stochastic age-based matrix model that incorporated both catastrophic mortality due to volcanic eruptions and chronic mortality from several potential sources (e.g., contaminant exposure, fisheries bycatch) to determine the relative effects of these two types of threats on short-tailed albatross population growth and persistence. Modest increases (1%) in chronic (annual) mortality had a 2.5-fold greater effect on predicted short-tailed albatross stochastic population growth rate (lambda) than did the occurrence of periodic volcanic eruptions that follow historic eruption frequencies (annual probability of eruption 2.2%). Our work demonstrates that periodic catastrophic volcanic eruptions, despite their dramatic nature, are less likely to affect the population viability and recovery of short-tailed albatross than low-level chronic mortality. ?? 2009 Elsevier Ltd.

  7. Decisions to shoot in a weapon identification task: The influence of cultural stereotypes and perceived threat on false positive errors.

    PubMed

    Fleming, Kevin K; Bandy, Carole L; Kimble, Matthew O

    2010-01-01

    The decision to shoot a gun engages executive control processes that can be biased by cultural stereotypes and perceived threat. The neural locus of the decision to shoot is likely to be found in the anterior cingulate cortex (ACC), where cognition and affect converge. Male military cadets at Norwich University (N=37) performed a weapon identification task in which they made rapid decisions to shoot when images of guns appeared briefly on a computer screen. Reaction times, error rates, and electroencephalogram (EEG) activity were recorded. Cadets reacted more quickly and accurately when guns were primed by images of Middle-Eastern males wearing traditional clothing. However, cadets also made more false positive errors when tools were primed by these images. Error-related negativity (ERN) was measured for each response. Deeper ERNs were found in the medial-frontal cortex following false positive responses. Cadets who made fewer errors also produced deeper ERNs, indicating stronger executive control. Pupil size was used to measure autonomic arousal related to perceived threat. Images of Middle-Eastern males in traditional clothing produced larger pupil sizes. An image of Osama bin Laden induced the largest pupil size, as would be predicted for the exemplar of Middle East terrorism. Cadets who showed greater increases in pupil size also made more false positive errors. Regression analyses were performed to evaluate predictions based on current models of perceived threat, stereotype activation, and cognitive control. Measures of pupil size (perceived threat) and ERN (cognitive control) explained significant proportions of the variance in false positive errors to Middle-Eastern males in traditional clothing, while measures of reaction time, signal detection response bias, and stimulus discriminability explained most of the remaining variance.

  8. Decisions to Shoot in a Weapon Identification Task: The Influence of Cultural Stereotypes and Perceived Threat on False Positive Errors

    PubMed Central

    Fleming, Kevin K.; Bandy, Carole L.; Kimble, Matthew O.

    2014-01-01

    The decision to shoot engages executive control processes that can be biased by cultural stereotypes and perceived threat. The neural locus of the decision to shoot is likely to be found in the anterior cingulate cortex (ACC) where cognition and affect converge. Male military cadets at Norwich University (N=37) performed a weapon identification task in which they made rapid decisions to shoot when images of guns appeared briefly on a computer screen. Reaction times, error rates, and EEG activity were recorded. Cadets reacted more quickly and accurately when guns were primed by images of middle-eastern males wearing traditional clothing. However, cadets also made more false positive errors when tools were primed by these images. Error-related negativity (ERN) was measured for each response. Deeper ERN’s were found in the medial-frontal cortex following false positive responses. Cadets who made fewer errors also produced deeper ERN’s, indicating stronger executive control. Pupil size was used to measure autonomic arousal related to perceived threat. Images of middle-eastern males in traditional clothing produced larger pupil sizes. An image of Osama bin Laden induced the largest pupil size, as would be predicted for the exemplar of Middle East terrorism. Cadets who showed greater increases in pupil size also made more false positive errors. Regression analyses were performed to evaluate predictions based on current models of perceived threat, stereotype activation, and cognitive control. Measures of pupil size (perceived threat) and ERN (cognitive control) explained significant proportions of the variance in false positive errors to middle-eastern males in traditional clothing, while measures of reaction time, signal detection response bias, and stimulus discriminability explained most of the remaining variance. PMID:19813139

  9. Defensive responses to threat scenarios in Brazilians reproduce the pattern of Hawaiian Americans and non-human mammals.

    PubMed

    Shuhama, R; Del-Ben, C M; Loureiro, S R; Graeff, F G

    2008-04-01

    A former study with scenarios conducted in Hawaii has suggested that humans share with non-human mammals the same basic defensive strategies - risk assessment, freezing, defensive threat, defensive attack, and flight. The selection of the most adaptive strategy is strongly influenced by features of the threat stimulus - magnitude, escapability, distance, ambiguity, and availability of a hiding place. Aiming at verifying if these strategies would be consistent in a different culture, 12 defensive scenarios were translated into Portuguese and adapted to the Brazilian culture. The sample consisted of male and female undergraduate students divided into two groups: 76 students, who evaluated the five dimensions of each scenario and 248 medical students, who chose the most likely response for each scenario. In agreement with the findings from studies of non-human mammal species, the scenarios were able to elicit different defensive behavioral responses, depending on features of the threat. "Flight" was chosen as the most likely response in scenarios evaluated as an unambiguous and intense threat, but with an available route of escape, whereas "attack" was chosen in an unambiguous, intense and close dangerous situation without an escape route. Less urgent behaviors, such as "check out", were chosen in scenarios evaluated as less intense, more distant and more ambiguous. Moreover, the results from the Brazilian sample were similar to the results obtained in the original study with Hawaiian students. These data suggest that a basic repertoire of defensive strategies is conserved along the mammalian evolution because they share similar functional benefits in maintaining fitness.

  10. Habitat preferences and conservation threats to Black-necked Cranes wintering in Bhutan.

    PubMed

    Namgay, Rinchen; Wangchuk, Sangay

    2016-01-01

    Black-necked Crane (Grus nigricollis) is a vulnerable Red list species whose populations are declining. However, little is known about Black-necked Cranes' habitat requirements or the causes of their population decline. We identified Black-necked Cranes' winter roost and foraging preferences of Black-necked Cranes in Bhutan during the winter of 2013-2014. Black-necked Cranes' roosts were recorded using Garmin GPSmap 60CSx, while foraging preferences and threats to the birds were identified based on a survey of household heads (n = 107) residing within a 3 km radius of roost sites. We grouped the threats identified by the communities into four major categories, viz. biological, social, political and natural threats based on the relevance. Of the four major threats, communities residing within the roosting and foraging habitat of the Black-necked Crane reported biological threat as major. Biological threats as reported by communities include loss of habitat, food shortage and competition from other animals. We recommend the present roosting areas be designated as part of the conservation areas for Black-necked Crane wintering in Bumthang district. In addition to preserving these areas, government should also encourage farming in foraging habitats of Black-necked Crane, because they mainly feed on barley, wheat, paddy, potatoes and buckwheat, besides roots, tubers and insects in the wetlands.

  11. Threat Related Selective Attention Predicts Treatment Success in Childhood Anxiety Disorders

    ERIC Educational Resources Information Center

    Legerstee, Jeroen S.; Tulen, Joke H. M.; Kallen, Victor L.; Dieleman, Gwen C.; Treffers, Philip D. A.; Verhulst, Frank C.; Utens, Elisabeth M. W. J.

    2009-01-01

    Threat-related selective attention was found to predict the success of the treatment of childhood anxiety disorders through administering a pictorial dot-probe task to 131 children with anxiety disorders prior to cognitive behavioral therapy. The diagnostic status of the subjects was evaluated with a semistructured clinical interview at both pre-…

  12. Crisis in the Philippines: A Threat to U.S. Interests.

    ERIC Educational Resources Information Center

    Gregor, A. James

    The special relationship between the United States and the Philippines is chronicled, and the potential threats to that relationship are exposed and evaluated. Special attention is paid to imposition of martial law by Marcos from 1972-1981. The human rights of the Filipino people during martial law, development programs implemented by Marcos…

  13. EPA RESPONSE PROTOCOL TOOLBOX TO HELP EVALUATION OF CONTAMINATION THREATS & RESPONDING TO THREATS: MODULE 1-WATER UTILITY PLANNING GUIDE

    EPA Science Inventory

    EPA's Office of Research and Development and Office of Water/Water Security Division have jointly developed a Response Protocol Toolbox (RPTB) to address the complex, multi-faceted challenges of a water utility's planning and response to intentional contamination of drinking wate...

  14. Evaluating the Unintended Consequences of Assessment Practices: Construct Irrelevance and Construct Underrepresentation

    ERIC Educational Resources Information Center

    Spurgeon, Shawn L.

    2017-01-01

    Construct irrelevance (CI) and construct underrepresentation (CU) are 2 major threats to validity, yet they are rarely discussed within the counseling literature. This article provides information about the relevance of these threats to internal validity. An illustrative case example will be provided to assist counselors in understanding these…

  15. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    PubMed

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  16. [A SWOT (strengths, weaknesses, opportunities, threats) analysis of the current immunization program in Zhejiang Province].

    PubMed

    He, Han-Qing; Ling, Luo-Ya; Xu, Xu-Qing

    2009-02-01

    To know the status of Immunization program in Zhejiang Province. The investigation on immunization program in zhejiang province was conducted, and the SWOT analysis was corducted to make a comprehensive evaluation. 11 cities, 22 counties and 44 towns were investigated in this study, and the current immunization program in Zhejiang province were explored by SWOT analysis. The SWOT Matrix, includes SO (strength-opportunity), ST (strength-threat), WO (weakness-opportunity) and WT (weakness-threat) can apply to make optimal strategy for the development of expanded program on immunization.

  17. Security in Logistics

    NASA Astrophysics Data System (ADS)

    Cempírek, Václav; Nachtigall, Petr; Široký, Jaromír

    2016-12-01

    This paper deals with security of logistic chains according to incorrect declaration of transported goods, fraudulent transport and forwarding companies and possible threats caused by political influences. The main goal of this paper is to highlight possible logistic costs increase due to these fraudulent threats. An analysis of technological processes will beis provided, and an increase of these transport times considering the possible threatswhich will beis evaluated economic costs-wise. In the conclusion, possible threat of companies'` efficiency in logistics due to the costs`, means of transport and increase in human resources` increase will beare pointed out.

  18. A simple, sufficient, and consistent method to score the status of threats and demography of imperiled species

    PubMed Central

    Webber, Whitney M.; Li, Ya-Wei

    2016-01-01

    Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species’ demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key’s utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand overall patterns of ESA implementation. The scoring repeatability analysis shows promise, but indicates thorough training will be needed to ensure consistency. We propose that large conservation programs adopt our simple scoring system for threats and demography. By doing so, program administrators will have better information to monitor program effectiveness and guide their decisions. PMID:27478713

  19. A simple, sufficient, and consistent method to score the status of threats and demography of imperiled species.

    PubMed

    Malcom, Jacob W; Webber, Whitney M; Li, Ya-Wei

    2016-01-01

    Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species' demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key's utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand overall patterns of ESA implementation. The scoring repeatability analysis shows promise, but indicates thorough training will be needed to ensure consistency. We propose that large conservation programs adopt our simple scoring system for threats and demography. By doing so, program administrators will have better information to monitor program effectiveness and guide their decisions.

  20. Adolescents and the threat of nuclear war: the evolution of a perspective.

    PubMed Central

    Beardslee, W. R.; Mack, J. E.

    1983-01-01

    The authors briefly review recent work in the area of the impact of the threat of nuclear war on children and adolescents. They explore some of the difficulties inherent in understanding the possible effects of the threat of nuclear war on children based on their research experience in the area. PMID:6636837

  1. Technosocial Modeling of IED Threat Scenarios and Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less

  2. Detection of dim targets in multiple environments

    NASA Astrophysics Data System (ADS)

    Mirsky, Grace M.; Woods, Matthew; Grasso, Robert J.

    2013-10-01

    The proliferation of a wide variety of weapons including Anti-Aircraft Artillery (AAA), rockets, and small arms presents a substantial threat to both military and civilian aircraft. To address this ever-present threat, Northrop Grumman has assessed unguided threat phenomenology to understand the underlying physical principles for detection. These principles, based upon threat transit through the atmosphere, exploit a simple phenomenon universal to all objects moving through an atmosphere comprised of gaseous media to detect and track the threat in the presence of background and clutter. Threat detection has rapidly become a crucial component of aircraft survivability systems that provide situational awareness to the crew. It is particularly important to platforms which may spend a majority of their time at low altitudes and within the effective range of a large variety of weapons. Detection of these threats presents a unique challenge as this class of threat typically has a dim signature coupled with a short duration. Correct identification of each of the threat components (muzzle flash and projectile) is important to determine trajectory and intent while minimizing false alarms and maintaining a high detection probability in all environments.

  3. Identifying changing aviation threat environments within an adaptive Homeland Security Advisory System.

    PubMed

    Lee, Adrian J; Jacobson, Sheldon H

    2012-02-01

    A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.

  4. Dynamics of attentional bias to threat in anxious adults: bias towards and/or away?

    PubMed

    Zvielli, Ariel; Bernstein, Amit; Koster, Ernst H W

    2014-01-01

    The aim of the present study was to question untested assumptions about the nature of the expression of Attentional Bias (AB) towards and away from threat stimuli. We tested the idea that high trait anxious individuals (N = 106; M(SD)age = 23.9(3.2) years; 68% women) show a stable AB towards multiple categories of threatening information using the emotional visual dot probe task. AB with respect to five categories of threat stimuli (i.e., angry faces, attacking dogs, attacking snakes, pointed weapons, violent scenes) was evaluated. In contrast with current theories, we found that 34% of participants expressed AB towards threat stimuli, 20.8% AB away from threat stimuli, and 34% AB towards some categories of threat stimuli and away from others. The multiple observed expressions of AB were not an artifact of a specific criterion AB score cut-off; not specific to certain categories of threat stimuli; not an artifact of differences in within-subject variability in reaction time; nor accounted for by individual differences in anxiety-related variables. Findings are conceptualized as reflecting the understudied dynamics of AB expression, with implications for AB measurement and quantification, etiology, relations, and intervention research.

  5. Dynamics of Attentional Bias to Threat in Anxious Adults: Bias towards and/or Away?

    PubMed Central

    Zvielli, Ariel; Bernstein, Amit; Koster, Ernst H. W.

    2014-01-01

    The aim of the present study was to question untested assumptions about the nature of the expression of Attentional Bias (AB) towards and away from threat stimuli. We tested the idea that high trait anxious individuals (N = 106; M(SD)age = 23.9(3.2) years; 68% women) show a stable AB towards multiple categories of threatening information using the emotional visual dot probe task. AB with respect to five categories of threat stimuli (i.e., angry faces, attacking dogs, attacking snakes, pointed weapons, violent scenes) was evaluated. In contrast with current theories, we found that 34% of participants expressed AB towards threat stimuli, 20.8% AB away from threat stimuli, and 34% AB towards some categories of threat stimuli and away from others. The multiple observed expressions of AB were not an artifact of a specific criterion AB score cut-off; not specific to certain categories of threat stimuli; not an artifact of differences in within-subject variability in reaction time; nor accounted for by individual differences in anxiety-related variables. Findings are conceptualized as reflecting the understudied dynamics of AB expression, with implications for AB measurement and quantification, etiology, relations, and intervention research. PMID:25093664

  6. Are needs to manage uncertainty and threat associated with political conservatism or ideological extremity?

    PubMed

    Jost, John T; Napier, Jaime L; Thorisdottir, Hulda; Gosling, Samuel D; Palfai, Tibor P; Ostafin, Brian

    2007-07-01

    Three studies are conducted to assess the uncertainty- threat model of political conservatism, which posits that psychological needs to manage uncertainty and threat are associated with political orientation. Results from structural equation models provide consistent support for the hypothesis that uncertainty avoidance (e.g., need for order, intolerance of ambiguity, and lack of openness to experience) and threat management (e.g., death anxiety, system threat, and perceptions of a dangerous world) each contributes independently to conservatism (vs. liberalism). No support is obtained for alternative models, which predict that uncertainty and threat management are associated with ideological extremism or extreme forms of conservatism only. Study 3 also reveals that resistance to change fully mediates the association between uncertainty avoidance and conservatism, whereas opposition to equality partially mediates the association between threat and conservatism. Implications for understanding the epistemic and existential bases of political orientation are discussed.

  7. Planetary Defense: Options for Deflection of Near Earth Objects

    NASA Technical Reports Server (NTRS)

    Adams, R. B.; Statham, G.; Hopkins, R.; Chapman, J.; White, S.; Bonometti, J.; Alexander, R.; Fincher, S.; Polsgrove, T.; Kalkstein, M.

    2003-01-01

    Several recent near-miss encounters with asteroids and comets have focused attention on the threat of a catastrophic impact with the Earth. This document reviews the historical impact record and current understanding of the number and location of Near Earth Objects (NEO's) to address their impact probability. Various ongoing projects intended to survey and catalog the NEO population are also reviewed. Details are then given of an MSFC-led study, intended to develop and assess various candidate systems for protection of the Earth against NEOs. An existing program, used to model the NE0 threat, was extensively modified and is presented here. Details of various analytical tools, developed to evaluate the performance of proposed technologies for protection against the NEO threat, are also presented. Trajectory tools, developed to model the outbound path a vehicle would take to intercept or rendezvous with a target asteroid or comet, are described. Also, details are given of a tool that was created to model both the un-deflected inbound path of an NE0 as well as the modified, post-deflection, path. The number of possible options available for protection against the NE0 threat was too numerous for them to all be addressed within the study; instead, a representative selection were modeled and evaluated. The major output from this work was a novel process by which the relative effectiveness of different threat mitigation concepts can be evaluated during future, more detailed, studies. In addition, several new or modified mathematical models were developed to analyze various proposed protection systems. A summary of the major lessons learned during this study is presented, as are recommendations for future work. It is hoped that this study will serve to raise the level attention about this very real threat and also demonstrate that successful defense is both possible and practicable, provided appropriate steps are taken.

  8. School-Based Decision Making: A Principal-Agent Perspective.

    ERIC Educational Resources Information Center

    Ferris, James M.

    1992-01-01

    A principal-agent framework is used to examine potential gains in educational performance and potential threats to public accountability that school-based decision-making proposals pose. Analysis underscores the need to tailor the design of decentralized decision making to the sources of poor educational performance and threats to school…

  9. Stereotype threat and lift effects in motor task performance: the mediating role of somatic and cognitive anxiety.

    PubMed

    Laurin, Raphael

    2013-01-01

    The aim of this investigation was to replicate the stereotype threat and lift effects in a motor task in a neutral sex-typed activity, using somatic and cognitive anxiety as key mediators of these phenomena. It was hypothesized that an ingroup/outgroup social categorization based on gender would have distinctive effects for female and male participants. A total of 161 French physical education students were randomly assigned to three threat conditions--no threat, female threat, and male threat--thus leading to a 3 x 2 (threat by gender) design. The analyses revealed a stereotype lift effect on the performances for both male and female participants, as well as a stereotype threat effect only for female participants. They also indicated that somatic anxiety had a mediating effect on the performance of female participants targeted by a negative stereotype, but that it had a facilitating effect on their performance. The stereotype threat and lift effects on motor tasks were replicated in a neutral sex-typed activity and somatic anxiety seems to have a facilitating mediating effect of the relationships between the gender-conditions (control or female threat) interaction and free-throw performance. The model used to distinguish somatic and cognitive anxiety appeared to be a relevant means of explaining the stereotype threat and lift mechanisms.

  10. FADS: A demonstrator for MilComSat AOCS

    NASA Astrophysics Data System (ADS)

    Huddleston, Martin; Cope, Paul

    1995-03-01

    This project covers the attitude and orbit control systems (AOCS) research program being carried out as part of the MOD applied research program for AD CIS(OR)1. The project program is to evaluate the candidate sensor technologies and control algorithms, such as Kalman filters, which may be applied to future UK military ComSats. The specific needs of military satellites for robust and threat-resistant control are not offered by current civil technologies which normally use vulnerable earth sensors or RF pointing which is vulnerable to deception. The program is also to investigate ways of reducing control system complexity and improvements in attitude control precision by enabling structural modes to be controlled. The project examines the most promising attitude control system technologies required to support such future communications payloads. User requirements indicate a need for improved threat resistance and for narrower spot beams, and the program supports this perceived need by the use of improved sensors and control algorithms. Improved pointing on civil ComSats is normally by means of ground RF measurements to form a closed loop control system with the spacecraft. For threat reasons this method is unsuitable for military ComSats, and on-board sensors are therefore used. The use of Silicon array star or earth sensors are the most promising, and the sensor program is to concentrate on these. Limited development and available civil sensors will be considered. Experimental work is based on demonstrating and evaluating real hardware in-the-loop on an existing air bearing experimental rig. This offers the closest simulation of real flight performance that can be obtained. The program will develop the Filtered Attitude Determination System (FADS)rig to be fully representative of a MilSatCom satellite, threat-resistant AOCS solution, employing Silicon array star and earth sensors. Both the BAe Mosaic Earth Sensor (MES) nad Marconi Versatile Star Sensor (VSS) technologies show considerable potential as attitude sensors. The VSS and MES capabilities will be evalutated on the FADS rig.

  11. Guidelines for reporting evaluations based on observational methodology.

    PubMed

    Portell, Mariona; Anguera, M Teresa; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana

    2015-01-01

    Observational methodology is one of the most suitable research designs for evaluating fidelity of implementation, especially in complex interventions. However, the conduct and reporting of observational studies is hampered by the absence of specific guidelines, such as those that exist for other evaluation designs. This lack of specific guidance poses a threat to the quality and transparency of these studies and also constitutes a considerable publication hurdle. The aim of this study thus was to draw up a set of proposed guidelines for reporting evaluations based on observational methodology. The guidelines were developed by triangulating three sources of information: observational studies performed in different fields by experts in observational methodology, reporting guidelines for general studies and studies with similar designs to observational studies, and proposals from experts in observational methodology at scientific meetings. We produced a list of guidelines grouped into three domains: intervention and expected outcomes, methods, and results. The result is a useful, carefully crafted set of simple guidelines for conducting and reporting observational studies in the field of program evaluation.

  12. Gigaflop (billion floating point operations per second) performance for computational electromagnetics

    NASA Technical Reports Server (NTRS)

    Shankar, V.; Rowell, C.; Hall, W. F.; Mohammadian, A. H.; Schuh, M.; Taylor, K.

    1992-01-01

    Accurate and rapid evaluation of radar signature for alternative aircraft/store configurations would be of substantial benefit in the evolution of integrated designs that meet radar cross-section (RCS) requirements across the threat spectrum. Finite-volume time domain methods offer the possibility of modeling the whole aircraft, including penetrable regions and stores, at longer wavelengths on today's gigaflop supercomputers and at typical airborne radar wavelengths on the teraflop computers of tomorrow. A structured-grid finite-volume time domain computational fluid dynamics (CFD)-based RCS code has been developed at the Rockwell Science Center, and this code incorporates modeling techniques for general radar absorbing materials and structures. Using this work as a base, the goal of the CFD-based CEM effort is to define, implement and evaluate various code development issues suitable for rapid prototype signature prediction.

  13. Social information use in threat perception: Social buffering, contagion and facilitation of alarm responses

    PubMed Central

    Oliveira, Rui F.; Faustino, Ana I.

    2017-01-01

    ABSTRACT Group living animals can use the behavior of others as cues for the presence of threat in the environment and adjust their behavior accordingly. Therefore, different social phenomena that modulate the response to threat, such as social buffering, social transmission (contagion), and facilitation of alarm responses can be seen as different manifestations of social information use in threat detection. Thus, social phenomena that are functionally antagonistic, such as social buffering and social transmission of fear, may rely on shared neurobehavioral mechanisms related to the use of social information in decision-making about the presence of threat in the environment. Here, we propose a unifying conceptual framework for the study of social information use in threat perception based on signal detection theory.

  14. Attributional biases about the origins of attitudes: externality, emotionality, and rationality.

    PubMed

    Kenworthy, Jared B; Miller, Norman

    2002-05-01

    Pilot work and 3 studies investigated the ways people explain the origins of attitudes. Study I examined the use of 3 dimensions (externality, rationality, emotionality) to explain the origin of people's own, in-group, and out-group attitudes. Attributions for own attitudes were the least externally and emotionally based and the most rationally based. By comparison with the out-group, less externality, less emotionality, and more rationality also were attributed to in-group attitudes. Studies 2 and 3 examined the effects of intergroup threat on attributions for in- and out-group attitude positions. Under high threat, more externality and emotionality but less rationality were attributed to out-group attitudes than under low threat. Intergroup differentiation mediated the difference between out-group attributions under high and low threat.

  15. Fluctuations in [11C]SB207145 PET Binding Associated with Change in Threat-Related Amygdala Reactivity in Humans

    PubMed Central

    Fisher, Patrick MacDonald; Haahr, Mette Ewers; Jensen, Christian Gaden; Frokjaer, Vibe Gedsoe; Siebner, Hartwig Roman; Knudsen, Gitte Moos

    2015-01-01

    Serotonin critically affects the neural processing of emotionally salient stimuli, including indices of threat; however, how alterations in serotonin signaling contribute to changes in brain function is not well understood. Recently, we showed in a placebo-controlled study of 32 healthy males that brain serotonin 4 receptor (5-HT4) binding, assessed with [11C]SB207145 PET, was sensitive to a 3-week intervention with the selective serotonin reuptake inhibitor fluoxetine, supporting it as an in vivo model for fluctuations in central serotonin levels. Participants also underwent functional magnetic resonance imaging while performing a gender discrimination task of fearful, angry, and neutral faces. This offered a unique opportunity to evaluate whether individual fluctuations in central serotonin levels, indexed by change in [11C]SB207145 binding, predicted changes in threat-related reactivity (ie, fear and angry vs neutral faces) within a corticolimbic circuit including the amygdala and medial prefrontal and anterior cingulate cortex. We observed a significant association such that decreased brain-wide [11C]SB207145 binding (ie, increased brain serotonin levels) was associated with lower threat-related amygdala reactivity, whereas intervention group status did not predict change in corticolimbic reactivity. This suggests that in the healthy brain, interindividual responses to pharmacologically induced and spontaneously occurring fluctuations in [11C]SB207145 binding, a putative marker of brain serotonin levels, affect amygdala reactivity to threat. Our finding also supports that change in brain [11C]SB207145 binding may be a relevant marker for evaluating neurobiological mechanisms underlying sensitivity to threat and serotonin signaling. PMID:25560201

  16. Contextual Factors Related to Stereotype Threat and Student Success in Science Technology Engineering Mathematics Education: A Mixed Methods Study

    NASA Astrophysics Data System (ADS)

    Leker, Lindsey Beth

    Stereotype threat is a widely researched phenomenon shown to impact performance in testing and evaluation situations (Katz, Roberts, & Robinson, 1965; Steele & Aronson, 1995). When related to gender, stereotype threat can lead women to score lower than men on standardized math exams (Spencer, Steele, & Quinn, 1999). Stereotype threat may be one reason women have lower enrollment in most science, technology, engineering, and mathematics (STEM) majors, hold a smaller number of STEM careers than men, and have a higher attrition rate in STEM professions (Hill, Corbet, & Rose, 2010; Picho & Brown 2011; Sorby & Baartmans, 2000). Most research has investigated stereotype threat using experiments yielding mixed results (Stoet & Geary, 2012). Thus, there is a need to explore stereotype threat using quantitative surveys and qualitative methods to examine other contextual factors that contribute to gender difference in STEM fields. This dissertation outlined a mixed methods study designed to, first, qualitatively explore stereotype threat and contextual factors related to high achieving women in STEM fields, as well as women who have failed and/or avoided STEM fields. Then, the quantitative portion of the study used the themes from the qualitative phase to create a survey that measured stereotype threat and other contextual variables related to STEM success and failure/avoidance. Fifteen participants were interviewed for the qualitative phase of the study and six themes emerged. The quantitative survey was completed 242 undergraduate participants. T-tests, correlations, regressions, and mediation analyses were used to analyze the data. There were significant relationships between stereotype threat and STEM confidence, STEM anxiety, giving up in STEM, and STEM achievement. Overall, this mixed methods study advanced qualitative research on stereotype threat, developed a much-needed scale for the measurement of stereotype threat, and tested the developed scale.

  17. Tourism and recreation listed as a threat for a wide diversity of vascular plants: a continental scale review.

    PubMed

    Rankin, Benjamin Luke; Ballantyne, Mark; Pickering, Catherine Marina

    2015-05-01

    Tourism and recreation are diverse and popular activities. They may also contribute to the risk of extinction for some plants because of the range and severity of their impacts, including in protected areas: but which species, where and how? To evaluate the extent to which tourism and recreation may be threatening process for plants, we conducted a continental level review of listed threats to endangered vascular plants using data from Australia. Of the 659 vascular plant species listed as critically endangered or endangered by the Australian Government, tourism and recreation were listed as a threat(s) for 42%. This is more than those listed as threatened by climate change (26%) and close to the proportion listed as threatened by altered fire regimes (47%). There are plant species with tourism and recreation listed threats in all States and Territories and from all but one bioregion in Australia. Although more than 45 plant families have species with tourism and recreation listed as threats, orchids were the most common species listed as at risk from these threats (90 species). The most common types of threats listed were visitors collecting plants in protected areas (113 species), trampling by hikers and others (84 species), damage from recreational vehicles (59 species) and road infrastructure (39 species). Despite the frequency with which tourism and recreation were listed as threats in Australia, research quantifying these threats and methods to ameliorate their impacts are still limited. Although this lack of information contributes to the challenge of managing tourism and recreation, impacts from visitors will often be easier to manage within natural areas than those from larger scale threats such as altered fire regimes and climate change. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Face processing in adolescents with positive and negative threat bias.

    PubMed

    Sylvester, C M; Petersen, S E; Luby, J L; Barch, D M

    2017-04-01

    Individuals with anxiety disorders exhibit a 'vigilance-avoidance' pattern of attention to threatening stimuli when threatening and neutral stimuli are presented simultaneously, a phenomenon referred to as 'threat bias'. Modifying threat bias through cognitive retraining during adolescence reduces symptoms of anxiety, and so elucidating neural mechanisms of threat bias during adolescence is of high importance. We explored neural mechanisms by testing whether threat bias in adolescents is associated with generalized or threat-specific differences in the neural processing of faces. Subjects were categorized into those with (n = 25) and without (n = 27) threat avoidance based on a dot-probe task at average age 12.9 years. Threat avoidance in this cohort has previously been shown to index threat bias. Brain response to individually presented angry and neutral faces was assessed in a separate session using functional magnetic resonance imaging. Adolescents with threat avoidance exhibited lower activity for both angry and neutral faces relative to controls in several regions in the occipital, parietal, and temporal lobes involved in early visual and facial processing. Results generalized to happy, sad, and fearful faces. Adolescents with a prior history of depression and/or an anxiety disorder had lower activity for all faces in these same regions. A subset of results replicated in an independent dataset. Threat bias is associated with generalized, rather than threat-specific, differences in the neural processing of faces in adolescents. Findings may aid in the development of novel treatments for anxiety disorders that use attention training to modify threat bias.

  19. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis.

    PubMed

    Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity.

  20. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis

    PubMed Central

    Holgado-Tello, Fco. P.; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A.

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991

  1. Generalized Drivers in the Mammalian Endangerment Process

    PubMed Central

    González-Suárez, Manuela; Revilla, Eloy

    2014-01-01

    An important challenge for conservation today is to understand the endangerment process and identify any generalized patterns in how threats occur and aggregate across taxa. Here we use a global database describing main current external threats in mammals to evaluate the prevalence of distinct threatening processes, primarily of anthropogenic origin, and to identify generalized drivers of extinction and their association with vulnerability status and intrinsic species' traits. We detect several primary threat combinations that are generally associated with distinct species. In particular, large and widely distributed mammals are affected by combinations of direct exploitation and threats associated with increasing landscape modification that go from logging to intense human land-use. Meanwhile, small, narrowly distributed species are affected by intensifying levels of landscape modification but are not directly exploited. In general more vulnerable species are affected by a greater number of threats, suggesting increased extinction risk is associated with the accumulation of external threats. Overall, our findings show that endangerment in mammals is strongly associated with increasing habitat loss and degradation caused by human land-use intensification. For large and widely distributed mammals there is the additional risk of being hunted. PMID:24587315

  2. Scaring the Snus Out of Smokers: Testing Effects of Fear, Threat, and Efficacy on Smokers' Acceptance of Novel Smokeless Tobacco Products

    PubMed Central

    Popova, Lucy

    2014-01-01

    Novel smokeless tobacco products (such as snus) are aggressively promoted to smokers by the tobacco companies. The Extended Parallel Process Model (EPPM; Witte, 1992) was used to evaluate the current perceptions of threat, efficacy, attitudes, and behavioral intentions regarding snus in a nationally representative sample of 1,836 smokers. Participants were then exposed to messages designed to discourage smokers from trying snus. On average, smokers perceived health threats of snus as somewhat serious, but believed they can effectively avert this threat. Support was found for the EPPM's proposition that when efficacy is high, greater perceived threat is associated with greater desired outcomes (less favorable attitudes towards snus and lower behavioral intentions to try snus in the future). No support was found for the proposition that when perceived efficacy is low, greater threat is associated with greater message rejection. Instead, message rejection was explained by fear felt while exposed to the anti-smokeless ads. This finding indicates the need to more clearly distinguish between cognitive (danger control) and affective (fear control) responses posited by the EPPM. PMID:24359298

  3. Inhibitory Control as a Moderator of Threat-related Interference Biases in Social Anxiety

    PubMed Central

    Gorlin, Eugenia I.; Teachman, Bethany A.

    2014-01-01

    Prior findings are mixed regarding the presence and direction of threat-related interference biases in social anxiety. The current study examined general inhibitory control (IC), measured by the classic color-word Stroop, as a moderator of the relationship between both threat interference biases (indexed by the emotional Stroop) and several social anxiety indicators. High socially anxious undergraduate students (N=159) completed the emotional and color-word Stroop tasks, followed by an anxiety-inducing speech task. Participants completed measures of trait social anxiety, state anxiety before and during the speech, negative task-interfering cognitions during the speech, and overall self-evaluation of speech performance. Speech duration was used to measure behavioral avoidance. In line with hypotheses, IC moderated the relationship between emotional Stroop bias and every anxiety indicator (with the exception of behavioral avoidance), such that greater social-threat interference was associated with higher anxiety among those with weak IC, whereas lesser social-threat interference was associated with higher anxiety among those with strong IC. Implications for the theory and treatment of threat interference biases in socially anxious individuals are discussed. PMID:24967719

  4. Stereotypes as stumbling-blocks: how coping with stereotype threat affects life outcomes for people with physical disabilities.

    PubMed

    Silverman, Arielle M; Cohen, Geoffrey L

    2014-10-01

    Stereotype threat, the concern about being judged in light of negative stereotypes, causes underperformance in evaluative situations. However, less is known about how coping with stereotypes can aggravate underperformance over time. We propose a model in which ongoing stereotype threat experiences threaten a person's sense of self-integrity, which in turn prompts defensive avoidance of stereotype-relevant situations, impeding growth, achievement, and well-being. We test this model in an important but understudied population: the physically disabled. In Study 1, blind adults reporting higher levels of stereotype threat reported lower self-integrity and well-being and were more likely to be unemployed and to report avoiding stereotype-threatening situations. In Study 2's field experiment, blind students in a compensatory skill-training program made more progress if they had completed a values-affirmation, an exercise that bolsters self-integrity. The findings suggest that stereotype threat poses a chronic threat to self-integrity and undermines life outcomes for people with disabilities. © 2014 by the Society for Personality and Social Psychology, Inc.

  5. A novel recruitment message to increase enrollment into a smoking cessation treatment program: preliminary results from a randomized trial.

    PubMed

    Schnoll, Robert A; Cappella, Joseph; Lerman, Caryn; Pinto, Angela; Patterson, Freda; Wileyto, E Paul; Bigman, Cabral; Leone, Frank

    2011-12-01

    Most smokers do not utilize approved interventions for nicotine dependence, reducing the probability of cessation. Smoking cessation programs typically use recruitment messages emphasizing the health threats of smoking. Augmenting this threat message by describing the genetic aspects of nicotine addiction may enhance enrollment into a cessation program. During telephone recruitment, 125 treatment-seeking smokers were randomized to receive by phone either a standard threat message or a threat plus genetic prime message and were offered open-label varenicline and counseling. There was a greater rate of enrollment into the cessation program for the threat plus genetic prime participants (51.7%) versus the threat-only participants (37.7%; p = .03). Smokers who self-identified from racial/ethnic minority groups were less likely to enroll in the cessation program (p = .01) versus smokers who self-identified as Caucasian. These preliminary data suggest that a simple, affordable, and transportable communication approach enhances enrollment of smokers into a smoking cessation program. A larger clinical trial to evaluate a genetic prime message for improving recruitment into smoking cessation programs is warranted.

  6. Threat Perception Bias and Anxiety among Chinese School Children and Adolescents

    ERIC Educational Resources Information Center

    Lu, Weili; Daleiden, Eric; Lu, Shou-En

    2007-01-01

    This study evaluated the relationship between threat perception bias and anxiety among children and adolescents in China. A sample of 1,004 elementary, middle and high school students aged 9 to 19 years listened to stories containing themes of generalized anxiety, social anxiety and separation anxiety in either an ambiguous or non-ambiguous…

  7. Forests on the edge: evaluating contributions of and threats to America's private forest lands

    Treesearch

    Mark Hatfield; Ronald E. McRoberts; Dacia M. Meneguzzo; Mike Dechter; < i> et al< /i>

    2007-01-01

    The Forests on the Edge project, sponsored by the U.S. Department of Agriculture Forest Service, uses geographic information systems to construct and analyze maps depicting ecological, social, and economic contributions of America's private forest lands and threats to those contributions. Watersheds across the conterminous United States are ranked relative to the...

  8. Assessing Women's Responses to Sexual Threat: Validity of a Virtual Role-Play Procedure

    ERIC Educational Resources Information Center

    Jouriles, Ernest N.; Rowe, Lorelei Simpson; McDonald, Renee; Platt, Cora G.; Gomez, Gabriella S.

    2011-01-01

    This study evaluated the validity of a role-play procedure that uses virtual reality technology to assess women's responses to sexual threat. Forty-eight female undergraduate students were randomly assigned to either a standard, face-to-face role-play (RP) or a virtual role-play (VRP) of a sexually coercive situation. A multimethod assessment…

  9. Using a Learning Progression Framework to Assess and Evaluate Student Growth

    ERIC Educational Resources Information Center

    Briggs, Derek C.; Diaz-Bilello, Elena; Peck, Fred; Alzen, Jessica; Chattergoon, Rajendra; Johnson, Raymond

    2015-01-01

    This report describes the use of a Learning Progression Framework (LPF) to support the Student Learning Objectives (SLO) process. The report highlights a few common threats we currently see in the SLO process implemented at various states and districts, and offers the LPF as a possible solution for addressing these threats. This report was…

  10. An Exploratory Study on the Post-Implementation of Threat and Error Management Training in Australian General Aviation

    ERIC Educational Resources Information Center

    Lee, Seung Yong; Bates, Paul R.; Murray, Patrick S.; Martin, Wayne L.

    2017-01-01

    Threat and Error Management (TEM) training, endorsed and recommended by the International Civil Aviation Organisation (ICAO), was mandated in Australia with the aim of improving aviation safety. However, to date, there has been very limited, if any, formal post-implementation review, assessment or evaluation to examine the "after-state"…

  11. A Best Practices Model for Implementing Successful Electronic Disease Surveillance Systems: Insights from Peru and Around the Globe

    DTIC Science & Technology

    2013-06-03

    associated Program design: Kenya . and written project with improved I) Generic model should be adaptable documentation. diagnosis or treatment. to local...potential for and threats to development through an unsustainable and 3) Gaps in evaluation in area of building sustainable to performance -based...implementation in developing countries by building a framework that will identify key elements in this process and serve as guidance to implementers. This study

  12. Life history and spatial traits predict extinction risk due to climate change

    NASA Astrophysics Data System (ADS)

    Pearson, Richard G.; Stanton, Jessica C.; Shoemaker, Kevin T.; Aiello-Lammens, Matthew E.; Ersts, Peter J.; Horning, Ned; Fordham, Damien A.; Raxworthy, Christopher J.; Ryu, Hae Yeong; McNees, Jason; Akçakaya, H. Reşit

    2014-03-01

    There is an urgent need to develop effective vulnerability assessments for evaluating the conservation status of species in a changing climate. Several new assessment approaches have been proposed for evaluating the vulnerability of species to climate change based on the expectation that established assessments such as the IUCN Red List need revising or superseding in light of the threat that climate change brings. However, although previous studies have identified ecological and life history attributes that characterize declining species or those listed as threatened, no study so far has undertaken a quantitative analysis of the attributes that cause species to be at high risk of extinction specifically due to climate change. We developed a simulation approach based on generic life history types to show here that extinction risk due to climate change can be predicted using a mixture of spatial and demographic variables that can be measured in the present day without the need for complex forecasting models. Most of the variables we found to be important for predicting extinction risk, including occupied area and population size, are already used in species conservation assessments, indicating that present systems may be better able to identify species vulnerable to climate change than previously thought. Therefore, although climate change brings many new conservation challenges, we find that it may not be fundamentally different from other threats in terms of assessing extinction risks.

  13. Intention Modulates the Effect of Punishment Threat in Norm Enforcement via the Lateral Orbitofrontal Cortex.

    PubMed

    Zhang, Yuan; Yu, Hongbo; Yin, Yunlu; Zhou, Xiaolin

    2016-08-31

    Although economic theories suggest that punishment threat is crucial for maintaining social norms, counterexamples are noted in which punishment threat hinders norm compliance. Such discrepancy may arise from the intention behind the threat: unintentionally introduced punishment threat facilitates, whereas intentionally introduced punishment threat hinders, norm compliance. Here, we combined a dictator game and fMRI to investigate how intention modulates the effect of punishment threat on norm compliance and the neural substrates of this modulation. We also investigated whether this modulation can be influenced by brain stimulation. Human participants divided an amount of money between themselves and a partner. The partner (intentionally) or a computer program (unintentionally) decided to retain or waive the right to punish the participant upon selfish distribution. Compared with the unintentional condition, participants allocated more when the partner intentionally waived the power of punishment, but less when the partner retained such power. The right lateral orbitofrontal cortex (rLOFC) showed higher activation when the partner waived compared with when the computer waived or when the partner retained the power. The functional connectivity between the rLOFC and the brain network associated with intention/mentalizing processing was predictive of the allocation difference induced by intention. Moreover, inhibition or activation of the rLOFC by brain stimulation decreased or increased, respectively, the participants' reliance on the partner's intention during monetary allocation. These findings demonstrate that the perceived intention of punishment threat plays a crucial role in norm compliance and that the LOFC is casually involved in the implementation of intention-based cooperative decisions. Does punishment threat facilitate or hinder norm enforcement? So far, cognitive neuroscience research offers equivocal evidence. By directly manipulating the intention behind punishment threat, we demonstrate that intention modulates the effectiveness of punishment threat. Moreover, we show that inhibition or activation of the right lateral orbitofrontal cortex (rLOFC) decreased or increased the effect of punishment threat in the intentional context, but not in the unintentional context, suggesting the casual involvement of the rLOFC in intention-based cooperative decisions. Copyright © 2016 the authors 0270-6474/16/369217-10$15.00/0.

  14. THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E

    Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.

  15. Social identity modifies face perception: an ERP study of social categorization

    PubMed Central

    Stedehouder, Jeffrey; Ito, Tiffany A.

    2015-01-01

    Two studies examined whether social identity processes, i.e. group identification and social identity threat, amplify the degree to which people attend to social category information in early perception [assessed with event-related brain potentials (ERPs)]. Participants were presented with faces of Muslims and non-Muslims in an evaluative priming task while ERPs were measured and implicit evaluative bias was assessed. Study 1 revealed that non-Muslims showed stronger differentiation between ingroup and outgroup faces in both early (N200) and later processing stages (implicit evaluations) when they identified more strongly with their ethnic group. Moreover, identification effects on implicit bias were mediated by intergroup differentiation in the N200. In Study 2, social identity threat (vs control) was manipulated among Muslims. Results revealed that high social identity threat resulted in stronger differentiation of Muslims from non-Muslims in early (N200) and late (implicit evaluations) processing stages, with N200 effects again predicting implicit bias. Combined, these studies reveal how seemingly bottom-up early social categorization processes are affected by individual and contextual variables that affect the meaning of social identity. Implications of these results for the social identity perspective as well as social cognitive theories of person perception are discussed. PMID:25140049

  16. Methodology of automated ionosphere front velocity estimation for ground-based augmentation of GNSS

    NASA Astrophysics Data System (ADS)

    Bang, Eugene; Lee, Jiyun

    2013-11-01

    ionospheric anomalies occurring during severe ionospheric storms can pose integrity threats to Global Navigation Satellite System (GNSS) Ground-Based Augmentation Systems (GBAS). Ionospheric anomaly threat models for each region of operation need to be developed to analyze the potential impact of these anomalies on GBAS users and develop mitigation strategies. Along with the magnitude of ionospheric gradients, the speed of the ionosphere "fronts" in which these gradients are embedded is an important parameter for simulation-based GBAS integrity analysis. This paper presents a methodology for automated ionosphere front velocity estimation which will be used to analyze a vast amount of ionospheric data, build ionospheric anomaly threat models for different regions, and monitor ionospheric anomalies continuously going forward. This procedure automatically selects stations that show a similar trend of ionospheric delays, computes the orientation of detected fronts using a three-station-based trigonometric method, and estimates speeds for the front using a two-station-based method. It also includes fine-tuning methods to improve the estimation to be robust against faulty measurements and modeling errors. It demonstrates the performance of the algorithm by comparing the results of automated speed estimation to those manually computed previously. All speed estimates from the automated algorithm fall within error bars of ± 30% of the manually computed speeds. In addition, this algorithm is used to populate the current threat space with newly generated threat points. A larger number of velocity estimates helps us to better understand the behavior of ionospheric gradients under geomagnetic storm conditions.

  17. The dark side of the sublime: Distinguishing a threat-based variant of awe.

    PubMed

    Gordon, Amie M; Stellar, Jennifer E; Anderson, Craig L; McNeil, Galen D; Loew, Daniel; Keltner, Dacher

    2017-08-01

    Theoretical conceptualizations of awe suggest this emotion can be more positive or negative depending on specific appraisal processes. However, the emergent scientific study of awe rarely emphasizes its negative side, classifying it instead as a positive emotion. In the present research we tested whether there is a more negative variant of awe that arises in response to vast, complex stimuli that are threatening (e.g., tornadoes, terrorist attack, wrathful god). We discovered people do experience this type of awe with regularity (Studies 1 & 4) and that it differs from other variants of awe in terms of its underlying appraisals, subjective experience, physiological correlates, and consequences for well-being. Specifically, threat-based awe experiences were appraised as lower in self-control and certainty and higher in situational control than other awe experiences, and were characterized by greater feelings of fear (Studies 2a & 2b). Threat-based awe was associated with physiological indicators of increased sympathetic autonomic arousal, whereas positive awe was associated with indicators of increased parasympathetic arousal (Study 3). Positive awe experiences in daily life (Study 4) and in the lab (Study 5) led to greater momentary well-being (compared with no awe experience), whereas threat-based awe experiences did not. This effect was partially mediated by increased feelings of powerlessness during threat-based awe experiences. Together, these findings highlight a darker side of awe. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  18. Quantifying the relative contribution of an ecological reserve to conservation objectives

    USGS Publications Warehouse

    Aagaard, Kevin; Lyons, James E.; Thogmartin, Wayne E.

    2017-01-01

    Evaluating the role public lands play in meeting conservation goals is an essential step in good governance. We present a tool for comparing the regional contribution of each of a suite of wildlife management units to conservation goals. We use weighted summation (simple additive weighting) to compute a Unit Contribution Index (UCI) based on species richness, population abundance, and a conservation score based on IUCN Red List classified threat levels. We evaluate UCI for a subset of the 729 participating wetlands of the Integrated Waterbird Management and Monitoring (IWMM) Program across U.S. Fish and Wildlife Service Regions 3 (Midwest USA), 4 (Southeast USA), and 5 (Northeast USA). We found that the median across-Region UCI for Region 5 was greater than Regions 3 and 4, while Region 4 had the greatest within-Region UCI median. This index is a powerful tool for wildlife managers to evaluate the performance of units within the conservation estate.

  19. The Ego-Defensive Role of Legitimacy: How Threat-Based Justifications Protect the Self-Esteem of Discriminators.

    PubMed

    Pereira, Cicero Roberto; Álvaro, José Luis; Vala, Jorge

    2018-05-01

    This article analyzes the ego-defensive role played by legitimation, by examining the hypothesis that threat-based justifications attenuate the negative effect on an individual's self-esteem caused by his or her becoming aware of his or her own discriminatory behavior. Across three studies (including a pilot experiment), participants who were led to believe that they had acted in a discriminatory way experienced a decrease in their self-esteem. In Study 1 ( N = 116), this effect was nullified when discrimination was justified by either symbolic or realistic threat perceptions. Study 2 ( N = 250) replicated this pattern of results and went further by showing that discrimination affects self-esteem only in more egalitarian individuals, whereas for those less egalitarian, it affects their social image. According to the ego-defensive role of legitimation, a meta-analytical integration of the results confirmed that the influence of discrimination in depressing self-esteem is moderated by threat-based justifications.

  20. Sustainable land management (SLM) practices in drylands: how do they address desertification threats?

    PubMed

    Schwilch, G; Liniger, H P; Hurni, H

    2014-11-01

    Managing land sustainably is a huge challenge, especially under harsh climatic conditions such as those found in drylands. The socio-economic situation can also pose challenges, as dryland regions are often characterized by remoteness, marginality, low-productive farming, weak institutions, and even conflict. With threats from climate change, disputes over water, competing claims on land, and migration increasing worldwide, the demands for sustainable land management (SLM) measures will only increase in the future. Within the EU-funded DESIRE project, researchers and stakeholders jointly identified existing SLM technologies and approaches in 17 dryland study sites located in the Mediterranean and around the world. In order to evaluate and share this valuable SLM experience, local researchers documented the SLM technologies and approaches in collaboration with land users, utilizing the internationally recognized WOCAT questionnaires. This article provides an analysis of 30 technologies and 8 approaches, enabling an initial evaluation of how SLM addresses prevalent dryland threats, such as water scarcity, soil degradation, vegetation degradation and low production, climate change, resource use conflicts, and migration. Among the impacts attributed to the documented technologies, those mentioned most were diversified and enhanced production and better management of water and soil degradation, whether through water harvesting, improving soil moisture, or reducing runoff. Favorable local-scale cost-benefit relationships were mainly found when considered over the long term. Nevertheless, SLM was found to improve people's livelihoods and prevent further outmigration. More field research is needed to reinforce expert assessments of SLM impacts and provide the necessary evidence-based rationale for investing in SLM.

  1. Stereotype threat's effect on women's achievement in chemistry: The interaction of achievement goal orientation for women in science majors

    NASA Astrophysics Data System (ADS)

    Conway-Klaassen, Janice Marjorie

    "Stereotype threat is being at risk of confirming, as a self-characteristic, a negative stereotype about one's group" (C. M. Steele & Aronson, 1995, p. 797). A stereotype threat effect then is described as the detrimental impact on a person's performance or achievement measurements when they are placed in a stereotype threat environment. For women, the negative stereotype that exists in our culture states that women are typically not as capable as men in mathematics or science subjects. This study specifically explored the potential impact of stereotype threat on women who have chosen a science-based college major. They were tested in the domain of chemistry, which is related to mathematics and often involves high level of mathematics skills. I attempted to generate a stereotype threat in the participants through describing a chemistry challenge exam as either one that had consistently shown a gender bias against women and to create a nullification effect by describing the exam as one that had shown no gender bias in the past. In the third experimental condition acting as a control, participants received only generic instructions related to taking the test itself. The second part of this study investigated whether stereotype threat effects could impact women's achievement goal orientations. In previous studies performance avoidance goal orientations have been associated with individuals placed in a stereotype threat environment. The findings on the stereotype threat effect were not significant for the chemistry challenge test achievement scores. This may be due to several factors. One factor may be the design of the chemistry challenge test and the instructions for the test. The other factor may be the women in this study. As individuals who have chosen a science based major, they may have developed coping skills and strategies that reduced the impact of a stereotype threat. It is also possible that the testing environment itself generated an implicit stereotype type threat effect which reduced the differences among the experimental conditions. However, there were significant findings related to the participants' achievement goal orientations. Individuals in the stereotype threat condition displayed higher levels of performance avoidance, overall performance, and overall avoidance goal orientations consistent with the existing literature. Post-hoc open-ended questionnaires revealed that most participants believed that men and women were equally capable in mathematics and sciences but that they also had an awareness of the negative stereotype against women in mathematics and sciences among the public. This study supports the demonstration of stereotype threat effects on women who are enrolled in science based college majors. Although I was not able to create a stereotype threat effect on their chemistry challenge test scores, I was able to demonstrate an effect on their achievement goal orientations, which has implications for instructional design and standardized testing.

  2. Laser Remediation of Threats Posed by Small Orbital Debris

    NASA Technical Reports Server (NTRS)

    Fork, Richard L.; Rogers, Jan R.; Hovater, Mary A.

    2012-01-01

    The continually increasing amount of orbital debris in near Earth space poses an increasing challenge to space situational awareness. Recent collisions of spacecraft caused abrupt increases in the density of both large and small debris in near Earth space. An especially challenging class of threats is that due to the increasing density of small (1 mm to 10 cm dimension) orbital debris. This small debris poses a serious threat since: (1) The high velocity enables even millimeter dimension debris to cause serious damage to vulnerable areas of space assets, e.g., detector windows; (2) The small size and large number of debris elements prevent adequate detection and cataloguing. We have identified solutions to this threat in the form of novel laser systems and novel ways of using these laser systems. While implementation of the solutions we identify is challenging we find approaches offering threat mitigation within time frames and at costs of practical interest. We base our analysis on the unique combination of coherent light specifically structured in both space and time and applied in novel ways entirely within the vacuum of space to deorbiting small debris. We compare and contrast laser based small debris removal strategies using ground based laser systems with strategies using space based laser systems. We find laser systems located and used entirely within space offer essential and decisive advantages over groundbased laser systems.

  3. A map of human impacts to a ``pristine'' coral reef ecosystem, the Papahānaumokuākea Marine National Monument

    NASA Astrophysics Data System (ADS)

    Selkoe, K. A.; Halpern, B. S.; Ebert, C. M.; Franklin, E. C.; Selig, E. R.; Casey, K. S.; Bruno, J.; Toonen, R. J.

    2009-09-01

    Effective and comprehensive regional-scale marine conservation requires fine-grained data on the spatial patterns of threats and their overlap. To address this need for the Papahānaumokuākea Marine National Monument (Monument) in Hawaii, USA, spatial data on 14 recent anthropogenic threats specific to this region were gathered or created, including alien species, bottom fishing, lobster trap fishing, ship-based pollution, ship strike risks, marine debris, research diving, research equipment installation, research wildlife sacrifice, and several anthropogenic climate change threats i.e., increase in ultraviolet (UV) radiation, seawater acidification, the number of warm ocean temperature anomalies relevant to disease outbreaks and coral bleaching, and sea level rise. These data were combined with habitat maps and expert judgment on the vulnerability of different habitat types in the Monument to estimate spatial patterns of current cumulative impact at 1 ha (0.01 km2) resolution. Cumulative impact was greatest for shallow reef areas and peaked at Maro Reef, where 13 of the 14 threats overlapped in places. Ocean temperature variation associated with disease outbreaks was found to have the highest predicted impact overall, followed closely by other climate-related threats, none of which have easily tractable management solutions at the regional scale. High impact threats most tractable to regional management relate to ship traffic. Sensitivity analyses show that the results are robust to both data availability and quality. Managers can use these maps to (1) inform management and surveillance priorities based on the ranking of threats and their distributions, (2) guide permitting decisions based on cumulative impacts, and (3) choose areas to monitor for climate change effects. Furthermore, this regional analysis can serve as a case study for managers elsewhere interested in assessing and mapping region-specific cumulative human impacts.

  4. If training data appears to be mislabeled, should we relabel it? Improving supervised learning algorithms for threat detection in ground penetrating radar data

    NASA Astrophysics Data System (ADS)

    Reichman, Daniël.; Collins, Leslie M.; Malof, Jordan M.

    2018-04-01

    This work focuses on the development of automatic buried threat detection (BTD) algorithms using ground penetrating radar (GPR) data. Buried threats tend to exhibit unique characteristics in GPR imagery, such as high energy hyperbolic shapes, which can be leveraged for detection. Many recent BTD algorithms are supervised, and therefore they require training with exemplars of GPR data collected over non-threat locations and threat locations, respectively. Frequently, data from non-threat GPR examples will exhibit high energy hyperbolic patterns, similar to those observed from a buried threat. Is it still useful therefore, to include such examples during algorithm training, and encourage an algorithm to label such data as a non-threat? Similarly, some true buried threat examples exhibit very little distinctive threat-like patterns. We investigate whether it is beneficial to treat such GPR data examples as mislabeled, and either (i) relabel them, or (ii) remove them from training. We study this problem using two algorithms to automatically identify mislabeled examples, if they are present, and examine the impact of removing or relabeling them for training. We conduct these experiments on a large collection of GPR data with several state-of-the-art GPR-based BTD algorithms.

  5. Human Reliability Program Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Landers, John; Rogers, Erin; Gerke, Gretchen

    A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security andmore » the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.« less

  6. The Effect of the Threat of Legal Sanction on Program Retention and Completion: Is that Why They Stay in Drug Court?

    ERIC Educational Resources Information Center

    Hepburn, John R.; Harvey, Angela N.

    2007-01-01

    Drug courts routinely rely on the threat of legal sanction to motivate drug-using criminal offenders to enter and complete community-based treatment programs. In light of the high failure rates among drug court participants, what is the effect of the threat of legal sanction on program retention and completion? A quasiexperimental research design…

  7. Reducing Stereotype Threat in Classrooms: A Review of Social-Psychological Intervention Studies on Improving the Achievement of Black Students. Issues & Answers. REL 2009-076

    ERIC Educational Resources Information Center

    Aronson, Joshua; Cohen, Geoffrey; McColskey, Wendy

    2009-01-01

    Stereotype threat arises from a fear among members of a group of reinforcing negative stereotypes about the intellectual ability of the group. This report identifies three randomized controlled trial studies that use classroom-based strategies to reduce stereotype threat and improve the academic performance of Black students, narrowing their…

  8. Reducing Stereotype Threat in Classrooms: A Review of Social-Psychological Intervention Studies on Improving the Achievement of Black Students. Summary. Issues & Answers. REL 2009-076

    ERIC Educational Resources Information Center

    Aronson, Joshua; Cohen, Geoffrey; McColskey, Wendy

    2009-01-01

    Stereotype threat arises from a fear among members of a group of reinforcing negative stereotypes about the intellectual ability of the group. This report identifies three randomized controlled trial studies that use classroom-based strategies to reduce stereotype threat and improve the academic performance of Black students, narrowing their…

  9. On the context dependency of implicit self-esteem in social anxiety disorder.

    PubMed

    Hiller, Thomas S; Steffens, Melanie C; Ritter, Viktoria; Stangier, Ulrich

    2017-12-01

    Cognitive models assume that negative self-evaluations are automatically activated in individuals with Social Anxiety Disorder (SAD) during social situations, increasing their individual level of anxiety. This study examined automatic self-evaluations (i.e., implicit self-esteem) and state anxiety in a group of individuals with SAD (n = 45) and a non-clinical comparison group (NC; n = 46). Participants were randomly assigned to either a speech condition with social threat induction (giving an impromptu speech) or to a no-speech condition without social threat induction. We measured implicit self-esteem with an Implicit Association Test (IAT). Implicit self-esteem differed significantly between SAD and NC groups under the speech condition but not under the no-speech condition. The SAD group showed lower implicit self-esteem than the NC group under the speech-condition. State anxiety was significantly higher under the speech condition than under the no-speech condition in the SAD group but not in the NC group. Mediation analyses supported the idea that for the SAD group, the effect of experimental condition on state anxiety was mediated by implicit self-esteem. The causal relation between implicit self-esteem and state anxiety could not be determined. The findings corroborate hypotheses derived from cognitive models of SAD: Automatic self-evaluations were negatively biased in individuals with SAD facing social threat and showed an inverse relationship to levels of state anxiety. However, automatic self-evaluations in individuals with SAD can be unbiased (similar to NC) in situations without social threat. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Are ranger patrols effective in reducing poaching-related threats within protected areas?

    USGS Publications Warehouse

    Moore, Jennnifer F.; Mulindahabi, Felix; Masozera, Michel K.; Nichols, James; Hines, James; Turikunkiko, Ezechiel; Oli, Madan K.

    2018-01-01

    Poaching is one of the greatest threats to wildlife conservation world-wide. However, the spatial and temporal patterns of poaching activities within protected areas, and the effectiveness of ranger patrols and ranger posts in mitigating these threats, are relatively unknown.We used 10 years (2006–2015) of ranger-based monitoring data and dynamic multi-season occupancy models to quantify poaching-related threats, to examine factors influencing the spatio-temporal dynamics of these threats and to test the efficiency of management actions to combat poaching in Nyungwe National Park (NNP), Rwanda.The probability of occurrence of poaching-related threats was highest at lower elevations (1,801–2,200 m), especially in areas that were close to roads and tourist trails; conversely, occurrence probability was lowest at high elevation sites (2,601–3,000 m), and near the park boundary and ranger posts. The number of ranger patrols substantially increased the probability that poaching-related threats disappear at a site if threats were originally present (i.e. probability of extinction of threats). Without ranger visits, the annual probability of extinction of poaching-related threats was an estimated 7%; this probability would increase to 20% and 57% with 20 and 50 ranger visits per year, respectively.Our results suggest that poaching-related threats can be effectively reduced in NNP by adding ranger posts in areas where they do not currently exist, and by increasing the number of patrols to sites where the probability of poaching activities is high.Synthesis and applications. Our application of dynamic occupancy models to predict the probability of presence of poaching-related threats is novel, and explicitly considers imperfect detection of illegal activities. Based on the modelled relationships, we identify areas that are most vulnerable to poaching, and offer insights regarding how ranger patrols can be optimally deployed to reduce poaching-related threats and other illegal activites, while taking into account potential sampling biases. We show that poaching can be effectively reduced by increasing ranger patrols to areas under high risk of poaching activities, and by adding ranger patrols near these sites. These findings are broadly applicable to national parks and protected areas experiencing a high degree of poaching and other illegal activities.

  11. The effects of perceived phenotypic racial stereotypicality and social identity threat on racial minorities' attitudes about police.

    PubMed

    Kahn, Kimberly Barsamian; Lee, J Katherine; Renauer, Brian; Henning, Kris R; Stewart, Greg

    2017-01-01

    This study examines the role of perceived phenotypic racial stereotypicality and race-based social identity threat on racial minorities' trust and cooperation with police. We hypothesize that in police interactions, racial minorities' phenotypic racial stereotypicality may increase race-based social identity threat, which will lead to distrust and decreased participation with police. Racial minorities (Blacks, Latinos, Native Americans, and multi-racials) and Whites from a representative random sample of city residents were surveyed about policing attitudes. A serial multiple mediation model confirmed that racial minorities' self-rated phenotypic racial stereotypicality indirectly affected future cooperation through social identity threat and trust. Due to the lack of negative group stereotypes in policing, the model did not hold for Whites. This study provides evidence that phenotypic stereotypicality influences racial minorities' psychological experiences interacting with police.

  12. Exploring critical factors influencing physicians' acceptance of mobile electronic medical records based on the dual-factor model: a validation in Taiwan.

    PubMed

    Liu, Chung-Feng; Cheng, Tain-Junn

    2015-02-07

    With respect to information management, most of the previous studies on the acceptance of healthcare information technologies were analyzed from "positive" perspectives. However, such acceptance is always influenced by both positive and negative factors and it is necessary to validate both in order to get a complete understanding. This study aims to explore physicians' acceptance of mobile electronic medical records based on the dual-factor model, which is comprised of inhibitors and enablers, to explain an individual's technology usage. Following an earlier healthcare study in the USA, the researchers conducted a similar survey for an Eastern country (Taiwan) to validate whether perceived threat to professional autonomy acts as a critical inhibitor. In addition, perceived mobility, which is regarded as a critical feature of mobile services, was also evaluated as a common antecedent variable in the model. Physicians from three branch hospitals of a medical group were invited to participate and complete questionnaires. Partial least squares, a structural equation modeling technique, was used to evaluate the proposed model for explanatory power and hypotheses testing. 158 valid questionnaires were collected, yielding a response rate of 33.40%. As expected, the inhibitor of perceived threat has a significant impact on the physicians' perceptions of usefulness as well as their intention to use. The enablers of perceived ease of use and perceived usefulness were also significant. In addition, as expected, perceived mobility was confirmed to have a significant impact on perceived ease of use, perceived usefulness and perceived threat. It was confirmed that the dual-factor model is a comprehensive method for exploring the acceptance of healthcare information technologies, both in Western and Eastern countries. Furthermore, perceived mobility was proven to be an effective antecedent variable in the model. The researchers believe that the results of this study will contribute to the research on the acceptance of healthcare information technologies, particularly with regards to mobile electronic medical records, based on the dual-factor viewpoints of academia and practice.

  13. Implementation of the IHR Joint External Evaluation: Taiwan's Experiences.

    PubMed

    Lo, Yi-Chun

    In February 2016, the World Health Organization developed the Joint External Evaluation (JEE) tool to independently assess country capacity to prevent, detect, and respond to public health threats as part of the International Health Regulations (IHR) (2005) monitoring and evaluation framework. In light of this, the Taiwan government actively engaged at least 19 government agencies or institutions and voluntarily implemented the JEE. An External Assessment Team consisting of 6 US subject matter experts conducted the external evaluation, including site visits, from June 21 to July 1, 2016. The results, published on October 18, 2016, are useful and will be translated into actions and change in the system. Based on Taiwan's experiences, early stakeholder engagement and an experts' pre-JEE pilot visit would contribute to a successful JEE process.

  14. Soft error evaluation and vulnerability analysis in Xilinx Zynq-7010 system-on chip

    NASA Astrophysics Data System (ADS)

    Du, Xuecheng; He, Chaohui; Liu, Shuhuan; Zhang, Yao; Li, Yonghong; Xiong, Ceng; Tan, Pengkang

    2016-09-01

    Radiation-induced soft errors are an increasingly important threat to the reliability of modern electronic systems. In order to evaluate system-on chip's reliability and soft error, the fault tree analysis method was used in this work. The system fault tree was constructed based on Xilinx Zynq-7010 All Programmable SoC. Moreover, the soft error rates of different components in Zynq-7010 SoC were tested by americium-241 alpha radiation source. Furthermore, some parameters that used to evaluate the system's reliability and safety were calculated using Isograph Reliability Workbench 11.0, such as failure rate, unavailability and mean time to failure (MTTF). According to fault tree analysis for system-on chip, the critical blocks and system reliability were evaluated through the qualitative and quantitative analysis.

  15. Workshop on Current Issues in Predictive Approaches to Intelligence and Security Analytics: Fostering the Creation of Decision Advantage through Model Integration and Evaluation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sanfilippo, Antonio P.

    2010-05-23

    The increasing asymmetric nature of threats to the security, health and sustainable growth of our society requires that anticipatory reasoning become an everyday activity. Currently, the use of anticipatory reasoning is hindered by the lack of systematic methods for combining knowledge- and evidence-based models, integrating modeling algorithms, and assessing model validity, accuracy and utility. The workshop addresses these gaps with the intent of fostering the creation of a community of interest on model integration and evaluation that may serve as an aggregation point for existing efforts and a launch pad for new approaches.

  16. Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs

    PubMed Central

    Chen, You; Malin, Bradley

    2014-01-01

    Collaborative information systems (CIS) are deployed within a diverse array of environments, ranging from the Internet to intelligence agencies to healthcare. It is increasingly the case that such systems are applied to manage sensitive information, making them targets for malicious insiders. While sophisticated security mechanisms have been developed to detect insider threats in various file systems, they are neither designed to model nor to monitor collaborative environments in which users function in dynamic teams with complex behavior. In this paper, we introduce a community-based anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on information recorded in the access logs of collaborative environments. CADS is based on the observation that typical users tend to form community structures, such that users with low a nity to such communities are indicative of anomalous and potentially illicit behavior. The model consists of two primary components: relational pattern extraction and anomaly detection. For relational pattern extraction, CADS infers community structures from CIS access logs, and subsequently derives communities, which serve as the CADS pattern core. CADS then uses a formal statistical model to measure the deviation of users from the inferred communities to predict which users are anomalies. To empirically evaluate the threat detection model, we perform an analysis with six months of access logs from a real electronic health record system in a large medical center, as well as a publicly-available dataset for replication purposes. The results illustrate that CADS can distinguish simulated anomalous users in the context of real user behavior with a high degree of certainty and with significant performance gains in comparison to several competing anomaly detection models. PMID:25485309

  17. Threat-Related Attention Bias Variability and Posttraumatic Stress.

    PubMed

    Naim, Reut; Abend, Rany; Wald, Ilan; Eldar, Sharon; Levi, Ofir; Fruchter, Eyal; Ginat, Karen; Halpern, Pinchas; Sipos, Maurice L; Adler, Amy B; Bliese, Paul D; Quartana, Phillip J; Pine, Daniel S; Bar-Haim, Yair

    2015-12-01

    Threat monitoring facilitates survival by allowing one to efficiently and accurately detect potential threats. Traumatic events can disrupt healthy threat monitoring, inducing biased and unstable threat-related attention deployment. Recent research suggests that greater attention bias variability, that is, attention fluctuations alternating toward and away from threat, occurs in participants with PTSD relative to healthy comparison subjects who were either exposed or not exposed to traumatic events. The current study extends findings on attention bias variability in PTSD. Previous measurement of attention bias variability was refined by employing a moving average technique. Analyses were conducted across seven independent data sets; in each, data on attention bias variability were collected by using variants of the dot-probe task. Trauma-related and anxiety symptoms were evaluated across samples by using structured psychiatric interviews and widely used self-report questionnaires, as specified for each sample. Analyses revealed consistent evidence of greater attention bias variability in patients with PTSD following various types of traumatic events than in healthy participants, participants with social anxiety disorder, and participants with acute stress disorder. Moreover, threat-related, and not positive, attention bias variability was correlated with PTSD severity. These findings carry possibilities for using attention bias variability as a specific cognitive marker of PTSD and for tailoring protocols for attention bias modification for this disorder.

  18. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single simulations can be in error. Although these model shortcomings presently limit the precision of lightning threat forecasts from individual runs of current generation models,the techniques proposed herein should continue to be applicable as newer and more accurate physically-based model versions, physical parameterizations, initialization techniques and ensembles of forecasts become available.

  19. Stereotype Threat Paradigm in Search of a Phenomenon: A Comment on Kellow and Jones's (2008) Study

    ERIC Educational Resources Information Center

    Whaley, Arthur L.

    2009-01-01

    In a recent study, Kellow and Jones apply the stereotype threat paradigm to a sample of African American students attending an urban high school. The purpose of this commentary is to provide a conceptual and methodological critique of Kellow and Jones's study. Implications for the role of Black psychologists in evaluating research on African…

  20. Integration of population genetic structure and plant response to climate change: sustaining genetic resources through evaluation of projected threats

    Treesearch

    Bryce A. Richardson; Marcus V. Warwell; Mee-Sook Kim; Ned B. Klopfenstein; Geral I. McDonald

    2010-01-01

    To assess threats or predict responses to disturbances, or both, it is essential to recognize and characterize the population structures of forest species in relation to changing environments. Appropriate management of these genetic resources in the future will require (1) understanding the existing genetic diversity/variation and population structure of forest trees...

  1. Student threat assessment as a standard school safety practice: Results from a statewide implementation study.

    PubMed

    Cornell, Dewey; Maeng, Jennifer L; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick

    2018-06-01

    Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat assessment teams distinguish serious from nonserious threats. The sample consisted of 1,865 threat assessment cases reported by 785 elementary, middle, and high schools. Students ranged from pre-K to Grade 12, including 74.4% male, 34.6% receiving special education services, 51.2% White, 30.2% Black, 6.8% Hispanic, and 2.7% Asian. Survey data were collected from school-based teams to measure student demographics, threat characteristics, and assessment results. Logistic regression indicated that threat assessment teams were more likely to identify a threat as serious if it was made by a student above the elementary grades (odds ratio 0.57; 95% lower and upper bound 0.42-0.78), a student receiving special education services (1.27; 1.00-1.60), involved battery (1.61; 1.20-2.15), homicide (1.40; 1.07-1.82), or weapon possession (4.41; 2.80-6.96), or targeted an administrator (3.55; 1.73-7.30). Student race and gender were not significantly associated with a serious threat determination. The odds ratio that a student would attempt to carry out a threat classified as serious was 12.48 (5.15-30.22). These results provide new information on the nature and prevalence of threats in schools using threat assessment that can guide further work to develop this emerging school safety practice. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  2. Factors that influence the efficiency of beef and dairy cattle recording system in Kenya: A SWOT-AHP analysis.

    PubMed

    Wasike, Chrilukovian B; Magothe, Thomas M; Kahi, Alexander K; Peters, Kurt J

    2011-01-01

    Animal recording in Kenya is characterised by erratic producer participation and high drop-out rates from the national recording scheme. This study evaluates factors influencing efficiency of beef and dairy cattle recording system. Factors influencing efficiency of animal identification and registration, pedigree and performance recording, and genetic evaluation and information utilisation were generated using qualitative and participatory methods. Pairwise comparison of factors was done by strengths, weaknesses, opportunities and threats-analytical hierarchical process analysis and priority scores to determine their relative importance to the system calculated using Eigenvalue method. For identification and registration, and evaluation and information utilisation, external factors had high priority scores. For pedigree and performance recording, threats and weaknesses had the highest priority scores. Strengths factors could not sustain the required efficiency of the system. Weaknesses of the system predisposed it to threats. Available opportunities could be explored as interventions to restore efficiency in the system. Defensive strategies such as reorienting the system to offer utility benefits to recording, forming symbiotic and binding collaboration between recording organisations and NARS, and development of institutions to support recording were feasible.

  3. Spousal Coping Strategies in the Shadow of Terrorism.

    PubMed

    Shechory-Bitton, Mally; Cohen-Louck, Keren

    2017-11-01

    The present study focuses on spousal differences in reaction to ongoing exposure to terror and security threats. Sixty-eight married couples with children living in a region exposed to ongoing security threats were evaluated. All participants completed questionnaires on objective exposure (number of incidents) and subjective exposure (sense of fear) to terrorism and security threats, posttraumatic stress disorder (PTSD) symptoms, and their coping strategies with this ongoing exposure. Mothers reported higher levels of fear and PTSD symptoms, although their objective levels of exposure did not differ from those of their husbands. Similarities were found in coping strategies adopted by mothers and fathers to cope with life in the shadow of terrorism. Both mothers and fathers integrated emotion- and problem-focused coping strategies, with greater use of the latter. These similarities partially contradict research findings suggesting gender differences in coping with exposure to security threats. The results support the need for further research into investigating the role of dyadic coping in the context of prolonged exposure to security threats.

  4. Threat interferes with response inhibition.

    PubMed

    Hartikainen, Kaisa M; Siiskonen, Anna R; Ogawa, Keith H

    2012-05-09

    A potential threat, such as a spider, captures attention and engages executive functions to adjust ongoing behavior and avoid danger. We and many others have reported slowed responses to neutral targets in the context of emotional distractors. This behavioral slowing has been explained in the framework of attentional competition for limited resources with emotional stimuli prioritized. Alternatively, slowed performance could reflect the activation of avoidance/freezing-type motor behaviors associated with threat. Although the interaction of attention and emotion has been widely studied, little is known on the interaction between emotion and executive functions. We studied how threat-related stimuli (spiders) interact with executive performance and whether the interaction profile fits with a resource competition model or avoidance/freezing-type motor behaviors. Twenty-one young healthy individuals performed a Go-NoGo visual discrimination reaction time (RT) task engaging several executive functions with threat-related and emotionally neutral distractors. The threat-related distractors had no effect on the RT or the error rate in the Go trials. The NoGo error rate, reflecting failure in response inhibition, increased significantly because of threat-related distractors in contrast to neutral distractors, P less than 0.05. Thus, threat-related distractors temporarily impaired response inhibition. Threat-related distractors associated with increased commission errors and no effect on RT does not suggest engagement of avoidance/freezing-type motor behaviors. The results fit in the framework of the resource competition model. A potential threat calls for evaluation of affective significance as well as inhibition of undue emotional reactivity. We suggest that these functions tax executive resources and may render other executive functions, such as response inhibition, temporarily compromised when the demands for resources exceed availability.

  5. Threat Based Risk Assessment for Enterprise Networks

    DTIC Science & Technology

    2016-02-15

    served as the program chair of the Research in Attacks, Intrusions , and Defenses workshop; the Neural Information Processing Systems (NIPS) annual...Threat- Based Risk Assessment for Enterprise Networks Richard P. Lippmann and James F. Riordan Protecting enterprise networks requires...include aids for the hearing impaired, speech recognition, pattern classification, neural networks , and cybersecurity. He has taught three courses

  6. Coping with Self-Threat and the Evaluation of Self-Related Traits: An fMRI Study

    PubMed Central

    Corcoran, Katja; Ebner, Franz

    2015-01-01

    A positive view of oneself is important for a healthy lifestyle. Self-protection mechanisms such as suppressing negative self-related information help us to maintain a positive view of ourselves. This is of special relevance when, for instance, a negative test result threatens our positive self-view. To date, it is not clear which brain areas support self-protective mechanisms under self-threat. In the present functional magnetic resonance imaging (fMRI) study the participants (N = 46) received a (negative vs. positive) performance test feedback before entering the scanner. In the scanner, the participants were instructed to ascribe personality traits either to themselves or to a famous other. Our results showed that participants responded slower to negative self-related traits compared to positive self-related traits. High self-esteem individuals responded slower to negative traits compared to low self-esteem individuals following a self-threat. This indicates that high self-esteem individuals engage more in self-enhancing strategies after a threat by inhibiting negative self-related information more successfully than low self-esteem individuals. This behavioral pattern was mirrored in the fMRI data as dACC correlated positively with trait self-esteem. Generally, ACC activation was attenuated under threat when participants evaluated self-relevant traits and even more for negative self-related traits. We also found that activation in the ACC was negatively correlated with response times, indicating that greater activation of the ACC is linked to better access (faster response) to positive self-related traits and to impaired access (slower response) to negative self-related traits. These results confirm the ACC function as important in managing threatened self-worth but indicate differences in trait self-esteem levels. The fMRI analyses also revealed a decrease in activation within the left Hippocampus and the right thalamus under threat. This indicates that a down-regulation of activation in these regions might also serve as coping mechanism in dealing with self-threat. PMID:26333130

  7. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2015-03-01

    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends andmore » describes NNSA’s integrated threat reduction strategy.« less

  8. Does self-threat promote social connection? The role of self-esteem and contingencies of self-worth.

    PubMed

    Park, Lora E; Maner, Jon K

    2009-01-01

    Six studies examined the social motivations of people with high self-esteem (HSE) and low self-esteem (LSE) following a threat to a domain of contingent self-worth. Whether people desired social contact following self-threat depended on an interaction between an individual's trait self-esteem and contingencies of self-worth. HSE participants who strongly based self-worth on appearance sought to connect with close others following a threat to their physical attractiveness. LSE participants who staked self-worth on appearance wanted to avoid social contact and, instead, preferred a less interpersonally risky way of coping with self-threat (wanting to enhance their physical attractiveness). Implications for theories of self-esteem, motivation, and interpersonal processes are discussed.

  9. Assessing the risk of ignition in the Russian far east within a modeling framework of fire threat.

    PubMed

    Loboda, Tatiana V; Csiszar, Ivan A

    2007-04-01

    The forests of high biological importance in the Russian Far East (RFE) have been experiencing increasing pressure from growing demands for natural resources under the changing economy of post-Soviet Russia. This pressure is further amplified by the rising threat of large and catastrophic fire occurrence, which threatens both the resources and the economic potential of the region. In this paper we introduce a conceptual Fire Threat Model (FTM) and use it to provide quantitative assessment of the risk of ignition in the Russian Far East. The remotely sensed data driven FTM is aimed at evaluating potential wildland fire occurrence and its impact and recovery potential for a given resource. This model is intended for use by resource managers to assist in assessing current levels of fire threat to a given resource, projecting the changes in fire threat under changing climate and land use, and evaluating the efficiency of various management approaches aimed at minimizing the fire impact. Risk of ignition (one of the major uncertainties within fire threat modeling) was analyzed using the MODIS active fire product. The risk of ignition in the RFE is shown to be highly variable in spatial and temporal domains. However, the number of ignition points is not directly proportional to the amount of fire occurrence in the area. Fire ignitions in the RFE are strongly linked to anthropogenic activity (transportation routes, settlements, and land use). An increase in the number of fire ignitions during summer months could be attributed to (1) disruption of the summer monsoons and subsequent changes in fire weather and (2) an increase in natural sources of fire ignitions.

  10. Attentional bias to pain and social threat in pediatric patients with functional abdominal pain and pain-free youth before and after performance evaluation.

    PubMed

    Beck, Joy E; Lipani, Tricia A; Baber, Kari F; Dufton, Lynette; Garber, Judy; Smith, Craig A; Walker, Lynn S

    2011-05-01

    This study investigated attentional biases for pain and social threat versus neutral stimuli in 54 youth with functional abdominal pain (FAP) and 53 healthy control subjects (ages 10 to 16 years). We assessed attentional bias using a visual probe detection task (PDT) that presented pain and social threat words in comparison to neutral words at conscious (1250 ms) and preconscious (20 ms) presentation rates. We administered the PDT before and after random assignment of participants to a laboratory stressor--failure versus success feedback regarding their performance on a challenging computer game. All analyses controlled for trait anxiety. At the conscious rate of stimulus presentation, FAP patients exhibited preferential attention toward pain compared with neutral stimuli and compared with the control group. FAP patients maintained preferential attention toward conscious pain stimuli after performance feedback in both failure and success conditions. At the preconscious rate of stimulus presentation, FAP patients' attention was neutral at baseline but increased significantly toward pain stimuli after performance feedback in both failure and success conditions. FAP patients' somatic symptoms increased in both failure and success conditions; control youth's somatic symptoms only increased after failure. Regarding social threat, neither FAP nor control youth exhibited attentional bias toward social threat compared with neutral stimuli at baseline, but both FAP and control youth in the failure condition significantly increased attention away from social threat after failure feedback. Results suggest that FAP patients preferentially attend to pain stimuli in conscious awareness. Moreover, performance evaluation may activate their preconscious attention to pain stimuli. Copyright © 2011 International Association for the Study of Pain. Published by Elsevier B.V. All rights reserved.

  11. CTC Sentinel. Volume 3, Issue 8, August 2010. Evaluating the Al-Qaida Threat to the U.S. Homeland

    DTIC Science & Technology

    2010-08-01

    February and March 2010 as the suspects allegedly sought to obtain quantities of chemicals suitable for making peroxide-based high explosives, also...used by the 7/7 London bombers as well as by previously intercepted terrorist cells in Denmark and Germany. The amount of chemicals was far smaller...dangerous chemicals with harmless substances.11 9 “Norge var terrormålet,” Aftenposten, July 10, 2010; ”Eksplosivene ble ikke oppbevart hos siktede

  12. Arms control and The President's Strategic Defense Initiative

    NASA Astrophysics Data System (ADS)

    Bon, J. J.

    1985-04-01

    The President's Strategic Defense Initiative (SDI) provides the hope for eliminating the threat from ballistic missiles. This study evaluates the impact of SDI on existing and future arms control agreements. Because new or modified space-related treaties are a probable result of the SDI, this study concludes that the best single strategy for arms control negotiations is to preserve overall US interests and maintain open technological options vice severely limiting any space technology that might some day become part of a space-based defensive system.

  13. Evaluating the Effectiveness of a School-Based Cognitive Behavioural Therapy Intervention for Anxiety in Adolescents Diagnosed with Autism Spectrum Disorder.

    PubMed

    Luxford, Sarah; Hadwin, Julie A; Kovshoff, Hanna

    2017-12-01

    This study evaluated the effectiveness of a school-based Cognitive Behavioural Therapy (CBT) on symptoms of anxiety, social worry and social responsiveness, and indices of attentional control and attentional biases to threat in adolescents diagnosed with Autism Spectrum Disorder. Thirty-five young people (11-14 years; IQ > 70) with ASD and elevated teacher or parent reported anxiety were randomly assigned to 6 sessions of the Exploring Feelings CBT intervention (Attwood in Exploring feelings (anxiety). Future Horizons, Arlington, 2004) (n = 18) or a wait-list control group (n = 17). The intervention (compared to the wait-list control) group showed positive change for parent, teacher and self-reported anxiety symptoms, and more marginal effects of increased teacher-reported social responsiveness. The discussion highlights the potential value and limitations of school-based CBT for young people with ASD.

  14. Persistent and novel threats to the biodiversity of Kazakhstan’s steppes and semi-deserts

    USGS Publications Warehouse

    Kamp, Johannes; Koshkin, Maxim A; Bragina, Tatyana M; Katzner, Todd E.; Milner-Gulland, E J; Schreiber, Dagmar; Sheldon, Robert; Shmalenko, Alyona; Smelansky, Ilya; Terraube, Julien; Urazaliev, Ruslan

    2016-01-01

    Temperate grasslands have suffered disproportionally from conversion to cropland, degradation and fragmentation. A large proportion of the world’s remaining near-natural grassland is situated in Kazakhstan. We aimed to assess current and emerging threats to steppe and semi-desert biodiversity in Kazakhstan and evaluate conservation research priorities. We conducted a horizon-scanning exercise among conservationists from academia and practice. We first compiled a list of 45 potential threats. These were then ranked by the survey participants according to their perceived severity, the need for research on them, and their novelty. The highest-ranked threats were related to changes in land use (leading to habitat loss and deterioration), direct persecution of wildlife, and rapid infrastructure development due to economic and population growth. Research needs were identified largely in the same areas, and the mean scores of threat severity and research need were highly correlated. Novel threats comprised habitat loss by photovoltaic and wind power stations, climate change and changes in agriculture such as the introduction of biofuels. However, novelty was not correlated with threat severity or research priority, suggesting that the most severe threats are the established ones. Important goals towards more effective steppe and semi-desert conservation in Kazakhstan include more cross-sector collaboration (e.g. by involving stakeholders in conservation and agriculture), greater allocation of funds to under-staffed areas (e.g. protected area management), better representativeness and complementarity in the protected area system and enhanced data collection for wildlife monitoring and threat assessments (including the use of citizen-science databases).

  15. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    PubMed

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Defense policy planners and countermeasure developers are often faced with vexing problems involving the prioritization of resources and efforts. This is especially true in the area of Biodefense, where each new emerging infectious disease outbreak brings with it questions regarding the causative agent's potential for weaponization. Recent experience with West Nile Virus, Severe Acute Respiratory Syndrome, Monkeypox, and H1N1 Influenza highlights this problem. Appropriately, in each of these cases, the possibility of bioterrorism was raised, although each outbreak ultimately proved to have a natural origin. In fact, determining whether an outbreak has an unnatural origin can be quite difficult. Thus, the questions remain: could the causative agents of these and other emerging infectious disease outbreaks pose a future weaponization threat? And how great is that threat? Should precious resources be diverted from other defense efforts in order to prepare for possible hostile employment of novel diseases by belligerents? Answering such critical questions requires some form of systematic threat assessment. Through extensive collaborative work conducted within NATO's Biomedical Advisory Council, we developed a scoring matrix for evaluating the weaponization potential of the causative agents of such diseases and attempted to validate our matrix by examining the reproducibility of data using known threat agents. Our matrix included 12 attributes of a potential weapon and was provided, along with detailed scoring instructions, to 12 groups of biodefense experts in 6 NATO nations. Study participants were asked to score each of these 12 attributes on a scale of 0-3: Infectivity, Infection-to-Disease Ratio (Reliability), Predictability (& Incubation Period), Morbidity & Mortality (Virulence), Ease of Large-Scale Production & Storage, Aerosol Stability, Atmospheric Stability, Ease of Dispersal, Communicability, Prophylactic Countermeasure Availability, Therapeutic Countermeasure Availability, and Ease of Detection. Reproducibility of scoring data was assessed by examining the standard deviations (SD) of mean scores. Our results were unexpected. Several familiar biothreat diseases such as anthrax and tularemia were judged, by our experts, to be less threatening than many others owing to a number of factors including ease of detection, lack of communicability, and the ready availability of countermeasures. Conversely, several toxins were judged by experts to have very high potential as threat agents owing, in part, to their reliability, virulence, and a lack of available countermeasures. Agreement among experts, as determined by lower SD about a mean score, was greater for more familiar threats. Our study was designed to provide a concise and east-to-apply set of criteria that could be used by NATO nations to evaluate emerging infectious disease threats with respect to their weaponization potential. Our results were unexpected. We believe that a lack of appropriate weighting factors may explain these results and suggest that future studies weigh each of the 12 proposed criteria based on the intended use of the assessment data and other situational factors. We believe that the greatest value of our study lies in a codification of the attributes of a biological weapon. © Association of Military Surgeons of the United States 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  16. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  17. An Agent-Based Intervention to Assist Drivers Under Stereotype Threat: Effects of In-Vehicle Agents' Attributional Error Feedback.

    PubMed

    Joo, Yeon Kyoung; Lee-Won, Roselyn J

    2016-10-01

    For members of a group negatively stereotyped in a domain, making mistakes can aggravate the influence of stereotype threat because negative stereotypes often blame target individuals and attribute the outcome to their lack of ability. Virtual agents offering real-time error feedback may influence performance under stereotype threat by shaping the performers' attributional perception of errors they commit. We explored this possibility with female drivers, considering the prevalence of the "women-are-bad-drivers" stereotype. Specifically, we investigated how in-vehicle voice agents offering error feedback based on responsibility attribution (internal vs. external) and outcome attribution (ability vs. effort) influence female drivers' performance under stereotype threat. In addressing this question, we conducted an experiment in a virtual driving simulation environment that provided moment-to-moment error feedback messages. Participants performed a challenging driving task and made mistakes preprogrammed to occur. Results showed that the agent's error feedback with outcome attribution moderated the stereotype threat effect on driving performance. Participants under stereotype threat had a smaller number of collisions when the errors were attributed to effort than to ability. In addition, outcome attribution feedback moderated the effect of responsibility attribution on driving performance. Implications of these findings are discussed.

  18. Evaluation of melioration area damage on the river Danube caused by the hydroelectric power plant 'Djerdap 1' backwater.

    PubMed

    Pajic, P; Andjelic, L; Urosevic, U; Polomcic, D

    2014-01-01

    Construction of the hydroelectric power plant (HPP) 'Djerdap 1' formed a backwater effect on the Danube and its tributaries, which had an inevitable influence on groundwater level, causing it to rise and thus creating additional threats to all melioration areas on more than 300 km of the Danube riversides, as well as on the riversides of its tributaries: the Sava (100 km) and the Tisa (60 km). In this paper, the HPP 'Djerdap 1' backwater effect on some characteristic melioration areas (34 in all) has been analyzed. In most of these areas intensive agricultural activity has always been present. An assessment of agricultural production damage was carried out by complex hydrodynamic calculations (60 calculation profiles) for different backwater regimes, with the aim to precisely quantify the HPP 'Djerdap 1' backwater effect on groundwater piezometric levels. Combining them with complex agroeconomic analyses, the aim is to quantify agricultural production damage and to consider the perspective of melioration area users. This method, which combines two different, but compatible, aspects of the melioration area threat assessment (hydrodynamic and agroeconomic), may present a quality base for further agricultural production threat assessment on all melioration areas on the Danube riversides, with the final aim to consider the economic effects and the importance of its further protection.

  19. A Novel In Situ Simulation Intervention Used to Mitigate an Outbreak of Methicillin-Resistant Staphylococcus aureus in a Neonatal Intensive Care Unit.

    PubMed

    Gibbs, Kathleen; DeMaria, Samuel; McKinsey, Scarlett; Fede, Andrea; Harrington, Anne; Hutchison, Deborah; Torchen, Carol; Levine, Adam; Goldberg, Andrew

    2018-03-01

    To describe the successful implementation of an in situ simulation program to diagnose and correct latent safety threats in a level 4 neonatal intensive care unit (NICU) to mitigate a methicillin-resistant Staphylococcus aureus (MRSA) outbreak. An investigational report describes a simulation intervention that occurred during a 4-month MRSA outbreak in a single-center, 46-bed, newly renovated level 4 NICU. The simulation program was developed for all NICU providers in which they were exposed to a 30-minute in situ human simulation intervention that included education, evaluation, and debriefing to resolve perceived or observed latent safety threats. The primary study outcome was improved hand hygiene compliance and an enhanced estimate of the culture of safety during a 6-month period. A total of 99 healthcare providers including physicians, nurses, respiratory therapists, and environmental service workers completed the course. Before the simulation intervention, there were 18 patients colonized or infected with a single MRSA clone; after the intervention, there were no new episodes of colonization or infection. An in situ, simulation-based intervention can counter threats to patient safety related to workflow and lapses in infection control practices and improve patient outcomes. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Ballistic Evaluation of 7085 Aluminum

    DTIC Science & Technology

    2012-03-01

    direct-fire threats and a lower strength, higher ductility variant, 7085-T7E02, for underbody blast protection kits. Ballistic evaluation was...direct-fire threats and a lower strength, higher ductility variant, 7085-T7E02, for underbody blast protection kits. The U.S. Army Research Laboratory...0.40 max 0.25 max a 0.10 max 0.12 max Titanium 0.06 max 0.10 max 0.15 max 0.02–0.10 0.15 max 0.10 max Zinc 7.0–8.0 3.50–4.50 0.25 max 0.10 max 0.25

  1. Responsive Meta-Evaluation: A Participatory Approach to Enhancing Evaluation Quality

    ERIC Educational Resources Information Center

    Sturges, Keith M.; Howley, Caitlin

    2017-01-01

    In an era of ever-deepening budget cuts and a concomitant demand for substantiated programs, many organizations have elected to conduct internal program evaluations. Internal evaluations offer advantages (e.g., enhanced evaluator program knowledge and ease of data collection) but may confront important challenges, including credibility threats,…

  2. Minding and mending the gap: Social psychological interventions to reduce educational disparities.

    PubMed

    Spitzer, Brian; Aronson, Joshua

    2015-03-01

    Achievement gaps continue to garner a great deal of attention both in academic and in popular circles. Many students continue to struggle despite broad educational reforms aimed at narrowing these gaps in learning and performance. In this article, we review a number of social psychological interventions that show promise in reducing gaps in achievement, not by addressing structural barriers to achievement, but by helping students cope with threats to their identity that impair intellectual functioning and motivation. For example, interventions involving meditation, role models, emotional reappraisal, growth mindsets, imagining possible selves, self-affirmations, belongingness and cooperative learning have been shown to ameliorate threats to identity and raise achievement. We describe and evaluate these social psychological interventions. Many achievement gaps involve a psychological predicament: a threat to one's social identity or to one's sense of belonging. Students' implicit theories - how they mind the gap - can act as barriers to their success. By helping students cope with these threats, these theory-based interventions represent a genuine advance in the way schools may reduce gaps in achievement. These interventions show how students' educational success depends partly on fluid aspects of context - how tasks are framed, who else is in the room, or what they believe about intelligence. Because of this fluidity, these interventions may not work in all settings. Achievement gaps are ultimately caused by a variety of factors, both objective and subjective that produce inequality. The research reviewed here suggests that even without changes in objective barriers to success, brief psychological interventions can narrow what many see as intractable gaps in academic achievement. © 2015 The British Psychological Society.

  3. The dilemma of dual use biological research: Polish perspective.

    PubMed

    Czarkowski, Marek

    2010-03-01

    Biological research with legitimate scientific purpose that may be misused to pose a biological threat to public health and/or national security is termed dual use. In Poland there are adequate conditions for conducting experiments that could be qualified as dual use research, and therefore, a risk of attack on Poland or other countries exists. Optimal solutions for limiting such threats are required, and the national system of biosecurity should enable early, reliable, and complete identification of this type of research. Scientists should have a fundamental role in this process, their duty being to immediately, upon identification, report research with dual use potential. An important entity in the identification system of dual use research should also be the Central Register of Biological and Biomedical Research, which gathers information about all biological and biomedical research being conducted in a given country. Publishers, editors, and review committees of journals and other scientific publications should be involved in evaluating results of clinical trials. The National Council of Biosecurity should be the governmental institution responsible for developing a system of dual use research threat prevention. Its role would be to develop codes of conduct, form counsel of expertise, and monitor the problem at national level, while the Dual Use Research Committee would be responsible for individual cases. In Poland, current actions aiming to provide biological safety were based on developing and passing an act about genetically modified organisms (GMO's) and creating a GMO Committee. Considering experiences of other nations, one should view these actions as fragmentary, and thus insufficient protection against dual use research threats.

  4. If it bleeds, it leads: separating threat from mere negativity

    PubMed Central

    Boshyan, Jasmine; Adams, Reginald B.; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F.

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. PMID:24493851

  5. Threat-related selective attention predicts treatment success in childhood anxiety disorders.

    PubMed

    Legerstee, Jeroen S; Tulen, Joke H M; Kallen, Victor L; Dieleman, Gwen C; Treffers, Philip D A; Verhulst, Frank C; Utens, Elisabeth M W J

    2009-02-01

    The present study examined whether threat-related selective attention was predictive of treatment success in children with anxiety disorders and whether age moderated this association. Specific components of selective attention were examined in treatment responders and nonresponders. Participants consisted of 131 children with anxiety disorders (aged 8-16 years), who received standardized cognitive-behavioral therapy. At pretreatment, a pictorial dot-probe task was administered to assess selective attention. Both at pretreatment and posttreatment, diagnostic status of the children was evaluated with a semistructured clinical interview (the Anxiety Disorders Interview Schedule for Children). Selective attention for severely threatening pictures at pretreatment assessment was predictive of treatment success. Examination of the specific components of selective attention revealed that nonresponders showed difficulties to disengage their attention away from severe threat. Treatment responders showed a tendency not to engage their attention toward severe threat. Age was not associated with selective attention and treatment success. Threat-related selective attention is a significant predictor of treatment success in children with anxiety disorders. Clinically anxious children with difficulties disengaging their attention away from severe threat profit less from cognitive-behavioral therapy. For these children, additional training focused on learning to disengage attention away from anxiety-arousing stimuli may be beneficial.

  6. Riverine threat indices to assess watershed condition and identify primary management capacity of agriculture natural resource management agencies.

    PubMed

    Fore, Jeffrey D; Sowa, Scott P; Galat, David L; Annis, Gust M; Diamond, David D; Rewa, Charles

    2014-03-01

    Managers can improve conservation of lotic systems over large geographies if they have tools to assess total watershed conditions for individual stream segments and can identify segments where conservation practices are most likely to be successful (i.e., primary management capacity). The goal of this research was to develop a suite of threat indices to help agriculture resource management agencies select and prioritize watersheds across Missouri River basin in which to implement agriculture conservation practices. We quantified watershed percentages or densities of 17 threat metrics that represent major sources of ecological stress to stream communities into five threat indices: agriculture, urban, point-source pollution, infrastructure, and all non-agriculture threats. We identified stream segments where agriculture management agencies had primary management capacity. Agriculture watershed condition differed by ecoregion and considerable local variation was observed among stream segments in ecoregions of high agriculture threats. Stream segments with high non-agriculture threats were most concentrated near urban areas, but showed high local variability. 60 % of stream segments in the basin were classified as under U.S. Department of Agriculture's Natural Resources Conservation Service (NRCS) primary management capacity and most segments were in regions of high agricultural threats. NRCS primary management capacity was locally variable which highlights the importance of assessing total watershed condition for multiple threats. Our threat indices can be used by agriculture resource management agencies to prioritize conservation actions and investments based on: (a) relative severity of all threats, (b) relative severity of agricultural threats, and (c) and degree of primary management capacity.

  7. Stereotype Threat and College Academic Performance: A Latent Variables Approach*

    PubMed Central

    Owens, Jayanti; Massey, Douglas S.

    2013-01-01

    Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using summed indicators and predicted relationships modeled using ordinary least squares. Using the National Longitudinal Survey of Freshman, this study overcomes previous methodological shortcomings by developing a latent construct model of stereotype threat. Theoretical constructs and equations are estimated simultaneously from multiple indicators, yielding a more reliable, valid, and parsimonious test of key propositions. Findings additionally support the view that social stigma can indeed have strong negative effects on the academic performance of pejoratively stereotyped racial-minority group members, not only in laboratory settings, but also in the real world. PMID:23950616

  8. Towards a framework for assessment and management of cumulative human impacts on marine food webs.

    PubMed

    Giakoumi, Sylvaine; Halpern, Benjamin S; Michel, Loïc N; Gobert, Sylvie; Sini, Maria; Boudouresque, Charles-François; Gambi, Maria-Cristina; Katsanevakis, Stelios; Lejeune, Pierre; Montefalcone, Monica; Pergent, Gerard; Pergent-Martini, Christine; Sanchez-Jerez, Pablo; Velimirov, Branko; Vizzini, Salvatrice; Abadie, Arnaud; Coll, Marta; Guidetti, Paolo; Micheli, Fiorenza; Possingham, Hugh P

    2015-08-01

    Effective ecosystem-based management requires understanding ecosystem responses to multiple human threats, rather than focusing on single threats. To understand ecosystem responses to anthropogenic threats holistically, it is necessary to know how threats affect different components within ecosystems and ultimately alter ecosystem functioning. We used a case study of a Mediterranean seagrass (Posidonia oceanica) food web and expert knowledge elicitation in an application of the initial steps of a framework for assessment of cumulative human impacts on food webs. We produced a conceptual seagrass food web model, determined the main trophic relationships, identified the main threats to the food web components, and assessed the components' vulnerability to those threats. Some threats had high (e.g., coastal infrastructure) or low impacts (e.g., agricultural runoff) on all food web components, whereas others (e.g., introduced carnivores) had very different impacts on each component. Partitioning the ecosystem into its components enabled us to identify threats previously overlooked and to reevaluate the importance of threats commonly perceived as major. By incorporating this understanding of system vulnerability with data on changes in the state of each threat (e.g., decreasing domestic pollution and increasing fishing) into a food web model, managers may be better able to estimate and predict cumulative human impacts on ecosystems and to prioritize conservation actions. © 2015 Society for Conservation Biology.

  9. A simple strategy to reduce stereotype threat for orthopedic residents.

    PubMed

    Gomez, Everlyne; Wright, James G

    2014-04-01

    Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR.

  10. Developmental changes in threat and self-blame for preschoolers exposed to intimate partner violence (IPV).

    PubMed

    Miller, Laura E; Howell, Kathryn H; Graham-Bermann, Sandra A

    2014-06-01

    The presence of threat and self-blame in children exposed to violence in the home has been linked to a number of negative behavioral and emotional consequences across developmental periods. Little research, however, has examined self-reported attributions of threat and self-blame in children under the age of 6. The current study evaluated the developmental trajectories of appraisals of threat and self-blame in preschool-aged children recently exposed to intimate partner violence. It was hypothesized that (a) children's appraisals of threat and self-blame would naturally decrease over time and (b) there would be a main effect of child sex on appraisals of self-blame but not threat, such that girls would report higher levels of self-blame than boys. Participants included 68 preschool-aged children (ages 4-6) who were interviewed at two time points over the course of 1 year. Multilevel modeling was employed to examine the effects of violence exposure, child age, and child sex over time. Children's attributions of threat were stable over the course of 1 year, but greater child age was related to lower appraisals of threat. Children's appraisals of self-blame increased over time, and there was a trend for girls to report more self-blame than did boys. It appears that without intervention, young children may be at risk of developing relatively stable maladaptive cognitive patterns, thereby heightening their risk of subsequent developmental psychopathology. Furthermore, girls may need additional intervention targeted at addressing attributions of self-blame.

  11. Stakeholder reactions toward iodine biofortified foods. An application of protection motivation theory.

    PubMed

    De Steur, Hans; Mogendi, Joseph Birundu; Wesana, Joshua; Makokha, Anselimo; Gellynck, Xavier

    2015-09-01

    To use Protection Motivation Theory (PMT) to evaluate stakeholders' intention to adopt iodine biofortified foods as an alternative means to improve children's iodine status and overall school performance. A survey was administered with 360 parents of primary school children and 40 school heads. Protection motivation is measured through matching the cognitive processes they use to evaluate iodine deficiency (threat appraisal), as well as iodine biofortified foods to reduce the threat (coping appraisal). Data were analyzed through Robust (Cluster) regression analysis. Gender had a significant effect on coping appraisal for school heads, while age, education, occupation, income, household size and knowledge were significant predictors of threat, coping appraisal and/or protection motivation intention among parents. Nevertheless, in the overall protection motivation model, only two coping factors, namely self-efficacy (parents) and response cost (school heads), influenced the intention to adopt iodine biofortified foods. School feeding programs incorporating iodine biofortification should strive to increase not only consumer knowledge about iodine but also its association to apparent deficiency disorders, boost self-efficacy and ensure that the costs incurred are not perceived as barriers of adoption. The insignificant threat appraisal effects lend support for targeting future communication on biofortification upon the strategies itself, rather than on the targeted micronutrient deficiency. PMT, and coping factors in particular, seem to be valuable in assessing intentions to adopt healthy foods. Nevertheless, research is needed to improve the impacts of threat appraisal factors. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. The main concern of burn survivors in Iran

    PubMed Central

    Zamanzadeh, Vahid; Valizadeh, Lila; Lotfi, Mojgan; Salehi, Feridoon; Khalili, Assef

    2016-01-01

    Background: The present work was conducted to study the burn patients’ experiences to get an insight into their main concerns when they suffer the tragic event, recover from it, and adjust back in the society, so that better rehabilitation programs can be planned corresponding to their needs as well as to the needs of the society and the existing situations. Materials and Methods: In this qualitative study, 17 burn survivors were enrolled. Unstructured interviews were used for data collection. All the interviews were recorded, transcribed, and analyzed using qualitative content analysis method. Results: Based on the existing elements of the explicit textual meanings, two categories of threat and disturbance were formed. The category of threat was extracted from the following five subcategories: (a) Threat to physical life; (b) threat to the process of living; (c) psychological threat; (d) spiritual threat; and (e) social threat. The category of disturbance was extracted from the following three subcategories: (a) Sensory disturbance: Suffering pain; (b) self-concept disturbance; and (c) behavioral disturbance. Conclusions: Burn survivors experience severe pain, enduring and suffering in their daily activities after burn. Passing through these difficult trajectories is perceived as a threat and disturbance in self-integrity. PMID:27563326

  13. [Leaking: Frequency and correlates of announcements and threats of homicidal violence reported by Berlin schools between 1996 and 2007].

    PubMed

    Leuschner, Vincenz; Bondü, Rebecca; Allroggen, Marc; Scheithauer, Herbert

    2016-01-01

    Threats and announcements of homicidal violence at schools may have massive consequences like evacuations, police searches, criminal investigations, or loss of the sense of security by students, teachers, and parents. However, there is a lack of systematic studies about that phenomenon. The present article would like to contribute to closing the research gap. It presents results about the frequency and structure of threats and announcements of homicidal violence in schools in Berlin. The study is based on an official dataset from school administration reports of violent acts in Berlin schools which has been studied within the Berlin Leaking-Projekt. The sample consists of 427 threats and announcements of homicidal violence between 1996 and 2007. The study is an exceptional analysis of the phenomenon: it presents crosscutting results about frequency and characteristics of threats and the threatening students as well as results of a longitudinal analysis about the development of threats and announcements. Results show a rate of 0,3 threats and announcements per 1 000 student and year. During the observation time span a steady increase of threats and announcements – year by year, influenced by imitation effects after school shootings – has been observed.

  14. Detecting Anomalous Insiders in Collaborative Information Systems

    PubMed Central

    Chen, You; Nyemba, Steve; Malin, Bradley

    2012-01-01

    Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on the access logs of collaborative environments. The framework is based on the observation that typical CIS users tend to form community structures based on the subjects accessed (e.g., patients’ records viewed by healthcare providers). CADS consists of two components: 1) relational pattern extraction, which derives community structures and 2) anomaly prediction, which leverages a statistical model to determine when users have sufficiently deviated from communities. We further extend CADS into MetaCADS to account for the semantics of subjects (e.g., patients’ diagnoses). To empirically evaluate the framework, we perform an assessment with three months of access logs from a real electronic health record (EHR) system in a large medical center. The results illustrate our models exhibit significant performance gains over state-of-the-art competitors. When the number of illicit users is low, MetaCADS is the best model, but as the number grows, commonly accessed semantics lead to hiding in a crowd, such that CADS is more prudent. PMID:24489520

  15. Prevention of homicidal violence in schools in Germany: the Berlin Leaking Project and the Networks Against School Shootings Project (NETWASS).

    PubMed

    Leuschner, Vincenz; Bondü, Rebecca; Schroer-Hippel, Miriam; Panno, Jennifer; Neumetzler, Katharina; Fisch, Sarah; Scholl, Johanna; Scheithauer, Herbert

    2011-01-01

    Since 1999, Germany has experienced at least twelve serious cases of targeted school violence. This article describes two projects designed to fill the gap between universal prevention and emergency response in preventing severe forms of school violence in Germany. The Berlin Leaking Project examined the viability of preventive efforts based on early identification of leaking behavior that often precedes targeted school attacks. Leaking refers to any behavior or communication that indicates a student is preparing to carry out a violent attack. This would include explicit or implied threats of violence, apparent fascination with prior acts of violence such as Columbine, and any evidence of planning or preparation to carry out an attack. The NETWASS project will test a training program and intervention strategy based on those findings, examining the usefulness of a threat assessment approach to prevent violence by training teachers to recognize leaking behavior by students. This approach is extended by training teachers on a larger scale to identify leaking and then having a school-based team evaluate the student and initiate appropriate interventions, such as mental health services, and in some cases, law enforcement action. Copyright © 2011 Wiley Periodicals, Inc., A Wiley Company.

  16. Dogs Evaluate Threatening Facial Expressions by Their Biological Validity – Evidence from Gazing Patterns

    PubMed Central

    Somppi, Sanni; Törnqvist, Heini; Kujala, Miiamaaria V.; Hänninen, Laura; Krause, Christina M.; Vainio, Outi

    2016-01-01

    Appropriate response to companions’ emotional signals is important for all social creatures. The emotional expressions of humans and non-human animals have analogies in their form and function, suggesting shared evolutionary roots, but very little is known about how animals other than primates view and process facial expressions. In primates, threat-related facial expressions evoke exceptional viewing patterns compared with neutral or positive stimuli. Here, we explore if domestic dogs (Canis familiaris) have such an attentional bias toward threatening social stimuli and whether observed emotional expressions affect dogs’ gaze fixation distribution among the facial features (eyes, midface and mouth). We recorded the voluntary eye gaze of 31 domestic dogs during viewing of facial photographs of humans and dogs with three emotional expressions (threatening, pleasant and neutral). We found that dogs’ gaze fixations spread systematically among facial features. The distribution of fixations was altered by the seen expression, but eyes were the most probable targets of the first fixations and gathered longer looking durations than mouth regardless of the viewed expression. The examination of the inner facial features as a whole revealed more pronounced scanning differences among expressions. This suggests that dogs do not base their perception of facial expressions on the viewing of single structures, but the interpretation of the composition formed by eyes, midface and mouth. Dogs evaluated social threat rapidly and this evaluation led to attentional bias, which was dependent on the depicted species: threatening conspecifics’ faces evoked heightened attention but threatening human faces instead an avoidance response. We propose that threatening signals carrying differential biological validity are processed via distinctive neurocognitive pathways. Both of these mechanisms may have an adaptive significance for domestic dogs. The findings provide a novel perspective on understanding the processing of emotional expressions and sensitivity to social threat in non-primates. PMID:26761433

  17. Model description and evaluation of the mark-recapture survival model used to parameterize the 2012 status and threats analysis for the Florida manatee (Trichechus manatus latirostris)

    USGS Publications Warehouse

    Langtimm, Catherine A.; Kendall, William L.; Beck, Cathy A.; Kochman, Howard I.; Teague, Amy L.; Meigs-Friend, Gaia; Peñaloza, Claudia L.

    2016-11-30

    This report provides supporting details and evidence for the rationale, validity and efficacy of a new mark-recapture model, the Barker Robust Design, to estimate regional manatee survival rates used to parameterize several components of the 2012 version of the Manatee Core Biological Model (CBM) and Threats Analysis (TA).  The CBM and TA provide scientific analyses on population viability of the Florida manatee subspecies (Trichechus manatus latirostris) for U.S. Fish and Wildlife Service’s 5-year reviews of the status of the species as listed under the Endangered Species Act.  The model evaluation is presented in a standardized reporting framework, modified from the TRACE (TRAnsparent and Comprehensive model Evaluation) protocol first introduced for environmental threat analyses.  We identify this new protocol as TRACE-MANATEE SURVIVAL and this model evaluation specifically as TRACE-MANATEE SURVIVAL, Barker RD version 1. The longer-term objectives of the manatee standard reporting format are to (1) communicate to resource managers consistent evaluation information over sequential modeling efforts; (2) build understanding and expertise on the structure and function of the models; (3) document changes in model structures and applications in response to evolving management objectives, new biological and ecological knowledge, and new statistical advances; and (4) provide greater transparency for management and research review.

  18. The Defense Threat Reduction Agency's Technical Nuclear Forensics Research and Development Program

    NASA Astrophysics Data System (ADS)

    Franks, J.

    2015-12-01

    The Defense Threat Reduction Agency (DTRA) Technical Nuclear Forensics (TNF) Research and Development (R&D) Program's overarching goal is to design, develop, demonstrate, and transition advanced technologies and methodologies that improve the interagency operational capability to provide forensics conclusions after the detonation of a nuclear device. This goal is attained through the execution of three focus areas covering the span of the TNF process to enable strategic decision-making (attribution): Nuclear Forensic Materials Exploitation - Development of targeted technologies, methodologies and tools enabling the timely collection, analysis and interpretation of detonation materials.Prompt Nuclear Effects Exploitation - Improve ground-based capabilities to collect prompt nuclear device outputs and effects data for rapid, complementary and corroborative information.Nuclear Forensics Device Characterization - Development of a validated and verified capability to reverse model a nuclear device with high confidence from observables (e.g., prompt diagnostics, sample analysis, etc.) seen after an attack. This presentation will outline DTRA's TNF R&D strategy and current investments, with efforts focusing on: (1) introducing new technical data collection capabilities (e.g., ground-based prompt diagnostics sensor systems; innovative debris collection and analysis); (2) developing new TNF process paradigms and concepts of operations to decrease timelines and uncertainties, and increase results confidence; (3) enhanced validation and verification (V&V) of capabilities through technology evaluations and demonstrations; and (4) updated weapon output predictions to account for the modern threat environment. A key challenge to expanding these efforts to a global capability is the need for increased post-detonation TNF international cooperation, collaboration and peer reviews.

  19. Use of the Persuasive Health Message framework in the development of a community-based mammography promotion campaign

    PubMed Central

    Johnson-Turbes, Ashani

    2015-01-01

    Purpose We describe how the Persuasive Health Message (PHM) framework was used to guide the formative evaluation informing development of messages and materials used in a community-based multi-media campaign intended to motivate low-income African American women to obtain low- or no-cost mammograms through the CDC’s National Breast and Cervical Cancer Early Detection Program. Methods Seventy-eight African American women were recruited for eight focus groups that discussed breast cancer screening. The moderator guide was developed in accordance with the PHM framework and solicited information on perceived threat and efficacy, cues, salient beliefs and referents, and barriers to self-efficacy. Results We created persuasive messages to emphasize that African American women are susceptible to the threat of breast cancer, but that their personal action in obtaining regular mammograms may lead to early detection, subsequent treatment, and reduced cancer mortality. The messages addressed concerns of self-efficacy by emphasizing that uninsured women can also obtain high-quality low- or no-cost mammograms. In an attempt to combat the sentiment that breast cancer is a death sentence, the messages indicated that breast cancer can be successfully treated, especially when detected early. Conclusions The PHM framework consists of three steps: (1) determine information about threat and efficacy; (2) develop an audience profile; and (3) construct a persuasive message. It offered our team easy-to-follow, flexible steps to create a persuasive and effective campaign promoting awareness and use of mammogram screening among low-income African American women. PMID:25724414

  20. Social identity modifies face perception: an ERP study of social categorization.

    PubMed

    Derks, Belle; Stedehouder, Jeffrey; Ito, Tiffany A

    2015-05-01

    Two studies examined whether social identity processes, i.e. group identification and social identity threat, amplify the degree to which people attend to social category information in early perception [assessed with event-related brain potentials (ERPs)]. Participants were presented with faces of Muslims and non-Muslims in an evaluative priming task while ERPs were measured and implicit evaluative bias was assessed. Study 1 revealed that non-Muslims showed stronger differentiation between ingroup and outgroup faces in both early (N200) and later processing stages (implicit evaluations) when they identified more strongly with their ethnic group. Moreover, identification effects on implicit bias were mediated by intergroup differentiation in the N200. In Study 2, social identity threat (vs control) was manipulated among Muslims. Results revealed that high social identity threat resulted in stronger differentiation of Muslims from non-Muslims in early (N200) and late (implicit evaluations) processing stages, with N200 effects again predicting implicit bias. Combined, these studies reveal how seemingly bottom-up early social categorization processes are affected by individual and contextual variables that affect the meaning of social identity. Implications of these results for the social identity perspective as well as social cognitive theories of person perception are discussed. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  1. Healthcare information system approaches based on middleware concepts.

    PubMed

    Holena, M; Blobel, B

    1997-01-01

    To meet the challenges for efficient and high-level quality, health care systems must implement the "Shared Care" paradigm of distributed co-operating systems. To this end, both the newly developed and legacy applications must be fully integrated into the care process. These requirements can be fulfilled by information systems based on middleware concepts. In the paper, the middleware approaches HL7, DHE, and CORBA are described. The relevance of those approaches to the healthcare domain is documented. The description presented here is complemented through two other papers in this volume, concentrating on the evaluation of the approaches, and on their security threats and solutions.

  2. Vibrational spectroscopy standoff detection of threat chemicals

    NASA Astrophysics Data System (ADS)

    Ortiz-Rivera, William; Pacheco-Londoño, Leonardo C.; Castro-Suarez, John R.; Felix-Rivera, Hilsamar; Hernandez-Rivera, Samuel P.

    2011-06-01

    Spectroscopy based standoff detection systems: Raman and FTIR have been tested for detection of threat chemicals, including highly energetic materials, homemade explosives, explosives formulations and high explosives mixtures. Other threat chemicals studied included toxic industrial compounds (TIC) and chemical agent simulants. Microorganisms and biological threat agent simulants have also been detected at standoff distances. Open Path FTIR has been used to detect vapors and chemicals deposited on metal surfaces at μg/cm2 levels at distances as far as 30 m in active mode and 60 m in passive mode. In the case of Raman telescope, standoff distances for acetonitrile and ammonium nitrate were 140 m.

  3. Creating supportive nutrition environments for population health impact and health equity: an overview of the Nutrition and Obesity Policy Research and Evaluation Network's efforts.

    PubMed

    Blanck, Heidi M; Kim, Sonia A

    2012-09-01

    Childhood obesity is a major threat to individual health and society overall. Policies that support healthier food and beverage choices have been endorsed by many decision makers. These policies may reach a large proportion of the population or in some circumstances aim to reduce nutrition disparities to ensure health equity. The Nutrition and Obesity Policy Research and Evaluation Network (NOPREN) evaluates policy as a tool to improve food and beverage environments where Americans live, work, play, and learn. The network aspires to address research and evaluation gaps related to relevant policies, create standardized research tools, and help build the evidence base of effective policy solutions for childhood obesity prevention with a focus on reach, equity, cost effectiveness, and sustainability. Published by Elsevier Inc.

  4. An Integrated 0-1 Hour First-Flash Lightning Nowcasting, Lightning Amount and Lightning Jump Warning Capability

    NASA Technical Reports Server (NTRS)

    Mecikalski, John; Jewett, Chris; Carey, Larry; Zavodsky, Brad; Stano, Geoffrey; Chronis, Themis

    2015-01-01

    Using satellite-based methods that provide accurate 0-1 hour convective initiation (CI) nowcasts, and rely on proven success coupling satellite and radar fields in the Corridor Integrated Weather System (CIWS; operated and developed at MIT-Lincoln Laboratory), to subsequently monitor for first-flash lightning initiation (LI) and later period lightning trends as storms evolve. Enhance IR-based methods within the GOES-R CI Algorithm (that must meet specific thresholds for a given cumulus cloud before the cloud is considered to have an increased likelihood of producing lightning next 90 min) that forecast LI. Integrate GOES-R CI and LI fields with radar thresholds (e.g., first greater than or equal to 40 dBZ echo at the -10 C altitude) and NWP model data within the WDSS-II system for LI-events from new convective storms. Track ongoing lightning using Lightning Mapping Array (LMA) and pseudo-Geostationary Lightning Mapper (GLM) data to assess per-storm lightning trends (e.g., as tied to lightning jumps) and outline threat regions. Evaluate the ability to produce LI nowcasts through a "lightning threat" product, and obtain feedback from National Weather Service forecasters on its value as a decision support tool.

  5. A Comparison of the Attitudes of Spanish and American Secondary Science Teachers toward Global Science and Technology Based Problems/Threats

    ERIC Educational Resources Information Center

    Guisasola, Jenaro; Robinson, Mike; Zuza, Kristina

    2007-01-01

    In this study, Spanish and US secondary science teacher data is used to address the relationship between what science teachers teach and the science and technology based environmental problems/threats faced by the world. The results of a two part questionnaire indicated that teachers of both countries are worried about the problem of pollution of…

  6. On Learning: Metrics Based Systems for Countering Asymmetric Threats

    DTIC Science & Technology

    2006-05-25

    of self- education . While this alone cannot guarantee organizational learning , no organization can learn without a spirit of individual learning ...held views on globalization and the impact of Information Age technology . The emerging environment conceptually links to the learning model as part...On Learning : Metrics Based Systems for Countering Asymmetric Threats A Monograph by MAJ Rafael Lopez U.S. Army School of Advanced Military

  7. Inducing Attitude Change toward Online Gaming among Adolescent Players Based on Dissonance Theory: The Role of Threats and Justification of Effort

    ERIC Educational Resources Information Center

    Wan, Chin-Sheng; Chiou, Wen-Bin

    2010-01-01

    The negative impact of online gaming on adolescents has received much attention. The question of how to reduce their pathological use of online gaming is a critical issue. Based on the concept of external justification in dissonance theory, this experimental study aimed to examine whether severity of threat and justification of effort would impact…

  8. Use of fear and threat-based messages to motivate preparedness: Costs, consequences and other choices: part one.

    PubMed

    Jones, Ana-Marie

    Over the last several decades, billions of dollars have been spent in the USA to increase its disaster readiness and response capacity. Virtually every poll and survey shows that the US public remains woefully underprepared. At the 2012 'Awareness to Action' workshop convened by the Federal Emergency Management Agency (FEMA) and the American Red Cross to examine the future of the long-standing 'Have a Kit. Make a Plan. Be Informed' preparedness campaign, FEMA Administrator Craig Fugate acknowledged that traditional efforts have not 'moved the preparedness needle'. The most frequently cited causes for lack of preparedness in the general public are consumer apathy, lack of time, lack of money and the lack of knowledge on how best to prepare. This paper explores the reliance on fear- and threat-based messages (also referred to as 'fear appeals' to promote preparedness as a significant cause for this lack of preparation. It will look at the growing body of fear research, how fear and threat appeals are pervasive in emergency management, as well as its costs, unintended consequences and the other choices that can be made. The author asserts that by eliminating fear and threat-based messages, new messengers can share readiness as an accessible, empowering and valued pursuit for all communities - entirely distinct from the disasters and threats that people face.

  9. Use of fear and threat-based messages to motivate preparedness: costs, consequences and other choices. Part Two.

    PubMed

    Jones, Ana-Marie

    2013-01-01

    Over the last several decades, billions of dollars have been spent in the USA to increase disaster readiness and response capacity. Virtually every poll and survey shows that the US public remains woefully underprepared. At the 2012 'Awareness to Action' workshop convened by the Federal Emergency Management Agency (FEMA) and the American Red Cross to examine the future of the long-standing 'Have a Kit. Make a Plan. Be Informed' preparedness campaign, FEMA Administrator Craig Fugate acknowledged that traditional efforts have not 'moved the preparedness needle'. The most frequently cited causes for lack of preparedness in the general public are consumer apathy, lack of time, lack of money and the lack of knowledge on how best to prepare. This paper explores the reliance on fear and threat-based messages (also referred to as 'fear appeals') to promote preparedness as a significant cause for this lack of preparation. It will look at the growing body of fear research, how fear and threat appeals are pervasive in emergency management, as well as their costs, unintended consequences and the other choices that can be made. The author asserts that by eliminating fear and threat-based messages, new messengers can share readiness as an accessible, empowering and valued pursuit for all communities - entirely distinct from the disasters and threats that are faced.

  10. The impact of joint responses of devices in an airport security system.

    PubMed

    Nie, Xiaofeng; Batta, Rajan; Drury, Colin G; Lin, Li

    2009-02-01

    In this article, we consider a model for an airport security system in which the declaration of a threat is based on the joint responses of inspection devices. This is in contrast to the typical system in which each check station independently declares a passenger as having a threat or not having a threat. In our framework the declaration of threat/no-threat is based upon the passenger scores at the check stations he/she goes through. To do this we use concepts from classification theory in the field of multivariate statistics analysis and focus on the main objective of minimizing the expected cost of misclassification. The corresponding correct classification and misclassification probabilities can be obtained by using a simulation-based method. After computing the overall false alarm and false clear probabilities, we compare our joint response system with two other independently operated systems. A model that groups passengers in a manner that minimizes the false alarm probability while maintaining the false clear probability within specifications set by a security authority is considered. We also analyze the staffing needs at each check station for such an inspection scheme. An illustrative example is provided along with sensitivity analysis on key model parameters. A discussion is provided on some implementation issues, on the various assumptions made in the analysis, and on potential drawbacks of the approach.

  11. Intergroup Leadership Across Distinct Subgroups and Identities.

    PubMed

    Rast, David E; Hogg, Michael A; van Knippenberg, Daan

    2018-03-01

    Resolving intergroup conflict is a significant and often arduous leadership challenge, yet existing theory and research rarely, if ever, discuss or examine this situation. Leaders confront a significant challenge when they provide leadership across deep divisions between distinct subgroups defined by self-contained identities-The challenge is to avoid provoking subgroup identity distinctiveness threat. Drawing on intergroup leadership theory, three studies were conducted to test the core hypothesis that, where identity threat exists, leaders promoting an intergroup relational identity will be better evaluated and are more effective than leaders promoting a collective identity; in the absence of threat, leaders promoting a collective identity will prevail. Studies 1 and 2 ( N = 170; N = 120) supported this general proposition. Study 3 ( N = 136) extended these findings, showing that leaders promoting an intergroup relational identity, but not a collective identity, improved intergroup attitudes when participants experienced an identity distinctiveness threat.

  12. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  13. The Insider Threat to Cybersecurity: How Group Process and Ignorance Affect Analyst Accuracy and Promptitude

    DTIC Science & Technology

    2017-09-01

    meta-analytic review and theoretical integration . Journal of Personality and Social Psychology ,65(4), 681. Karr-Wisniewski, P., & Lu, Y. (2010...dissertation applies attribution theory, a product of cognitive psychology , to evaluate how analysts collectively and individually make attributions in...Likewise, many researchers agree that anomaly detection is an integral component for insider threat analysis (Brdiczka, Liu, Price, Shen, Patil, Chow

  14. Threats to private forest lands in the U.S.A.: a forests on the edge study

    Treesearch

    Mark H. Hatfield; Ronald E. McRoberts; Dacia M. Meneguzzo; Sara Comas

    2010-01-01

    The Forests on the Edge project, sponsored by the USDA Forest Service, uses geographic information systems to construct and analyze maps depicting threats to the contributions of America’s private forest lands. For this study, watersheds across the conterminous United States are evaluated with respect to the amount of their private forest land. Watersheds with at least...

  15. Linguistic threat activates the human amygdala

    PubMed Central

    Isenberg, N.; Silbersweig, D.; Engelien, A.; Emmerich, S.; Malavade, K.; Beattie, B.; Leon, A. C.; Stern, E.

    1999-01-01

    Studies in animals demonstrate a crucial role for the amygdala in emotional and social behavior, especially as related to fear and aggression. Whereas lesion and functional-imaging studies in humans indicate the amygdala’s participation in assessing the significance of nonverbal as well as paralinguistic cues, direct evidence for its role in the emotional processing of linguistic cues is lacking. In this study, we use a modified Stroop task along with a high-sensitivity neuroimaging technique to target the neural substrate engaged specifically when processing linguistic threat. Healthy volunteer subjects were instructed to name the color of words of either threat or neutral valence, presented in different color fonts, while neural activity was measured by using H215O positron-emission tomography. Bilateral amygdalar activation was significantly greater during color naming of threat words than during color naming of neutral words. Associated activations were also noted in sensory-evaluative and motor-planning areas of the brain. Thus, our results demonstrate the amygdala’s role in the processing of danger elicited by language. In addition, the results reinforce the amygdala’s role in the modulation of the perception of, and response to, emotionally salient stimuli. The current study further suggests conservation of phylogenetically older mechanisms of emotional evaluation in the context of more recently evolved linguistic function. PMID:10468630

  16. Ventrolateral prefrontal cortex and the effects of task demand context on facial affect appraisal in schizophrenia.

    PubMed

    Leitman, David I; Wolf, Daniel H; Loughead, James; Valdez, Jeffrey N; Kohler, Christian G; Brensinger, Colleen; Elliott, Mark A; Turetsky, Bruce I; Gur, Raquel E; Gur, Ruben C

    2011-01-01

    Schizophrenia patients display impaired performance and brain activity during facial affect recognition. These impairments may reflect stimulus-driven perceptual decrements and evaluative processing abnormalities. We differentiated these two processes by contrasting responses to identical stimuli presented under different contexts. Seventeen healthy controls and 16 schizophrenia patients performed an fMRI facial affect detection task. Subjects identified an affective target presented amongst foils of differing emotions. We hypothesized that targeting affiliative emotions (happiness, sadness) would create a task demand context distinct from that generated when targeting threat emotions (anger, fear). We compared affiliative foil stimuli within a congruent affiliative context with identical stimuli presented in an incongruent threat context. Threat foils were analysed in the same manner. Controls activated right orbitofrontal cortex (OFC)/ventrolateral prefrontal cortex (VLPFC) more to affiliative foils in threat contexts than to identical stimuli within affiliative contexts. Patients displayed reduced OFC/VLPFC activation to all foils, and no activation modulation by context. This lack of context modulation coincided with a 2-fold decrement in foil detection efficiency. Task demands produce contextual effects during facial affective processing in regions activated during affect evaluation. In schizophrenia, reduced modulation of OFC/VLPFC by context coupled with reduced behavioural efficiency suggests impaired ventral prefrontal control mechanisms that optimize affective appraisal.

  17. Nonconscious attention bias to threat is correlated with anterior cingulate cortex gray matter volume: a voxel-based morphometry result and replication.

    PubMed

    Carlson, Joshua M; Beacher, Felix; Reinke, Karen S; Habib, Reza; Harmon-Jones, Eddie; Mujica-Parodi, Lilianne R; Hajcak, Greg

    2012-01-16

    An important aspect of the fear response is the allocation of spatial attention toward threatening stimuli. This response is so powerful that modulations in spatial attention can occur automatically without conscious awareness. Functional neuroimaging research suggests that the amygdala and anterior cingulate cortex (ACC) form a network involved in the rapid orienting of attention to threat. A hyper-responsive attention bias to threat is a common component of anxiety disorders. Yet, little is known of how individual differences in underlying brain morphometry relate to variability in attention bias to threat. Here, we performed two experiments using dot-probe tasks that measured individuals' attention bias to backward masked fearful faces. We collected whole-brain structural magnetic resonance images and used voxel-based morphometry to measure brain morphometry. We tested the hypothesis that reduced gray matter within the amygdala and ACC would be associated with reduced attention bias to threat. In Experiment 1, we found that backward masked fearful faces captured spatial attention and that elevated attention bias to masked threat was associated with greater ACC gray matter volumes. In Experiment 2, this association was replicated in a separate sample. Thus, we provide initial and replicating evidence that ACC gray matter volume is correlated with biased attention to threat. Importantly, we demonstrate that variability in affective attention bias within the healthy population is associated with ACC morphometry. This result opens the door for future research into the underlying brain morphometry associated with attention bias in clinically anxious populations. Copyright © 2011 Elsevier Inc. All rights reserved.

  18. Genetic Influences on the Neural and Physiological Bases of Acute Threat: A Research Domain Criteria (RDoC) Perspective

    PubMed Central

    Sumner, Jennifer A.; Powers, Abigail; Jovanovic, Tanja; Koenen, Karestan C.

    2015-01-01

    The NIMH Research Domain Criteria (RDoC) initiative aims to describe key dimensional constructs underlying mental function across multiple units of analysis—from genes to observable behaviors—in order to better understand psychopathology. The acute threat (“fear”) construct of the RDoC Negative Valence System has been studied extensively from a translational perspective, and is highly pertinent to numerous psychiatric conditions, including anxiety and trauma-related disorders. We examined genetic contributions to the construct of acute threat at two units of analysis within the RDoC framework: 1) neural circuits and 2) physiology. Specifically, we focused on genetic influences on activation patterns of frontolimbic neural circuitry and on startle, skin conductance, and heart rate responses. Research on the heritability of activation in threat-related frontolimbic neural circuitry is lacking, but physiological indicators of acute threat have been found to be moderately heritable (35-50%). Genetic studies of the neural circuitry and physiology of acute threat have almost exclusively relied on the candidate gene method and, as in the broader psychiatric genetics literature, most findings have failed to replicate. The most robust support has been demonstrated for associations between variation in the serotonin transporter (SLC6A4) and catechol-O-methyltransferase (COMT) genes with threat-related neural activation and physiological responses. However, unbiased genome-wide approaches using very large samples are needed for gene discovery, and these can be accomplished with collaborative consortium-based research efforts, such as those of the Psychiatric Genomics Consortium (PGC) and Enhancing Neuro Imaging Genetics through Meta-Analysis (ENIGMA) Consortium. PMID:26377804

  19. The effects of social identity threat and social identity affirmation on laypersons' perception of scientists.

    PubMed

    Nauroth, Peter; Gollwitzer, Mario; Kozuchowski, Henrik; Bender, Jens; Rothmund, Tobias

    2017-10-01

    Public debates about socio-scientific issues (e.g. climate change or violent video games) are often accompanied by attacks on the reputation of the involved scientists. Drawing on the social identity approach, we report a minimal group experiment investigating the conditions under which scientists are perceived as non-prototypical, non-reputable, and incompetent. Results show that in-group affirming and threatening scientific findings (compared to a control condition) both alter laypersons' evaluations of the study: in-group affirming findings lead to more positive and in-group threatening findings to more negative evaluations. However, only in-group threatening findings alter laypersons' perceptions of the scientists who published the study: scientists were perceived as less prototypical, less reputable, and less competent when their research results imply a threat to participants' social identity compared to a non-threat condition. Our findings add to the literature on science reception research and have implications for understanding the public engagement with science.

  20. Fanning the flames of prejudice: the influence of specific incidental emotions on implicit prejudice.

    PubMed

    Dasgupta, Nilanjana; Desteno, David; Williams, Lisa A; Hunsinger, Matthew

    2009-08-01

    Three experiments examined the impact of incidental emotions on implicit intergroup evaluations. Experiment 1 demonstrated that for unknown social groups, two negative emotions that are broadly applicable to intergroup conflict (anger and disgust) both created implicit bias where none had existed before. However, for known groups about which perceivers had prior knowledge, emotions increased implicit prejudice only if the induced emotion was applicable to the outgroup stereotype. Disgust increased bias against disgust-relevant groups (e.g., homosexuals) but anger did not (Experiment 2); anger increased bias against anger-relevant groups (e.g., Arabs) but disgust did not (Experiment 3). Consistent with functional theories of emotion, these findings suggest that negative intergroup emotions signal specific types of threat. If the emotion-specific threat is applicable to prior expectations of a group, the emotion ratchets up implicit prejudice toward that group. However, if the emotion-specific threat is not applicable to the target group, evaluations remain unchanged. 2009 APA, all rights reserved.

  1. Evaluation and Verification of the Global Rapid Identification of Threats System for Infectious Diseases in Textual Data Sources.

    PubMed

    Huff, Andrew G; Breit, Nathan; Allen, Toph; Whiting, Karissa; Kiley, Christopher

    2016-01-01

    The Global Rapid Identification of Threats System (GRITS) is a biosurveillance application that enables infectious disease analysts to monitor nontraditional information sources (e.g., social media, online news outlets, ProMED-mail reports, and blogs) for infectious disease threats. GRITS analyzes these textual data sources by identifying, extracting, and succinctly visualizing epidemiologic information and suggests potentially associated infectious diseases. This manuscript evaluates and verifies the diagnoses that GRITS performs and discusses novel aspects of the software package. Via GRITS' web interface, infectious disease analysts can examine dynamic visualizations of GRITS' analyses and explore historical infectious disease emergence events. The GRITS API can be used to continuously analyze information feeds, and the API enables GRITS technology to be easily incorporated into other biosurveillance systems. GRITS is a flexible tool that can be modified to conduct sophisticated medical report triaging, expanded to include customized alert systems, and tailored to address other biosurveillance needs.

  2. Evaluation and Verification of the Global Rapid Identification of Threats System for Infectious Diseases in Textual Data Sources

    PubMed Central

    Breit, Nathan

    2016-01-01

    The Global Rapid Identification of Threats System (GRITS) is a biosurveillance application that enables infectious disease analysts to monitor nontraditional information sources (e.g., social media, online news outlets, ProMED-mail reports, and blogs) for infectious disease threats. GRITS analyzes these textual data sources by identifying, extracting, and succinctly visualizing epidemiologic information and suggests potentially associated infectious diseases. This manuscript evaluates and verifies the diagnoses that GRITS performs and discusses novel aspects of the software package. Via GRITS' web interface, infectious disease analysts can examine dynamic visualizations of GRITS' analyses and explore historical infectious disease emergence events. The GRITS API can be used to continuously analyze information feeds, and the API enables GRITS technology to be easily incorporated into other biosurveillance systems. GRITS is a flexible tool that can be modified to conduct sophisticated medical report triaging, expanded to include customized alert systems, and tailored to address other biosurveillance needs. PMID:27698665

  3. Evaluating waste printed circuit boards recycling: Opportunities and challenges, a mini review.

    PubMed

    Awasthi, Abhishek Kumar; Zlamparet, Gabriel Ionut; Zeng, Xianlai; Li, Jinhui

    2017-04-01

    Rapid generation of waste printed circuit boards has become a very serious issue worldwide. Numerous techniques have been developed in the last decade to resolve the pollution from waste printed circuit boards, and also recover valuable metals from the waste printed circuit boards stream on a large-scale. However, these techniques have their own certain specific drawbacks that need to be rectified properly. In this review article, these recycling technologies are evaluated based on a strength, weaknesses, opportunities and threats analysis. Furthermore, it is warranted that, the substantial research is required to improve the current technologies for waste printed circuit boards recycling in the outlook of large-scale applications.

  4. Finite Element Based Optimization of Material Parameters for Enhanced Ballistic Protection

    NASA Astrophysics Data System (ADS)

    Ramezani, Arash; Huber, Daniel; Rothe, Hendrik

    2013-06-01

    The threat imposed by terrorist attacks is a major hazard for military installations, vehicles and other items. The large amounts of firearms and projectiles that are available, pose serious threats to military forces and even civilian facilities. An important task for international research and development is to avert danger to life and limb. This work will evaluate the effect of modern armor with numerical simulations. It will also provide a brief overview of ballistic tests in order to offer some basic knowledge of the subject, serving as a basis for the comparison of simulation results. The objective of this work is to develop and improve the modern armor used in the security sector. Numerical simulations should replace the expensive ballistic tests and find vulnerabilities of items and structures. By progressively changing the material parameters, the armor is to be optimized. Using a sensitivity analysis, information regarding decisive variables is yielded and vulnerabilities are easily found and eliminated afterwards. To facilitate the simulation, advanced numerical techniques have been employed in the analyses.

  5. Decentralized Patrolling Under Constraints in Dynamic Environments.

    PubMed

    Shaofei Chen; Feng Wu; Lincheng Shen; Jing Chen; Ramchurn, Sarvapali D

    2016-12-01

    We investigate a decentralized patrolling problem for dynamic environments where information is distributed alongside threats. In this problem, agents obtain information at a location, but may suffer attacks from the threat at that location. In a decentralized fashion, each agent patrols in a designated area of the environment and interacts with a limited number of agents. Therefore, the goal of these agents is to coordinate to gather as much information as possible while limiting the damage incurred. Hence, we model this class of problem as a transition-decoupled partially observable Markov decision process with health constraints. Furthermore, we propose scalable decentralized online algorithms based on Monte Carlo tree search and a factored belief vector. We empirically evaluate our algorithms on decentralized patrolling problems and benchmark them against the state-of-the-art online planning solver. The results show that our approach outperforms the state-of-the-art by more than 56% for six agents patrolling problems and can scale up to 24 agents in reasonable time.

  6. Anticipation of interoceptive threat in highly anxiety sensitive persons.

    PubMed

    Melzig, Christiane A; Michalowski, Jaroslaw M; Holtz, Katharina; Hamm, Alfons O

    2008-10-01

    Anticipatory anxiety plays a major role in the etiology of panic disorder. Although anticipatory anxiety elicited by expectation of interoceptive cues is specifically relevant for panic patients, it has rarely been studied. Using a population analogue in high fear of such interoceptive arousal sensations (highly anxiety sensitive persons) we evaluated a new experimental paradigm to assess anticipatory anxiety during anticipation of interoceptive (somatic sensations evoked by hyperventilation) and exteroceptive (electric shock) threat. Symptom reports, autonomic arousal, and defensive response mobilization (startle eyeblink response) were monitored during threat and matched safe conditions in 26 highly anxiety sensitive persons and 22 controls. The anticipation of exteroceptive threat led to a defensive and autonomic mobilization as indexed by a potentiation of the startle response and an increase in skin conductance level in both experimental groups. During interoceptive threat, however, only highly anxiety sensitive persons but not the controls exhibited a startle response potentiation as well as autonomic activation. The anticipation of a hyperventilation procedure thus seems a valid paradigm to investigate anticipatory anxiety elicited by interoceptive cues in the clinical context.

  7. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    USGS Publications Warehouse

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an example of the type of results generated, we estimated that the probability of the manatee population falling to less than 250 adults on either the Atlantic or Gulf coasts (from a current statewide population size of near 3300) within 100 years is 8.6%. Complete removal of the watercraft threat alone would reduce this risk to 0.4%; complete removal of the warm-water threat to 4.2%; removal of both threats would reduce the risk to 0.1%. The modeling approach we have taken also allows us to consider partial removal of threats, as well as removal of multiple threats simultaneously. We believe the measure we have proposed (probability of quasi-extinction over y years, with quasi-extinction defined as dropping below a threshold of z on either coast) is a suitable measure of status that integrates a number of the elements that are relevant to interpretation under the ESA (it directly integrates risk of extinction and reduction of range, and indirectly integrates loss of genetic diversity). But the identification of the time frame of interest and the tolerable risk of quasi-extinction are policy decisions, and an ecology-based quasi-extinction threshold has not yet been determined. We have endeavored to provide results over a wide range of these parameters to give decision-makers useful information to assess status. This assessment of threats suggests that watercraft-related mortality is having the greatest impact on manatee population growth and resilience. Elimination of this single threat would greatly reduce the probability of quasi-extinction. Loss of warm-water is also a significant threat, particularly over the long-term. Red tide and entanglement, while noticeable threats, have had less of an impact on the manatee population. The effect of water control structures may have already been largely mitigated. We did not, however, consider an exhaustive list of threats. Other threats (e.g., reduction of food resources due to storms and development) may play a

  8. Physiological Response to Social Evaluative Threat in Adolescents with Autism Spectrum Disorder

    PubMed Central

    Edmiston, E. Kale; Jones, Robin M.

    2016-01-01

    The Trier Social Stress Test (TSST) was employed to study response to social evaluative threat in male adolescents with Autism Spectrum Disorder (ASD, n = 21) and typical development (n = 13). Participants wore a mobile electrocardiogram to collect heart rate data. There were significant group effects on respiratory sinus arrhythmia (RSA), a measure of parasympathetic nervous system function, with lower values in ASD (F = 4.97). Bivariate correlations also showed a significant relationship between parent reports of social problems and RSA response to the TSST (r = −0.586). These findings suggest that autonomic dysregulation may contribute to social deficits in adolescents with ASD. PMID:27318810

  9. Physiological and emotional responses to subjective social evaluative threat in daily life.

    PubMed

    Lehman, Barbara J; Cane, Arianna C; Tallon, Shannon J; Smith, Stephanie F

    2015-01-01

    This study examined concurrent and delayed emotional and cardiovascular correlates of naturally occurring experiences with subjective social evaluative threat (SSET) and tested whether individual differences in social interaction anxiety moderated those associations. Sixty-eight participants wore ambulatory blood pressure monitors for three days. Following each blood pressure reading, participants reported on SSET and negative emotions, yielding 1770 momentary measures. Multilevel modeling suggested that reports of greater SSET uniquely predicted elevations in anxiety and embarrassment, with elevations in anxiety, embarrassment, and shame extending to the hour following SSET. Reports of concurrent and previous-hour SSET also predicted cardiovascular elevations. Linkages between SSET and anxiety and shame, but not cardiovascular measures, were moderated by social interaction anxiety. Those higher in social interaction anxiety showed especially strong associations between SSET and both concurrent and delayed anxiety and greater delayed shame. This research suggests an important role for anxiety, embarrassment, and shame as emotional consequences of naturally occurring evaluative threat, especially for those who are more socially anxious. Further, this work replicates other naturalistic studies that have documented increased blood pressure at times of SSET and extends that work by documenting cardiovascular responses into the following hour.

  10. Shape-based human detection for threat assessment

    NASA Astrophysics Data System (ADS)

    Lee, Dah-Jye; Zhan, Pengcheng; Thomas, Aaron; Schoenberger, Robert B.

    2004-07-01

    Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when monitoring open environments. Any moving objects including animals can falsely trigger the security system. Other security systems that utilize video equipment require human interpretation of the scene in order to make real-time threat assessment. Shape-based human detection technique has been developed for accurate early threat assessments for open and remote environment. Potential threats are isolated from the static background scene using differential motion analysis and contours of the intruding objects are extracted for shape analysis. Contour points are simplified by removing redundant points connecting short and straight line segments and preserving only those with shape significance. Contours are represented in tangent space for comparison with shapes stored in database. Power cepstrum technique has been developed to search for the best matched contour in database and to distinguish a human from other objects from different viewing angles and distances.

  11. A simple strategy to reduce stereotype threat for orthopedic residents

    PubMed Central

    Gomez, Everlyne; Wright, James G.

    2014-01-01

    Background Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. Methods The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Results Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Conclusion Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR. PMID:24666454

  12. Contribution of Near Real Time MODIS-Based Forest Disturbance Detection Products to a National Forest Threat Early Warning System

    NASA Astrophysics Data System (ADS)

    Spruce, J.; Hargrove, W. W.; Gasser, J.; Smoot, J.; Kuper, P.

    2011-12-01

    This presentation discusses an effort to compute and post weekly MODIS forest change products for the conterminous US (CONUS), as part of a web-based national forest threat early warning system (EWS) known as the U.S. Forest Change Assessment Viewer (FCAV). The US Forest Service, NASA, USGS, and ORNL are working collaboratively to contribute weekly change products to this EWS. Large acreages of the nation's forests are being disturbed by a growing multitude of biotic and abiotic threats that can act either singularly or in combination. When common at regional scales, such disturbances can pose hazards and threats to floral and faunal bio-diversity, ecosystem sustainability, ecosystem services, and human settlements across the conterminous US. Regionally evident forest disturbances range from ephemeral periodic canopy defoliation to stand replacement mortality events due to insects, disease, fire, hurricanes, tornadoes, ice, hail, and drought. Mandated by the Healthy Forest Restoration Act of 2003, this forest threat EWS has been actively developed since 2006 and on-line since 2010. The FCAV system employs 250-meter MODIS NDVI-based forest change products as a key element of the system, providing regional and CONUS scale products in near real time every 8 days. Each of our forest change products in FCAV is based on current versus historical 24 day composites of NDVI data gridded at 231.66 meter resolution. Current NDVI is derived from USGS eMODIS expedited products. MOD13 NDVI is used for constructing historical baselines. CONUS change products are computed for all forests as % change in the current versus historical NDVI for a given 24 day period. Change products are computed according to previous year, previous 3 year and previous 8 year historical baselines. The use of multiple baselines enables apparent forest disturbance anomalies to be more fully assessed. CONUS forest change products are posted each week on the FCAV, a web mapping service constructed and maintained by the National Environmental Modeling and Analysis Center. The FCAV EWS has been used to aid multiple Federal and State agency forest management activities, including aerial disturbance detection surveys, as well as rapid response preliminary assessments of timber loss due to tornadoes, regional drought studies, and fire damage assessments. The FCAV allows end-users to assess the context of apparent forest vegetation change with respect to ancillary data, such as land cover, topography, hydrology, climate variables, and administrative boundaries. Such change products are being evaluated through case studies involving comparison with higher spatial resolution satellite, aerial, and field data. The presentation will include multiple examples in which regionally evident forest disturbances were successfully detected and monitored with the MODIS-based change products, as part of the FCAV. FCAV's MODIS forest change products enable end-users (e.g., resource managers) to view and monitor forest hazards at regional scales throughout the year and across the nation.

  13. Gene × environment interaction on intergroup bias: the role of 5-HTTLPR and perceived outgroup threat

    PubMed Central

    Livingston, Robert W.; Hong, Ying-Yi; Chiao, Joan Y.

    2014-01-01

    Perceived threat from outgroups is a consistent social-environmental antecedent of intergroup bias (i.e. prejudice, ingroup favoritism). The serotonin transporter gene polymorphism (5-HTTLPR) has been associated with individual variations in sensitivity to context, particularly stressful and threatening situations. Here, we examined how 5-HTTLPR and environmental factors signaling potential outgroup threat dynamically interact to shape intergroup bias. Across two studies, we provide novel evidence for a gene–environment interaction on the acquisition of intergroup bias and prejudice. Greater exposure to signals of outgroup threat, such as negative prior contact with outgroups and perceived danger from the social environment, were more predictive of intergroup bias among participants possessing at least one short allele (vs two long alleles) of 5-HTTLPR. Furthermore, this gene x environment interaction was observed for biases directed at diverse ethnic and arbitrarily-defined outgroups across measures reflecting intergroup biases in evaluation and discriminatory behavior. These findings reveal a candidate genetic mechanism for the acquisition of intergroup bias, and suggest that intergroup bias is dually inherited and transmitted through the interplay of social (i.e. contextual cues of outgroup threat) and biological mechanisms (i.e. genetic sensitivity toward threatening contexts) that regulate perceived intergroup threats. PMID:23887814

  14. If it bleeds, it leads: separating threat from mere negativity.

    PubMed

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  15. Mitigating road mortality of diamond-backed terrapins (Malaclemy's terrapin) with hybrid barriers at crossing hot spots

    USGS Publications Warehouse

    Crawford, Brian A.; Moore, Clinton; Norton, Terry M.; Maerz, John C.

    2017-01-01

    Roads represent a pervasive feature on most landscapes that can pose multiple threats to wildlife populations and substantial challenges for management. To be effective, management strategies must often target where threats are most concentrated. Road mortality and nest predation are well-documented threats to Diamond-backed Terrapins (Malaclemys terrapin) across the majority of their range, including the 8.7-km causeway to Jekyll Island, Georgia, USA, where both are predicted to contribute to population declines if left unmitigated. From 2009 to 2014, we used intensive road surveying to identify spatial peaks (hot spots) of terrapin crossing activity and road mortality and exploit these as targets for management. In 2011, we deployed a hybrid barrier composed of nest boxes, which were designed to prevent terrapins from accessing the road and mitigate nest predation, at one hot spot while leaving two other hot spots unmanaged. We evaluated the impact of the barrier on terrapin emergences on the causeway under a Before-After-Control-Impact (BACI) design, and a companion study evaluated the effects of nest boxes on nest predation rates. We estimated a 57% reduction in annual terrapin emergences at the barrier site compared to no measurable change at control hot spots. Our findings support the use of hybrid barriers for simultaneously addressing road mortality and nest predation for other terrapin populations at risk to these threats. Our approach highlights the need to design feasible but robust management strategies that target spatial peaks of road mortality while addressing additional threats contributing to population declines of terrapins and other species.

  16. Integrated analysis for population estimation, management impact evaluation, and decision-making for a declining species

    USGS Publications Warehouse

    Crawford, Brian A.; Moore, Clinton; Norton, Terry M.; Maerz, John C.

    2018-01-01

    A challenge for making conservation decisions is predicting how wildlife populations respond to multiple, concurrent threats and potential management strategies, usually under substantial uncertainty. Integrated modeling approaches can improve estimation of demographic rates necessary for making predictions, even for rare or cryptic species with sparse data, but their use in management applications is limited. We developed integrated models for a population of diamondback terrapins (Malaclemys terrapin) impacted by road-associated threats to (i) jointly estimate demographic rates from two mark-recapture datasets, while directly estimating road mortality and the impact of management actions deployed during the study; and (ii) project the population using population viability analysis under simulated management strategies to inform decision-making. Without management, population extirpation was nearly certain due to demographic impacts of road mortality, predators, and vegetation. Installation of novel flashing signage increased survival of terrapins that crossed roads by 30%. Signage, along with small roadside barriers installed during the study, increased population persistence probability, but the population was still predicted to decline. Management strategies that included actions targeting multiple threats and demographic rates resulted in the highest persistence probability, and roadside barriers, which increased adult survival, were predicted to increase persistence more than other actions. Our results support earlier findings showing mitigation of multiple threats is likely required to increase the viability of declining populations. Our approach illustrates how integrated models may be adapted to use limited data efficiently, represent system complexity, evaluate impacts of threats and management actions, and provide decision-relevant information for conservation of at-risk populations.

  17. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.

    PubMed

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V

    2017-03-21

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider's server contains a lot of valuable resources. LoBSs' users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs' risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs' risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.

  18. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks

    PubMed Central

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V.

    2017-01-01

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. PMID:28335569

  19. On the complex quantification of risk: systems-based perspective on terrorism.

    PubMed

    Haimes, Yacov Y

    2011-08-01

    This article highlights the complexity of the quantification of the multidimensional risk function, develops five systems-based premises on quantifying the risk of terrorism to a threatened system, and advocates the quantification of vulnerability and resilience through the states of the system. The five premises are: (i) There exists interdependence between a specific threat to a system by terrorist networks and the states of the targeted system, as represented through the system's vulnerability, resilience, and criticality-impact. (ii) A specific threat, its probability, its timing, the states of the targeted system, and the probability of consequences can be interdependent. (iii) The two questions in the risk assessment process: "What is the likelihood?" and "What are the consequences?" can be interdependent. (iv) Risk management policy options can reduce both the likelihood of a threat to a targeted system and the associated likelihood of consequences by changing the states (including both vulnerability and resilience) of the system. (v) The quantification of risk to a vulnerable system from a specific threat must be built on a systemic and repeatable modeling process, by recognizing that the states of the system constitute an essential step to construct quantitative metrics of the consequences based on intelligence gathering, expert evidence, and other qualitative information. The fact that the states of all systems are functions of time (among other variables) makes the time frame pivotal in each component of the process of risk assessment, management, and communication. Thus, risk to a system, caused by an initiating event (e.g., a threat) is a multidimensional function of the specific threat, its probability and time frame, the states of the system (representing vulnerability and resilience), and the probabilistic multidimensional consequences. © 2011 Society for Risk Analysis.

  20. A strategy for prioritizing threats and recovery actions for at-risk species.

    PubMed

    Darst, Catherine R; Murphy, Philip J; Strout, Nathan W; Campbell, Steven P; Field, Kimberleigh J; Allison, Linda; Averill-Murray, Roy C

    2013-03-01

    Ensuring the persistence of at-risk species depends on implementing conservation actions that ameliorate threats. We developed and implemented a method to quantify the relative importance of threats and to prioritize recovery actions based on their potential to affect risk to Mojave desert tortoises (Gopherus agassizii). We used assessments of threat importance and elasticities of demographic rates from population matrix models to estimate the relative contributions of threats to overall increase in risk to the population. We found that urbanization, human access, military operations, disease, and illegal use of off highway vehicles are the most serious threats to the desert tortoise range-wide. These results suggest that, overall, recovery actions that decrease habitat loss, predation, and crushing will be most effective for recovery; specifically, we found that habitat restoration, topic-specific environmental education, and land acquisition are most likely to result in the greatest decrease in risk to the desert tortoise across its range. In addition, we have developed an application that manages the conceptual model and all supporting information and calculates threat severity and potential effectiveness of recovery actions. Our analytical approach provides an objective process for quantifying threats, prioritizing recovery actions, and developing monitoring metrics for those actions for adaptive management of any at-risk species.

  1. Content specificity of attention bias to threat in anxiety disorders: a meta-analysis.

    PubMed

    Pergamin-Hight, Lee; Naim, Reut; Bakermans-Kranenburg, Marian J; van IJzendoorn, Marinus H; Bar-Haim, Yair

    2015-02-01

    Despite the established evidence for threat-related attention bias in anxiety, the mechanisms underlying this bias remain unclear. One important unresolved question is whether disorder-congruent threats capture attention to a greater extent than do more general or disorder-incongruent threat stimuli. Evidence for attention bias specificity in anxiety would implicate involvement of previous learning and memory processes in threat-related attention bias, whereas lack of content specificity would point to perturbations in more generic attention processes. Enhanced clarity of mechanism could have clinical implications for the stimuli types used in Attention Bias Modification Treatments (ABMT). Content specificity of threat-related attention bias in anxiety and potential moderators of this effect were investigated. A systematic search identified 37 samples from 29 articles (N=866). Relevant data were extracted based on specific coding rules, and Cohen's d effect size was used to estimate bias specificity effects. The results indicate greater attention bias toward disorder-congruent relative to disorder-incongruent threat stimuli (d=0.28, p<0.0001). This effect was not moderated by age, type of anxiety disorder, visual attention tasks, or type of disorder-incongruent stimuli. No evidence of publication bias was observed. Implications for threat bias in anxiety and ABMT are discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. The impact of Stereotype Threat on the simulated driving performance of older drivers.

    PubMed

    Joanisse, Mélanie; Gagnon, Sylvain; Voloaca, Mihnea

    2013-01-01

    Older drivers are perceived as being dangerous and overly cautious by other drivers. We tested the hypothesis that this negative stereotype has a direct influence on the performance of older drivers. Based on the Stereotype Threat literature, we predicted that older driving performance would be altered after exposure to a Stereotype Threat. Sixty-one older drivers aged 65 and above completed a simulated driving assessment course. Prior to testing, half of the participants were told that the objective of the study was to investigate why older adults aged 65 and above were more implicated in on-road accidents (Stereotype Threat condition) and half were showed a neutral statement. Results confirmed that exposure to the threat significantly altered driving performance. Older adults in the Stereotype Threat condition made more driving mistakes than those in the control group. Interestingly, under a Stereotype Threat condition, older adults tended to commit more speeding infractions. We also observed that domain identification (whether driving is deemed important or not) moderated the impact of the threat. Taken together, these results support recent older drivers' performance models suggesting that the interaction between individual and social factors need to be considered when examining older drivers' performance. Copyright © 2012 Elsevier Ltd. All rights reserved.

  3. Knowledge and Attitudes of Ugandan Preservice Science and Mathematics Teachers toward Global and Ugandan Science--and Technology-Based Problems and/or Threats

    ERIC Educational Resources Information Center

    Robinson, Michael; Tibanyendera, Basil; Seltzer-Kelly, Debbie

    2007-01-01

    This article reports the effects of a science, technology, and society (STS) teaching approach on the knowledge and attitudes of preservice science and mathematics teachers in Uganda toward global science and technology-based problems and/or threats. The responses of a baseline or control group (N = 50) and an experimental group (N = 50) to five…

  4. Postural threat influences vestibular-evoked muscular responses.

    PubMed

    Lim, Shannon B; Cleworth, Taylor W; Horslen, Brian C; Blouin, Jean-Sébastien; Inglis, J Timothy; Carpenter, Mark G

    2017-02-01

    Standing balance is significantly influenced by postural threat. While this effect has been well established, the underlying mechanisms of the effect are less understood. The involvement of the vestibular system is under current debate, and recent studies that investigated the effects of height-induced postural threat on vestibular-evoked responses provide conflicting results based on kinetic (Horslen BC, Dakin CJ, Inglis JT, Blouin JS, Carpenter MG. J Physiol 592: 3671-3685, 2014) and kinematic (Osler CJ, Tersteeg MC, Reynolds RF, Loram ID. Eur J Neurosci 38: 3239-3247, 2013) data. We examined the effect of threat of perturbation, a different form of postural threat, on coupling (cross-correlation, coherence, and gain) of the vestibulo-muscular relationship in 25 participants who maintained standing balance. In the "No-Threat" conditions, participants stood quietly on a stable surface. In the "Threat" condition, participants' balance was threatened with unpredictable mediolateral support surface tilts. Quiet standing immediately before the surface tilts was compared to an equivalent time from the No-Threat conditions. Surface EMG was recorded from bilateral trunk, hip, and leg muscles. Hip and leg muscles exhibited significant increases in peak cross-correlation amplitudes, coherence, and gain (1.23-2.66×) in the Threat condition compared with No-Threat conditions, and significant correlations were observed between threat-related changes in physiological arousal and medium-latency peak cross-correlation amplitude in medial gastrocnemius (r = 0.408) muscles. These findings show a clear threat effect on vestibular-evoked responses in muscles in the lower body, with less robust effects of threat on trunk muscles. Combined with previous work, the present results can provide insight into observed changes during balance control in threatening situations. This is the first study to show increases in vestibular-evoked responses of the lower body muscles under conditions of increased threat of postural perturbation. While robust findings were observed in hip and leg muscles, less consistent results were found in muscles of the trunk. The present findings provide further support in the ongoing debate for arguments that vestibular-evoked balance responses are influenced by fear and anxiety and explain previous threat-related changes in balance. Copyright © 2017 the American Physiological Society.

  5. Security risks associated with radio frequency identification in medical environments.

    PubMed

    Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio

    2012-12-01

    Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.

  6. Predictive Analytics for Safer Food Supply

    USDA-ARS?s Scientific Manuscript database

    Science based risk analysis improves the USDA Food Safety Inspection Service’s ability to combat threats to public health from food-borne illness by allowing the Agency to focus resources on hazards that pose the greatest risk. Innovative algorithms enable detection and containment of threat by an...

  7. Incentives, Behavior, and Risk Management

    ERIC Educational Resources Information Center

    Liu, Debin

    2011-01-01

    Insiders are one of the most serious threats to an organization's information assets. Generally speaking, there are two types of insider threats based on the insiders' intents. Malicious Insiders are individuals with varying degrees of harmful intentions. Inadvertent Insiders are individuals without malicious intent. In this dissertation, I…

  8. Use of Vertically Integrated Ice in WRF-Based Forecasts of Lightning Threat

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., jr.; Goodman, S. J.

    2008-01-01

    Previously reported methods of forecasting lightning threat using fields of graupel flux from WRF simulations are extended to include the simulated field of vertically integrated ice within storms. Although the ice integral shows less temporal variability than graupel flux, it provides more areal coverage, and can thus be used to create a lightning forecast that better matches the areal coverage of the lightning threat found in observations of flash extent density. A blended lightning forecast threat can be constructed that retains much of the desirable temporal sensitivity of the graupel flux method, while also incorporating the coverage benefits of the ice integral method. The graupel flux and ice integral fields contributing to the blended forecast are calibrated against observed lightning flash origin density data, based on Lightning Mapping Array observations from a series of case studies chosen to cover a wide range of flash rate conditions. Linear curve fits that pass through the origin are found to be statistically robust for the calibration procedures.

  9. Simulation evaluation of a low-altitude helicopter flight guidance system adapted for a helmet-mounted display

    NASA Technical Reports Server (NTRS)

    Swenson, Harry N.; Zelenka, Richard E.; Hardy, Gordon H.; Dearing, Munro G.

    1992-01-01

    A computer aiding concept for low-altitude helicopter flight was developed and evaluated in a real-time piloted simulation. The concept included an optimal control trajectory-generation algorithm based upon dynamic programming and a helmet-mounted display (HMD) presentation of a pathway-in-the-sky, a phantom aircraft, and flight-path vector/predictor guidance symbology. The trajectory-generation algorithm uses knowledge of the global mission requirements, a digital terrain map, aircraft performance capabilities, and advanced navigation information to determine a trajectory between mission way points that seeks valleys to minimize threat exposure. The pilot evaluation was conducted at NASA ARC moving base Vertical Motion Simulator (VMS) by pilots representing NASA, the U.S. Army, the Air Force, and the helicopter industry. The pilots manually tracked the trajectory generated by the algorithm utilizing the HMD symbology. The pilots were able to satisfactorily perform the tracking tasks while maintaining a high degree of awareness of the outside world.

  10. Assessment of medical reserve corps volunteers' emergency response willingness using a threat- and efficacy-based model.

    PubMed

    Errett, Nicole A; Barnett, Daniel J; Thompson, Carol B; Tosatto, Rob; Austin, Brad; Schaffzin, Samuel; Ansari, Armin; Semon, Natalie L; Balicer, Ran D; Links, Jonathan M

    2013-03-01

    The goal of this study was to investigate the willingness of Medical Reserve Corps (MRC) volunteers to participate in public health emergency-related activities by assessing their attitudes and beliefs. MRC volunteers responded to an online survey organized around the Extended Parallel Process Model (EPPM). Respondents reported agreement with attitude/belief statements representing perceived threat, perceived efficacy, and personal/organizational preparedness in 4 scenarios: a weather-related disaster, a pandemic influenza emergency, a radiological ("dirty bomb") emergency, and an inhalational anthrax bioterrorism emergency. Logistic regression analyses were used to evaluate predictors of volunteer response willingness. In 2 response contexts (if asked and regardless of severity), self-reported willingness to respond was higher among those with a high perceived self-efficacy than among those with low perceived self-efficacy. Analyses of the association between attitude/belief statements and the EPPM profiles indicated that, under all 4 scenarios and with few exceptions, those with a perceived high threat/high efficacy EPPM profile had statistically higher odds of agreement with the attitude/belief statements than those with a perceived low threat/low efficacy EPPM profile. The radiological emergency consistently received the lowest agreement rates for the attitude/belief statements and response willingness across scenarios. The findings suggest that enrollment with an MRC unit is not automatically predictive of willingness to respond in these types of scenarios. While MRC volunteers' self-reported willingness to respond was found to differ across scenarios and among different attitude and belief statements, the identification of self-efficacy as the primary predictor of willingness to respond regardless of severity and if asked highlights the critical role of efficacy in an organized volunteer response context.

  11. Assessment of Medical Reserve Corps Volunteers' Emergency Response Willingness Using a Threat- and Efficacy-Based Model

    PubMed Central

    Barnett, Daniel J.; Thompson, Carol B.; Tosatto, Rob; Austin, Brad; Schaffzin, Samuel; Ansari, Armin; Semon, Natalie L.; Balicer, Ran D.; Links, Jonathan M.

    2013-01-01

    The goal of this study was to investigate the willingness of Medical Reserve Corps (MRC) volunteers to participate in public health emergency–related activities by assessing their attitudes and beliefs. MRC volunteers responded to an online survey organized around the Extended Parallel Process Model (EPPM). Respondents reported agreement with attitude/belief statements representing perceived threat, perceived efficacy, and personal/organizational preparedness in 4 scenarios: a weather-related disaster, a pandemic influenza emergency, a radiological (“dirty bomb”) emergency, and an inhalational anthrax bioterrorism emergency. Logistic regression analyses were used to evaluate predictors of volunteer response willingness. In 2 response contexts (if asked and regardless of severity), self-reported willingness to respond was higher among those with a high perceived self-efficacy than among those with low perceived self-efficacy. Analyses of the association between attitude/belief statements and the EPPM profiles indicated that, under all 4 scenarios and with few exceptions, those with a perceived high threat/high efficacy EPPM profile had statistically higher odds of agreement with the attitude/belief statements than those with a perceived low threat/low efficacy EPPM profile. The radiological emergency consistently received the lowest agreement rates for the attitude/belief statements and response willingness across scenarios. The findings suggest that enrollment with an MRC unit is not automatically predictive of willingness to respond in these types of scenarios. While MRC volunteers' self-reported willingness to respond was found to differ across scenarios and among different attitude and belief statements, the identification of self-efficacy as the primary predictor of willingness to respond regardless of severity and if asked highlights the critical role of efficacy in an organized volunteer response context. PMID:23477632

  12. Critically evaluating best management practices for preventing freshwater turtle extinctions.

    PubMed

    Spencer, R-J; Van Dyke, J U; Thompson, Michael B

    2017-12-01

    Ex situ conservation tools, such as captive breeding for reintroduction, are considered a last resort to recover threatened or endangered species, but they may also help reduce anthropogenic threats where it is difficult or impossible to address them directly. Headstarting, or captive rearing of eggs or neonate animals for subsequent release into the wild, is controversial because it treats only a symptom of a larger conservation problem; however, it may provide a mechanism to address multiple threats, particularly near population centers. We conducted a population viability analysis of Australia's most widespread freshwater turtle, Chelodina longicollis, to determine the effect of adult roadkill (death by collision with motor vehicles), which is increasing, and reduced recruitment through nest predation from introduced European red foxes (Vulpes vulpes). We also modeled management scenarios to test the effectiveness of headstarting, fox management, and measures to reduce mortality on roads. Only scenarios with headstarting from source populations eliminated all risks of extinction and allowed population growth. Small increases in adult mortality (2%) had the greatest effect on population growth and extinction risk. Where threats simultaneously affected other life-history stages (e.g., recruitment), eliminating harvest pressures on adult females alone did not eliminate the risk of population extinction. In our models, one source population could supply enough hatchlings annually to supplement 25 other similar-sized populations such that extinction was avoided. Based on our results, we believe headstarting should be a primary tool for managing freshwater turtles for which threats affect multiple life-history stages. We advocate the creation of source populations for managing freshwater turtles that are greatly threatened at multiple life-history stages, such as depredation of eggs by invasive species and adult mortality via roadkill. © 2017 Society for Conservation Biology.

  13. Biology of extinction risk in marine fishes

    PubMed Central

    Reynolds, John D; Dulvy, Nicholas K; Goodwin, Nicholas B; Hutchings, Jeffrey A

    2005-01-01

    We review interactions between extrinsic threats to marine fishes and intrinsic aspects of their biology that determine how populations and species respond to those threats. Information is available on the status of less than 5% of the world's approximately 15 500 marine fish species, most of which are of commercial importance. By 2001, based on data from 98 North Atlantic and northeast Pacific populations, marine fishes had declined by a median 65% in breeding biomass from known historic levels; 28 populations had declined by more than 80%. Most of these declines would be sufficient to warrant a status of threatened with extinction under international threat criteria. However, this interpretation is highly controversial, in part because of a perception that marine fishes have a suite of life history characteristics, including high fecundity and large geographical ranges, which might confer greater resilience than that shown by terrestrial vertebrates. We review 15 comparative analyses that have tested for these and other life history correlates of vulnerability in marine fishes. The empirical evidence suggests that large body size and late maturity are the best predictors of vulnerability to fishing, regardless of whether differences among taxa in fishing mortality are controlled; there is no evidence that high fecundity confers increased resilience. The evidence reviewed here is of direct relevance to the diverse criteria used at global and national levels by various bodies to assess threat status of fishes. Simple life history traits can be incorporated directly into quantitative assessment criteria, or used to modify the conclusions of quantitative assessments, or used as preliminary screening criteria for assessment of the ∼95% of marine fish species whose status has yet to be evaluated either by conservationists or fisheries scientists. PMID:16243696

  14. Assessment of Emergency Preparedness of Households in Israel for War--Current Status.

    PubMed

    Bodas, Moran; Siman-Tov, Maya; Kreitler, Shulamith; Peleg, Kobi

    2015-08-01

    In recent decades, many efforts have been made, both globally and locally, to enhance household preparedness for emergencies. In the State of Israel in particular, substantial investment has been made throughout the years in preparing the population for one of the major threats to the civilian population--a rapidly deteriorating regional conflict that involves high-trajectory weapons (ie, rocket and missile fire) launched at the home front. The purpose of this study was to examine the current preparedness level of the Israeli public for this threat and determine the correlates of such preparedness with known factors. A telephone-based, random sampling of 503 households representative of the Israeli population was carried out during October 2013. The questionnaire examined the level of household preparedness as well as attitudes towards threat perception, responsibility, willingness to search for information, and sense of preparedness. Statistical analysis was performed to determine the level of preparedness in the general population and to find correlates to this preparedness in attitudes and demographic variables. More than half of the sample reported complying with 50% or fewer of the actions recommended by the Israeli Home Front Command. Having an increased sense of preparedness and willingness to search for related information were positively correlated with actual household preparedness, and the latter was also found to be the most predictive variable of household preparedness. Although the overall household preparedness reported is mediocre, the level of preparedness found in this study suggests better preparedness of the population in Israel for its primary threat. The findings suggest that in order to promote preparedness of the Israeli public for war, emphasis should be put on increasing the public demand for information and encouraging people to evaluate their sense of preparedness.

  15. Office of the Assistant Secretary for Preparedness and Response; HHS Public Health Emergency Medical Countermeasures Enterprise implementation plan for chemical, biological, radiological and nuclear threats. Notice.

    PubMed

    2007-04-23

    The United States faces serious public health threats from the deliberate use of weapons of mass destruction (WMD)--chemical, biological, radiological, or nuclear (CBRN)--by hostile States or terrorists, and from naturally emerging infectious diseases that have a potential to cause illness on a scale that could adversely impact national security. Effective strategies to prevent, mitigate, and treat the consequences of CBRN threats is an integral component of our national security strategy. To that end, the United States must be able to rapidly develop, stockpile, and deploy effective medical countermeasures to protect the American people. The HHS Public Health Emergency Medical Countermeasures Enterprise (PHEMCE) has taken a holistic, end-to-end approach that considers multiple aspects of the medical countermeasures mission including research, development, acquisition, storage, maintenance, deployment, and guidance for utilization. Phase one of this approach established the HHS PHEMCE Strategy for Chemical, Biological, Radiological, and Nuclear Threats (HHS PHEMCE Strategy). The HHS PHEMCE Strategy, published in the Federal Register on March 20, 2007, described a framework of strategic policy goals and objectives for identifying medical countermeasure requirements and establishing priorities for medical countermeasure evaluation, development and acquisition. These strategic policy goals and objectives were used to establish the Four Pillars upon which this HHS Public Health Emergency Medical Countermeasures Enterprise Implementation Plan (HHS PHEMCE Implementation Plan) is based. The HHS PHEMCE Implementation Plan considers the full spectrum of medical countermeasures-related activities, including research, development, acquisition, storage/maintenance, deployment, and utilization. The HHS PHEMCE Implementation Plan is consistent with the President's Biodefense for the 21st Century and is aligned with the National Strategy for Medical Countermeasures against Weapons of Mass Destruction.

  16. Biology of extinction risk in marine fishes.

    PubMed

    Reynolds, John D; Dulvy, Nicholas K; Goodwin, Nicholas B; Hutchings, Jeffrey A

    2005-11-22

    We review interactions between extrinsic threats to marine fishes and intrinsic aspects of their biology that determine how populations and species respond to those threats. Information is available on the status of less than 5% of the world's approximately 15500 marine fish species, most of which are of commercial importance. By 2001, based on data from 98 North Atlantic and northeast Pacific populations, marine fishes had declined by a median 65% in breeding biomass from known historic levels; 28 populations had declined by more than 80%. Most of these declines would be sufficient to warrant a status of threatened with extinction under international threat criteria. However, this interpretation is highly controversial, in part because of a perception that marine fishes have a suite of life history characteristics, including high fecundity and large geographical ranges, which might confer greater resilience than that shown by terrestrial vertebrates. We review 15 comparative analyses that have tested for these and other life history correlates of vulnerability in marine fishes. The empirical evidence suggests that large body size and late maturity are the best predictors of vulnerability to fishing, regardless of whether differences among taxa in fishing mortality are controlled; there is no evidence that high fecundity confers increased resilience. The evidence reviewed here is of direct relevance to the diverse criteria used at global and national levels by various bodies to assess threat status of fishes. Simple life history traits can be incorporated directly into quantitative assessment criteria, or used to modify the conclusions of quantitative assessments, or used as preliminary screening criteria for assessment of the approximately 95% of marine fish species whose status has yet to be evaluated either by conservationists or fisheries scientists.

  17. Continent-wide risk assessment for the establishment of nonindigenous species in Antarctica

    PubMed Central

    Chown, Steven L.; Huiskes, Ad H. L.; Gremmen, Niek J. M.; Lee, Jennifer E.; Terauds, Aleks; Crosbie, Kim; Frenot, Yves; Hughes, Kevin A.; Imura, Satoshi; Kiefer, Kate; Lebouvier, Marc; Raymond, Ben; Tsujimoto, Megumu; Ware, Chris; Van de Vijver, Bart; Bergstrom, Dana Michelle

    2012-01-01

    Invasive alien species are among the primary causes of biodiversity change globally, with the risks thereof broadly understood for most regions of the world. They are similarly thought to be among the most significant conservation threats to Antarctica, especially as climate change proceeds in the region. However, no comprehensive, continent-wide evaluation of the risks to Antarctica posed by such species has been undertaken. Here we do so by sampling, identifying, and mapping the vascular plant propagules carried by all categories of visitors to Antarctica during the International Polar Year's first season (2007–2008) and assessing propagule establishment likelihood based on their identity and origins and on spatial variation in Antarctica's climate. For an evaluation of the situation in 2100, we use modeled climates based on the Intergovernmental Panel on Climate Change's Special Report on Emissions Scenarios Scenario A1B [Nakićenović N, Swart R, eds (2000) Special Report on Emissions Scenarios: A Special Report of Working Group III of the Intergovernmental Panel on Climate Change (Cambridge University Press, Cambridge, UK)]. Visitors carrying seeds average 9.5 seeds per person, although as vectors, scientists carry greater propagule loads than tourists. Annual tourist numbers (∼33,054) are higher than those of scientists (∼7,085), thus tempering these differences in propagule load. Alien species establishment is currently most likely for the Western Antarctic Peninsula. Recent founder populations of several alien species in this area corroborate these findings. With climate change, risks will grow in the Antarctic Peninsula, Ross Sea, and East Antarctic coastal regions. Our evidence-based assessment demonstrates which parts of Antarctica are at growing risk from alien species that may become invasive and provides the means to mitigate this threat now and into the future as the continent's climate changes. PMID:22393003

  18. Marital conflict and early adolescents' self-evaluation: the role of parenting quality and early adolescents' appraisals.

    PubMed

    Siffert, Andrea; Schwarz, Beate; Stutz, Melanie

    2012-06-01

    Cognitive appraisals and family dynamics have been identified as mediators of the relationship between marital conflict and children's adjustment. Surprisingly little research has investigated both meditational processes in the same study. Guided by the cognitive-contextual framework and the spillover hypothesis, the present study integrated factors from both theories early adolescents' appraisals of threat and self-blame, as well as perceived parenting quality as mediators of the link between early adolescents' perception of marital conflict and their self-evaluations (self-esteem and scholastic competence). Analyses were based on the first two waves of an ongoing longitudinal study. Participants were 176 two-parent families, and their early adolescents (50.5% girls) whose mean age was 10.61 years at Time 1 (SD =0.40) and 11.63 years at Time 2 (SD=0.39). Structural equation modeling analyses indicated that parenting quality and early adolescents' perceived threat provided indirect pathways between marital conflict and early adolescents' self-esteem 1 year later when controlling for their initial level of self-esteem. With respect to scholastic competence, only fathers' parenting was an indirect link. Self-blame did not play a role. Implications for understanding the mechanisms by which exposure to marital conflict predicts early adolescents' maladjustment are discussed.

  19. Avian influenza pandemic preparedness: developing prepandemic and pandemic vaccines against a moving target

    PubMed Central

    Singh, Neetu; Pandey, Aseem; Mittal, Suresh K.

    2010-01-01

    The unprecedented global spread of highly pathogenic avian H5N1 influenza viruses within the past ten years and their extreme lethality to poultry and humans has underscored their potential to cause an influenza pandemic. Combating the threat of an impending H5N1 influenza pandemic will require a combination of pharmaceutical and nonpharmaceutical intervention strategies. The emergence of the H1N1 pandemic in 2009 emphasised the unpredictable nature of a pandemic influenza. Undoubtedly, vaccines offer the most viable means to combat a pandemic threat. Current egg-based influenza vaccine manufacturing strategies are unlikely to be able to cater to the huge, rapid global demand because of the anticipated scarcity of embryonated eggs in an avian influenza pandemic and other factors associated with the vaccine production process. Therefore, alternative, egg-independent vaccine manufacturing strategies should be evaluated to supplement the traditional egg-derived influenza vaccine manufacturing. Furthermore, evaluation of dose-sparing strategies that offer protection with a reduced antigen dose will be critical for pandemic influenza preparedness. Development of new antiviral therapeutics and other, nonpharmaceutical intervention strategies will further supplement pandemic preparedness. This review highlights the current status of egg-dependent and egg-independent strategies against an avian influenza pandemic. PMID:20426889

  20. Identifying at-risk employees: A behavioral model for predicting potential insider threats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.

    A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. In many of these crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they could be assessed by a person experienced in psychosocial evaluations.more » We have developed a model using a Bayesian belief network with the help of human resources staff, experienced in evaluating behaviors in staff. We conducted an experiment to assess its agreement with human resources and management professionals, with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment that can raise an alarm about employees who pose higher insider threat risks. In separate work, we combine this psychosocial model’s assessment with computer workstation behavior to raise the efficacy of recognizing an insider crime in the making.« less

  1. Structural Integrity Evaluation of the Lear Fan 2100 Aircraft

    NASA Technical Reports Server (NTRS)

    Kan, H. P.; Dyer, T. A.

    1996-01-01

    An in-situ nondestructive inspection was conducted to detect manufacturing and assembly induced defects in the upper two wing surfaces (skin s) and upper fuselage skin of the Lear Fan 2100 aircraft E009. The effects of the defects, detected during the inspection, on the integrity of the structure was analytically evaluated. A systematic evaluation was also conducted to determine the damage tolerance capability of the upper wing skin against impact threats and assembly induced damage. The upper wing skin was divided into small regions for damage tolerance evaluations. Structural reliability, margin of safety, allowable strains, and allowable damage size were computed. The results indicated that the impact damage threat imposed on composite military aircraft structures is too severe for the Lear Fan 2100 upper wing skin. However, the structural integrity is not significantly degraded by the assembly induced damage for properly assembled structures, such as the E009 aircraft.

  2. The ecology of human fear: survival optimization and the nervous system

    PubMed Central

    Mobbs, Dean; Hagan, Cindy C.; Dalgleish, Tim; Silston, Brian; Prévost, Charlotte

    2015-01-01

    We propose a Survival Optimization System (SOS) to account for the strategies that humans and other animals use to defend against recurring and novel threats. The SOS attempts to merge ecological models that define a repertoire of contextually relevant threat induced survival behaviors with contemporary approaches to human affective science. We first propose that the goal of the nervous system is to reduce surprise and optimize actions by (i) predicting the sensory landscape by simulating possible encounters with threat and selecting the appropriate pre-encounter action and (ii) prevention strategies in which the organism manufactures safe environments. When a potential threat is encountered the (iii) threat orienting system is engaged to determine whether the organism ignores the stimulus or switches into a process of (iv) threat assessment, where the organism monitors the stimulus, weighs the threat value, predicts the actions of the threat, searches for safety, and guides behavioral actions crucial to directed escape. When under imminent attack, (v) defensive systems evoke fast reflexive indirect escape behaviors (i.e., fight or flight). This cascade of responses to threat of increasing magnitude are underwritten by an interconnected neural architecture that extends from cortical and hippocampal circuits, to attention, action and threat systems including the amygdala, striatum, and hard-wired defensive systems in the midbrain. The SOS also includes a modulatory feature consisting of cognitive appraisal systems that flexibly guide perception, risk and action. Moreover, personal and vicarious threat encounters fine-tune avoidance behaviors via model-based learning, with higher organisms bridging data to reduce face-to-face encounters with predators. Our model attempts to unify the divergent field of human affective science, proposing a highly integrated nervous system that has evolved to increase the organism's chances of survival. PMID:25852451

  3. Ship Underwater Threat Response System (SUTRS): A Feasibility Study of Organic Mine Point-Defense

    DTIC Science & Technology

    2012-09-01

    by implementing and testing the design until a final product has been established that addresses (and has been traced throughout to) the...The assumptions used to evaluate those TPMs are as follows: • The threshold Probability of Success for the total system should be 90% survival...Threat Response System xviii TOA Table of Allowance TPM Technical Performance Measures TTP Tactics Techniques and Procedures U.S. United

  4. The Common Risk Model for Dams: A Portfolio Approach to Security Risk Assessments

    DTIC Science & Technology

    2013-06-01

    and threat estimates in a way that accounts for the relationships among these variables. The CRM -D can effectively quantify the benefits of...consequence, vulnerability, and threat estimates in a way that properly accounts for the relationships among these variables. The CRM -D can effectively...Common RiskModel ( CRM ) for evaluating and comparing risks associated with the nation’s critical infrastructure. This model incorporates commonly used risk

  5. Social domain based modulation of neural responses to threat: The different roles of romantic partners versus friends.

    PubMed

    Morriss, Jayne; Bell, Tiffany; Johnstone, Tom; van Reekum, Carien M; Hill, Jonathan

    2018-06-21

    The neural circuitry associated with threat regulation in the absence of other people is well established. An examination of threat regulatory processes with people from different domains of an individual's social world is key to understanding social emotion regulation and personality functioning conceptualised as social domain organisation. In this study, 42 healthy female participants completed functional magnetic imaging sessions in which they underwent a scan in the presence of a romantic partner or friend, whilst completing a threat of shock task. In the presence of a romantic partner vs. friend, we found a reduction in amygdala activation to threat vs. safe trials over time. Furthermore, in the presence of a romantic partner vs. friend we observed greater subgenual anterior cingulate cortex and ventromedial prefrontal cortex activation to threat vs. safe trials overall. The results support the hypothesis that recruitment of threat regulation circuitry is modulated by romantic partner relative to another person well-known to the individual. Future work needs to examine neural responses to a wider range of stimuli across more social domains, and implications of failures of this neural organisation for psychopathology.

  6. Building Regional Threat-Based Networks for Estuaries in the Western United States

    PubMed Central

    Merrifield, Matthew S.; Hines, Ellen; Liu, Xiaohang; Beck, Michael W.

    2011-01-01

    Estuaries are ecologically and economically valuable and have been highly degraded from both land and sea. Estuarine habitats in the coastal zone are under pressure from a range of human activities. In the United States and elsewhere, very few conservation plans focused on estuaries are regional in scope; fewer still address threats to estuary long term viability.We have compiled basic information about the spatial extent of threats to identify commonalities. To do this we classify estuaries into hierarchical networks that share similar threat characteristics using a spatial database (geodatabase) of threats to estuaries from land and sea in the western U.S.Our results show that very few estuaries in this region (16%) have no or minimal stresses from anthropogenic activity. Additionally, one quarter (25%) of all estuaries in this study have moderate levels of all threats. The small number of un-threatened estuaries is likely not representative of the ecological variability in the region and will require working to abate threats at others. We think the identification of these estuary groups can foster sharing best practices and coordination of conservation activities amongst estuaries in any geography. PMID:21387006

  7. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    PubMed Central

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-01-01

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931

  8. Modular robotic system for forensic investigation support

    NASA Astrophysics Data System (ADS)

    Kowalski, Grzegorz; Główka, Jakub; Maciaś, Mateusz; Puchalski, Sławomir

    2017-10-01

    Forensic investigation on the crime scene is an activity that requires not only knowledge about the ways of searching for evidence, collecting and processing them. In some cases the area of operation might not be properly secured and poses threat to human health or life. Some devices or materials may be left intentionally or not to injure potential investigators. Besides conventional explosives, threats can be in form of CBRN materials, which have not only immediate effect on the exposed personnel, but can contaminate further people, when being transferred for example on clothes or unsecured equipment. In this case a risk evaluation should be performed, that can lead to conclusions that it is too dangerous for investigators to work. In that kind of situation remote devices, which are able to examine the crime scene and secure samples, can be used. In the course of R&D activities PIAP developed a system, which is based on small UGV capable of carrying out inspection of suspicious places and securing evidence, when needed. The system consists of remotely controlled mobile robot, its control console and a set of various inspection and support tools, that enable detection of CBRN threats as well as revelation, documentation and securing of the evidence. This paper will present main features of the system, like mission adjustment possibilities and communication aspects, and also examples of the forensic accessories.

  9. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.

    PubMed

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-11-04

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  10. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    PubMed

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  11. Motivated emotion and the rally around the flag effect: liberals are motivated to feel collective angst (like conservatives) when faced with existential threat.

    PubMed

    Porat, Roni; Tamir, Maya; Wohl, Michael J A; Gur, Tamar; Halperin, Eran

    2018-04-18

    A careful look at societies facing threat reveals a unique phenomenon in which liberals and conservatives react emotionally and attitudinally in a similar manner, rallying around the conservative flag. Previous research suggests that this rally effect is the result of liberals shifting in their attitudes and emotional responses toward the conservative end. Whereas theories of motivated social cognition provide a motivation-based account of cognitive processes (i.e. attitude shift), it remains unclear whether emotional shifts are, in fact, also a motivation-based process. Herein, we propose that under threat, liberals are motivated to feel existential concern about their group's future vitality (i.e. collective angst) to the same extent as conservatives, because this group-based emotion elicits support for ingroup protective action. Within the context of the Palestinian-Israeli conflict, we tested and found support for this hypothesis both inside (Study 1) and outside (Study 2) the laboratory. We did so using a behavioural index of motivation to experience collective angst. We discuss the implications of our findings for understanding motivated emotion regulation in the context of intergroup threat.

  12. Biological review of 82 species of coral petitioned to be included in the Endangered Species Act

    USGS Publications Warehouse

    Brainard, Russell E.; Birkeland, Charles; Eakin, C. Mark; McElhany, Paul; Miller, Margaret W.; Patterson, Matt; Piniak, G.A.

    2011-01-01

    The BRT considered two major factors in conducting this review. The first factor was the interaction of natural phenomena and anthropogenic stressors that could potentially contribute to coral extinction. After extensive review of available scientific information, the BRT considers ocean warming, disease, and ocean acidification to be the most influential threats in posing extinction risks to the 82 candidate coral species between now and the year 2100. Threats of local origin but having widespread impact, such as sedimentation, nutrient enrichment, and fishing, were considered of medium importance in determining extinction risks. It is acknowledged that many other threats (e.g., physical damage from storms or ship groundings, invasive species or predator outbreaks, collection and trade) also negatively affect corals, often acutely and dramatically, but generally at relatively small local scales. These local threats were considered to be of limited scope and not deemed to contribute appreciably to the risk of species extinction, except in those special cases where species have restricted geographic or habitat ranges or species have already undergone precipitous population declines such that these local threats further contribute to depensatory processes that can magnify extinction risks (e.g., feedback-loops whereby individual survival decreases with smaller population size). The BRT acknowledges that local and global threats operate on different time scales and, though there is high confidence in the general progression of some key global threats, such as ocean warming and ocean acidification, there is much less certainty in the timing and spatial patterns of these threats. There is also substantial uncertainty in the abilities of the 82 candidate coral species to tolerate or adapt to each of the threats examined, as well as uncertainty in the dynamics of multiple simultaneous stresses. The BRT specifically identified increasing human population levels and the intensity of their collective human consumption as the root drivers of almost all global and local threats to coral species. In evaluating future threat impacts, the BRT attempted to project current trends, without assumptions of future policy changes or technological advances that could potentially alter the projections used in this analysis.

  13. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education.

    PubMed

    Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K

    2013-08-09

    Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.

  14. DHS S&T First Responders Group and NATO Counter UAS Proposal Interest Response.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Salton, Jonathan R.

    The capability, speed, size, and widespread availability of small unmanned aerial systems (sUAS) makes them a serious security concern. The enabling technologies for sUAS are rapidly evolving and so too are the threats they pose to national security. Potential threat vehicles have a small cross-section, and are difficult to reliably detect using purely ground-based systems (e.g. radar or electro-optical) and challenging to target using conventional anti-aircraft defenses. Ground-based sensors are static and suffer from interference with the earth, vegetation and other man-made structures which obscure objects at low altitudes. Because of these challenges, sUAS pose a unique and rapidly evolvingmore » threat to national security.« less

  15. More on Inoculating Against Reactance to Persuasive Health Messages: The Paradox of Threat.

    PubMed

    Richards, Adam S; Banas, John A; Magid, Yoav

    2017-07-01

    This research examined the efficacy of inoculation as a strategy to mitigate psychological reactance based on the level of threat communicated in the forewarning and subsequent persuasive health appeal. Two 2 (inoculation) × 2 (freedom-threatening language) experiments were conducted. The first (N = 181) used elaborated inoculation designed to enhance the threat of impending reactance to a message advocating for responsible alcohol consumption. The second (N = 159) used limited inoculation designed to minimize the threat of impending reactance to a message advocating for responsible soft drink consumption. Results showed that elaborated inoculation increased reactance, whereas limited inoculation decreased reactance but only when the subsequent appeal used less freedom-threatening language. These findings suggest that inoculation has the potential to facilitate or buffer reactance depending on the level of threat communicated in inoculation forewarnings and in subsequent persuasive health appeals.

  16. 17 CFR 37.3 - Requirements for underlying commodities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... to minimize the threat of market abuses such as price manipulation and distortions, congestion, and... highly unlikely to be susceptible to the threat of manipulation; or (iii) No cash market; (2) Commodities... which the Commission has determined, based on the market characteristics and surveillance history, and...

  17. Work-related fear and the threats of fear among emergency department nursing staff and physicians in Finland.

    PubMed

    Mikkola, Riitta; Huhtala, Heini; Paavilainen, Eija

    2017-10-01

    To describe fear, the threats causing fear and the occurrence of fear among emergency department nursing staff and physicians. The emergency department is a challenging workplace where the staff is often confronted by factors that cause fear. A cross-sectional study. A survey was conducted in 16 hospitals (n = 544). Nurses, practical nurses, orderlies and physicians from those hospitals participated in the survey. The survey questionnaire was based on the analysis of interviews of 30 nurses from one university hospital and one central hospital. The results of the interviews were analysed using the inductive content analysis method. The analysis of the survey was performed using statistical methods, such as frequencies, cross-tabulation and principal component analysis. The results showed that nearly all of the emergency department personnel had experienced work-related fear. Generally, the fear had been momentary. According to the survey results, fear was most often caused by medication errors, the resuscitation of a child, a catastrophic accident, urgent or violent situations or patients armed with weapons. Threats that caused fear included insecurity, danger in the work environment, threat of loss of one's health and threat of the consequences of one's mistakes and actions. The staff of emergency departments often encountered factors or situations that caused fear. The main threats causing fear that were raised by the respondents were insecurity and danger in the work environment. The data obtained from this study can be utilised in identifying and describing work-related fear and threats of fear among emergency department nursing staff and physicians. Based on the information herein, it will be possible to develop methods to prevent situations that cause fear in emergency departments. © 2016 John Wiley & Sons Ltd.

  18. Rising to the challenge: acute stress appraisals and selection centre performance in applicants to postgraduate specialty training in anaesthesia.

    PubMed

    Roberts, Martin J; Gale, Thomas C E; McGrath, John S; Wilson, Mark R

    2016-05-01

    The ability to work under pressure is a vital non-technical skill for doctors working in acute medical specialties. Individuals who evaluate potentially stressful situations as challenging rather than threatening may perform better under pressure and be more resilient to stress and burnout. Training programme recruitment processes provide an important opportunity to examine applicants' reactions to acute stress. In the context of multi-station selection centres for recruitment to anaesthesia training programmes, we investigated the factors influencing candidates' pre-station challenge/threat evaluations and the extent to which their evaluations predicted subsequent station performance. Candidates evaluated the perceived stress of upcoming stations using a measure of challenge/threat evaluation-the cognitive appraisal ratio (CAR)-and consented to release their demographic details and station scores. Using regression analyses we determined which candidate and station factors predicted variation in the CAR and whether, after accounting for these factors, the CAR predicted candidate performance in the station. The CAR was affected by the nature of the station and candidate gender, but not age, ethnicity, country of training or clinical experience. Candidates perceived stations involving work related tasks as more threatening. After controlling for candidates' demographic and professional profiles, the CAR significantly predicted station performance: 'challenge' evaluations were associated with better performance, though the effect was weak. Our selection centre model can help recruit prospective anaesthetists who are able to rise to the challenge of performing in stressful situations but results do not support the direct use of challenge/threat data for recruitment decisions.

  19. Implementation of a Web-Based Organ Donation Educational Intervention: Development and Use of a Refined Process Evaluation Model

    PubMed Central

    Harker, Laura; Bamps, Yvan; Flemming, Shauna St. Clair; Perryman, Jennie P; Thompson, Nancy J; Patzer, Rachel E; Williams, Nancy S DeSousa; Arriola, Kimberly R Jacob

    2017-01-01

    Background The lack of available organs is often considered to be the single greatest problem in transplantation today. Internet use is at an all-time high, creating an opportunity to increase public commitment to organ donation through the broad reach of Web-based behavioral interventions. Implementing Internet interventions, however, presents challenges including preventing fraudulent respondents and ensuring intervention uptake. Although Web-based organ donation interventions have increased in recent years, process evaluation models appropriate for Web-based interventions are lacking. Objective The aim of this study was to describe a refined process evaluation model adapted for Web-based settings and used to assess the implementation of a Web-based intervention aimed to increase organ donation among African Americans. Methods We used a randomized pretest-posttest control design to assess the effectiveness of the intervention website that addressed barriers to organ donation through corresponding videos. Eligible participants were African American adult residents of Georgia who were not registered on the state donor registry. Drawing from previously developed process evaluation constructs, we adapted reach (the extent to which individuals were found eligible, and participated in the study), recruitment (online recruitment mechanism), dose received (intervention uptake), and context (how the Web-based setting influenced study implementation) for Internet settings and used the adapted model to assess the implementation of our Web-based intervention. Results With regard to reach, 1415 individuals completed the eligibility screener; 948 (67.00%) were determined eligible, of whom 918 (96.8%) completed the study. After eliminating duplicate entries (n=17), those who did not initiate the posttest (n=21) and those with an invalid ZIP code (n=108), 772 valid entries remained. Per the Internet protocol (IP) address analysis, only 23 of the 772 valid entries (3.0%) were within Georgia, and only 17 of those were considered unique entries and could be considered for analyses. With respect to recruitment, 517 of the 772 valid entries (67.0%) of participants were recruited from a Web recruiter. Regarding dose received, no videos from the intervention website were watched in their entirety, and the average viewing duration was 17 seconds over the minimum. With respect to context, context analysis provided us with valuable insights into factors in the Internet environment that may have affected study implementation. Although only active for a brief period of time, the Craigslist website advertisement may have contributed the largest volume of fraudulent responses. Conclusions We determined fraud and low uptake to be serious threats to this study and further confirmed the importance of conducting a process evaluation to identify such threats. We suggest checking participants’ IP addresses before study initiation, selecting software that allows for automatic duplicate protection, and tightening minimum requirements for intervention uptake. Further research is needed to understand how process evaluation models can be used to monitor implementation of Web-based studies. PMID:29191799

  20. A Self-Assessment Procedure for Use in Evaluation Training

    ERIC Educational Resources Information Center

    Stufflebeam, Daniel L.; Wingate, Lori A.

    2005-01-01

    This article describes the Self-Assessment of Program Evaluation Expertise instrument and procedure developed to help participants assess their learning gains in a 3-week evaluation institute. Participants completed the instrument in a pre- and posttest format. To reduce both the threat of embarrassment from individual results and the temptation…

  1. 10 CFR 712.14 - Medical assessment.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... evaluation: (i) If an HRP-certified individual requests an evaluation (i.e., self-referral); or (ii) If an... abuse of legal drugs or other substances, as identified by self-reporting or by medical or psychological evaluation or testing; (4) Threat of suicide, homicide, or physical harm; or (5) Medical conditions such as...

  2. 10 CFR 712.14 - Medical assessment.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... evaluation: (i) If an HRP-certified individual requests an evaluation (i.e., self-referral); or (ii) If an... abuse of legal drugs or other substances, as identified by self-reporting or by medical or psychological evaluation or testing; (4) Threat of suicide, homicide, or physical harm; or (5) Medical conditions such as...

  3. 10 CFR 712.14 - Medical assessment.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... evaluation: (i) If an HRP-certified individual requests an evaluation (i.e., self-referral); or (ii) If an... abuse of legal drugs or other substances, as identified by self-reporting or by medical or psychological evaluation or testing; (4) Threat of suicide, homicide, or physical harm; or (5) Medical conditions such as...

  4. 10 CFR 712.14 - Medical assessment.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... evaluation: (i) If an HRP-certified individual requests an evaluation (i.e., self-referral); or (ii) If an... abuse of legal drugs or other substances, as identified by self-reporting or by medical or psychological evaluation or testing; (4) Threat of suicide, homicide, or physical harm; or (5) Medical conditions such as...

  5. Patterns and biases of climate change threats in the IUCN Red List.

    PubMed

    Trull, Nicholas; Böhm, Monika; Carr, Jamie

    2018-02-01

    International Union for Conservation of Nature (IUCN) Red List assessments rely on published data and expert inputs, and biases can be introduced where underlying definitions and concepts are ambiguous. Consideration of climate change threat is no exception, and recently numerous approaches to assessing the threat of climate change to species have been developed. We explored IUCN Red List assessments of amphibians and birds to determine whether species listed as threatened by climate change display distinct patterns in terms of habitat occupied and additional nonclimatic threats faced. We compared IUCN Red List data with a published data set of species' biological and ecological traits believed to infer high vulnerability to climate change and determined whether distributions of climate change-threatened species on the IUCN Red List concur with those of climate change-threatened species identified with the trait-based approach and whether species possessing these traits are more likely to have climate change listed as a threat on the IUCN Red List. Species in some ecosystems (e.g., grassland, shrubland) and subject to particular threats (e.g., invasive species) were more likely to have climate change as a listed threat. Geographical patterns of climate change-threatened amphibians and birds on the IUCN Red List were incongruent with patterns of global species richness and patterns identified using trait-based approaches. Certain traits were linked to increases or decreases in the likelihood of a species being threatened by climate change. Broad temperature tolerance of a species was consistently related to an increased likelihood of climate change threat, indicating counterintuitive relationships in IUCN assessments. To improve the robustness of species assessments of the vulnerability or extinction risk associated with climate change, we suggest IUCN adopt a more cohesive approach whereby specific traits highlighted by our results are considered in Red List assessments. To achieve this and to strengthen the climate change-vulnerability assessments approach, it is necessary to identify and implement logical avenues for further research into traits that make species vulnerable to climate change (including population-level threats). © 2017 Society for Conservation Biology.

  6. A workstation-based evaluation of a far-field route planner for helicopters

    NASA Technical Reports Server (NTRS)

    Warner, David N., Jr.; Moran, Francis J.

    1991-01-01

    Helicopter flight missions at very low, nap of the Earth, altitudes place a heavy workload on the pilot. To aid in reducing this workload, Ames Research Center has been investigating various types of automated route planners. As part of an automated preflight mission planner, a route planner algorithm aids in selecting the overall (far-field) route to be flown. During the mission, the route planner can be used to replan a new route in case of unexpected threats or change in mission requirements. An evaluation of a candidate route planning algorithm, based on dynamic programming techniques is described. This algorithm meets most of the requirements for route planning, both preflight and during the mission. In general, the requirements are to minimize the distance and/or fuel and the deviation from a flight time schedule, and must be flyable within the constraints of available fuel and time.

  7. Precision toxicology based on single cell sequencing: an evolving trend in toxicological evaluations and mechanism exploration.

    PubMed

    Zhang, Boyang; Huang, Kunlun; Zhu, Liye; Luo, Yunbo; Xu, Wentao

    2017-07-01

    In this review, we introduce a new concept, precision toxicology: the mode of action of chemical- or drug-induced toxicity can be sensitively and specifically investigated by isolating a small group of cells or even a single cell with typical phenotype of interest followed by a single cell sequencing-based analysis. Precision toxicology can contribute to the better detection of subtle intracellular changes in response to exogenous substrates, and thus help researchers find solutions to control or relieve the toxicological effects that are serious threats to human health. We give examples for single cell isolation and recommend laser capture microdissection for in vivo studies and flow cytometric sorting for in vitro studies. In addition, we introduce the procedures for single cell sequencing and describe the expected application of these techniques to toxicological evaluations and mechanism exploration, which we believe will become a trend in toxicology.

  8. A Review and Meta-Analysis of Age-Based Stereotype Threat: Negative Stereotypes, Not Facts, Do the Damage

    PubMed Central

    2015-01-01

    Stereotype threat effects arise when an individual feels at risk of confirming a negative stereotype about their group and consequently underperforms on stereotype relevant tasks (Steele, 2010). Among older people, underperformance across cognitive and physical tasks is hypothesized to result from age-based stereotype threat (ABST) because of negative age-stereotypes regarding older adults’ competence. The present review and meta-analyses examine 22 published and 10 unpublished articles, including 82 effect sizes (N = 3882) investigating ABST on older people’s (Mage = 69.5) performance. The analysis revealed a significant small-to-medium effect of ABST (d = .28) and important moderators of the effect size. Specifically, older adults are more vulnerable to ABST when (a) stereotype-based rather than fact-based manipulations are used (d = .52); (b) when performance is tested using cognitive measures (d = .36); and (c) occurs reliably when the dependent variable is measured proximally to the manipulation. The review raises important theoretical and methodological issues, and areas for future research. PMID:25621742

  9. Physiological Response to Social Evaluative Threat in Adolescents with Autism Spectrum Disorder.

    PubMed

    Edmiston, E Kale; Jones, Robin M; Corbett, Blythe A

    2016-09-01

    The Trier Social Stress Test (TSST) was employed to study response to social evaluative threat in male adolescents with Autism Spectrum Disorder (ASD, n = 21) and typical development (n = 13). Participants wore a mobile electrocardiogram to collect heart rate data. There were significant group effects on respiratory sinus arrhythmia (RSA), a measure of parasympathetic nervous system function, with lower values in ASD (F = 4.97). Bivariate correlations also showed a significant relationship between parent reports of social problems and RSA response to the TSST (r = -0.586). These findings suggest that autonomic dysregulation may contribute to social deficits in adolescents with ASD.

  10. Distracted by the Unthought - Suppression and Reappraisal of Mind Wandering under Stereotype Threat.

    PubMed

    Schuster, Carolin; Martiny, Sarah E; Schmader, Toni

    2015-01-01

    Previous research has found that subtle reminders of negative stereotypes about one's group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women's math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women's performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants' math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss implications for the understanding of processes underlying stereotype threat effects and the benefits of reappraising subjective experience under threat.

  11. Distracted by the Unthought – Suppression and Reappraisal of Mind Wandering under Stereotype Threat

    PubMed Central

    Schuster, Carolin; Martiny, Sarah E.; Schmader, Toni

    2015-01-01

    Previous research has found that subtle reminders of negative stereotypes about one’s group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women’s math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women’s performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants’ math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss implications for the understanding of processes underlying stereotype threat effects and the benefits of reappraising subjective experience under threat. PMID:25815814

  12. A 5TH GENERATION FIGHTER FOR BELGIUM:LUXURY OR NECESSITY

    DTIC Science & Technology

    2016-02-16

    violence to assert power. Overall, 3 we see threats, old and new, from piracy to terrorism to cyber-attacks. Based on these increased threats, NATO...share information seamlessly and contribute to a Common Operating Picture ( COP ). This construct will balance speed with accuracy to deliver the

  13. 76 FR 20048 - Notice of Revised Determination on Reconsideration

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-11

    ... negative determination was based on the findings that the worker separations, or threat of separation, were... importantly to worker separations (total or partial), or threat of such separations, at NCR Corporation, Call... investigation, I affirm the original notice of negative determination of eligibility to apply for worker...

  14. Risk-Based Models for Managing Data Privacy in Healthcare

    ERIC Educational Resources Information Center

    AL Faresi, Ahmed

    2011-01-01

    Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…

  15. The paradoxical moderating effect of body image investment on the impact of weight-based derogatory media.

    PubMed

    Boersma, Katelyn E; Jarry, Josée L

    2013-03-01

    Weight-based derogatory media consist of derogation of celebrities for failing to meet the thin ideal. This study examined the impact of weight-based derogatory media on women's body satisfaction, appearance self-esteem, fear of negative appearance evaluation, and negative affect. Female undergraduates (N=240) were exposed to either tabloid-style pictures and articles derogating average size celebrities for gaining weight, or to the same images accompanied by neutral information. Women in the derogation condition reported greater fear of negative appearance evaluation than did women in the neutral media condition. Contrary to predictions, women low in maladaptive body image investment reported lower body satisfaction and appearance self-esteem in the derogatory media condition than they did in the neutral condition, while women high in maladaptive investment did not differ across conditions. Highly invested women's unexpected reaction may be understood as a defence against a threat to a valued domain of the self. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. Computer aiding for low-altitude helicopter flight

    NASA Technical Reports Server (NTRS)

    Swenson, Harry N.

    1991-01-01

    A computer-aiding concept for low-altitude helicopter flight was developed and evaluated in a real-time piloted simulation. The concept included an optimal control trajectory-generated algorithm based on dynamic programming, and a head-up display (HUD) presentation of a pathway-in-the-sky, a phantom aircraft, and flight-path vector/predictor symbol. The trajectory-generation algorithm uses knowledge of the global mission requirements, a digital terrain map, aircraft performance capabilities, and advanced navigation information to determine a trajectory between mission waypoints that minimizes threat exposure by seeking valleys. The pilot evaluation was conducted at NASA Ames Research Center's Sim Lab facility in both the fixed-base Interchangeable Cab (ICAB) simulator and the moving-base Vertical Motion Simulator (VMS) by pilots representing NASA, the U.S. Army, and the U.S. Air Force. The pilots manually tracked the trajectory generated by the algorithm utilizing the HUD symbology. They were able to satisfactorily perform the tracking tasks while maintaining a high degree of awareness of the outside world.

  17. What We Are Watching—Top Global Infectious Disease Threats, 2013-2016: An Update from CDC's Global Disease Detection Operations Center

    PubMed Central

    Iuliano, A. Danielle; Uyeki, Timothy M.; Mintz, Eric D.; Nichol, Stuart T.; Rollin, Pierre; Staples, J. Erin; Arthur, Ray R.

    2017-01-01

    To better track public health events in areas where the public health system is unable or unwilling to report the event to appropriate public health authorities, agencies can conduct event-based surveillance, which is defined as the organized collection, monitoring, assessment, and interpretation of unstructured information regarding public health events that may represent an acute risk to public health. The US Centers for Disease Control and Prevention's (CDC's) Global Disease Detection Operations Center (GDDOC) was created in 2007 to serve as CDC's platform dedicated to conducting worldwide event-based surveillance, which is now highlighted as part of the “detect” element of the Global Health Security Agenda (GHSA). The GHSA works toward making the world more safe and secure from disease threats through building capacity to better “Prevent, Detect, and Respond” to those threats. The GDDOC monitors approximately 30 to 40 public health events each day. In this article, we describe the top threats to public health monitored during 2012 to 2016: avian influenza, cholera, Ebola virus disease, and the vector-borne diseases yellow fever, chikungunya virus, and Zika virus, with updates to the previously described threats from Middle East respiratory syndrome-coronavirus (MERS-CoV) and poliomyelitis. PMID:28805465

  18. What We Are Watching-Top Global Infectious Disease Threats, 2013-2016: An Update from CDC's Global Disease Detection Operations Center.

    PubMed

    Christian, Kira A; Iuliano, A Danielle; Uyeki, Timothy M; Mintz, Eric D; Nichol, Stuart T; Rollin, Pierre; Staples, J Erin; Arthur, Ray R

    To better track public health events in areas where the public health system is unable or unwilling to report the event to appropriate public health authorities, agencies can conduct event-based surveillance, which is defined as the organized collection, monitoring, assessment, and interpretation of unstructured information regarding public health events that may represent an acute risk to public health. The US Centers for Disease Control and Prevention's (CDC's) Global Disease Detection Operations Center (GDDOC) was created in 2007 to serve as CDC's platform dedicated to conducting worldwide event-based surveillance, which is now highlighted as part of the "detect" element of the Global Health Security Agenda (GHSA). The GHSA works toward making the world more safe and secure from disease threats through building capacity to better "Prevent, Detect, and Respond" to those threats. The GDDOC monitors approximately 30 to 40 public health events each day. In this article, we describe the top threats to public health monitored during 2012 to 2016: avian influenza, cholera, Ebola virus disease, and the vector-borne diseases yellow fever, chikungunya virus, and Zika virus, with updates to the previously described threats from Middle East respiratory syndrome-coronavirus (MERS-CoV) and poliomyelitis.

  19. Severe Weather Forecast Decision Aid

    NASA Technical Reports Server (NTRS)

    Bauman, William H., III; Wheeler, Mark M.; Short, David A.

    2005-01-01

    This report presents a 15-year climatological study of severe weather events and related severe weather atmospheric parameters. Data sources included local forecast rules, archived sounding data, Cloud-to-Ground Lightning Surveillance System (CGLSS) data, surface and upper air maps, and two severe weather event databases covering east-central Florida. The local forecast rules were used to set threat assessment thresholds for stability parameters that were derived from the sounding data. The severe weather events databases were used to identify days with reported severe weather and the CGLSS data was used to differentiate between lightning and non-lightning days. These data sets provided the foundation for analyzing the stability parameters and synoptic patterns that were used to develop an objective tool to aid in forecasting severe weather events. The period of record for the analysis was May - September, 1989 - 2003. The results indicate that there are certain synoptic patterns more prevalent on days with severe weather and some of the stability parameters are better predictors of severe weather days based on locally tuned threat values. The results also revealed the stability parameters that did not display any skill related to severe weather days. An interactive web-based Severe Weather Decision Aid was developed to assist the duty forecaster by providing a level of objective guidance based on the analysis of the stability parameters, CGLSS data, and synoptic-scale dynamics. The tool will be tested and evaluated during the 2005 warm season.

  20. Bayesian hypothesis testing for human threat conditioning research: an introduction and the condir R package

    PubMed Central

    Krypotos, Angelos-Miltiadis; Klugkist, Irene; Engelhard, Iris M.

    2017-01-01

    ABSTRACT Threat conditioning procedures have allowed the experimental investigation of the pathogenesis of Post-Traumatic Stress Disorder. The findings of these procedures have also provided stable foundations for the development of relevant intervention programs (e.g. exposure therapy). Statistical inference of threat conditioning procedures is commonly based on p-values and Null Hypothesis Significance Testing (NHST). Nowadays, however, there is a growing concern about this statistical approach, as many scientists point to the various limitations of p-values and NHST. As an alternative, the use of Bayes factors and Bayesian hypothesis testing has been suggested. In this article, we apply this statistical approach to threat conditioning data. In order to enable the easy computation of Bayes factors for threat conditioning data we present a new R package named condir, which can be used either via the R console or via a Shiny application. This article provides both a non-technical introduction to Bayesian analysis for researchers using the threat conditioning paradigm, and the necessary tools for computing Bayes factors easily. PMID:29038683

  1. Power affects performance when the pressure is on: evidence for low-power threat and high-power lift.

    PubMed

    Kang, Sonia K; Galinsky, Adam D; Kray, Laura J; Shirako, Aiwa

    2015-05-01

    The current research examines how power affects performance in pressure-filled contexts. We present low-power-threat and high-power-lift effects, whereby performance in high-stakes situations suffers or is enhanced depending on one's power; that is, the power inherent to a situational role can produce effects similar to stereotype threat and lift. Three negotiations experiments demonstrate that role-based power affects outcomes but only when the negotiation is diagnostic of ability and, therefore, pressure-filled. We link these outcomes conceptually to threat and lift effects by showing that (a) role power affects performance more strongly when the negotiation is diagnostic of ability and (b) underperformance disappears when the low-power negotiator has an opportunity to self-affirm. These results suggest that stereotype threat and lift effects may represent a more general phenomenon: When the stakes are raised high, relative power can act as either a toxic brew (stereotype/low-power threat) or a beneficial elixir (stereotype/high-power lift) for performance. © 2015 by the Society for Personality and Social Psychology, Inc.

  2. Developing anti-tobacco messages for Australian Aboriginal and Torres Strait Islander peoples: evidence from a national cross-sectional survey.

    PubMed

    Gould, Gillian S; Watt, Kerrianne; Stevenson, Leah; McEwen, Andy; Cadet-James, Yvonne; Clough, Alan R

    2014-03-13

    Smoking rates in Australian Aboriginal and Torres Strait Islander peoples remain high, with limited impact of government measures for many subgroups. The aim of this cross-sectional study was to investigate differences in organisational practice for developing anti-tobacco messages for these target populations. Telephone interviews were conducted with 47 organisation representatives using a structured questionnaire based on health communication and health promotion frameworks. Responses were coded into phases of message development, message types (educational, threat, positive or advocacy), target groups, message recommendations, and evaluations undertaken. Cultural sensitivity for message development was divided into surface structure (use of images, language, demographics) and deep structure (use of socio-cultural values). A categorical principal component analysis explored the key dimensions of the findings and their component relationships. Among organisations interviewed, a community-orientated, bottom-up approach for developing anti-tobacco messages was reported by 47% (n=24); 55% based message development on a theoretical framework; 87% used a positive benefit appeal; 38% used threat messages. More Aboriginal Medical Services (AMSs) targeted youth (p<0.005) and advised smokers to quit (p<0.05) than other types of organisations. AMSs were significantly more likely to report using deep structure in tailoring messages compared with non-government (p<0.05) and government organisations (p<0.05). Organisations that were oriented to the general population were more likely to evaluate their programs (p<0.05). A two-dimensional non-linear principal component analysis extracted components interpreted as "cultural understanding" (bottom-up, community-based approaches, deep structures) and "rigour" (theoretical frameworks, and planned/completed evaluations), and accounted for 53% of the variability in the data. Message features, associated with successful campaigns in other populations, are starting to be used for Aboriginal and Torres Strait Islander peoples. A model is proposed to facilitate the development of targeted anti-tobacco messages for Aboriginal and Torres Strait Islander peoples. Organisations could consider incorporating both components of cultural understanding-rigour to enable the growth of evidence-based practice.

  3. Developing anti-tobacco messages for Australian Aboriginal and Torres Strait Islander peoples: evidence from a national cross-sectional survey

    PubMed Central

    2014-01-01

    Background Smoking rates in Australian Aboriginal and Torres Strait Islander peoples remain high, with limited impact of government measures for many subgroups. The aim of this cross-sectional study was to investigate differences in organisational practice for developing anti-tobacco messages for these target populations. Methods Telephone interviews were conducted with 47 organisation representatives using a structured questionnaire based on health communication and health promotion frameworks. Responses were coded into phases of message development, message types (educational, threat, positive or advocacy), target groups, message recommendations, and evaluations undertaken. Cultural sensitivity for message development was divided into surface structure (use of images, language, demographics) and deep structure (use of socio-cultural values). A categorical principal component analysis explored the key dimensions of the findings and their component relationships. Results Among organisations interviewed, a community-orientated, bottom-up approach for developing anti-tobacco messages was reported by 47% (n = 24); 55% based message development on a theoretical framework; 87% used a positive benefit appeal; 38% used threat messages. More Aboriginal Medical Services (AMSs) targeted youth (p < 0.005) and advised smokers to quit (p < 0.05) than other types of organisations. AMSs were significantly more likely to report using deep structure in tailoring messages compared with non-government (p < 0.05) and government organisations (p < 0.05). Organisations that were oriented to the general population were more likely to evaluate their programs (p < 0.05). A two-dimensional non-linear principal component analysis extracted components interpreted as “cultural understanding” (bottom-up, community-based approaches, deep structures) and “rigour” (theoretical frameworks, and planned/completed evaluations), and accounted for 53% of the variability in the data. Conclusion Message features, associated with successful campaigns in other populations, are starting to be used for Aboriginal and Torres Strait Islander peoples. A model is proposed to facilitate the development of targeted anti-tobacco messages for Aboriginal and Torres Strait Islander peoples. Organisations could consider incorporating both components of cultural understanding-rigour to enable the growth of evidence-based practice. PMID:24625235

  4. Providing security assurance in line with national DBT assumptions

    NASA Astrophysics Data System (ADS)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the field of physical and cyber protection. These national regulations have to be met later on by I&C platform suppliers, electrical systems suppliers, system integrators and turn-key providers.

  5. Child Maltreatment and Autonomic Nervous System Reactivity: Identifying Dysregulated Stress Reactivity Patterns using the Biopsychosocial Model of Challenge and Threat

    PubMed Central

    McLaughlin, Katie A.; Sheridan, Margaret A.; Alves, Sonia; Mendes, Wendy Berry

    2014-01-01

    OBJECTIVE Disruptions in stress response system development have been posited as mechanisms linking child maltreatment (CM) to psychopathology. Existing theories predict elevated sympathetic nervous system (SNS) reactivity following CM, but evidence for this is inconsistent. We present a novel framework for conceptualizing stress reactivity following CM using the biopsychosocial model of challenge and threat. We predicted that in the context of a social-evaluative stressor, maltreated adolescents would exhibit a threat pattern of reactivity, involving SNS activation paired with elevated vascular resistance and blunted cardiac output (CO) reactivity. METHODS A sample of 168 adolescents (mean age=14.9 years) participated. Recruitment targeted maltreated adolescents; 38.2% qualified as maltreated. Electrocardiogram, impedance cardiography, and blood pressure were acquired at rest and during an evaluated social stressor (Trier Social Stress Test). Pre-ejection period (PEP), CO, and total peripheral resistance (TPR) reactivity were computed during task preparation, speech-delivery, and verbal mental-arithmetic. Internalizing and externalizing symptoms were assessed. RESULTS Maltreatment was unrelated to PEP reactivity during preparation or speech, but maltreated adolescents had reduced PEP reactivity during math. Maltreatment exposure (F(1,145)=3.8-9.4, p=.053-<.001) and severity (β=−.10-.12, p=.030-.007) were associated with significantly reduced CO reactivity during all components of the stress-task and marginally associated with elevated TPR reactivity (F(1,145)=3.8-9.4, p=.053-<.001; β=.07-.11, p=.11-.009, respectively). Threat reactivity was negatively associated with externalizing symptoms. CONCLUSIONS Child maltreatment is associated with a dysregulated pattern of physiological reactivity consistent with theoretical conceptualizations of threat but not previously examined in relation to maltreatment, suggesting a more nuanced pattern of stress reactivity than predicted by current theoretical models. PMID:25170753

  6. Population viability analysis of the Endangered shortnose sturgeon

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jager, Yetta; Bevelhimer, Mark S; Peterson, Douglas L.

    2011-07-01

    This study used population viability analysis (PVA) to partition the influences of potential threats to the endangered shortnose sturgeon (Acipenser brevirostrum). A workshop brought together experts to help identify potential threats including groundwater withdrawal, poor water quality, saltwater intrusion, mercury effects, harvest as by-catch, and sedimentation of spawning habitat. During the course of the project, we eliminated some threats and added new ones. Groundwater withdrawal was dismissed after a study failed to identify connection with groundwater and the majority of pumping is from a confined aquifer. We also eliminated activities on Fort Stewart as influences on spawning habitat because anymore » successful spawning must occur upstream of Fort Stewart. We added climate change to the list of threats based on our assessment of temperature effects and expectations of sea-level rise. Our study highlighted the role of populations in nearby rivers in providing metapopulation support, raising the concern that the population in the Ogeechee River acts as a demographic sink. As part of this study, we carried out a field sampling study to analyze effects of training activities on headwater streams. We developed a new methodology for sampling design as part of this effort and used a mixed-modeling approach to identify relationships between land cover-land use, including those associated with military training activity and water quality. We found that tank training was associated with higher suspended sediment and equipment training was associated with higher organic carbon) and water quality. We detected effects of training on suspended sediment and organic carbon. We also carried out a field sampling effort in the Canoochee and Ogeechee Rivers. In the Ogeechee River, we found that dissolved oxygen in 40% of measurements during summer were below 4 mg L-1. To evaluate mercury as a potential threat, we developed a mercury uptake model and analyzed mercury levels in amphipod prey and sturgeon eggs. These did not exceed EPA guidelines. Finally, we developed a PVA model that including linkages between shortnose sturgeon growth, reproduction, and survival and each remaining threat; All three had significant influences. Preliminary simulations suggest that elevated temperatures under future climate will extirpate this population and add support to the hypothesis that this species requires access to spawning habitat far upstream to persist.« less

  7. Gene × environment interaction on intergroup bias: the role of 5-HTTLPR and perceived outgroup threat.

    PubMed

    Cheon, Bobby K; Livingston, Robert W; Hong, Ying-Yi; Chiao, Joan Y

    2014-09-01

    Perceived threat from outgroups is a consistent social-environmental antecedent of intergroup bias (i.e. prejudice, ingroup favoritism). The serotonin transporter gene polymorphism (5-HTTLPR) has been associated with individual variations in sensitivity to context, particularly stressful and threatening situations. Here, we examined how 5-HTTLPR and environmental factors signaling potential outgroup threat dynamically interact to shape intergroup bias. Across two studies, we provide novel evidence for a gene-environment interaction on the acquisition of intergroup bias and prejudice. Greater exposure to signals of outgroup threat, such as negative prior contact with outgroups and perceived danger from the social environment, were more predictive of intergroup bias among participants possessing at least one short allele (vs two long alleles) of 5-HTTLPR. Furthermore, this gene x environment interaction was observed for biases directed at diverse ethnic and arbitrarily-defined outgroups across measures reflecting intergroup biases in evaluation and discriminatory behavior. These findings reveal a candidate genetic mechanism for the acquisition of intergroup bias, and suggest that intergroup bias is dually inherited and transmitted through the interplay of social (i.e. contextual cues of outgroup threat) and biological mechanisms (i.e. genetic sensitivity toward threatening contexts) that regulate perceived intergroup threats. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  8. Study of Threat Scenario Reconstruction based on Multiple Correlation

    NASA Astrophysics Data System (ADS)

    Yuan, Xuejun; Du, Jing; Qin, Futong; Zhou, Yunyan

    2017-10-01

    The emergence of intrusion detection technology has solved many network attack problems, ensuring the safety of computer systems. However, because of the isolated output alarm information, large amount of data, and mixed events, it is difficult for the managers to understand the deep logic relationship between the alarm information, thus they cannot deduce the attacker’s true intentions. This paper presents a method of online threat scene reconstruction to handle the alarm information, which reconstructs of the threat scene. For testing, the standard data set is used.

  9. Recent advances and remaining challenges for the spectroscopic detection of explosive threats.

    PubMed

    Fountain, Augustus W; Christesen, Steven D; Moon, Raphael P; Guicheteau, Jason A; Emmons, Erik D

    2014-01-01

    In 2010, the U.S. Army initiated a program through the Edgewood Chemical Biological Center to identify viable spectroscopic signatures of explosives and initiate environmental persistence, fate, and transport studies for trace residues. These studies were ultimately designed to integrate these signatures into algorithms and experimentally evaluate sensor performance for explosives and precursor materials in existing chemical point and standoff detection systems. Accurate and validated optical cross sections and signatures are critical in benchmarking spectroscopic-based sensors. This program has provided important information for the scientists and engineers currently developing trace-detection solutions to the homemade explosive problem. With this information, the sensitivity of spectroscopic methods for explosives detection can now be quantitatively evaluated before the sensor is deployed and tested.

  10. SWOT analysis in Sina Trauma and Surgery Research Center.

    PubMed

    Salamati, Payman; ashraf Eghbali, Ali; Zarghampour, Manijeh

    2014-01-01

    The present study was conducted with the aim of identifying and evaluating the internal and external factors, affecting the Sina Trauma and Surgery Research Center, affiliated to Tehran University of Medical Sciences and propose some of related strategies to senior managers. We used a combined quantitative and qualitative methodology. Our study population consisted of personnel (18 individuals) at Sina Trauma and Surgery Research Center. Data-collection tools were the group discussions and the questionnaires. Data were analyzed with descriptive statistics and SWOT (Strength, Weakness, Opportunities and Threats) analysis. 18 individuals participated in sessions, consisting of 8 women (44.4%) and 10 men (55.6%). The final scores were 2.45 for internal factors (strength-weakness) and 2.17 for external factors (opportunities-threats). In this study, we proposed 36 strategies (10 weakness-threat strategies, 10 weakness-opportunity strategies, 7 strength-threat strategies, and 9 strength-opportunity strategies). The current status of Sina Trauma and Surgery Research Center is threatened weak. We recommend the center to implement the proposed strategies.

  11. [Factors associated with the quality of life of community health agents].

    PubMed

    Mascarenhas, Claudio Henrique Meira; Prado, Fabio Ornellas; Fernandes, Marcos Henrique

    2013-05-01

    This study examined the association of socio-demographic, occupational and risk and health behavioral factors with the loss of quality of life for community health agents of the municipality of Jequié in the state of Bahia. It is a cross-sectional study with 316 individuals, in which WHOQOL-Bref was used to evaluate the quality of life. The Poisson regression model was applied adopting the confidence interval of 95%. The variables associated with the largest threat to the Physical domain were gender, age, pain and satisfaction with health. Threats to the Psychological domain were schooling, psycho-social aspects, smoking, pain and satisfaction with health were analyzed. Threats to the Social Relations domain of were sex, marital situation, schooling, psycho-social aspects, and satisfaction with health. Threats to the Environmental domain were sex, family income, workplace, psycho-social aspects and satisfaction with health. It is hoped that this study will foster the development of public policies designed to enhance the conditions of life and work of this group of workers.

  12. Multi-Agent Patrolling under Uncertainty and Threats.

    PubMed

    Chen, Shaofei; Wu, Feng; Shen, Lincheng; Chen, Jing; Ramchurn, Sarvapali D

    2015-01-01

    We investigate a multi-agent patrolling problem where information is distributed alongside threats in environments with uncertainties. Specifically, the information and threat at each location are independently modelled as multi-state Markov chains, whose states are not observed until the location is visited by an agent. While agents will obtain information at a location, they may also suffer damage from the threat at that location. Therefore, the goal of the agents is to gather as much information as possible while mitigating the damage incurred. To address this challenge, we formulate the single-agent patrolling problem as a Partially Observable Markov Decision Process (POMDP) and propose a computationally efficient algorithm to solve this model. Building upon this, to compute patrols for multiple agents, the single-agent algorithm is extended for each agent with the aim of maximising its marginal contribution to the team. We empirically evaluate our algorithm on problems of multi-agent patrolling and show that it outperforms a baseline algorithm up to 44% for 10 agents and by 21% for 15 agents in large domains.

  13. Explaining opposition to refugee resettlement: The role of NIMBYism and perceived threats

    PubMed Central

    Ferwerda, Jeremy; Flynn, D.J.; Horiuchi, Yusaku

    2017-01-01

    One week after President Donald Trump signed a controversial executive order to reduce the influx of refugees to the United States, we conducted a survey experiment to understand American citizens’ attitudes toward refugee resettlement. Specifically, we evaluated whether citizens consider the geographic context of the resettlement program (that is, local versus national) and the degree to which they are swayed by media frames that increasingly associate refugees with terrorist threats. Our findings highlight a collective action problem: Participants are consistently less supportive of resettlement within their own communities than resettlement elsewhere in the country. This pattern holds across all measured demographic, political, and geographic subsamples within our data. Furthermore, our results demonstrate that threatening media frames significantly reduce support for both national and local resettlement. Conversely, media frames rebutting the threat posed by refugees have no significant effect. Finally, the results indicate that participants in refugee-dense counties are less responsive to threatening frames, suggesting that proximity to previously settled refugees may reduce the impact of perceived security threats. PMID:28913425

  14. Explaining opposition to refugee resettlement: The role of NIMBYism and perceived threats.

    PubMed

    Ferwerda, Jeremy; Flynn, D J; Horiuchi, Yusaku

    2017-09-01

    One week after President Donald Trump signed a controversial executive order to reduce the influx of refugees to the United States, we conducted a survey experiment to understand American citizens' attitudes toward refugee resettlement. Specifically, we evaluated whether citizens consider the geographic context of the resettlement program (that is, local versus national) and the degree to which they are swayed by media frames that increasingly associate refugees with terrorist threats. Our findings highlight a collective action problem: Participants are consistently less supportive of resettlement within their own communities than resettlement elsewhere in the country. This pattern holds across all measured demographic, political, and geographic subsamples within our data. Furthermore, our results demonstrate that threatening media frames significantly reduce support for both national and local resettlement. Conversely, media frames rebutting the threat posed by refugees have no significant effect. Finally, the results indicate that participants in refugee-dense counties are less responsive to threatening frames, suggesting that proximity to previously settled refugees may reduce the impact of perceived security threats.

  15. Association between attention bias to threat and anxiety symptoms in children and adolescents.

    PubMed

    Abend, Rany; de Voogd, Leone; Salemink, Elske; Wiers, Reinout W; Pérez-Edgar, Koraly; Fitzgerald, Amanda; White, Lauren K; Salum, Giovanni A; He, Jie; Silverman, Wendy K; Pettit, Jeremy W; Pine, Daniel S; Bar-Haim, Yair

    2018-03-01

    Considerable research links threat-related attention biases to anxiety symptoms in adults, whereas extant findings on threat biases in youth are limited and mixed. Inconsistent findings may arise due to substantial methodological variability and limited sample sizes, emphasizing the need for systematic research on large samples. The aim of this report is to examine the association between threat bias and pediatric anxiety symptoms using standardized measures in a large, international, multi-site youth sample. A total of 1,291 children and adolescents from seven research sites worldwide completed standardized attention bias assessment task (dot-probe task) and child anxiety symptoms measure (Screen for Child Anxiety Related Emotional Disorders). Using a dimensional approach to symptomatology, we conducted regression analyses predicting overall, and disorder-specific, anxiety symptoms severity, based on threat bias scores. Threat bias correlated positively with overall anxiety symptoms severity (ß = 0.078, P = .004). Furthermore, threat bias was positively associated specifically with social anxiety (ß = 0.072, P = .008) and school phobia (ß = 0.076, P = .006) symptoms severity, but not with panic, generalized anxiety, or separation anxiety symptoms. These associations were not moderated by age or gender. These findings indicate associations between threat bias and pediatric anxiety symptoms, and suggest that vigilance to external threats manifests more prominently in symptoms of social anxiety and school phobia, regardless of age and gender. These findings point to the role of attention bias to threat in anxiety, with implications for translational clinical research. The significance of applying standardized methods in multi-site collaborations for overcoming challenges inherent to clinical research is discussed. © 2017 Wiley Periodicals, Inc.

  16. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  17. Contribution of Near Real Time MODIS-Based Forest Disturbance Detection Products to a National Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.; Hargrove, William; Glasser, Jerry; Kuper, Philip D.

    2011-01-01

    This presentation discusses an effort to compute and post weekly MODIS forest change products for the conterminous US (CONUS), as part of national forest threat early warning system (EWS) known as the U.S. Forest Change Assessment Viewer (FCAV). The US Forest Service, NASA, USGS, and ORNL are working collaboratively to contribute weekly change products to this EWS. Large acreages of the nation's forests are being disturbed by a growing multitude of biotic and abiotic threats that can act either singularly or in combination. When common at regional scales, such disturbances can pose hazards and threats to floral and faunal bio-diversity, ecosystem sustainability, ecosystem services, and human settlements across the conterminous US. Regionally evident forest disturbances range from ephemeral periodic canopy defoliation to stand replacement mortality events due to insects, disease, fire, hurricanes, tornadoes, ice, hail, and drought. Mandated by the Healthy Forest Restoration Act of 2003, this forest threat EWS has been actively developed since 2006 and on-line since 2010. This FCAV system employs 250-meter MODIS NDVI-based forest change products as a key element of the system, providing regional and CONUS scale products in near real time every 8 days. Each forest change product in FCAV is based on current versus historical 24 day composite NDVI data gridded at 231.66 meter resolution. Current NDVI is derived from USGS eMODIS expedited products. MOD13 NDVI is used for constructing historical baselines. CONUS change products are computed for all forests as % change in the current versus historical NDVI. Change products are computed according to previous year, previous 3 years and previous 8 year historical baselines. The use of multiple baselines enables disturbance anomaly phenology to be more fully assessed. CONUS forest change products are posted each week on the FCAV, a web mapping service maintained by the National Environmental Modeling and Analysis Center. The FCAV EWS has been used to aid multiple Federal and State agency forest management activities, including aerial disturbance detection surveys, as well as rapid response preliminary assessments of timber loss due to tornadoes, regional drought studies, and fire damage assessments. The FCAV allows end-users to assess the context of apparent forest vegetation change with respect to ancillary data, such as land cover, topography, hydrology, climate variables, and administrative boundaries. Such change products are being evaluated through case studies involving comparison with higher spatial resolution satellite, aerial, and field data. The presentation will include multiple examples in which regionally evident forest disturbances were successfully detected and monitored with the MODIS-based change products, as part of the FCAV. FCAV's MODIS forest change products enable end-users (e.g., resource managers) to monitor forest hazards at regional scales throughout the year and across the nation.

  18. Contribution of Near Real Time MODIS-Based Forest Disturbance Detection Products to a National Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph; Hargrove, William; Gasser, Gerald; Smoot, James; Kuper, Philip

    2011-01-01

    U.S. forests occupy approx. 751 million acres (approx. 1/3 of total land). These forests are exposed to multiple biotic and abiotic threats that collectively damage extensive acreages each year. Hazardous forest disturbances can threaten human life and property, bio-diversity and water supplies. Timely regional forest monitoring products are needed to aid forest management and decision making by the US Forest Service and its state and private partners. Daily MODIS data products provide a means to monitor regional forest disturbances on a weekly basis. In response, we began work in 2006 to develop a Near Real Time (NRT) forest monitoring capability, based on MODIS NDVI data, as part of a national forest threat early warning system (EWS)

  19. Looming Threats and Animacy: Reduced Responsiveness in Youth with Disrupted Behavior Disorders.

    PubMed

    White, Stuart F; Thornton, Laura C; Leshin, Joseph; Clanton, Roberta; Sinclair, Stephen; Coker-Appiah, Dionne; Meffert, Harma; Hwang, Soonjo; Blair, James R

    2018-05-01

    Theoretical models have implicated amygdala dysfunction in the development of Disruptive Behavior Disorders (DBDs; Conduct Disorder/Oppositional Defiant Disorder). Amygdala dysfunction impacts valence evaluation/response selection and emotion attention in youth with DBDs, particularly in those with elevated callous-unemotional (CU) traits. However, amygdala responsiveness during social cognition and the responsiveness of the acute threat circuitry (amygdala/periaqueductal gray) in youth with DBDs have been less well-examined, particularly with reference to CU traits. 31 youth with DBDs and 27 typically developing youth (IQ, age and gender-matched) completed a threat paradigm during fMRI where animate and inanimate, threatening and neutral stimuli appeared to loom towards or recede from participants. Reduced responsiveness to threat variables, including visual threats and encroaching stimuli, was observed within acute threat circuitry and temporal, lateral frontal and parietal cortices in youth with DBDs. This reduced responsiveness, at least with respect to the looming variable, was modulated by CU traits. Reduced responsiveness to animacy information was also observed within temporal, lateral frontal and parietal cortices, but not within amygdala. Reduced responsiveness to animacy information as a function of CU traits was observed in PCC, though not within the amygdala. Reduced threat responsiveness may contribute to risk taking and impulsivity in youth with DBDs, particularly those with high levels of CU traits. Future work will need to examine the degree to which this reduced response to animacy is independent of amygdala dysfunction in youth with DBDs and what role PCC might play in the dysfunctional social cognition observed in youth with high levels of CU traits.

  20. Market implementation of the MVA platform for pre-pandemic and pandemic influenza vaccines: A quantitative key opinion leader analysis

    PubMed Central

    Ramezanpour, Bahar; Pronker, Esther S.; Kreijtz, Joost H.C.M.; Osterhaus, Albert D.M.E.; Claassen, E.

    2015-01-01

    A quantitative method is presented to rank strengths, weaknesses, opportunities, and threats (SWOT) of modified vaccinia virus Ankara (MVA) as a platform for pre-pandemic and pandemic influenza vaccines. Analytic hierarchy process (AHP) was applied to achieve pairwise comparisons among SWOT factors in order to prioritize them. Key opinion leaders (KOLs) in the influenza vaccine field were interviewed to collect a unique dataset to evaluate the market potential of this platform. The purpose of this study, to evaluate commercial potential of the MVA platform for the development of novel generation pandemic influenza vaccines, is accomplished by using a SWOT and AHP combined analytic method. Application of the SWOT–AHP model indicates that its strengths are considered more important by KOLs than its weaknesses, opportunities, and threats. Particularly, the inherent immunogenicity capability of MVA without the requirement of an adjuvant is the most important factor to increase commercial attractiveness of this platform. Concerns regarding vector vaccines and anti-vector immunity are considered its most important weakness, which might lower public health value of this platform. Furthermore, evaluation of the results of this study emphasizes equally important role that threats and opportunities of this platform play. This study further highlights unmet needs in the influenza vaccine market, which could be addressed by the implementation of the MVA platform. Broad use of MVA in clinical trials shows great promise for this vector as vaccine platform for pre-pandemic and pandemic influenza and threats by other respiratory viruses. Moreover, from the results of the clinical trials seem that MVA is particularly attractive for development of vaccines against pathogens for which no, or only insufficiently effective vaccines, are available. PMID:26048779

  1. Market implementation of the MVA platform for pre-pandemic and pandemic influenza vaccines: A quantitative key opinion leader analysis.

    PubMed

    Ramezanpour, Bahar; Pronker, Esther S; Kreijtz, Joost H C M; Osterhaus, Albert D M E; Claassen, E

    2015-08-20

    A quantitative method is presented to rank strengths, weaknesses, opportunities, and threats (SWOT) of modified vaccinia virus Ankara (MVA) as a platform for pre-pandemic and pandemic influenza vaccines. Analytic hierarchy process (AHP) was applied to achieve pairwise comparisons among SWOT factors in order to prioritize them. Key opinion leaders (KOLs) in the influenza vaccine field were interviewed to collect a unique dataset to evaluate the market potential of this platform. The purpose of this study, to evaluate commercial potential of the MVA platform for the development of novel generation pandemic influenza vaccines, is accomplished by using a SWOT and AHP combined analytic method. Application of the SWOT-AHP model indicates that its strengths are considered more important by KOLs than its weaknesses, opportunities, and threats. Particularly, the inherent immunogenicity capability of MVA without the requirement of an adjuvant is the most important factor to increase commercial attractiveness of this platform. Concerns regarding vector vaccines and anti-vector immunity are considered its most important weakness, which might lower public health value of this platform. Furthermore, evaluation of the results of this study emphasizes equally important role that threats and opportunities of this platform play. This study further highlights unmet needs in the influenza vaccine market, which could be addressed by the implementation of the MVA platform. Broad use of MVA in clinical trials shows great promise for this vector as vaccine platform for pre-pandemic and pandemic influenza and threats by other respiratory viruses. Moreover, from the results of the clinical trials seem that MVA is particularly attractive for development of vaccines against pathogens for which no, or only insufficiently effective vaccines, are available. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  2. The copycat phenomenon after two Finnish school shootings: an adolescent psychiatric perspective.

    PubMed

    Lindberg, Nina; Sailas, Eila; Kaltiala-Heino, Riittakerttu

    2012-07-28

    Two school shootings with altogether 18 victims took place in Finland in November 2007 and September 2008. Homicides and suicides are both associated with the copycat phenomenon. The aim of the present study was to characterize adolescent copycats who had threatened to carry out a school massacre. The nation-wide study evaluated 77 13- to 18-year-old adolescents who were sent for adolescent psychiatric evaluations between 8.11.2007 and 30.6.2009, one of the reasons for evaluation being a threat of massacre at school. The medical files of the copycats were retrospectively analysed using a special data collection form. Data on demographics, family- and school-related issues, previous psychiatric treatment and previous delinquency, current symptoms, family adversities and psychiatric diagnoses were collected. The severity of the threat expressed and the risk posed by the adolescent in question were evaluated. The Psychopathy Checklist Youth Version was used to assess psychopathic traits. All of the copycats were native Finns with a mean age of 15.0 years. Almost two thirds of them had a history of previous mental health treatment before the index threat. Almost two thirds of the copycats suffered from anxiety and depressive symptoms, and almost half of the sample expressed either suicidal ideation or suicidal plans. Behavioural problems including impulse control problems, aggressive outbursts, the destruction of property as well as non-physical and physical violence against other persons were common. The diagnosis groups highlighted were behavioural and emotional disorders, mood disorders as well as schizophrenia-related disorders. The prevalence of pervasive developmental disorders was high. Only one of the copycats was assessed as expressing high traits of psychopathy. The copycats with school massacre threats were characterized with a high prevalence of mental and behavioural disorders. Like actual school shooters, they showed psychotic symptoms and traumatic experiences, but unlike the shooters, the copycats were not psychopathic.

  3. The copycat phenomenon after two Finnish school shootings: an adolescent psychiatric perspective

    PubMed Central

    2012-01-01

    Background Two school shootings with altogether 18 victims took place in Finland in November 2007 and September 2008. Homicides and suicides are both associated with the copycat phenomenon. The aim of the present study was to characterize adolescent copycats who had threatened to carry out a school massacre. Methods The nation-wide study evaluated 77 13- to 18-year-old adolescents who were sent for adolescent psychiatric evaluations between 8.11.2007 and 30.6.2009, one of the reasons for evaluation being a threat of massacre at school. The medical files of the copycats were retrospectively analysed using a special data collection form. Data on demographics, family- and school-related issues, previous psychiatric treatment and previous delinquency, current symptoms, family adversities and psychiatric diagnoses were collected. The severity of the threat expressed and the risk posed by the adolescent in question were evaluated. The Psychopathy Checklist Youth Version was used to assess psychopathic traits. Results All of the copycats were native Finns with a mean age of 15.0 years. Almost two thirds of them had a history of previous mental health treatment before the index threat. Almost two thirds of the copycats suffered from anxiety and depressive symptoms, and almost half of the sample expressed either suicidal ideation or suicidal plans. Behavioural problems including impulse control problems, aggressive outbursts, the destruction of property as well as non-physical and physical violence against other persons were common. The diagnosis groups highlighted were behavioural and emotional disorders, mood disorders as well as schizophrenia-related disorders. The prevalence of pervasive developmental disorders was high. Only one of the copycats was assessed as expressing high traits of psychopathy. Conclusion The copycats with school massacre threats were characterized with a high prevalence of mental and behavioural disorders. Like actual school shooters, they showed psychotic symptoms and traumatic experiences, but unlike the shooters, the copycats were not psychopathic. PMID:22839726

  4. Evaluation and Prediction of Water Resources Based on AHP

    NASA Astrophysics Data System (ADS)

    Li, Shuai; Sun, Anqi

    2017-01-01

    Nowadays, the shortage of water resources is a threat to us. In order to solve the problem of water resources restricted by varieties of factors, this paper establishes a water resources evaluation index model (WREI), which adopts the fuzzy comprehensive evaluation (FCE) based on analytic hierarchy process (AHP) algorithm. After considering influencing factors of water resources, we ignore secondary factors and then hierarchical approach the main factors according to the class, set up a three-layer structure. The top floor is for WREI. Using analytic hierarchy process (AHP) to determine weight first, and then use fuzzy judgment to judge target, so the comprehensive use of the two algorithms reduce the subjective influence of AHP and overcome the disadvantages of multi-level evaluation. To prove the model, we choose India as a target region. On the basis of water resources evaluation index model, we use Matlab and combine grey prediction with linear prediction to discuss the ability to provide clean water in India and the trend of India’s water resources changing in the next 15 years. The model with theoretical support and practical significance will be of great help to provide reliable data support and reference for us to get plans to improve water quality.

  5. Counter-regulating on the Internet: Threat elicits preferential processing of positive information.

    PubMed

    Greving, Hannah; Sassenberg, Kai; Fetterman, Adam

    2015-09-01

    The Internet is a central source of information. It is increasingly used for information search in self-relevant domains (e.g., health). Self-relevant topics are also associated with specific emotions and motivational states. For example, individuals may fear serious illness and feel threatened. Thus far, the impact of threat has received little attention in Internet-based research. The current studies investigated how threat influences Internet search. Threat is known to elicit the preferential processing of positive information. The self-directed nature of Internet search should particularly provide opportunities for such processing behavior. We predicted that during Internet search, more positive information would be processed (i.e., allocated more attention to) and more positive knowledge would be acquired under threat than in a control condition. Three experiments supported this prediction: Under threat, attention is directed more to positive web pages (Study 1) and positive links (Study 2), and more positive information is acquired (Studies 1 and 3) than in a control condition. Notably, the effect on knowledge acquisition was mediated by the effect on attention allocation during an actual Internet search (Study 1). Thus, Internet search under threat leads to selective processing of positive information and dampens threatened individuals' negative affect. (c) 2015 APA, all rights reserved).

  6. Perceived Threat and Internet Use Predict Intentions to Get Bowel Cancer Screening (Colonoscopy): Longitudinal Questionnaire Study

    PubMed Central

    Grapendorf, Johannes; Greving, Hannah; Sassenberg, Kai

    2018-01-01

    Background Many people use the Internet for health-related information search, which is known to help regulate their emotional state. However, not much is known yet about how Web-based information search together with negative emotional states (ie, threat of cancer diagnosis) relate to preventive medical treatment decisions (ie, colonoscopy intentions). Objective The aim of this study was to investigate how frequency of health-related Internet use together with perceived threat of a possible (bowel) cancer diagnosis influences intentions to get a colonoscopy. Previous research has shown that people who experience threat preferentially process positive information in an attempt to downregulate the aversive emotional state. The Internet can facilitate this regulatory strategy through allowing self-directed, unrestricted, and thus biased information search. In the context of threat regarding a possible bowel cancer diagnosis, feelings of threat can still be effectively reduced through cancer screening (ie, colonoscopy). We, therefore, predict that in that particular context, feelings of threat should be related to stronger colonoscopy intentions, and that this relationship should be enhanced for people who use the Internet often. Methods A longitudinal questionnaire study was conducted among healthy participants who were approaching or just entering the bowel cancer risk group (aged 45-55 years). Perceived threat of a possible (bowel) cancer diagnosis, frequency of health-related Internet use, and intentions to have a colonoscopy were assessed at 2 time points (6-month time lag between the 2 measurement points T1 and T2). Multiple regression analyses were conducted to test whether threat and Internet use at T1 together predicted colonoscopy intentions at T2. Results In line with our predictions, we found that the threat of a possible (bowel) cancer diagnosis interacted with the frequency of Internet use (both T1) to predict colonoscopy intentions (T2; B=.23, standard error [SE]=0.09, P=.01). For people who used the Internet relatively often (+1 SD), the positive relationship between threat and colonoscopy intentions was significantly stronger (B=.56, SE=0.15, P<.001) compared with participants who used the Internet less often (−1 SD; B=.17, SE=0.09, P=.07). This relationship was unique to Web-based (vs other types of) information search and independent of risk factors (eg, body mass index [BMI] and smoking). Conclusions The results of this study suggest that health-related Internet use can facilitate emotion-regulatory processes. People who feel threatened by a possible (bowel) cancer diagnosis reported stronger colonoscopy intentions, especially when they used the Internet often. We propose that this is because people who experience threat are more likely to search for and process information that allows them to downregulate their aversive emotional state. In the present case of (bowel) cancer prevention, the most effective way to reduce threat is to get screened. PMID:29415872

  7. Internalising Problems and the Effects of Peer Ostracism on Children's Primary Needs

    ERIC Educational Resources Information Center

    Hawes, David J.; Zadro, Lisa; Iannuzzelli, Rose; Godwin, Alexandra; MacNevin, Georgia; Dadds, Mark R.; Griffiths, Brendan; Richardson, Rick

    2013-01-01

    The aim of this study was to examine associations between ostracism, internalising problems, and threat to primary needs (belonging, control, self-esteem, meaningful existence) in children (N= 165, M age = 9 years). Ostracism was simulated experimentally using the Cyberball paradigm--a computer-based ball-throwing game--and threats to primary…

  8. The Stereotyped Task Engagement Process: The Role of Interest and Achievement Motivation

    ERIC Educational Resources Information Center

    Smith, Jessi L.; Sansone, Carol; White, Paul H.

    2007-01-01

    Competence-based stereotypes can negatively affect women's performance in math and science (referred to as stereotype threat), presumably leading to lower motivation. The authors examined the effects of stereotype threat on interest, a motivational path not necessarily mediated by performance. They predicted that working on a computer science task…

  9. Resilience, Vulnerability and Residual Threat: An Assessment from Indian Sundarban

    NASA Astrophysics Data System (ADS)

    Ghosh, T.

    2016-12-01

    The estuarine islands within Indian Sundarban are extremely vulnerable due to climate change, erosion, flooding and increasing population pressure. Around 4.6 million people are living under constant threat of climatic shocks, affecting their farm based economy and dependency on forest resources for their livelihood. This paper attempts to focus on the dynamics of system's resilience in the backdrop of higher level of vulnerability. Globally the assessment of island vulnerability is generally more focused towards the climate change impacts, rather than taking into account other determining drivers with proper weightage. Three estuarine islands namely Sagar, Ghoramara and Mousani at the western part of Indian Sundarban Delta (ISD) have been chosen for this study to derive the indicator based scoring method using the household survey data from twenty seven (27) sampled `Mouza' (lowest administrative boundary; village) with cluster random sampling. Vulnerability and resilience of these islands have been calculated using the indicators like housing condition, electrification, population density, accretion, adult secondary education level, percentage of people `Below Poverty Line' (BPL) based on per capita income. Residual threats for these islands have been obtained by subtracting the score of resilience and vulnerability of the system. Result suggests that all these islands are in less resilient condition to combat the negative impact of the influencing factors. Sapkhali, Ghoramara, Bankimnagar, Shibpur and Baliara are becoming sensitive from excess residual threats. This study is an initiation for identifying the thrust areas need to address with effective policy adaptation, necessary to minimize the existing vulnerable conditions in these islands. Key words: Vulnerability, Resilience, Residual threat, Indian Sundarban

  10. Libby/Hungry Horse Dams Wildlife Mitigation : Montana Wildlife Habitat Protection : Final Report.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wood, Marilyn

    1992-12-01

    The purpose of this project was to develop and obtain information necessary to evaluate and undertake specific wildlife habitat protection/enhancement actions in northwest Montana as outlined in the Columbia River Basin Fish and Wildlife Program. Three waterfowl projects were evaluated between September 1989 and June 1990. Weaver's Slough project involved the proposed acquisition of 200 acres of irrigated farmland and a donated conservation easement on an additional 213 acres. The proposal included enhancement of the agricultural lands by conversion to upland nesting cover. This project was rated the lowest priority based on limited potential for enhancement and no further actionmore » was pursued. The Crow Creek Ranch project involved the proposed acquisition of approximately 1830 acres of grazing and dryland farming lands. The intent would be to restore drained potholes and provide adjacent upland nesting cover to increase waterfowl production. This project received the highest rating based on the immediate threat of subdivision, the opportunity to restore degraded wetlands, and the overall benefits to numerous species besides waterfowl. Ducks Unlimited was not able to participate as a cooperator on this project due to the jurisdiction concerns between State and tribal ownership. The USFWS ultimately acquired 1,550 acres of this proposed project. No mitigation funds were used. The Ashley Creek project involved acquisition of 870 acres adjacent to the Smith Lake Waterfowl Production Area. The primary goal was to create approximately 470 acres of wetland habitat with dikes and subimpoundments. This project was rated second in priority due to the lesser threat of loss. A feasibility analysis was completed by Ducks Unlimited based on a concept design. Although adequate water was available for the project, soil testing indicated that the organic soils adjacent to the creek would not support the necessary dikes. The project was determined not feasible for mitigation implementation. Although no waterfowl/wetland projects were implemented using mitigation funds, 1,550 acres were protected based on work done under this project.« less

  11. Ionospheric Slant Total Electron Content Analysis Using Global Positioning System Based Estimation

    NASA Technical Reports Server (NTRS)

    Komjathy, Attila (Inventor); Mannucci, Anthony J. (Inventor); Sparks, Lawrence C. (Inventor)

    2017-01-01

    A method, system, apparatus, and computer program product provide the ability to analyze ionospheric slant total electron content (TEC) using global navigation satellite systems (GNSS)-based estimation. Slant TEC is estimated for a given set of raypath geometries by fitting historical GNSS data to a specified delay model. The accuracy of the specified delay model is estimated by computing delay estimate residuals and plotting a behavior of the delay estimate residuals. An ionospheric threat model is computed based on the specified delay model. Ionospheric grid delays (IGDs) and grid ionospheric vertical errors (GIVEs) are computed based on the ionospheric threat model.

  12. Comparing the effects of real versus simulated violence on dream imagery.

    PubMed

    Dale, Allyson; Murkar, Anthony; Miller, Nicolle; Black, Joshua

    2014-08-01

    Participants in the current study were 75 males, including 25 Canadian soldiers, 25 heavy gamers who play military based video games such as "Call of Duty," and a control group comprised of 25 males. One dream per participant was analyzed using Hall and Van de Castle content analysis guidelines, including aggression, threat, and previously established scales for intensity of aggression and emotion. The dreams of soldiers had a higher frequency of both aggression and threat, and were also more intense in aggression and emotion than both the heavy gamers and the controls. These findings suggest that exposure to real life violence and threat (as well as the emotional significance of the experience) is more frequently incorporated into dream imagery than simulated or virtual threat. Limitations and directions for future studies are discussed.

  13. Needs assessment for business strategies of anesthesiology groups' practices.

    PubMed

    Scurlock, Corey; Dexter, Franklin; Reich, David L; Galati, Maria

    2011-07-01

    Progress has been made in understanding strategic decision making influencing anesthesia groups' operating room business practices. However, there has been little analysis of the remaining gaps in our knowledge. We performed a needs assessment to identify unsolved problems in anesthesia business strategy based on Porter's Five Forces Analysis. The methodology was a narrative literature review. We found little previous investigation for 2 of the 5 forces (threat of new entrants and bargaining power of suppliers), modest understanding for 1 force (threat of substitute products or services), and substantial understanding for 2 forces (bargaining power of customers and jockeying for position among current competitors). Additional research in strategic decisions influencing anesthesia groups should focus on the threat of new entrants, bargaining power of suppliers, and the threat of substitute products or services.

  14. Chemical, biological, radiological and nuclear terrorism: an introduction for occupational physicians.

    PubMed

    Thornton, R; Court, B; Meara, J; Murray, V; Palmer, I; Scott, R; Wale, M; Wright, D

    2004-03-01

    Chemical, biological, radiological and nuclear terrorism poses considerable threat throughout the world. To provide occupational physicians with an understanding of this threat and its main forms and what action can be taken to counter this threat. Presenters at a conference on chemical, biological, radiological and nuclear terrorism were asked to contribute their evidence-based opinions in order to produce a review article. This paper presents a summary of the different forms of chemical, biological, radiological and nuclear terrorism and the effective counter-measures and also provides a review of current scientific literature. The threat of chemical, biological, radiological and nuclear terrorism is present throughout the world and is one that occupational physicians should be aware of, as well as the action that can be taken to counter it.

  15. Far-field tsunami of 2017 Mw 8.1 Tehuantepec, Mexico earthquake recorded by Chilean tide gauge network: Implications for tsunami warning systems

    NASA Astrophysics Data System (ADS)

    González-Carrasco, J. F.; Benavente, R. F.; Zelaya, C.; Núñez, C.; Gonzalez, G.

    2017-12-01

    The 2017 Mw 8.1, Tehuantepec earthquake generated a moderated tsunami, which was registered in near-field tide gauges network activating a tsunami threat state for Mexico issued by PTWC. In the case of Chile, the forecast of tsunami waves indicate amplitudes less than 0.3 meters above the tide level, advising an informative state of threat, without activation of evacuation procedures. Nevertheless, during sea level monitoring of network we detect wave amplitudes (> 0.3 m) indicating a possible change of threat state. Finally, NTWS maintains informative level of threat based on mathematical filtering analysis of sea level records. After 2010 Mw 8.8, Maule earthquake, the Chilean National Tsunami Warning System (NTWS) has increased its observational capabilities to improve early response. Most important operational efforts have focused on strengthening tide gauge network for national area of responsibility. Furthermore, technological initiatives as Integrated Tsunami Prediction and Warning System (SIPAT) has segmented the area of responsibility in blocks to focus early warning and evacuation procedures on most affected coastal areas, while maintaining an informative state for distant areas of near-field earthquake. In the case of far-field events, NTWS follow the recommendations proposed by Pacific Tsunami Warning Center (PTWC), including a comprehensive monitoring of sea level records, such as tide gauges and DART (Deep-Ocean Assessment and Reporting of Tsunami) buoys, to evaluate the state of tsunami threat in the area of responsibility. The main objective of this work is to analyze the first-order physical processes involved in the far-field propagation and coastal impact of tsunami, including implications for decision-making of NTWS. To explore our main question, we construct a finite-fault model of the 2017, Mw 8.1 Tehuantepec earthquake. We employ the rupture model to simulate a transoceanic tsunami modeled by Neowave2D. We generate synthetic time series at tide gauge stations and compare them with recorded sea level data, to dismiss meteorological processes, such as storms and surges. Resonance analysis is performed by wavelet technique.

  16. Radioactive threat detection using scintillant-based detectors

    NASA Astrophysics Data System (ADS)

    Chalmers, Alex

    2004-09-01

    An update to the performance of AS&E's Radioactive Threat Detection sensor technology. A model is presented detailing the components of the scintillant-based RTD system employed in AS&E products aimed at detecting radiological WMD. An overview of recent improvements in the sensors, electrical subsystems and software algorithms are presented. The resulting improvements in performance are described and sample results shown from existing systems. Advanced and future capabilities are described with an assessment of their feasibility and their application to Homeland Defense.

  17. Development and assessment of a landscape-scale ecological threat index for the Lower Colorado River Basin

    USGS Publications Warehouse

    Paukert, Craig P.; Pitts, K.L.; Whittier, Joanna B.; Olden, Julian D.

    2011-01-01

    Anthropogenic disturbances impact freshwater biota but are rarely incorporated into conservation planning due to the difficulties in quantifying threats. There is currently no widely accepted method to quantify disturbances, and determining how to measure threats to upstream catchments using disturbance metrics can be time consuming and subjective. We compared four watershed-scale ecological threat indices for the Lower Colorado River Basin (LCRB) using landscape-level threats of land use (e.g., agricultural and urban lands), waterway development and diversions (e.g., number of canals, dams), and human development (e.g., road and railroads density, pollution sites). The LCRB is an ideal region to assess ecological threat indices because of the increasing need for conservation to ensure the persistence of native fishes in highly altered habitat. Each threat was measured for severity (i.e., level of influence on the upstream watershed) and frequency throughout each watershed; both severity and frequency were measured using two different methods. Severity values were based either on peer-reviewed literature and weighted in accordance to their published ecological impact, or assumed equal severity across stressors. Threat frequency was calculated according to either the presence/absence of each stressor, or on the relative density of each stressor in the watershed. Each measure of severity was combined with a measure of frequency, creating four ecological threat indices, and transformed to a 0–100 scale. Threat indices were highly correlated (slopes of 0.94–1.63; R2 of 0.82–0.98), and were highest for watersheds close to urban centers, including Phoenix, Tucson, and Flagstaff, Arizona, and Las Vegas, Nevada. Road crossings and density appeared to be the most influential stressors in the index, but the removal of any individual stressor only changed the index by <5.1 units. Our results indicate that a simpler index with less subjectivity (i.e., presence/absence of a stressor in a watershed) provides similar results to the more subjective measure of threats (i.e., peer-reviewed threat severity). Because these threats have been linked to ecological health, the development of the index should be a useful tool to identify regions of greatest potential threat to aquatic biota and can aid in conservation planning for the Lower Colorado River Basin.

  18. Information fusion: telling the story (or threat narrative)

    NASA Astrophysics Data System (ADS)

    Fenstermacher, Laurie

    2014-06-01

    Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.

  19. Antismoking Threat and Efficacy Appeals: Effects on Smoking Cessation Intentions for Smokers with Low and High Readiness to Quit

    PubMed Central

    Wong, Norman C. H.; Cappella, Joseph N.

    2009-01-01

    This study examined the effects of sequencing different types of antismoking threat and efficacy appeals on smoking cessation intentions for smokers with low and high levels of readiness to quit. An experiment was done to test predictions based on Witte's (1992) Extended Parallel Process Model and research by Cho and Salmon (2006). A national probability sample of 555 adult smokers was recruited to take part in this study. Results found a positive two-way interaction effect between message threat and perceived level of message efficacy on intentions to seek help for quitting. A three-way interaction effect was found between message threat, perceived level of message efficacy, and readiness to quit on quitting intentions. Both threat and efficacy were important for smokers with low readiness to quit, whereas efficacy was most important among smokers with high readiness to quit. Implications of the results for antismoking campaigns are discussed along with limitations and future directions. PMID:20046966

  20. Threat-Related Information Suggests Competence: A Possible Factor in the Spread of Rumors

    PubMed Central

    Boyer, Pascal; Parren, Nora

    2015-01-01

    Information about potential danger is a central component of many rumors, urban legends, ritual prescriptions, religious prohibitions and witchcraft crazes. We investigate a potential factor in the cultural success of such material, namely that a source of threat-related information may be intuitively judged as more competent than a source that does not convey such information. In five studies, we asked participants to judge which of two sources of information, only one of which conveyed threat-related information, was more knowledgeable. Results suggest that mention of potential danger makes a source appear more competent than others, that the effect is not due to a general negativity bias, and that it concerns competence rather than a more generally positive evaluation of the source. PMID:26061409

Top