Sample records for basis threat implementing

  1. The information protection level assessment system implementation

    NASA Astrophysics Data System (ADS)

    Trapeznikov, E. V.

    2018-04-01

    Currently, the threat of various attacks increases significantly as automated systems become more widespread. On the basis of the conducted analysis the information protection level assessment system establishing objective was identified. The paper presents the information protection level assessment software implementation in the information system by applying the programming language C #. In conclusions the software features are identified and experimental results are represented.

  2. 77 FR 61433 - Applications and Amendments to Facility Operating Licenses and Combined Licenses Involving...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-09

    ... attacks up to and including the design basis cyber attack threat, thereby achieving high assurance that... provide assurance that safety-related SSCs are protected from cyber attacks. Implementation of 10 CFR 73... of ``high assurance of adequate protection against cyber attacks.'' The proposed revision would not...

  3. Student Threat Assessment as a Standard School Safety Practice: Results from a Statewide Implementation Study

    ERIC Educational Resources Information Center

    Cornell, Dewey; Maeng, Jennifer L.; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick

    2018-01-01

    Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat…

  4. Implementation of Child Death Review in the Netherlands: results of a pilot study.

    PubMed

    Gijzen, Sandra; Hilhorst, Michaëla I; L'Hoir, Monique P; Boere-Boonekamp, Magda M; Need, Ariana

    2016-07-08

    Child mortality in the Netherlands declined gradually in the past decades. In total 1130 children and youth aged 0 to 19 years died in 2014 (i.e. 29.4 per 100,000 live births). A better understanding of the background and the circumstances surrounding the death of children as well as the manner and cause of death may lead to preventive measures. Child Death Review (CDR) is a method to systematically analyze child deaths by a multidisciplinary team to identify avoidable factors that may have contributed to the death and to give directions for prevention. CDR could be an addition to further reduce avoidable child deaths in the Netherlands. The purpose of this study is to explore the strengths, weaknesses, opportunities and threats (SWOT) of the pilot-implementation of CDR in a Dutch region. The results are translated in recommendations for future implementation of the CDR method in the Netherlands. Children who lived in the pilot region and died aged 29 days after birth until 2 years were, after parental consent, included for reviewing by a regional CDR team. Eighteen logs and seven transcribed records of CDR meetings concerning 6 deceased children were analyzed using Atlas ti. The SWOT framework was used to identify important themes. The most important strengths identified were the expertise of and cooperation within the CDR team and the available materials. An important weakness was the poor cooperation of some professional groups. The fact that parents and professionals endorse the objective of CDR was an important opportunity. The lack of statutory basis was a threat. Many obstacles need to be taken away before large-scale implementation of CDR in the Netherlands becomes possible. The most important precondition for implementation is the acceptance among professionals and the statutory basis of the CDR method.

  5. A combined emitter threat assessment method based on ICW-RCM

    NASA Astrophysics Data System (ADS)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  6. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... threat; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... SECURITY: GENERAL RULES Security Threat Assessments § 1540.205 Procedures for security threat assessment...

  7. Development, Application, and Implementation of RAMCAP to Characterize Nuclear Power Plant Risk From Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gaertner, John P.; Teagarden, Grant A.

    2006-07-01

    In response to increased interest in risk-informed decision making regarding terrorism, EPRI and ERIN Engineering were selected by U.S. DHS and ASME to develop and demonstrate the RAMCAP method for nuclear power plant (NPP) risk assessment. The objective is to characterize plant-specific NPP risk for risk management opportunities and to provide consistent information for DHS decision making. This paper is an update of this project presented at the American Nuclear Society (ANS) International Topical Meeting on Probabilistic Safety Analysis (PSA05) in September, 2005. The method uses a characterization of risk as a function of Consequence, Vulnerability, and Threat. For eachmore » site, worst case scenarios are developed for each of sixteen benchmark threats. Nuclear RAMCAP hypothesizes that the intent of the perpetrator is to cause offsite radiological consequences. Specific targets are the reactor core, the spent fuel pool, and nuclear spent fuel in a dry storage facility (ISFSI). Results for each scenario are presented as conditional risk for financial loss, early fatalities and early injuries. Expected consequences for each scenario are quantified, while vulnerability is estimated on a relative likelihood scale. Insights for other societal risks are provided. Although threat frequencies are not provided, target attractiveness and threat deterrence are estimated. To assure efficiency, completeness, and consistency; results are documented using standard RAMCAP Evaluator software. Trial applications were successfully performed at four plant sites. Implementation at all other U.S. commercial sites is underway, supported by the Nuclear Sector Coordinating Council (NSCC). Insights from RAMCAP results at 23 U.S. plants completed to date have been compiled and presented to the NSCC. Results are site-specific. Physical security barriers, an armed security force, preparedness for design-basis threats, rugged design against natural hazards, multiple barriers between fuel and environment, accident mitigation capability, severe accident management procedures, and offsite emergency plans are risk-beneficial against all threat types. (authors)« less

  8. Assessing Student Threats: A Handbook for Implementing the Salem-Keizer System

    ERIC Educational Resources Information Center

    Van Dreal, John

    2011-01-01

    "Assessing Student Threats: A Handbook for Implementing the Salem-Keizer System" is a manual for the implementation of a threat assessment system that follows the recommendations of the Safe Schools Initiative and the prescriptive outline provided by the FBI. Written from an educator's perspective with contributing authors from law…

  9. The Practice of Campus-Based Threat Assessment: An Overview

    ERIC Educational Resources Information Center

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  10. Ensuring IT service continuity in the face of increasing threats.

    PubMed

    Nair, Vishwanath

    2014-01-01

    How is IT service continuity related to business continuity management? Is it just a glorified disaster recovery procedure? Will IT service continuity help increase the assurance of IT services from the business owner to the customer? This paper is an attempt at answering these and many such questions. It is presented as a case study of IT service continuity management implementation at Emirates Group IT, Dubai. It takes the reader through the need for the process as felt by the business, through the learning acquired during implementation, to the practices deployed for managing the process on an ongoing basis. It provides a detailed view of the kind of pitfalls that could be encountered during implementation of the IT service continuity management process in a large-scale enterprise.

  11. BRI: Cyber Trust and Suspicion

    DTIC Science & Technology

    2017-06-06

    Basis for Trust and Suspicion: Manipulating Insider Threat In Cyber Intelligence & Operations: For 2013, the concepts of Predictability...1 THRUST 1 – A SOCIAL, CULTURAL, AND EMOTIONAL BASIS FOR TRUST AND SUSPICION: MANIPULATING INSIDER THREAT IN CYBER INTELLIGENCE ...APPROACH ......................................... 59 3.1 Cybersecurity with humans in the loop

  12. Message from the Director.

    PubMed

    Erturk, Y

    1998-01-01

    This article, which introduces an issue of INSTRAW News that commemorates the 50th anniversary of the Universal Declaration of Human Rights, opens by expressing support for the Declaration and concern for the gap between the articulation and implementation of human rights. This gap is especially apparent in the stubborn persistence of gender inequalities. Throughout the world, women's rights are violated and their very lives threatened by violence and the threat of violence. Women's advocates have managed to bring the issue of domestic violence to the fore in many countries, but other countries bow to the traditional notion that what happens in the private sphere is not a public sphere concern. Additional threats to the rights of women are found in the trend towards defining identity on the basis of community membership rather than on an individual basis. This ignores the fact that cultures, traditions, and religions are not gender neutral and routinely transgress women's human rights. This also questions whether cultural imperatives in a multicultural world render the very notion of universal human rights inappropriate or whether cultural diversity can be respected without endangering human rights. Situating identity in notions of community can also lead to atrocities such as ethnic cleansing. Another threat is found in the lack of infrastructure to address the violation of the human rights of women international migrant workers and of displaced women. INSTRAW is committed to conducting research to bridge the gap between policy initiatives and women's demands and emphasizes that constructs of masculinity must be examined to transform unequal gender structures.

  13. Political conservatism, authoritarianism, and societal threat: voting for Republican representatives in U.S. Congressional elections from 1946 to 1992.

    PubMed

    McCann, Stewart J H

    2009-07-01

    The author found that the degree of national societal threat preceding congressional elections from 1946 to 1992 was positively associated with the mean state percentage of people voting for Republican representatives, supporting a conventional threat-authoritarianism hypothesis. However, threat was positively associated with the mean state percentage of people voting for Republican representatives in conservative states but not in liberal states, and the conventional threat-authoritarianism link was entirely driven by the relation in conservative states. The author classified states with a composite measure (alpha = .92) on the basis of state ideological identification, religious fundamentalism, composite policy liberalism, Republican Party elite ideology, and Democratic Party elite ideology. These results offer support to an interactive threat-authoritarianism hypothesis derived from the authoritarian dynamic theory of K. Stenner (2005), which postulates that only authoritarian persons are activated to manifest authoritarian behavior in times of normative threat. Also, the author discusses potential alternative explanations on the basis of system justification, need for closure, and terror-management theories.

  14. 10 CFR Appendix C to Part 73 - Nuclear Power Plant Safeguards Contingency Plans

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... command and delegation of authority as these apply to safeguards contingencies. b. Physical Layout—(i..., up to and including the design basis threat of radiological sabotage. The goals of licensee.... Perceived Danger—Consistent with the design basis threat specified in § 73.1(a)(1), licensees shall identify...

  15. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods

    PubMed Central

    Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman

    2017-01-01

    Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones. PMID:28297719

  16. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.

    PubMed

    Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman

    2017-01-01

    Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users' security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals' awareness of the consequences of security threats. By comparing participants' behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users' security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.

  17. Student threat assessment as a standard school safety practice: Results from a statewide implementation study.

    PubMed

    Cornell, Dewey; Maeng, Jennifer L; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick

    2018-06-01

    Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat assessment teams distinguish serious from nonserious threats. The sample consisted of 1,865 threat assessment cases reported by 785 elementary, middle, and high schools. Students ranged from pre-K to Grade 12, including 74.4% male, 34.6% receiving special education services, 51.2% White, 30.2% Black, 6.8% Hispanic, and 2.7% Asian. Survey data were collected from school-based teams to measure student demographics, threat characteristics, and assessment results. Logistic regression indicated that threat assessment teams were more likely to identify a threat as serious if it was made by a student above the elementary grades (odds ratio 0.57; 95% lower and upper bound 0.42-0.78), a student receiving special education services (1.27; 1.00-1.60), involved battery (1.61; 1.20-2.15), homicide (1.40; 1.07-1.82), or weapon possession (4.41; 2.80-6.96), or targeted an administrator (3.55; 1.73-7.30). Student race and gender were not significantly associated with a serious threat determination. The odds ratio that a student would attempt to carry out a threat classified as serious was 12.48 (5.15-30.22). These results provide new information on the nature and prevalence of threats in schools using threat assessment that can guide further work to develop this emerging school safety practice. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  18. Quality of implementation: developing measures crucial to understanding the diffusion of preventive interventions.

    PubMed

    Dusenbury, Linda; Brannigan, Rosalind; Hansen, William B; Walsh, John; Falco, Mathea

    2005-06-01

    As prevention programs become disseminated, the most serious threat to effectiveness is maintaining the quality of implementation intended by the developers. This paper proposes a methodology for measuring quality of implementation in school settings and presents data from a pilot study designed to test several of the proposed components. These methods included assessments of adherence, quality of process, the positive or negative valence of adaptations, teachers' attitudes and teachers' understanding of program content. This study was conducted with 11 teachers who had varying degrees of experience who taught Life Skills Training. Observation and interview data were collected during visits to schools. Results suggest that quality of implementation can be measured through observation and interview. Teachers varied in adherence and quality of program delivery. All teachers made adaptations to the program. Experienced teachers were more likely to adhere to the curriculum, deliver it in a way that was more interactive and engaging to students, communicate the goals and objectives better, and make positive adaptations. The field can use these findings as the basis for exploring strategies for measuring and improving quality of implementation.

  19. Assessing fear and anxiety in humans using the threat of predictable and unpredictable aversive events (the NPU-threat test)

    PubMed Central

    Schmitz, Anja; Grillon, Christian

    2012-01-01

    The threat of predictable and unpredictable aversive events was developed to assess short-duration (fear) and long-duration (anxiety) aversive states in humans. A typical experiment consists of three conditions: a safe condition (neutral (N)), during which participants are safe from aversive stimuli, and two threat conditions—one in which aversive events are administered predictably (P) (i.e., signaled by a threat cue), and one in which aversive stimuli are administered unpredictably (U). During the so-called NPU -threat test, ongoing change in aversive states is measured with the startle reflex. The NPU -threat test has been validated in pharmacological and clinical studies and can be implemented in children and adults. Similar procedures have been applied in animal models, making the NPU -threat test an ideal tool for translational research. The procedure is relatively short (35 min), simple to implement and generates consistent results with large effect sizes. PMID:22362158

  20. Domestic preparedness: the grand illusion.

    PubMed

    Maniscalco, P M

    2001-04-01

    The problems posed by terrorism to not only the emergency response community, but to national security at large can be overwhelming. Adoption of what would be considered prudent and effective business practices by implementing a disciplined and effectively structured central strategy cannot be overencouraged. The emerging strategy must take into account the existing emergency response infrastructures and build upon existing capacity in an effort to achieve greater readiness. This technique is no different than the training and issuance of radiological response equipment to emergency responders in the 1950s by the then Civil Defense Agency. The training that is offered, especially to EMS providers, needs to be institutionalized to ensure that our peers, on a regular basis, revisit curriculum content. Incorporating a training module within the existing DOT NHTSA initial and refresher EMT and paramedic educational curricula could easily achieve this goal. Implementing fiscal support to the local emergency response agencies in a sustainable manner is a must. The costs associated with training, equipping and servicing the equipment and medication stores are budget-busters. This is a threat to national security and, as such, the federal government needs to rise to the challenge of supporting the local response organizations that will meet this threat head-on during the aftermath of an attack. As previously mentioned, when the U.S. faced its last large national security threat (Soviet nuclear missiles), we witnessed the materialization of a comprehensive agenda that provided most of the attributes we desire with the contemporary problem of terrorism. There is no single solution to the problem of terrorism. In fact, it will take many individuals and functional areas to come together and stop viewing the threat as a "cash cow." The improved response capacity for acts of terrorism will have an inevitable "spillover benefit" of better trained and equipped emergency responders for everyday emergencies; which will inevitably be our "payday."

  1. Clinical laboratory as an economic model for business performance analysis

    PubMed Central

    Buljanović, Vikica; Patajac, Hrvoje; Petrovečki, Mladen

    2011-01-01

    Aim To perform SWOT (strengths, weaknesses, opportunities, and threats) analysis of a clinical laboratory as an economic model that may be used to improve business performance of laboratories by removing weaknesses, minimizing threats, and using external opportunities and internal strengths. Methods Impact of possible threats to and weaknesses of the Clinical Laboratory at Našice General County Hospital business performance and use of strengths and opportunities to improve operating profit were simulated using models created on the basis of SWOT analysis results. The operating profit as a measure of profitability of the clinical laboratory was defined as total revenue minus total expenses and presented using a profit and loss account. Changes in the input parameters in the profit and loss account for 2008 were determined using opportunities and potential threats, and economic sensitivity analysis was made by using changes in the key parameters. The profit and loss account and economic sensitivity analysis were tools for quantifying the impact of changes in the revenues and expenses on the business operations of clinical laboratory. Results Results of simulation models showed that operational profit of €470 723 in 2008 could be reduced to only €21 542 if all possible threats became a reality and current weaknesses remained the same. Also, operational gain could be increased to €535 804 if laboratory strengths and opportunities were utilized. If both the opportunities and threats became a reality, the operational profit would decrease by €384 465. Conclusion The operational profit of the clinical laboratory could be significantly reduced if all threats became a reality and the current weaknesses remained the same. The operational profit could be increased by utilizing strengths and opportunities as much as possible. This type of modeling may be used to monitor business operations of any clinical laboratory and improve its financial situation by implementing changes in the next fiscal period. PMID:21853546

  2. Clinical laboratory as an economic model for business performance analysis.

    PubMed

    Buljanović, Vikica; Patajac, Hrvoje; Petrovecki, Mladen

    2011-08-15

    To perform SWOT (strengths, weaknesses, opportunities, and threats) analysis of a clinical laboratory as an economic model that may be used to improve business performance of laboratories by removing weaknesses, minimizing threats, and using external opportunities and internal strengths. Impact of possible threats to and weaknesses of the Clinical Laboratory at Našice General County Hospital business performance and use of strengths and opportunities to improve operating profit were simulated using models created on the basis of SWOT analysis results. The operating profit as a measure of profitability of the clinical laboratory was defined as total revenue minus total expenses and presented using a profit and loss account. Changes in the input parameters in the profit and loss account for 2008 were determined using opportunities and potential threats, and economic sensitivity analysis was made by using changes in the key parameters. The profit and loss account and economic sensitivity analysis were tools for quantifying the impact of changes in the revenues and expenses on the business operations of clinical laboratory. Results of simulation models showed that operational profit of €470 723 in 2008 could be reduced to only €21 542 if all possible threats became a reality and current weaknesses remained the same. Also, operational gain could be increased to €535 804 if laboratory strengths and opportunities were utilized. If both the opportunities and threats became a reality, the operational profit would decrease by €384 465. The operational profit of the clinical laboratory could be significantly reduced if all threats became a reality and the current weaknesses remained the same. The operational profit could be increased by utilizing strengths and opportunities as much as possible. This type of modeling may be used to monitor business operations of any clinical laboratory and improve its financial situation by implementing changes in the next fiscal period.

  3. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  4. Oil in the Sahara: mapping anthropogenic threats to Saharan biodiversity from space.

    PubMed

    Duncan, Clare; Kretz, Daniela; Wegmann, Martin; Rabeil, Thomas; Pettorelli, Nathalie

    2014-01-01

    Deserts are among the most poorly monitored and understood biomes in the world, with evidence suggesting that their biodiversity is declining fast. Oil exploration and exploitation can constitute an important threat to fragmented and remnant desert biodiversity, yet little is known about where and how intensively such developments are taking place. This lack of information hinders local efforts to adequately buffer and protect desert wildlife against encroachment from anthropogenic activity. Here, we investigate the use of freely available satellite imagery for the detection of features associated with oil exploration in the African Sahelo-Saharan region. We demonstrate how texture analyses combined with Landsat data can be employed to detect ground-validated exploration sites in Algeria and Niger. Our results show that site detection via supervised image classification and prediction is generally accurate. One surprising outcome of our analyses is the relatively high level of site omission errors in Niger (43%), which appears to be due to non-detection of potentially small-scale, temporary exploration activity: we believe the repeated implementation of our framework could reduce the severity of potential methodological limitations. Overall, our study provides a methodological basis for the mapping of anthropogenic threats associated with oil exploitation that can be conducted across desert regions.

  5. Oil in the Sahara: mapping anthropogenic threats to Saharan biodiversity from space

    PubMed Central

    Duncan, Clare; Kretz, Daniela; Wegmann, Martin; Rabeil, Thomas; Pettorelli, Nathalie

    2014-01-01

    Deserts are among the most poorly monitored and understood biomes in the world, with evidence suggesting that their biodiversity is declining fast. Oil exploration and exploitation can constitute an important threat to fragmented and remnant desert biodiversity, yet little is known about where and how intensively such developments are taking place. This lack of information hinders local efforts to adequately buffer and protect desert wildlife against encroachment from anthropogenic activity. Here, we investigate the use of freely available satellite imagery for the detection of features associated with oil exploration in the African Sahelo-Saharan region. We demonstrate how texture analyses combined with Landsat data can be employed to detect ground-validated exploration sites in Algeria and Niger. Our results show that site detection via supervised image classification and prediction is generally accurate. One surprising outcome of our analyses is the relatively high level of site omission errors in Niger (43%), which appears to be due to non-detection of potentially small-scale, temporary exploration activity: we believe the repeated implementation of our framework could reduce the severity of potential methodological limitations. Overall, our study provides a methodological basis for the mapping of anthropogenic threats associated with oil exploitation that can be conducted across desert regions. PMID:24733946

  6. Zoonoses: a potential obstacle to the growing wildlife industry of Namibia

    PubMed Central

    Magwedere, Kudakwashe; Hemberger, Maria Y.; Hoffman, Louw C.; Dziva, Francis

    2012-01-01

    Zoonoses, which account for approximately 75% of emerging human infectious diseases worldwide, pose a re-emerging threat to public health. With an ever-increasing interrelationship between humans, livestock and wildlife species, the threat to human health will rise to unprecedented levels. Wildlife species contribute to the majority of emerging diseases; therefore, there is an urgent need to define control systems of zoonoses of wildlife origin but very little information exists. In this review, we examine prevalent zoonotic infections reported in Namibia between 1990 and 2009 and assess their potential impact on the growing wildlife industry. A wide spectrum of zoonotic diseases was confirmed in both livestock and wildlife species, with rabies and anthrax cases being over-represented and also showing the widest species distribution. Whilst vaccination and ante-mortem inspection against these diseases may curb infected livestock species from entering the human food chain, such practices are difficult to implement in free-ranging wildlife species. In this context, there is a need to improve existing control measures and/or develop novel and better interventional strategies to reduce the threat of this re-emerging global problem. This review provides the basis for initiating a multidisciplinary evidence-based approach to control zoonoses in countries with thriving wildlife and game farming. PMID:23077724

  7. Holographic radar imaging privacy techniques utilizing dual-frequency implementation

    NASA Astrophysics Data System (ADS)

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.

    2008-04-01

    Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhance the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.

  8. Holographic Radar Imaging Privacy Techniques Utilizing Dual-Frequency Implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.

    2008-04-18

    Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhancemore » the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.« less

  9. Many-core graph analytics using accelerated sparse linear algebra routines

    NASA Astrophysics Data System (ADS)

    Kozacik, Stephen; Paolini, Aaron L.; Fox, Paul; Kelmelis, Eric

    2016-05-01

    Graph analytics is a key component in identifying emerging trends and threats in many real-world applications. Largescale graph analytics frameworks provide a convenient and highly-scalable platform for developing algorithms to analyze large datasets. Although conceptually scalable, these techniques exhibit poor performance on modern computational hardware. Another model of graph computation has emerged that promises improved performance and scalability by using abstract linear algebra operations as the basis for graph analysis as laid out by the GraphBLAS standard. By using sparse linear algebra as the basis, existing highly efficient algorithms can be adapted to perform computations on the graph. This approach, however, is often less intuitive to graph analytics experts, who are accustomed to vertex-centric APIs such as Giraph, GraphX, and Tinkerpop. We are developing an implementation of the high-level operations supported by these APIs in terms of linear algebra operations. This implementation is be backed by many-core implementations of the fundamental GraphBLAS operations required, and offers the advantages of both the intuitive programming model of a vertex-centric API and the performance of a sparse linear algebra implementation. This technology can reduce the number of nodes required, as well as the run-time for a graph analysis problem, enabling customers to perform more complex analysis with less hardware at lower cost. All of this can be accomplished without the requirement for the customer to make any changes to their analytics code, thanks to the compatibility with existing graph APIs.

  10. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology.

    PubMed

    Casad, Bettina J; Bryant, William J

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  11. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    PubMed Central

    Casad, Bettina J.; Bryant, William J.

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace. PMID:26834681

  12. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    PubMed

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  13. FORE-Med - the development of a foresight methodology for the prioritisation of animal health research in the Mediterranean area up to 2030.

    PubMed

    Messori, Stefano; Zilli, Romano; Mariano, Valeria; Bagni, Marina

    2017-03-31

    Diseases evolve constantly and research is needed to face emerging new threats. Evidences suggest that the impact of such threats will have its peak in the Mediterranean area. The FORE‑Med, Foresight project for the Mediterranean, aims at identifying the future challenges on livestock health and aquaculture in this area, to ensure an effective coordination of research activities and the delivery of timely solution to emerging issues. One hundred experts with multidisciplinary background and coming from countries all around the Mediterranean basin were gathered to participate in a think‑tank to develop a Strategic Research Agenda on animal health for Mediterranean up to 2030. A tailored foresight methodology was implemented, merging the best fit for purpose techniques (e.g. '7 questions', Social, Technological, Economical, Environmental, and Political (STEEP), analysis, scenario building, and backcasting). Both remote and face‑to‑face debates were held, to ensure a fruitful exchanges and participation among experts. Research needs were identified and prioritised, both on relevance and on temporal scale. The implemented participative approach allowed for the definition of a research priority list for animal health and aquaculture in the Mediterranean, which served as a basis to build a strategic research agenda. The latter is expected to satisfy the sectors' needs and guarantee a much‑needed coordination for research activities in the Mediterranean area.

  14. Implementation and testing of a sensor-netting algorithm for early warning and high confidence C/B threat detection

    NASA Astrophysics Data System (ADS)

    Gruber, Thomas; Grim, Larry; Fauth, Ryan; Tercha, Brian; Powell, Chris; Steinhardt, Kristin

    2011-05-01

    Large networks of disparate chemical/biological (C/B) sensors, MET sensors, and intelligence, surveillance, and reconnaissance (ISR) sensors reporting to various command/display locations can lead to conflicting threat information, questions of alarm confidence, and a confused situational awareness. Sensor netting algorithms (SNA) are being developed to resolve these conflicts and to report high confidence consensus threat map data products on a common operating picture (COP) display. A data fusion algorithm design was completed in a Phase I SBIR effort and development continues in the Phase II SBIR effort. The initial implementation and testing of the algorithm has produced some performance results. The algorithm accepts point and/or standoff sensor data, and event detection data (e.g., the location of an explosion) from various ISR sensors (e.g., acoustic, infrared cameras, etc.). These input data are preprocessed to assign estimated uncertainty to each incoming piece of data. The data are then sent to a weighted tomography process to obtain a consensus threat map, including estimated threat concentration level uncertainty. The threat map is then tested for consistency and the overall confidence for the map result is estimated. The map and confidence results are displayed on a COP. The benefits of a modular implementation of the algorithm and comparisons of fused / un-fused data results will be presented. The metrics for judging the sensor-netting algorithm performance are warning time, threat map accuracy (as compared to ground truth), false alarm rate, and false alarm rate v. reported threat confidence level.

  15. An Exploratory Study on the Post-Implementation of Threat and Error Management Training in Australian General Aviation

    ERIC Educational Resources Information Center

    Lee, Seung Yong; Bates, Paul R.; Murray, Patrick S.; Martin, Wayne L.

    2017-01-01

    Threat and Error Management (TEM) training, endorsed and recommended by the International Civil Aviation Organisation (ICAO), was mandated in Australia with the aim of improving aviation safety. However, to date, there has been very limited, if any, formal post-implementation review, assessment or evaluation to examine the "after-state"…

  16. Threat driven modeling framework using petri nets for e-learning system.

    PubMed

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  17. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    NASA Technical Reports Server (NTRS)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  18. 78 FR 34706 - Designation of Two (2) Entities Pursuant to Executive Order 13628 of October 9, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-10

    ... Implementation of Certain Sanctions Set Forth in the Iran Threat Reduction and Syria Human Rights Act of 2012 and Additional Sanctions With Respect to Iran.'' DATES: The designations by the Director of OFAC of the two (2... Executive Order 13628, ``Authorizing the Implementation of Certain Sanctions Set Forth in the Iran Threat...

  19. "If I feel disgusted, I must be getting ill": emotional reasoning in the context of contamination fear.

    PubMed

    Verwoerd, Johan; de Jong, Peter J; Wessel, Ineke; van Hout, Wiljo J P J

    2013-03-01

    Patients suffering from anxiety disorders have been shown to infer danger on the basis of their anxiety responses "if I feel anxious, there must be danger." This tendency logically hampers the identification of false alarms and may thus act in a way to confirm the a priori threat value of the feared stimuli/situations. Since disgust is assumed to play a critical role in the persistence of contamination fears in OCD, the question rises whether individuals suffering from fear of contamination perhaps similarly infer danger on the basis of their disgust response: "If I feel disgusted, it must be contagious." Therefore, this study tested whether indeed disgust-based reasoning might be involved in fear of contamination. On the basis of the contamination fear subscale of the Padua Inventory (PI), we selected a group of participants scoring higher than the established clinical range (n=31, PI>13) and a group of participants low (n=27, PI<5) in contamination fear. Each participant was presented with a series of 2 times 4 types of scripts that systematically varied in the absence/presence of objective threat of contamination and the absence/presence of the actor's disgust response. Following each script, participants rated their perceived threat of contamination/illness. In line with the hypothesis that disgust-based reasoning might be involved in fear of contamination, specifically high contamination fearful individuals inferred risk of becoming ill on the basis of experienced disgust (in addition to objective threat), as was evidenced by a significant Group (high vs. low)×Threat (yes vs. no)×Disgust response (yes vs. no) interaction. This finding might not only help to explain the persistence of contamination fears, but also provides some fresh clues to improve currently available treatment options. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. A strategy for prioritizing threats and recovery actions for at-risk species.

    PubMed

    Darst, Catherine R; Murphy, Philip J; Strout, Nathan W; Campbell, Steven P; Field, Kimberleigh J; Allison, Linda; Averill-Murray, Roy C

    2013-03-01

    Ensuring the persistence of at-risk species depends on implementing conservation actions that ameliorate threats. We developed and implemented a method to quantify the relative importance of threats and to prioritize recovery actions based on their potential to affect risk to Mojave desert tortoises (Gopherus agassizii). We used assessments of threat importance and elasticities of demographic rates from population matrix models to estimate the relative contributions of threats to overall increase in risk to the population. We found that urbanization, human access, military operations, disease, and illegal use of off highway vehicles are the most serious threats to the desert tortoise range-wide. These results suggest that, overall, recovery actions that decrease habitat loss, predation, and crushing will be most effective for recovery; specifically, we found that habitat restoration, topic-specific environmental education, and land acquisition are most likely to result in the greatest decrease in risk to the desert tortoise across its range. In addition, we have developed an application that manages the conceptual model and all supporting information and calculates threat severity and potential effectiveness of recovery actions. Our analytical approach provides an objective process for quantifying threats, prioritizing recovery actions, and developing monitoring metrics for those actions for adaptive management of any at-risk species.

  1. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of information into a common rigorous framework. Ultimately, our framework may greatly assist conservation organizations in documenting threatening processes and planning species recovery. © 2014 Society for Conservation Biology.

  2. 75 FR 71079 - Determination on Use of Cooperative Threat Reduction Funds in Pakistan and Afghanistan Under...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Determination on Use of Cooperative Threat Reduction Funds in Pakistan and Afghanistan Under Section 1308 of the National Defense Authorization Act for... Threat Reduction (CTR) funds for the implementation of CTR programs in Pakistan and Afghanistan will...

  3. A comprehensive approach to managing threats of violence on a university or college campus.

    PubMed

    Regehr, Cheryl; Glancy, Graham D; Carter, Andrea; Ramshaw, Lisa

    Horrifying, high profile acts of violence on campuses remain relatively rare, nevertheless, academic administrators are required to manage threats of violence on campus on an increasingly regular basis. These threats take two primary forms, those in which the perpetrator and the intended victim(s) are clearly identified, often involving repeated threats and threatening behaviour towards an individual; and those involving anonymous threats to commit acts of larger scale violence. Complicating factors in managing these threats include: fear contagion; mass media and social media attention; responsibilities to all members of the university community sometimes including individuals issuing the threat and the intended victims; demands for safety and security measures that are often at odds with professional advice; and permeable campus boundaries that cause security challenges. This paper considers the changing landscape of threat assessment and risk assessment on university and college campuses and suggests opportunities for partnerships between forensic mental health professionals and academic administrators. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could providemore » a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.« less

  5. Radiological Exposure Devices (RED) Technical Basis for Threat Profile.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bland, Jesse John; Potter, Charles A.; Homann, Steven

    Facilities that manufacture, store or transport significant quantities of radiological material must protect against the risk posed by sabotage events. Much of the analysis of this type of event has been focused on the threat from a radiological dispersion device (RDD) or "dirty bomb" scenario, in which a malicious assailant would, by explosives or other means, loft a significant quantity of radioactive material into a plume that would expose and contaminate people and property. Although the consequences in cost and psychological terror would be severe, no intentional RDD terrorism events are on record. Conversely, incidents in which a victim ormore » victims were maliciously exposed to a Radiological Exposure Device (RED), without dispersal of radioactive material, are well documented. This paper represents a technical basis for the threat profile related to the risk of nefarious use of an RED, including assailant and material characterization. Radioactive materials of concern are detailed in Appendix A.« less

  6. Nationwide assessment of nonpoint source threats to water quality

    Treesearch

    Thomas C. Brown; Pamela Froemke

    2012-01-01

    Water quality is a continuing national concern, in part because the containment of pollution from nonpoint (diffuse) sources remains a challenge. We examine the spatial distribution of nonpoint-source threats to water quality. On the basis of comprehensive data sets for a series of watershed stressors, the relative risk of water-quality impairment was estimated for the...

  7. Behavior Intervention Teams: Examining Interventions with Community College Students Threatening Self-Harm

    ERIC Educational Resources Information Center

    Kramer-Jefferson, Kathryn R.

    2017-01-01

    Effective in 2011, The Department of Justice implemented a change to the direct threat standard, which is part of Title II of the Americans with Disabilities Act. This change removed the threat of harm to self from the direct threat standard and potentially limits the actions that colleges can take when working with and responding to students who…

  8. Video calls from lay bystanders to dispatch centers - risk assessment of information security.

    PubMed

    Bolle, Stein R; Hasvold, Per; Henriksen, Eva

    2011-09-30

    Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.

  9. Video calls from lay bystanders to dispatch centers - risk assessment of information security

    PubMed Central

    2011-01-01

    Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387

  10. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  11. Harmonization of European laboratory response networks by implementing CWA 15793: use of a gap analysis and an "insider" exercise as tools.

    PubMed

    Sundqvist, Bo; Bengtsson, Ulrika Allard; Wisselink, Henk J; Peeters, Ben P H; van Rotterdam, Bart; Kampert, Evelien; Bereczky, Sándor; Johan Olsson, N G; Szekely Björndal, Asa; Zini, Sylvie; Allix, Sébastien; Knutsson, Rickard

    2013-09-01

    Laboratory response networks (LRNs) have been established for security reasons in several countries including the Netherlands, France, and Sweden. LRNs function in these countries as a preparedness measure for a coordinated diagnostic response capability in case of a bioterrorism incident or other biocrimes. Generally, these LRNs are organized on a national level. The EU project AniBioThreat has identified the need for an integrated European LRN to strengthen preparedness against animal bioterrorism. One task of the AniBioThreat project is to suggest a plan to implement laboratory biorisk management CWA 15793:2011 (CWA 15793), a management system built on the principle of continual improvement through the Plan-Do-Check-Act (PDCA) cycle. The implementation of CWA 15793 can facilitate trust and credibility in a future European LRN and is an assurance that the work done at the laboratories is performed in a structured way with continuous improvements. As a first step, a gap analysis was performed to establish the current compliance status of biosafety and laboratory biosecurity management with CWA 15793 in 5 AniBioThreat partner institutes in France (ANSES), the Netherlands (CVI and RIVM), and Sweden (SMI and SVA). All 5 partners are national and/or international laboratory reference institutes in the field of public or animal health and possess high-containment laboratories and animal facilities. The gap analysis showed that the participating institutes already have robust biorisk management programs in place, but several gaps were identified that need to be addressed. Despite differences between the participating institutes in their compliance status, these variations are not significant. Biorisk management exercises also have been identified as a useful tool to control compliance status and thereby implementation of CWA 15793. An exercise concerning an insider threat and loss of a biological agent was performed at SVA in the AniBioThreat project to evaluate implementation of the contingency plans and as an activity in the implementation process of CWA 15793. The outcome of the exercise was perceived as very useful, and improvements to enhance biorisk preparedness were identified. Gap analyses and exercises are important, useful activities to facilitate implementation of CWA 15793. The PDCA cycle will enforce a structured way to work, with continual improvements concerning biorisk management activities. Based on the activities in the AniBioThreat project, the following requirements are suggested to promote implementation: support from the top management of the organizations, knowledge about CWA 15793, a compliance audit checklist and gap analysis, training and exercises, networking in LRNs and other networks, and interinstitutional audits. Implementation of CWA 15793 at each institute would strengthen the European animal bioterrorism response capabilities by establishing a well-prepared LRN.

  12. Contending with Stereotype Threat at Work: A Model of Long-Term Responses

    ERIC Educational Resources Information Center

    Block, Caryn J.; Koch, Sandy M.; Liberman, Benjamin E.; Merriweather, Tarani J.; Roberson, Loriann

    2011-01-01

    Women and people of color are still underrepresented in many occupational roles. Being in a situation where one is underrepresented, and thus in the demographic minority, has been shown to be a factor leading to the experience of stereotype threat--the expectation that one will be judged or perceived on the basis of social identity group…

  13. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    NASA Astrophysics Data System (ADS)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  14. Empirical knowledge engine of local governance Senegalese artisanal fisheries Empirical knowledge engine of local governance Senegalese artisanal fisheries

    NASA Astrophysics Data System (ADS)

    Mbaye, A.

    2016-02-01

    Fishery resources has always been an administrative management faced with the supposed irrationality of artisanal fishermen and the state has always had a monopoly over such management. The state rules well established, synonyms of denial local populations knowledge on management, and expropriation of their fisheries territories, came into conflict with the existing rules thus weakening the traditional management system.However, aware of the threats to their survival because of the limitations of state rules and technicist perception of management, some populations of fishermen tried to organize and implement management measures.These measures are implemented on the basis of their own knowledge of the environmentsThis is the case in Kayar, Nianing, Bétenty, where local management initiatives began to bear fruit despite some difficulties.These examples of successful local management have prompted the Senegalese administration to have more consideration for the knowledge and know-how of fishermen and to be open to co-management of the fisheries resource. his communication shows how this is implemented new co-management approach in the governance of the Senegalese artisanal fisheries through the consideration of empirical knowledge of fishermen.

  15. Common Sense Guide to Mitigating Insider Threats 4th Edition

    DTIC Science & Technology

    2012-12-01

    annual refresher training for all employees mandatory. Refresher training needs to cover all facets of your organization, not just information...some type of refresher training that may or may not directly relate to cyber threats. Some ideas for insider threat topics that could be incorporated...provided to users before using a system and through annual refreshers . Organizations should consult legal counsel before implementing any monitoring

  16. 10 CFR Appendix C to Part 73 - Nuclear Power Plant Safeguards Contingency Plans

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... command and delegation of authority as these apply to safeguards contingencies. b. Physical Layout—(i..., up to and including the design basis threat of radiological sabotage. The goals of licensee... general description of how the response is organized. a. Perceived Danger—Consistent with the design basis...

  17. Implementing an Information Security Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less

  18. Optics detection and laser countermeasures on a combat vehicle

    NASA Astrophysics Data System (ADS)

    Sjöqvist, Lars; Allard, Lars; Pettersson, Magnus; Börjesson, Per; Lindskog, Nils; Bodin, Johan; Widén, Anders; Persson, Hâkan; Fredriksson, Jan; Edström, Sten

    2016-10-01

    Magnifying optical assemblies used for weapon guidance or rifle scopes may possess a threat for a combat vehicle and its personnel. Detection and localisation of optical threats is consequently of interest in military applications. Typically a laser system is used in optics detection, or optical augmentation, to interrogate a scene of interest to localise retroreflected laser radiation. One interesting approach for implementing optics detection on a combat vehicle is to use a continuous scanning scheme. In addition, optics detection can be combined with laser countermeasures, or a laser dazzling function, to efficiently counter an optical threat. An optics detection laser sensor demonstrator has been implemented on a combat vehicle. The sensor consists of a stabilised gimbal and was integrated together with a LEMUR remote electro-optical sight. A narrow laser slit is continuously scanned around the horizon to detect and locate optical threats. Detected threats are presented for the operator within the LEMUR presentation system, and by cueing a countermeasure laser installed in the LEMUR sensor housing threats can be defeated. Results obtained during a field demonstration of the optics detection sensor and the countermeasure laser will be presented. In addition, results obtained using a dual-channel optics detection system designed for false alarm reduction are also discussed.

  19. Opportunities and Threats to Learning: Lessons from a Pedagogical Workshop for Faculty at a Higher Education Institution

    ERIC Educational Resources Information Center

    Ssentamu, Proscovia Namubiru

    2014-01-01

    Faculty quality is a key variable in the quality of teaching and learning. However, although learning is the basis for teaching, the circumstances under which faculty learn largely remain unexplained. This paper focuses on the opportunities and threats to learning by faculty at Uganda Management Institute (UMI). The paper is based on a study of…

  20. Barriers to Implementing a Single Joint Combat Camouflage Uniform

    DTIC Science & Technology

    2017-12-01

    opportunities, threats (SWOT), and political, economic , social, and technological (PEST) analyses; examines the requirements and role of each of the...methodology applies strengths, weaknesses, opportunities, threats (SWOT), and political, economic , social, and technological (PEST) analyses...27 1. Political Factors ............................................................................27 2. Economic

  1. An Optimal Mitigation Strategy Against the Asteroid Impact Threat with Short Warning Time

    NASA Technical Reports Server (NTRS)

    Wie, Bong; Barbee, Brent; Pitz, Alan; Kaplinger, Brian; Hawkins, Matt; Winkler, Tim; Premaratne, Pavithra; Vardaxis, George; Lyzhoft, Joshua; Zimmerman, Ben

    2015-01-01

    To develop an innovative yet practically implementable mitigation technique for the most probable impact threat of an asteroid or comet with short warning time (i.e., when we don't have sufficient warning times for a deflection mission).

  2. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  3. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    PubMed

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  4. Combatting Stereotype Threat: College Math Classroom Interventions

    ERIC Educational Resources Information Center

    Pretty, Joelle

    2017-01-01

    This research provides new insight into stereotype threat by examining a real-world intervention in community college classrooms. Practitioners need information about which interventions work in authentic school settings to implement them and begin to bring educational equity to historically marginalized students. The experimental study examined…

  5. Authoritarianism, conservatism, racial diversity threat, and the state distribution of hate groups.

    PubMed

    McCann, Stewart J H

    2010-01-01

    On the basis of K. Stenner's (2005) authoritarian dynamic theory, the author hypothesized that there is an interaction between U.S. state conservatism-liberalism and state racial heterogeneity threat, such that greater diversity threat tends to be associated with more hate groups in more conservative states and fewer hate groups in more liberal states. State aggregates of the conservative-liberal ideological preferences of 141,798 participants from 122 CBS News/New York Times national telephone polls conducted between 1976 and 1988 (R. S. Erikson, G. C. Wright, & J. P. McIver, 1993) served as proxies for authoritarian-nonauthoritarian dispositions. For the 47 states with complete data, the hypothesized interaction was tested for 2000, 2005, and 2006 with hierarchical multiple regression strategies and supported. The author's hypothesis was also affirmed with SES and the interaction of SES and diversity threat controlled for. In contrast, SES entirely accounted for simple relationships between threat and hate group frequency.

  6. 5 CFR 553.201 - Requesting OPM approval for reemployment without reduction or termination of annuity in...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... that basis must meet the following criteria: (1) Nature of emergency. Describe the military threat... particular position. Requests submitted on this basis must include a description of the length, breadth, and... limited to, unusual qualification requirements or working conditions, possibility of job reengineering or...

  7. 5 CFR 553.201 - Requesting OPM approval for reemployment without reduction or termination of annuity in...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... that basis must meet the following criteria: (1) Nature of emergency. Describe the military threat... particular position. Requests submitted on this basis must include a description of the length, breadth, and... limited to, unusual qualification requirements or working conditions, possibility of job reengineering or...

  8. 5 CFR 553.201 - Requesting OPM approval for reemployment without reduction or termination of annuity in...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... that basis must meet the following criteria: (1) Nature of emergency. Describe the military threat... particular position. Requests submitted on this basis must include a description of the length, breadth, and... limited to, unusual qualification requirements or working conditions, possibility of job reengineering or...

  9. 5 CFR 553.201 - Requesting OPM approval for reemployment without reduction or termination of annuity in...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... that basis must meet the following criteria: (1) Nature of emergency. Describe the military threat... particular position. Requests submitted on this basis must include a description of the length, breadth, and... limited to, unusual qualification requirements or working conditions, possibility of job reengineering or...

  10. Reducing Environmental Allergic Triggers: Policy Issues.

    PubMed

    Abramson, Stuart L

    The implementation of policies to reduce environmental allergic triggers can be an important adjunct to optimal patient care for allergic rhinitis and allergic asthma. Policies at the local level in schools and other public as well as private buildings can make an impact on disease morbidity. Occupational exposures for allergens have not yet been met with the same rigorous policy standards applied for exposures to toxicants by Occupational Safety and Health Administration. Further benefit may be obtained through policies by local, county, state, and national governments, and possibly through international cooperative agreements. The reduction of allergenic exposures can and should be affected by policies with strong scientific, evidence-based derivation. However, a judicious application of the precautionary principle may be needed in circumstances where the health effect of inaction could lead to more serious threats to vulnerable populations with allergic disease. This commentary covers the scientific basis, current implementation, knowledge gaps, and pro/con views on policy issues in reducing environmental allergic triggers. Copyright © 2017 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  11. An analysis of the implementation of an environmental management system in a local public administration.

    PubMed

    Lozano, Macarena; Vallés, José

    2007-03-01

    The Environmental Management System (EMS) is commonly implemented in private firms. However, on the basis of a strengths, weaknesses, opportunities and threats (SWOT) analysis, our work analyzes the consequences of implementing an EMS within the context of local public administrations, particularly regarding the City Council of Ohanes in Almería (Spain). This is the first European corporation to implement an EMS according to the ISO 14001 Standard, certified by the Spanish Association of Normalization and Certification. Its analysis would be equivalent to the Shumpeterian "market innovator study", so that public administration "followers" can take advantage of the derived benefits and of minimizing the negative effects of such an experience. On the other hand, we show that the economic and environmental advantages derived from the EMS go beyond the activities that the City Council is in charge of. They have spillover effects that extend them to all economic activities in the municipality and these effects are expected to be increased in the medium and long-term perspective. In this paper, we compare the costs and benefits that the municipality obtains in two cases: the City Council implements the EMS or it does not implement it. The main objective of this article is to show the economic and environmental advantages obtained by a municipality when it is only the City Council who is implementing an EMS. It is logical to suppose that this case study can stimulate other municipalities to use this instrument, even if the economic and environmental characteristics of the municipality are different.

  12. Spot Rare Occurrences More Frequently by Lessening Inattentional Blindness

    DTIC Science & Technology

    2013-04-29

    with weapon slip through airport security , not hearing a siren when driving conditions are complicated by fog, or not seeing explosives on a truck...awareness of potential actual threats has been implemented in airport security for several years. The effectiveness of this Threat Image Projection

  13. An Innovative Solution to NASA's NEO Impact Threat Mitigation Grand Challenge and Flight Validation Mission Architecture Development

    NASA Technical Reports Server (NTRS)

    Wie, Bong; Barbee, Brent; Pitz, Alan; Kaplinger, Brian; Hawkins, Matt; Winkler, Tim; Premaratne, Pavithra; Vardaxis, George; Lyzhoft, Joshua; Zimmerman, Ben

    2015-01-01

    To develop an innovative yet practically implementable mitigation technique for the most probable impact threat of an asteroid or comet with short warning time(i.e., when we don't have sufficient warning times for a deflection mission)

  14. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. Office of the Assistant Secretary for Preparedness and Response; HHS Public Health Emergency Medical Countermeasures Enterprise implementation plan for chemical, biological, radiological and nuclear threats. Notice.

    PubMed

    2007-04-23

    The United States faces serious public health threats from the deliberate use of weapons of mass destruction (WMD)--chemical, biological, radiological, or nuclear (CBRN)--by hostile States or terrorists, and from naturally emerging infectious diseases that have a potential to cause illness on a scale that could adversely impact national security. Effective strategies to prevent, mitigate, and treat the consequences of CBRN threats is an integral component of our national security strategy. To that end, the United States must be able to rapidly develop, stockpile, and deploy effective medical countermeasures to protect the American people. The HHS Public Health Emergency Medical Countermeasures Enterprise (PHEMCE) has taken a holistic, end-to-end approach that considers multiple aspects of the medical countermeasures mission including research, development, acquisition, storage, maintenance, deployment, and guidance for utilization. Phase one of this approach established the HHS PHEMCE Strategy for Chemical, Biological, Radiological, and Nuclear Threats (HHS PHEMCE Strategy). The HHS PHEMCE Strategy, published in the Federal Register on March 20, 2007, described a framework of strategic policy goals and objectives for identifying medical countermeasure requirements and establishing priorities for medical countermeasure evaluation, development and acquisition. These strategic policy goals and objectives were used to establish the Four Pillars upon which this HHS Public Health Emergency Medical Countermeasures Enterprise Implementation Plan (HHS PHEMCE Implementation Plan) is based. The HHS PHEMCE Implementation Plan considers the full spectrum of medical countermeasures-related activities, including research, development, acquisition, storage/maintenance, deployment, and utilization. The HHS PHEMCE Implementation Plan is consistent with the President's Biodefense for the 21st Century and is aligned with the National Strategy for Medical Countermeasures against Weapons of Mass Destruction.

  16. Space-Pseudo-Time Method: Application to the One-Dimensional Coulomb Potential and Density Funtional Theory

    NASA Astrophysics Data System (ADS)

    Weatherford, Charles; Gebremedhin, Daniel

    2016-03-01

    A new and efficient way of evolving a solution to an ordinary differential equation is presented. A finite element method is used where we expand in a convenient local basis set of functions that enforce both function and first derivative continuity across the boundaries of each element. We also implement an adaptive step size choice for each element that is based on a Taylor series expansion. The method is applied to solve for the eigenpairs of the one-dimensional soft-coulomb potential and the hard-coulomb limit is studied. The method is then used to calculate a numerical solution of the Kohn-Sham differential equation within the local density approximation is presented and is applied to the helium atom. Supported by the National Nuclear Security Agency, the Nuclear Regulatory Commission, and the Defense Threat Reduction Agency.

  17. Planning and preparing for public health threats at airports.

    PubMed

    Martin, Greg; Boland, Mairin

    2018-03-07

    The ever-increasing speed and scope of human mobility by international air travel has led to a global transport network for infectious diseases with the potential to introduce pathogens into non-endemic areas, and to facilitate rapid spread of novel or mutated zoonotic agents.Robust national emergency preparedness is vital to mitigate the transmission of infectious diseases agents domestically and to prevent onward spread to other countries. Given the complex range of stakeholders who respond to an infectious disease threat being transmitted through air travel, it is important that protocols be tested and practised extensively in advance of a real emergency. Simulation exercises include the identification of possible scenarios based on the probability of hazards and the vulnerability of populations as a basis for planning, and provide a useful measure of preparedness efforts and capabilities.In October 2016, a live simulation exercise was conducted at a major airport in Ireland incorporating a public health threat for the first time, with the notification of a possible case of MERS-CoV aboard an aircraft plus an undercarriage fire. Strengths of the response to the communicable disease threat included appropriate public health risk assessment, case management, passenger information gathering, notification to relevant parties, and communication to passengers and multiple agencies.Lessons learned include:o Exercise planning should not be overly ambitious. In testing too many facets of emergency response, the public health response could be deprioritised.o The practical implementation of communication protocols in a real-time exercise of this scope proved challenging. These protocols should continue to be checked and tested by desk-top exercises to ensure that all staff concerned are familiar with them, especially in the context of staff turn-over.o The roles and responsibilities of the various agencies must be clear to avoid role confusion.o Equipment and infrastructure capacities must be considered and in place in advance of an actual incident or test, for example whether or not cell phone signals require boosting during a major event.Importantly, exercises bring together individuals representing organisations with different roles and perspectives allowing identification of capabilities and limitations, and problem solving about how to address the gaps and overlaps in a low-threat collaborative setting.

  18. Identifying and Classifying Pollution Hotspots to Guide Watershed Management in a Large Multiuse Watershed.

    PubMed

    Su, Fangli; Kaplan, David; Li, Lifeng; Li, Haifu; Song, Fei; Liu, Haisheng

    2017-03-03

    In many locations around the globe, large reservoir sustainability is threatened by land use change and direct pollution loading from the upstream watershed. However, the size and complexity of upstream basins makes the planning and implementation of watershed-scale pollution management a challenge. In this study, we established an evaluation system based on 17 factors, representing the potential point and non-point source pollutants and the environmental carrying capacity which are likely to affect the water quality in the Dahuofang Reservoir and watershed in northeastern China. We used entropy methods to rank 118 subwatersheds by their potential pollution threat and clustered subwatersheds according to the potential pollution type. Combining ranking and clustering analyses allowed us to suggest specific areas for prioritized watershed management (in particular, two subwatersheds with the greatest pollution potential) and to recommend the conservation of current practices in other less vulnerable locations (91 small watersheds with low pollution potential). Finally, we identified the factors most likely to influence the water quality of each of the 118 subwatersheds and suggested adaptive control measures for each location. These results provide a scientific basis for improving the watershed management and sustainability of the Dahuofang reservoir and a framework for identifying threats and prioritizing the management of watersheds of large reservoirs around the world.

  19. Identifying and Classifying Pollution Hotspots to Guide Watershed Management in a Large Multiuse Watershed

    PubMed Central

    Su, Fangli; Kaplan, David; Li, Lifeng; Li, Haifu; Song, Fei; Liu, Haisheng

    2017-01-01

    In many locations around the globe, large reservoir sustainability is threatened by land use change and direct pollution loading from the upstream watershed. However, the size and complexity of upstream basins makes the planning and implementation of watershed-scale pollution management a challenge. In this study, we established an evaluation system based on 17 factors, representing the potential point and non-point source pollutants and the environmental carrying capacity which are likely to affect the water quality in the Dahuofang Reservoir and watershed in northeastern China. We used entropy methods to rank 118 subwatersheds by their potential pollution threat and clustered subwatersheds according to the potential pollution type. Combining ranking and clustering analyses allowed us to suggest specific areas for prioritized watershed management (in particular, two subwatersheds with the greatest pollution potential) and to recommend the conservation of current practices in other less vulnerable locations (91 small watersheds with low pollution potential). Finally, we identified the factors most likely to influence the water quality of each of the 118 subwatersheds and suggested adaptive control measures for each location. These results provide a scientific basis for improving the watershed management and sustainability of the Dahuofang reservoir and a framework for identifying threats and prioritizing the management of watersheds of large reservoirs around the world. PMID:28273834

  20. Analysis of CSIRT/SOC Incidents and Continuous Monitoring of Threats

    NASA Technical Reports Server (NTRS)

    Wang, John; Ishisoko, Katsutoshi C.

    2012-01-01

    Security Operations Centers (SOC) contain a wealth of data which, if properly classified and tagged upfront, can yield a wealth of real-time information about your organizations IT Security posture, risks, and threats. These include answers to relevant and actionable questions such as: What are our biggest threats? Who is attacking us and what do they want? What controls are working or not working? How effective was the new technology we just implemented? What is our ROI?

  1. Information and the War against Terrorism, Part V: The Business Implications.

    ERIC Educational Resources Information Center

    Strickland, Lee S.

    2002-01-01

    Discussion of changes in business information protection since the September 11th terrorist attacks focuses on three planning goals: continuing to serve the customer in times of threat; implementing new communication paradigms; and establishing a comprehensive knowledge redundancy program. Considers threats other than terrorism, risk management…

  2. 8 CFR 208.18 - Implementation of the Convention Against Torture.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... actions authorized by law, including the death penalty, but do not include sanctions that defeat the... procedures calculated to disrupt profoundly the senses or the personality; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or...

  3. 8 CFR 208.18 - Implementation of the Convention Against Torture.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... actions authorized by law, including the death penalty, but do not include sanctions that defeat the... procedures calculated to disrupt profoundly the senses or the personality; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or...

  4. 8 CFR 208.18 - Implementation of the Convention Against Torture.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... actions authorized by law, including the death penalty, but do not include sanctions that defeat the... procedures calculated to disrupt profoundly the senses or the personality; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or...

  5. 8 CFR 208.18 - Implementation of the Convention Against Torture.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... actions authorized by law, including the death penalty, but do not include sanctions that defeat the... procedures calculated to disrupt profoundly the senses or the personality; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or...

  6. 8 CFR 1208.18 - Implementation of the Convention Against Torture.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... imposed sanctions and other enforcement actions authorized by law, including the death penalty, but do not...; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or suffering, or the administration or application of mind altering...

  7. 8 CFR 1208.18 - Implementation of the Convention Against Torture.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... imposed sanctions and other enforcement actions authorized by law, including the death penalty, but do not...; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or suffering, or the administration or application of mind altering...

  8. 8 CFR 1208.18 - Implementation of the Convention Against Torture.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... imposed sanctions and other enforcement actions authorized by law, including the death penalty, but do not...; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or suffering, or the administration or application of mind altering...

  9. 8 CFR 208.18 - Implementation of the Convention Against Torture.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... actions authorized by law, including the death penalty, but do not include sanctions that defeat the... procedures calculated to disrupt profoundly the senses or the personality; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or...

  10. 8 CFR 1208.18 - Implementation of the Convention Against Torture.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... imposed sanctions and other enforcement actions authorized by law, including the death penalty, but do not...; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or suffering, or the administration or application of mind altering...

  11. 8 CFR 1208.18 - Implementation of the Convention Against Torture.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... imposed sanctions and other enforcement actions authorized by law, including the death penalty, but do not...; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or suffering, or the administration or application of mind altering...

  12. Exploring resistance to implementation of welfare technology in municipal healthcare services - a longitudinal case study.

    PubMed

    Nilsen, Etty R; Dugstad, Janne; Eide, Hilde; Gullslett, Monika Knudsen; Eide, Tom

    2016-11-15

    Industrialized and welfare societies are faced with vast challenges in the field of healthcare in the years to come. New technological opportunities and implementation of welfare technology through co-creation are considered part of the solution to this challenge. Resistance to new technology and resistance to change is, however, assumed to rise from employees, care receivers and next of kin. The purpose of this article is to identify and describe forms of resistance that emerged in five municipalities during a technology implementation project as part of the care for older people. This is a longitudinal, single-embedded case study with elements of action research, following an implementation of welfare technology in the municipal healthcare services. Participants included staff from the municipalities, a network of technology developers and a group of researchers. Data from interviews, focus groups and participatory observation were analysed. Resistance to co-creation and implementation was found in all groups of stakeholders, mirroring the complexity of the municipal context. Four main forms of resistance were identified: 1) organizational resistance, 2) cultural resistance, 3) technological resistance and 4) ethical resistance, each including several subforms. The resistance emerges from a variety of perceived threats, partly parallel to, partly across the four main forms of resistance, such as a) threats to stability and predictability (fear of change), b) threats to role and group identity (fear of losing power or control) and c) threats to basic healthcare values (fear of losing moral or professional integrity). The study refines the categorization of resistance to the implementation of welfare technology in healthcare settings. It identifies resistance categories, how resistance changes over time and suggests that resistance may play a productive role when the implementation is organized as a co-creation process. This indicates that the importance of organizational translation between professional cultures should not be underestimated, and supports research indicating that focus on co-initiation in the initial phase of implementation projects may help prevent different forms of resistance in complex co-creation processes.

  13. Effects of threat management interactions on conservation priorities.

    PubMed

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  14. Physiological responses associated with cultural attachment.

    PubMed

    Yap, Wei Jie; Christopoulos, George I; Hong, Ying-Yi

    2017-05-15

    Cultural attachment (CA) suggests that cultural symbols can function as attachment figures, in a similar way to prototypical maternal attachment figures. In order to further understand the psychophysiological mechanisms of CA, we examine whether cultural symbols regulate peripheral physiological indicators of arousal in response to symbolic threats. We supraliminally expose participants to neutral or threatening stimuli, followed by the subliminal presentation of CA and control images, while recording their Skin Conductance Responses (SCR). In tandem with previous work, threat increased SCR when the subliminal image was a control. However, the subliminal presence of a cultural symbol reduced this typically high SCR to threat, potentially suggesting that the threat-related arousal was mitigated. Importantly, metrics related to the way an individual is related to the environment, i.e. the need for cognitive closure, affected physiological responses towards threat and cultural images. Overall, the present study sets the basis for potential emotional mechanisms that could explain how cultural symbols can act as extensions of the prototypical attachment figures and confer the sense of security in the face of threat. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Perceived threat, risk perception, and efficacy beliefs related to SARS and other (emerging) infectious diseases: results of an international survey.

    PubMed

    de Zwart, Onno; Veldhuijzen, Irene K; Elam, Gillian; Aro, Arja R; Abraham, Thomas; Bishop, George D; Voeten, Hélène A C M; Richardus, Jan Hendrik; Brug, Johannes

    2009-01-01

    To study the levels of perceived threat, perceived severity, perceived vulnerability, response efficacy, and self-efficacy for severe acute respiratory syndrome (SARS) and eight other diseases in five European and three Asian countries. A computer-assisted phone survey was conducted among 3,436 respondents. The questionnaire focused on perceived threat, vulnerability, severity, response efficacy, and self-efficacy related to SARS and eight other diseases. Perceived threat of SARS in case of an outbreak in the country was higher than that of other diseases. Perceived vulnerability of SARS was at an intermediate level and perceived severity was high compared to other diseases. Perceived threat for SARS varied between countries in Europe and Asia with a higher perceived severity of SARS in Europe and a higher perceived vulnerability in Asia. Response efficacy and self-efficacy for SARS were higher in Asia compared to Europe. In multiple linear regression analyses, country was strongly associated with perceived threat. The relatively high perceived threat for SARS indicates that it is seen as a public health risk and offers a basis for communication in case of an outbreak. The strong association between perceived threat and country and different regional patterns require further research.

  16. When and Why Threats Go Undetected: Impacts of Event Rate and Shift Length on Threat Detection Accuracy During Airport Baggage Screening.

    PubMed

    Meuter, Renata F I; Lacherez, Philippe F

    2016-03-01

    We aimed to assess the impact of task demands and individual characteristics on threat detection in baggage screeners. Airport security staff work under time constraints to ensure optimal threat detection. Understanding the impact of individual characteristics and task demands on performance is vital to ensure accurate threat detection. We examined threat detection in baggage screeners as a function of event rate (i.e., number of bags per minute) and time on task across 4 months. We measured performance in terms of the accuracy of detection of Fictitious Threat Items (FTIs) randomly superimposed on X-ray images of real passenger bags. Analyses of the percentage of correct FTI identifications (hits) show that longer shifts with high baggage throughput result in worse threat detection. Importantly, these significant performance decrements emerge within the first 10 min of these busy screening shifts only. Longer shift lengths, especially when combined with high baggage throughput, increase the likelihood that threats go undetected. Shorter shift rotations, although perhaps difficult to implement during busy screening periods, would ensure more consistently high vigilance in baggage screeners and, therefore, optimal threat detection and passenger safety. © 2015, Human Factors and Ergonomics Society.

  17. Crisis in the Philippines: A Threat to U.S. Interests.

    ERIC Educational Resources Information Center

    Gregor, A. James

    The special relationship between the United States and the Philippines is chronicled, and the potential threats to that relationship are exposed and evaluated. Special attention is paid to imposition of martial law by Marcos from 1972-1981. The human rights of the Filipino people during martial law, development programs implemented by Marcos…

  18. Creating Safer Campuses through Implementation of Threat-Assessment Teams: Are They Enough?

    ERIC Educational Resources Information Center

    Toppe, Michele L.

    2017-01-01

    According to higher education policy experts, "Campus threat assessment is not merely a recommendation, but an emerging standard of care." However, despite evidence of the emergence of this standard and the consistency of recommendations that comport with those made by the Virginia Tech Review Panel, college campuses continue to vary…

  19. School Behavioral Threat Assessment and Management

    ERIC Educational Resources Information Center

    Louvar Reeves, Melissa A.; Brock, Stephen E.

    2018-01-01

    While schools are safer today than in years past, one act of school violence is one too many. Recent reports have conveyed the importance of schools developing and implementing protocols and procedures to prevent or mitigate school violence. To assist with this task, this article addresses behavioral threat assessment and management (BTAM) in the…

  20. Benefits and Threats to Using Social Media for Presenting and Implementing Evidence.

    PubMed

    Cook, Chad E; O'Connell, Neil E; Hall, Toby; George, Steven Z; Jull, Gwendolen; Wright, Alexis A; Girbés, Enrique Lluch; Lewis, Jeremy; Hancock, Mark

    2018-01-01

    As a potential high-yield tool for disseminating information that can reach many people, social media is transforming how clinicians, the public, and policy makers are educated and find new knowledge associated with research-related information. Social media is available to all who access the internet, reducing selected barriers to acquiring original source documents such as journal articles or books and potentially improving implementation-the process of formulating a conclusion and moving on that decision. The use of social media for evidence dissemination/implementation of research has both benefits and threats. It is the aim of this Viewpoint to provide a balanced view of each. J Orthop Sports Phys Ther 2018;48(1):3-7. doi:10.2519/jospt.2018.0601.

  1. SARS: An Emerging Global Microbial Threat.

    PubMed Central

    Hughes, James M.

    2004-01-01

    In March 2003, the Institute of Medicine published an update to its 1992 landmark report on emerging infections. The new report, Microbial Threats to Health: Emergence, Detection, and Response, describes the current spectrum of global microbial threats, factors affecting their emergence or resurgence, and measures that should be undertaken to effectively address them. Coincident with this publication came increasing reports of severe atypical pneumonia of unknown etiology among persons in southeast Asia. This new disease, designated severe acute respiratory syndrome (SARS), spread globally in a matter of weeks, infecting primarily close contacts of index patients (e.g., household members and healthcare workers caring for index patients) but also resulting in community transmission in some areas. An unprecedented worldwide collaborative effort was undertaken to determine the cause of the illness and implement prevention measures. A previously unrecognized coronavirus was identified as the causative agent, and health officials throughout the world struggled to implement measures to contain its spread, including isolation of suspect SARS cases and quarantine of exposed persons. The emergence of SARS is a timely reminder of the need to expect the unexpected and to ensure strong national and global public health partnerships when preparing for and responding to infectious diseases. Effectively addressing the threat of SARS will require enhanced global infectious disease surveillance, the development of rapid diagnostics, new therapies, and vaccines, implementation of aggressive evidence-based infection control strategies, and effective communication. Images Fig. 2 Fig. 3 PMID:17060979

  2. Is the Current US Navy Pacific Basing Structure Adequate for the Twenty-First Century?

    DTIC Science & Technology

    2006-12-15

    events. The Threat (To Deter, To Defeat, To Maintain the Peace) Chinese Grand Strategy and Maritime Power by Thomas M. Kane ; “China’s Quest for...Congress” by Ronald O’Rourke provide the initial basis for assessment of the potential threat posed by China’s naval buildup. Kane discussed that...cooperation among the ANZUS allies will continue for the foreseeable future. Conclusion There is a significant body of literature covering the history of

  3. Working memory regulates trait anxiety-related threat processing biases.

    PubMed

    Booth, Robert W; Mackintosh, Bundy; Sharma, Dinkar

    2017-06-01

    High trait anxious individuals tend to show biased processing of threat. Correlational evidence suggests that executive control could be used to regulate such threat-processing. On this basis, we hypothesized that trait anxiety-related cognitive biases regarding threat should be exaggerated when executive control is experimentally impaired by loading working memory. In Study 1, 68 undergraduates read ambiguous vignettes under high and low working memory load; later, their interpretations of these vignettes were assessed via a recognition test. Trait anxiety predicted biased interpretation of social threat vignettes under high working memory load, but not under low working memory load. In Study 2, 53 undergraduates completed a dot probe task with fear-conditioned Japanese characters serving as threat stimuli. Trait anxiety predicted attentional bias to the threat stimuli but, again, this only occurred under high working memory load. Interestingly however, actual eye movements toward the threat stimuli were only associated with state anxiety, and this was not moderated by working memory load, suggesting that executive control regulates biased threat-processing downstream of initial input processes such as orienting. These results suggest that cognitive loads can exacerbate trait anxiety-related cognitive biases, and therefore represent a useful tool for assessing cognitive biases in future research. More importantly, since biased threat-processing has been implicated in the etiology and maintenance of anxiety, poor executive control may be a risk factor for anxiety disorders. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  4. Combined impacts of global changes on biodiversity across the USA

    PubMed Central

    Bellard, C.; Leclerc, C.; Courchamp, F.

    2015-01-01

    Most studies of the effects of global changes on biodiversity focus on a single threat, but multiple threats lead to species extinction. We lack spatially explicit assessments of the intensity of multiple threats and their impacts on biodiversity. Here, we used a novel metric of cumulative threats and impacts to assess the consequences of multiple threats on 196 endemic species across the USA. We predict that large areas with high cumulative impact scores for amphibians, birds, mammals, and reptiles will be concentrated in the eastern part of the USA by the 2050 s and 2080 s. These high cumulative impact values are due mainly to the presence of invasive species, climate change, cropland and pasture areas; additionally, a significant proportion of endemic species are vulnerable to some of these threats where they occur. This analysis provides a useful means of identifying where conservation measures and monitoring programs that should consider multiple threats should be implemented in the future. PMID:26149694

  5. Threats to validity in the design and conduct of preclinical efficacy studies: a systematic review of guidelines for in vivo animal experiments.

    PubMed

    Henderson, Valerie C; Kimmelman, Jonathan; Fergusson, Dean; Grimshaw, Jeremy M; Hackam, Dan G

    2013-01-01

    The vast majority of medical interventions introduced into clinical development prove unsafe or ineffective. One prominent explanation for the dismal success rate is flawed preclinical research. We conducted a systematic review of preclinical research guidelines and organized recommendations according to the type of validity threat (internal, construct, or external) or programmatic research activity they primarily address. We searched MEDLINE, Google Scholar, Google, and the EQUATOR Network website for all preclinical guideline documents published up to April 9, 2013 that addressed the design and conduct of in vivo animal experiments aimed at supporting clinical translation. To be eligible, documents had to provide guidance on the design or execution of preclinical animal experiments and represent the aggregated consensus of four or more investigators. Data from included guidelines were independently extracted by two individuals for discrete recommendations on the design and implementation of preclinical efficacy studies. These recommendations were then organized according to the type of validity threat they addressed. A total of 2,029 citations were identified through our search strategy. From these, we identified 26 guidelines that met our eligibility criteria--most of which were directed at neurological or cerebrovascular drug development. Together, these guidelines offered 55 different recommendations. Some of the most common recommendations included performance of a power calculation to determine sample size, randomized treatment allocation, and characterization of disease phenotype in the animal model prior to experimentation. By identifying the most recurrent recommendations among preclinical guidelines, we provide a starting point for developing preclinical guidelines in other disease domains. We also provide a basis for the study and evaluation of preclinical research practice. Please see later in the article for the Editors' Summary.

  6. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, Shannon

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, andmore » proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.« less

  7. Safe teleradiology: information assurance as project planning methodology.

    PubMed

    Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David

    2005-01-01

    The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.

  8. Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.

    2016-03-01

    Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.

  9. Effective Strategies for Monitoring and Regulating Chemical Mixtures and Contaminants Sharing Pathways of Toxicity

    PubMed Central

    Venkatesan, Arjun K.; Halden, Rolf U.

    2015-01-01

    Traditionally, hazardous chemicals have been regulated in the U.S. on a one-by-one basis, an approach that is slow, expensive and can be inefficient, as illustrated by a decades-long succession of replacing one type of organohalogen flame retardants (OHFRs) with another one, without addressing the root cause of toxicity and associated public health threats posed. The present article expounds on the need for efficient monitoring strategies and pragmatic steps in reducing environmental pollution and adverse human health impacts. A promising approach is to combine specific bioassays with state-of-the-art chemical screening to identify chemicals and chemical mixtures sharing specific modes of action (MOAs) and pathways of toxicity (PoTs). This approach could be used to identify and regulate hazardous chemicals as classes or compound families, featuring similar biological end-points, such as endocrine disruption and mutagenicity. Opportunities and potential obstacles of implementing this approach are discussed. PMID:26343697

  10. Using a Learning Progression Framework to Assess and Evaluate Student Growth

    ERIC Educational Resources Information Center

    Briggs, Derek C.; Diaz-Bilello, Elena; Peck, Fred; Alzen, Jessica; Chattergoon, Rajendra; Johnson, Raymond

    2015-01-01

    This report describes the use of a Learning Progression Framework (LPF) to support the Student Learning Objectives (SLO) process. The report highlights a few common threats we currently see in the SLO process implemented at various states and districts, and offers the LPF as a possible solution for addressing these threats. This report was…

  11. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  12. Security risks associated with radio frequency identification in medical environments.

    PubMed

    Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio

    2012-12-01

    Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.

  13. Mapping Historic Gypsy Moth Defoliation with MODIS Satellite Data: Implications for Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spurce, Joseph P.; Hargrove, William; Ryan, Robert E.; Smooth, James C.; Prados, Don; McKellip, Rodney; Sader, Steven A.; Gasser, Jerry; May, George

    2008-01-01

    This viewgraph presentation reviews a project, the goal of which is to study the potential of MODIS data for monitoring historic gypsy moth defoliation. A NASA/USDA Forest Service (USFS) partnership was formed to perform the study. NASA is helping USFS to implement satellite data products into its emerging Forest Threat Early Warning System. The latter system is being developed by the USFS Eastern and Western Forest Threat Assessment Centers. The USFS Forest Threat Centers want to use MODIS time series data for regional monitoring of forest damage (e.g., defoliation) preferably in near real time. The study's methodology is described, and the results of the study are shown.

  14. Research on the method of information system risk state estimation based on clustering particle filter

    NASA Astrophysics Data System (ADS)

    Cui, Jia; Hong, Bei; Jiang, Xuepeng; Chen, Qinghua

    2017-05-01

    With the purpose of reinforcing correlation analysis of risk assessment threat factors, a dynamic assessment method of safety risks based on particle filtering is proposed, which takes threat analysis as the core. Based on the risk assessment standards, the method selects threat indicates, applies a particle filtering algorithm to calculate influencing weight of threat indications, and confirms information system risk levels by combining with state estimation theory. In order to improve the calculating efficiency of the particle filtering algorithm, the k-means cluster algorithm is introduced to the particle filtering algorithm. By clustering all particles, the author regards centroid as the representative to operate, so as to reduce calculated amount. The empirical experience indicates that the method can embody the relation of mutual dependence and influence in risk elements reasonably. Under the circumstance of limited information, it provides the scientific basis on fabricating a risk management control strategy.

  15. 29 CFR 2702.3 - Requests for information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... exercising due diligence in responding to the request. For purposes of this paragraph, “exceptional... records on an expedited basis could reasonably be expected to pose an imminent threat to the life or...

  16. Shifting social identities as a strategy for deflecting threatening social comparisons.

    PubMed

    Mussweiler, T; Gabriel, S; Bodenhausen, G V

    2000-09-01

    Results of three studies suggest that the multifaceted nature of identity provides a strategic basis for reducing the threat involved in upward social comparisons. After performing worse than a comparison standard, people may strategically emphasize aspects of their identity that differentiate them from the standard, thereby making the standard less relevant for self-evaluation. On the basis of previous research showing that persons low in self-esteem are less likely to make effective use of self-protection strategies, we hypothesized that this strategy of deflecting the threat involved in upward comparison (i.e., decreasing perceived comparability by emphasizing an unshared social identity) would be used primarily by persons who are characteristically high in self-esteem. This pattern was confirmed in three studies. Moreover, use of the strategy was associated with relatively more positive affect following threatening upward comparisons.

  17. 77 FR 14346 - Proposed Information Collection; Comment Request; Implementation of Vessel Speed Restrictions To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-09

    ... Collection; Comment Request; Implementation of Vessel Speed Restrictions To Reduce the Threat of Ship... implementing speed restrictions to reduce the incidence and severity of ship collisions with North Atlantic... document that a deviation from the 10-knot speed limit was necessary for safe maneuverability under certain...

  18. Present and future of desertification in Spain: Implementation of a surveillance system to prevent land degradation.

    PubMed

    Martínez-Valderrama, Jaime; Ibáñez, Javier; Del Barrio, Gabriel; Sanjuán, Maria E; Alcalá, Francisco J; Martínez-Vicente, Silvio; Ruiz, Alberto; Puigdefábregas, Juan

    2016-09-01

    Mitigation strategies are crucial for desertification given that once degradation starts, other solutions are extremely expensive or unworkable. Prevention is key to handle this problem and solutions should be based on spotting and deactivating the stressors of the system. Following this topic, the Spanish Plan of Action to Combat Desertification (SPACD) created the basis for implementing two innovative approaches to evaluate the threat of land degradation in the country. This paper presents tools for preventing desertification in the form of a geomatic approach to enable the periodic assessments of the status and trends of land condition. Also System Dynamics modelling has been used to integrate bio-physical and socio-economic aspects of desertification to explain and analyse degradation in the main hot spots detected in Spain. The 2dRUE procedure was implemented to map the land-condition status by comparing potential land productivity according to water availability, the limiting factor in arid lands, with plant-biomass data. This assessment showed that 20% of the territory is degraded and an additional 1% is actively degrading. System Dynamics modelling was applied to study the five desertification landscapes identified by the SPACD. The risk analysis, implemented on these models, concluded that 'Herbaceous crops affected by soil erosion' is the landscape most at risk, while the Plackett-Burman sensitivity analysis used to rank the factors highlighted the supremacy of climatic factors above socioeconomic drivers. Copyright © 2016 Elsevier B.V. All rights reserved.

  19. Risk assessment for Industrial Control Systems quantifying availability using mean failure cost (MFC)

    DOE PAGES

    Chen, Qian; Abercrombie, Robert K; Sheldon, Frederick T.

    2015-09-23

    Industrial Control Systems (ICS) are commonly used in industries such as oil and natural gas, transportation, electric, water and wastewater, chemical, pharmaceutical, pulp and paper, food and beverage, as well as discrete manufacturing (e.g., automotive, aerospace, and durable goods.) SCADA systems are generally used to control dispersed assets using centralized data acquisition and supervisory control.Originally, ICS implementations were susceptible primarily to local threats because most of their components were located in physically secure areas (i.e., ICS components were not connected to IT networks or systems). The trend toward integrating ICS systems with IT networks (e.g., efficiency and the Internet ofmore » Things) provides significantly less isolation for ICS from the outside world thus creating greater risk due to external threats. Albeit, the availability of ICS/SCADA systems is critical to assuring safety, security and profitability. Such systems form the backbone of our national cyber-physical infrastructure.Herein, we extend the concept of mean failure cost (MFC) to address quantifying availability to harmonize well with ICS security risk assessment. This new measure is based on the classic formulation of Availability combined with Mean Failure Cost (MFC). Finally, the metric offers a computational basis to estimate the availability of a system in terms of the loss that each stakeholder stands to sustain as a result of security violations or breakdowns (e.g., deliberate malicious failures).« less

  20. Conditioned social dominance threat: observation of others' social dominance biases threat learning.

    PubMed

    Haaker, Jan; Molapour, Tanaz; Olsson, Andreas

    2016-10-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants' eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  1. Conditioned social dominance threat: observation of others’ social dominance biases threat learning

    PubMed Central

    Molapour, Tanaz; Olsson, Andreas

    2016-01-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants’ eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. PMID:27217107

  2. A Knowledge Discovery framework for Planetary Defense

    NASA Astrophysics Data System (ADS)

    Jiang, Y.; Yang, C. P.; Li, Y.; Yu, M.; Bambacus, M.; Seery, B.; Barbee, B.

    2016-12-01

    Planetary Defense, a project funded by NASA Goddard and the NSF, is a multi-faceted effort focused on the mitigation of Near Earth Object (NEO) threats to our planet. Currently, there exists a dispersion of information concerning NEO's amongst different organizations and scientists, leading to a lack of a coherent system of information to be used for efficient NEO mitigation. In this paper, a planetary defense knowledge discovery engine is proposed to better assist the development and integration of a NEO responding system. Specifically, we have implemented an organized information framework by two means: 1) the development of a semantic knowledge base, which provides a structure for relevant information. It has been developed by the implementation of web crawling and natural language processing techniques, which allows us to collect and store the most relevant structured information on a regular basis. 2) the development of a knowledge discovery engine, which allows for the efficient retrieval of information from our knowledge base. The knowledge discovery engine has been built on the top of Elasticsearch, an open source full-text search engine, as well as cutting-edge machine learning ranking and recommendation algorithms. This proposed framework is expected to advance the knowledge discovery and innovation in planetary science domain.

  3. Managing Threat, Cost, and Incentive to Kill: The Short- and Long-Term Effects of Intervention in Mass Killings

    ERIC Educational Resources Information Center

    Kathman, Jacob D.; Wood, Reed M.

    2011-01-01

    How do third-party interventions affect the severity of mass killings? The authors theorize that episodes of mass killing are the consequence of two factors: (1) the threat perceptions of the perpetrators and (2) the cost of implementing genocidal policies relative to other alternatives. To reduce genocidal hostilities, interveners must address…

  4. Exploring the roots of unintended safety threats associated with the introduction of hospital ePrescribing systems and candidate avoidance and/or mitigation strategies: a qualitative study.

    PubMed

    Mozaffar, Hajar; Cresswell, Kathrin M; Williams, Robin; Bates, David W; Sheikh, Aziz

    2017-09-01

    Hospital electronic prescribing (ePrescribing) systems offer a wide range of patient safety benefits. Like other hospital health information technology interventions, however, they may also introduce new areas of risk. Despite recent advances in identifying these risks, the development and use of ePrescribing systems is still leading to numerous unintended consequences, which may undermine improvement and threaten patient safety. These negative consequences need to be analysed in the design, implementation and use of these systems. We therefore aimed to understand the roots of these reported threats and identify candidate avoidance/mitigation strategies. We analysed a longitudinal, qualitative study of the implementation and adoption of ePrescribing systems in six English hospitals, each being conceptualised as a case study. Data included semistructured interviews, observations of implementation meetings and system use, and a collection of relevant documents. We analysed data first within and then across the case studies. Our dataset included 214 interviews, 24 observations and 18 documents. We developed a taxonomy of factors underlying unintended safety threats in: (1) suboptimal system design, including lack of support for complex medication administration regimens, lack of effective integration between different systems, and lack of effective automated decision support tools; (2) inappropriate use of systems-in particular, too much reliance on the system and introduction of workarounds; and (3) suboptimal implementation strategies resulting from partial roll-outs/dual systems and lack of appropriate training. We have identified a number of system and organisational strategies that could potentially avoid or reduce these risks. Imperfections in the design, implementation and use of ePrescribing systems can give rise to unintended consequences, including safety threats. Hospitals and suppliers need to implement short- and long-term strategies in terms of the technology and organisation to minimise the unintended safety risks. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  5. Organizational issues in the implementation and adoption of health information technology innovations: an interpretative review.

    PubMed

    Cresswell, Kathrin; Sheikh, Aziz

    2013-05-01

    Implementations of health information technologies are notoriously difficult, which is due to a range of inter-related technical, social and organizational factors that need to be considered. In the light of an apparent lack of empirically based integrated accounts surrounding these issues, this interpretative review aims to provide an overview and extract potentially generalizable findings across settings. We conducted a systematic search and critique of the empirical literature published between 1997 and 2010. In doing so, we searched a range of medical databases to identify review papers that related to the implementation and adoption of eHealth applications in organizational settings. We qualitatively synthesized this literature extracting data relating to technologies, contexts, stakeholders, and their inter-relationships. From a total body of 121 systematic reviews, we identified 13 systematic reviews encompassing organizational issues surrounding health information technology implementations. By and large, the evidence indicates that there are a range of technical, social and organizational considerations that need to be deliberated when attempting to ensure that technological innovations are useful for both individuals and organizational processes. However, these dimensions are inter-related, requiring a careful balancing act of strategic implementation decisions in order to ensure that unintended consequences resulting from technology introduction do not pose a threat to patients. Organizational issues surrounding technology implementations in healthcare settings are crucially important, but have as yet not received adequate research attention. This may in part be due to the subjective nature of factors, but also due to a lack of coordinated efforts toward more theoretically-informed work. Our findings may be used as the basis for the development of best practice guidelines in this area. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  6. Multisensor data fusion for IED threat detection

    NASA Astrophysics Data System (ADS)

    Mees, Wim; Heremans, Roel

    2012-10-01

    In this paper we present the multi-sensor registration and fusion algorithms that were developed for a force protection research project in order to detect threats against military patrol vehicles. The fusion is performed at object level, using a hierarchical evidence aggregation approach. It first uses expert domain knowledge about the features used to characterize the detected threats, that is implemented in the form of a fuzzy expert system. The next level consists in fusing intra-sensor and inter-sensor information. Here an ordered weighted averaging operator is used. The object level fusion between candidate threats that are detected asynchronously on a moving vehicle by sensors with different imaging geometries, requires an accurate sensor to world coordinate transformation. This image registration will also be discussed in this paper.

  7. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  8. On the significance of future trends in flood frequencies

    NASA Astrophysics Data System (ADS)

    Bernhardt, M.; Schulz, K.; Wieder, O.

    2015-12-01

    Floods are a significant threat for alpine headwater catchments and for the forelands. The formation of significant flood events is thereby often coupled on processes occurring in the alpine zone. Rain on snow events are just one example. The prediction of flood risks or trends of flood risks is of major interest to people under direct threat, policy and decision makers as well as for insurance companies. A lot of research was and is currently done in view of detecting future trends in flood extremes or return periods. From a pure physically based point of view, there is strong evidence that those trends exist. But, the central point question is if trends in flood events or other extreme events could be detected from a statistical point of view and on the basis of the available data. This study will investigate this question on the basis of different target parameters and by using long term measurements.

  9. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically andmore » religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.« less

  10. Healthcare Stereotype Threat in Older Adults in the Health and Retirement Study.

    PubMed

    Abdou, Cleopatra M; Fingerhut, Adam W; Jackson, James S; Wheaton, Felicia

    2016-02-01

    Healthcare stereotype threat is the threat of being personally reduced to group stereotypes that commonly operate within the healthcare domain, including stereotypes regarding unhealthy lifestyles and inferior intelligence. The objective of this study was to assess the extent to which people fear being judged in healthcare contexts on several characteristics, including race/ethnicity and age, and to test predictions that experience of such threats would be connected with poorer health and negative perceptions of health care. Data were collected as part of the 2012 Health and Retirement Study (HRS). A module on healthcare stereotype threat, designed by the research team, was administered to a random subset (n=2,048 of the total 20,555) of HRS participants. The final sample for the present healthcare stereotype threat experiment consists of 1,479 individuals. Logistic regression was used to test whether healthcare stereotype threat was associated with self-rated health, reported hypertension, and depressive symptoms, as well as with healthcare-related outcomes, including physician distrust, dissatisfaction with health care, and preventative care use. Seventeen percent of respondents reported healthcare stereotype threat with respect to one or more aspects of their identities. As predicted, healthcare stereotype threat was associated with higher physician distrust and dissatisfaction with health care, poorer mental and physical health (i.e., self-rated health, hypertension, and depressive symptoms), and lower odds of receiving the influenza vaccine. The first of its kind, this study demonstrates that people can experience healthcare stereotype threat on the basis of various stigmatized aspects of social identity, and that these experiences can be linked with larger health and healthcare-related outcomes, thereby contributing to disparities among minority groups. Copyright © 2016. Published by Elsevier Inc.

  11. A model of service and training: threat assessment on a community college campus.

    PubMed

    Mrad, David F; Hanigan, Antoni J S; Bateman, Joyce R

    2015-02-01

    Forensic psychological assessment for targeted violence is a growing area of practice and community need. These threat assessments are particularly challenging on community college campuses given the broad range of students and the limited internal resources. A collaborative model of partnership between a community college and the training clinic of a doctoral program in clinical psychology has been developed and implemented. The model provides needed service to the community college and rich training experiences for doctoral students in psychology. Implementation of similar partnerships in other settings may be limited by the training and experience of doctoral faculty and the openness of behavioral intervention teams to external participants.

  12. 10 CFR 73.55 - Requirements for physical protection of licensed activities in nuclear power reactors against...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... sabotage vehicle bomb assault. (i) Land vehicles. Licensees shall: (A) Design, construct, install, and... fuel sabotage against the effects of the design basis threat of radiological sabotage land vehicle bomb...

  13. Riverine threat indices to assess watershed condition and identify primary management capacity of agriculture natural resource management agencies.

    PubMed

    Fore, Jeffrey D; Sowa, Scott P; Galat, David L; Annis, Gust M; Diamond, David D; Rewa, Charles

    2014-03-01

    Managers can improve conservation of lotic systems over large geographies if they have tools to assess total watershed conditions for individual stream segments and can identify segments where conservation practices are most likely to be successful (i.e., primary management capacity). The goal of this research was to develop a suite of threat indices to help agriculture resource management agencies select and prioritize watersheds across Missouri River basin in which to implement agriculture conservation practices. We quantified watershed percentages or densities of 17 threat metrics that represent major sources of ecological stress to stream communities into five threat indices: agriculture, urban, point-source pollution, infrastructure, and all non-agriculture threats. We identified stream segments where agriculture management agencies had primary management capacity. Agriculture watershed condition differed by ecoregion and considerable local variation was observed among stream segments in ecoregions of high agriculture threats. Stream segments with high non-agriculture threats were most concentrated near urban areas, but showed high local variability. 60 % of stream segments in the basin were classified as under U.S. Department of Agriculture's Natural Resources Conservation Service (NRCS) primary management capacity and most segments were in regions of high agricultural threats. NRCS primary management capacity was locally variable which highlights the importance of assessing total watershed condition for multiple threats. Our threat indices can be used by agriculture resource management agencies to prioritize conservation actions and investments based on: (a) relative severity of all threats, (b) relative severity of agricultural threats, and (c) and degree of primary management capacity.

  14. Towards a Threat Assessment Framework for Ecosystem Services.

    PubMed

    Maron, Martine; Mitchell, Matthew G E; Runting, Rebecca K; Rhodes, Jonathan R; Mace, Georgina M; Keith, David A; Watson, James E M

    2017-04-01

    How can we tell if the ecosystem services upon which we rely are at risk of being lost, potentially permanently? Ecosystem services underpin human well-being, but we lack a consistent approach for categorizing the extent to which they are threatened. We present an assessment framework for assessing the degree to which the adequate and sustainable provision of a given ecosystem service is threatened. Our framework combines information on the states and trends of both ecosystem service supply and demand, with reference to two critical thresholds: demand exceeding supply and ecosystem service 'extinction'. This framework can provide a basis for global, national, and regional assessments of threat to ecosystem services, and accompany existing assessments of threat to species and ecosystems. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Contribution of Near Real Time MODIS-Based Forest Disturbance Detection Products to a National Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph; Hargrove, William; Gasser, Gerald; Smoot, James; Kuper, Philip

    2011-01-01

    U.S. forests occupy approx. 751 million acres (approx. 1/3 of total land). These forests are exposed to multiple biotic and abiotic threats that collectively damage extensive acreages each year. Hazardous forest disturbances can threaten human life and property, bio-diversity and water supplies. Timely regional forest monitoring products are needed to aid forest management and decision making by the US Forest Service and its state and private partners. Daily MODIS data products provide a means to monitor regional forest disturbances on a weekly basis. In response, we began work in 2006 to develop a Near Real Time (NRT) forest monitoring capability, based on MODIS NDVI data, as part of a national forest threat early warning system (EWS)

  16. A global response roadmap to the asteroid impact threat: The NEOShield perspective

    NASA Astrophysics Data System (ADS)

    Perna, D.; Barucci, M. A.; Drube, L.; Falke, A.; Fulchignoni, M.; Harris, A. W.; Harris, A. W.; Kanuchova, Z.

    2015-12-01

    Besides being of great scientific interest, near-Earth objects represent a well-founded threat to life on our planet. Nonetheless, up to now there has been no concerted international plan on how to deal with the impact threat, and how to prepare and implement mitigation measures. The NEOShield project is funded by the European Commission to address such issues, to investigate the feasibility of techniques to prevent a potentially catastrophic impact on Earth by an asteroid or a comet, and to develop detailed designs of appropriate space missions to test deflection techniques. In this work we present and discuss the scientific and strategic aspects of the asteroid impact threat, highlighting the necessary steps so as to be ready to react to future hazardous objects.

  17. Motivational Basis of Personality Traits: A Meta-Analysis of Value-Personality Correlations.

    PubMed

    Fischer, Ronald; Boer, Diana

    2015-10-01

    We investigated the relationships between personality traits and basic value dimensions. Furthermore, we developed novel country-level hypotheses predicting that contextual threat moderates value-personality trait relationships. We conducted a three-level v-known meta-analysis of correlations between Big Five traits and Schwartz's (1992) 10 values involving 9,935 participants from 14 countries. Variations in contextual threat (measured as resource threat, ecological threat, and restrictive social institutions) were used as country-level moderator variables. We found systematic relationships between Big Five traits and human values that varied across contexts. Overall, correlations between Openness traits and the Conservation value dimension and Agreeableness traits and the Transcendence value dimension were strongest across all samples. Correlations between values and all personality traits (except Extraversion) were weaker in contexts with greater financial, ecological, and social threats. In contrast, stronger personality-value links are typically found in contexts with low financial and ecological threats and more democratic institutions and permissive social context. These effects explained on average more than 10% of the variability in value-personality correlations. Our results provide strong support for systematic linkages between personality and broad value dimensions, but they also point out that these relations are shaped by contextual factors. © 2014 Wiley Periodicals, Inc.

  18. Attachment, self-esteem, worldviews, and terror management: evidence for a tripartite security system.

    PubMed

    Hart, Joshua; Shaver, Phillip R; Goldenberg, Jamie L

    2005-06-01

    On the basis of prior work integrating attachment theory and terror management theory, the authors propose a model of a tripartite security system consisting of dynamically interrelated attachment, self-esteem, and worldview processes. Four studies are presented that, combined with existing evidence, support the prediction derived from the model that threats to one component of the security system result in compensatory defensive activation of other components. Further, the authors predicted and found that individual differences in attachment style moderate the defenses. In Studies 1 and 2, attachment threats motivated worldview defense among anxiously attached participants and motivated self-enhancement (especially among avoidant participants), effects similar to those caused by mortality salience. In Studies 3 and 4, a worldview threat and a self-esteem threat caused attachment-related proximity seeking among fearful participants and avoidance of proximity among dismissing participants. The authors' model provides an overarching framework within which to study attachment, self-esteem, and worldviews.

  19. A global threats overview for Numeniini populations: synthesising expert knowledge for a group of declining migratory birds.

    USGS Publications Warehouse

    Pearce-Higgins, James W.; Brown, Daniel J.; Douglas, David J.T.; Alves, José A.; Bellio, Mariagrazia; Bocher, Pierrick; Buchannan, Graeme M.; Clay, Robert P.; Conklin, Jesse R.; Crockford, Nicola; Dann, Peter; Elts, Jaanus; Friis, Christian; Fuller, Richard A.; Gill, Jennifer A.; Gosbell, Ken; Johnson, James A.; Marquez-Ferrando, Rocio; Masero, José A.; Melville, David S.; Millington, Spike; Minton, Clive; Mundkur, Taej; Nol, Erika; Pehlak, Hannes; Piersma, Theunis; Rogers, Danny I.; Ruthrauff, Daniel R.; Senner, Nathan R.; Nazeer Shah, Junid; Sheldon, Rob D.; Soloviev, Sergej A.; Tomkovich, Pavel S.; Verkuil, Yvonne I.

    2017-01-01

    The Numeniini is a tribe of 13 wader species (Scolopacidae, Charadriiformes) of which seven are Near Threatened or globally threatened, including two Critically Endangered. To help inform conservation management and policy responses, we present the results of an expert assessment of the threats that members of this taxonomic group face across migratory flyways. Most threats are increasing in intensity, particularly in non-breeding areas, where habitat loss resulting from residential and commercial development, aquaculture, mining, transport, disturbance, problematic invasive species, pollution and climate change were regarded as having the greatest detrimental impact. Fewer threats (mining, disturbance, problematic native species and climate change) were identified as widely affecting breeding areas. Numeniini populations face the greatest number of non-breeding threats in the East Asian-Australasian Flyway, especially those associated with coastal reclamation; related threats were also identified across the Central and Atlantic Americas, and East Atlantic flyways. Threats on the breeding grounds were greatest in Central and Atlantic Americas, East Atlantic and West Asian flyways. Three priority actions were associated with monitoring and research: to monitor breeding population trends (which for species breeding in remote areas may best be achieved through surveys at key non-breeding sites), to deploy tracking technologies to identify migratory connectivity, and to monitor land-cover change across breeding and non-breeding areas. Two priority actions were focused on conservation and policy responses: to identify and effectively protect key non-breeding sites across all flyways (particularly in the East Asian- Australasian Flyway), and to implement successful conservation interventions at a sufficient scale across human-dominated landscapes for species' recovery to be achieved. If implemented urgently, these measures in combination have the potential to alter the current population declines of many Numeniini species and provide a template for the conservation of other groups of threatened species.

  20. An Implementation Analysis of Threat Assessment Policies in Public Universities and Community Colleges in Central Texas: A Post Virginia Tech Incident Assessment

    ERIC Educational Resources Information Center

    Piet DeLaTorre, Christine

    2011-01-01

    It is clear that the tragic events at Virginia Tech and other institutions of higher education (IHEs) have brought threat assessment to the forefront of higher education literature and increased public concern for campus safety. IHEs have a profound duty to learn from the Virginia Tech tragedy and to recognize their responsibility in providing a…

  1. Implementing the global health security agenda: lessons from global health and security programs.

    PubMed

    Paranjape, Suman M; Franz, David R

    2015-01-01

    The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.

  2. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    PubMed

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  3. Elephants can determine ethnicity, gender, and age from acoustic cues in human voices

    PubMed Central

    McComb, Karen; Shannon, Graeme; Sayialel, Katito N.; Moss, Cynthia

    2014-01-01

    Animals can accrue direct fitness benefits by accurately classifying predatory threat according to the species of predator and the magnitude of risk associated with an encounter. Human predators present a particularly interesting cognitive challenge, as it is typically the case that different human subgroups pose radically different levels of danger to animals living around them. Although a number of prey species have proved able to discriminate between certain human categories on the basis of visual and olfactory cues, vocalizations potentially provide a much richer source of information. We now use controlled playback experiments to investigate whether family groups of free-ranging African elephants (Loxodonta africana) in Amboseli National Park, Kenya can use acoustic characteristics of speech to make functionally relevant distinctions between human subcategories differing not only in ethnicity but also in sex and age. Our results demonstrate that elephants can reliably discriminate between two different ethnic groups that differ in the level of threat they represent, significantly increasing their probability of defensive bunching and investigative smelling following playbacks of Maasai voices. Moreover, these responses were specific to the sex and age of Maasai presented, with the voices of Maasai women and boys, subcategories that would generally pose little threat, significantly less likely to produce these behavioral responses. Considering the long history and often pervasive predatory threat associated with humans across the globe, it is likely that abilities to precisely identify dangerous subcategories of humans on the basis of subtle voice characteristics could have been selected for in other cognitively advanced animal species. PMID:24616492

  4. Automating Risk Analysis of Software Design Models

    PubMed Central

    Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P.

    2014-01-01

    The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance. PMID:25136688

  5. Automating risk analysis of software design models.

    PubMed

    Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P

    2014-01-01

    The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.

  6. 47 CFR 10.410 - Prioritization.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Prioritization. 10.410 Section 10.410 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL MOBILE ALERT SYSTEM Alert Message... required to transmit Imminent Threat Alerts and AMBER Alerts on a first in-first out (FIFO) basis. ...

  7. 5 CFR 1631.6 - How to request records-form and content.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...., Washington, DC 20005. The words “FOIA Request” should be clearly marked on both the letter and the envelope... failure to obtain the record on an expedited basis could reasonably be expected to pose an imminent threat...

  8. 22 CFR 103.3 - Requirement to provide a sample.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... IMPLEMENTATION OF THE CHEMICAL WEAPONS CONVENTION AND THE CHEMICAL WEAPONS CONVENTION IMPLEMENTATION ACT OF 1998... accordance with the applicable provisions contained in the Chemical Weapons Convention and the CWCIA. (d... for personal safety; (6) The taking of a sample does not pose a threat to the national security...

  9. 22 CFR 103.3 - Requirement to provide a sample.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... IMPLEMENTATION OF THE CHEMICAL WEAPONS CONVENTION AND THE CHEMICAL WEAPONS CONVENTION IMPLEMENTATION ACT OF 1998... accordance with the applicable provisions contained in the Chemical Weapons Convention and the CWCIA. (d... for personal safety; (6) The taking of a sample does not pose a threat to the national security...

  10. Validity as Process: A Construct Driven Measure of Fidelity of Implementation

    ERIC Educational Resources Information Center

    Jones, Ryan Seth

    2013-01-01

    Estimates of fidelity of implementation are essential to interpret the effects of educational interventions in randomized controlled trials (RCTs). While random assignment protects against many threats to validity, and therefore provides the best approximation to a true counterfactual condition, it does not ensure that the treatment condition…

  11. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign andmore » threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.« less

  12. Helping Parents Cope with Suicide Threats: An Approach Based on Nonviolent Resistance.

    PubMed

    Omer, Haim; Dolberger, Dan Isaac

    2015-09-01

    Parent training in nonviolent resistance was adapted to deal with situations of suicide threat by children, adolescents, and young adults. The approach aims at reducing the risk potential and the mutual distress surrounding the threat-interaction. Parent training in nonviolent resistance has been shown to help parents move from helplessness to presence, from isolation to connectedness, from submission to resistance, from escalation to self-control, and from mutual distancing and hostility to care and support. Those emphases can be crucial for the diminution of suicide risk. Parents show good ability to implement the approach and report gains on various areas over and beyond the reduction in suicide threat. A particular advantage is that the method can be used also in cases where the young person threatening suicide is not willing to cooperate. © 2015 Family Process Institute.

  13. Ship Underwater Threat Response System (SUTRS): A Feasibility Study of Organic Mine Point-Defense

    DTIC Science & Technology

    2012-09-01

    by implementing and testing the design until a final product has been established that addresses (and has been traced throughout to) the...The assumptions used to evaluate those TPMs are as follows: • The threshold Probability of Success for the total system should be 90% survival...Threat Response System xviii TOA Table of Allowance TPM Technical Performance Measures TTP Tactics Techniques and Procedures U.S. United

  14. Striving for quality use of medicines: how effective is Australia's ban on direct-to-consumer prescription medicine advertising?

    PubMed

    Brown, Sonja

    2009-02-01

    The potential for both positive and negative effects arising from direct-to-consumer advertising of prescription medicines challenges health policymakers to develop regulatory schemes which selectively capture the positive aspects of the practice. Australia has dealt with this quandary by banning the practice, while New Zealand and the United States permit it. However, in recent times pharmaceutical companies have been increasingly successful in introducing promotional materials into the Australian market. This article demonstrates that the Australian ban is consistent with striving for the major policy goal of quality use of medicines, thus providing the basis for arguing that solutions to strengthen the ban against the identified threats ought to be implemented. Quality use of medicines can be most effectively achieved via the combined effect of the strengthened ban and the mimicking of the limited positive aspects of direct-to-consumer advertising by government provision of non-promotional information to consumers.

  15. [Tuberculosis and refusal of treatment: resorting to legislation on serious health threats].

    PubMed

    Bouvet, R; Le Gueut, M

    2013-06-01

    Clinicians are regularly confronted with the question of refusal of treatment from patients with tuberculosis. For several years, the French public health authorities have been studying the possibility of compelling treatment or isolation, but no plan has been implemented even though European and American experiences have shown the effectiveness of restrictive measures. Neither the statutory exceptions to the principle of consent to medical treatment nor the conditions of implementation of "required care" allow legally binding measures against patients refusing care or isolation. The legislation on serious health threats has recently been applied to the situation of a refusal of treatment in the context of tuberculosis. It allowed the patient to be ordered to observe prescribed care and the possibility of forced isolation in the event of breach of this order. The legislation on serious health threats is a response to the question of refusal of treatment from patients with tuberculosis. However the opinion of the legal authority as to its necessity and proportionality to the risk remains unknown. Copyright © 2013 SPLF. Published by Elsevier Masson SAS. All rights reserved.

  16. Terrorism: a public health threat with a trauma system response.

    PubMed

    Jacobs, Lenworth M; Burns, Karyl J; Gross, Ronald I

    2003-12-01

    The threat of mass casualties and widespread infectious disease caused by terrorism is now a challenge for our government and public health system. Funds have been granted to the states by the Centers for Disease Control and Prevention and the Health Resources and Services Administration to establish bioterrorism preparedness and response capabilities. Hartford Hospital has been designated as a Center of Excellence for Bioterrorism Preparedness by the Commissioner of the Connecticut Department of Public Health. The Center of Excellence has implemented strategies to prepare for a possible bioterrorist attack. A unique model that combines epidemiology and traumatology is being used to guide the preparedness activities. Although the focus of the grant from the Connecticut Department of Public Health is bioterrorism, the application of the model can apply to preparation for all terrorist events. Implementation of strategies indicates that bioterrorism preparedness is well underway. Similar initiatives should be achievable by other trauma systems throughout the country. A Center of Excellence for Bioterrorism Preparedness in Connecticut is successfully modifying a trauma system to meet the challenge of a new public health threat, terrorism.

  17. 77 FR 14265 - To Implement the United States-Korea Free Trade Agreement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-09

    ... threat thereof to a domestic industry producing certain textile or apparel articles. 9. Executive Order... apparel goods. 8. Subtitle C of title III of the Implementation Act authorizes the President to take... exclusion of certain textile and apparel goods from the customs territory of the United States and to direct...

  18. An Expert System For Multispectral Threat Assessment And Response

    NASA Astrophysics Data System (ADS)

    Steinberg, Alan N.

    1987-05-01

    A concept has been defined for an automatic system to manage the self-defense of a combat aircraft. Distinctive new features of this concept include: a. the flexible prioritization of tasks and coordinated use of sensor, countermeasures, flight systems and weapons assets by means of an automated planning function; b. the integration of state-of-the-art data fusion algorithms with event prediction processing; c. the use of advanced Artificial Intelligence tools to emulate the decision processes of tactical EW experts. Threat Assessment functions (a) estimate threat identity, lethality and intent on the basis of multi-spectral sensor data, and (b) predict the time to critical events in threat engagements (e.g., target acquisition, tracking, weapon launch, impact). Response Management functions (a) select candidate responses to reported threat situations; (b) estimate the effects of candidate actions on survival; and (c) coordinate the assignment of sensors, weapons and countermeasures with the flight plan. The system employs Finite State Models to represent current engagements and to predict subsequent events. Each state in a model is associated with a set of observable features, allowing interpretation of sensor data and adaptive use of sensor assets. Defined conditions on state transitions allow prediction of times to critical future states and are used in planning self-defensive responses, which are designed either to impede a particular state transition or to force a transition to a lower threat state.

  19. Scaling a Human Body Finite Element Model with Radial Basis Function Interpolation

    DTIC Science & Technology

    Human body models are currently used to evaluate the body’s response to a variety of threats to the Soldier. The ability to adjust the size of human...body models is currently limited because of the complex shape changes that are required. Here, a radial basis function interpolation method is used to...morph the shape on an existing finite element mesh. Tools are developed and integrated into the Blender computer graphics software to assist with

  20. 77 FR 64564 - Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-22

    ...-Basis Hurricane and Hurricane Missiles AGENCY: Nuclear Regulatory Commission. ACTION: Proposed interim...-ISG-024, ``Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles....221, ``Design-Basis Hurricane and Hurricane Missiles for Nuclear Power Plants.'' DATES: Submit...

  1. Saudi Arabias Implementation of Soft Power Policy to Confront Irans Obvious Threats

    DTIC Science & Technology

    2015-12-01

    OBVIOUS THREATS Abdullah Khuliyf A. Alanazi Colonel, Saudi Arabia National Guard B.S., King Khalid Military College, 1993 Submitted in partial...inevitably growing power, particularly in the Persian Gulf, and throughout the Middle East. Such a situation advocates utilizing soft power as a new...www.educause.edu/ir/library/ pdf /ffpiu043. pdf , 34. 2 Giulio Gallarotti and Isam Yahia Al-Filali, “Saudi Arabia’s Soft Power.” International Studies 49

  2. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model adaptation (learning). The increasingly complex demands facing analysts evaluating activity threatening to the security of the United States make the family of agent-based data collection (fusion) a promising area. This paper will discuss a system to support the collection and evaluation of potential threat activity as well as an approach fro presentation of the information.

  3. 75 FR 60133 - Detroit Area Maritime Security Committee (AMSC); Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-29

    ... (threats, vulnerabilities, and consequences); Determining mitigation strategies and implementation methods... consequences and vulnerabilities, how they may change over time, and what additional mitigation strategies can...

  4. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  5. Selected considerations of implementation of the GNSS

    NASA Astrophysics Data System (ADS)

    Cwiklak, Janusz; Fellner, Andrzej; Fellner, Radoslaw; Jafernik, Henryk; Sledzinski, Janusz

    2014-05-01

    The article describes analysis of the safety and risk for the implementation of precise approach procedures (Localizer Performance and Vertical Guidance - LPV) with GNSS sensor at airports in Warsaw and Katowice. There were used some techniques of the identification of threats (inducing controlled flight into terrain, landing accident, mid-air collision) and evaluations methods based on Fault Tree Analysis, probability of the risk, safety risk evaluation matrix and Functional Hazard Assesment. Also safety goals were determined. Research led to determine probabilities of appearing of threats, as well as allow compare them with regard to the ILS. As a result of conducting the Preliminary System Safety Assessment (PSSA), there were defined requirements essential to reach the required level of the safety. It is worth to underline, that quantitative requirements were defined using FTA.

  6. Security model for VM in cloud

    NASA Astrophysics Data System (ADS)

    Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

    2013-03-01

    Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.

  7. Why Don't We Ask? A Complementary Method for Assessing the Status of Great Apes

    PubMed Central

    Meijaard, Erik; Mengersen, Kerrie; Buchori, Damayanti; Nurcahyo, Anton; Ancrenaz, Marc; Wich, Serge; Atmoko, Sri Suci Utami; Tjiu, Albertus; Prasetyo, Didik; Nardiyono; Hadiprakarsa, Yokyok; Christy, Lenny; Wells, Jessie; Albar, Guillaume; Marshall, Andrew J.

    2011-01-01

    Species conservation is difficult. Threats to species are typically high and immediate. Effective solutions for counteracting these threats, however, require synthesis of high quality evidence, appropriately targeted activities, typically costly implementation, and rapid re-evaluation and adaptation. Conservation management can be ineffective if there is insufficient understanding of the complex ecological, political, socio-cultural, and economic factors that underlie conservation threats. When information about these factors is incomplete, conservation managers may be unaware of the most urgent threats or unable to envision all consequences of potential management strategies. Conservation research aims to address the gap between what is known and what knowledge is needed for effective conservation. Such research, however, generally addresses a subset of the factors that underlie conservation threats, producing a limited, simplistic, and often biased view of complex, real world situations. A combination of approaches is required to provide the complete picture necessary to engage in effective conservation. Orangutan conservation (Pongo spp.) offers an example: standard conservation assessments employ survey methods that focus on ecological variables, but do not usually address the socio-cultural factors that underlie threats. Here, we evaluate a complementary survey method based on interviews of nearly 7,000 people in 687 villages in Kalimantan, Indonesia. We address areas of potential methodological weakness in such surveys, including sampling and questionnaire design, respondent biases, statistical analyses, and sensitivity of resultant inferences. We show that interview-based surveys can provide cost-effective and statistically robust methods to better understand poorly known populations of species that are relatively easily identified by local people. Such surveys provide reasonably reliable estimates of relative presence and relative encounter rates of such species, as well as quantifying the main factors that threaten them. We recommend more extensive use of carefully designed and implemented interview surveys, in conjunction with more traditional field methods. PMID:21483859

  8. 78 FR 11275 - Designation of One (1) Individual and Four (4) Entities Pursuant to Executive Order 13628 of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-15

    ... of October 9, 2012, ``Authorizing the Implementation of Certain Sanctions Set Forth in the Iran Threat Reduction and Syria Human Rights Act of 2012 and Additional Sanctions With Respect to Iran... issued Executive Order 13628, ``Authorizing the Implementation of Certain Sanctions Set Forth in the Iran...

  9. Status and threats analysis for the Florida manatee (Trichechus manatus latirostris), 2012

    USGS Publications Warehouse

    Runge, Michael C.; Langtimm, Catherine A.; Martin, Julien; Fonnesbeck, Christopher J.

    2015-01-01

    The endangered West Indian manatee (Trichechus manatus), especially the Florida subspecies (T. m. latirostris), has been the focus of conservation efforts and extensive research since its listing under the Endangered Species Act. On the basis of the best information available as of December 2012, the threats facing the Florida manatee were determined to be less severe than previously thought, either because the conservation efforts have been successful, or because our knowledge of the demographic effects of those threats is increased, or both. Using the manatee Core Biological Model, we estimated the probability of the Florida manatee population on either the Atlantic or Gulf coast falling below 500 adults in the next 150 years to be 0.92 percent. The primary threats remain watercraft-related mortality and long-term loss of warm-water habitat. Since 2009, however, there have been a number of unusual events that have not yet been incorporated into this analysis, including several severely cold winters, a severe red-tide die off, and substantial loss of seagrass habitat in Brevard County, Fla. Further, the version of the Core Biological Model used in 2012 makes a number of assumptions that are under investigation. A revision of the Core Biological Model and an update of this quantitative threats analysis are underway as of 2015.

  10. 33 CFR 103.310 - Responsibilities of the Area Maritime Security (AMS) Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (threats, vulnerabilities, and consequences); (3) Determine mitigation strategies and implementation... consequences and vulnerabilities, how they may change over time, and what additional mitigation strategies can...

  11. Geolocalisation of athletes for out-of-competition drug testing: ethical considerations. Position statement by the WADA Ethics Panel

    PubMed Central

    Caulfield, Timothy; Estivill, Xavier; Loland, Sigmund; McNamee, Michael; Knoppers, Bartha Maria

    2018-01-01

    Through the widespread availability of location-identifying devices, geolocalisation could potentially be used to place athletes during out-of-competition testing. In light of this debate, the WADA Ethics Panel formulated the following questions: (1) should WADA and/or other sponsors consider funding such geolocalisation research projects?, (2) if successful, could they be proposed to athletes as a complementary device to Anti-Doping Administration and Management System to help geolocalisation and reduce the risk of missed tests? and (3) should such devices be offered on a voluntary basis, or is it conceivable that they would be made mandatory for all athletes in registered testing pools? In this position paper, the WADA Ethics Panel concludes that the use of geolocalisation could be useful in a research setting with the goal of understanding associations between genotype, phenotype and environment; however, it recognises that the use of geolocalisation as part of or as replacement of whereabouts rules is replete with ethical concerns. While benefits remain largely hypothetical and minimal, the potential invasion of privacy and the data security threats are real. Considering the impact on privacy, data security issues, the societal ramifications of offering such services and various pragmatic considerations, the WADA Ethics Panel concludes that at this time, the use of geolocalisation should neither be mandated as a tool for disclosing whereabouts nor implemented on a voluntary basis. PMID:29500253

  12. Potential coastal impacts of contemporary changing climate on South Asian seas states

    NASA Astrophysics Data System (ADS)

    Gable, F. J.; Aubrey, D. G.

    1990-01-01

    The threat of man-induced global change on the nations of the South Asian seas region varies from place to place because of differences in exposure to monsoons and stoms, differences in local tectonics and subsidence, and variations in air and sea climates. Because several nations are involved, some having subsistence budgets, and given the cost of deriving independently a comprehensive response to global change, the similarities and differences between national settings must be identified soon. These comparisons will form the basis for local response strategies: the similarities provide a basis for responses similar to that of other nations and the differences provide for local adaptation. That climate change on the South Asian coastal region will have an impact is certain: its economics, environment, and coastal land uses are dominated to a certain extent by this marine influence. The extent of these impacts, however, is uncertain. Accompanying global change will be changes in sea level, differences in storm climate, and altered precipitation patterns; science cannot define today what pattern these changes will take. Because global change is inevitable—although its magnitude, timing, and geographic distribution are unknown—the South Asian seas region should begin the appropriate research and planning studies to set forth a reasoned response to global change, for implementation when scientific evidence for global change is more quantitative.

  13. Genetic analysis of genetic basis of a physiological disorder "straighthead’’ in rice (Oryza sativa L.)

    USDA-ARS?s Scientific Manuscript database

    Straighthead is a physiological disorder in rice that causes yield losses and is a serious threat to rice production worldwide. Identification of QTL conferring resistance will help develop resistant cultivars for straighthead control. We conducted linkage mapping to identify QTL involved with strai...

  14. 10 CFR 73.55 - Requirements for physical protection of licensed activities in nuclear power reactors against...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... shall: (i) Design, construct, install and maintain physical barriers as necessary to control access into.... (10) Vehicle control measures. Consistent with the physical protection program design requirements of... maintain vehicle control measures, as necessary, to protect against the design basis threat of radiological...

  15. 10 CFR 73.55 - Requirements for physical protection of licensed activities in nuclear power reactors against...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... shall: (i) Design, construct, install and maintain physical barriers as necessary to control access into.... (10) Vehicle control measures. Consistent with the physical protection program design requirements of... maintain vehicle control measures, as necessary, to protect against the design basis threat of radiological...

  16. 10 CFR 73.55 - Requirements for physical protection of licensed activities in nuclear power reactors against...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... shall: (i) Design, construct, install and maintain physical barriers as necessary to control access into.... (10) Vehicle control measures. Consistent with the physical protection program design requirements of... maintain vehicle control measures, as necessary, to protect against the design basis threat of radiological...

  17. 21 CFR 20.44 - Expedited processing.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PUBLIC INFORMATION... expedited basis could reasonably be expected to pose an imminent threat to the life or physical safety of an individual; or (2) With respect to a request made by a person primarily engaged in disseminating information...

  18. The effect of nutrient media water purity on LIBS based identification of bacteria

    USDA-ARS?s Scientific Manuscript database

    Single pulse laser induced breakdown spectroscopy (LIBS) is used as the basis for discrimination between 3 genera of Gram-negative bacteria and 2 genera of gram-positive bacteria representing pathogenic threats commonly found in poultry processing rinse waters. Because LIBS-based discrimination reli...

  19. Domestic Violence and the Impact on Young Children

    ERIC Educational Resources Information Center

    Zinke, Michelle; Zinke, Linda

    2008-01-01

    Domestic violence can be described as a pattern of intentional behaviors that includes a variety of tactics, such as physical and sexual violence, stalking, threats/intimidation, isolation, psychological attacks, and spiritual and economic abuse. Domestic violence can happen to anyone. It does not discriminate on the basis of economic status,…

  20. Red flags: correlates of impaired species recovery

    Treesearch

    Jeffrey A. Hutchings; Stuart H. M. Butchart; Ben Collen; Michael K. Schwartz; Robin S. Waples

    2012-01-01

    Conservation biology research exhibits a striking but unhelpful dichotomy. Analyses of species decline, extinction risk, and threat mitigation typically encompass broad taxonomic and spatial scales. By contrast, most studies of recovery lack generality, pertaining to specific species, populations, or locales. Narrowly focused analyses offer a weak empirical basis for...

  1. Biological and Chemical Impact to Educational Facilities.

    ERIC Educational Resources Information Center

    Manicone, Santo

    2002-01-01

    Discusses preparing an educational facility to address the threat of biological or chemical terrorism, including understanding the potential impact, implementing information and communication systems, and improving medical surveillance and awareness. (EV)

  2. Analysis And Validation of the Field Coupled Through an Aperture in an Avionics Enclosure

    NASA Astrophysics Data System (ADS)

    Bakore, Rahul

    This work focused on accurately predicting the current response of an equipment under test (EUT) to a random electromagnetic field representing a threat source to model radio frequency directed energy weapons (RFDEWs). The modeled EUT consists of a single wire attached to the interior wall of a shielding enclosure that includes an aperture on one face. An in-house computational electromagnetic (CEM) code based on method of moments (MOM) and accelerated by the multi-level fast multipole algorithm (MLFMA), was enhanced through the implementation of first order vector basis functions that approximates the EUT surface current. The electric field integral equation (EFIE) is solved using MOM/MLFMA. Use of first-order basis functions gives a large savings in computational time over the previous implementation with zero-order Rao-Wilton-Glisson basis functions. A sample EUT was fabricated and tested within an anechoic chamber and a reverberation chamber over a wide frequency band. In the anechoic chamber measurements, the current response on the wire within the EUT due to a single uniform plane wave was found and compared with the numerical simulations. In the reverberation chamber measurements, the mean current magnitude excited on the wire within the EUT by a mechanically stirred random field was measured and compared with the numerical simulations. The measured scattering parameter between the source antenna and the EUT measurement port was used to derive the current response on the wire in both chambers. The numerically simulated currents agree very well with the measurements in both the anechoic and reverberation chambers over the measured frequency band, confirming the validity of the numerical approach for calculating EUT response due to a random field. An artificial neural network (ANN) was trained that can rapidly provide the mean induced current response of an EUT due to a random field under different aperture configurations arbitrarily placed on one face of an EUT. However, ANN proved no better than simple linear interpolation in approximating the induced currents on EUTs that give strong resonances and nulls in the response.

  3. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    PubMed

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil biota. Copyright © 2015 The Authors. Published by Elsevier B.V. All rights reserved.

  4. Providing security assurance in line with national DBT assumptions

    NASA Astrophysics Data System (ADS)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the field of physical and cyber protection. These national regulations have to be met later on by I&C platform suppliers, electrical systems suppliers, system integrators and turn-key providers.

  5. A Best Practices Model for Implementing Successful Electronic Disease Surveillance Systems: Insights from Peru and Around the Globe

    DTIC Science & Technology

    2013-06-03

    associated Program design: Kenya . and written project with improved I) Generic model should be adaptable documentation. diagnosis or treatment. to local...potential for and threats to development through an unsustainable and 3) Gaps in evaluation in area of building sustainable to performance -based...implementation in developing countries by building a framework that will identify key elements in this process and serve as guidance to implementers. This study

  6. Exploring Crisis Management in U.S. Small Businesses

    NASA Astrophysics Data System (ADS)

    Williams, Jon

    As a critical infrastructure, the US electricity grid supplies electricity to 340 million people within eight separate regions. The power infrastructure is vulnerable to many types of disasters capable of severing supplies of electricity. The impact on the employees and communities when small- and medium-size enterprises are shut down due to disasters can be severe. The purpose of the quantitative comparative study was to explore small- and medium-size enterprises crisis management strategies in the case of power infrastructure vulnerabilities. Perceptions of small business leaders were probed about crisis management planning relevant to three secondary factors: prior experience of crises, threat perceptions, and planning self-efficacy. Participants completed an adapted questionnaire instrument based on a five-point Likert scale for six sub-factors including resilience through planning, financial impact, operational crisis management, the perfect storm, the aftermath of survival, and atrophy. The instrument also measured three additional factors to include, prior experience of crises, threat perceptions, and planning self-efficacy, across seven types of crises. The results of this study indicated that of the 276 respondents, 104 had no crisis plans, but 172 did have crisis plans. Of those who had implemented crisis plans, 19% had specific provisions to address power outages or attacks on the electrical grid. Of the respondents who had not planned for power outages nor experienced significant losses of power, a statistically significant number acknowledged an external threat to their business. The majority of respondents indicated that long-term planning was related to resilience; however, the migration of crisis understanding into the planning process or implementation was not implemented. This heightened awareness of potential crises without the corresponding development and implementation of mitigation crisis plans requires additional research to understand drivers effecting the decision making process with crisis managers.

  7. 75 FR 70888 - Finding of Substantial Inadequacy of Implementation Plan; Call for Utah State Implementation Plan...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-19

    ... FGD Systems During Downtime as a Function of PSD,'' from Edward E. Reich to G.T. Helms and January 28... in the index, some information is not publicly available, e.g., CBI or other information whose... alternatives. g. Explain your views as clearly as possible, avoiding the use of profanity or personal threats...

  8. The cognitive architecture of anxiety-like behavioral inhibition.

    PubMed

    Bach, Dominik R

    2017-01-01

    The combination of reward and potential threat is termed approach/avoidance conflict and elicits specific behaviors, including passive avoidance and behavioral inhibition (BI). Anxiety-relieving drugs reduce these behaviors, and a rich psychological literature has addressed how personality traits dominated by BI predispose for anxiety disorders. Yet, a formal understanding of the cognitive inference and planning processes underlying anxiety-like BI is lacking. Here, we present and empirically test such formalization in the terminology of reinforcement learning. We capitalize on a human computer game in which participants collect sequentially appearing monetary tokens while under threat of virtual "predation." First, we demonstrate that humans modulate BI according to experienced consequences. This suggests an instrumental implementation of BI generation rather than a Pavlovian mechanism that is agnostic about action outcomes. Second, an internal model that would make BI adaptive is expressed in an independent task that involves no threat. The existence of such internal model is a necessary condition to conclude that BI is under model-based control. These findings relate a plethora of human and nonhuman observations on BI to reinforcement learning theory, and crucially constrain the quest for its neural implementation. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  9. Resilience of Cyber Systems with Over- and Underregulation.

    PubMed

    Gisladottir, Viktoria; Ganin, Alexander A; Keisler, Jeffrey M; Kepner, Jeremy; Linkov, Igor

    2017-09-01

    Recent cyber attacks provide evidence of increased threats to our critical systems and infrastructure. A common reaction to a new threat is to harden the system by adding new rules and regulations. As federal and state governments request new procedures to follow, each of their organizations implements their own cyber defense strategies. This unintentionally increases time and effort that employees spend on training and policy implementation and decreases the time and latitude to perform critical job functions, thus raising overall levels of stress. People's performance under stress, coupled with an overabundance of information, results in even more vulnerabilities for adversaries to exploit. In this article, we embed a simple regulatory model that accounts for cybersecurity human factors and an organization's regulatory environment in a model of a corporate cyber network under attack. The resulting model demonstrates the effect of under- and overregulation on an organization's resilience with respect to insider threats. Currently, there is a tendency to use ad-hoc approaches to account for human factors rather than to incorporate them into cyber resilience modeling. It is clear that using a systematic approach utilizing behavioral science, which already exists in cyber resilience assessment, would provide a more holistic view for decisionmakers. © 2016 Society for Risk Analysis.

  10. Reduced Order Model Basis Vector Generation: Generates Basis Vectors fro ROMs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arrighi, Bill

    2016-03-03

    libROM is a library that implements order reduction via singular value decomposition (SVD) of sampled state vectors. It implements 2 parallel, incremental SVD algorithms and one serial, non-incremental algorithm. It also provides a mechanism for adaptive sampling of basis vectors.

  11. Between-country collaboration and consideration of costs increase conservation planning efficiency in the Mediterranean Basin.

    PubMed

    Kark, Salit; Levin, Noam; Grantham, Hedley S; Possingham, Hugh P

    2009-09-08

    The importance of global and regional coordination in conservation is growing, although currently, the majority of conservation programs are applied at national and subnational scales. Nevertheless, multinational programs incur transaction costs and resources beyond what is required in national programs. Given the need to maximize returns on investment within limited conservation budgets, it is crucial to quantify how much more biodiversity can be protected by coordinating multinational conservation efforts when resources are fungible. Previous studies that compared different scales of conservation decision-making mostly ignored spatial variability in biodiversity threats and the cost of actions. Here, we developed a simple integrating metric, taking into account both the cost of conservation and threats to biodiversity. We examined the Mediterranean Basin biodiversity hotspot, which encompasses over 20 countries. We discovered that for vertebrates to achieve similar conservation benefits, one would need substantially more money and area if each country were to act independently as compared to fully coordinated action across the Basin. A fully coordinated conservation plan is expected to save approximately US$67 billion, 45% of total cost, compared with the uncoordinated plan; and if implemented over a 10-year period, the plan would cost approximately 0.1% of the gross national income of all European Union (EU) countries annually. The initiative declared in the recent Paris Summit for the Mediterranean provides a political basis for such complex coordination. Surprisingly, because many conservation priority areas selected are located in EU countries, a partly coordinated solution incorporating only EU-Mediterranean countries is almost as efficient as the fully coordinated scenario.

  12. Between-country collaboration and consideration of costs increase conservation planning efficiency in the Mediterranean Basin

    PubMed Central

    Kark, Salit; Levin, Noam; Grantham, Hedley S.; Possingham, Hugh P.

    2009-01-01

    The importance of global and regional coordination in conservation is growing, although currently, the majority of conservation programs are applied at national and subnational scales. Nevertheless, multinational programs incur transaction costs and resources beyond what is required in national programs. Given the need to maximize returns on investment within limited conservation budgets, it is crucial to quantify how much more biodiversity can be protected by coordinating multinational conservation efforts when resources are fungible. Previous studies that compared different scales of conservation decision-making mostly ignored spatial variability in biodiversity threats and the cost of actions. Here, we developed a simple integrating metric, taking into account both the cost of conservation and threats to biodiversity. We examined the Mediterranean Basin biodiversity hotspot, which encompasses over 20 countries. We discovered that for vertebrates to achieve similar conservation benefits, one would need substantially more money and area if each country were to act independently as compared to fully coordinated action across the Basin. A fully coordinated conservation plan is expected to save approximately US$67 billion, 45% of total cost, compared with the uncoordinated plan; and if implemented over a 10-year period, the plan would cost ≈0.1% of the gross national income of all European Union (EU) countries annually. The initiative declared in the recent Paris Summit for the Mediterranean provides a political basis for such complex coordination. Surprisingly, because many conservation priority areas selected are located in EU countries, a partly coordinated solution incorporating only EU-Mediterranean countries is almost as efficient as the fully coordinated scenario. PMID:19717457

  13. CDC Vital Signs: Making Health Care Safer

    MedlinePlus

    ... safety efforts happening across the state. Health care facility CEOs/administrators can: Implement systems to alert receiving ... Germs spread between patients and across health care facilities. Antibiotic resistance is a threat. Nightmare germs called ...

  14. Investigations of Selected Historically Important Syndromic Outbreaks: Impact and Lessons Learned for Public Health Preparedness and Response

    PubMed Central

    Posid, Joseph M.; Popovic, Tanja

    2012-01-01

    Public health readiness has increased at all jurisdictional levels because of increased sensitivity to threats. Since 2001, with billions of dollars invested to bolster the public health system’s capacity, the public expects that public health will identify the etiology of and respond to events more rapidly. However, when etiologies are unknown at the onset of the investigation but interventions must be implemented, public health practitioners must benefit from past investigations’ lessons to strengthen preparedness for emerging threats. We have identified such potentially actionable lessons learned from historically important public health events that occurred primarily as syndromes for which the etiological agent initially was unknown. Ongoing analysis of investigations can advance our capability to recognize and investigate syndromes and other problems and implement the most appropriate interventions. PMID:22571706

  15. Anxiety promotes memory for mood-congruent faces but does not alter loss aversion

    PubMed Central

    Charpentier, Caroline J.; Hindocha, Chandni; Roiser, Jonathan P.; Robinson, Oliver J.

    2016-01-01

    Pathological anxiety is associated with disrupted cognitive processing, including working memory and decision-making. In healthy individuals, experimentally-induced state anxiety or high trait anxiety often results in the deployment of adaptive harm-avoidant behaviours. However, how these processes affect cognition is largely unknown. To investigate this question, we implemented a translational within-subjects anxiety induction, threat of shock, in healthy participants reporting a wide range of trait anxiety scores. Participants completed a gambling task, embedded within an emotional working memory task, with some blocks under unpredictable threat and others safe from shock. Relative to the safe condition, threat of shock improved recall of threat-congruent (fearful) face location, especially in highly trait anxious participants. This suggests that threat boosts working memory for mood-congruent stimuli in vulnerable individuals, mirroring memory biases in clinical anxiety. By contrast, Bayesian analysis indicated that gambling decisions were better explained by models that did not include threat or treat anxiety, suggesting that: (i) higher-level executive functions are robust to these anxiety manipulations; and (ii) decreased risk-taking may be specific to pathological anxiety. These findings provide insight into the complex interactions between trait anxiety, acute state anxiety and cognition, and may help understand the cognitive mechanisms underlying adaptive anxiety. PMID:27098489

  16. Anxiety promotes memory for mood-congruent faces but does not alter loss aversion.

    PubMed

    Charpentier, Caroline J; Hindocha, Chandni; Roiser, Jonathan P; Robinson, Oliver J

    2016-04-21

    Pathological anxiety is associated with disrupted cognitive processing, including working memory and decision-making. In healthy individuals, experimentally-induced state anxiety or high trait anxiety often results in the deployment of adaptive harm-avoidant behaviours. However, how these processes affect cognition is largely unknown. To investigate this question, we implemented a translational within-subjects anxiety induction, threat of shock, in healthy participants reporting a wide range of trait anxiety scores. Participants completed a gambling task, embedded within an emotional working memory task, with some blocks under unpredictable threat and others safe from shock. Relative to the safe condition, threat of shock improved recall of threat-congruent (fearful) face location, especially in highly trait anxious participants. This suggests that threat boosts working memory for mood-congruent stimuli in vulnerable individuals, mirroring memory biases in clinical anxiety. By contrast, Bayesian analysis indicated that gambling decisions were better explained by models that did not include threat or treat anxiety, suggesting that: (i) higher-level executive functions are robust to these anxiety manipulations; and (ii) decreased risk-taking may be specific to pathological anxiety. These findings provide insight into the complex interactions between trait anxiety, acute state anxiety and cognition, and may help understand the cognitive mechanisms underlying adaptive anxiety.

  17. One health security: an important component of the global health security agenda.

    PubMed

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  18. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  19. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    PubMed

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. The Pay-for-Performance Dilemma.

    ERIC Educational Resources Information Center

    Meyer, Herbert H.

    1975-01-01

    The basis for most problems with merit pay plans is that the great majority of employees believe their own job performance is above average. Even a well-administered merit pay plan cannot give positive feedback to this majority. The likely consequence is that the employee's self-esteem is threatened. Often one copes with such a threat by demeaning…

  1. Cooperative Conflict Management as a Basis for Training Students in China

    ERIC Educational Resources Information Center

    Tjosvold, Dean; Fang, Sofia Su

    2004-01-01

    Chinese educators recognize that for their students to take advantage of new opportunities, as well as handle emerging threats in their rapidly changing society, they must learn to manage many conflicts. But Chinese collectivism and valuing harmony may seem to make Western approaches to conflict resolution culturally inappropriate. This article…

  2. Effect of sample preparation on the discrimination of bacterial isolates cultured in liquid nutrient media using laser induced breakdown spectroscopy

    USDA-ARS?s Scientific Manuscript database

    Laser induced breakdown spectroscopy (LIBS) is used as the basis for discrimination between 2 genera of gram-negative bacteria and 2 genera of gram-positive bacteria representing pathogenic threats commonly found in poultry processing rinse waters. Because LIBS-based discrimination relies primarily ...

  3. The Role of International Law: Formulating International Legal Instruments and Creating International Institutions.

    ERIC Educational Resources Information Center

    Szasz, Paul C.

    1991-01-01

    Using as a basis the threat of climatic change resulting from global warming, this article considers the functions that might be assigned to an international regime. For each function individually and collectively, the instruments and institutions that would be required for the various processes are examined. (SLD)

  4. SWOT analysis in Sina Trauma and Surgery Research Center.

    PubMed

    Salamati, Payman; ashraf Eghbali, Ali; Zarghampour, Manijeh

    2014-01-01

    The present study was conducted with the aim of identifying and evaluating the internal and external factors, affecting the Sina Trauma and Surgery Research Center, affiliated to Tehran University of Medical Sciences and propose some of related strategies to senior managers. We used a combined quantitative and qualitative methodology. Our study population consisted of personnel (18 individuals) at Sina Trauma and Surgery Research Center. Data-collection tools were the group discussions and the questionnaires. Data were analyzed with descriptive statistics and SWOT (Strength, Weakness, Opportunities and Threats) analysis. 18 individuals participated in sessions, consisting of 8 women (44.4%) and 10 men (55.6%). The final scores were 2.45 for internal factors (strength-weakness) and 2.17 for external factors (opportunities-threats). In this study, we proposed 36 strategies (10 weakness-threat strategies, 10 weakness-opportunity strategies, 7 strength-threat strategies, and 9 strength-opportunity strategies). The current status of Sina Trauma and Surgery Research Center is threatened weak. We recommend the center to implement the proposed strategies.

  5. System for ranking relative threats of U.S. volcanoes

    USGS Publications Warehouse

    Ewert, J.W.

    2007-01-01

    A methodology to systematically rank volcanic threat was developed as the basis for prioritizing volcanoes for long-term hazards evaluations, monitoring, and mitigation activities. A ranking of 169 volcanoes in the United States and the Commonwealth of the Northern Mariana Islands (U.S. volcanoes) is presented based on scores assigned for various hazard and exposure factors. Fifteen factors define the hazard: Volcano type, maximum known eruptive explosivity, magnitude of recent explosivity within the past 500 and 5,000 years, average eruption-recurrence interval, presence or potential for a suite of hazardous phenomena (pyroclastic flows, lahars, lava flows, tsunami, flank collapse, hydrothermal explosion, primary lahar), and deformation, seismic, or degassing unrest. Nine factors define exposure: a measure of ground-based human population in hazard zones, past fatalities and evacuations, a measure of airport exposure, a measure of human population on aircraft, the presence of power, transportation, and developed infrastructure, and whether or not the volcano forms a significant part of a populated island. The hazard score and exposure score for each volcano are multiplied to give its overall threat score. Once scored, the ordered list of volcanoes is divided into five overall threat categories from very high to very low. ?? 2007 ASCE.

  6. Societal threat, authoritarianism, conservatism, and U.S. state death penalty sentencing (1977-2004).

    PubMed

    McCann, Stewart J H

    2008-05-01

    On the basis of K. Stenner's (2005) authoritarian dynamic theory, it was hypothesized that the number of death sentences and executions would be higher in more threatened conservative states than in less threatened conservative states, and would be lower in more threatened liberal states than in less threatened liberal states. Threat was based on state homicide rate, violent crime rate, and non-White percentage of population. Conservatism was based on state voter ideological identification, Democratic and Republican Party elite liberalism-conservatism, policy liberalism-conservatism, religious fundamentalism, degree of economic freedom, and 2004 presidential election results. For 1977-2004, with controls for state population and years with a death penalty provision, the interactive hypothesis received consistent support using the state conservatism composite and voter ideological identification alone. As well, state conservatism was related to death penalties and executions, but state threat was not. The temporal stability of the findings was demonstrated with a split-half internal replication using the periods 1977-1990 and 1991-2004. The interactive hypothesis and the results also are discussed in the context of other threat-authoritarianism theories and terror management theory. (c) 2008 APA, all rights reserved

  7. 31 CFR 561.803 - Consultations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Consultations. In implementing sections 104 and 104A of the Comprehensive Iran Sanctions, Accountability, and Divestment Act of 2010 (Pub. L. 111-195) (22 U.S.C. 8501-8551), as amended by the Iran Threat Reduction and...

  8. 31 CFR 561.803 - Consultations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Consultations. In implementing sections 104 and 104A of the Comprehensive Iran Sanctions, Accountability, and Divestment Act of 2010 (Pub. L. 111-195) (22 U.S.C. 8501-8551), as amended by the Iran Threat Reduction and...

  9. Aviation Security: A Case for Risk-Based Passenger Screening

    DTIC Science & Technology

    2011-12-01

    5 3. Threat Uncertainty ..............................................................................7 4. Increased Risk and Cost ...Airport Checkpoints .....................................131 ix 2. Technology Integration and Implementation Costs .....................131 3...Background Investigations and Sustaining Program Costs ........133 D. AREAS FOR FUTURE RESEARCH

  10. Implementation Guideline for Maintenance Line Operations Safety Assessment (M-LOSA) and Ramp LOSA (R-LOSA) Programs

    DTIC Science & Technology

    2012-08-01

    additional threats and errors in the corresponding form. Make sure your handwriting is legible. Keep a n ope n mind, eve n if you feel pe ople are doing...observation form. Write on additional threats and errors. Make sure your handwriting is legible. On a piece of bla nk pa per, you m ay want to m...to see a briefing report on this round of LOSA in a month. The report does not contain any identifiable information. In fact, it does not say

  11. Implementation of the Forest Service Open Space Conservation Strategy in Washington State: Exploring the Role of the National Forest System

    Treesearch

    Richard J. Pringle; Lee K. Cerveny; Gordon A. Bradley

    2015-01-01

    The loss of open space was declared one of the “four threats to the health of our nation’s forests” by former USDA Forest Service Chief Dale Bosworth in 2004. Since then, the agencywide Open Space Conservation Strategy (OSCS) was released and the “four threats” were incorporated into the agency’s National Strategic Plan. These actions indicate that the OSCS is in the...

  12. [Biological research and security institutes].

    PubMed

    Darsie, G; Falczuk, A J; Bergmann, I E

    2006-04-01

    The threat of using biological material for ago-bioterrorist ends has risen in recent years, which means that research and diagnostic laboratories, biological agent banks and other institutions authorised to carry out scientific activities have had to implement biosafety and biosecurity measures to counter the threat, while carrying out activities to help prevent and monitor the accidental or intentional introduction of exotic animal diseases. This article briefly sets outthe basic components of biosafety and biosecurity, as well as recommendations on organisational strategies to consider in laboratories that support agro-bioterrorist surveillance and prevention programs.

  13. Does stereotype threat affect women in academic medicine?

    PubMed

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  14. Does Stereotype Threat Affect Women in Academic Medicine?

    PubMed Central

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  15. Three tenets for secure cyber-physical system design and assessment

    NASA Astrophysics Data System (ADS)

    Hughes, Jeff; Cybenko, George

    2014-06-01

    This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.

  16. Monkey pulvinar neurons fire differentially to snake postures.

    PubMed

    Le, Quan Van; Isbell, Lynne A; Matsumoto, Jumpei; Le, Van Quang; Hori, Etsuro; Tran, Anh Hai; Maior, Rafael S; Tomaz, Carlos; Ono, Taketoshi; Nishijo, Hisao

    2014-01-01

    There is growing evidence from both behavioral and neurophysiological approaches that primates are able to rapidly discriminate visually between snakes and innocuous stimuli. Recent behavioral evidence suggests that primates are also able to discriminate the level of threat posed by snakes, by responding more intensely to a snake model poised to strike than to snake models in coiled or sinusoidal postures (Etting and Isbell 2014). In the present study, we examine the potential for an underlying neurological basis for this ability. Previous research indicated that the pulvinar is highly sensitive to snake images. We thus recorded pulvinar neurons in Japanese macaques (Macaca fuscata) while they viewed photos of snakes in striking and non-striking postures in a delayed non-matching to sample (DNMS) task. Of 821 neurons recorded, 78 visually responsive neurons were tested with the all snake images. We found that pulvinar neurons in the medial and dorsolateral pulvinar responded more strongly to snakes in threat displays poised to strike than snakes in non-threat-displaying postures with no significant difference in response latencies. A multidimensional scaling analysis of the 78 visually responsive neurons indicated that threat-displaying and non-threat-displaying snakes were separated into two different clusters in the first epoch of 50 ms after stimulus onset, suggesting bottom-up visual information processing. These results indicate that pulvinar neurons in primates discriminate between poised to strike from those in non-threat-displaying postures. This neuronal ability likely facilitates behavioral discrimination and has clear adaptive value. Our results are thus consistent with the Snake Detection Theory, which posits that snakes were instrumental in the evolution of primate visual systems.

  17. News Portrayal of Cancer: Content Analysis of Threat and Efficacy by Cancer Type and Comparison with Incidence and Mortality in Korea.

    PubMed

    Shim, Minsun; Kim, Yong-Chan; Kye, Su Yeon; Park, Keeho

    2016-08-01

    How the news media cover cancer may have profound significance for cancer prevention and control; however, little is known about the actual content of cancer news coverage in Korea. This research thus aimed to examine news portrayal of specific cancer types with respect to threat and efficacy, and to investigate whether news portrayal corresponds to actual cancer statistics. A content analysis of 1,138 cancer news stories was conducted, using a representative sample from 23 news outlets (television, newspapers, and other news media) in Korea over a 5-year period from 2008 to 2012. Cancer incidence and mortality rates were obtained from the Korean Statistical Information Service. Results suggest that threat was most prominent in news stories on pancreatic cancer (with 87% of the articles containing threat information with specific details), followed by liver (80%) and lung cancers (70%), and least in stomach cancer (41%). Efficacy information with details was conveyed most often in articles on colorectal (54%), skin (54%), and liver (50%) cancers, and least in thyroid cancer (17%). In terms of discrepancies between news portrayal and actual statistics, the threat of pancreatic and liver cancers was overreported, whereas the threat of stomach and prostate cancers was underreported. Efficacy information regarding cervical and colorectal cancers was overrepresented in the news relative to cancer statistics; efficacy of lung and thyroid cancers was underreported. Findings provide important implications for medical professionals to understand news information about particular cancers as a basis for public (mis)perception, and to communicate effectively about cancer risk with the public and patients.

  18. News Portrayal of Cancer: Content Analysis of Threat and Efficacy by Cancer Type and Comparison with Incidence and Mortality in Korea

    PubMed Central

    2016-01-01

    How the news media cover cancer may have profound significance for cancer prevention and control; however, little is known about the actual content of cancer news coverage in Korea. This research thus aimed to examine news portrayal of specific cancer types with respect to threat and efficacy, and to investigate whether news portrayal corresponds to actual cancer statistics. A content analysis of 1,138 cancer news stories was conducted, using a representative sample from 23 news outlets (television, newspapers, and other news media) in Korea over a 5-year period from 2008 to 2012. Cancer incidence and mortality rates were obtained from the Korean Statistical Information Service. Results suggest that threat was most prominent in news stories on pancreatic cancer (with 87% of the articles containing threat information with specific details), followed by liver (80%) and lung cancers (70%), and least in stomach cancer (41%). Efficacy information with details was conveyed most often in articles on colorectal (54%), skin (54%), and liver (50%) cancers, and least in thyroid cancer (17%). In terms of discrepancies between news portrayal and actual statistics, the threat of pancreatic and liver cancers was overreported, whereas the threat of stomach and prostate cancers was underreported. Efficacy information regarding cervical and colorectal cancers was overrepresented in the news relative to cancer statistics; efficacy of lung and thyroid cancers was underreported. Findings provide important implications for medical professionals to understand news information about particular cancers as a basis for public (mis)perception, and to communicate effectively about cancer risk with the public and patients. PMID:27478333

  19. The need to rationalize and prioritize threatening processes used to determine threat status in the IUCN Red List.

    PubMed

    Hayward, Matt W

    2009-12-01

    Thorough evaluation has made the International Union for Conservation of Nature (IUCN) Red List the most widely used and accepted authority on the conservation status of biodiversity. Although the system used to determine risk of extinction is rigorously and objectively applied, the list of threatening processes affecting a species is far more subjectively determined and has not had adequate review. I reviewed the threats listed in the IUCN Red List for randomly selected groups within the three most threatened orders of mammals: Artiodactyla, Carnivora, and Primates. These groups are taxonomically related and often ecologically similar, so I expected they would suffer relatively similar threats. Hominoid primates and all other terrestrial fauna faced similar threats, except for bovine artiodactyls and large, predatory carnivores, which faced significantly different threats. Although the status of bovines and hominoids and the number of threats affecting them were correlated, this was not the case for large carnivores. Most notable, however, was the great variation in the threats affecting individual members of each group. For example, the endangered European bison (Bison bonasus) has no threatening processes listed for it, and the lion (Panthera leo) is the only large predator listed as threatened with extinction by civil war. Some threatening processes appear spurious for the conservation of the species, whereas other seemingly important factors are not recorded as threats. The subjective nature of listing threatening processes, via expert opinion, results in substantial biases that may be allayed by independent peer review, use of technical manuals, consensus among multiple assessors, incorporation of probability modeling via decision-tree analysis, and adequate coordination among evaluators. The primary focus should be on species-level threats rather than population-level threats because the IUCN Red List is a global assessment and smaller-scale threats are more appropriate for national status assessments. Until conservationists agree on the threats affecting species and their relative importance, conservation action and success will be hampered by scattering scarce resources too widely and often by implementing conflicting strategies.

  20. Intention Modulates the Effect of Punishment Threat in Norm Enforcement via the Lateral Orbitofrontal Cortex.

    PubMed

    Zhang, Yuan; Yu, Hongbo; Yin, Yunlu; Zhou, Xiaolin

    2016-08-31

    Although economic theories suggest that punishment threat is crucial for maintaining social norms, counterexamples are noted in which punishment threat hinders norm compliance. Such discrepancy may arise from the intention behind the threat: unintentionally introduced punishment threat facilitates, whereas intentionally introduced punishment threat hinders, norm compliance. Here, we combined a dictator game and fMRI to investigate how intention modulates the effect of punishment threat on norm compliance and the neural substrates of this modulation. We also investigated whether this modulation can be influenced by brain stimulation. Human participants divided an amount of money between themselves and a partner. The partner (intentionally) or a computer program (unintentionally) decided to retain or waive the right to punish the participant upon selfish distribution. Compared with the unintentional condition, participants allocated more when the partner intentionally waived the power of punishment, but less when the partner retained such power. The right lateral orbitofrontal cortex (rLOFC) showed higher activation when the partner waived compared with when the computer waived or when the partner retained the power. The functional connectivity between the rLOFC and the brain network associated with intention/mentalizing processing was predictive of the allocation difference induced by intention. Moreover, inhibition or activation of the rLOFC by brain stimulation decreased or increased, respectively, the participants' reliance on the partner's intention during monetary allocation. These findings demonstrate that the perceived intention of punishment threat plays a crucial role in norm compliance and that the LOFC is casually involved in the implementation of intention-based cooperative decisions. Does punishment threat facilitate or hinder norm enforcement? So far, cognitive neuroscience research offers equivocal evidence. By directly manipulating the intention behind punishment threat, we demonstrate that intention modulates the effectiveness of punishment threat. Moreover, we show that inhibition or activation of the right lateral orbitofrontal cortex (rLOFC) decreased or increased the effect of punishment threat in the intentional context, but not in the unintentional context, suggesting the casual involvement of the rLOFC in intention-based cooperative decisions. Copyright © 2016 the authors 0270-6474/16/369217-10$15.00/0.

  1. 75 FR 67585 - Continuation of the National Emergency With Respect to Sudan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-02

    ... President determined that the conflict in Sudan's Darfur region posed an unusual and extraordinary threat to... respect to the national emergency and to implement the Darfur Peace and Accountability Act of 2006 (Public...

  2. 77 FR 66357 - Continuation of the National Emergency With Respect to Sudan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-02

    ... in Sudan's Darfur region posed an unusual and extraordinary threat to the national security and... emergency and to implement the Darfur Peace and Accountability Act of 2006 (Public Law 109-344). Because the...

  3. 3 CFR - Continuation of the National Emergency With Respect to Sudan

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... in Sudan's Darfur region posed an unusual and extraordinary threat to the national security and... emergency and to implement the Darfur Peace and Accountability Act of 2006 (Public Law 109-344). Because the...

  4. 78 FR 65865 - Continuation of the National Emergency With Respect to Sudan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-01

    ... in Sudan's Darfur region posed an unusual and extraordinary threat to the national security and... emergency and to implement the Darfur Peace and Accountability Act of 2006 (Public Law 109-344). Because the...

  5. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Officer must brief all vessel personnel of identified threats, emphasize reporting procedures, and stress... limited to: (1) Arrangements to ensure that the vessel can be towed or moved if deemed necessary by the...

  6. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Officer must brief all vessel personnel of identified threats, emphasize reporting procedures, and stress... limited to: (1) Arrangements to ensure that the vessel can be towed or moved if deemed necessary by the...

  7. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Officer must brief all vessel personnel of identified threats, emphasize reporting procedures, and stress... limited to: (1) Arrangements to ensure that the vessel can be towed or moved if deemed necessary by the...

  8. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Officer must brief all vessel personnel of identified threats, emphasize reporting procedures, and stress... limited to: (1) Arrangements to ensure that the vessel can be towed or moved if deemed necessary by the...

  9. 33 CFR 105.230 - Maritime Security (MARSEC) Level coordination and implementation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... part for the MARSEC Level in effect for the port. (b) When notified of an increase in the MARSEC Level... personnel about identified threats, and emphasize reporting procedures and stress the need for increased...

  10. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... MARSEC Level in effect for the port or the OCS facility. (b) When notified of an increase in the MARSEC... Officer must brief all vessel personnel of identified threats, emphasize reporting procedures, and stress...

  11. Resilient Control Systems Practical Metrics Basis for Defining Mission Impact

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig G. Rieger

    "Resilience” describes how systems operate at an acceptable level of normalcy despite disturbances or threats. In this paper we first consider the cognitive, cyber-physical interdependencies inherent in critical infrastructure systems and how resilience differs from reliability to mitigate these risks. Terminology and metrics basis are provided to integrate the cognitive, cyber-physical aspects that should be considered when defining solutions for resilience. A practical approach is taken to roll this metrics basis up to system integrity and business case metrics that establish “proper operation” and “impact.” A notional chemical processing plant is the use case for demonstrating how the system integritymore » metrics can be applied to establish performance, and« less

  12. Specialized Police-Based Mental Health Crisis Response: The First 10 Years of Colorado's Crisis Intervention Team Implementation.

    PubMed

    Khalsa, Hari-Mandir K; Denes, Attila C; M Pasini-Hill, Diane; Santelli, Jeffrey C; Baldessarini, Ross J

    2018-02-01

    This study examined the implementation of crisis intervention teams by law enforcement agencies in Colorado. Rates of Special Weapons and Tactics (SWAT) use, arrests, use of force, and injuries were assessed during 6,353 incidents involving individuals experiencing a mental health crisis. Relationships among original complaint, psychiatric illness, substance abuse, violence risk, and disposition of crisis calls were analyzed. Rates of SWAT use (<1%), injuries (<1%), arrests (<5%), and use of force (<5%) were low. The relative risk of transfer to treatment (versus no transfer) was significantly higher for incidents involving psychiatric illness, suicide threat or attempt, weapons, substance abuse, and violence potential. Use of force or SWAT, arrests, and injuries were infrequent. Suicide risk, psychiatric illness and substance abuse, even in the presence of a weapon or violence threat, increased the odds of transfer to treatment, whereas suicide risk lowered the odds of transfer to jail.

  13. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education.

    PubMed

    Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K

    2013-08-09

    Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.

  14. Neural Bases of Social Anxiety Disorder: Emotional Reactivity and Cognitive Regulation During Social and Physical Threat

    PubMed Central

    Goldin, Philippe R.; Manber, Tali; Hakimi, Shabnam; Canli, Turhan; Gross, James J.

    2014-01-01

    Context Social anxiety disorder is thought to involve emotional hyper-reactivity, cognitive distortions, and ineffective emotion regulation. While the neural bases of emotional reactivity to social stimuli have been described, the neural bases of emotional reactivity and cognitive regulation during social and physical threat, and their relationship to social anxiety symptom severity, have yet to be investigated. Objective This study investigated behavioral and neural correlates of emotional reactivity and cognitive regulation in patients and controls during processing of social and physical threat stimuli. Design Participants were trained to implement cognitive-linguistic regulation of emotional reactivity induced by social (harsh facial expressions) and physical (violent scenes) threat while undergoing functional magnetic resonance imaging and providing behavioral ratings of negative emotion experience. Setting Academic psychology department. Participants 15 adults with social anxiety disorder and 17 demographically-matched healthy controls. Main Outcome Measures Blood oxygen level dependent signal and negative emotion ratings. Results Behaviorally, patients reported greater negative emotion than controls during social and physical threat, but showed equivalent reduction in negative emotion following cognitive regulation. Neurally, viewing social threat resulted in greater emotion-related neural responses in patients than controls, with social anxiety symptom severity related to activity in a network of emotion and attention processing regions in patients only. Viewing physical threat produced no between-group differences. Regulation during social threat resulted in greater cognitive and attention regulation-related brain activation in controls compared to patients. Regulation during physical threat produced greater cognitive control-related response (i.e., right DLPFC) in patients compared to controls. Conclusions Compared to controls, patients demonstrated exaggerated negative emotion reactivity and reduced cognitive regulation related neural activation, specifically for social threat stimuli. These findings help to elucidate potential neural mechanisms of emotion regulation that might serve as biomarkers for interventions for social anxiety disorder. PMID:19188539

  15. Toward a Visualization-Supported Workflow for Cyber Alert Management using Threat Models and Human-Centered Design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Franklin, Lyndsey; Pirrung, Megan A.; Blaha, Leslie M.

    Cyber network analysts follow complex processes in their investigations of potential threats to their network. Much research is dedicated to providing automated tool support in the effort to make their tasks more efficient, accurate, and timely. This tool support comes in a variety of implementations from machine learning algorithms that monitor streams of data to visual analytic environments for exploring rich and noisy data sets. Cyber analysts, however, often speak of a need for tools which help them merge the data they already have and help them establish appropriate baselines against which to compare potential anomalies. Furthermore, existing threat modelsmore » that cyber analysts regularly use to structure their investigation are not often leveraged in support tools. We report on our work with cyber analysts to understand they analytic process and how one such model, the MITRE ATT&CK Matrix [32], is used to structure their analytic thinking. We present our efforts to map specific data needed by analysts into the threat model to inform our eventual visualization designs. We examine data mapping for gaps where the threat model is under-supported by either data or tools. We discuss these gaps as potential design spaces for future research efforts. We also discuss the design of a prototype tool that combines machine-learning and visualization components to support cyber analysts working with this threat model.« less

  16. Threat and error management for anesthesiologists: a predictive risk taxonomy

    PubMed Central

    Ruskin, Keith J.; Stiegler, Marjorie P.; Park, Kellie; Guffey, Patrick; Kurup, Viji; Chidester, Thomas

    2015-01-01

    Purpose of review Patient care in the operating room is a dynamic interaction that requires cooperation among team members and reliance upon sophisticated technology. Most human factors research in medicine has been focused on analyzing errors and implementing system-wide changes to prevent them from recurring. We describe a set of techniques that has been used successfully by the aviation industry to analyze errors and adverse events and explain how these techniques can be applied to patient care. Recent findings Threat and error management (TEM) describes adverse events in terms of risks or challenges that are present in an operational environment (threats) and the actions of specific personnel that potentiate or exacerbate those threats (errors). TEM is a technique widely used in aviation, and can be adapted for the use in a medical setting to predict high-risk situations and prevent errors in the perioperative period. A threat taxonomy is a novel way of classifying and predicting the hazards that can occur in the operating room. TEM can be used to identify error-producing situations, analyze adverse events, and design training scenarios. Summary TEM offers a multifaceted strategy for identifying hazards, reducing errors, and training physicians. A threat taxonomy may improve analysis of critical events with subsequent development of specific interventions, and may also serve as a framework for training programs in risk mitigation. PMID:24113268

  17. Moving the Pivot: Asians and American History.

    ERIC Educational Resources Information Center

    Okihiro, Gary Y.

    A new parochialism is present in the United States. The view represents a foreclosure that anchors itself to Europe against a tide of non-European peoples. U.S. Eurocentrists proclaim union on the basis of race to counter the perceived threat of non-whites and to stifle dissenting voices from those who would contest the dominant order. An…

  18. Threat to Knowledge: Research and the Future of Archeology in the National Parks. An Interview with Scholar Archeologist Bill Lipe.

    ERIC Educational Resources Information Center

    Lipe, Bill

    2001-01-01

    Interview examines the competing interests of U.S. national parks, which preserve Native American archaeological sites as the basis of cultural and historical interpretation to the public, and archaeologists, whose research excavations may destroy sites. National Park Service projects that encompass both stewardship and interpretation are…

  19. Insider Threats: DOD Should Improve Information Sharing and Oversight to Protect U.S. Installations

    DTIC Science & Technology

    2015-07-01

    violence toward others in the workplace , DOD closed the recommendation as implemented by issuing a policy on workplace violence prevention and response in...examination of recommendations resulting from the Fort Hood independent review related to workplace violence and focused on the military services...and (3) implemented recommendations from the official reviews of the 2009 Fort Hood and 2013 Washington Navy Yard shootings. GAO reviewed official

  20. Multi-Action Planning for Threat Management: A Novel Approach for the Spatial Prioritization of Conservation Actions

    PubMed Central

    Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J.; Linke, Simon

    2015-01-01

    Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms. PMID:26020794

  1. Multi-action planning for threat management: a novel approach for the spatial prioritization of conservation actions.

    PubMed

    Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J; Linke, Simon

    2015-01-01

    Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms.

  2. External Corrosion Direct Assessment for Unique Threats to Underground Pipelines

    DOT National Transportation Integrated Search

    2007-11-01

    External corrosion direct assessment process (ECDA) implemented in accordance with the NACE Recommended Practice RP0502-02 relies on above ground DA techniques to prioritize locations at risk for corrosion. Two special cases warrant special considera...

  3. Research and management priorities for Hawaiian forest birds

    USGS Publications Warehouse

    Paxton, Eben H.; Laut, Megan; Vetter, John P.; Kendall, Steve J.

    2018-01-01

    Hawai‘i's forest birds face a number of conservation challenges that, if unaddressed, will likely lead to the extinction of multiple species in the coming decades. Threats include habitat loss, invasive plants, non-native predators, and introduced diseases. Climate change is predicted to increase the geographic extent and intensity of these threats, adding urgency to implementation of tractable conservation strategies. We present a set of actionable research and management approaches, identified by conservation practitioners in Hawai'i, that will be critical for the conservation of Hawaiian forest birds in the coming years. We also summarize recent progress on these conservation priorities. The threats facing Hawai‘i's forest birds are not unique to Hawai‘i, and successful conservation strategies developed in Hawai‘i can serve as a model for other imperiled communities around the world, especially on islands.

  4. If-then contingencies and the differential effects of the availability of an attractive alternative on relationship maintenance for men and women.

    PubMed

    Lydon, John E; Menzies-Toman, Danielle; Burton, Kimberly; Bell, Chris

    2008-07-01

    In 7 experiments, the causal effects of the availability of an attractive alternative (AA) relationship partner on current relationship thoughts and intentions were tested using confederates, mental simulations, and virtual reality. Men behaved consistent with traditional relationship-commitment theories, showing decreased willingness to tolerate their partner's transgressions after the availability of an AA was made salient. However, consistent with a motivated cognition approach to commitment and work on relational self-construals, women increased their tolerance when presented with the relationship threat of an alternative. Word-fragment and lexical decision data suggested that AAs may activate threat for women, and their ability to dampen threat accessibility is associated with prorelationship responses. Finally, this "if relationship is threatened, then defend the relationship" contingency was induced in men with an implementation intention induction.

  5. Detecting insider activity using enhanced directory virtualization.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shin, Dongwan; Claycomb, William R.

    2010-07-01

    Insider threats often target authentication and access control systems, which are frequently based on directory services. Detecting these threats is challenging, because malicious users with the technical ability to modify these structures often have sufficient knowledge and expertise to conceal unauthorized activity. The use of directory virtualization to monitor various systems across an enterprise can be a valuable tool for detecting insider activity. The addition of a policy engine to directory virtualization services enhances monitoring capabilities by allowing greater flexibility in analyzing changes for malicious intent. The resulting architecture is a system-based approach, where the relationships and dependencies between datamore » sources and directory services are used to detect an insider threat, rather than simply relying on point solutions. This paper presents such an architecture in detail, including a description of implementation results.« less

  6. Liquids and homemade explosive detection

    NASA Astrophysics Data System (ADS)

    Ellenbogen, Michael; Bijjani, Richard

    2009-05-01

    Excerpt from the US Transportation Security Agency website: "The ban on liquids, aerosols and gels was implemented on August 10 after a terrorist plot was foiled. Since then, experts from around the government, including the FBI and our national labs have analyzed the information we now have and have conducted extensive explosives testing to get a better understanding of this specific threat." In order to lift the ban and ease the burden on the flying public, Reveal began an extensive effort in close collaboration with the US and several other governments to help identify these threats. This effort resulted in the successful development and testing of an automated explosive detection system capable of resolving these threats with a high probability of detection and a low false alarm rate. We will present here some of the methodology and approach we took to address this problem.

  7. Development of a security vulnerability assessment process for the RAMCAP chemical sector.

    PubMed

    Moore, David A; Fuller, Brad; Hazzan, Michael; Jones, J William

    2007-04-11

    The Department of Homeland Security (DHS), Directorate of Information Analysis & Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors: Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing sector. This method was developed through the cooperation of the many organizations and the individuals involved from the chemical sector RAMCAP development activities. The RAMCAP SVA method is intended to provide a common basis for making vulnerability assessments and risk-based decisions for homeland security. Mr. Moore serves as the coordinator for the chemical manufacturing, petroleum refining, and LNG sectors for the RAMCAP project and Dr. Jones is the chief technology officer for ASME-ITI, LLC for RAMCAP.

  8. Vulnerability of eco-environmental health to climate change: the views of government stakeholders and other specialists in Queensland, Australia.

    PubMed

    Strand, Linn B; Tong, Shilu; Aird, Rosemary; McRae, David

    2010-07-28

    There is overwhelming scientific evidence that human activities have changed and will continue to change the climate of the Earth. Eco-environmental health, which refers to the interdependencies between ecological systems and population health and well-being, is likely to be significantly influenced by climate change. The aim of this study was to examine perceptions from government stakeholders and other relevant specialists about the threat of climate change, their capacity to deal with it, and how to develop and implement a framework for assessing vulnerability of eco-environmental health to climate change. Two focus groups were conducted in Brisbane, Australia with representatives from relevant government agencies, non-governmental organisations, and the industry sector (n = 15) involved in the discussions. The participants were specialists on climate change and public health from governmental agencies, industry, and non-governmental organisations in South-East Queensland. The specialists perceived climate change to be a threat to eco-environmental health and had substantial knowledge about possible implications and impacts. A range of different methods for assessing vulnerability were suggested by the participants and the complexity of assessment when dealing with multiple hazards was acknowledged. Identified factors influencing vulnerability were perceived to be of a social, physical and/or economic nature. They included population growth, the ageing population with associated declines in general health and changes in the vulnerability of particular geographical areas due to for example, increased coastal development, and financial stress. Education, inter-sectoral collaboration, emergency management (e.g. development of early warning systems), and social networks were all emphasised as a basis for adapting to climate change. To develop a framework, different approaches were discussed for assessing eco-environmental health vulnerability, including literature reviews to examine the components of vulnerability such as natural hazard risk and exposure and to investigate already existing frameworks for assessing vulnerability. The study has addressed some important questions in regard to government stakeholders and other specialists' views on the threat of climate change and its potential impacts on eco-environmental health. These findings may have implications in climate change and public health decision-making.

  9. Vulnerability of eco-environmental health to climate change: the views of government stakeholders and other specialists in Queensland, Australia

    PubMed Central

    2010-01-01

    Background There is overwhelming scientific evidence that human activities have changed and will continue to change the climate of the Earth. Eco-environmental health, which refers to the interdependencies between ecological systems and population health and well-being, is likely to be significantly influenced by climate change. The aim of this study was to examine perceptions from government stakeholders and other relevant specialists about the threat of climate change, their capacity to deal with it, and how to develop and implement a framework for assessing vulnerability of eco-environmental health to climate change. Methods Two focus groups were conducted in Brisbane, Australia with representatives from relevant government agencies, non-governmental organisations, and the industry sector (n = 15) involved in the discussions. The participants were specialists on climate change and public health from governmental agencies, industry, and non-governmental organisations in South-East Queensland. Results The specialists perceived climate change to be a threat to eco-environmental health and had substantial knowledge about possible implications and impacts. A range of different methods for assessing vulnerability were suggested by the participants and the complexity of assessment when dealing with multiple hazards was acknowledged. Identified factors influencing vulnerability were perceived to be of a social, physical and/or economic nature. They included population growth, the ageing population with associated declines in general health and changes in the vulnerability of particular geographical areas due to for example, increased coastal development, and financial stress. Education, inter-sectoral collaboration, emergency management (e.g. development of early warning systems), and social networks were all emphasised as a basis for adapting to climate change. To develop a framework, different approaches were discussed for assessing eco-environmental health vulnerability, including literature reviews to examine the components of vulnerability such as natural hazard risk and exposure and to investigate already existing frameworks for assessing vulnerability. Conclusion The study has addressed some important questions in regard to government stakeholders and other specialists' views on the threat of climate change and its potential impacts on eco-environmental health. These findings may have implications in climate change and public health decision-making. PMID:20663227

  10. Gender-related biases in evaluations of sex discrimination allegations: is perceived threat the key?

    PubMed

    Elkins, Teri J; Phillips, James S; Konopaske, Robert

    2002-04-01

    Hypotheses derived from defensive attribution theory and social identity theory were tested in 3 laboratory experiments examining the effects of plaintiff and observer gender on perceived threat, plaintiff identification, and sex discrimination. In Study 1, women differentiated plaintiffs on the basis of gender, whereas men did not. Study 2 showed that this bias occurred because employment discrimination was personally threatening to women but not to men. In Study 3, the bias was reversed in a child custody context. As predicted, men found this context to be significantly more threatening than did women and subsequently exhibited a similarity bias. Mediation analyses suggested that responsibility attributions explained most of the variance in discrimination judgments associated with the plaintiff gender by observer gender interactions.

  11. Alternatives to the Randomized Controlled Trial

    PubMed Central

    West, Stephen G.; Duan, Naihua; Pequegnat, Willo; Gaist, Paul; Des Jarlais, Don C.; Holtgrave, David; Szapocznik, José; Fishbein, Martin; Rapkin, Bruce; Clatts, Michael; Mullen, Patricia Dolan

    2008-01-01

    Public health researchers are addressing new research questions (e.g., effects of environmental tobacco smoke, Hurricane Katrina) for which the randomized controlled trial (RCT) may not be a feasible option. Drawing on the potential outcomes framework (Rubin Causal Model) and Campbellian perspectives, we consider alternative research designs that permit relatively strong causal inferences. In randomized encouragement designs, participants are randomly invited to participate in one of the treatment conditions, but are allowed to decide whether to receive treatment. In quantitative assignment designs, treatment is assigned on the basis of a quantitative measure (e.g., need, merit, risk). In observational studies, treatment assignment is unknown and presumed to be nonrandom. Major threats to the validity of each design and statistical strategies for mitigating those threats are presented. PMID:18556609

  12. Role of MODIS Vegetation Phenology Products in the U.S. for Warn Early Warning System for Forest Threats

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph; Hargrove, William; Norman, Steve; Gasser, Gerald; Smoot, James; Kuper, Philip

    2012-01-01

    U.S. forests occupy approx 751 million acres (approx 1/3 of total land). Several abiotic and biotic damage agents disturb, damage, kill, and/or threaten these forests. Regionally extensive forest disturbances can also threaten human life and property, bio-diversity and water supplies. timely regional forest disturbance monitoring products are needed to aid forest health management work at finer scales. daily MODIS data provide a means to monitor regional forest disturbances on a weekly basis, leveraging vegetation phenology. In response, the USFS and NASA began collaborating in 2006 to develop a Near Real Time (NRT) forest monitoring capability, based on MODIS NDVI data, as part of a national forest threat Early Warning System (EWS).

  13. The threat of nuclear war: Some responses

    PubMed Central

    Marcattilio, A. J. M.; Nevin, John A.

    1986-01-01

    The possibility of nuclear holocaust threatens the very existence of the world community. Biologists, earth scientists, educators, lawyers, philosophers, physicists, physicians, and social scientists have addressed the problem from their special perspectives, and have had substantial impact on the public. Behavior analysts, however, have not as a whole contributed a great deal to the goal of preventing nuclear catastrophe. We argue that the threat of nuclear war is primarily a behavioral problem, and present an analysis of that problem. In addition, we address the difficulty of implementing behavioral interventions that would contribute to the survival of the World. PMID:22478648

  14. Factors influencing IUCN threat levels to orchids across Europe on the basis of national red lists.

    PubMed

    Kull, Tiiu; Selgis, Ulvi; Peciña, Miguel Villoslada; Metsare, Mirjam; Ilves, Aigi; Tali, Kadri; Sepp, Kalev; Kull, Kalevi; Shefferson, Richard P

    2016-09-01

    The red list has become a ubiquitous tool in the conservation of species. We analyzed contemporary trends in the threat levels of European orchids, in total 166 species characterized in 27 national red lists, in relation to their reproductive biology and growth form, distribution area, and land cover where they occur. We found that species in central Europe are more threatened than those in the northern, southern, or Atlantic parts of Europe, while species were least threatened in southern Europe. Nectarless and tuberous species are significantly more threatened than nectariferous and rhizomatous taxa. Land cover (ratios of artificial land cover, area of pastures and grasslands, forests and inland wetlands) also significantly impacted the threat level. A bigger share of artificial land cover increases threat, and a bigger share of pasture and grassland lowers it. Unexpectedly, a bigger share of inland wetland area in a country increased threat level, which we believe may be due to the threatened nature of wetlands themselves relative to other natural land cover types. Finally, species occurring in multiple countries are on average less threatened. We believe that large-scale analysis of current IUCN national red lists as based on their specific categories and criteria may particularly inform the development of coordinated regional or larger-scale management strategies. In this case, we advocate for a coordinated EU protection and restoration strategy particularly aimed at central European orchids and those occurring in wetland area.

  15. An investigative analysis of information assurance issues associated with the GIG's P&P architecture

    NASA Astrophysics Data System (ADS)

    Farroha, B. S.; Cole, R. G.; Farroha, D. L.; DeSimone, A.

    2007-04-01

    The Global Information Grid (GIG) is a collection of systems, programs and initiatives aimed at building a secure network and set of information capabilities modeled after the Internet. The GIG is expected to facilitate DoD's transformation by allowing warfighters, policy makers and support personnel to engage in rapid decision making. The roadmap is designed to take advantage of converged services of voice, data, video, and imagery over common data links. The vision is to have commanders identify threats more effectively, make informed decisions, and respond with greater precision and lethality. The information advantage gained through the GIG and network-centric warfare (NCW) allows a warfighting force to achieve dramatically improved information positions, in the form of common operational pictures that provide the basis for shared situational awareness and knowledge, and a resulting increase in combat power. The GIG Precedence and Preemption (P&P) requirements stem from the need to utilize scarce resources at critical times in the most effective way in support of national security, the intelligence community and the war-fighter. Information Assurance (IA) enables all information and data to be available end-to-end to support any mission without delay in accordance to the sensitivity of the task. Together, P&P and IA ensure data availability integrity, authentication, confidentiality, and non-repudiation. This study addresses and analyzes the QoS and P & P requirements and architecture for the GIG. Threat scenarios are presented and used to evaluate the reference architectures. The goal of the study is to assess the Information Assurance concerns associated with implementing Precedence and Preemption within the GIG and to guarantee an acceptable minimum level of security and protection for DoD networks.

  16. The Short-Lived Epidemic of Botulism From Commercially Canned Foods in the United States, 1919 to 1925.

    PubMed

    Kazanjian, Powel

    2018-04-17

    In 1919, three deadly outbreaks of botulism caused by consumption of canned olives packed in California captured national headlines. In all of the outbreaks, which occurred in separate locales, unsuspecting people died after consuming tainted food during a banquet or family meal. The press's sensational portrayal of canned food as hazardous aroused alarm among consumers at a time when commercial canning was becoming more common. Intent on restoring the image of their product as safe and wholesome, canning industry leaders funded a "botulism commission" of scientific experts in 1919 to investigate how to systematically eliminate the threat of botulism that had imperiled their business. The commissioners identified the scientific reasons for the outbreaks, and on the basis of their findings, the California Department of Public Health issued explicit recommendations for sterilization procedures intended to ensure safety. However, the department did not mandate inspections for all canneries. When commercially packed fruits and vegetables continued to cause botulism, industry leaders voluntarily backed a cannery inspection act to legally require all California canners to possess appropriate equipment and follow scientifically validated sterilization procedures. After the California legislature approved the act in 1925, canneries were inspected, regulations were enforced, and no further outbreaks occurred. This botulism epidemic is an example of a disease outbreak that was controlled when business interests became aligned with public health goals. The press's portrayal of afflicted persons as innocent victims and worthy citizens galvanized businessmen to implement safeguards to protect consumers from botulism intoxication. To preserve their customer base and salvage their corporations, leaders of the canning industry acknowledged the public health threat of their unregulated procedures and acted on the recommendations of scientists.

  17. REMOVAL OF LEGACY PLUTONIUM MATERIALS FROM SWEDEN

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dunn, Kerry A.; Bellamy, J. Steve; Chandler, Greg T.

    2013-08-18

    U.S. Department of Energy’s National Nuclear Security Administration (NNSA) Office of Global Threat Reduction (GTRI) recently removed legacy plutonium materials from Sweden in collaboration with AB SVAFO, Sweden. This paper details the activities undertaken through the U.S. receiving site (Savannah River Site (SRS)) to support the characterization, stabilization, packaging and removal of legacy plutonium materials from Sweden in 2012. This effort was undertaken as part of GTRI’s Gap Materials Program and culminated with the successful removal of plutonium from Sweden as announced at the 2012 Nuclear Security Summit. The removal and shipment of plutonium materials to the United States wasmore » the first of its kind under NNSA’s Global Threat Reduction Initiative. The Environmental Assessment for the U.S. receipt of gap plutonium material was approved in May 2010. Since then, the multi-year process yielded many first time accomplishments associated with plutonium packaging and transport activities including the application of the of DOE-STD-3013 stabilization requirements to treat plutonium materials outside the U.S., the development of an acceptance criteria for receipt of plutonium from a foreign country, the development and application of a versatile process flow sheet for the packaging of legacy plutonium materials, the identification of a plutonium container configuration, the first international certificate validation of the 9975 shipping package and the first intercontinental shipment using the 9975 shipping package. This paper will detail the technical considerations in developing the packaging process flow sheet, defining the key elements of the flow sheet and its implementation, determining the criteria used in the selection of the transport package, developing the technical basis for the package certificate amendment and the reviews with multiple licensing authorities and most importantly integrating the technical activities with the Swedish partners.« less

  18. Global Precipitation Measurement (GPM) and International Space Station (ISS) Coordination for Cubesat Deployments

    NASA Technical Reports Server (NTRS)

    Pawloski, James H.; Aviles, Jorge; Myers, Ralph; Parris, Joshua; Corley, Bryan; Hehn, Garrett; Pascucci, Joseph

    2016-01-01

    This paper describes the specific problem of collision threat to GPM and risk to ISS CubeSat deployment and the process that was implemented to keep both missions safe from collision and maximize their project goals.

  19. Combating terrorism : threat and risk assessments can help prioritize and target program investments

    DOT National Transportation Integrated Search

    1998-04-01

    The Defense Against Weapons of Mass Destruction Act of 1996 established the Nunn-Lugar-Domenici (NLD) domestic preparedness program. The General Accounting Office (GAO) was requested to review implementation of the NLD program. Specifically, the GAO ...

  20. 511, America's traveler information number. Deployment assistance report #3, 511 and homeland security.

    DOT National Transportation Integrated Search

    2002-06-01

    Today, transportation agencies are beginning to address the need for threat and vulnerability assessments, and re-examine how existing emergency management plans will be implemented during a homeland security emergency or alert. Travel information is...

  1. A comparison of VLSI architecture of finite field multipliers using dual, normal or standard basis

    NASA Technical Reports Server (NTRS)

    Hsu, I. S.; Truong, T. K.; Shao, H. M.; Deutsch, L. J.; Reed, I. S.

    1987-01-01

    Three different finite field multipliers are presented: (1) a dual basis multiplier due to Berlekamp; (2) a Massy-Omura normal basis multiplier; and (3) the Scott-Tavares-Peppard standard basis multiplier. These algorithms are chosen because each has its own distinct features which apply most suitably in different areas. Finally, they are implemented on silicon chips with nitride metal oxide semiconductor technology so that the multiplier most desirable for very large scale integration implementations can readily be ascertained.

  2. Geodiversity assessment in urban areas

    NASA Astrophysics Data System (ADS)

    Ilic, Marina; Stojković, Sanja; Rundić, Ljupko; Ćalić, Jelena; Sandić, Dejan

    2017-04-01

    Conflict over natural resources figured prominently in the urban areas. On the one hand there is a constant need for space for the construction of new buildings for housing, agriculture and industrial production, and on the other hand the resources need protection because of the threat of degradation or even complete destruction. Considering the fact that urbanization is one of the most serious threats to geodiversity, it is important that this issue is taken into account in spatial development plans and georesource management strategies in urban areas. The geodiversity, as well as natural resource, must be managed in a sustainable manner in which it is very important its protection. The mapping of specific categories of geodiversity (geological, geomorphological, hydrological and soil) on the basis of quantitative assessment with the use of Geographic Information Systems (GIS) can allow spatial planners and managers to take further steps that would reduce threats and protect the natural values. This work presents the application of geodiversity evaluation method by using the geodiversity index (Gd), based on the quantity of abiotic elements and relief roughness within a spatial unit in the case of the City of Belgrade, Serbia. The acquired results are analyzed in the context of sustainable use of georesources and the threats to which geodiversity is exposed due to the development of the city.

  3. Impact of Attention Biases to Threat and Effortful Control on Individual Variations in Negative Affect and Social Withdrawal in Very Young Children

    PubMed Central

    Zapp, Daniel J.; Fettig, Nicole B.; Pérez-Edgar, Koraly

    2015-01-01

    Early temperamental sensitivity may form the basis for the later development of socioemotional maladjustment. In particular, temperamental negative affect places children at risk for the development of anxiety. However, not all children who show negative affect go on to develop anxiety or extreme social withdrawal. Recent research indicates that reactive control, in the form of attention to threat, may serve as a bridge between early temperament and the development of later social difficulties. In addition, variation in effortful control may also modulate this trajectory. Children (MeanAge=5.57 years) were assessed for attention bias to threatening and pleasant faces using a dot-probe paradigm. Attention bias to threatening (but not happy) faces moderated the direct positive relation between negative affect and social withdrawal. Children with threat biases showed a significant link between negative affect and social withdrawal, while children who avoided threat did not. In contrast, effortful control did not moderate the relation between negative affect and social withdrawal. Rather, there was a direct negative relation between effortful control and social withdrawal. The findings from this short report indicate that the relation amongst temperament, attention bias, and social withdrawal appears early in life and point to early emerging specificity in reactive and regulatory functioning. PMID:26477597

  4. Monkey Pulvinar Neurons Fire Differentially to Snake Postures

    PubMed Central

    Le, Quan Van; Isbell, Lynne A.; Matsumoto, Jumpei; Le, Van Quang; Hori, Etsuro; Tran, Anh Hai; Maior, Rafael S.; Tomaz, Carlos; Ono, Taketoshi; Nishijo, Hisao

    2014-01-01

    There is growing evidence from both behavioral and neurophysiological approaches that primates are able to rapidly discriminate visually between snakes and innocuous stimuli. Recent behavioral evidence suggests that primates are also able to discriminate the level of threat posed by snakes, by responding more intensely to a snake model poised to strike than to snake models in coiled or sinusoidal postures (Etting and Isbell 2014). In the present study, we examine the potential for an underlying neurological basis for this ability. Previous research indicated that the pulvinar is highly sensitive to snake images. We thus recorded pulvinar neurons in Japanese macaques (Macaca fuscata) while they viewed photos of snakes in striking and non-striking postures in a delayed non-matching to sample (DNMS) task. Of 821 neurons recorded, 78 visually responsive neurons were tested with the all snake images. We found that pulvinar neurons in the medial and dorsolateral pulvinar responded more strongly to snakes in threat displays poised to strike than snakes in non-threat-displaying postures with no significant difference in response latencies. A multidimensional scaling analysis of the 78 visually responsive neurons indicated that threat-displaying and non-threat-displaying snakes were separated into two different clusters in the first epoch of 50 ms after stimulus onset, suggesting bottom-up visual information processing. These results indicate that pulvinar neurons in primates discriminate between poised to strike from those in non-threat-displaying postures. This neuronal ability likely facilitates behavioral discrimination and has clear adaptive value. Our results are thus consistent with the Snake Detection Theory, which posits that snakes were instrumental in the evolution of primate visual systems. PMID:25479158

  5. First, do no harm

    PubMed Central

    Marler, Thomas E.; Lindström, Anders J.

    2017-01-01

    ABSTRACT Conservation agencies charged with care of threatened plant species should be governed by the concepts that conservation actions should do no harm. Adaptive management research progresses in imperfect situations due to incomplete knowledge. Interpreting new experimental or observational evidence for inclusion in conservation plans should first consider the big picture by identifying collateral quandaries before scaling up the approach to large-scale implementation. We discuss a case study of Cycas micronesica conservation activities on the island of Guam. The use of large stem cuttings has been shown to be a viable approach for rescuing trees from planned construction sites. However, this artificial means of producing transplants exhibits shortcomings, some of which may add new threats to the existing plant population. Moreover, devoting funds for use of the new technique in tree rescue projects does not address the primary threats that have led to listing under the United States Endangered Species Act (ESA). Transplanted trees will likely succumb to those ubiquitous threats shortly after the completion of a successful rescue project. Alternatively, investing conservation funds into mitigation of the primary threats could lead to removal of the species from the ESA. PMID:29260802

  6. Surveillance of antibiotic resistance

    PubMed Central

    Johnson, Alan P.

    2015-01-01

    Surveillance involves the collection and analysis of data for the detection and monitoring of threats to public health. Surveillance should also inform as to the epidemiology of the threat and its burden in the population. A further key component of surveillance is the timely feedback of data to stakeholders with a view to generating action aimed at reducing or preventing the public health threat being monitored. Surveillance of antibiotic resistance involves the collection of antibiotic susceptibility test results undertaken by microbiology laboratories on bacteria isolated from clinical samples sent for investigation. Correlation of these data with demographic and clinical data for the patient populations from whom the pathogens were isolated gives insight into the underlying epidemiology and facilitates the formulation of rational interventions aimed at reducing the burden of resistance. This article describes a range of surveillance activities that have been undertaken in the UK over a number of years, together with current interventions being implemented. These activities are not only of national importance but form part of the international response to the global threat posed by antibiotic resistance. PMID:25918439

  7. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  8. A horizon scan of future threats and opportunities for pollinators and pollination.

    PubMed

    Brown, Mark J F; Dicks, Lynn V; Paxton, Robert J; Baldock, Katherine C R; Barron, Andrew B; Chauzat, Marie-Pierre; Freitas, Breno M; Goulson, Dave; Jepsen, Sarina; Kremen, Claire; Li, Jilian; Neumann, Peter; Pattemore, David E; Potts, Simon G; Schweiger, Oliver; Seymour, Colleen L; Stout, Jane C

    2016-01-01

    Background. Pollinators, which provide the agriculturally and ecologically essential service of pollination, are under threat at a global scale. Habitat loss and homogenisation, pesticides, parasites and pathogens, invasive species, and climate change have been identified as past and current threats to pollinators. Actions to mitigate these threats, e.g., agri-environment schemes and pesticide-use moratoriums, exist, but have largely been applied post-hoc. However, future sustainability of pollinators and the service they provide requires anticipation of potential threats and opportunities before they occur, enabling timely implementation of policy and practice to prevent, rather than mitigate, further pollinator declines. Methods.Using a horizon scanning approach we identified issues that are likely to impact pollinators, either positively or negatively, over the coming three decades. Results.Our analysis highlights six high priority, and nine secondary issues. High priorities are: (1) corporate control of global agriculture, (2) novel systemic pesticides, (3) novel RNA viruses, (4) the development of new managed pollinators, (5) more frequent heatwaves and drought under climate change, and (6) the potential positive impact of reduced chemical use on pollinators in non-agricultural settings. Discussion. While current pollinator management approaches are largely driven by mitigating past impacts, we present opportunities for pre-emptive practice, legislation, and policy to sustainably manage pollinators for future generations.

  9. A horizon scan of future threats and opportunities for pollinators and pollination

    PubMed Central

    Dicks, Lynn V.; Paxton, Robert J.; Baldock, Katherine C.R.; Barron, Andrew B.; Chauzat, Marie-Pierre; Freitas, Breno M.; Goulson, Dave; Jepsen, Sarina; Kremen, Claire; Li, Jilian; Neumann, Peter; Pattemore, David E.; Potts, Simon G.; Schweiger, Oliver; Seymour, Colleen L.; Stout, Jane C.

    2016-01-01

    Background. Pollinators, which provide the agriculturally and ecologically essential service of pollination, are under threat at a global scale. Habitat loss and homogenisation, pesticides, parasites and pathogens, invasive species, and climate change have been identified as past and current threats to pollinators. Actions to mitigate these threats, e.g., agri-environment schemes and pesticide-use moratoriums, exist, but have largely been applied post-hoc. However, future sustainability of pollinators and the service they provide requires anticipation of potential threats and opportunities before they occur, enabling timely implementation of policy and practice to prevent, rather than mitigate, further pollinator declines. Methods.Using a horizon scanning approach we identified issues that are likely to impact pollinators, either positively or negatively, over the coming three decades. Results.Our analysis highlights six high priority, and nine secondary issues. High priorities are: (1) corporate control of global agriculture, (2) novel systemic pesticides, (3) novel RNA viruses, (4) the development of new managed pollinators, (5) more frequent heatwaves and drought under climate change, and (6) the potential positive impact of reduced chemical use on pollinators in non-agricultural settings. Discussion. While current pollinator management approaches are largely driven by mitigating past impacts, we present opportunities for pre-emptive practice, legislation, and policy to sustainably manage pollinators for future generations. PMID:27602260

  10. Scientifically defensible fish conservation and recovery plans: Addressing diffuse threats and developing rigorous adaptive management plans

    USGS Publications Warehouse

    Maas-Hebner, Kathleen G.; Schreck, Carl B.; Hughes, Robert M.; Yeakley, Alan; Molina, Nancy

    2016-01-01

    We discuss the importance of addressing diffuse threats to long-term species and habitat viability in fish conservation and recovery planning. In the Pacific Northwest, USA, salmonid management plans have typically focused on degraded freshwater habitat, dams, fish passage, harvest rates, and hatchery releases. However, such plans inadequately address threats related to human population and economic growth, intra- and interspecific competition, and changes in climate, ocean, and estuarine conditions. Based on reviews conducted on eight conservation and/or recovery plans, we found that though threats resulting from such changes are difficult to model and/or predict, they are especially important for wide-ranging diadromous species. Adaptive management is also a critical but often inadequately constructed component of those plans. Adaptive management should be designed to respond to evolving knowledge about the fish and their supporting ecosystems; if done properly, it should help improve conservation efforts by decreasing uncertainty regarding known and diffuse threats. We conclude with a general call for environmental managers and planners to reinvigorate the adaptive management process in future management plans, including more explicitly identifying critical uncertainties, implementing monitoring programs to reduce those uncertainties, and explicitly stating what management actions will occur when pre-identified trigger points are reached.

  11. Systematic planning of disconnection to enhance conservation success in a modified world.

    PubMed

    Hermoso, Virgilio; Januchowski-Hartley, Stephanie R; Linke, Simon

    2015-12-01

    Maintaining spatial-temporal connectivity for conservation is necessary to allow the persistence of ecological processes and the biodiversity they sustain. However, conservation practice in human-modified environments can also benefit from prescribed disconnection through the implementation of barriers. Barriers, such as fences or dams, and buffer zones can be a cost-effective way of addressing threats caused by a globally connected world, such as the propagation of invasive species and diseases, creating refuge areas for native biodiversity and helping reduce economic losses caused by native wildlife or invasive species. Despite the global attention that disconnection has received, no clear framework exists to guide the allocation of barriers for conservation management. Here we propose that the implementation of barriers for conservation should be systematically planned, considering ecological trade-offs for multiple species (easing threats vs. interruption of ecosystem processes) and socio-economic cost-benefits (implementation cost vs. reduced human-wildlife conflicts), rather than using ad-hoc opportunistic criteria or accommodating conservation needs for individual species. Such a systematic approach is necessary to ensure both socially acceptable and ecologically effective use of disconnections as a conservation tool and ideally planned across different realms so co-benefits or trade-offs can be accounted for. However, any implementation of disconnection for conservation should be cautiously considered if uncertainty in effectiveness of the barrier and ecological impacts to other species are high. We also suggest the need for improved approaches to monitoring to learn from previous successes and failures. Our recommendations should guide the systematic evaluation and allocation of barriers to help enhance the value of this conservation tool in the face of increasing propagation of threats worldwide. However, new tools and collaborative frameworks across different realms are needed to help stakeholders make better informed decision. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. [Biological security confronting bioterrorism].

    PubMed

    Suárez Fernández, Guillermo

    2002-01-01

    A review is made on Biosecurity at both local and global level in relationship with Bioterrorism as a real threat and its control and prevention. The function of the network of High Security Laboratories around the world able to make immediate diagnosis, research on vaccines, fundamental and urgent epidemiological studies, conform a steady basis to control natural infections and also the possible bioterrorism attacks.

  13. Male Adolescents' View on Sexual Activity as Basis for the Development of Aids-Prevention Programmes.

    ERIC Educational Resources Information Center

    Steyn, Hester; Myburgh, Chris P.H.; Poggenpoel, Marie

    2005-01-01

    The world regards AIDS as the most disastrous health threat in the world. HIV/AIDS- related issues amongst adolescents were initially neglected due to the visible impact of this pandemic on babies and adults. Adolescents' behavior is however regarded as high-risk because of their involvement in sexual activities from a young age. The purpose of…

  14. Water and land management: Some examples of USDA international programs

    Treesearch

    Richard S. Affleck

    2000-01-01

    Environmental degradation and inefficient use of natural resources pose a growing threat to the interests of the United States, and to the physical, economic, and social well-being of people throughout the world. In his book, Global Paradox, John Naisbit states, "We have never learned, or we have forgotten, that the environment is the basis of all life and for all...

  15. Avoiding School Librarian Burnout: Simple Steps to Ensure Your Personal Best

    ERIC Educational Resources Information Center

    DelGuidice, Margaux

    2011-01-01

    All librarians, even those working one job, can become victims of burnout. Burnout can occur throughout the course of any career, and can pose a serious threat. On a daily basis, librarians help patrons fight their way through a haze of misinformation and disinformation. A good librarian is always on the ready, shifting gears from MLA source…

  16. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets

    ERIC Educational Resources Information Center

    Thaw, David Bernard

    2011-01-01

    Current scholarly understanding of information security regulation in the United States is limited. Several competing mechanisms exist, many of which are untested in the courts and before state regulators, and new mechanisms are being proposed on a regular basis. Perhaps of even greater concern, the pace at which technology and threats change far…

  17. Keep Those Kids Out: Nativism and Attitudes toward Access to Public Education for the Children of Undocumented Immigrants

    ERIC Educational Resources Information Center

    Davidson, Theresa; Burson, Karlye

    2017-01-01

    Despite the 1982 "Plyler v. Doe" decision guaranteeing education for undocumented children, access appears to be under threat as some states and localities reconsider existing policy. The basis of these attitudes should be better understood. We are unaware of research that has examined nativist sentiment as a predictor of attitudes…

  18. Natural phenomena hazards design and evaluation criteria for Department of Energy Facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-01-01

    The Department of Energy (DOE) has issued an Order 420.1 which establishes policy for its facilities in the event of natural phenomena hazards (NPH) along with associated NPH mitigation requirements. This DOE Standard gives design and evaluation criteria for NPH effects as guidance for implementing the NPH mitigation requirements of DOE Order 420.1 and the associated implementation Guides. These are intended to be consistent design and evaluation criteria for protection against natural phenomena hazards at DOE sites throughout the United States. The goal of these criteria is to assure that DOE facilities can withstand the effects of natural phenomena suchmore » as earthquakes, extreme winds, tornadoes, and flooding. These criteria apply to the design of new facilities and the evaluation of existing facilities. They may also be used for modification and upgrading of existing facilities as appropriate. The design and evaluation criteria presented herein control the level of conservatism introduced in the design/evaluation process such that earthquake, wind, and flood hazards are treated on a consistent basis. These criteria also employ a graded approach to ensure that the level of conservatism and rigor in design/evaluation is appropriate for facility characteristics such as importance, hazards to people on and off site, and threat to the environment. For each natural phenomena hazard covered, these criteria consist of the following: Performance Categories and target performance goals as specified in the DOE Order 420.1 NPH Implementation Guide, and DOE-STD-1 021; specified probability levels from which natural phenomena hazard loading on structures, equipment, and systems is developed; and design and evaluation procedures to evaluate response to NPH loads and criteria to assess whether or not computed response is permissible.« less

  19. Eco-innovations in the functioning of companies.

    PubMed

    Ociepa-Kubicka, A; Pachura, P

    2017-07-01

    The development of entrepreneurships in the 21st century cannot occur without taking care of the natural environment. The article presents issues related to eco-innovation. Despite the opportunities offered by eco-innovations, implementation of such initiatives remains to lead to various difficulties. They vary across countries and sectors. The insufficient number of enterprises in Poland and other European countries implement adequate level of eco-innovations. The main aim of this paper is to indicate the causes of this status and activities aimed to develop eco-innovativeness. The benefits and risks connected with implementation of innovative products and technologies were also discussed. Furthermore, the advantages of and barriers to their implementation into companies were analysed. The entrepreneurs from the least eco-innovative countries emphasize serious barriers, including uncertain demand from the market, uncertain return on investment or too long a payback period for eco-innovation, lack of funds within the enterprise, insufficient access to existing subsidies and fiscal incentive. They are especially afraid of the financial risks, which raises uncertainty and leads to refraining from innovative initiatives. The possibilities were indicated for the entrepreneurs who face problems with the implementation of innovative solutions. Particular attention was paid to the European Union activities for the development of eco-innovations. Numerous programs supporting their implementation were indicated. The article also presents examples of eco-innovation in water and sewage enterprises. It was emphasized that planning of eco-innovative solutions should be based on comprehensive information about actual benefits and possibility of threats to the environment which can be caused by implementation of eco-innovations. The study presents the example of threats resulting from different methods of sewage sludge management. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Electronic Health Record Implementation: A SWOT Analysis.

    PubMed

    Shahmoradi, Leila; Darrudi, Alireza; Arji, Goli; Farzaneh Nejad, Ahmadreza

    2017-10-01

    Electronic Health Record (EHR) is one of the most important achievements of information technology in healthcare domain, and if deployed effectively, it can yield predominant results. The aim of this study was a SWOT (strengths, weaknesses, opportunities, and threats) analysis in electronic health record implementation. This is a descriptive, analytical study conducted with the participation of a 90-member work force from Hospitals affiliated to Tehran University of Medical Sciences (TUMS). The data were collected by using a self-structured questionnaire and analyzed by SPSS software. Based on the results, the highest priority in strength analysis was related to timely and quick access to information. However, lack of hardware and infrastructures was the most important weakness. Having the potential to share information between different sectors and access to a variety of health statistics was the significant opportunity of EHR. Finally, the most substantial threats were the lack of strategic planning in the field of electronic health records together with physicians' and other clinical staff's resistance in the use of electronic health records. To facilitate successful adoption of electronic health record, some organizational, technical and resource elements contribute; moreover, the consideration of these factors is essential for HER implementation.

  1. Market implementation of the MVA platform for pre-pandemic and pandemic influenza vaccines: A quantitative key opinion leader analysis

    PubMed Central

    Ramezanpour, Bahar; Pronker, Esther S.; Kreijtz, Joost H.C.M.; Osterhaus, Albert D.M.E.; Claassen, E.

    2015-01-01

    A quantitative method is presented to rank strengths, weaknesses, opportunities, and threats (SWOT) of modified vaccinia virus Ankara (MVA) as a platform for pre-pandemic and pandemic influenza vaccines. Analytic hierarchy process (AHP) was applied to achieve pairwise comparisons among SWOT factors in order to prioritize them. Key opinion leaders (KOLs) in the influenza vaccine field were interviewed to collect a unique dataset to evaluate the market potential of this platform. The purpose of this study, to evaluate commercial potential of the MVA platform for the development of novel generation pandemic influenza vaccines, is accomplished by using a SWOT and AHP combined analytic method. Application of the SWOT–AHP model indicates that its strengths are considered more important by KOLs than its weaknesses, opportunities, and threats. Particularly, the inherent immunogenicity capability of MVA without the requirement of an adjuvant is the most important factor to increase commercial attractiveness of this platform. Concerns regarding vector vaccines and anti-vector immunity are considered its most important weakness, which might lower public health value of this platform. Furthermore, evaluation of the results of this study emphasizes equally important role that threats and opportunities of this platform play. This study further highlights unmet needs in the influenza vaccine market, which could be addressed by the implementation of the MVA platform. Broad use of MVA in clinical trials shows great promise for this vector as vaccine platform for pre-pandemic and pandemic influenza and threats by other respiratory viruses. Moreover, from the results of the clinical trials seem that MVA is particularly attractive for development of vaccines against pathogens for which no, or only insufficiently effective vaccines, are available. PMID:26048779

  2. Strengths, weaknesses, opportunities, and threats analysis of integrating the World Health Organization patient safety curriculum into undergraduate medical education in Pakistan: a qualitative case study.

    PubMed

    Misbah, Samreen; Mahboob, Usman

    2017-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of integrating the World Health Organization (WHO) patient safety curriculum into undergraduate medical education in Pakistan. A qualitative interpretive case study was conducted at Riphah International University, Islamabad, from October 2016 to June 2017. The study included 9 faculty members and 1 expert on patient safety. The interviews were audiotaped, and a thematic analysis of the transcripts was performed using NVivo software. Four themes were derived based on the need analysis model. The sub-themes derived from the collected data were arranged under the themes of strengths, weaknesses, opportunities, and threats, in accordance with the principles of SWOT analysis. The strengths identified were the need for a formal patient safety curriculum and its early integration into the undergraduate program. The weaknesses were faculty awareness and participation in development programs. The opportunities were an ongoing effort to develop an appropriate curriculum, to improve the current culture of healthcare, and to use the WHO curricular resource guide. The threats were attitudes towards patient safety in Pakistani culture, resistance to implementation from different levels, and the role of regulatory authorities. The theme of patient safety needs to be incorporated early into the formal medical education curriculum, with the main goals of striving to do no harm and seeing mistakes as opportunities to learn. Faculty development activities need to be organized, and faculty members should to be encouraged to participate in them. The lack of a patient safety culture was identified as the primary reason for resistance to this initiative at many levels. The WHO curriculum, amended according to local institutional culture, can be implemented appropriately with support from the corresponding regulatory bodies.

  3. Market implementation of the MVA platform for pre-pandemic and pandemic influenza vaccines: A quantitative key opinion leader analysis.

    PubMed

    Ramezanpour, Bahar; Pronker, Esther S; Kreijtz, Joost H C M; Osterhaus, Albert D M E; Claassen, E

    2015-08-20

    A quantitative method is presented to rank strengths, weaknesses, opportunities, and threats (SWOT) of modified vaccinia virus Ankara (MVA) as a platform for pre-pandemic and pandemic influenza vaccines. Analytic hierarchy process (AHP) was applied to achieve pairwise comparisons among SWOT factors in order to prioritize them. Key opinion leaders (KOLs) in the influenza vaccine field were interviewed to collect a unique dataset to evaluate the market potential of this platform. The purpose of this study, to evaluate commercial potential of the MVA platform for the development of novel generation pandemic influenza vaccines, is accomplished by using a SWOT and AHP combined analytic method. Application of the SWOT-AHP model indicates that its strengths are considered more important by KOLs than its weaknesses, opportunities, and threats. Particularly, the inherent immunogenicity capability of MVA without the requirement of an adjuvant is the most important factor to increase commercial attractiveness of this platform. Concerns regarding vector vaccines and anti-vector immunity are considered its most important weakness, which might lower public health value of this platform. Furthermore, evaluation of the results of this study emphasizes equally important role that threats and opportunities of this platform play. This study further highlights unmet needs in the influenza vaccine market, which could be addressed by the implementation of the MVA platform. Broad use of MVA in clinical trials shows great promise for this vector as vaccine platform for pre-pandemic and pandemic influenza and threats by other respiratory viruses. Moreover, from the results of the clinical trials seem that MVA is particularly attractive for development of vaccines against pathogens for which no, or only insufficiently effective vaccines, are available. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  4. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McDonald, K; Curran, B

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less

  5. An Optimal Mitigation Strategy Against the Asteroid Impact Threat with Short Warning Time

    NASA Technical Reports Server (NTRS)

    Wie, Bong; Barbee, Brent W.

    2015-01-01

    This paper presents the results of a NASA Innovative Advanced Concept (NIAC) Phase 2 study entitled "An Innovative Solution to NASA's Near-Earth Object (NEO) Impact Threat Mitigation Grand Challenge and Flight Validation Mission Architecture Development." This NIAC Phase 2 study was conducted at the Asteroid Deflection Research Center (ADRC) of Iowa State University in 2012-2014. The study objective was to develop an innovative yet practically implementable mitigation strategy for the most probable impact threat of an asteroid or comet with short warning time (less than 5 years). The mitigation strategy described in this paper is intended to optimally reduce the severity and catastrophic damage of the NEO impact event, especially when we don't have sufficient warning times for non-disruptive deflection of a hazardous NEO. This paper provides an executive summary of the NIAC Phase 2 study results.

  6. Human Reliability Program Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Landers, John; Rogers, Erin; Gerke, Gretchen

    A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security andmore » the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.« less

  7. Consistent approach to describing aircraft HIRF protection

    NASA Technical Reports Server (NTRS)

    Rimbey, P. R.; Walen, D. B.

    1995-01-01

    The high intensity radiated fields (HIRF) certification process as currently implemented is comprised of an inconsistent combination of factors that tend to emphasize worst case scenarios in assessing commercial airplane certification requirements. By examining these factors which include the process definition, the external HIRF environment, the aircraft coupling and corresponding internal fields, and methods of measuring equipment susceptibilities, activities leading to an approach to appraising airplane vulnerability to HIRF are proposed. This approach utilizes technically based criteria to evaluate the nature of the threat, including the probability of encountering the external HIRF environment. No single test or analytic method comprehensively addresses the full HIRF threat frequency spectrum. Additional tools such as statistical methods must be adopted to arrive at more realistic requirements to reflect commercial aircraft vulnerability to the HIRF threat. Test and analytic data are provided to support the conclusions of this report. This work was performed under NASA contract NAS1-19360, Task 52.

  8. 78 FR 13367 - Extension of Agency Information Collection Activity Under OMB Review: Security Threat Assessment...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-27

    ... the implementation of sec. 1012 of the USA PATRIOT Act (Pub. L. 107-56, 115 Stat. 272, 396, Oct. 26... history, and criminal history; and fingerprints. In addition, 49 CFR part 1572 requires States to maintain...

  9. Aviation Security: Implementation of Recommendations Is Under Way, but Completion Will Take Several Years

    DOT National Transportation Integrated Search

    1998-04-01

    As the threat of terrorist activities has increased in the United States, the need to improve domestic aviation security has grown. Currently, the Federal Aviation Administration (FAA), other federal agencies, and the aviation industry are implementi...

  10. Chinese plasma-derived products supply under the lot release management system in 2007-2011.

    PubMed

    Zhang, Xuejun; Ye, Shengliang; Du, Xi; Yuan, Jing; Zhao, Chaoming; Li, Changqing

    2013-11-01

    In 2007, the Chinese State Food and Drug Administration (SFDA) implemented a management system for lot release of all plasma-derived products. Since then, there have been only a few systematic studies of the blood supply, which is a concern when considering the small amount of plasma collected per capita (approximately 3 L/1000 people). As a result, there may be a threat to the safety of the available blood supply. In this study, we examined the characteristics of the supply of Chinese plasma-derived products. We investigated the reports of lot-released biological products derived from all 8 national or regional regulatory authorities in China from 2007 to 2011. The market supply characteristics of Chinese plasma-derived products were analyzed by reviewing the changes in supply varieties, the batches of lot-released plasma-derived products and the actual supply. As a result, the national regulatory authorities can more accurately develop a specific understanding of the production and quality management information provided by Chinese plasma product manufacturers. The implementation of the lot release system further ensures the clinical validity of the plasma-derived products in China and improves the safety of using plasma-derived products. This work provides an assessment of the future Chinese market supply of plasma-derived products and can function as a theoretical basis for the establishment of hemovigilance. Copyright © 2013 The International Alliance for Biological Standardization. Published by Elsevier Ltd. All rights reserved.

  11. Investigating the chlorophyll-a variability in the Gulf of Taranto (North-western Ionian Sea) by a multi-temporal analysis of MODIS-Aqua Level 3/Level 2 data

    NASA Astrophysics Data System (ADS)

    Ciancia, Emanuele; Coviello, Irina; Di Polito, Carmine; Lacava, Teodosio; Pergola, Nicola; Satriano, Valeria; Tramutoli, Valerio

    2018-03-01

    The analysis of chlorophyll-a (chl-a) variability on a long-term basis could allow detecting possible issues in the whole marine ecosystem functioning. The Gulf of Taranto (Southern Italy), in the North-western Ionian Sea (Mediterranean Sea), has been affected by several environmental threats in the last decade, thus deserving the implementation of an adequate monitoring system able to provide accurate indications about the variability of the most relevant bio-optical parameters. In this context, the main objectives of this study are to investigate the long-term chl-a variability in the Gulf of Taranto and identify the occurrence of any past spatiotemporal anomalies by implementing the multi-temporal Robust Satellite Technique (RST) on a 12-year (2003-2015) period of MODIS/AQUA Level 3/Level 2 chlorophyll-a data. The achieved results show well-clustered near-surface positive chl-a anomalies during the January-February 2011 period. This detected offshore phytoplankton bloom may be related to sub-basin processes, such as the inflow of the Western Adriatic Coastal Current (WACC), probably fostered by the cyclonic reversal of the Bimodal Oscillating System (BiOS) mechanism. Therefore, the RST approach proved successful in detecting chl-a anomalous variations with a high level of confidence regardless of the absolute value measured, thus suggesting its exportability in other areas with different site-setting conditions.

  12. How the Human Brain Represents Perceived Dangerousness or “Predacity” of Animals

    PubMed Central

    Sha, Long; Guntupalli, J. Swaroop; Oosterhof, Nikolaas; Halchenko, Yaroslav O.; Nastase, Samuel A.; di Oleggio Castello, Matteo Visconti; Abdi, Hervé; Jobst, Barbara C.; Gobbini, M. Ida; Haxby, James V.

    2016-01-01

    Common or folk knowledge about animals is dominated by three dimensions: (1) level of cognitive complexity or “animacy;” (2) dangerousness or “predacity;” and (3) size. We investigated the neural basis of the perceived dangerousness or aggressiveness of animals, which we refer to more generally as “perception of threat.” Using functional magnetic resonance imaging (fMRI), we analyzed neural activity evoked by viewing images of animal categories that spanned the dissociable semantic dimensions of threat and taxonomic class. The results reveal a distributed network for perception of threat extending along the right superior temporal sulcus. We compared neural representational spaces with target representational spaces based on behavioral judgments and a computational model of early vision and found a processing pathway in which perceived threat emerges as a dominant dimension: whereas visual features predominate in early visual cortex and taxonomy in lateral occipital and ventral temporal cortices, these dimensions fall away progressively from posterior to anterior temporal cortices, leaving threat as the dominant explanatory variable. Our results suggest that the perception of threat in the human brain is associated with neural structures that underlie perception and cognition of social actions and intentions, suggesting a broader role for these regions than has been thought previously, one that includes the perception of potential threat from agents independent of their biological class. SIGNIFICANCE STATEMENT For centuries, philosophers have wondered how the human mind organizes the world into meaningful categories and concepts. Today this question is at the core of cognitive science, but our focus has shifted to understanding how knowledge manifests in dynamic activity of neural systems in the human brain. This study advances the young field of empirical neuroepistemology by characterizing the neural systems engaged by an important dimension in our cognitive representation of the animal kingdom ontological subdomain: how the brain represents the perceived threat, dangerousness, or “predacity” of animals. Our findings reveal how activity for domain-specific knowledge of animals overlaps the social perception networks of the brain, suggesting domain-general mechanisms underlying the representation of conspecifics and other animals. PMID:27170133

  13. Individual differences in behavioural inhibition explain free riding in public good games when punishment is expected but not implemented

    PubMed Central

    2013-01-01

    Background The literature on social dilemmas and punishment focuses on the behaviour of the punisher. However, to fully explain the effect of punishment on cooperation, it is important to understand the psychological mechanisms influencing the behaviour of those who expect to be punished. This paper examines whether the expectation of punishment, rather than the implementation of punishment is sufficient to prevent individuals from free riding. Individual differences in the punishment sensitivity have been linked to both threat responses (flight, fight, fear system, or the FFFS) and to the response to the uncertainty of punishment (BIS-anxiety).The paper, therefore, examines if individual differences in BIS-anxiety and FFFS can explain some of the variability in free riding in the face of implemented and non-implemented punishment. Methods Participants took part in a series of one-shot Public Goods Games (PGGs) facing two punishment conditions (implemented and non-implemented) and two standard non-punishment PGGs. The punishment was implemented as a centralized authority punishment (i.e., if one participant contributed less than their group members, they were automatically fined). Individual contribution levels and presence/absence of zero contributions indexed free riding. Individual differences in behavioural inhibition were assessed. Results Individuals contributed more under the threat of punishment (both implemented and non-implemented). However, individuals contributed less when the punishment was not implemented compared to when it was. Those scoring high in BIS-anxiety contributed more when the punishment expectations were not implemented. This effect was not observed for FFFS. Conclusion Supporting previous research, punishment had a powerful effect in increasing contribution levels in the PGGs. However, when expected punishment was not implemented, individual differences in punishment sensitivity, specifically in BIS-anxiety, were related to fewer contributions (increased free riding) as compared to the situation when punishment was not implemented. This has implications for our understanding of why some people cannot resist the temptation to free ride, even when facing possible punishment for their actions. Our findings suggest that the diminished functioning of mechanisms, associated with trait behavioural inhibition, can partly explain such behaviours. PMID:23305116

  14. A framework for the study of coping, illness behaviour and outcomes.

    PubMed

    Shaw, C

    1999-05-01

    This paper presents a theoretical framework for the study of coping, illness attribution, health behaviour and outcomes. It is based upon models developed within health psychology and aims to provide a theoretical basis for nurse researchers to utilize psychosocial variables. It is an interactionist model which views outcomes as dependent upon both situation and person variables. The situation is viewed as the health threat or illness symptoms as well as the psychosocial context within which the person is operating. This context includes socio-economic factors, social support, social norms, and external factors such as the mass media. The experience of health threat is dependent upon individual appraisal, and the framework incorporates Folkman and Lazarus' transactional model of stress, as well as Leventhal's illness representation model. Behaviour and the perception of threat are also dependent upon outcome expectancies and the appraisal of one's own coping resources, and so the concepts of locus of control and self-efficacy are also incorporated. This framework allows one to identify determinants of behaviour and outcome, and will aid nurses in identifying areas for psycho-social intervention.

  15. Flexibility in the face of fear: Hippocampal-prefrontal regulation of fear and avoidance.

    PubMed

    Moscarello, Justin M; Maren, Stephen

    2018-02-01

    Generating appropriate defensive behaviors in the face of threat is essential to survival. Although many of these behaviors are 'hard-wired', they are also flexible. For example, Pavlovian fear conditioning generates learned defensive responses, such as conditioned freezing, that can be suppressed through extinction. The expression of extinguished responses is highly context-dependent, allowing animals to engage behavioral responses appropriate to the contexts in which threats are encountered. Likewise, animals and humans will avoid noxious outcomes if given the opportunity. In instrumental avoidance learning, for example, animals overcome conditioned defensive responses, including freezing, in order to actively avoid aversive stimuli. Recent work has greatly advanced understanding of the neural basis of these phenomena and has revealed common circuits involved in the regulation of fear. Specifically, the hippocampus and medial prefrontal cortex play pivotal roles in gating fear reactions and instrumental actions, mediated by the amygdala and nucleus accumbens, respectively. Because an inability to adaptively regulate fear and defensive behavior is a central component of many anxiety disorders, the brain circuits that promote flexible responses to threat are of great clinical significance.

  16. Security in the management of information systems.

    PubMed

    Huston, T L; Huston, J L

    1998-06-01

    Although security technology exists in abundance in health information management systems, the implementation of that technology is often lacking. This lack of implementation can be heavily affected by the attitudes and perceptions of users and management, the "people part" of systems. Particular operational, organizational, and economic factors must be addressed along with employment of security objectives and accountability. Unique threats, as well as controls, pervade the use of microcomputer-based systems as these systems permeate health care information management.

  17. Examining the Return on Investment of a Security Information and Event Management Solution in a Notional Department of Defense Network Environment

    DTIC Science & Technology

    2013-06-01

    collection are the facts that devices the lack encryption or compression methods and that the log file must be saved on the host system prior to transfer...time. Statistical correlation utilizes numerical algorithms to detect deviations from normal event levels and other routine activities (Chuvakin...can also assist in detecting low volume threats. Although easy and logical to implement, the implementation of statistical correlation algorithms

  18. Informed actions: where to cost effectively manage multiple threats to species to maximize return on investment.

    PubMed

    Auerbach, Nancy A; Tulloch, Ayesha I T; Possingham, Hugh P

    Conservation practitioners, faced with managing multiple threats to biodiversity and limited funding, must prioritize investment in different management actions. From an economic perspective, it is routine practice to invest where the highest rate of return is expected. This return-on-investment (ROI) thinking can also benefit species conservation, and researchers are developing sophisticated approaches to support decision-making for cost-effective conservation. However, applied use of these approaches is limited. Managers may be wary of “black-box” algorithms or complex methods that are difficult to explain to funding agencies. As an alternative, we demonstrate the use of a basic ROI analysis for determining where to invest in cost-effective management to address threats to species. This method can be applied using basic geographic information system and spreadsheet calculations. We illustrate the approach in a management action prioritization for a biodiverse region of eastern Australia. We use ROI to prioritize management actions for two threats to a suite of threatened species: habitat degradation by cattle grazing, and predation by invasive red foxes (Vulpes vulpes). We show how decisions based on cost-effective threat management depend upon how expected benefits to species are defined and how benefits and costs co-vary. By considering a combination of species richness, restricted habitats, species vulnerability, and costs of management actions, small investments can result in greater expected benefit compared with management decisions that consider only species richness. Furthermore, a landscape management strategy that implements multiple actions is more efficient than managing only for one threat, or more traditional approaches that don't consider ROI. Our approach provides transparent and logical decision support for prioritizing different actions intended to abate threats associated with multiple species; it is of use when managers need a justifiable and repeatable approach to investment.

  19. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    USGS Publications Warehouse

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an example of the type of results generated, we estimated that the probability of the manatee population falling to less than 250 adults on either the Atlantic or Gulf coasts (from a current statewide population size of near 3300) within 100 years is 8.6%. Complete removal of the watercraft threat alone would reduce this risk to 0.4%; complete removal of the warm-water threat to 4.2%; removal of both threats would reduce the risk to 0.1%. The modeling approach we have taken also allows us to consider partial removal of threats, as well as removal of multiple threats simultaneously. We believe the measure we have proposed (probability of quasi-extinction over y years, with quasi-extinction defined as dropping below a threshold of z on either coast) is a suitable measure of status that integrates a number of the elements that are relevant to interpretation under the ESA (it directly integrates risk of extinction and reduction of range, and indirectly integrates loss of genetic diversity). But the identification of the time frame of interest and the tolerable risk of quasi-extinction are policy decisions, and an ecology-based quasi-extinction threshold has not yet been determined. We have endeavored to provide results over a wide range of these parameters to give decision-makers useful information to assess status. This assessment of threats suggests that watercraft-related mortality is having the greatest impact on manatee population growth and resilience. Elimination of this single threat would greatly reduce the probability of quasi-extinction. Loss of warm-water is also a significant threat, particularly over the long-term. Red tide and entanglement, while noticeable threats, have had less of an impact on the manatee population. The effect of water control structures may have already been largely mitigated. We did not, however, consider an exhaustive list of threats. Other threats (e.g., reduction of food resources due to storms and development) may play a

  20. Strategic implementation of integrated water resources management in Mozambique: An A’WOT analysis

    NASA Astrophysics Data System (ADS)

    Gallego-Ayala, Jordi; Juízo, Dinis

    The Integrated Water Resources Management (IWRM) paradigm has become an important framework in development and management of water resources. Many countries in the Southern Africa region have begun water sector reforms to align the sector with the IWRM concepts. In 2007 the Mozambican Government started to update the policy and the legal framework of the water sector to foster the application of IWRM concept as a basis for achieving sustainable development. However the steps towards the implementation of this national framework are still in preparation. This research aims to identify and establish a priority ranking of the fundamental factors likely to affect the outcome of the IWRM reforms in Mozambique. This study uses the hybrid multi-criteria decision method A’WOT, a methodology coined by Kurttila et al. (2000). This method relies on the combination of the Strengths, Weaknesses, Opportunities, and Threats (SWOT) technique and the Analytic Hierarchy Process (AHP) technique. Using this procedure it is possible to identify and rank the factors affecting the functioning of a system. The key factors affecting the implementation of the IWRM, analysed in this study, were identified through an expert group discussion. These factors have been grouped into different categories of SWOT. Subsequently, the AHP methodology was applied to obtain the relative importance of each factor captured in the SWOT analysis; to this end the authors interviewed a panel of water resources management experts and practitioners. As a result, of this study and the application of the A’WOT methodology, the research identified and ranked the fundamental factors for the success of the IWRM strategy in Mozambique. The results of this study suggest that in Mozambique a planning strategy for the implementation of the IWRM should be guided mainly by combination of interventions in factors falling under opportunity and weakness SWOT groups.

  1. The biological threat to U.S. water supplies: Toward a national water security policy.

    PubMed

    Nuzzo, Jennifer B

    2006-01-01

    In addition to providing potable drinking water, U.S. water systems are critical to the maintenance of many vital public services, such as fire suppression and power generation. Disruption of these systems would produce severe public health and safety risks, as well as considerable economic losses. Thus, water systems have been designated as critical to national security by the U.S. government. Previous outbreaks of waterborne disease have demonstrated the vulnerability of both the water supply and the public's health to biological contamination of drinking water. Such experiences suggest that a biological attack, or even a credible threat of an attack, on water infrastructure could seriously jeopardize the public's health, its confidence, and the economic vitality of a community. Despite these recognized vulnerabilities, protecting water supplies from a deliberate biological attack has not been sufficiently addressed. Action in this area has suffered from a lack of scientific understanding of the true vulnerability of water supplies to intentional contamination with bioweapons, insufficient tools for detecting biological agents, and a lack of funds to implement security improvements. Much of what is needed to address the vulnerability of the national water supply falls outside the influence of individual utilities. This includes developing a national research agenda to appropriately identify and characterize waterborne threats and making funds available to implement security improvements.

  2. Improving rotorcraft survivability to RPG attack using inverse methods

    NASA Astrophysics Data System (ADS)

    Anderson, D.; Thomson, D. G.

    2009-09-01

    This paper presents the results of a preliminary investigation of optimal threat evasion strategies for improving the survivability of rotorcraft under attack by rocket propelled grenades (RPGs). The basis of this approach is the application of inverse simulation techniques pioneered for simulation of aggressive helicopter manoeuvres to the RPG engagement problem. In this research, improvements in survivability are achieved by computing effective evasive manoeuvres. The first step in this process uses the missile approach warning system camera (MAWS) on the aircraft to provide angular information of the threat. Estimates of the RPG trajectory and impact point are then estimated. For the current flight state an appropriate evasion response is selected then realised via inverse simulation of the platform dynamics. Results are presented for several representative engagements showing the efficacy of the approach.

  3. Political attitudes vary with physiological traits.

    PubMed

    Oxley, Douglas R; Smith, Kevin B; Alford, John R; Hibbing, Matthew V; Miller, Jennifer L; Scalora, Mario; Hatemi, Peter K; Hibbing, John R

    2008-09-19

    Although political views have been thought to arise largely from individuals' experiences, recent research suggests that they may have a biological basis. We present evidence that variations in political attitudes correlate with physiological traits. In a group of 46 adult participants with strong political beliefs, individuals with measurably lower physical sensitivities to sudden noises and threatening visual images were more likely to support foreign aid, liberal immigration policies, pacifism, and gun control, whereas individuals displaying measurably higher physiological reactions to those same stimuli were more likely to favor defense spending, capital punishment, patriotism, and the Iraq War. Thus, the degree to which individuals are physiologically responsive to threat appears to indicate the degree to which they advocate policies that protect the existing social structure from both external (outgroup) and internal (norm-violator) threats.

  4. Cyber-Informed Engineering: The Need for a New Risk Informed and Design Methodology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Price, Joseph Daniel; Anderson, Robert Stephen

    Current engineering and risk management methodologies do not contain the foundational assumptions required to address the intelligent adversary’s capabilities in malevolent cyber attacks. Current methodologies focus on equipment failures or human error as initiating events for a hazard, while cyber attacks use the functionality of a trusted system to perform operations outside of the intended design and without the operator’s knowledge. These threats can by-pass or manipulate traditionally engineered safety barriers and present false information, invalidating the fundamental basis of a safety analysis. Cyber threats must be fundamentally analyzed from a completely new perspective where neither equipment nor human operationmore » can be fully trusted. A new risk analysis and design methodology needs to be developed to address this rapidly evolving threatscape.« less

  5. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education

    PubMed Central

    2013-01-01

    Background Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient’s TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Methods Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO’s standard for information security risk management. Results A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Conclusions Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy. PMID:23937965

  6. Combating terrorism : federal agencies' efforts to implement national policy and strategy

    DOT National Transportation Integrated Search

    1997-09-01

    The threat of terrorist attacks against U.S. citizens and property both at home and abroad has been an issue of growing national concern. As requested, the General Accounting Office (GAO) reviewed U.S. efforts to combat terrorism. This report discuss...

  7. Librarians: Caretakers or Crimefighters?

    ERIC Educational Resources Information Center

    Arterburn, Tom R.

    1996-01-01

    Discusses how libraries can deal with criminal and disruptive behavior, including vandalism, theft, and threats toward individual safety. Security measures proposed and/or implemented by various public and academic libraries, and the Library of Congress, are highlighted. Also included are a list of crisis prevention tips and suggestions for…

  8. Maritime Threat Detection using Plan Recognition

    DTIC Science & Technology

    2012-11-01

    logic with a probabilistic interpretation to represent expert domain knowledge [13]. We used Alchemy [14] to implement MLN-BR. It interfaces with the...Domingos, P., & Lowd, D. (2009). Markov logic: An interface layer for AI. Morgan & Claypool. [14] Alchemy (2011). Alchemy ─ Open source AI. [http

  9. 76 FR 36560 - Extension of Agency Information Collection Activity Under OMB Review: Security Threat Assessment...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-22

    ... the implementation of sec. 1012 of the USA PATRIOT Act (Pub. L. 107-56, 115 Stat. 272, 396, Oct. 26... history; and fingerprints. In addition, 49 CFR part 1572 requires States to maintain a copy of the driver...

  10. Optimizing the interaction of children with information and communication technologies.

    PubMed

    Straker, L; Pollock, C

    2005-04-15

    This paper outlines the major changes in the lives of children in industrially advanced countries associated with the increased interaction with information and communication technologies. The potential opportunities and threats to the cognitive, social, physical and visual development of children are reviewed to emphasize the importance of optimizing the interaction. The change in children's use of technology also poses opportunities and threats for ergonomics that should be noted if the profession is to continue being relevant and useful into this century. The paper ends with a pathway to the development and implementation of guidelines about child information and communication technology use for different groups of guideline users.

  11. Conservation assessment for the Siskiyou Mountains salamander and Scott Bar salamander in northern California.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vinikour, W. S.; LaGory, K. E.; Adduci, J. J.

    2006-10-20

    The purpose of this conservation assessment is to summarize existing knowledge regarding the biology and ecology of the Siskiyou Mountains salamander and Scott Bar salamander, identify threats to the two species, and identify conservation considerations to aid federal management for persistence of the species. The conservation assessment will serve as the basis for a conservation strategy for the species.

  12. The reinterpretation of dreams: an evolutionary hypothesis of the function of dreaming.

    PubMed

    Revonsuo, A

    2000-12-01

    Several theories claim that dreaming is a random by-product of REM sleep physiology and that it does not serve any natural function. Phenomenal dream content, however, is not as disorganized as such views imply. The form and content of dreams is not random but organized and selective: during dreaming, the brain constructs a complex model of the world in which certain types of elements, when compared to waking life, are underrepresented whereas others are over represented. Furthermore, dream content is consistently and powerfully modulated by certain types of waking experiences. On the basis of this evidence, I put forward the hypothesis that the biological function of dreaming is to simulate threatening events, and to rehearse threat perception and threat avoidance. To evaluate this hypothesis, we need to consider the original evolutionary context of dreaming and the possible traces it has left in the dream content of the present human population. In the ancestral environment human life was short and full of threats. Any behavioral advantage in dealing with highly dangerous events would have increased the probability of reproductive success. A dream-production mechanism that tends to select threatening waking events and simulate them over and over again in various combinations would have been valuable for the development and maintenance of threat-avoidance skills. Empirical evidence from normative dream content, children's dreams, recurrent dreams, nightmares, post traumatic dreams, and the dreams of hunter-gatherers indicates that our dream-production mechanisms are in fact specialized in the simulation of threatening events, and thus provides support to the threat simulation hypothesis of the function of dreaming.

  13. From evolution to revolution: understanding mutability in large and disruptive human groups

    NASA Astrophysics Data System (ADS)

    Whitaker, Roger M.; Felmlee, Diane; Verma, Dinesh C.; Preece, Alun; Williams, Grace-Rose

    2017-05-01

    Over the last 70 years there has been a major shift in the threats to global peace. While the 1950's and 1960's were characterised by the cold war and the arms race, many security threats are now characterised by group behaviours that are disruptive, subversive or extreme. In many cases such groups are loosely and chaotically organised, but their ideals are sociologically and psychologically embedded in group members to the extent that the group represents a major threat. As a result, insights into how human groups form, emerge and change are critical, but surprisingly limited insights into the mutability of human groups exist. In this paper we argue that important clues to understand the mutability of groups come from examining the evolutionary origins of human behaviour. In particular, groups have been instrumental in human evolution, used as a basis to derive survival advantage, leaving all humans with a basic disposition to navigate the world through social networking and managing their presence in a group. From this analysis we present five critical features of social groups that govern mutability, relating to social norms, individual standing, status rivalry, ingroup bias and cooperation. We argue that understanding how these five dimensions interact and evolve can provide new insights into group mutation and evolution. Importantly, these features lend themselves to digital modeling. Therefore computational simulation can support generative exploration of groups and the discovery of latent factors, relevant to both internal group and external group modelling. Finally we consider the role of online social media in relation to understanding the mutability of groups. This can play an active role in supporting collective behaviour, and analysis of social media in the context of the five dimensions of group mutability provides a fresh basis to interpret the forces affecting groups.

  14. Convergent translational evidence of a role for anandamide in amygdala-mediated fear extinction, threat processing and stress-reactivity.

    PubMed

    Gunduz-Cinar, O; MacPherson, K P; Cinar, R; Gamble-George, J; Sugden, K; Williams, B; Godlewski, G; Ramikie, T S; Gorka, A X; Alapafuja, S O; Nikas, S P; Makriyannis, A; Poulton, R; Patel, S; Hariri, A R; Caspi, A; Moffitt, T E; Kunos, G; Holmes, A

    2013-07-01

    Endocannabinoids are released 'on-demand' on the basis of physiological need, and can be pharmacologically augmented by inhibiting their catabolic degradation. The endocannabinoid anandamide is degraded by the catabolic enzyme fatty acid amide hydrolase (FAAH). Anandamide is implicated in the mediation of fear behaviors, including fear extinction, suggesting that selectively elevating brain anandamide could modulate plastic changes in fear. Here we first tested this hypothesis with preclinical experiments employing a novel, potent and selective FAAH inhibitor, AM3506 (5-(4-hydroxyphenyl)pentanesulfonyl fluoride). Systemic AM3506 administration before extinction decreased fear during a retrieval test in a mouse model of impaired extinction. AM3506 had no effects on fear in the absence of extinction training, or on various non-fear-related measures. Anandamide levels in the basolateral amygdala were increased by extinction training and augmented by systemic AM3506, whereas application of AM3506 to amygdala slices promoted long-term depression of inhibitory transmission, a form of synaptic plasticity linked to extinction. Further supporting the amygdala as effect-locus, the fear-reducing effects of systemic AM3506 were blocked by intra-amygdala infusion of a CB1 receptor antagonist and were fully recapitulated by intra-amygdala infusion of AM3506. On the basis of these preclinical findings, we hypothesized that variation in the human FAAH gene would predict individual differences in amygdala threat-processing and stress-coping traits. Consistent with this, carriers of a low-expressing FAAH variant (385A allele; rs324420) exhibited quicker habituation of amygdala reactivity to threat, and had lower scores on the personality trait of stress-reactivity. Our findings show that augmenting amygdala anandamide enables extinction-driven reductions in fear in mouse and may promote stress-coping in humans.

  15. Worker training for new threats: a proposed framework.

    PubMed

    Mitchell, Clifford S; Doyle, Mary L; Moran, John B; Lippy, Bruce; Hughes, Joseph T; Lum, Max; Agnew, Jacqueline

    2004-11-01

    In an effort to identify health and safety training needs for various groups of workers related to weapons of mass destruction, including chemical, biological, radiological, and nuclear weapons and high yield explosives (CBRNE), a conference, "Worker Training in a New Era: Responding to New Threats," was held at the Johns Hopkins Bloomberg School of Public Health in October 2002. Two questions were addressed: Which general skills and knowledge are common to all workers who might be exposed to terrorist threats from CBRNE weapons? What are the particular skills and knowledge relevant to these threats that are specific to workers in different sectors? Thirteen core components for pre- and post-event training were identified. Pre-event training applies to all workers. Post-event training applies to selected personnel including first responders, skilled support personnel, and other workers involved in these operations. Recommendations to improve worker safety training related to preparedness include: identify specific competencies for worker pre- and post-event training; coordinate Federal policy on worker training for CBRNE hazards; adopt federal guidelines or standards on worker training for new CBRNE threats, based on the competencies and coordinated Federal policy; conduct an inventory of training programs and other resources that could be used or adapted for use for new threats; and develop new training content and methods for pre- and post-event training to address specific competencies. Given the possibility for the introduction of CBRNE threats into the workplace, all workers need some training in the potential hazards involved: the individual worker's specific role in an emergency; incident command; activation of the emergency notification system; use of personal protective equipment (PPE); and safe evacuation of the workplace. While some occupational sectors have developed effective training related to these new threats, there is a need to develop, implement, and evaluate training programs across many different sectors of the workforce. Copyright 2004 Wiley-Liss, Inc.

  16. Government Certification and Accreditation: Make a Choice

    ERIC Educational Resources Information Center

    Miles, Tracy L.

    2009-01-01

    One of the most significant challenges faced by government officials today is securing information systems to make them more resilient to attack from increasingly complex challenges from cyber-criminals, state-sponsored groups, and other threats. Over the years, the federal government has developed and implemented Certification and Accreditation…

  17. 25 CFR 43.22 - Assuring integrity of records.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...

  18. 25 CFR 43.22 - Assuring integrity of records.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...

  19. 25 CFR 43.22 - Assuring integrity of records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...

  20. 25 CFR 43.22 - Assuring integrity of records.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which...

  1. 25 CFR 43.22 - Assuring integrity of records.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...

  2. 49 CFR 1572.21 - Procedures for TWIC security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...

  3. 49 CFR 1572.21 - Procedures for TWIC security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...

  4. 49 CFR 1572.21 - Procedures for TWIC security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...

  5. 49 CFR 1572.21 - Procedures for TWIC security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...

  6. 49 CFR 1572.21 - Procedures for TWIC security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...

  7. Hierarchical fameworks for distributional and life history data: Implementation of a new ecoinformatics tool

    EPA Science Inventory

    Background/Questions/Methods Threats to marine and estuarine species operate over many spatial scales, from nutrient enrichment at the watershed/estuary scale to climate change at a global scale. To address this range of environmental issues, we developed a hierarchical framewor...

  8. The impact of joint responses of devices in an airport security system.

    PubMed

    Nie, Xiaofeng; Batta, Rajan; Drury, Colin G; Lin, Li

    2009-02-01

    In this article, we consider a model for an airport security system in which the declaration of a threat is based on the joint responses of inspection devices. This is in contrast to the typical system in which each check station independently declares a passenger as having a threat or not having a threat. In our framework the declaration of threat/no-threat is based upon the passenger scores at the check stations he/she goes through. To do this we use concepts from classification theory in the field of multivariate statistics analysis and focus on the main objective of minimizing the expected cost of misclassification. The corresponding correct classification and misclassification probabilities can be obtained by using a simulation-based method. After computing the overall false alarm and false clear probabilities, we compare our joint response system with two other independently operated systems. A model that groups passengers in a manner that minimizes the false alarm probability while maintaining the false clear probability within specifications set by a security authority is considered. We also analyze the staffing needs at each check station for such an inspection scheme. An illustrative example is provided along with sensitivity analysis on key model parameters. A discussion is provided on some implementation issues, on the various assumptions made in the analysis, and on potential drawbacks of the approach.

  9. Laser Remediation of Threats Posed by Small Orbital Debris

    NASA Technical Reports Server (NTRS)

    Fork, Richard L.; Rogers, Jan R.; Hovater, Mary A.

    2012-01-01

    The continually increasing amount of orbital debris in near Earth space poses an increasing challenge to space situational awareness. Recent collisions of spacecraft caused abrupt increases in the density of both large and small debris in near Earth space. An especially challenging class of threats is that due to the increasing density of small (1 mm to 10 cm dimension) orbital debris. This small debris poses a serious threat since: (1) The high velocity enables even millimeter dimension debris to cause serious damage to vulnerable areas of space assets, e.g., detector windows; (2) The small size and large number of debris elements prevent adequate detection and cataloguing. We have identified solutions to this threat in the form of novel laser systems and novel ways of using these laser systems. While implementation of the solutions we identify is challenging we find approaches offering threat mitigation within time frames and at costs of practical interest. We base our analysis on the unique combination of coherent light specifically structured in both space and time and applied in novel ways entirely within the vacuum of space to deorbiting small debris. We compare and contrast laser based small debris removal strategies using ground based laser systems with strategies using space based laser systems. We find laser systems located and used entirely within space offer essential and decisive advantages over groundbased laser systems.

  10. The Failure of the 1976 Swine Influenza Immunization Program

    PubMed Central

    Begley, Sharon L.

    1977-01-01

    The program to immunize 210 million Americans against swine flu failed. It set back the Federal government's relations with state health agencies, private physicians, pharmaceutical manufacturers, and the insurance industry. It increased mistrust of immunization programs and of government health programs in general. The well-intentioned plan had far-reaching consequences because its scope and the speed with which it was implemented were overreactions to the threat. Its size magnified every one of its faults, legal, medical and political. Organizational and scientific capacity were less than expected. Local health agencies could not administer the program with the inadequate funds from HEW and pharmaceutical companies could not produce a safe, effective children's vaccine. Because of the urgency given the program, Congress neglected the opposition of consumer advocates and state health officials, and did not spend time trying to include immunization against childhood disease in the swine flu program. The failure illustrates the dangers of hasty decisions, of considering only direct medical costs and benefits and not social and political effects on health policy, of launching a public health program whose scientific basis is weak and whose administrative requirements are untested. PMID:610056

  11. Monitoring subsurface coal fires in Jharia coalfield using observations of land subsidence from differential interferometric synthetic aperture radar (DInSAR)

    NASA Astrophysics Data System (ADS)

    Gupta, Nishant; Syed, Tajdarul H.; Athiphro, Ashiihrii

    2013-10-01

    Coal fires in the Jharia coalfield pose a serious threat to India's vital resource of primary coking coal and the regional environment. In order to undertake effective preventative measures, it is critical to detect the occurrence of subsurface coal fires and to monitor the extent of the existing ones. In this study, Differential Interferometric Synthetic Aperature Radar (DInSAR) technique has been utilized to monitor subsurface coal fires in the Jharia coalfield. Results showed that majority of the coal fire-related subsidence were concentrated on the eastern and western boundaries of the coalfield. The magnitude of subsidence observed was classified into high (10-27.8 mm), low (0-10 mm) and upliftment (-10-0 mm). The results were strongly supported by in situ observations and satellite-based thermal imagery analysis. Major subsidence was observed in the areas with repeated sightings of coal fire. Further, the study highlighted on the capability of the methodology for predicting potential coal fire zones on the basis of land surface subsidence only. The results from this study have major implications for demarcating the hazardous coal fire areas as well as effective implementation of public safety measures.

  12. Viewing behaviour of spider phobics and non-phobics in the presence of threat and safety stimuli.

    PubMed

    Lange, W G T; Tierney, K J; Reinhardt-Rutland, A H; Vivekananda-Schmidt, P

    2004-09-01

    To determine whether spider phobics and spider non-phobics differ in attending to threat and safety stimuli in close proximity, or spatially separated. A sample group of 16 spider-phobic and 16 spider-non-phobic volunteers were drawn from a student population on the basis of their scores on Watts and Sharrock's Spider Phobia Questionnaire. Attention was assessed by way of participants' viewing behaviour using an ASL 501 head-mounted eye-tracking system. In a control condition, participants viewed a neutral stimulus (a TV video) in the absence of the threat stimulus. In two experimental conditions, the threat stimulus (a live Chilean rose tarantula) was introduced (a) immediately beside the safety stimulus (the only exit of the experimental room), or (b) away from the safety stimulus. In the experimental conditions, phobics reduced their viewing of the TV and increased their viewing of the tarantula and of the exit; the biggest changes occurred when tarantula and exit were together. Phobics also made more eye motions across the experimental room. Our results are consistent with previous research employing reaction time to a neutral stimulus as dependent measure. In addition, our results suggest that phobics scan the environment as part of safety behaviour. We suggest that exposure treatments to reduce spider phobia may be facilitated by encouraging patients to stop environmental scanning. Copyright 2004 The British Psychological Society

  13. Differential Brain Activation to Angry Faces by Elite Warfighters: Neural Processing Evidence for Enhanced Threat Detection

    PubMed Central

    Paulus, Martin P.; Simmons, Alan N.; Fitzpatrick, Summer N.; Potterat, Eric G.; Van Orden, Karl F.; Bauman, James; Swain, Judith L.

    2010-01-01

    Background Little is known about the neural basis of elite performers and their optimal performance in extreme environments. The purpose of this study was to examine brain processing differences between elite warfighters and comparison subjects in brain structures that are important for emotion processing and interoception. Methodology/Principal Findings Navy Sea, Air, and Land Forces (SEALs) while off duty (n = 11) were compared with n = 23 healthy male volunteers while performing a simple emotion face-processing task during functional magnetic resonance imaging. Irrespective of the target emotion, elite warfighters relative to comparison subjects showed relatively greater right-sided insula, but attenuated left-sided insula, activation. Navy SEALs showed selectively greater activation to angry target faces relative to fearful or happy target faces bilaterally in the insula. This was not accounted for by contrasting positive versus negative emotions. Finally, these individuals also showed slower response latencies to fearful and happy target faces than did comparison subjects. Conclusions/Significance These findings support the hypothesis that elite warfighters deploy greater processing resources toward potential threat-related facial expressions and reduced processing resources to non-threat-related facial expressions. Moreover, rather than expending more effort in general, elite warfighters show more focused neural and performance tuning. In other words, greater neural processing resources are directed toward threat stimuli and processing resources are conserved when facing a nonthreat stimulus situation. PMID:20418943

  14. Impact of attention biases to threat and effortful control on individual variations in negative affect and social withdrawal in very young children.

    PubMed

    Cole, Claire E; Zapp, Daniel J; Fettig, Nicole B; Pérez-Edgar, Koraly

    2016-01-01

    Early temperamental sensitivity may form the basis for the later development of socioemotional maladjustment. In particular, temperamental negative affect places children at risk for the development of anxiety. However, not all children who show negative affect go on to develop anxiety or extreme social withdrawal. Recent research indicates that reactive control, in the form of attention to threat, may serve as a bridge between early temperament and the development of later social difficulties. In addition, variation in effortful control may also modulate this trajectory. Children (mean age=5.57 years) were assessed for attention bias to threatening and pleasant faces using a dot-probe paradigm. Attention bias to threatening (but not happy) faces moderated the direct positive relation between negative affect and social withdrawal. Children with threat biases showed a significant link between negative affect and social withdrawal, whereas children who avoided threat did not. In contrast, effortful control did not moderate the relation between negative affect and social withdrawal. Rather, there was a direct negative relation between effortful control and social withdrawal. The findings from this short report indicate that the relations among temperament, attention bias, and social withdrawal appears early in life and point to early emerging specificity in reactive and regulatory functioning. Copyright © 2015 Elsevier Inc. All rights reserved.

  15. Geolocalisation of athletes for out-of-competition drug testing: ethical considerations. Position statement by the WADA Ethics Panel.

    PubMed

    Borry, Pascal; Caulfield, Timothy; Estivill, Xavier; Loland, Sigmund; McNamee, Michael; Knoppers, Bartha Maria

    2018-04-01

    Through the widespread availability of location-identifying devices, geolocalisation could potentially be used to place athletes during out-of-competition testing. In light of this debate, the WADA Ethics Panel formulated the following questions: (1) should WADA and/or other sponsors consider funding such geolocalisation research projects?, (2) if successful, could they be proposed to athletes as a complementary device to Anti-Doping Administration and Management System to help geolocalisation and reduce the risk of missed tests? and (3) should such devices be offered on a voluntary basis, or is it conceivable that they would be made mandatory for all athletes in registered testing pools? In this position paper, the WADA Ethics Panel concludes that the use of geolocalisation could be useful in a research setting with the goal of understanding associations between genotype, phenotype and environment; however, it recognises that the use of geolocalisation as part of or as replacement of whereabouts rules is replete with ethical concerns. While benefits remain largely hypothetical and minimal, the potential invasion of privacy and the data security threats are real. Considering the impact on privacy, data security issues, the societal ramifications of offering such services and various pragmatic considerations, the WADA Ethics Panel concludes that at this time, the use of geolocalisation should neither be mandated as a tool for disclosing whereabouts nor implemented on a voluntary basis. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  16. The impact of furloughs on emotional exhaustion, self-rated performance, and recovery experiences.

    PubMed

    Halbesleben, Jonathon R B; Wheeler, Anthony R; Paustian-Underdahl, Samantha C

    2013-05-01

    The notion that strain can result as employees' resources are threatened or lost is well established. However, the transition from resource threats to resource losses is an important but understudied aspect of employee strain. We argue that the threat-to-loss transition triggers accelerated resource loss and a shift in how employees utilize their remaining resources unless employees engage in recovery experiences during the transition. Using a discontinuous change framework, we examine employee furloughs-the placement of employees on leave with no salary of any kind-in terms of the transition from resource threat to loss: Resources may be threatened when the furlough is announced and lost when the furlough occurs. Using 4 data collections with 180 state government employees, we found mean levels of emotional exhaustion increased and mean levels of self-reported performance decreased following the furlough. The discontinuous changes in exhaustion and performance were significantly impacted by employees' recovery experiences during the furlough. We discuss the implications of these findings for other threat-to-loss and recovery research as well as for organizations implementing furloughs. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  17. The Experience of Implementation of Innovative Technology of Quarry Waste Water Purifying in Kuzbass Open Pit

    NASA Astrophysics Data System (ADS)

    Lesin, Yu V.; Hellmer, M. C.

    2016-08-01

    Among all industries in Kuzbass (Western Siberia, Russia) the coal industry provides the most environmental threat. However, the construction of new and maintenance of existing open pit mines do not often correspond to the tasks of improving the environmental safety of surface mining. So the article describes the use of innovative quarry waste water purifying technology implemented in Kuzbass open pit mine «Shestaki». This technology is based on using artificial filter arrays made of overburden rock.

  18. Implementation of a Modular Fly away Kits (FLAK) for C4ISR in order to counter Asymmetric Threats in the Coalition Riverine and Maritime Theatres

    DTIC Science & Technology

    2006-06-01

    integrated scenario tests of the completed FLAK in Chiang Mai , Thailand in May 2006. Measures of Effectiveness and Measures of Performance will be...Royal Thai Air Force Headquarters – Bangkok, Thailand Maritime Intelligence Fusion Center – Alameda, CA IIFC – Chiang Mai , Thailand Figure 22...to the Mae Ngat Dam, 60 kilometers north of Chiang Mai , Thailand was implemented. 2. Network Architecture The network that was designed for

  19. Risk analysis of information security in a mobile instant messaging and presence system for healthcare.

    PubMed

    Bønes, Erlend; Hasvold, Per; Henriksen, Eva; Strandenaes, Thomas

    2007-09-01

    Instant messaging (IM) is suited for immediate communication because messages are delivered almost in real time. Results from studies of IM use in enterprise work settings make us believe that IM based services may prove useful also within the healthcare sector. However, today's public instant messaging services do not have the level of information security required for adoption of IM in healthcare. We proposed MedIMob, our own architecture for a secure enterprise IM service for use in healthcare. MedIMob supports IM clients on mobile devices in addition to desktop based clients. Security threats were identified in a risk analysis of the MedIMob architecture. The risk analysis process consists of context identification, threat identification, analysis of consequences and likelihood, risk evaluation, and proposals for risk treatment. The risk analysis revealed a number of potential threats to the information security of a service like this. Many of the identified threats are general when dealing with mobile devices and sensitive data; others are threats which are more specific to our service and architecture. Individual threats identified in the risks analysis are discussed and possible counter measures presented. The risk analysis showed that most of the proposed risk treatment measures must be implemented to obtain an acceptable risk level; among others blocking much of the additional functionality of the smartphone. To conclude on the usefulness of this IM service, it will be evaluated in a trial study of the human-computer interaction. Further work also includes an improved design of the proposed MedIMob architecture. 2006 Elsevier Ireland Ltd

  20. Actions for prevention and control of health threats related to maritime transport in European Union.

    PubMed

    Hadjichristodoulou, Christos; Mouchtouri, Varvara A; Guglielmetti, Paolo; Lemos, Cinthia Menel; Nichols, Gordon; Paux, Thierry; Schlaich, Clara; Cornejo, Miguel Davila; Martinez, Carmen Varela; Dionisio, Mauro; Rehmet, Sybille; Jaremin, Bogdan; Kremastinou, Jenny

    2013-01-01

    Actions at European Union level for International Health Regulations (IHR) 2005 implementation and maritime transport were focused on two European projects implemented between 2006 and 2011. Situation analysis and needs assessment were conducted, a Manual including European standards and best practice and training material was developed and training courses were delivered. Ship-to-port and port-to-port communication web-based network and database for recording IHR Ship Sanitation Certificates (SSC) were established. Fifty pilot inspections based on the Manual were conducted on passenger ships. A total of 393 corrective actions were implemented according to recommendations given to Captains during pilot inspections. The web-based communication network of competent authorities at ports in EU Member States was used to manage 13 events/outbreaks (dengue fever, Legionnaires' disease, gastroenteritis, meningitis, varicella and measles). The European information database system was used for producing and recording 1018 IHR SSC by 156 inspectors in 6 countries in accordance with the WHO Handbook for inspection of ships and issuance of SSC. Implementation of corrective actions after pilot inspections increased the level of compliance with the hygiene standards in passenger ships sailing within the EU waters and improved hygiene conditions. The communication tool contributed to improvement of outbreak identification and better management through rapid sharing of public health information, allowing a more timely and coordinated response. After the implementation of actions on passenger ships, the European Commission co-funded a Joint action that will expand the activities to all types of ships and chemical, biological and radio-nuclear threats (deliberate acts/accidental). Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. A simple, sufficient, and consistent method to score the status of threats and demography of imperiled species

    PubMed Central

    Webber, Whitney M.; Li, Ya-Wei

    2016-01-01

    Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species’ demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key’s utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand overall patterns of ESA implementation. The scoring repeatability analysis shows promise, but indicates thorough training will be needed to ensure consistency. We propose that large conservation programs adopt our simple scoring system for threats and demography. By doing so, program administrators will have better information to monitor program effectiveness and guide their decisions. PMID:27478713

  2. A simple, sufficient, and consistent method to score the status of threats and demography of imperiled species.

    PubMed

    Malcom, Jacob W; Webber, Whitney M; Li, Ya-Wei

    2016-01-01

    Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species' demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key's utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand overall patterns of ESA implementation. The scoring repeatability analysis shows promise, but indicates thorough training will be needed to ensure consistency. We propose that large conservation programs adopt our simple scoring system for threats and demography. By doing so, program administrators will have better information to monitor program effectiveness and guide their decisions.

  3. Patterns and biases of climate change threats in the IUCN Red List.

    PubMed

    Trull, Nicholas; Böhm, Monika; Carr, Jamie

    2018-02-01

    International Union for Conservation of Nature (IUCN) Red List assessments rely on published data and expert inputs, and biases can be introduced where underlying definitions and concepts are ambiguous. Consideration of climate change threat is no exception, and recently numerous approaches to assessing the threat of climate change to species have been developed. We explored IUCN Red List assessments of amphibians and birds to determine whether species listed as threatened by climate change display distinct patterns in terms of habitat occupied and additional nonclimatic threats faced. We compared IUCN Red List data with a published data set of species' biological and ecological traits believed to infer high vulnerability to climate change and determined whether distributions of climate change-threatened species on the IUCN Red List concur with those of climate change-threatened species identified with the trait-based approach and whether species possessing these traits are more likely to have climate change listed as a threat on the IUCN Red List. Species in some ecosystems (e.g., grassland, shrubland) and subject to particular threats (e.g., invasive species) were more likely to have climate change as a listed threat. Geographical patterns of climate change-threatened amphibians and birds on the IUCN Red List were incongruent with patterns of global species richness and patterns identified using trait-based approaches. Certain traits were linked to increases or decreases in the likelihood of a species being threatened by climate change. Broad temperature tolerance of a species was consistently related to an increased likelihood of climate change threat, indicating counterintuitive relationships in IUCN assessments. To improve the robustness of species assessments of the vulnerability or extinction risk associated with climate change, we suggest IUCN adopt a more cohesive approach whereby specific traits highlighted by our results are considered in Red List assessments. To achieve this and to strengthen the climate change-vulnerability assessments approach, it is necessary to identify and implement logical avenues for further research into traits that make species vulnerable to climate change (including population-level threats). © 2017 Society for Conservation Biology.

  4. SOF: A Joint Force Integrator

    DTIC Science & Technology

    2007-04-05

    of viole shifted to the level of the individual actor.”12 Today the threat is ambiguous, unconventional, and irregular in nature. It no longer can...internet on 19 September 2006 at http://www.csbaonline.org/4Publications/Archive/T.20060315.ImplementingGWOT/T.20060315.Impleme ntingGWOT.pdf 45 agents

  5. Contemporary Responses to Violent Attacks on College Campuses

    ERIC Educational Resources Information Center

    Sulkowski, Michael L.; Lazarus, Philip J.

    2011-01-01

    In this article, the authors review efforts to increase the availability of crime data to students and parents, utilize security technologies on campus, allow members of campus communities to carry concealed weapons, use criminal or potential shooter profiling, employ threat assessment techniques, and implement emergency response plans to address…

  6. Preservation Health Check: Monitoring Threats to Digital Repository Content

    ERIC Educational Resources Information Center

    Kool, Wouter; van der Werf, Titia; Lavoie, Brian

    2014-01-01

    The Preservation Health Check (PHC) project, undertaken as a joint effort by Open Planets Foundation (OPF) and OCLC Research, aims to evaluate the usefulness of the preservation metadata created and maintained by operational repositories for assessing basic preservation properties. The PHC project seeks to develop an implementable logic to support…

  7. 40 CFR 258.58 - Implementation of the corrective action program.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Take any interim measures necessary to ensure the protection of human health and the environment... drinking water supplies or sensitive ecosystems; (iv) Further degradation of the ground-water that may... situations that may pose threats to human health and the environment. (b) An owner or operator may determine...

  8. 40 CFR 257.28 - Implementation of the corrective action program.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... interim measures necessary to ensure the protection of human health and the environment. Interim measures... supplies or sensitive ecosystems; (iv) Further degradation of the ground-water that may occur if remedial... situations that may pose threats to human health and the environment. (b) An owner or operator may determine...

  9. A School-Based Intervention for Reducing Posttraumatic Symptomatology and Intolerance during Political Violence

    ERIC Educational Resources Information Center

    Berger, Rony; Gelkopf, Marc; Heineberg, Yotam; Zimbardo, Philip

    2016-01-01

    Studies indicate that individuals who are exposed to political violence and who experience personal threat and posttraumatic distress might also develop prejudicial and exclusionist attitudes toward outgroup members. To tackle this destructive dynamics in children, the authors implemented a 2-pronged approach, combining stress-reduction…

  10. Clinical Office Safety: Strategies to Enhance the Safety of Staff and Clients

    ERIC Educational Resources Information Center

    Wilson, Richard M.

    2012-01-01

    Mental health practitioners' exposure to threats and acts of nonfatal violence are among the highest of all professions. Implementing a comprehensive workplace violence prevention program specific to the clinical setting is paramount to decreasing these risks. However, generic security recommendations at times come in conflict with the…

  11. 49 CFR Appendix C to Part 195 - Guidance for Implementation of an Integrity Management Program

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED... understanding and analysis of the failure mechanisms or threats to integrity of each pipeline segment. (2) An... pipeline, information and data used for the information analysis; (13) results of the information analyses...

  12. INVESTIGATION OF OPEN-PATH FTIR FOR FAST DEPLOYMENT EMERGENCY RESPONSE TO CHEMICAL THREATS AND ACCIDENTS.

    EPA Science Inventory

    We have performed a series of experiments to determine the tradeoff in detection sensitivity for implementing design features for an Open-Path Fourier Transform Infrared (OP-FTIR) chemical analyzer that would be quick to deploy under emergency response conditions. The fast-deplo...

  13. Exploitation of Unintentional Information Leakage from Integrated Circuits

    ERIC Educational Resources Information Center

    Cobb, William E.

    2011-01-01

    The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…

  14. Introduction [Chapter 1

    Treesearch

    Sharon M. Hood; Donald Long; Melanie Miller; Kevin C. Ryan

    2007-01-01

    Many areas throughout the United States are facing the triple threat of increasing fire severity, residential growth in areas prone to wildland fire, and suppression costs and losses. In addition, substantial changes are occurring in the way we plan and implement management on federal lands relative to use of wildland fire, prescribed fire, and mechanical fuel...

  15. Cybersecurity Strategy in Developing Nations: A Jamaica Case Study

    ERIC Educational Resources Information Center

    Newmeyer, Kevin Patrick

    2014-01-01

    Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security arising from an increased dependency on Internet-connected systems in the developing world and rising cybercrime. Using a neorealist theoretical framework that draws from Gilpin and Waltz, this qualitative…

  16. Turtle Watch: Community Engagement and Action

    ERIC Educational Resources Information Center

    Lewis, Elaine; Baudains, Catherine

    2015-01-01

    Many threats face the freshwater turtle, Chelodina colliei, also known as the oblong turtle. A community education project, Turtle Watch, focused on this target species and enabled effective conservation action to be implemented. Turtle Watch was conducted in the Perth Metropolitan Area of Western Australia, as the oblong turtle inhabits the…

  17. Test Review: Adolescent and Child Urgent Threat Evaluation

    ERIC Educational Resources Information Center

    Sullivan, Jeremy R.; Holcomb, Michelle R.

    2010-01-01

    Recent occurrences of violence on high school and college campuses have led to increased interest among education professionals, parents, students, and community leaders in the identification of potentially violent students. Many school districts have implemented school-wide violence prevention plans to meet the safety needs of their students, and…

  18. Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies

    ERIC Educational Resources Information Center

    Reddy, Dinesh Sampangirama

    2017-01-01

    Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…

  19. Barriers to implementing the DSM-5 cultural formulation interview: a qualitative study.

    PubMed

    Aggarwal, Neil Krishan; Nicasio, Andel Veronica; DeSilva, Ravi; Boiler, Marit; Lewis-Fernández, Roberto

    2013-09-01

    The Outline for Cultural Formulation (OCF) in the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV) marked an attempt to apply anthropological concepts within psychiatry. The OCF has been criticized for not providing guidelines to clinicians. The DSM-5 Cultural Issues Subgroup has since converted the OCF into the Cultural Formulation Interview (CFI) for use by any clinician with any patient in any clinical setting. This paper presents perceived barriers to CFI implementation in clinical practice reported by patients (n = 32) and clinicians (n = 7) at the New York site within the DSM-5 international field trial. We used an implementation fidelity paradigm to code debriefing interviews after each CFI session through deductive content analysis. The most frequent patient threats were lack of differentiation from other treatments, lack of buy-in, ambiguity of design, over-standardization of the CFI, and severity of illness. The most frequent clinician threats were lack of conceptual relevance between intervention and problem, drift from the format, repetition, severity of patient illness, and lack of clinician buy-in. The Subgroup has revised the CFI based on these barriers for final publication in DSM-5. Our findings expand knowledge on the cultural formulation by reporting the CFI's reception among patients and clinicians.

  20. Barriers to Implementing the DSM-5 Cultural Formulation Interview: A Qualitative Study

    PubMed Central

    Aggarwal, Neil Krishan; Nicasio, Andel Veronica; DeSilva, Ravi; Boiler, Marit; Lewis-Fernández, Roberto

    2015-01-01

    The Outline for Cultural Formulation (OCF) in the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV) marked an attempt to apply anthropological concepts within psychiatry. The OCF has been criticized for not providing guidelines to clinicians. The DSM-5 Cultural Issues Subgroup has since converted the OCF into the Cultural Formulation Interview (CFI) for use by any clinician with any patient in any clinical setting. This paper presents perceived barriers to CFI implementation in clinical practice reported by patients (n=32) and clinicians (n=7) at the New York site within the DSM-5 international field trial. We used an implementation fidelity paradigm to code debriefing interviews after each CFI session through deductive content analysis. The most frequent patient threats were lack of differentiation from other treatments, lack of buy-in, ambiguity of design, over-standardization of the CFI, and severity of illness. The most frequent clinician threats were lack of conceptual relevance between intervention and problem, drift from the format, repetition, severity of patient illness, and lack of clinician buy-in. The Subgroup has revised the CFI based on these barriers for final publication in DSM-5. Our findings expand knowledge on the cultural formulation by reporting the CFI’s reception among patients and clinicians. PMID:23836098

  1. Neuromorphic elements and systems as the basis for the physical implementation of artificial intelligence technologies

    NASA Astrophysics Data System (ADS)

    Demin, V. A.; Emelyanov, A. V.; Lapkin, D. A.; Erokhin, V. V.; Kashkarov, P. K.; Kovalchuk, M. V.

    2016-11-01

    The instrumental realization of neuromorphic systems may form the basis of a radically new social and economic setup, redistributing roles between humans and complex technical aggregates. The basic elements of any neuromorphic system are neurons and synapses. New memristive elements based on both organic (polymer) and inorganic materials have been formed, and the possibilities of instrumental implementation of very simple neuromorphic systems with different architectures on the basis of these elements have been demonstrated.

  2. Technical basis for implementation of remote reading capabilities for radiological control instruments at tank farms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    PIERSON, R.M.

    1999-10-27

    This document provides the technical basis for use of remote reading capabilities with radiological control instruments at River Protection Project facilities. The purpose of this document is to evaluate applications of remote reading capabilities with Radiological Control instrumentation to allow continuous monitoring of radiation dose rates at River Protection Project (RPP) facilities. In addition this document provides a technical basis and implementing guidelines for remote monitoring of dose rates and their potential contribution to maintaining radiation exposures ALARA.

  3. 42 CFR 413.330 - Basis and scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROSPECTIVELY DETERMINED PAYMENT RATES FOR SKILLED NURSING FACILITIES Prospective Payment for Skilled Nursing Facilities § 413.330 Basis and scope. (a) Basis. This subpart implements section 1888(e) of the Act, which...

  4. 42 CFR 413.330 - Basis and scope.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... PROSPECTIVELY DETERMINED PAYMENT RATES FOR SKILLED NURSING FACILITIES Prospective Payment for Skilled Nursing Facilities § 413.330 Basis and scope. (a) Basis. This subpart implements section 1888(e) of the Act, which...

  5. 42 CFR 413.330 - Basis and scope.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... PROSPECTIVELY DETERMINED PAYMENT RATES FOR SKILLED NURSING FACILITIES Prospective Payment for Skilled Nursing Facilities § 413.330 Basis and scope. (a) Basis. This subpart implements section 1888(e) of the Act, which...

  6. 42 CFR 413.330 - Basis and scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... PROSPECTIVELY DETERMINED PAYMENT RATES FOR SKILLED NURSING FACILITIES Prospective Payment for Skilled Nursing Facilities § 413.330 Basis and scope. (a) Basis. This subpart implements section 1888(e) of the Act, which...

  7. 42 CFR 413.330 - Basis and scope.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... PROSPECTIVELY DETERMINED PAYMENT RATES FOR SKILLED NURSING FACILITIES Prospective Payment for Skilled Nursing Facilities § 413.330 Basis and scope. (a) Basis. This subpart implements section 1888(e) of the Act, which...

  8. Hazard-Specific Vulnerability Mapping for Water Security in a Shale Gas Context

    NASA Astrophysics Data System (ADS)

    Allen, D. M.; Holding, S.; McKoen, Z.

    2015-12-01

    Northeast British Columbia (NEBC) is estimated to hold large reserves of unconventional natural gas and has experienced rapid growth in shale gas development activities over recent decades. Shale gas development has the potential to impact the quality and quantity of surface and ground water. Robust policies and sound water management are required to protect water security in relation to the water-energy nexus surrounding shale gas development. In this study, hazard-specific vulnerability mapping was conducted across NEBC to identify areas most vulnerable to water quality and quantity deterioration due to shale gas development. Vulnerability represents the combination of a specific hazard threat and the susceptibility of the water system to that threat. Hazard threats (i.e. potential contamination sources and water abstraction) were mapped spatially across the region. The shallow aquifer susceptibility to contamination was characterised using the DRASTIC aquifer vulnerability approach, while the aquifer susceptibility to abstraction was mapped according to aquifer productivity. Surface water susceptibility to contamination was characterised on a watershed basis to describe the propensity for overland flow (i.e. contaminant transport), while watershed discharge estimates were used to assess surface water susceptibility to water abstractions. The spatial distribution of hazard threats and susceptibility were combined to form hazard-specific vulnerability maps for groundwater quality, groundwater quantity, surface water quality and surface water quantity. The vulnerability maps identify priority areas for further research, monitoring and policy development. Priority areas regarding water quality occur where hazard threat (contamination potential) coincide with high aquifer susceptibility or high overland flow potential. Priority areas regarding water quantity occur where demand is estimated to represent a significant proportion of estimated supply. The identification of priority areas allows for characterization of the vulnerability of water security in the region. This vulnerability mapping approach, using the hazard threat and susceptibility indicators, can be applied to other shale gas areas to assess vulnerability to shale gas activities and support water security.

  9. Administrative Challenges to the Integration of Oral Health With Primary Care

    PubMed Central

    Maxey, Hannah L.; Randolph, Courtney; Gano, Laura; Kochhar, Komal

    2017-01-01

    Inadequate access to preventive oral health services contributes to oral health disparities and is a major public health concern in the United States. Federally Qualified Health Centers play a critical role in improving access to care for populations affected by oral health disparities but face a number of administrative challenges associated with implementation of oral health integration models. We conducted a SWOT (strengths, weaknesses, opportunities, and threats) analysis with health care executives to identify strengths, weaknesses, opportunities, and threats of successful oral health integration in Federally Qualified Health Centers. Four themes were identified: (1) culture of health care organizations; (2) operations and administration; (3) finance; and (4) workforce. PMID:27218701

  10. Cooperative global security programs modeling & simulation.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Briand, Daniel

    2010-05-01

    The national laboratories global security programs implement sustainable technical solutions for cooperative nonproliferation, arms control, and physical security systems worldwide. To help in the development and execution of these programs, a wide range of analytical tools are used to model, for example, synthetic tactical environments for assessing infrastructure protection initiatives and tactics, systematic approaches for prioritizing nuclear and biological threat reduction opportunities worldwide, and nuclear fuel cycle enrichment and spent fuel management for nuclear power countries. This presentation will describe how these models are used in analyses to support the Obama Administration's agenda and bilateral/multinational treaties, and ultimately, to reducemore » weapons of mass destruction and terrorism threats through international technical cooperation.« less

  11. Inter-professional in-situ simulated team and resuscitation training for patient safety: Description and impact of a programmatic approach.

    PubMed

    Zimmermann, Katja; Holzinger, Iris Bachmann; Ganassi, Lorena; Esslinger, Peter; Pilgrim, Sina; Allen, Meredith; Burmester, Margarita; Stocker, Martin

    2015-10-29

    Inter-professional teamwork is key for patient safety and team training is an effective strategy to improve patient outcome. In-situ simulation is a relatively new strategy with emerging efficacy, but best practices for the design, delivery and implementation have yet to be evaluated. Our aim is to describe and evaluate the implementation of an inter-professional in-situ simulated team and resuscitation training in a teaching hospital with a programmatic approach. We designed and implemented a team and resuscitation training program according to Kern's six steps approach for curriculum development. General and specific needs assessments were conducted as independent cross-sectional surveys. Teamwork, technical skills and detection of latent safety threats were defined as specific objectives. Inter-professional in-situ simulation was used as educational strategy. The training was embedded within the workdays of participants and implemented in our highest acuity wards (emergency department, intensive care unit, intermediate care unit). Self-perceived impact and self-efficacy were sampled with an anonymous evaluation questionnaire after every simulated training session. Assessment of team performance was done with the team-based self-assessment tool TeamMonitor applying Van der Vleuten's conceptual framework of longitudinal evaluation after experienced real events. Latent safety threats were reported during training sessions and after experienced real events. The general and specific needs assessments clearly identified the problems, revealed specific training needs and assisted with stakeholder engagement. Ninety-five interdisciplinary staff members of the Children's Hospital participated in 20 in-situ simulated training sessions within 2 years. Participant feedback showed a high effect and acceptance of training with reference to self-perceived impact and self-efficacy. Thirty-five team members experiencing 8 real critical events assessed team performance with TeamMonitor. Team performance assessment with TeamMonitor was feasible and identified specific areas to target future team training sessions. Training sessions as well as experienced real events revealed important latent safety threats that directed system changes. The programmatic approach of Kern's six steps for curriculum development helped to overcome barriers of design, implementation and assessment of an in-situ team and resuscitation training program. This approach may help improve effectiveness and impact of an in-situ simulated training program.

  12. An Innovative Solution to NASA's NEO Impact Threat Mitigation Grand Challenge and Flight Validation Mission Architecture Development

    NASA Technical Reports Server (NTRS)

    Wie, Bong; Barbee, Brent W.

    2015-01-01

    This paper presents the results of a NASA Innovative Advanced Concept (NIAC) Phase 2 study entitled "An Innovative Solution to NASA's Near-Earth Object (NEO) Impact Threat Mitigation Grand Challenge and Flight Validation Mission Architecture Development." This NIAC Phase 2 study was conducted at the Asteroid Deflection Research Center (ADRC) of Iowa State University in 2012-2014. The study objective was to develop an innovative yet practically implementable mitigation strategy for the most probable impact threat of an asteroid or comet with short warning time (< 5 years). The mitigation strategy described in this paper is intended to optimally reduce the severity and catastrophic damage of the NEO impact event, especially when we don't have sufficient warning times for non-disruptive deflection of a hazardous NEO. This paper provides an executive summary of the NIAC Phase 2 study results. Detailed technical descriptions of the study results are provided in a separate final technical report, which can be downloaded from the ADRC website (www.adrc.iastate.edu).

  13. International Health Regulations in practice: Focus on yellow fever and poliomyelitis.

    PubMed

    Simons, H; Patel, D

    2016-10-02

    ASBTRACT The spread of infectious disease represents a global threat and therefore remains a priority on the international public health agenda. The International Health Regulations (IHR) (2005) came into effect in June 2007 and provide a legal framework to which the 196 member states of the World Health Assembly agree to abide. 1 These regulations include implementation of protective, control and response measures at points of entry to a country (i.e. land borders, sea and airports), and of notification measures, all of which aim to prevent or limit the spread of disease while minimising disruption to international trade. The World Health Organization can apply and enforce IHR (2005) to any disease considered to pose a significant threat to international public health. This short paper focuses on 2 diseases; yellow fever and poliomyelitis, both of which have the potential to spread internationally. It will discuss the measures applied under IHR (2005) to minimize the threat, and explore the implications for both travelers and travel health advisors.

  14. Surveillance data management system

    NASA Astrophysics Data System (ADS)

    Teague, Ralph

    2002-10-01

    On October 8, 2001, an Executive Order was signed creating the White House Office of Homeland Security. With its formaiton comes focused attention in setting goals and priorities for homeland security. Analysis, preparation, and implementation of strategies will hinge not only on how information is collected and analyzed, but more important, on how it is coordinated and shared. Military installations/facilities, Public safety agencies, airports, federal and local offices, public utilities, harbors, transportation and others critical areas must work either independently or as a team to ensure the safety of our citizens and visitor. In this new era of increased security, the key to interoperation is continuous information exchanged-events must be rapidly identified, reported and responded to by the appropriate agencies. For instance when a threat has been detected the security officers must be immediately alerted and must have access to the type of threat, location, movement, heading, threat size, etc to respond accordingly and the type of support required. This requires instant communications and teamwork with reliable and flexible technology.

  15. Radiological Threat Reduction (RTR) program : implementing physical security to protect large radioactive sources worldwide.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lowe, Daniel L.

    2004-11-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory andmore » knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security plans, etc. This standardized approach is applied to specific country and regional needs. Recent examples (FY 2003-2004) include foreign missions to Lithuania, Russian Federation Navy, Russia - PNPI, Greece (joint mission with IAEA), Tanzania, Iraq, Chile, Ecuador, and Egypt. Some of the ambitions and results of the RTR program may be characterized by the successes in Lithuania, Greece, and Russia.« less

  16. Predicting implementation from organizational readiness for change: a study protocol

    PubMed Central

    2011-01-01

    Background There is widespread interest in measuring organizational readiness to implement evidence-based practices in clinical care. However, there are a number of challenges to validating organizational measures, including inferential bias arising from the halo effect and method bias - two threats to validity that, while well-documented by organizational scholars, are often ignored in health services research. We describe a protocol to comprehensively assess the psychometric properties of a previously developed survey, the Organizational Readiness to Change Assessment. Objectives Our objective is to conduct a comprehensive assessment of the psychometric properties of the Organizational Readiness to Change Assessment incorporating methods specifically to address threats from halo effect and method bias. Methods and Design We will conduct three sets of analyses using longitudinal, secondary data from four partner projects, each testing interventions to improve the implementation of an evidence-based clinical practice. Partner projects field the Organizational Readiness to Change Assessment at baseline (n = 208 respondents; 53 facilities), and prospectively assesses the degree to which the evidence-based practice is implemented. We will conduct predictive and concurrent validities using hierarchical linear modeling and multivariate regression, respectively. For predictive validity, the outcome is the change from baseline to follow-up in the use of the evidence-based practice. We will use intra-class correlations derived from hierarchical linear models to assess inter-rater reliability. Two partner projects will also field measures of job satisfaction for convergent and discriminant validity analyses, and will field Organizational Readiness to Change Assessment measures at follow-up for concurrent validity (n = 158 respondents; 33 facilities). Convergent and discriminant validities will test associations between organizational readiness and different aspects of job satisfaction: satisfaction with leadership, which should be highly correlated with readiness, versus satisfaction with salary, which should be less correlated with readiness. Content validity will be assessed using an expert panel and modified Delphi technique. Discussion We propose a comprehensive protocol for validating a survey instrument for assessing organizational readiness to change that specifically addresses key threats of bias related to halo effect, method bias and questions of construct validity that often go unexplored in research using measures of organizational constructs. PMID:21777479

  17. Effects of cognitive-behavioral therapy on brain responses to subliminal and supraliminal threat and their functional significance in specific phobia.

    PubMed

    Lipka, Judith; Hoffmann, Marius; Miltner, Wolfgang H R; Straube, Thomas

    2014-12-01

    Neurocircuitry models of anxiety disorders suggest dysregulated mechanisms encompassing both automatic and elaborate threat processing. However, the extent to which these processes might be differentially modified by psychotherapy and the neural basis of such changes are unknown. We examined the effects of cognitive-behavioral therapy (CBT) in patients with anxiety disorder on brain responses to subliminal and supraliminal threat. 3-Tesla functional magnetic resonance imaging was used to assess neural responses to disorder-related stimuli, presented during two backward-masking conditions employed to manipulate stimulus awareness. In 28 spider-phobic patients randomly assigned to a therapy group or a waiting-list control group scanning was performed before and after completing CBT or a waiting period. Scanning was performed one time in 16 healthy control subjects. Self-report and behavioral measures were used to relate CBT-mediated brain activation changes with symptom improvement. Untreated patients demonstrated abnormal hyperactivation in the amygdala, fusiform gyrus, insula, anterior cingulate cortex, and dorsomedial prefrontal cortex. Successful CBT was reflected in an overall downregulation in these fear circuitry structures, especially in the right amygdala and anterior cingulate cortex, with reductions in amygdala responsiveness associated with self-reported symptom improvement. However, subliminal threat induced a pattern of right-lateralized hyperactivation in the amygdala and fusiform gyrus that was subject to intersession habituation across groups without showing significant sensitivity to CBT. These results challenge prevailing models that emphasize a role for amygdala automaticity in the maintenance of anxiety. Our results suggest CBT-related changes in neural activation associated with fear responses to consciously perceived threat. © 2013 Society of Biological Psychiatry Published by Society of Biological Psychiatry All rights reserved.

  18. Ecosystem Risk Assessment Using the Comprehensive Assessment of Risk to Ecosystems (CARE) Tool

    NASA Astrophysics Data System (ADS)

    Battista, W.; Fujita, R.; Karr, K.

    2016-12-01

    Effective Ecosystem Based Management requires a localized understanding of the health and functioning of a given system as well as of the various factors that may threaten the ongoing ability of the system to support the provision of valued services. Several risk assessment models are available that can provide a scientific basis for understanding these factors and for guiding management action, but these models focus mainly on single species and evaluate only the impacts of fishing in detail. We have developed a new ecosystem risk assessment model - the Comprehensive Assessment of Risk to Ecosystems (CARE) - that allows analysts to consider the cumulative impact of multiple threats, interactions among multiple threats that may result in synergistic or antagonistic impacts, and the impacts of a suite of threats on whole-ecosystem productivity and functioning, as well as on specific ecosystem services. The CARE model was designed to be completed in as little as two hours, and uses local and expert knowledge where data are lacking. The CARE tool can be used to evaluate risks facing a single site; to compare multiple sites for the suitability or necessity of different management options; or to evaluate the effects of a proposed management action aimed at reducing one or more risks. This analysis can help users identify which threats are the most important at a given site, and therefore where limited management resources should be targeted. CARE can be applied to virtually any system, and can be modified as knowledge is gained or to better match different site characteristics. CARE builds on previous ecosystem risk assessment tools to provide a comprehensive assessment of fishing and non-fishing threats that can be used to inform environmental management decisions across a broad range of systems.

  19. Ecosystem Risk Assessment Using the Comprehensive Assessment of Risk to Ecosystems (CARE) Tool

    NASA Astrophysics Data System (ADS)

    Battista, W.; Fujita, R.; Karr, K.

    2016-02-01

    Effective Ecosystem Based Management requires a localized understanding of the health and functioning of a given system as well as of the various factors that may threaten the ongoing ability of the system to support the provision of valued services. Several risk assessment models are available that can provide a scientific basis for understanding these factors and for guiding management action, but these models focus mainly on single species and evaluate only the impacts of fishing in detail. We have developed a new ecosystem risk assessment model - the Comprehensive Assessment of Risk to Ecosystems (CARE) - that allows analysts to consider the cumulative impact of multiple threats, interactions among multiple threats that may result in synergistic or antagonistic impacts, and the impacts of a suite of threats on whole-ecosystem productivity and functioning, as well as on specific ecosystem services. The CARE model was designed to be completed in as little as two hours, and uses local and expert knowledge where data are lacking. The CARE tool can be used to evaluate risks facing a single site; to compare multiple sites for the suitability or necessity of different management options; or to evaluate the effects of a proposed management action aimed at reducing one or more risks. This analysis can help users identify which threats are the most important at a given site, and therefore where limited management resources should be targeted. CARE can be applied to virtually any system, and can be modified as knowledge is gained or to better match different site characteristics. CARE builds on previous ecosystem risk assessment tools to provide a comprehensive assessment of fishing and non-fishing threats that can be used to inform environmental management decisions across a broad range of systems.

  20. Damage Assessment and Monitoring of Cultural Heritage Places in a Disaster and Post-Disaster Event - a Case Study of Syria

    NASA Astrophysics Data System (ADS)

    Vafadari, A.; Philip, G.; Jennings, R.

    2017-08-01

    In recent decades, and in response to an increased focus on disastrous events ranging from armed conflict to natural events that impact cultural heritage, there is a need for methodologies and approaches to better manage the effects of disaster on cultural heritage. This paper presents the approaches used in the development of a Historic Environment Record (HER) for Syria. It describes the requirements and methodologies used for systematic emergency recording and assessment of cultural heritage. It also presents the type of information needed to record in the aftermath of disaster to assess the scale of damage and destruction. Started as a project at Durham University, the database is now being developed as part of the EAMENA (Endangered Archaeology in the Middle East and North Africa) project. The core dataset incorporates information and data from archaeological surveys undertaken in Syria by research projects in recent decades and began life as a development of the Shirīn initiative1. The focus of this project is to provide a tool not only for the recording and inventory of sites and monuments, but also to record damage and threats, their causes, and assess their magnitude. It will also record and measure the significance in order to be able to prioritize emergency and preservation responses. The database aims to set procedures for carrying out systematic rapid condition assessment (to record damage) and risk assessment (to record threat and level of risk) of heritage places, on the basis of both on the ground and remote assessment. Given the large number of heritage properties damaged by conflict, the implementation of rapid assessment methods to quickly identify and record level of damage and condition is essential, as it will provide the evidence to support effective prioritization of efforts and resources, and decisions on the appropriate levels of intervention and methods of treatment. The predefined data entry categories, use of a data standard, and systematic methods of assessment will ensure that different users choose from the same prefixed data entry and measurement inputs in order to allow for consistent and comparable assessments across different sites and regions. Given the general lack of appropriate emergency response and assessment databases, this system could also be applied in other locations facing similar threats and damage from conflict or natural disasters.

  1. Fear extinction in the human brain: A meta-analysis of fMRI studies in healthy participants.

    PubMed

    Fullana, Miquel A; Albajes-Eizagirre, Anton; Soriano-Mas, Carles; Vervliet, Bram; Cardoner, Narcís; Benet, Olívia; Radua, Joaquim; Harrison, Ben J

    2018-05-01

    The study of fear extinction represents an important example of translational neuroscience in psychiatry and promises to improve the understanding and treatment of anxiety and fear-related disorders. We present the results of a set of meta-analyses of human fear extinction studies in healthy participants, conducted with functional magnetic resonance imaging (fMRI) and reporting whole-brain results. Meta-analyses of fear extinction learning primarily implicate consistent activation of brain regions linked to threat appraisal and experience, including the dorsal anterior cingulate and anterior insular cortices. An overlapping anatomical result was obtained from the meta-analysis of extinction recall studies, except when studies directly compared an extinguished threat stimulus to an unextinguished threat stimulus (instead of a safety stimulus). In this latter instance, more consistent activation was observed in dorsolateral and ventromedial prefrontal cortex regions, together with other areas including the hippocampus. While our results partially support the notion of a shared neuroanatomy between human and rodent models of extinction processes, they also encourage an expanded account of the neural basis of human fear extinction. Copyright © 2018 Elsevier Ltd. All rights reserved.

  2. Vector control for malaria and other mosquito-borne diseases. Report of a WHO study group.

    PubMed

    1995-01-01

    Since the Ministerial Conference on Malaria in 1992, which acknowledged the urgent need for worldwide commitment to malaria control, efforts have been directed to implementation of a Global Malaria Control Strategy. Vector control, an essential component of malaria control, has become less effective in recent years, partly as a result of poor use of alternative control tools, inappropriate use of insecticides, lack of an epidemiological basis for interventions, inadequate resources and infrastructure, and weak management. Changing environmental conditions, the behavioural characteristics of certain vectors, and resistance to insecticides have added to the difficulties. This report of a WHO Study Group provides guidelines for the planning, implementation and evaluation of cost-effective and sustainable vector control in the context of the Global Malaria Control Strategy. It reviews the available methods - indoor residual spraying, personal protection, larval control and environmental management - stressing the need for selective and flexible use of interventions according to local conditions. Requirements for data collection and the appropriate use of entomological parameters and techniques are discussed and priorities identified for the development of local capacity for vector control and for operational research. Emphasis is placed both on the monitoring and evaluation of vector control to ensure cost-effectiveness and on the development of strong managerial structures, which can support community participation and intersectoral collaboration and accommodate the control of other vector-borne diseases. The report concludes with recommendations aimed at promoting the targeted and efficient use of vector control in preventing and controlling malaria, thereby reducing the threat to health and socioeconomic development in many tropical countries.

  3. Priorities for Implementation of the Northern Pacific Coast Regional Shorebird Management Plan

    Treesearch

    Joseph B. Buchanan

    2005-01-01

    Marine and upland habitats in western Washington and Oregon provide essential conditions for many wintering and migratory shorebird species along the Pacific Flyway. Known or potential threats to shorebirds include loss or degradation of habitat, invasion of exotic vegetation and invertebrates, environmental pollution, and human disturbance. Initial priority activities...

  4. Alternative Models for Large-Group Introductory Earth Science Courses: Dual-Structured Model

    ERIC Educational Resources Information Center

    Carpenter, John R.; And Others

    1978-01-01

    An introductory college course in which both the instructional staff and students have input into the content has been successfully implemented into a spectrum of instructor-centered to student-centered introductory earth science courses. Grading by point accumulation method reduced the grade threat and induced student responsibility for learning.…

  5. 75 FR 6697 - Endangered and Threatened Wildlife and Plants; Draft Yuma Clapper Rail (Rallus longirostris...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-10

    ...-term contracts for water supplies at Sonny Bono Salton Sea National Wildlife Refuge and Imperial State... species is completed and protective measures implemented if needed; and a secure water supply for the..., directed research on habitat and threats, efforts to obtain secure water supplies for important habitats...

  6. Perceived Peer/Family Effects on Beliefs and Intentions of College Students Regarding AIDS-Preventive Behaviors.

    ERIC Educational Resources Information Center

    Tashakkori, Abbas; Cleaveland, Bonnie

    With the increasing threat of Acquired Immune Deficiency Syndrome (AIDS), intensive educational programs are implemented and/or planned worldwide. It is usually assumed that providing information and generating concern leads to AIDS-preventive behaviors. Attitude theory and research in social psychology does not necessarily support this…

  7. Countering Center Gossip--Guidelines for Implementing an Anti-Gossip Policy.

    ERIC Educational Resources Information Center

    Copeland, Margaret Leitch; Bruno, Holly Elissa

    2001-01-01

    Discusses gossip in early childhood settings as a threat to professionalism. Identifies reasons for staff gossip, provides guidance for developing an anti-gossip program policy, and presents an activity to distinguish gossip and shared information. Discusses how directors can influence parents' discussions with staff and get staff to confront each…

  8. Child Protection Assessment in Humanitarian Emergencies: Case Studies from Georgia, Gaza, Haiti and Yemen

    ERIC Educational Resources Information Center

    Ager, Alastair; Blake, Courtney; Stark, Lindsay; Daniel, Tsufit

    2011-01-01

    Objectives: The paper reviews the experiences of conducting child protection assessments across four humanitarian emergencies where violence and insecurity, directly or indirectly, posed a major threat to children. We seek to identify common themes emerging from these experiences and propose ways to guide the planning and implementation of…

  9. Conducting a SWOT Analysis for Program Improvement

    ERIC Educational Resources Information Center

    Orr, Betsy

    2013-01-01

    A SWOT (strengths, weaknesses, opportunities, and threats) analysis of a teacher education program, or any program, can be the driving force for implementing change. A SWOT analysis is used to assist faculty in initiating meaningful change in a program and to use the data for program improvement. This tool is useful in any undergraduate or degree…

  10. How the Perspectives of Administrators, Faculty, and Support Units Impact the Rate of Distance Education Adoption.

    ERIC Educational Resources Information Center

    Dooley, Kim E.; Murphrey, Theresa Pesl

    2000-01-01

    Discusses the use of technology for distance education in higher education, considers the role that perspectives within the institution play in formulating a strategy for development and implementation, and describes a study that used a SWOT (strengths, weaknesses, opportunities, and threats) Analysis to determine the perspectives of…

  11. Assessing Sensitivity of Early Head Start Study Findings to Manipulated Randomization Threats

    ERIC Educational Resources Information Center

    Green, Sheridan

    2013-01-01

    Increasing demands for design rigor and an emphasis on evidence-based practice on a national level indicated a need for further guidance related to successful implementation of randomized studies in education. Rigorous and meaningful experimental research and its conclusions help establish a valid theoretical and evidence base for educational…

  12. Promoting Knowledge of Climate Change (CC) amongst Nigerians: Implications for Education Managers

    ERIC Educational Resources Information Center

    Akpomi, Margaret E.; Vipene, Joseph

    2016-01-01

    Rising sea levels, due to thermal expansion of the ocean, and higher frequency and intensity of coastal and inland storms threaten coastal communities worldwide. The implementation of pro-active, planned adaptation to reduce community vulnerability is strongly dependent upon people's awareness of the threat posed to their communities at the local…

  13. Organizations and Survey Research: Implementing Response Enhancing Strategies and Conducting Nonresponse Analyses

    ERIC Educational Resources Information Center

    Fulton, Brad R.

    2018-01-01

    Surveys provide a critical source of data for scholars, yet declining response rates are threatening the quality of data being collected. This threat is particularly acute among organizational studies that use key informants--the mean response rate for published studies is 34 percent. This article describes several response enhancing strategies…

  14. AN EXPERIMENTAL ASSESSMENT OF THE IMPACTS OF PARTIAL DNAPL SOURCE ZONE DELETION USING SPARGING AS A REMEDIATION TECHNIQUE

    EPA Science Inventory

    The contamination of the subsurface environment by dense non-aqueous phase liquids (DNAPL) is a wide-spread problem that poses a significant threat to soil and groundwater quality. Implementing different remediation techniques can lead to the removal of a high fraction of the DNA...

  15. The Role of Universities in International Response to Pandemic Threats

    ERIC Educational Resources Information Center

    Chapman, David W.; Errecaborde, Kaylee Myhre

    2016-01-01

    Faced with increasing pressure to generate more of their own budgets, universities in low and middle income countries are increasingly banding together as country and regional-level networks to bid on and subsequently implement externally funded development projects (a pattern already seen in high income countries). While working as a network may…

  16. 40 CFR 300.440 - Procedures for planning and implementing off-site response actions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... human health and the environment, the On-Scene Coordinator (OSC) may determine that it is necessary to... substantially reduce its mobility, toxicity or persistence in the absence of a defined treatment standard... threat to human health and the environment; or (C) Releases to the air that do not exceed standards...

  17. ICT Opportunities and Threats in Implementing Teaching Practice Programmes

    ERIC Educational Resources Information Center

    Madlela, Benkosi

    2015-01-01

    Mthwakazi University (MU) established the teacher education department in 2005. The purpose of this department is to empower teachers especially those who did not do education in their first degrees with pedagogical skills and competencies that will make them effective teachers in the classrooms. Students in this teacher education department come…

  18. Development of Security Measures: Implementation Instructions for MIL-STD on Physical Security for DCS Facilities.

    DTIC Science & Technology

    1981-07-01

    security measures to in- crease the survivability of these assets. However, sabotage, terrorism and vandalism continue to be serious threats to DCS and its...Closed circuit television. e. Comunication cables. f. Fuel storage. g. Fuel lines. h. Air conditioning. The primary benefits of security measures

  19. Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.

    In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they can be assessed. A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. A complementary Personality Factor modeling approach was developedmore » based on analysis to derive relevant personality characteristics from word use. Several implementations of the psychosocial model were evaluated by comparing their agreement with judgments of human resources and management professionals; the personality factor modeling approach was examined using email samples. If implemented in an operational setting, these models should be part of a set of management tools for employee assessment to identify employees who pose a greater insider threat.« less

  20. Strengths, weaknesses, opportunities, and threats analysis of integrating the World Health Organization patient safety curriculum into undergraduate medical education in Pakistan: a qualitative case study

    PubMed Central

    2017-01-01

    Purpose The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of integrating the World Health Organization (WHO) patient safety curriculum into undergraduate medical education in Pakistan. Methods A qualitative interpretive case study was conducted at Riphah International University, Islamabad, from October 2016 to June 2017. The study included 9 faculty members and 1 expert on patient safety. The interviews were audiotaped, and a thematic analysis of the transcripts was performed using NVivo software. Results Four themes were derived based on the need analysis model. The sub-themes derived from the collected data were arranged under the themes of strengths, weaknesses, opportunities, and threats, in accordance with the principles of SWOT analysis. The strengths identified were the need for a formal patient safety curriculum and its early integration into the undergraduate program. The weaknesses were faculty awareness and participation in development programs. The opportunities were an ongoing effort to develop an appropriate curriculum, to improve the current culture of healthcare, and to use the WHO curricular resource guide. The threats were attitudes towards patient safety in Pakistani culture, resistance to implementation from different levels, and the role of regulatory authorities. Conclusion The theme of patient safety needs to be incorporated early into the formal medical education curriculum, with the main goals of striving to do no harm and seeing mistakes as opportunities to learn. Faculty development activities need to be organized, and faculty members should to be encouraged to participate in them. The lack of a patient safety culture was identified as the primary reason for resistance to this initiative at many levels. The WHO curriculum, amended according to local institutional culture, can be implemented appropriately with support from the corresponding regulatory bodies. PMID:29284217

  1. A Live Threat Violence Simulation Exercise for Psychiatric Outpatient Departments: A Valuable Aid to Training in Violence Prevention.

    PubMed

    Feinstein, Robert E; Yager, Joel

    2017-10-30

    Violence in psychiatric outpatient settings is a ubiquitous concern. This article describes the development, implementation, and evaluation of a live threat violence simulation exercise, designed to reduce the risk of future outpatient clinic violence and minimize the effects of future incidents on staff. The psychiatric outpatient clinic at the University of Colorado Hospital developed, implemented, and evaluated a 4-hour live violence threat simulation exercise as a companion to a 7-hour violence prevention program. The simulation includes an orientation, two threat simulation scenarios, three debriefings, satisfaction surveys, problem identification, action plans, and annual safety and process improvements. The authors have conducted live violence simulation exercises from 2011-2016, and have collected survey data about our annual simulation exercise from 2014-2016. Each year ≥ 52% of participants responded, and each year ≥ 90% of respondents rated the simulation as "very helpful/helpful", ≥ 86% believed themselves to be "much better/better" prepared to deal with violent episodes, and < 2% of participants experienced post-simulation side effects such as worries about past trauma; anxiety; sleep problems; increase in workplace concerns. From 2011-2016, the clinic experienced 4 major violent episodes and 36 episodes of potential violence with no staff injuries and minimal psychological sequelae to one staff member. Violence prevention efforts and the development of close police/staff relationships may have contributed to these fortunate outcomes. Satisfaction surveys suggest that the simulations are very helpful/helpful, with participants feeling much better/ better prepared to manage violence. The exercises led the authors to initiate staff safety related behavioral changes as well as physical space and safety processes improvements. The violence prevention program and simulation exercises have promoted excellent relationships with police and a consistent safety record over six years. This approach may be useful for other psychiatric outpatient departments.

  2. Correlation of Laboratory Flame Propagation Testing Results with Ballistic Testing Utilizing Several Threats with Varying Explosive Energies

    DTIC Science & Technology

    2011-09-01

    hydrocarbons, i.e.; paraffins , olefins , aromatics, and naphthenics. Because of the chemical complexity of fuels, they are classified on the basis of... Technologies Warren, Michigan Contract No. DAAE-07-99-C-L053 (WD38) UNCLASSIFIED: Distribution Statement A. Approved for public release September...Government employee(s), this document was only reviewed for export controls, and improper Army association or emblem usage considerations. All other

  3. Defense Infrastructure: DOD Can Improve Its Response to Environmental Exposures on Military Installations

    DTIC Science & Technology

    2012-05-01

    basis, based on what they perceive the health threat to be. The sidebar illustrates DOD’s response to the 2011 Fukushima Daiichi disaster in Japan... disasters or nuclear attacks, to protect installations, facilities, and personnel—including military and civilian personnel, dependents of military and...4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with

  4. The Critical Role of Positive Incentives for Reducing Insider Threats

    DTIC Science & Technology

    2016-12-01

    Association. 1996. [Gagné 2005] Gagné, M. & Deci , E. L. Self ‐ Determination Theory and Work Motivation. Journal of Organiza- tional Behavior. Volume...sense of interpersonal connectedness. One important scale is the one associated with Self Determination Theory (SDT), in particular, the relatedness...Baard 2004] Baard, P. P.; Deci , E. L. & Ryan , R. M. Intrinsic Need Satisfaction: A Motivational Basis of Per- formance and Weil‐Being in Two Work

  5. Simulation of data safety components for corporative systems

    NASA Astrophysics Data System (ADS)

    Yaremko, Svetlana A.; Kuzmina, Elena M.; Savchuk, Tamara O.; Krivonosov, Valeriy E.; Smolarz, Andrzej; Arman, Abenov; Smailova, Saule; Kalizhanova, Aliya

    2017-08-01

    The article deals with research of designing data safety components for corporations by means of mathematical simulations and modern information technologies. Simulation of threats ranks has been done which is based on definite values of data components. The rules of safety policy for corporative information systems have been presented. The ways of realization of safety policy rules have been proposed on the basis of taken conditions and appropriate class of valuable data protection.

  6. Using resilience and resistance concepts to manage threats to sagebrush ecosystems, Gunnison sage-grouse, and Greater sage-grouse in their eastern range: A strategic multi-scale approach

    USGS Publications Warehouse

    Chambers, Jeanne C.; Beck, Jeffrey L.; Campbell, Steve; Carlson, John; Christiansen, Thomas J.; Clause, Karen J.; Dinkins, Jonathan B.; Doherty, Kevin E.; Griffin, Kathleen A.; Havlina, Douglas W.; Mayer, Kenneth F.; Hennig, Jacob D.; Kurth, Laurie L.; Maestas, Jeremy D.; Manning, Mary E.; Mealor, Brian A.; McCarthy, Clinton; Perea, Marco A.; Pyke, David A.

    2016-01-01

    This report provides a strategic approach developed by a Western Association of Fish and Wildlife Agencies interagency working group for conservation of sagebrush ecosystems, Greater sage-grouse, and Gunnison sage-grouse. It uses information on (1) factors that influence sagebrush ecosystem resilience to disturbance and resistance to nonnative invasive annual grasses and (2) distribution and relative abundance of sage-grouse populations to address persistent ecosystem threats, such as invasive annual grasses and wildfire, and land use and development threats, such as oil and gas development and cropland conversion, to develop effective management strategies. A sage-grouse habitat matrix links relative resilience and resistance of sagebrush ecosystems with modeled sage-grouse breeding habitat probabilities to help decisionmakers assess risks and determine appropriate management strategies at both landscape and site scales. Areas for targeted management are assessed by overlaying matrix components with Greater sage-grouse Priority Areas for Conservation and Gunnison sage-grouse critical habitat and linkages, breeding bird concentration areas, and specific habitat threats. Decision tools are discussed for determining the suitability of target areas for management and the most appropriate management actions. A similar approach was developed for the Great Basin that was incorporated into the Federal land use plan amendments and served as the basis of a Bureau of Land Management Fire and Invasives Assessment Tool, which was used to prioritize sage-grouse habitat for targeted management activities.

  7. Integrating cognitive bias modification into a standard cognitive behavioural treatment package for social phobia: a randomized controlled trial.

    PubMed

    Rapee, Ronald M; MacLeod, Colin; Carpenter, Leigh; Gaston, Jonathan E; Frei, Jacqueline; Peters, Lorna; Baillie, Andrew J

    2013-05-01

    The aim of the current study was to integrate recent developments in the retraining of attentional biases towards threat into a standard cognitive behavioural treatment package for social phobia. 134 participants (M age-32.4: 53% female) meeting DSM-IV criteria for social phobia received a 12-week cognitive behavioural treatment program. They were randomly allocated to receive on a daily basis using home practice, either an additional computerised probe procedure designed to train attentional resource allocation away from threat, or a placebo variant of this procedure. Measures included diagnostic severity, social anxiety symptoms, life interference, and depression as well as state anxiety in response to a laboratory social threat. At the end of treatment there were no significant differences between groups in attentional bias towards threat or in treatment response (all p's>0.05). Both groups showed similar and highly significant reductions in diagnostic severity, social anxiety symptoms, depression symptoms, and life interference at post-treatment that was maintained and in most cases increased at 6 month follow-up (uncontrolled effect sizes ranged from d=0.34 to d=1.90). The current results do not indicate that integration of information processing-derived attentional bias modification procedures into standard treatment packages as conducted in this study augments attentional change or enhances treatment efficacy. Further refinement of bias modification techniques, and better methods of integrating them with conventional approaches, may be needed to produce better effects. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. The adoption of IT security standards in a healthcare environment.

    PubMed

    Gomes, Rui; Lapão, Luís Velez

    2008-01-01

    Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from security threats. It is imperative to take necessary measures to ensure risk management and business continuity. Security management certification provides just such a guarantee, increasing patient and partner confidence. This paper introduces one best practice for implementing four security controls in a hospital datacenter infrastructure (ISO27002), and describes the security assessment for implementing such controls.

  9. Realizing situation awareness within a cyber environment

    NASA Astrophysics Data System (ADS)

    Tadda, George; Salerno, John J.; Boulware, Douglas; Hinman, Michael; Gorton, Samuel

    2006-04-01

    Situation Awareness (SA) problems all require an understanding of current activities, an ability to anticipate what may happen next, and techniques to analyze the threat or impact of current activities and predictions. These processes of SA are common regardless of the domain and can be applied to the detection of cyber attacks. This paper will describe the application of a SA framework to implementing Cyber SA, describe some metrics for measuring and evaluating systems implementing Cyber SA, and discuss ongoing work in this area. We conclude with some ideas for future activities.

  10. Communication: A novel implementation to compute MP2 correlation energies without basis set superposition errors and complete basis set extrapolation.

    PubMed

    Dixit, Anant; Claudot, Julien; Lebègue, Sébastien; Rocca, Dario

    2017-06-07

    By using a formulation based on the dynamical polarizability, we propose a novel implementation of second-order Møller-Plesset perturbation (MP2) theory within a plane wave (PW) basis set. Because of the intrinsic properties of PWs, this method is not affected by basis set superposition errors. Additionally, results are converged without relying on complete basis set extrapolation techniques; this is achieved by using the eigenvectors of the static polarizability as an auxiliary basis set to compactly and accurately represent the response functions involved in the MP2 equations. Summations over the large number of virtual states are avoided by using a formalism inspired by density functional perturbation theory, and the Lanczos algorithm is used to include dynamical effects. To demonstrate this method, applications to three weakly interacting dimers are presented.

  11. Mitigating amphibian chytridiomycoses in nature.

    PubMed

    Garner, Trenton W J; Schmidt, Benedikt R; Martel, An; Pasmans, Frank; Muths, Erin; Cunningham, Andrew A; Weldon, Che; Fisher, Matthew C; Bosch, Jaime

    2016-12-05

    Amphibians across the planet face the threat of population decline and extirpation caused by the disease chytridiomycosis. Despite consensus that the fungal pathogens responsible for the disease are conservation issues, strategies to mitigate their impacts in the natural world are, at best, nascent. Reducing risk associated with the movement of amphibians, non-amphibian vectors and other sources of infection remains the first line of defence and a primary objective when mitigating the threat of disease in wildlife. Amphibian-associated chytridiomycete fungi and chytridiomycosis are already widespread, though, and we therefore focus on discussing options for mitigating the threats once disease emergence has occurred in wild amphibian populations. All strategies have shortcomings that need to be overcome before implementation, including stronger efforts towards understanding and addressing ethical and legal considerations. Even if these issues can be dealt with, all currently available approaches, or those under discussion, are unlikely to yield the desired conservation outcome of disease mitigation. The decision process for establishing mitigation strategies requires integrated thinking that assesses disease mitigation options critically and embeds them within more comprehensive strategies for the conservation of amphibian populations, communities and ecosystems.This article is part of the themed issue 'Tackling emerging fungal threats to animal health, food security and ecosystem resilience'. © 2016 The Author(s).

  12. Mitigating amphibian chytridiomycoses in nature

    PubMed Central

    Martel, An; Pasmans, Frank; Muths, Erin; Cunningham, Andrew A.; Weldon, Che; Bosch, Jaime

    2016-01-01

    Amphibians across the planet face the threat of population decline and extirpation caused by the disease chytridiomycosis. Despite consensus that the fungal pathogens responsible for the disease are conservation issues, strategies to mitigate their impacts in the natural world are, at best, nascent. Reducing risk associated with the movement of amphibians, non-amphibian vectors and other sources of infection remains the first line of defence and a primary objective when mitigating the threat of disease in wildlife. Amphibian-associated chytridiomycete fungi and chytridiomycosis are already widespread, though, and we therefore focus on discussing options for mitigating the threats once disease emergence has occurred in wild amphibian populations. All strategies have shortcomings that need to be overcome before implementation, including stronger efforts towards understanding and addressing ethical and legal considerations. Even if these issues can be dealt with, all currently available approaches, or those under discussion, are unlikely to yield the desired conservation outcome of disease mitigation. The decision process for establishing mitigation strategies requires integrated thinking that assesses disease mitigation options critically and embeds them within more comprehensive strategies for the conservation of amphibian populations, communities and ecosystems. This article is part of the themed issue ‘Tackling emerging fungal threats to animal health, food security and ecosystem resilience’. PMID:28080996

  13. Method for detecting and avoiding flight hazards

    NASA Astrophysics Data System (ADS)

    von Viebahn, Harro; Schiefele, Jens

    1997-06-01

    Today's aircraft equipment comprise several independent warning and hazard avoidance systems like GPWS, TCAS or weather radar. It is the pilot's task to monitor all these systems and take the appropriate action in case of an emerging hazardous situation. The developed method for detecting and avoiding flight hazards combines all potential external threats for an aircraft into a single system. It is based on an aircraft surrounding airspace model consisting of discrete volume elements. For each element of the volume the threat probability is derived or computed from sensor output, databases, or information provided via datalink. The position of the own aircraft is predicted by utilizing a probability distribution. This approach ensures that all potential positions of the aircraft within the near future are considered while weighting the most likely flight path. A conflict detection algorithm initiates an alarm in case the threat probability exceeds a threshold. An escape manoeuvre is generated taking into account all potential hazards in the vicinity, not only the one which caused the alarm. The pilot gets a visual information about the type, the locating, and severeness o the threat. The algorithm was implemented and tested in a flight simulator environment. The current version comprises traffic, terrain and obstacle hazards avoidance functions. Its general formulation allows an easy integration of e.g. weather information or airspace restrictions.

  14. Algorithmic transformation of multi-loop master integrals to a canonical basis with CANONICA

    NASA Astrophysics Data System (ADS)

    Meyer, Christoph

    2018-01-01

    The integration of differential equations of Feynman integrals can be greatly facilitated by using a canonical basis. This paper presents the Mathematica package CANONICA, which implements a recently developed algorithm to automatize the transformation to a canonical basis. This represents the first publicly available implementation suitable for differential equations depending on multiple scales. In addition to the presentation of the package, this paper extends the description of some aspects of the algorithm, including a proof of the uniqueness of canonical forms up to constant transformations.

  15. Eye movement responses to health messages on cigarette packages

    PubMed Central

    2012-01-01

    Background While the majority of the health messages on cigarette packages contain threatening health information, previous studies indicate that risk information can trigger defensive reactions, especially when the information is self-relevant (i.e., smokers). Providing coping information, information that provides help for quitting smoking, might increase attention to health messages instead of triggering defensive reactions. Methods Eye-movement registration can detect attention preferences for different health education messages over a longer period of time during message exposure. In a randomized, experimental study with 23 smoking and 41 non-smoking student volunteers, eye-movements were recorded for sixteen self-created cigarette packages containing health texts that presented either high risk or coping information combined with a high threat or a low threat smoking-related photo. Results Results of the eye movement data showed that smokers tend to spend more time looking (i.e., more unique fixations and longer dwell time) at the coping information than at the high risk information irrespective of the content of the smoking-related photo. Non-smokers tend to spend more time looking at the high risk information than at the coping information when the information was presented in combination with a high threat smoking photo. When a low threat photo was presented, non-smokers paid more attention to the coping information than to the high risk information. Results for the smoking photos showed more attention allocation for low threat photos that were presented in combination with high risk information than for low threat photos in combination with coping information. No attention differences were found for the high threat photos. Conclusions Non-smokers demonstrated an attention preference for high risk information as opposed to coping information, but only when text information was presented in combination with a high threat photo. For smokers, however, our findings suggest more attention allocation for coping information than for health risk information. This preference for coping information is not reflected in current health messages to motivate smokers to quit smoking. Coping information should be more frequently implemented in health message design to increase attention for these messages and thus contribute to effective persuasion. PMID:22583956

  16. Eye movement responses to health messages on cigarette packages.

    PubMed

    Kessels, Loes T E; Ruiter, Robert A C

    2012-05-14

    While the majority of the health messages on cigarette packages contain threatening health information, previous studies indicate that risk information can trigger defensive reactions, especially when the information is self-relevant (i.e., smokers). Providing coping information, information that provides help for quitting smoking, might increase attention to health messages instead of triggering defensive reactions. Eye-movement registration can detect attention preferences for different health education messages over a longer period of time during message exposure. In a randomized, experimental study with 23 smoking and 41 non-smoking student volunteers, eye-movements were recorded for sixteen self-created cigarette packages containing health texts that presented either high risk or coping information combined with a high threat or a low threat smoking-related photo. Results of the eye movement data showed that smokers tend to spend more time looking (i.e., more unique fixations and longer dwell time) at the coping information than at the high risk information irrespective of the content of the smoking-related photo. Non-smokers tend to spend more time looking at the high risk information than at the coping information when the information was presented in combination with a high threat smoking photo. When a low threat photo was presented, non-smokers paid more attention to the coping information than to the high risk information. Results for the smoking photos showed more attention allocation for low threat photos that were presented in combination with high risk information than for low threat photos in combination with coping information. No attention differences were found for the high threat photos. Non-smokers demonstrated an attention preference for high risk information as opposed to coping information, but only when text information was presented in combination with a high threat photo. For smokers, however, our findings suggest more attention allocation for coping information than for health risk information. This preference for coping information is not reflected in current health messages to motivate smokers to quit smoking. Coping information should be more frequently implemented in health message design to increase attention for these messages and thus contribute to effective persuasion.

  17. The basis of shooter biases: beyond cultural stereotypes.

    PubMed

    Miller, Saul L; Zielaskowski, Kate; Plant, E Ashby

    2012-10-01

    White police officers and undergraduate students mistakenly shoot unarmed Black suspects more than White suspects on computerized shoot/don't shoot tasks. This bias is typically attributed to cultural stereotypes of Black men. Yet, previous research has not examined whether such biases emerge even in the absence of cultural stereotypes. The current research investigates whether individual differences in chronic beliefs about interpersonal threat interact with target group membership to elicit shooter biases, even when group membership is unrelated to race or cultural stereotypes about danger. Across two studies, participants with strong beliefs about interpersonal threats were more likely to mistakenly shoot outgroup members than ingroup members; this was observed for unfamiliar, arbitrarily formed groups using a minimal group paradigm (Study 1) and racial groups not culturally stereotyped as dangerous (Asians; Study 2). Implications for the roles of both group membership and cultural stereotypes in shaping decisions to shoot are discussed.

  18. Approaching the basis set limit for DFT calculations using an environment-adapted minimal basis with perturbation theory: Formulation, proof of concept, and a pilot implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mao, Yuezhi; Horn, Paul R.; Mardirossian, Narbe

    2016-07-28

    Recently developed density functionals have good accuracy for both thermochemistry (TC) and non-covalent interactions (NC) if very large atomic orbital basis sets are used. To approach the basis set limit with potentially lower computational cost, a new self-consistent field (SCF) scheme is presented that employs minimal adaptive basis (MAB) functions. The MAB functions are optimized on each atomic site by minimizing a surrogate function. High accuracy is obtained by applying a perturbative correction (PC) to the MAB calculation, similar to dual basis approaches. Compared to exact SCF results, using this MAB-SCF (PC) approach with the same large target basis set producesmore » <0.15 kcal/mol root-mean-square deviations for most of the tested TC datasets, and <0.1 kcal/mol for most of the NC datasets. The performance of density functionals near the basis set limit can be even better reproduced. With further improvement to its implementation, MAB-SCF (PC) is a promising lower-cost substitute for conventional large-basis calculations as a method to approach the basis set limit of modern density functionals.« less

  19. An implementation of the QMR method based on coupled two-term recurrences

    NASA Technical Reports Server (NTRS)

    Freund, Roland W.; Nachtigal, Noeel M.

    1992-01-01

    The authors have proposed a new Krylov subspace iteration, the quasi-minimal residual algorithm (QMR), for solving non-Hermitian linear systems. In the original implementation of the QMR method, the Lanczos process with look-ahead is used to generate basis vectors for the underlying Krylov subspaces. In the Lanczos algorithm, these basis vectors are computed by means of three-term recurrences. It has been observed that, in finite precision arithmetic, vector iterations based on three-term recursions are usually less robust than mathematically equivalent coupled two-term vector recurrences. This paper presents a look-ahead algorithm that constructs the Lanczos basis vectors by means of coupled two-term recursions. Implementation details are given, and the look-ahead strategy is described. A new implementation of the QMR method, based on this coupled two-term algorithm, is described. A simplified version of the QMR algorithm without look-ahead is also presented, and the special case of QMR for complex symmetric linear systems is considered. Results of numerical experiments comparing the original and the new implementations of the QMR method are reported.

  20. Superfund record of decision (EPA region 10): Idaho National Engineering Lab, (USDOE) Operable Unit 26 (Stationary Low-Power Reactor-1 and Boiling Water Reactor Experiment-I Burial Grounds), Idaho Falls, ID, December 1, 1995

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-03-01

    This document presents the selected remedial action for the Stationary Low-Power Reactor-1 (SL-1) burial ground, the Boiling Water Reactor Experiment-I (BORAX-I) burial ground, and 10 no action sites in Waste Area Group 5. Actual or threatened releases of hazardous substances from the SL-1 and BORAX-I burial grounds, if not addressed by implementing the response action selected in this Record of Decision, may present a current or potential threat to public health, welfare, or the environment. The 10 no action sites do not present a threat to human health or the environment.

  1. Administrative Challenges to the Integration of Oral Health With Primary Care: A SWOT Analysis of Health Care Executives at Federally Qualified Health Centers.

    PubMed

    Norwood, Connor W; Maxey, Hannah L; Randolph, Courtney; Gano, Laura; Kochhar, Komal

    Inadequate access to preventive oral health services contributes to oral health disparities and is a major public health concern in the United States. Federally Qualified Health Centers play a critical role in improving access to care for populations affected by oral health disparities but face a number of administrative challenges associated with implementation of oral health integration models. We conducted a SWOT (strengths, weaknesses, opportunities, and threats) analysis with health care executives to identify strengths, weaknesses, opportunities, and threats of successful oral health integration in Federally Qualified Health Centers. Four themes were identified: (1) culture of health care organizations; (2) operations and administration; (3) finance; and (4) workforce.

  2. Micrometeoroid and Orbital Debris Threat Mitigation Techniques for the Space Shuttle Orbiter

    NASA Technical Reports Server (NTRS)

    Hyde, James L.; Christiansen, Eric L.; Lear, Dana M.; Kerr, Justin H.

    2009-01-01

    An overview of significant Micrometeoroid and Orbital Debris (MMOD) impacts on the Payload Bay Door radiators, wing leading edge reinforced carbon-carbon panels and crew module windows will be presented, along with a discussion of the techniques NASA has implemented to reduce the risk from MMOD impacts. The concept of "Late Inspection" of the Nose Cap and Wing leading Edge (WLE) Reinforced Carbon Carbon (RCC) regions will be introduced. An alternative mated attitude with the International Space Station (ISS) on shuttle MMOD risk will also be presented. The significant threat mitigation effect of these two techniques will be demonstrated. The wing leading edge impact detection system, on-orbit repair techniques and disabled vehicle contingency plans will also be discussed.

  3. "Fighting a hurricane": tobacco industry efforts to counter the perceived threat of Islam.

    PubMed

    Petticrew, Mark; Lee, Kelley; Ali, Haider; Nakkash, Rima

    2015-06-01

    Islamic countries are of key importance to transnational tobacco companies as growing markets with increasing smoking rates. We analyzed internal tobacco industry documents to assess the industry's response to rising concerns about tobacco use within Islamic countries. The tobacco industry perceived Islam as a significant threat to its expansion into these emerging markets. To counter these concerns, the industry framed antismoking views in Islamic countries as fundamentalist and fanatical and attempted to recruit Islamic consultants to portray smoking as acceptable. Tobacco industry lawyers also helped develop theological arguments in favor of smoking. These findings are valuable to researchers and policymakers seeking to implement culturally appropriate measures in Islamic countries under the World Health Organization Framework Convention on Tobacco Control.

  4. 45 CFR 79.1 - Basis and purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Basis and purpose. 79.1 Section 79.1 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES § 79.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Pub. L...

  5. Novel data visualizations of X-ray data for aviation security applications using the Open Threat Assessment Platform (OTAP)

    NASA Astrophysics Data System (ADS)

    Gittinger, Jaxon M.; Jimenez, Edward S.; Holswade, Erica A.; Nunna, Rahul S.

    2017-02-01

    This work will demonstrate the implementation of a traditional and non-traditional visualization of x-ray images for aviation security applications that will be feasible with open system architecture initiatives such as the Open Threat Assessment Platform (OTAP). Anomalies of interest to aviation security are fluid, where characteristic signals of anomalies of interest can evolve rapidly. OTAP is a limited scope open architecture baggage screening prototype that intends to allow 3rd-party vendors to develop and easily implement, integrate, and deploy detection algorithms and specialized hardware on a field deployable screening technology [13]. In this study, stereoscopic images were created using an unmodified, field-deployed system and rendered on the Oculus Rift, a commercial virtual reality video gaming headset. The example described in this work is not dependent on the Oculus Rift, and is possible using any comparable hardware configuration capable of rendering stereoscopic images. The depth information provided from viewing the images will aid in the detection of characteristic signals from anomalies of interest. If successful, OTAP has the potential to allow for aviation security to become more fluid in its adaptation to the evolution of anomalies of interest. This work demonstrates one example that is easily implemented using the OTAP platform, that could lead to the future generation of ATR algorithms and data visualization approaches.

  6. Interventions for reducing extinction risk in chytridiomycosis-threatened amphibians.

    PubMed

    Scheele, Ben C; Hunter, David A; Grogan, Laura F; Berger, Lee; Kolby, Jon E; McFadden, Michael S; Marantelli, Gerry; Skerratt, Lee F; Driscoll, Don A

    2014-10-01

    Wildlife diseases pose an increasing threat to biodiversity and are a major management challenge. A striking example of this threat is the emergence of chytridiomycosis. Despite diagnosis of chytridiomycosis as an important driver of global amphibian declines 15 years ago, researchers have yet to devise effective large-scale management responses other than biosecurity measures to mitigate disease spread and the establishment of disease-free captive assurance colonies prior to or during disease outbreaks. We examined the development of management actions that can be implemented after an epidemic in surviving populations. We developed a conceptual framework with clear interventions to guide experimental management and applied research so that further extinctions of amphibian species threatened by chytridiomycosis might be prevented. Within our framework, there are 2 management approaches: reducing Batrachochytrium dendrobatidis (the fungus that causes chytridiomycosis) in the environment or on amphibians and increasing the capacity of populations to persist despite increased mortality from disease. The latter approach emphasizes that mitigation does not necessarily need to focus on reducing disease-associated mortality. We propose promising management actions that can be implemented and tested based on current knowledge and that include habitat manipulation, antifungal treatments, animal translocation, bioaugmentation, head starting, and selection for resistance. Case studies where these strategies are being implemented will demonstrate their potential to save critically endangered species. © 2014 Society for Conservation Biology.

  7. Information Technology Certification Training Implementation: Exploratory Case Study of Air Force and Civilian Leaders Experiences

    ERIC Educational Resources Information Center

    Munn, Jamie E.

    2017-01-01

    Military leaders, both active duty and General Schedule (GS), must understand cyber warfare with its environmental connections and rapid evolution while finding ways to develop strategies that may lessen threats and attacks to government infrastructure. The Department of Defense (DoD) sought training and certification programs from the civilian…

  8. 40 CFR 300.440 - Procedures for planning and implementing off-site response actions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... under section 311 of the Clean Water Act where the release poses an immediate and significant threat to... to CERCLA wastes from cleanup actions based on CERCLA decision documents signed or consent decrees lodged after October 17, 1986 (“post-SARA CERCLA wastes”) as well as those based on CERCLA decision...

  9. Environmental Management Systems for Educational Institutions: A Case Study of Teri University, New Delhi

    ERIC Educational Resources Information Center

    Jain, Suresh; Pant, Pallavi

    2010-01-01

    Purpose: The purpose of this paper is to put forth a model for implementation of an environmental management system (EMS) in institutes of higher education in India. Design/methodology/approach: The authors carried out initial environmental review (IER) and strengths, weaknesses, opportunities and threats (SWOT) analysis to identify the major…

  10. Current SWD IPM tactics and their practical implementation in fruit crops across different regions around the world

    USDA-ARS?s Scientific Manuscript database

    Since its first detection in 2008, the spotted wing drosophila (SWD), Drosophila suzukii, has emerged as an important invasive insect pest in North America and Europe. The highly polyphagous fly is a major threat to many economically important small fruit crops including cherries and berries. It i...

  11. Great Basin Factsheet Series 2016 - Information and tools to restore and conserve Great Basin ecosystems

    Treesearch

    Jeanne C. Chambers

    2016-01-01

    Land managers are responsible for developing effective strategies for conserving and restoring Great Basin ecosystems in the face of invasive species, conifer expansion, and altered fire regimes. A warming climate is magnifying the effects of these threats and adding urgency to implementation of management practices that will maintain or improve ecosystem...

  12. "Advances in Linked Air Quality, Farm Management and Biogeochemistry Models to Address Bidrectional Ammonia Flux in CMAQ"

    EPA Science Inventory

    Recent increases in anthropogenic inputs of nitrogen to air, land and water media pose a growing threat to human health and ecosystems. Modeling of air-surface N flux is one area in need of improvement. Implementation of a linked air quality and cropland management system is de...

  13. Threats to Inclusive Education in Lesotho: An Overview of Policy and Implementation Challenges

    ERIC Educational Resources Information Center

    Mosia, Paseka Andrew

    2014-01-01

    This study looks at how the education of Learners with Special Education Needs (LSEN) has developed in Lesotho as a result of international policies on human rights and education. In particular, it explores various challenges to inclusive education such as proper understanding of inclusive education, the development of a policy on special and…

  14. The role of landscape connectivity in planning and implementing conservation and restoration priorities

    Treesearch

    Deborah A. Rudnick; Sadie J. Ryan; Paul Beier; Samuel A. Cushman; Fred Dieffenbach; Clinton W. Epps; Leah R. Gerber; Joel Hartter; Jeff S. Jenness; Julia Kintsch; Adina M. Merenlender; Ryan M. Perkl; Damian V. Preziosi; Stephen C. Trombulak

    2012-01-01

    Landscape connectivity, the extent to which a landscape facilitates the movements of organisms and their genes, faces critical threats from both fragmentation and habitat loss. Many conservation efforts focus on protecting and enhancing connectivity to offset the impacts of habitat loss and fragmentation on biodiversity conservation, and to increase the resilience of...

  15. To Test or Not to Test? Drug Testing Teachers: The View of the Superintendent

    ERIC Educational Resources Information Center

    DeMitchell, Todd A.; Kossakoski, Stephen; Baldasaro, Tony

    2008-01-01

    Purpose: School superintendents are charged with maintaining the safety and security of the schools in their district. One major recognized threat to the security and safety of students and staff is the use of illegal drugs. Superintendents are responding to the constitutionality of student drug-testing policies by implementing drug-testing…

  16. Consequence Management - Ready or Not?

    DTIC Science & Technology

    2003-04-07

    Defense will have sufficient capability and be ready to respond to a Weapons of Mass Destruction/ Effects attack. An effective consequence management...Defense adopts the National Military Strategy and its consequence management approach, it must identify Weapons of Mass Destruction/ Effects threats...that the Department of Defense: develop Weapons of Mass Destruction/ Effects performance standards for response assets; implement a consequence

  17. Participatory Educational Design: How to Improve Mutual Learning and the Quality and Usability of the Design?

    ERIC Educational Resources Information Center

    Janssen, Fred J. J. M.; Könings, Karen D.; van Merriënboer, Jeroen J. G.

    2017-01-01

    Many educational change proposals, designed to improve student learning, fail to be implemented in classrooms, which is a threat to the impact of educational policy on educational practice. This has led to a call for participatory educational design in which different stakeholders are involved in the generation and consideration of alternative…

  18. 75 FR 522 - National Emission Standards for Hazardous Air Pollutants: Area Source Standards for Prepared...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... to what constitutes the generally available control technology or management practices for the area... area sources, pose the greatest threat to public health in the largest number of urban areas. EPA implemented this provision in 1999 in the Integrated Urban Air Toxics Strategy, (64 FR 38715, July 19, 1999...

  19. Fostering Good Governance at School Level in Honduras: The Role of Transparency Bulletin Boards

    ERIC Educational Resources Information Center

    Boehm, Frédéric; Caprio, Temby

    2014-01-01

    Corruption is at the core of weak governance. In the education sector, corruption is a threat to the quality of and access to education. Although the diagnosis is straightforward, effective reforms are more difficult to implement. The principles of good governance (transparency, participation, accountability, and integrity) provide us guidance,…

  20. Seeing the bigger picture: multi-partner spruce restoration in the central and southern Appalachian mountains

    Treesearch

    Jack Tribble; Thomas Minney; Catherine Johnson; Ken. Sturm

    2010-01-01

    Habitat-based ecosystem partnerships are necessary for implementing strategic forest restoration plans. Overwhelming environmental threats such as climate change and invasive pests and pathogens could have traumatic and devastating effects to our native forests. Additionally, past land-use history has left existing forests isolated, fragmented and in some cases...

  1. Reducing fuels in the wildland urban interface: Community perceptions of agency fuels treatments

    Treesearch

    Eric Toman; Melanie Stidham; Bruce Shindler; Sarah McCaffrey

    2011-01-01

    Wildland fires and resulting effects have increased in recent years. Efforts are under way nationwide to proactively manage vegetative conditions to reduce the threat of wildland fires. Public support is critical to the successful implementation of fuels reduction programs, particularly at the wildland-urban interface. This study examines public acceptance of fuels...

  2. Advances in Linked Air Quality, Farm Management and Biogeochemistry Models to Address Bidirectional Ammonia Flux in CMAQ

    EPA Science Inventory

    Recent increases in anthropogenic inputs of nitrogen to air, land and water media pose a growing threat to human health and ecosystems. Modeling of air-surface N flux is one area in need of improvement. Implementation of a linked air quality and cropland management system is de...

  3. Helmets: A Threat to the Preservation of Women's Lacrosse

    ERIC Educational Resources Information Center

    Bull, Ashley; Cavanaugh, Lauren

    2016-01-01

    A recent debate has raised controversy over the implementation of helmets in the game of women's lacrosse. Women have been participating in this game of finesse and skill without the need for safety equipment, yet in the past decade goggles have been mandated to compensate for the technological advancements in equipment that has increased the…

  4. Public School Practices for Violence Prevention and Reduction: 2003-04. Issue Brief. NCES 2007-010

    ERIC Educational Resources Information Center

    Jekielek, Susan; Brown, Brett; Marin, Pilar; Lippman, Laura

    2007-01-01

    School violence can lead to a disruptive and threatening environment, physical injury, and emotional stress, all of which can be obstacles to student achievement. Educators have responded to the perceived threat of school violence by implementing programs designed to prevent, deter, and respond to the potential for violence in schools. In…

  5. An Overview of the Technical Basis of HENRE 2.0 Models

    DTIC Science & Technology

    2015-08-01

    Defense Threat Reduction Agency 8725 John J . Kingman Road, MS-6201 Fort Belvoir, VA 22060-6201...Agency 8725 John J . Kingman Road, Mail Stop 6201 Fort Belvoir, VA 22060-6201 DTRA J9NTSN DTRA-TR-15-070 DISTRIBUTION A. Approved for public release...10–19 joule ( J ) erg 1 × 10–7 joule ( J ) kiloton (kT) (TNT equivalent) 4.184 × 1012 joule ( J ) British thermal unit (Btu) (thermochemical) 1.054 350

  6. A Multi-Level Examination of Stakeholder Perspectives of Implementation of Evidence-Based Practices in a Large Urban Publicly-Funded Mental Health System

    PubMed Central

    Beidas, Rinad S.; Stewart, Rebecca E.; Adams, Danielle R.; Fernandez, Tara; Lustbader, Susanna; Powell, Byron J.; Aarons, Gregory; Hoagwood, Kimberly E.; Evans, Arthur C.; Hurford, Matthew O.; Rubin, Ronnie; Hadley, Trevor; Mandell, David; Barg, Frances

    2015-01-01

    Our goal was to identify barriers and facilitators to the implementation of evidence-based practices from the perspectives of multiple stakeholders in a large publicly funded mental health system. We completed 56 interviews with three stakeholder groups: treatment developers (n = 7), agency administrators (n = 33), and system leadership (n = 16). The three stakeholder groups converged on the importance of inner (e.g., agency competing resources and demands, therapist educational background) and outer context (e.g., funding) factors as barriers to implementation. Potential threats to implementation and sustainability included the fiscal landscape of community mental health clinics and an evolving workforce. Intervention characteristics were rarely endorsed as barriers. Inner context, outer context, and intervention characteristics were all seen as important facilitators. All stakeholders endorsed the importance of coordinated collaboration across stakeholder groups within the system to successfully implement evidence-based practices. PMID:26658692

  7. Benchmark of Ab Initio Bethe-Salpeter Equation Approach with Numeric Atom-Centered Orbitals

    NASA Astrophysics Data System (ADS)

    Liu, Chi; Kloppenburg, Jan; Kanai, Yosuke; Blum, Volker

    The Bethe-Salpeter equation (BSE) approach based on the GW approximation has been shown to be successful for optical spectra prediction of solids and recently also for small molecules. We here present an all-electron implementation of the BSE using numeric atom-centered orbital (NAO) basis sets. In this work, we present benchmark of BSE implemented in FHI-aims for low-lying excitation energies for a set of small organic molecules, the well-known Thiel's set. The difference between our implementation (using an analytic continuation of the GW self-energy on the real axis) and the results generated by a fully frequency dependent GW treatment on the real axis is on the order of 0.07 eV for the benchmark molecular set. We study the convergence behavior to the complete basis set limit for excitation spectra, using a group of valence correlation consistent NAO basis sets (NAO-VCC-nZ), as well as for standard NAO basis sets for ground state DFT with extended augmentation functions (NAO+aug). The BSE results and convergence behavior are compared to linear-response time-dependent DFT, where excellent numerical convergence is shown for NAO+aug basis sets.

  8. Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duren, Mike; Aldridge, Hal; Abercrombie, Robert K

    2013-01-01

    Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution andmore » management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.« less

  9. Rational Design of Broad Spectrum Antibacterial Activity Based on a Clinically Relevant Enoyl-Acyl Carrier Protein (ACP) Reductase Inhibitor*

    PubMed Central

    Schiebel, Johannes; Chang, Andrew; Shah, Sonam; Lu, Yang; Liu, Li; Pan, Pan; Hirschbeck, Maria W.; Tareilus, Mona; Eltschkner, Sandra; Yu, Weixuan; Cummings, Jason E.; Knudson, Susan E.; Bommineni, Gopal R.; Walker, Stephen G.; Slayden, Richard A.; Sotriffer, Christoph A.; Tonge, Peter J.; Kisker, Caroline

    2014-01-01

    Determining the molecular basis for target selectivity is of particular importance in drug discovery. The ideal antibiotic should be active against a broad spectrum of pathogenic organisms with a minimal effect on human targets. CG400549, a Staphylococcus-specific 2-pyridone compound that inhibits the enoyl-acyl carrier protein reductase (FabI), has recently been shown to possess human efficacy for the treatment of methicillin-resistant Staphylococcus aureus infections, which constitute a serious threat to human health. In this study, we solved the structures of three different FabI homologues in complex with several pyridone inhibitors, including CG400549. Based on these structures, we rationalize the 65-fold reduced affinity of CG400549 toward Escherichia coli versus S. aureus FabI and implement concepts to improve the spectrum of antibacterial activity. The identification of different conformational states along the reaction coordinate of the enzymatic hydride transfer provides an elegant visual depiction of the relationship between catalysis and inhibition, which facilitates rational inhibitor design. Ultimately, we developed the novel 4-pyridone-based FabI inhibitor PT166 that retained favorable pharmacokinetics and efficacy in a mouse model of S. aureus infection with extended activity against Gram-negative and mycobacterial organisms. PMID:24739388

  10. Study of Water Pollution Early Warning Framework Based on Internet of Things

    NASA Astrophysics Data System (ADS)

    Chengfang, H.; Xiao, X.; Dingtao, S.; Bo, C.; Xiongfei, W.

    2016-06-01

    In recent years, with the increasing world environmental pollution happening, sudden water pollution incident has become more and more frequently in China. It has posed a serious threat to water safety of the people living in the water source area. Conventional water pollution monitoring method is manual periodic testing, it maybe miss the best time to find that pollution incident. This paper proposes a water pollution warning framework to change this state. On the basis of the Internet of things, we uses automatic water quality monitoring technology to realize monitoring. We calculate the monitoring data with water pollution model to judge whether the water pollution incident is happen or not. Water pollution warning framework is divided into three layers: terminal as the sensing layer, it with the deployment of the automatic water quality pollution monitoring sensor. The middle layer is the transfer network layer, data information implementation is based on GPRS wireless network transmission. The upper one is the application layer. With these application systems, early warning information of water pollution will realize the high-speed transmission between grassroots units and superior units. The paper finally gives an example that applying this pollution warning framework to water quality monitoring of Beijing, China, it greatly improves the speed of the pollution warning responding of Beijing.

  11. The spread of zoonoses and other infectious diseases through the international trade of animals and animal products.

    PubMed

    Seimenis, Aristarhos M

    2008-01-01

    For trade purposes, ever increasing quantities of food animals and animal products that are transported more rapidly than ever before are contributing to the spread of zoonoses and are creating threats on a permanent basis. Most countries in south-eastern Europe, the Mediterranean and the Middle East are increasing imports of food animals and meat and products of animal origin. They can become potential sources of zoonotic and other infectious diseases if controls are not performed under the most effective conditions. Developing countries with their organisational weakness are particularly vulnerable to fraudulent international trade practices of animals and animal products. To prevent such risks, the World Trade Organization, the World Organisation for Animal Health and their member countries support the measures stipulated in the Sanitary and Phytosanitary Agreement which targets the liberalisation of trade in animals and animal products under specific conditions while protecting public health and national economies. Vigilance must be exercised and appropriate inspection made at points of entry by veterinary and other authorities to ensure the strict implementation of international and national regulations. National legislation, appropriate infrastructures and the respect of international regulations can become barriers to avoid animal trade, contributing to the spread of zoonotic and other infectious diseases.

  12. Rational design of broad spectrum antibacterial activity based on a clinically relevant enoyl-acyl carrier protein (ACP) reductase inhibitor.

    PubMed

    Schiebel, Johannes; Chang, Andrew; Shah, Sonam; Lu, Yang; Liu, Li; Pan, Pan; Hirschbeck, Maria W; Tareilus, Mona; Eltschkner, Sandra; Yu, Weixuan; Cummings, Jason E; Knudson, Susan E; Bommineni, Gopal R; Walker, Stephen G; Slayden, Richard A; Sotriffer, Christoph A; Tonge, Peter J; Kisker, Caroline

    2014-06-06

    Determining the molecular basis for target selectivity is of particular importance in drug discovery. The ideal antibiotic should be active against a broad spectrum of pathogenic organisms with a minimal effect on human targets. CG400549, a Staphylococcus-specific 2-pyridone compound that inhibits the enoyl-acyl carrier protein reductase (FabI), has recently been shown to possess human efficacy for the treatment of methicillin-resistant Staphylococcus aureus infections, which constitute a serious threat to human health. In this study, we solved the structures of three different FabI homologues in complex with several pyridone inhibitors, including CG400549. Based on these structures, we rationalize the 65-fold reduced affinity of CG400549 toward Escherichia coli versus S. aureus FabI and implement concepts to improve the spectrum of antibacterial activity. The identification of different conformational states along the reaction coordinate of the enzymatic hydride transfer provides an elegant visual depiction of the relationship between catalysis and inhibition, which facilitates rational inhibitor design. Ultimately, we developed the novel 4-pyridone-based FabI inhibitor PT166 that retained favorable pharmacokinetics and efficacy in a mouse model of S. aureus infection with extended activity against Gram-negative and mycobacterial organisms. © 2014 by The American Society for Biochemistry and Molecular Biology, Inc.

  13. Accountable care organizations and radiology: threat or opportunity?

    PubMed

    Abramson, Richard G; Berger, Paul E; Brant-Zawadzki, Michael N

    2012-12-01

    Although the anticipated rise of accountable care organizations brings certain potential threats to radiologists, including direct threats to revenue and indirect systemic changes jeopardizing the bargaining leverage of radiology groups, accountable care organizations, and other integrated health care delivery models may provide radiology with an important opportunity to reassert its leadership and assume a more central role within health care systems. Capitalizing on this potential opportunity, however, will require radiology groups to abandon the traditional "film reader" mentality and engage actively in the design and implementation of nontraditional systems service lines aimed at adding differentiated value to larger health care organizations. Important interlinked and mutually reinforcing components of systems service lines, derived from radiology's core competencies, may include utilization management and decision support, IT leadership, quality and safety assurance, and operational enhancements to meet organizational goals. Such systems-oriented service products, tailored to the needs of individual integrated care entities and supported by objective performance metrics, may provide market differentiation to shield radiology from commoditization and could become an important source of new nonclinical revenue. Copyright © 2012 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  14. 78 FR 45405 - Endangered and Threatened Wildlife and Plants; Reclassification of Acmispon dendroideus

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ...We, the U.S. Fish and Wildlife Service (Service), are reclassifying Acmispon dendroideus var. traskiae (San Clemente Island lotus) and Castilleja grisea (San Clemente Island paintbrush) from endangered to threatened. The endangered designation no longer correctly reflects the status of these plants due to substantial improvement in their status. This action is based on a review of the best available scientific and commercial data, which indicate that the ongoing threats are not of sufficient imminence, intensity, or magnitude to indicate that A. d. var. traskiae and C. grisea are presently in danger of extinction across their ranges. While both taxa will continue to be impacted by military training activities and land use, erosion, nonnative plants, and fire, the significant increase in abundance (number of occurrences) of both taxa reduces the severity and magnitude of threats and the likelihood that any one event would affect all occurrences of either taxon. Additionally, the Department of the Navy (Navy) is implementing conservation actions through their Integrated Natural Resources Management Plan and has successfully reduced threats impacting both taxa and their habitat.

  15. Development of a matrix to evaluate the threat of biological agents used for bioterrorism.

    PubMed

    Tegnell, A; Van Loock, F; Baka, A; Wallyn, S; Hendriks, J; Werner, A; Gouvras, G

    2006-10-01

    Adequate public health preparedness for bioterrorism includes the elaboration of an agreed list of biological and chemical agents that might be used in an attack or as threats of deliberate release. In the absence of counterterrorism intelligence information, public health authorities can also base their preparedness on the agents for which the national health structures would be most vulnerable. This article aims to describe a logical method and the characteristics of the variables to be brought in a weighing process to reach a priority list for preparedness. The European Union, in the aftermath of the anthrax events of October 2001 in the United States, set up a task force of experts from multiple member states to elaborate and implement a health security programme. One of the first tasks of this task force was to come up with a list of priority threats. The model, presented here, allows Web-based updates for newly identified agents and for the changes occurring in preventive measures for agents already listed. The same model also allows the identification of priority protection action areas.

  16. SPCC- Software Elements for Security Partition Communication Controller

    NASA Astrophysics Data System (ADS)

    Herpel, H. J.; Willig, G.; Montano, G.; Tverdyshev, S.; Eckstein, K.; Schoen, M.

    2016-08-01

    Future satellite missions like Earth Observation, Telecommunication or any other kind are likely to be exposed to various threats aiming at exploiting vulnerabilities of the involved systems and communications. Moreover, the growing complexity of systems coupled with more ambitious types of operational scenarios imply increased security vulnerabilities in the future. In the paper we will describe an architecture and software elements to ensure high level of security on-board a spacecraft. First the threats to the Security Partition Communication Controller (SPCC) will be addressed including the identification of specific vulnerabilities to the SPCC. Furthermore, appropriate security objectives and security requirements are identified to be counter the identified threats. The security evaluation of the SPCC will be done in accordance to the Common Criteria (CC). The Software Elements for SPCC has been implemented on flight representative hardware which consists of two major elements: the I/O board and the SPCC board. The SPCC board provides the interfaces with ground while the I/O board interfaces with typical spacecraft equipment busses. Both boards are physically interconnected by a high speed spacewire (SpW) link.

  17. Newly emergent and future threats of alien species to Pacific birds and ecosystems

    USGS Publications Warehouse

    Loope, Lloyd L.; Howarth, Francis G.; Kraus, Frederick; Pratt, Thane K.

    2001-01-01

    Although the devastating effects of established alien species to Pacific birds and ecosystems are generally well recognized by the avian conservation community, we raise the under appreciated issue of effects of incipient and future invasions. Although special attention to Pacific bird species “on the brink” is to a certain extent appropriate and necessary, a comparable focus on stopping new invasions appears desperately needed. All indications suggest that introductions will escalate with the trend toward ever increasing commerce and unrestricted trade unless stronger preventative measures are implemented very soon. The threat to Pacific island avifaunas from the brown tree snake (Bniga irregularis) is well-known, but as many as several hundred of the world’s snake species, some of which are repeatedly smuggled illegally as pets, might have similar impacts on native birds if transported to Pacific islands. We touch upon a sampling of obviously severe potential future threats, with the hope of raising awareness and resolve to fix the current woefully inadequate system for prevention of and rapid response to new invasions.

  18. Mitigating amphibian chytridiomycosis in nature

    USGS Publications Warehouse

    Garner, Trenton W. J.; Schmidt, Benedikt R.; Martel, An; Pasmans, Frank; Muths, Erin L.; Cunningham, Andrew A.; Weldon, Che; Fisher, Matthew C.; Bosch, Jaime

    2016-01-01

    Amphibians across the planet face the threat of population decline and extirpation caused by the disease chytridiomycosis. Despite consensus that the fungal pathogens responsible for the disease are conservation issues, strategies to mitigate their impacts in the natural world are, at best, nascent. Reducing risk associated with the movement of amphibians, non-amphibian vectors and other sources of infection remains the first line of defence and a primary objective when mitigating the threat of disease in wildlife. Amphibian-associated chytridiomycete fungi and chytridiomycosis are already widespread, though, and we therefore focus on discussing options for mitigating the threats once disease emergence has occurred in wild amphibian populations. All strategies have shortcomings that need to be overcome before implementation, including stronger efforts towards understanding and addressing ethical and legal considerations. Even if these issues can be dealt with, all currently available approaches, or those under discussion, are unlikely to yield the desired conservation outcome of disease mitigation. The decision process for establishing mitigation strategies requires integrated thinking that assesses disease mitigation options critically and embeds them within more comprehensive strategies for the conservation of amphibian populations, communities and ecosystems.

  19. Electrophysiological spatiotemporal dynamics during implicit visual threat processing.

    PubMed

    DeLaRosa, Bambi L; Spence, Jeffrey S; Shakal, Scott K M; Motes, Michael A; Calley, Clifford S; Calley, Virginia I; Hart, John; Kraut, Michael A

    2014-11-01

    Numerous studies have found evidence for corticolimbic theta band electroencephalographic (EEG) oscillations in the neural processing of visual stimuli perceived as threatening. However, varying temporal and topographical patterns have emerged, possibly due to varying arousal levels of the stimuli. In addition, recent studies suggest neural oscillations in delta, theta, alpha, and beta-band frequencies play a functional role in information processing in the brain. This study implemented a data-driven PCA based analysis investigating the spatiotemporal dynamics of electroencephalographic delta, theta, alpha, and beta-band frequencies during an implicit visual threat processing task. While controlling for the arousal dimension (the intensity of emotional activation), we found several spatial and temporal differences for threatening compared to nonthreatening visual images. We detected an early posterior increase in theta power followed by a later frontal increase in theta power, greatest for the threatening condition. There was also a consistent left lateralized beta desynchronization for the threatening condition. Our results provide support for a dynamic corticolimbic network, with theta and beta band activity indexing processes pivotal in visual threat processing. Published by Elsevier Inc.

  20. Protection of SAAO observing site against light and dust pollution

    NASA Astrophysics Data System (ADS)

    Sefako, Ramotholo; Väisänen, Petri

    2016-10-01

    The South African Astronomical Observatory (SAAO) observing station near Sutherland, Northern Cape in South Africa, is one of the darkest sites in the world for optical and IR astronomy. The SAAO hosts and operates several facilities, including the Southern African Large Telescope (SALT) and a number of international robotic telescopes. To ensure that the conditions remain optimal for astronomy, legislation called the Astronomy Geographic Advantage (AGA) Act, of 2007, was enacted. The Act empowers the Department of Science and Technology (DST) to regulate issues that pose a threat to optical and/or radio astronomy in areas declared Astronomy Advantage Areas in South Africa. For optical astronomy, the main challenges are those posed by light and dust pollution as result of wind energy developments, and petroleum gas and oil exploration/exploitation in the area. We give an update of possible threats to the quality of the night skies at SAAO, and the challenges relating to the AGA Act implementation and enforcement. We discuss measures that are put in place to protect the Observatory, including a study to quantify the threat by a planned wind energy facility.

  1. 10 CFR 13.1 - Basis and purpose.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Basis and purpose. 13.1 Section 13.1 Energy NUCLEAR REGULATORY COMMISSION PROGRAM FRAUD CIVIL REMEDIES § 13.1 Basis and purpose. (a) Basis. This part implements the Program Fraud Civil Remedies Act of 1986, Public Law No. 99-509, §§ 6101-6104, 100 Stat. 1874...

  2. 42 CFR 440.300 - Basis.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Basis. 440.300 Section 440.300 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL....300 Basis. This subpart implements section 1937 of the Act, which authorizes States to provide for...

  3. The fear gasping face as a threat display in a Melanesian society

    PubMed Central

    Crivelli, Carlos; Jarillo, Sergio; Fernández-Dols, José-Miguel

    2016-01-01

    Theory and research show that humans attribute both emotions and intentions to others on the basis of facial behavior: A gasping face can be seen as showing “fear” and intent to submit. The assumption that such interpretations are pancultural derives largely from Western societies. Here, we report two studies conducted in an indigenous, small-scale Melanesian society with considerable cultural and visual isolation from the West: the Trobrianders of Papua New Guinea. Our multidisciplinary research team spoke the vernacular and had extensive prior fieldwork experience. In study 1, Trobriand adolescents were asked to attribute emotions, social motives, or both to a set of facial displays. Trobrianders showed a mixed and variable attribution pattern, although with much lower agreement than studies of Western samples. Remarkably, the gasping face (traditionally considered a display of fear and submission in the West) was consistently matched to two unpredicted categories: anger and threat. In study 2, adolescents were asked to select the face that was threatening; Trobrianders chose the “fear” gasping face whereas Spaniards chose an “angry” scowling face. Our findings, consistent with functional approaches to animal communication and observations made on threat displays in small-scale societies, challenge the Western assumption that “fear” gasping faces uniformly express fear or signal submission across cultures. PMID:27791137

  4. Effective protective surveillance for waterside-located chemical plants

    NASA Astrophysics Data System (ADS)

    Love, John; Van Dover, Doug

    2006-05-01

    Millions of citizens live and work in the dangerous proximity of chemical plants, at ports and along waterways, which are under-protected and whose security is under-regulated, according to findings of the Congressional Research Service (CRS). There is a new and intense focus on the security of the nation's critical infrastructure. Thanks to recent philosophy and policy shifts within our federal government, the alarming situations in which we find ourselves will be mitigated somewhat a) by setting priorities based on proper threat analysis that considers event likelihoods and consequential impacts, and b) by employing effective systems design and engineering that will make it possible to address the highest priority threats with affordable solutions. It is the latter concern that we address, especially as it is relates to design and engineering of solutions for maintaining vigilance night and day. We begin by reviewing the nature of the facilities we wish to protect, our assumptions, and an accepted framework for analysis. Next we outline a hypothetical design case involving a representative facility and a plausible design basis threat. We then derive requirements for surveillance and examine the interrelationships among key design variables. Finally, we describe a solution involving multiple sensor types coupled with intelligent video. The end result is a significant increase in interdiction probability with a minimum of required assets.

  5. Leaping eels electrify threats, supporting Humboldt’s account of a battle with horses

    PubMed Central

    Catania, Kenneth C.

    2016-01-01

    In March 1800, Alexander von Humboldt observed the extraordinary spectacle of native fisherman collecting electric eels (Electrophorus electricus) by “fishing with horses” [von Humboldt A (1807) Ann Phys 25:34–43]. The strategy was to herd horses into a pool containing electric eels, provoking the eels to attack by pressing themselves against the horses while discharging. Once the eels were exhausted, they could be safely collected. This legendary tale of South American adventures helped propel Humboldt to fame and has been recounted and illustrated in many publications, but subsequent investigators have been skeptical, and no similar eel behavior has been reported in more than 200 years. Here I report a defensive eel behavior that supports Humboldt’s account. The behavior consists of an approach and leap out of the water during which the eel presses its chin against a threatening conductor while discharging high-voltage volleys. The effect is to short-circuit the electric organ through the threat, with increasing power diverted to the threat as the eel attains greater height during the leap. Measurement of voltages and current during the behavior, and assessment of the equivalent circuit, reveal the effectiveness of the behavior and the basis for its natural selection. PMID:27274074

  6. The Neural Correlates of Emotion Regulation by Implementation Intentions

    PubMed Central

    Hallam, Glyn P.; Webb, Thomas L.; Sheeran, Paschal; Miles, Eleanor; Wilkinson, Iain D.; Hunter, Michael D.; Barker, Anthony T.; Woodruff, Peter W. R.; Totterdell, Peter; Lindquist, Kristen A.; Farrow, Tom F. D.

    2015-01-01

    Several studies have investigated the neural basis of effortful emotion regulation (ER) but the neural basis of automatic ER has been less comprehensively explored. The present study investigated the neural basis of automatic ER supported by ‘implementation intentions’. 40 healthy participants underwent fMRI while viewing emotion-eliciting images and used either a previously-taught effortful ER strategy, in the form of a goal intention (e.g., try to take a detached perspective), or a more automatic ER strategy, in the form of an implementation intention (e.g., “If I see something disgusting, then I will think these are just pixels on the screen!”), to regulate their emotional response. Whereas goal intention ER strategies were associated with activation of brain areas previously reported to be involved in effortful ER (including dorsolateral prefrontal cortex), ER strategies based on an implementation intention strategy were associated with activation of right inferior frontal gyrus and ventro-parietal cortex, which may reflect the attentional control processes automatically captured by the cue for action contained within the implementation intention. Goal intentions were also associated with less effective modulation of left amygdala, supporting the increased efficacy of ER under implementation intention instructions, which showed coupling of orbitofrontal cortex and amygdala. The findings support previous behavioural studies in suggesting that forming an implementation intention enables people to enact goal-directed responses with less effort and more efficiency. PMID:25798822

  7. Commentary: evidence to guide gun violence prevention in America.

    PubMed

    Webster, Daniel W

    2015-03-18

    Gun violence is a major threat to the public's health and safety in the United States. The articles in this volume's symposium on gun violence reveal the scope of the problem and new trends in mortality rates from gunfire. Leading scholars synthesize research evidence that demonstrates the ability of numerous policies and programs-each consistent with lessons learned from successful efforts to combat public health problems-to prevent gun violence. Each approach presents challenges to successful implementation. Future research should inform efforts to assess which approaches are most effective and how to implement evidence-based interventions most effectively.

  8. The Development and Deployment of a Maintenance Operations Safety Survey.

    PubMed

    Langer, Marie; Braithwaite, Graham R

    2016-11-01

    Based on the line operations safety audit (LOSA), two studies were conducted to develop and deploy an equivalent tool for aircraft maintenance: the maintenance operations safety survey (MOSS). Safety in aircraft maintenance is currently measured reactively, based on the number of audit findings, reportable events, incidents, or accidents. Proactive safety tools designed for monitoring routine operations, such as flight data monitoring and LOSA, have been developed predominantly for flight operations. In Study 1, development of MOSS, 12 test peer-to-peer observations were collected to investigate the practicalities of this approach. In Study 2, deployment of MOSS, seven expert observers collected 56 peer-to-peer observations of line maintenance checks at four stations. Narrative data were coded and analyzed according to the threat and error management (TEM) framework. In Study 1, a line check was identified as a suitable unit of observation. Communication and third-party data management were the key factors in gaining maintainer trust. Study 2 identified that on average, maintainers experienced 7.8 threats (operational complexities) and committed 2.5 errors per observation. The majority of threats and errors were inconsequential. Links between specific threats and errors leading to 36 undesired states were established. This research demonstrates that observations of routine maintenance operations are feasible. TEM-based results highlight successful management strategies that maintainers employ on a day-to-day basis. MOSS is a novel approach for safety data collection and analysis. It helps practitioners understand the nature of maintenance errors, promote an informed culture, and support safety management systems in the maintenance domain. © 2016, Human Factors and Ergonomics Society.

  9. Mechanisms of social avoidance learning can explain the emergence of adaptive and arbitrary behavioral traditions in humans.

    PubMed

    Lindström, Björn; Olsson, Andreas

    2015-06-01

    Many nonhuman animals preferentially copy the actions of others when the environment contains predation risk or other types of danger. In humans, the role of social learning in avoidance of danger is still unknown, despite the fundamental importance of social learning for complex social behaviors. Critically, many social behaviors, such as cooperation and adherence to religious taboos, are maintained by threat of punishment. However, the psychological mechanisms allowing threat of punishment to generate such behaviors, even when actual punishment is rare or absent, are largely unknown. To address this, we used both computer simulations and behavioral experiments. First, we constructed a model where simulated agents interacted under threat of punishment and showed that mechanisms' (a) tendency to copy the actions of others through social learning, together with (b) the rewarding properties of avoiding a threatening punishment, could explain the emergence, maintenance, and transmission of large-scale behavioral traditions, both when punishment is common and when it is rare or nonexistent. To provide empirical support for our model, including the 2 mechanisms, we conducted 4 experiments, showing that humans, if threatened with punishment, are exceptionally prone to copy and transmit the behavior observed in others. Our results show that humans, similar to many nonhuman animals, use social learning if the environment is perceived as dangerous. We provide a novel psychological and computational basis for a range of human behaviors characterized by the threat of punishment, such as the adherence to cultural norms and religious taboos. (c) 2015 APA, all rights reserved).

  10. The Development and Deployment of a Maintenance Operations Safety Survey

    PubMed Central

    Langer, Marie; Braithwaite, Graham R.

    2016-01-01

    Objective: Based on the line operations safety audit (LOSA), two studies were conducted to develop and deploy an equivalent tool for aircraft maintenance: the maintenance operations safety survey (MOSS). Background: Safety in aircraft maintenance is currently measured reactively, based on the number of audit findings, reportable events, incidents, or accidents. Proactive safety tools designed for monitoring routine operations, such as flight data monitoring and LOSA, have been developed predominantly for flight operations. Method: In Study 1, development of MOSS, 12 test peer-to-peer observations were collected to investigate the practicalities of this approach. In Study 2, deployment of MOSS, seven expert observers collected 56 peer-to-peer observations of line maintenance checks at four stations. Narrative data were coded and analyzed according to the threat and error management (TEM) framework. Results: In Study 1, a line check was identified as a suitable unit of observation. Communication and third-party data management were the key factors in gaining maintainer trust. Study 2 identified that on average, maintainers experienced 7.8 threats (operational complexities) and committed 2.5 errors per observation. The majority of threats and errors were inconsequential. Links between specific threats and errors leading to 36 undesired states were established. Conclusion: This research demonstrates that observations of routine maintenance operations are feasible. TEM-based results highlight successful management strategies that maintainers employ on a day-to-day basis. Application: MOSS is a novel approach for safety data collection and analysis. It helps practitioners understand the nature of maintenance errors, promote an informed culture, and support safety management systems in the maintenance domain. PMID:27411354

  11. Disrupted expected value signaling in youth with disruptive behavior disorders to environmental reinforcers.

    PubMed

    White, Stuart F; Fowler, Katherine A; Sinclair, Stephen; Schechter, Julia C; Majestic, Catherine M; Pine, Daniel S; Blair, R James

    2014-05-01

    Youth with disruptive behavior disorders (DBD), including conduct disorder (CD) and oppositional defiant disorder (ODD), have difficulties in reinforcement-based decision making, the neural basis of which is poorly understood. Studies examining decision making in youth with DBD have revealed reduced reward responses within the ventromedial prefrontal cortex/orbitofrontal cortex (vmPFC/OFC), increased responses to unexpected punishment within the vmPFC and striatum, and reduced use of expected value information in the anterior insula cortex and dorsal anterior cingulate cortex during the avoidance of suboptimal choices. Previous work has used only monetary reinforcement. The current study examined whether dysfunction in youth with DBD during decision making extended to environmental reinforcers. A total of 30 youth (15 healthy youth and 15 youth with DBD) completed a novel reinforcement-learning paradigm using environmental reinforcers (physical threat images, e.g., striking snake image; contamination threat images, e.g., rotting food; appetitive images, e.g., puppies) while undergoing functional magnetic resonance imaging (fMRI). Behaviorally, healthy youth were significantly more likely to avoid physical threat, but not contamination threat, stimuli than youth with DBD. Imaging results revealed that youth with DBD showed significantly reduced use of expected value information in the bilateral caudate, thalamus, and posterior cingulate cortex during the avoidance of suboptimal responses. The current data suggest that youth with DBD show deficits to environmental reinforcers similar to the deficits seen to monetary reinforcers. Importantly, this deficit was unrelated to callous-unemotional (CU) traits, suggesting that caudate impairment may be a common deficit across youth with DBD. Published by Elsevier Inc.

  12. Implementation of an Industrial-Based Case Study as the Basis for a Design Project in an Introduction to Mechanical Design Course

    ERIC Educational Resources Information Center

    Lackey, Ellen

    2011-01-01

    The purpose of this paper is to discuss the implementation of an industrial-based case study as the basis for a design project for the Spring 2009 Introduction to Mechanical Design Course at the University of Mississippi. Course surveys documented the lack of student exposure in classes to the types of projects typically experienced by engineers…

  13. Overcoming the challenges of secure mobile applications for network-centric, data-sensitive applications

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam; Farroha, Deborah

    2012-05-01

    Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity.

  14. Pathomics: Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turteltaub, K W; Ascher, M; Langlois, R

    Pathomics is a research project to explore the feasibility for developing biosignatures for early infectious disease detection in humans, particularly those that represent a threat from bioterrorism. Our goal is to use a science-based approach to better understand the underlying molecular basis of disease and to find sensitive, robust, and specific combinations of biological molecules (biosignatures) in the host that will indicate the presence of developing infection prior to overt symptoms (pre-syndromic). The ultimate goal is develop a national surveillance system for monitoring for the release and managing the consequences of a biothreat agent or an emerging disease. Developing themore » science for a more comprehensive understanding of the molecular basis of infectious disease and the development of biosignature-based diagnostics could help detect both emerging and engineered treats to humans.« less

  15. [Are virtual worlds a threat to the mental health of children and adolescents?].

    PubMed

    Plusquellec, M

    2000-02-01

    Video games and the Internet cause enthusiasm but also worry. Among the possible risks, addiction (dependency), isolation, retiring within oneself, and loss of reality, are often put forward. Available data show that serious problems remain exceptional and non-specific, and that these new technological supports do not create new pathologies. Excessive use and isolation have to be solved on an educational basis. Nevertheless, virtual reality, whose applications for the general public are still considered part of the future, needs particular attention.

  16. Fire resistivity and toxicity studies of candidate aircraft passenger seat materials

    NASA Technical Reports Server (NTRS)

    Fewell, L. L.; Trabold, E. L.; Spieth, H.

    1978-01-01

    Fire resistivity studies were conducted on a wide range of candidate nonmetallic materials being considered for the construction of improved fire resistant aircraft passenger seats. These materials were evaluated on the basis of FAA airworthiness burn and smoke generation tests, colorfastness, limiting oxygen index, and animal toxicity tests. Physical, mechanical, and aesthetic properties were also assessed. Candidate seat materials that have significantly improved thermal response to various thermal loads corresponding to reasonable fire threats as they relate to in-flight fire situations, are identified.

  17. A holistic approach to a rare pathology.

    PubMed

    Lieberman, Morton; Velez, Ines; Mejia, Lina; Siegel, Michael A

    2010-01-01

    A case of cystic hygroma (CH), a congenital lymph-filled multicystic hamartoma of the neck, with a holistic approach to patient management is presented. The stigma of the CH imposed by attending physicians, dentists, parents, teachers and peers affected the psychological development of this patient since her diagnosis in childhood. Although surgery relieves the threat of airway obstruction and may improve the esthetic appearance of the CH, the patient may be isolated and traumatized by the ignorance and superstitions of the individuals she encounters on a daily basis.

  18. Invasive Plant Management in the United States National Wildlife Refuge

    USGS Publications Warehouse

    Lusk, Michael; Ericson, Jenny

    2011-01-01

    Invasive species pose a significant challenge to the National Wildlife Refuge System and have been identified as the single most important threat to habitat management on refuges. At present, it is estimated that over 2 million acres of refuge lands are invaded by invasive plants. The current and potential costs of controlling invasive plants, as well as monitoring and restoring refuge lands, are significant both financially and ecologically. Budgetary expenditures for invasive species projects in FY 2009 totaled $18.4 million. A number of strategies are used to confront this threat and have resulted in success on a variety of levels. The Refuge System utilizes key partnerships, invasive species strike teams, and a dedicated cadre of volunteers to implement projects that incorporate mechanical, chemical and biological control methods.

  19. Boreal forest health and global change.

    PubMed

    Gauthier, S; Bernier, P; Kuuluvainen, T; Shvidenko, A Z; Schepaschenko, D G

    2015-08-21

    The boreal forest, one of the largest biomes on Earth, provides ecosystem services that benefit society at levels ranging from local to global. Currently, about two-thirds of the area covered by this biome is under some form of management, mostly for wood production. Services such as climate regulation are also provided by both the unmanaged and managed boreal forests. Although most of the boreal forests have retained the resilience to cope with current disturbances, projected environmental changes of unprecedented speed and amplitude pose a substantial threat to their health. Management options to reduce these threats are available and could be implemented, but economic incentives and a greater focus on the boreal biome in international fora are needed to support further adaptation and mitigation actions. Copyright © 2015, American Association for the Advancement of Science.

  20. Potential strategies for the eradication of multidrug-resistant Gram-negative bacterial infections.

    PubMed

    Huwaitat, Rawan; McCloskey, Alice P; Gilmore, Brendan F; Laverty, Garry

    2016-07-01

    Antimicrobial resistance is one of the leading threats to society. The increasing burden of multidrug-resistant Gram-negative infection is particularly concerning as such bacteria are demonstrating resistance to nearly all currently licensed therapies. Various strategies have been hypothesized to treat multidrug-resistant Gram-negative infections including: targeting the Gram-negative outer membrane; neutralization of lipopolysaccharide; inhibition of bacterial efflux pumps and prevention of protein folding. Silver and silver nanoparticles, fusogenic liposomes and nanotubes are potential strategies for extending the activity of licensed, Gram-positive selective, antibiotics to Gram-negatives. This may serve as a strategy to fill the current void in pharmaceutical development in the short term. This review outlines the most promising strategies that could be implemented to solve the threat of multidrug-resistant Gram-negative infections.

  1. SWOT analysis for safer carriage of bulk liquid chemicals in tankers.

    PubMed

    Arslan, Ozcan; Er, Ismail Deha

    2008-06-15

    The application of strengths, weaknesses, opportunities and threats (SWOT) analysis to formulation of strategy concerned with the safe carriage of bulk liquid chemicals in maritime tankers was examined in this study. A qualitative investigation using SWOT analysis has been implemented successfully for ships that are designed to carry liquid chemicals in bulk. The originality of this study lies in the use of SWOT analysis as a management tool to formulate strategic action plans for ship management companies, ship masters and officers for the carriage of dangerous goods in bulk. With this transportation-based SWOT analysis, efforts were made to explore the ways and means of converting possible threats into opportunities, and changing weaknesses into strengths; and strategic plans of action were developed for safer tanker operation.

  2. “Fighting a Hurricane”: Tobacco Industry Efforts to Counter the Perceived Threat of Islam

    PubMed Central

    Lee, Kelley; Ali, Haider; Nakkash, Rima

    2015-01-01

    Islamic countries are of key importance to transnational tobacco companies as growing markets with increasing smoking rates. We analyzed internal tobacco industry documents to assess the industry’s response to rising concerns about tobacco use within Islamic countries. The tobacco industry perceived Islam as a significant threat to its expansion into these emerging markets. To counter these concerns, the industry framed antismoking views in Islamic countries as fundamentalist and fanatical and attempted to recruit Islamic consultants to portray smoking as acceptable. Tobacco industry lawyers also helped develop theological arguments in favor of smoking. These findings are valuable to researchers and policymakers seeking to implement culturally appropriate measures in Islamic countries under the World Health Organization Framework Convention on Tobacco Control. PMID:25880961

  3. 78 FR 40104 - Endangered and Threatened Species; Notice of Intent To Prepare a Recovery Plan for Pacific Eulachon

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-03

    ... Coordinator. Business hours are 8 a.m. to 5 p.m. Monday through Friday, except Federal holidays. Via fax: 503... threats; (b) estimates of the time and cost to implement recovery actions; (c) critical knowledge gaps and/or uncertainties that need to be resolved to better inform recovery efforts; and (d) research...

  4. 77 FR 62139 - Authorizing the Implementation of Certain Sanctions Set Forth in the Iran Threat Reduction and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-12

    ... Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601... this section, and had knowledge that the person engaged in the activities referred to in that... Security Council Travel Bans and International Emergency Economic Powers Act Sanctions). Sec. 11. The...

  5. Countermeasures to Insider Cyber Threats for Turkish General Command of Gendarmerie

    DTIC Science & Technology

    2016-09-01

    problems 12 related to disorder (driving while intoxicated, arrests, debt). (Band et al., 2006, p. 76) Personality problems include “ self - esteem ...expectations of others, arrogance, personal conflicts, fearful of usually routine experiences, compensatory behaviors designed to enhance self - esteem ...rules There are fewer self -employed people Better at invention, worse at implementation Motivation by achievement and esteem or belonging

  6. Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports

    NASA Astrophysics Data System (ADS)

    Auletta, Vincenzo; Blundo, Carlo; de Caro, Angelo; de Cristofaro, Emiliano; Persiano, Giuseppe; Visconti, Ivan

    The recent introduction of electronic passports (e-Passports) motivates the need of a thorough investigation on potential security and privacy issues. In this paper, we focus on the e-Passport implementation adopted in Italy. Leveraging previous attacks to e-Passports adopted in other countries, we analyze (in)security of Italian e-Passports and we investigate additional critical issues.

  7. DoD Cybersecurity Discipline Implementation Plan

    DTIC Science & Technology

    2016-02-01

    provided email services are disabled for commercial mobile devices. N/A Commanders and Supervisors must ensure all servers and network infrastructure ... infrastructure physically and logically. All of these protections come from security measures that are already required. This line of effort supports...networks and critical infrastructure . These threats and risks have been recognized by DoD for several years, and the Department has responded with

  8. Targets, Threats and (dis)Trust: The Managerial Troika for Public School Principals in Chile

    ERIC Educational Resources Information Center

    Montecinos, Carmen; Ahumada, Luis; Galdames, Sergio; Campos, Fabián; Leiva, Maria Verónica

    2015-01-01

    Public education in Chile has been steadily losing students as a result of the implementation, for the last 35 years, of a market model. In this paper we exemplify how a structural problem (public schools' declining enrollment) created by neoliberal educational policies is transformed into an individual problem to be managed by the public school…

  9. Performance of High-Reliability Space-Qualified Processors Implementing Software Defined Radios

    DTIC Science & Technology

    2014-03-01

    ADDRESS(ES) AND ADDRESS(ES) Naval Postgraduate School, Department of Electrical and Computer Engineering, 833 Dyer Road, Monterey, CA 93943-5121 8...Chairman Jeffrey D. Paduan Electrical and Computer Engineering Dean of Research iii THIS PAGE...capability. Radiation in space poses a considerable threat to modern microelectronic devices, in particular to the high-performance low-cost computing

  10. Responsible conduct by life scientists in an age of terrorism.

    PubMed

    Atlas, Ronald M

    2009-09-01

    The potential for dual use of research in the life sciences to be misused for harm raises a range of problems for the scientific community and policy makers. Various legal and ethical strategies are being implemented to reduce the threat of the misuse of research and knowledge in the life sciences by establishing a culture of responsible conduct.

  11. Paradigm Shift: Implementing "MEGA," a New Tool Proposed to Define and Assess Sexually Abusive Dynamics in Youth Ages 19 and Under

    ERIC Educational Resources Information Center

    Rasmussen, Lucinda A.; Miccio-Fonseca, L. C.

    2007-01-01

    Previous definitions of sexually abusive behavior in children and adolescents were deficient in failing to (1) highlight salient neuropsychological elements and antisocial behaviors that may contribute to a youth's functioning; (2) discriminate among possible types of coercion (e.g., manipulation, threats, physical force, and use of weapons); and…

  12. 78 FR 45116 - Approval and Promulgation of Air Quality Implementation Plans and Designation of Areas for Air...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... alternatives. 7. Explain your views as clearly as possible, avoiding the use of profanity or personal threats...-hour PM 2.5 NAAQS. Id. The requirement to submit the section 172(c)(9) contingency measures is... rationale for this view is described in a memorandum from Mary Nichols, Assistant Administrator for Air and...

  13. 78 FR 46816 - Approval and Promulgation of Air Quality Implementation Plans; State of Colorado; Second Ten-Year...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-02

    ... FURTHER INFORMATION CONTACT section to view the hard copy of the docket. You may view the hard copy of the... your views as clearly as possible, avoiding the use of profanity or personal threats. h. Make sure to... Attainment, Contingency Plan, and Conformity Determinations. Below, we describe our evaluation of each of...

  14. Interdisciplinary modeling and analysis to reduce loss of life from tsunamis

    NASA Astrophysics Data System (ADS)

    Wood, N. J.

    2016-12-01

    Recent disasters have demonstrated the significant loss of life and community impacts that can occur from tsunamis. Minimizing future losses requires an integrated understanding of the range of potential tsunami threats, how individuals are specifically vulnerable to these threats, what is currently in place to improve their chances of survival, and what risk-reduction efforts could be implemented. This presentation will provide a holistic perspective of USGS research enabled by recent advances in geospatial modeling to assess and communicate population vulnerability to tsunamis and the range of possible interventions to reduce it. Integrated research includes efforts to characterize the magnitude and demography of at-risk individuals in tsunami-hazard zones, their evacuation potential based on landscape conditions, nature-based mitigation to improve evacuation potential, evacuation pathways and population demand at assembly areas, siting considerations for vertical-evacuation refuges, community implications of multiple evacuation zones, car-based evacuation modeling for distant tsunamis, and projected changes in population exposure to tsunamis over time. Collectively, this interdisciplinary research supports emergency managers in their efforts to implement targeted risk-reduction efforts based on local conditions and needs, instead of generic regional strategies that only focus on hazard attributes.

  15. Security for Multimedia Space Data Distribution over the Internet

    NASA Technical Reports Server (NTRS)

    Stone, Thom; Picinich, Lou; Givens, John J. (Technical Monitor)

    1995-01-01

    Distribution of interactive multimedia to remote investigators will be required for high quality science on the International Space Station (ISS). The Internet with the World Wide Web (WWW) and the JAVA environment are a good match for distribution of data, video and voice to remote science centers. Utilizing the "open" Internet in a secure manner is the major hurdle in making use of this cost effective, off-the-shelf, universal resource. This paper examines the major security threats to an Internet distribution system for payload data and the mitigation of these threats. A proposed security environment for the Space Station Biological Research Facility (SSBRP) is presented with a short description of the tools that have been implemented or planned. Formulating and implementing a security policy, firewalls, host hardware and software security are also discussed in this paper. Security is a vast topic and this paper can only give an overview of important issues. This paper postulates that a structured approach is required and stresses that security must be built into a network from the start. Ignoring security issues or putting them off until late in the development cycle can be disastrous.

  16. Large-Scale Cubic-Scaling Random Phase Approximation Correlation Energy Calculations Using a Gaussian Basis.

    PubMed

    Wilhelm, Jan; Seewald, Patrick; Del Ben, Mauro; Hutter, Jürg

    2016-12-13

    We present an algorithm for computing the correlation energy in the random phase approximation (RPA) in a Gaussian basis requiring [Formula: see text] operations and [Formula: see text] memory. The method is based on the resolution of the identity (RI) with the overlap metric, a reformulation of RI-RPA in the Gaussian basis, imaginary time, and imaginary frequency integration techniques, and the use of sparse linear algebra. Additional memory reduction without extra computations can be achieved by an iterative scheme that overcomes the memory bottleneck of canonical RPA implementations. We report a massively parallel implementation that is the key for the application to large systems. Finally, cubic-scaling RPA is applied to a thousand water molecules using a correlation-consistent triple-ζ quality basis.

  17. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single simulations can be in error. Although these model shortcomings presently limit the precision of lightning threat forecasts from individual runs of current generation models,the techniques proposed herein should continue to be applicable as newer and more accurate physically-based model versions, physical parameterizations, initialization techniques and ensembles of forecasts become available.

  18. An Investigation of Health and Safety Measures in a Hydroelectric Power Plant.

    PubMed

    Acakpovi, Amevi; Dzamikumah, Lucky

    2016-12-01

    Occupational risk management is known as a catalyst in generating superior returns for all stakeholders on a sustainable basis. A number of companies in Ghana implemented health and safety measures adopted from international companies to ensure the safety of their employees. However, there exist great threats to employees' safety in these companies. The purpose of this paper is to investigate the level of compliance of Occupational Health and Safety management systems and standards set by international and local legislation in power producing companies in Ghana. The methodology is conducted by administering questionnaires and in-depth interviews as measuring instruments. A random sampling technique was applied to 60 respondents; only 50 respondents returned their responses. The questionnaire was developed from a literature review and contained questions and items relevant to the initial research problem. A factor analysis was also carried out to investigate the influence of some variables on safety in general. Results showed that the significant factors that influence the safety of employees at the hydroelectric power plant stations are: lack of training and supervision, non-observance of safe work procedures, lack of management commitment, and lack of periodical check on machine operations. The study pointed out the safety loopholes and therefore helped improve the health and safety measures of employees in the selected company by providing effective recommendations. The implementation of the proposed recommendations in this paper, would lead to the prevention of work-related injuries and illnesses of employees as well as property damage and incidents in hydroelectric power plants. The recommendations may equally be considered as benchmark for the Safety and Health Management System with international standards.

  19. Evaluating the Potential Effectiveness of Compensatory Mitigation Strategies for Marine Bycatch

    PubMed Central

    Finkelstein, Myra; Bakker, Victoria; Doak, Daniel F.; Sullivan, Ben; Lewison, Rebecca; Satterthwaite, William H.; McIntyre, Peter B.; Wolf, Shaye; Priddel, David; Arnold, Jennifer M.; Henry, Robert W.; Sievert, Paul; Croxall, John

    2008-01-01

    Conservationists are continually seeking new strategies to reverse population declines and safeguard against species extinctions. Here we evaluate the potential efficacy of a recently proposed approach to offset a major anthropogenic threat to many marine vertebrates: incidental bycatch in commercial fisheries operations. This new approach, compensatory mitigation for marine bycatch (CMMB), is conceived as a way to replace or reduce mandated restrictions on fishing activities with compensatory activities (e.g., removal of introduced predators from islands) funded by levies placed on fishers. While efforts are underway to bring CMMB into policy discussions, to date there has not been a detailed evaluation of CMMB's potential as a conservation tool, and in particular, a list of necessary and sufficient criteria that CMMB must meet to be an effective conservation strategy. Here we present a list of criteria to assess CMMB that are tied to critical ecological aspects of the species targeted for conservation, the range of possible mitigation activities, and the multi-species impact of fisheries bycatch. We conclude that, overall, CMMB has little potential for benefit and a substantial potential for harm if implemented to solve most fisheries bycatch problems. In particular, CMMB is likely to be effective only when applied to short-lived and highly-fecund species (not the characteristics of most bycatch-impacted species) and to fisheries that take few non-target species, and especially few non-seabird species (not the characteristics of most fisheries). Thus, CMMB appears to have limited application and should only be implemented after rigorous appraisal on a case-specific basis; otherwise it has the potential to accelerate declines of marine species currently threatened by fisheries bycatch. PMID:18560568

  20. The Present and Future of Whole Genome Sequencing (WGS) and Whole Metagenome Sequencing (WMS) for Surveillance of Antimicrobial Resistant Microorganisms and Antimicrobial Resistance Genes across the Food Chain

    PubMed Central

    Oniciuc, Elena A.; Likotrafiti, Eleni; Alvarez-Molina, Adrián; Alvarez-Ordóñez, Avelino

    2018-01-01

    Antimicrobial resistance (AMR) surveillance is a critical step within risk assessment schemes, as it is the basis for informing global strategies, monitoring the effectiveness of public health interventions, and detecting new trends and emerging threats linked to food. Surveillance of AMR is currently based on the isolation of indicator microorganisms and the phenotypic characterization of clinical, environmental and food strains isolated. However, this approach provides very limited information on the mechanisms driving AMR or on the presence or spread of AMR genes throughout the food chain. Whole-genome sequencing (WGS) of bacterial pathogens has shown potential for epidemiological surveillance, outbreak detection, and infection control. In addition, whole metagenome sequencing (WMS) allows for the culture-independent analysis of complex microbial communities, providing useful information on AMR genes occurrence. Both technologies can assist the tracking of AMR genes and mobile genetic elements, providing the necessary information for the implementation of quantitative risk assessments and allowing for the identification of hotspots and routes of transmission of AMR across the food chain. This review article summarizes the information currently available on the use of WGS and WMS for surveillance of AMR in foodborne pathogenic bacteria and food-related samples and discusses future needs that will have to be considered for the routine implementation of these next-generation sequencing methodologies with this aim. In particular, methodological constraints that impede the use at a global scale of these high-throughput sequencing (HTS) technologies are identified, and the standardization of methods and protocols is suggested as a measure to upgrade HTS-based AMR surveillance schemes. PMID:29789467

Top