Sample records for facing intruder threat

  1. Threat perception while viewing single intruder conflicts on a cockpit display of traffic information

    NASA Technical Reports Server (NTRS)

    Ellis, S. R.; Palmer, E.

    1982-01-01

    Subjective estimates of the threat posed by a single intruder aircraft were determined by showing pilots photographs of a cockpit display of traffic information. The time the intruder was away from the point of minimum separation was found to be the major determinant of the perception of threat. When asked to choose a maneuver to reduce the conflict, pilots selected maneuvers with a bias toward those that would have kept the intruders in sight had they been visible out the cockpit window.

  2. Psychophysiological and Behavioral Responses to a Novel Intruder Threat Task for Children on the Autism Spectrum

    ERIC Educational Resources Information Center

    South, Mikle; Taylor, Katherine M.; Newton, Tiffani; Christensen, Megan; Jamison, Nathan K.; Chamberlain, Paul; Johnston, Oliver; Crowley, Michael J.; Higley, J. Dee

    2017-01-01

    We measured skin conductance response (SCR) to escalating levels of a direct social threat from a novel, ecologically-relevant experimental paradigm, the Intruder Threat Task. We simultaneously evaluated the contribution of social symptom severity and behavioral movement. Children with AS group showed less psychophysiological reactivity to social…

  3. Face processing in adolescents with positive and negative threat bias.

    PubMed

    Sylvester, C M; Petersen, S E; Luby, J L; Barch, D M

    2017-04-01

    Individuals with anxiety disorders exhibit a 'vigilance-avoidance' pattern of attention to threatening stimuli when threatening and neutral stimuli are presented simultaneously, a phenomenon referred to as 'threat bias'. Modifying threat bias through cognitive retraining during adolescence reduces symptoms of anxiety, and so elucidating neural mechanisms of threat bias during adolescence is of high importance. We explored neural mechanisms by testing whether threat bias in adolescents is associated with generalized or threat-specific differences in the neural processing of faces. Subjects were categorized into those with (n = 25) and without (n = 27) threat avoidance based on a dot-probe task at average age 12.9 years. Threat avoidance in this cohort has previously been shown to index threat bias. Brain response to individually presented angry and neutral faces was assessed in a separate session using functional magnetic resonance imaging. Adolescents with threat avoidance exhibited lower activity for both angry and neutral faces relative to controls in several regions in the occipital, parietal, and temporal lobes involved in early visual and facial processing. Results generalized to happy, sad, and fearful faces. Adolescents with a prior history of depression and/or an anxiety disorder had lower activity for all faces in these same regions. A subset of results replicated in an independent dataset. Threat bias is associated with generalized, rather than threat-specific, differences in the neural processing of faces in adolescents. Findings may aid in the development of novel treatments for anxiety disorders that use attention training to modify threat bias.

  4. Attention bias to threat faces in severe mood dysregulation.

    PubMed

    Hommer, Rebecca E; Meyer, Allison; Stoddard, Joel; Connolly, Megan E; Mogg, Karin; Bradley, Brendan P; Pine, Daniel S; Leibenluft, Ellen; Brotman, Melissa A

    2014-07-01

    We used a dot-probe paradigm to examine attention bias toward threat (i.e., angry) and happy face stimuli in severe mood dysregulation (SMD) versus healthy comparison (HC) youth. The tendency to allocate attention to threat is well established in anxiety and other disorders of negative affect. SMD is characterized by the negative affect of irritability, and longitudinal studies suggest childhood irritability predicts adult anxiety and depression. Therefore, it is important to study pathophysiologic connections between irritability and anxiety disorders. SMD patients (N = 74) and HC youth (N = 42) completed a visual probe paradigm to assess attention bias to emotional faces. Diagnostic interviews were conducted and measures of irritability and anxiety were obtained in patients. SMD youth differed from HC youth in having a bias toward threatening faces (P < .01). Threat bias was positively correlated with the severity of the SMD syndrome and depressive symptoms; degree of threat bias did not differ between SMD youth with and without co-occurring anxiety disorders or depression. SMD and HC youth did not differ in bias toward or away from happy faces. SMD youth demonstrate an attention bias toward threat, with greater threat bias associated with higher levels of SMD symptom severity. Our findings suggest that irritability may share a pathophysiological link with anxiety and depressive disorders. This finding suggests the value of exploring further whether attention bias modification treatments that are effective for anxiety are also helpful in the treatment of irritability. © 2013 Wiley Periodicals, Inc.

  5. Intruder detection system

    NASA Technical Reports Server (NTRS)

    Lee, R. D. (Inventor)

    1973-01-01

    An intruder detection system is described. The system contains a transmitter which sends a frequency modulated and amplitude modulated signal to a remote receiver in response to a geophone detector which responds to seismic impulses created by the intruder. The signal makes it possible for an operator to determine the number of intruders and the manner of movement.

  6. Uncovering Embedded Face Threat Mitigation in Landscape Architecture Critique Feedback

    ERIC Educational Resources Information Center

    Housley Gaffney, Amy L.

    2015-01-01

    Receiving public feedback on academic work may threaten students' face, particularly when such feedback is critical. One way that feedback may be cushioned is through face-threat mitigation techniques. I analyzed the use of such techniques in the feedback given by faculty and professionals to landscape architecture students as preparation for…

  7. Perceived threat and avoidance maneuvers in response to cockpit traffic displays

    NASA Technical Reports Server (NTRS)

    Smith, J. D.; Ellis, S. R.; Lee, E. C.

    1984-01-01

    Airline pilots rated their perception of the danger of an air-to-air collision based on cockpit displays of traffic information while they monitored simulated departures. They selected avoidance maneuvers when necessary for separation. Most evasive maneuvers were turns rather than vertical maneuvers. Evasive maneuvers chosen for encounters with lowor moderate-collision danger were generally toward the intruding aircraft. This tendency lessened as the perceived threat level increased. In the highest threat situations, pilots turned toward the intruder only at chance levels. Intruders coming from positions in front of the pilot's ship were more frequently avoided by turns toward than when intruders approached laterally or from behind. Some of the implications of the pilot's turning-toward tendencies are discussed with respect to automatic collision avoidance systems and coordination of avoidance maneuvers of conflicting aircraft.

  8. Interdependent selves show face-induced facilitation of error processing: cultural neuroscience of self-threat

    PubMed Central

    Kitayama, Shinobu

    2014-01-01

    The fundamentally social nature of humans is revealed in their exquisitely high sensitivity to potentially negative evaluations held by others. At present, however, little is known about neurocortical correlates of the response to such social-evaluative threat. Here, we addressed this issue by showing that mere exposure to an image of a watching face is sufficient to automatically evoke a social-evaluative threat for those who are relatively high in interdependent self-construal. Both European American and Asian participants performed a flanker task while primed with a face (vs control) image. The relative increase of the error-related negativity (ERN) in the face (vs control) priming condition became more pronounced as a function of interdependent (vs independent) self-construal. Relative to European Americans, Asians were more interdependent and, as predicted, they showed a reliably stronger ERN in the face (vs control) priming condition. Our findings suggest that the ERN can serve as a robust empirical marker of self-threat that is closely modulated by socio-cultural variables. PMID:23160814

  9. Transformation around intruders in granular media

    NASA Astrophysics Data System (ADS)

    Jop, Pierre; Merceron, Aymeric; Sauret, Alban

    2017-06-01

    Sintering, glass melting and other industrially relevant processes turn batches of grains into homogeneous products. Such processes involve coupled chemical and physical transformations of the granular packing. For sake of simplicity, we study how local evolutions on grains (volume decreases for example) entail mechanical rearrangements in the overall pile. Inert bidisperse metallic disks are mixed and confined in a vertical 2D cell. At the bottom of this set-up, initial intruders (one or two) have been previously set and mechanically linked to a linear motorized jack. While we quasi-statically pull the intruder(s) downward out of the cell at constant speed and constant liberated surface, we tracked the surrounding granular packing. Events largely distributed both spatially and temporally occur around intruders. We focus on the influence of the distance between the intruders on the local dynamic of the packing. We compare the distribution of the size of the event and their frequency as function of the relative position of the intruder, as a function of their radius. We show that their influence decreases rapidly. At short distance the mechanical perturbation induced by one intruder can destabilize the packing around the other.

  10. The fear gasping face as a threat display in a Melanesian society

    PubMed Central

    Crivelli, Carlos; Jarillo, Sergio; Fernández-Dols, José-Miguel

    2016-01-01

    Theory and research show that humans attribute both emotions and intentions to others on the basis of facial behavior: A gasping face can be seen as showing “fear” and intent to submit. The assumption that such interpretations are pancultural derives largely from Western societies. Here, we report two studies conducted in an indigenous, small-scale Melanesian society with considerable cultural and visual isolation from the West: the Trobrianders of Papua New Guinea. Our multidisciplinary research team spoke the vernacular and had extensive prior fieldwork experience. In study 1, Trobriand adolescents were asked to attribute emotions, social motives, or both to a set of facial displays. Trobrianders showed a mixed and variable attribution pattern, although with much lower agreement than studies of Western samples. Remarkably, the gasping face (traditionally considered a display of fear and submission in the West) was consistently matched to two unpredicted categories: anger and threat. In study 2, adolescents were asked to select the face that was threatening; Trobrianders chose the “fear” gasping face whereas Spaniards chose an “angry” scowling face. Our findings, consistent with functional approaches to animal communication and observations made on threat displays in small-scale societies, challenge the Western assumption that “fear” gasping faces uniformly express fear or signal submission across cultures. PMID:27791137

  11. Cumulative childhood interpersonal trauma is associated with reduced cortical differentiation between threat and non-threat faces in posttraumatic stress disorder adults.

    PubMed

    Chu, Denise A; Bryant, Richard A; Gatt, Justine M; Harris, Anthony Wf

    2018-03-01

    Posttraumatic stress disorder and childhood trauma frequently co-occur. Both are associated with abnormal neural responses to salient emotion stimuli. As childhood trauma is a risk factor for posttraumatic stress disorder, differentiating between their neurophysiological effects is necessary to elucidate the neural pathways by which childhood trauma exposure contributes to increased posttraumatic stress disorder risks. Face-specific N170 evoked response potentials for backward-masked (non-conscious) and conscious threat (fear, angry) and non-threat (happy) faces were measured in 77 adults (18-64 years old, 64% women, 78% right-handed) symptomatic for posttraumatic stress disorder. Differences in N170 peak amplitudes for fear-versus-happy and angry-versus-happy faces at bilateral temporo-occipital (T5, T6) sites were computed. The effect of cumulative exposure to childhood interpersonal trauma, other childhood trauma, adult trauma, depression and posttraumatic stress disorder symptom severity on the N170 response was assessed using hierarchical multiple regression analyses. T5 N170 peak amplitudes for non-conscious fear-versus-happy faces were inversely related to cumulative childhood interpersonal trauma after accounting for socio-demographic, clinical symptom and other trauma factors. Posttraumatic stress disorder Avoidance was positively associated with N170 peak amplitudes for non-conscious fear-versus-happy faces, primarily due to reduced N170 responsivity to happy faces. Childhood interpersonal trauma exposure is associated with reduced discrimination between fear and happy faces, while avoidance symptom severity is associated with dampened responsivity to automatically processed happy faces in posttraumatic stress disorder adults. Results are discussed in terms of the likely contributions of impaired threat discrimination and deficient reward processing during neural processing of salient emotion stimuli, to increased risks of posttraumatic stress disorder

  12. When anger dominates the mind: Increased motor corticospinal excitability in the face of threat

    PubMed Central

    Hortensius, Ruud

    2016-01-01

    Abstract Threat demands fast and adaptive reactions that are manifested at the physiological, behavioral, and phenomenological level and are responsive to the direction of threat and its severity for the individual. Here, we investigated the effects of threat directed toward or away from the observer on motor corticospinal excitability and explicit recognition. Sixteen healthy right‐handed volunteers completed a transcranial magnetic stimulation (TMS) task and a separate three‐alternative forced‐choice emotion recognition task. Single‐pulse TMS to the left primary motor cortex was applied to measure motor evoked potentials from the right abductor pollicis brevis in response to dynamic angry, fearful, and neutral bodily expressions with blurred faces directed toward or away from the observer. Results showed that motor corticospinal excitability increased independent of direction of anger compared with fear and neutral. In contrast, anger was better recognized when directed toward the observer compared with when directed away from the observer, while the opposite pattern was found for fear. The present results provide evidence for the differential effects of threat direction on explicit recognition and motor corticospinal excitability. In the face of threat, motor corticospinal excitability increases independently of the direction of anger, indicative of the importance of more automatic reactions to threat. PMID:27325519

  13. The neural basis of self-face recognition after self-concept threat and comparison with important others.

    PubMed

    Guan, Lili; Qi, Mingming; Zhang, Qinglin; Yang, Juan

    2014-01-01

    The implicit positive association (IPA) theory attributed self-face advantage to the IPA with self-concept. Previous behavioral study has found that self-concept threat (SCT) could eliminate the self-advantage in face recognition over familiar-face, without taking levels of facial familiarity into account. The current event-related potential study aimed to investigate whether SCT could eliminate the self-face advantage over stranger-face. Fifteen participants completed a "self-friend" comparison task in which participants identified the face orientation of self-face and friend-face after SCT and non-self-concept threat (NSCT) priming, and a "self-stranger" comparison task was also completed in which participants identified the face orientation of self-face and stranger-face after SCT and NSCT priming. The results showed that the N2 amplitudes were more negative for processing friend-face than self-face after NSCT priming, but there was no significant difference between them after SCT priming. Moreover, the N2 amplitudes were more negative for processing stranger-face than self-face both after SCT priming and after NSCT priming. Furthermore, SCT manipulated the N2 amplitudes of friend-face rather than self-face. Overall, the present study made a supplementary to the current IPA theory and further indicated that SCT would only eliminate this self-face recognition advantage when comparing with important others.

  14. Underwater Intruder Detection Sonar for Harbour Protection: State of the Art Review and Implications

    DTIC Science & Technology

    2006-10-01

    intruder would appear as a small moving “ blob ” of energetic echo in the echograph, and the operator could judge whether the contact is a threat that calls...visually then as a small fluctuating “ blob ” against a fluctuating background of sound clutter and reverberation, making it difficult to visually...4. Non-random false alarms caused by genuine underwater contacts that happened not to be intruders—by large fish , or schools of fish , or marine

  15. Differential Brain Activation to Angry Faces by Elite Warfighters: Neural Processing Evidence for Enhanced Threat Detection

    PubMed Central

    Paulus, Martin P.; Simmons, Alan N.; Fitzpatrick, Summer N.; Potterat, Eric G.; Van Orden, Karl F.; Bauman, James; Swain, Judith L.

    2010-01-01

    Background Little is known about the neural basis of elite performers and their optimal performance in extreme environments. The purpose of this study was to examine brain processing differences between elite warfighters and comparison subjects in brain structures that are important for emotion processing and interoception. Methodology/Principal Findings Navy Sea, Air, and Land Forces (SEALs) while off duty (n = 11) were compared with n = 23 healthy male volunteers while performing a simple emotion face-processing task during functional magnetic resonance imaging. Irrespective of the target emotion, elite warfighters relative to comparison subjects showed relatively greater right-sided insula, but attenuated left-sided insula, activation. Navy SEALs showed selectively greater activation to angry target faces relative to fearful or happy target faces bilaterally in the insula. This was not accounted for by contrasting positive versus negative emotions. Finally, these individuals also showed slower response latencies to fearful and happy target faces than did comparison subjects. Conclusions/Significance These findings support the hypothesis that elite warfighters deploy greater processing resources toward potential threat-related facial expressions and reduced processing resources to non-threat-related facial expressions. Moreover, rather than expending more effort in general, elite warfighters show more focused neural and performance tuning. In other words, greater neural processing resources are directed toward threat stimuli and processing resources are conserved when facing a nonthreat stimulus situation. PMID:20418943

  16. Effect of perceived threat on avoidance maneuvers selected while viewing cockpit traffic displays

    NASA Technical Reports Server (NTRS)

    Smith, J. D.; Ellis, S. R.

    1982-01-01

    Ten airline pilots rated the collision danger of air traffic presented on cockpit displays of traffic information (CDTI) while they monitored simulated departures from Denver. They selected avoidance maneuvers when necessary for separation. Most evasive maneuvers were turns rather than vertical maneuvers. Evasive maneuvers chosen for encounters with low or moderate perceived collision danger were generally toward the intruding aircraft. This tendency lessened as the perceived threat level increased. In the highest threat situations pilots turned toward the intruder only at chance levels. Some of the implications of the pilots' turning-towards tendencies are discussed with respect to automatic collision avoidance systems and coordination of avoidance maneuvers of conflicting aircraft.

  17. How sand grains stop a high speed intruder

    NASA Astrophysics Data System (ADS)

    Behringer, Robert

    When a speeding intruder impacts on a granular material, it comes rapidly to rest after penetrating only a modest distance. Empirical dynamical models, dating to the 19th century (if not earlier), describe the drag on the intruder in terms of two types of depth-dependent forces: one a static force, which also includes gravity, and the other a collisional force proportional to the square of the instantaneous speed of the intruder. What processes occur in the material to so quickly decelerate the intruder? We address this question through experiments and simulations (work of Lou Kondic and collaborators). We first probe the granular response using quasi-two-dimensional granular materials consisting of photoelastic discs. When such a particle experiences a force, it appears bright under cross-polarized illumination. High speed video reveals dynamic force transmission into the material along force chains that form in response to the intruder motion. These chains are nearly normal to the intruder surface, implying that collisional rather than frictional forces dominate the momentum transfer from intruder to grains. These observations allow the formation of a collision-based model that correctly captures the collisional drag force for both 2D and 3D intruders of a variety of shapes. This talk will develop a collisional picture of impact, and also explore the change in the system response as the impact speed increases. Experimental collaborators include Abe Clark, Cacey Stevens Bester, and Alec Petersen. This work supported by DTRA, NSF Grant DMR1206351, NASA Grant NNX15AD38G, and the William M. Keck Foundation.

  18. A bistatic pulse-Doppler intruder-detection radar

    NASA Astrophysics Data System (ADS)

    Walker, B. C.; Callahan, M. W.

    The U.S. Air Force's Aircraft Security Radar (ASR) is a small pulse-Doppler radar designed to detect intruders on the ground near parked aircraft, with a moving target detection effectiveness that encompasses high speed vehicles and intruders moving at as little as 2 cm/sec. The ASR is comparatively insensitive to weather, and will be affected only by severe wind and rain storms. Five ASRs are typically used around an aircraft, in order to reduce the area of coverage. Attention is given to the ASR's theory of operation, radar parameters, and both intruder and nuisance alarm test results.

  19. Unpleasant surprise! Tax deferred funds may face triple tax threat.

    PubMed

    Kret, T B

    1996-09-01

    After seeing all the taxes imposed on qualified plan distributions, a qualified plan with a large asset base can appear to be a lemon. With creative planning, qualified plan assets can be turned into lemonade for both the individual owner of the assets, and his or her heirs. If you are concerned whether you may face the triple tax threat with your qualified plan, and believe it would be appropriate to seek additional information on various strategies to alleviate this problem, you should contact your estate planner or someone with specific expertise in this area.

  20. Inadvertent Intruder Calculatios for F Tank Farm

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Koffman, L

    2005-09-12

    Savannah River National Laboratory (SRNL) has been providing radiological performance assessment analysis for Savannah River Site (SRS) solid waste disposal facilities (McDowell-Boyer 2000). The performance assessment considers numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. An Automated Intruder Analysis application was developed by SRNL (Koffman 2004) that simplifies the inadvertent intruder analysis into a routine, automated calculation. Based on SRNL's experience, personnel from Planning Integration & Technology of Closure Business Unitmore » asked SRNL to assist with inadvertent intruder calculations for F Tank Farm to support the development of the Tank Closure Waste Determination Document. Meetings were held to discuss the scenarios to be calculated and the assumptions to be used in the calculations. As a result of the meetings, SRNL was asked to perform four scenario calculations. Two of the scenarios are the same as those calculated by the Automated Intruder Analysis application and these can be calculated directly by providing appropriate inputs. The other two scenarios involve use of groundwater by the intruder and the Automated Intruder Analysis application was adapted to perform these calculations. The four calculations to be performed are: (1) A post-drilling scenario in which the drilling penetrates a transfer line. (2) A calculation of internal exposure due to drinking water from a well located near a waste tank. (3) A post-drilling calculation in which waste is introduced by irrigation of the garden with water from a well located near a waste tank. (4) A resident scenario where a house is built above transfer lines. Note that calculations 1 and 4 use sources from the waste inventory in the transfer line (given in Table 1) whereas

  1. No Prior Entry for Threat-Related Faces: Evidence from Temporal Order Judgments

    PubMed Central

    Schettino, Antonio; Loeys, Tom; Pourtois, Gilles

    2013-01-01

    Previous research showed that threat-related faces, due to their intrinsic motivational relevance, capture attention more readily than neutral faces. Here we used a standard temporal order judgment (TOJ) task to assess whether negative (either angry or fearful) emotional faces, when competing with neutral faces for attention selection, may lead to a prior entry effect and hence be perceived as appearing first, especially when uncertainty is high regarding the order of the two onsets. We did not find evidence for this conjecture across five different experiments, despite the fact that participants were invariably influenced by asynchronies in the respective onsets of the two competing faces in the pair, and could reliably identify the emotion in the faces. Importantly, by systematically varying task demands across experiments, we could rule out confounds related to suboptimal stimulus presentation or inappropriate task demands. These findings challenge the notion of an early automatic capture of attention by (negative) emotion. Future studies are needed to investigate whether the lack of systematic bias of attention by emotion is imputed to the primacy of a non-emotional cue to resolve the TOJ task, which in turn prevents negative emotion to exert an early bottom-up influence on the guidance of spatial and temporal attention. PMID:23646126

  2. Vertical drag force acting on intruders of different shapes in granular media

    NASA Astrophysics Data System (ADS)

    Zaidi, Ali Abbas; Müller, Christoph

    2017-06-01

    The penetration of large objects into granular media is encountered commonly both in nature (e.g. impacts of meteors and projectiles) and engineering applications (e.g. insertion of tractor blades into sand). The motion of the impacting intruder in granular media is resisted by a granular drag force. In this work, we assess the effect of intruder shape on the granular drag force using discrete element modelling (DEM). The following intruder shapes were modelled: spherical, conical, cylindrical and cubical. We observed that the drag force can be described well by a power-law relationship with intrusion depth, independent of the intruder shape. However, the exponent of the power-law expression increases with increasing "flatness" of the intruder's impacting surface due to an increasing fraction of the granular media affected by the impact of the intruder.

  3. Intruder Dynamic Response in Particulate Media

    NASA Astrophysics Data System (ADS)

    Warnakulasooriya, Niranjan

    Many everyday materials, broadly classified as "particulate media", are at the heart of many industries and natural phenomena. Examples range from the storage and transport of bulk foods and aggregates such as grains and coal; the processing of pharmaceutical pills and the grinding coffee beans; to the mitigation and cost control of life-threatening events like landslides, earthquakes, and silo failures. The common theme connecting all these phenomena is the mechanical stability of the granular material that arises from interactions at the microscopic level of the grain scale, and how this influences collective properties at the bulk, macroscopic scale. In this dissertation, we present an extensive study of the mechanical properties of a physics-based model of granular particle systems in two dimensions using computer simulations. Specifically, we study the dynamics of an intruder particle that is driven through a dense, disordered packing of particles. This practical technique has the benefit of being amenable to experimental application which we expect will motivate future studies in the area. We find the 'microrheology' of the intruder can be traced back to the properties of underlying, original, unperturbed packing, thereby providing a method to characterize the mechanical properties of the material that may otherwise be unavailable. To perform this study, we initially created mechanically stable granular packings of bidisperse discs, for several orders of magnitude of particle friction coefficient mu, over a range in packing densities, or packing fractions φ, in the vicinity of the critical packing fraction φc, the density below which the packing is no longer stable. This range in φ translates to a range in packing pressures P, spanning several orders of magnitude down to the P → 0 limit. For each packing, we apply a driving force to the intruder probe particle and find the critical force Fc, the minimum force required to induce motion of the probe as it

  4. Differences in the way older and younger adults rate threat in faces but not situations.

    PubMed

    Ruffman, Ted; Sullivan, Susan; Edge, Nigel

    2006-07-01

    We compared young and healthy older adults' ability to rate photos of faces and situations (e.g., sporting activities) for the degree of threat they posed. Older adults did not distinguish between more and less dangerous faces to the same extent as younger adults did. In contrast, we found no significant age differences in young and older adults' ability to distinguish between high- and low-danger situations. The differences between young and older adults on the face task were independent of age differences in older adults' fluid IQ. We discuss results in relation to differences between young and older adults on emotion-recognition tasks; we also discuss sociocognitive and neuropsychological (e.g., amygdala) theories of aging.

  5. Do women CEOs face greater threat of shareholder activism compared to male CEOs? A role congruity perspective.

    PubMed

    Gupta, Vishal K; Han, Seonghee; Mortal, Sandra C; Silveri, Sabatino Dino; Turban, Daniel B

    2018-02-01

    We examine the glass cliff proposition that female CEOs receive more scrutiny than male CEOs, by investigating whether CEO gender is related to threats from activist investors in public firms. Activist investors are extraorganizational stakeholders who, when dissatisfied with some aspect of the way the firm is being managed, seek to change the strategy or operations of the firm. Although some have argued that women will be viewed more favorably than men in top leadership positions (so-called "female leadership" advantage logic), we build on role congruity theory to hypothesize that female CEOs are significantly more likely than male CEOs to come under threat from activist investors. Results support our predictions, suggesting that female CEOs may face additional challenges not faced by male CEOs. Practical implications and directions for future research are discussed. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  6. "He Shouldn't Have Put It That Way!" How Face Threats and Mitigation Strategies Affect Person Perception in Online Tutoring

    ERIC Educational Resources Information Center

    Brummernhenrich, Benjamin; Jucks, Regina

    2016-01-01

    Instructional strategies such as prompts, requests for clarification, and explicit feedback counter social desires of autonomy and appreciation, i.e., they threaten the face of their receiver. We report an online experiment on how readers perceive instructional face threats and what they accept as appropriate. One hundred and twenty-three…

  7. Small Arrays for Seismic Intruder Detections: A Simulation Based Experiment

    NASA Astrophysics Data System (ADS)

    Pitarka, A.

    2014-12-01

    Seismic sensors such as geophones and fiber optic have been increasingly recognized as promising technologies for intelligence surveillance, including intruder detection and perimeter defense systems. Geophone arrays have the capability to provide cost effective intruder detection in protecting assets with large perimeters. A seismic intruder detection system uses one or multiple arrays of geophones design to record seismic signals from footsteps and ground vehicles. Using a series of real-time signal processing algorithms the system detects, classify and monitors the intruder's movement. We have carried out numerical experiments to demonstrate the capability of a seismic array to detect moving targets that generate seismic signals. The seismic source is modeled as a vertical force acting on the ground that generates continuous impulsive seismic signals with different predominant frequencies. Frequency-wave number analysis of the synthetic array data was used to demonstrate the array's capability at accurately determining intruder's movement direction. The performance of the array was also analyzed in detecting two or more objects moving at the same time. One of the drawbacks of using a single array system is its inefficiency at detecting seismic signals deflected by large underground objects. We will show simulation results of the effect of an underground concrete block at shielding the seismic signal coming from an intruder. Based on simulations we found that multiple small arrays can greatly improve the system's detection capability in the presence of underground structures. This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344

  8. Compensated intruder-detection systems

    DOEpatents

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  9. In the face of fear: Anxiety sensitizes defensive responses to fearful faces

    PubMed Central

    Grillon, Christian; Charney, Danielle R.

    2011-01-01

    Fearful faces readily activate the amygdala. Yet, whether fearful faces evoke fear is unclear. Startle studies show no potentiation of startle by fearful faces, suggesting that such stimuli do not activate defense mechanisms. However, the response to biologically relevant stimuli may be sensitized by anxiety. The present study tested the hypothesis that startle would not be potentiated by fearful faces in a safe context, but that startle would be larger during fearful faces compared to neutral faces in a threat-of-shock context. Subjects viewed fearful and neutral faces in alternating periods of safety and threat of shock. Acoustic startle stimuli were presented in the presence and absence of the faces. Startle was transiently potentiated by fearful faces compared to neutral faces in the threat periods. This suggests that although fearful faces do not prompt behavioral mobilization in an innocuous context, they can do so in an anxiogenic one. PMID:21824155

  10. Dense granular flow around a rigid or flexible intruder

    NASA Astrophysics Data System (ADS)

    Kolb, Evelyne; Adda-Bedia, Mokhtar

    2012-02-01

    We experimentally studied the flow of a dense granular material around an obstacle (rigid cylinder or flexible plate) placed in a 2 dimensional confined cell at a packing fraction near the 2D jamming threshold. In the case of the rigid obstacle, the displacement field of grains as well as the drag force experienced by the obstacle were simultaneously recorded and a parametric study was done by changing the cell size, the intruder diameter or the packing fraction. The drag force experienced by the intruder and the formation of a wake behind the obstacle were very sensitive to the approach to jamming. The same experimental set-up was adapted to a flexible intruder and coupling between the granular flow and fibre deflexion were imaged. The deformation of the fibre could be compared with theoretical predictions from elastica.

  11. Inadvertent Intruder Analysis For The Portsmouth On-Site Waste Disposal Facility (OSWDF)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Frank G.; Phifer, Mark A.

    2014-01-22

    The inadvertent intruder analysis considers the radiological impacts to hypothetical persons who are assumed to inadvertently intrude on the Portsmouth OSWDF site after institutional control ceases 100 years after site closure. For the purposes of this analysis, we assume that the waste disposal in the OSWDF occurs at time zero, the site is under institutional control for the next 100 years, and inadvertent intrusion can occur over the following 1,000 year time period. Disposal of low-level radioactive waste in the OSWDF must meet a requirement to assess impacts on such individuals, and demonstrate that the effective dose equivalent to anmore » intruder would not likely exceed 100 mrem per year for scenarios involving continuous exposure (i.e. chronic) or 500 mrem for scenarios involving a single acute exposure. The focus in development of exposure scenarios for inadvertent intruders was on selecting reasonable events that may occur, giving consideration to regional customs and construction practices. An important assumption in all scenarios is that an intruder has no prior knowledge of the existence of a waste disposal facility at the site. Results of the analysis show that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, resides on the site and consumes vegetables from a garden established on the site using contaminated soil (chronic agriculture scenario) would receive a maximum chronic dose of approximately 7.0 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE chronic dose limit of 100 mrem/yr. Results of the analysis also showed that a hypothetical inadvertent intruder at the OSWDF who, in the worst case scenario, excavates a basement in the soil that reaches the waste (acute basement construction scenario) would receive a maximum acute dose of approximately 0.25 mrem/yr during the 1000 year period of assessment. This dose falls well below the DOE acute dose limit of 500 mrem/yr. Disposal

  12. Face antispoofing based on frame difference and multilevel representation

    NASA Astrophysics Data System (ADS)

    Benlamoudi, Azeddine; Aiadi, Kamal Eddine; Ouafi, Abdelkrim; Samai, Djamel; Oussalah, Mourad

    2017-07-01

    Due to advances in technology, today's biometric systems become vulnerable to spoof attacks made by fake faces. These attacks occur when an intruder attempts to fool an established face-based recognition system by presenting a fake face (e.g., print photo or replay attacks) in front of the camera instead of the intruder's genuine face. For this purpose, face antispoofing has become a hot topic in face analysis literature, where several applications with antispoofing task have emerged recently. We propose a solution for distinguishing between real faces and fake ones. Our approach is based on extracting features from the difference between successive frames instead of individual frames. We also used a multilevel representation that divides the frame difference into multiple multiblocks. Different texture descriptors (local binary patterns, local phase quantization, and binarized statistical image features) have then been applied to each block. After the feature extraction step, a Fisher score is applied to sort the features in ascending order according to the associated weights. Finally, a support vector machine is used to differentiate between real and fake faces. We tested our approach on three publicly available databases: CASIA Face Antispoofing database, Replay-Attack database, and MSU Mobile Face Spoofing database. The proposed approach outperforms the other state-of-the-art methods in different media and quality metrics.

  13. Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)

    DTIC Science & Technology

    2016-07-27

    Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) 5a. CONTRACT NUMBER FA8650-16-C-6722 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...network analysts. Therefore, a new cyber STE focused on network analysts called the Air Force Cyber Intruder Alert Testbed (CIAT) was developed. This...Prescribed by ANSI Std. Z39-18 Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) Gregory Funke, Gregory Dye, Brett Borghetti

  14. "As Good as Your Word": Face-Threat Mitigation and the Use of Instructor Nonverbal Cues on Students' Perceptions of Digital Feedback

    ERIC Educational Resources Information Center

    Clark-Gordon, Cathlin V.; Bowman, Nicholas D.; Watts, Evan R.; Banks, Jaime; Knight, Jennifer M.

    2018-01-01

    Research has established that students often consider the delivery of instructor feedback to be a face-threatening event. To minimize the potential negative effects of feedback, verbal and nonverbal face-threat mitigation (FTM) strategies are utilized by instructors. Advances in digital feedback systems, like online documents and learning…

  15. Shape-based human detection for threat assessment

    NASA Astrophysics Data System (ADS)

    Lee, Dah-Jye; Zhan, Pengcheng; Thomas, Aaron; Schoenberger, Robert B.

    2004-07-01

    Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when monitoring open environments. Any moving objects including animals can falsely trigger the security system. Other security systems that utilize video equipment require human interpretation of the scene in order to make real-time threat assessment. Shape-based human detection technique has been developed for accurate early threat assessments for open and remote environment. Potential threats are isolated from the static background scene using differential motion analysis and contours of the intruding objects are extracted for shape analysis. Contour points are simplified by removing redundant points connecting short and straight line segments and preserving only those with shape significance. Contours are represented in tangent space for comparison with shapes stored in database. Power cepstrum technique has been developed to search for the best matched contour in database and to distinguish a human from other objects from different viewing angles and distances.

  16. In Your Face: Startle to Emotional Facial Expressions Depends on Face Direction.

    PubMed

    Åsli, Ole; Michalsen, Henriette; Øvervoll, Morten

    2017-01-01

    Although faces are often included in the broad category of emotional visual stimuli, the affective impact of different facial expressions is not well documented. The present experiment investigated startle electromyographic responses to pictures of neutral, happy, angry, and fearful facial expressions, with a frontal face direction (directed) and at a 45° angle to the left (averted). Results showed that emotional facial expressions interact with face direction to produce startle potentiation: Greater responses were found for angry expressions, compared with fear and neutrality, with directed faces. When faces were averted, fear and neutrality produced larger responses compared with anger and happiness. These results are in line with the notion that startle is potentiated to stimuli signaling threat. That is, a forward directed angry face may signal a threat toward the observer, and a fearful face directed to the side may signal a possible threat in the environment.

  17. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  18. Search for Intruder States in 68Ni and 67Co

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chiara, C. J.; Walters, W. B.; Janssens, R. V. F.

    The level schemes of 68Ni and 67Co were extended following 70Zn-induced deep-inelastic reactions. No evidence for a previously reported proton intruder 0 + state at 2202 keV in 68Ni was found. In 67Co, two new states at 3216 and 3415 keV have been established; additional states associated with the intruder configuration have yet to be identified.

  19. Poland and Global Threats

    NASA Astrophysics Data System (ADS)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  20. Low Cost Night Vision System for Intruder Detection

    NASA Astrophysics Data System (ADS)

    Ng, Liang S.; Yusoff, Wan Azhar Wan; R, Dhinesh; Sak, J. S.

    2016-02-01

    The growth in production of Android devices has resulted in greater functionalities as well as lower costs. This has made previously more expensive systems such as night vision affordable for more businesses and end users. We designed and implemented robust and low cost night vision systems based on red-green-blue (RGB) colour histogram for a static camera as well as a camera on an unmanned aerial vehicle (UAV), using OpenCV library on Intel compatible notebook computers, running Ubuntu Linux operating system, with less than 8GB of RAM. They were tested against human intruders under low light conditions (indoor, outdoor, night time) and were shown to have successfully detected the intruders.

  1. Deterrence and National Security in the Face of an Amorphous Threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Werne, R

    2001-01-05

    The National Security threats that we face today and, in turn, the National Security . requirements, are more diverse and complex than they were during the Cold-War from 1945-1990. During that period, and bolstered by the experiences of World Wars I and II, US National Security policy was focused on the stabilization of post WW II country boundaries and containment of the Soviet block and China. The result was the bipolar world in which the nuclear and conventional forces of the United States, the Soviet Union, and their respective allies ensured a measure of political stability through a military stalematemore » of world wide proportions. The practical result was that large scale changes in national borders were unlikely, but internal conflict within countries, and local conflicts between neighboring countries could still occur, albeit with participation from one or both of the Superpower camps. US National Security Policy was designed primarily for stabilization of the bipolar world on the military front and for competition with the Soviet Union and China on economic and political fronts. The collapse of the Soviet Union changed the global picture. The bipolar world and its military stalemate appear to be gone for the moment and the threat which was the foundation for US National Security policy has changed significantly. Some will argue that China has intentions of replacing the Soviet Union as a military superpower and thus recreate the bipolar world. Furthermore, Russia still has significant nuclear forces and has recently talked of lowering the nuclear threshold in an apparent attempt to make up for its weakened conventional forces. Clearly the threat of large scale nuclear war is much reduced, but not gone entirely. Having acknowledged the Chinese and Russian threats, what does the global picture look like today? The boundaries of most countries are secure but there are significant frictions, that have, or could lead, to armed conflict. Most of these are

  2. Memory for “mean” over “nice”: The influence of threat on children’s face memory

    PubMed Central

    Kinzler, Katherine D.; Shutts, Kristin

    2008-01-01

    Adults remember faces of threatening over non-threatening individuals. This memory advantage could be indicative of a system rooted deeply in cognitive evolution to track and remember individuals who have been harmful in the past and therefore might be harmful again. Conversely, adults may have learned through experience that it pays to be vigilant. In the present research, we investigated whether attention to threatening individuals is privileged in young children’s face memory. In Experiment 1, preschool-age children showed a face recognition memory advantage for individuals who were said to have committed harmful rather than helpful actions. In a further experiment, children did not selectively remember individuals who were described as the recipients of these actions, suggesting that the memory enhancement was produced by threat rather than negative valence. Together, these findings provide evidence for an early-developing system for remembering threatening individuals, consistent with an evolutionary account of its origins. PMID:18001702

  3. The Effect of Face Threat Mitigation on Instructor Credibility and Student Motivation in the Absence of Instructor Nonverbal Immediacy

    ERIC Educational Resources Information Center

    Trad, Laura; Katt, James; Miller, Ann Neville

    2014-01-01

    Instructor nonverbal immediacy has been associated with a range of positive student outcomes, but it is difficult to convey in an online environment. We investigated whether the text-based variable of face threat mitigation (FTM) alone--without the visual cues of nonverbally immediate behaviors--could significantly raise students' motivation and…

  4. Impaired threat prioritisation after selective bilateral amygdala lesions

    PubMed Central

    Bach, Dominik R.; Hurlemann, Rene; Dolan, Raymond J.

    2015-01-01

    The amygdala is proposed to process threat-related information in non-human animals. In humans, empirical evidence from lesion studies has provided the strongest evidence for a role in emotional face recognition and social judgement. Here we use a face-in-the-crowd (FITC) task which in healthy control individuals reveals prioritised threat processing, evident in faster serial search for angry compared to happy target faces. We investigate AM and BG, two individuals with bilateral amygdala lesions due to Urbach–Wiethe syndrome, and 16 control individuals. In lesion patients we show a reversal of a threat detection advantage indicating a profound impairment in prioritising threat information. This is the first direct demonstration that human amygdala lesions impair prioritisation of threatening faces, providing evidence that this structure has a causal role in responding to imminent danger. PMID:25282058

  5. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    PubMed

    Shamshirband, Shahaboddin; Banjanovic-Mehmedovic, Lejla; Bosankic, Ivan; Kasapovic, Suad; Abdul Wahab, Ainuddin Wahid Bin

    2016-01-01

    Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system) was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean), Intruder Rear sensors active (boolean), Agent Front sensors active (boolean), Agent Rear sensors active (boolean), RSSI signal intensity/strength (integer), Elapsed time (in seconds), Distance between Agent and Intruder (m), Angle of Agent relative to Intruder (angle between vehicles °), Altitude difference between Agent and Intruder (m)) influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m) and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles °) is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  6. Threat-Detection and Attentional Bias to Threat in Women Recovered from Anorexia Nervosa: Neural Alterations in Extrastriate and Medial Prefrontal Cortices.

    PubMed

    Bang, Lasse; Rø, Øyvind; Endestad, Tor

    2017-03-01

    Behavioral studies have shown that anorexia nervosa (AN) is associated with attentional bias to general threat cues. The neurobiological underpinnings of attentional bias to threat in AN are unknown. This study investigated the neural responses associated with threat-detection and attentional bias to threat in AN. We measured neural responses to a dot-probe task, involving pairs of angry and neutral face stimuli, in 22 adult women recovered from AN and 21 comparison women. Recovered AN women did not exhibit a behavioral attentional bias to threat. In response to angry faces, recovered women showed significant hypoactivation in the extrastriate cortex. During attentional bias to angry faces, recovered women showed significant hyperactivation in the medial prefrontal cortex. This was because of significant deactivation in comparison women, which was absent in recovered AN women. Women recovered from AN are characterized by altered neural responses to threat cues. Copyright © 2016 John Wiley & Sons, Ltd and Eating Disorders Association. Copyright © 2016 John Wiley & Sons, Ltd and Eating Disorders Association.

  7. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    PubMed Central

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  8. How Well Can Young People with Asperger's Disorder Recognize Threat and Learn about Affect in Faces?: A Pilot Study

    ERIC Educational Resources Information Center

    Miyahara, Motohide; Ruffman, Ted; Fujita, Chikako; Tsujii, Masatsugu

    2010-01-01

    The abilities to identify threat and learn about affect in facial photographs were compared between a non-autistic university student group (NUS), a matched Asperger's group (MAS) on the Standard Progressive Matrices (SPM), and an unmatched Asperger's group (UAS) who scored lower on the SPM. Participants were given pairs of faces and asked which…

  9. A simple way to intrude overerupted upper second molars with miniscrews.

    PubMed

    Cao, Yang; Liu, Chufeng; Wang, Chunxian; Yang, Xiaoyu; Duan, Peijia; Xu, Chenrong

    2013-12-01

    Various methods of using skeletal anchorage for the intrusion of overerupted maxillary molars have been reported; however, it is difficult to intrude the overerupted upper second molars because of the low bone density in the region of the tuberosity. This article illustrates a new treatment method using partial fixed edgewise appliances and miniscrews to intrude the overerupted upper second molars. The miniscrews were applied to reinforce the anchorage of the upper first molar. The intrusive force was generated by the Ni-Ti wire. The clinical results showed a significant intrusion effect without root resorption or periodontal problems. This report demonstrates that the combination of partial conventional fixed appliances with miniscrews is a simple and effective treatment option to intrude overerupted upper second molars, especially in situations where miniscrews cannot be inserted directly next to the second molar. © 2013 by the American College of Prosthodontists.

  10. Motion patterns and phase-transition of a defender-intruder problem and optimal interception strategy of the defender

    NASA Astrophysics Data System (ADS)

    Wang, Jiangliu; Li, Wei

    2015-10-01

    In this paper, we consider a defense-intrusion interaction, in which an intruder is attracted by a protected stationary target but repulsed by a defender; while the defender tries to move towards an appropriate interception position (IP) between the intruder and the target in order to intercept the intruder and expel the intruder away from the target as maximum as possible. Intuitionally, to keep the intruder further away, one may wonder that: is it a better strategy for the defender trying to approach the intruder as near as possible? Unexpectedly and interestingly enough, this is not always the case. We first introduce the flexibility for IP selection, then investigate the system dynamics and the stable motion patterns, and characterize the phase-transition surface for the motion patterns. We show that, the phase-transition surface just defines the optimal interception strategy of the defender for IP selection; and from the perspective of mobility of agents, the optimal strategy just depends on relative mobility of the two agents.

  11. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    PubMed Central

    Zhang, Tianyang; Xi, Sisi; Jin, Yan; Wu, Yanhong

    2017-01-01

    Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1). Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2). The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming. PMID:29081755

  12. Lift on side by side intruders of various geometries within a granular flow

    NASA Astrophysics Data System (ADS)

    Acevedo-Escalante, M. F.; Caballero-Robledo, G. A.

    2017-06-01

    Obstacles within fluids have been widely used in engineering and in physics to study hydrodynamic interactions. In granular matter, objects within a granular flow have helped to understand fundamental features of drag and lift forces. In our group, we have studied numerically the flow mediated interaction between two static disks within a vertical granular flow in a two-dimensional container where the flow velocity and the distance between obstacles were varied. Attractive and repulsive forces were found depending on flow velocity and separation between intruders. The simulations evidenced a relationship between the average flow velocity in a specific section ahead of the obstacles and the attractive-repulsive lift. On the other hand, it was showed that the lift force on an object dragged within a granular medium depends on the shape of the intruder. Here we present experimental results of the interaction between two side-by-side intruders of different shapes within a vertical granular flow. We built a quasi-two-dimensional container in which we placed the intruders and using load cells we measured lift and drag forces during the discharge process for different flow velocities.

  13. Optical fiber strain sensor for application in intelligent intruder detection systems

    NASA Astrophysics Data System (ADS)

    Stańczyk, Tomasz; Tenderenda, Tadeusz; Szostkiewicz, Lukasz; Bienkowska, Beata; Kunicki, Daniel; Murawski, Michal; Mergo, Pawel; Nasilowski, Tomasz

    2017-10-01

    Nowadays technology allows to create highly effective Intruder Detection Systems (IDS), that are able to detect the presence of an intruder within a defined area. In such systems the best performance can be achieved by combining different detection techniques in one system. One group of devices that can be applied in an IDS, are devices based on Fiber Optic Sensors (FOS). The FOS benefits from numerous advantages of optical fibers like: small size, light weight or high sensitivity. In this work we present a novel Microstructured Optical Fiber (MOF) characterized by increased strain sensitivity dedicated to distributed acoustic sensing for intelligent intruder detection systems. By designing the MOF with large air holes in close proximity to a fiber core, we increased the effective refractive index sensitivity to longitudinal strain. The presented fiber can be easily integrated in a floor system in order to detect any movement in the investigated area. We believe that sensors, based on the presented MOF, due to its numerous advantages, can find application in intelligent IDS.

  14. Risks older drivers face themselves and threats they pose to other road users.

    PubMed

    Evans, L

    2000-04-01

    Although there is an ever increasing literature on older drivers, there is no comprehensive up-to-date presentation of how older drivers are impacted by traffic safety, and how they impact the road safety of others. This paper uses 1994-1996 US data to determine how many rates related to traffic safety depend on the age and sex of road users (fatalities, fatalities per licensed driver, etc.) Threats drivers pose to other road users are estimated by driver involvement in pedestrian fatality crashes. It is found that renewing the licence of a 70-year-old male driver for another year poses, on average, 40% less threat to other road users than renewing the license of a 40-year-old male driver. The fatality risks drivers themselves face generally increase as they age, with the increased risk of death in the same severity crash being a major contributor. If this factor is removed, crash risks for 70-year-old male drivers are not materially higher than for 40-year-old male drivers; for female drivers they are. Most driver rates increase substantially by age 80, in many cases to values higher than those for 20-year-olds. Given that a death occurs, the probability that it is a traffic fatality declines steeply with age, from well over 20% for late teens through mid twenties, to under one per cent at age 65, and under half a per cent at age 80.

  15. Threat facilitates subsequent executive control during anxious mood.

    PubMed

    Birk, Jeffrey L; Dennis, Tracy A; Shin, Lisa M; Urry, Heather L

    2011-12-01

    Dual competition framework (DCF) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance. To test these ideas directly, we examined the effects of low-level threat and experimentally induced anxiety on one executive control function, the efficiency of response inhibition. In Study 1, briefly presented stimuli that were mildly threatening (i.e., fearful faces) relative to nonthreatening (i.e., neutral faces) led to facilitated executive control efficiency during experimentally induced anxiety. No such effect was observed during an equally arousing, experimentally induced happy mood state. In Study 2, we assessed the effects of low-level threat, experimentally induced anxiety, and individual differences in trait anxiety on executive control efficiency. Consistent with Study 1, fearful relative to neutral faces led to facilitated executive control efficiency during experimentally induced anxiety. No such effect was observed during an experimentally induced neutral mood state. Moreover, individual differences in trait anxiety did not moderate the effects of threat and anxiety on executive control efficiency. The findings are partially consistent with the predictions of DCF in that low-level threat improved executive control, at least during a state of anxiety. (c) 2011 APA, all rights reserved.

  16. Self-esteem Modulates the P3 Component in Response to the Self-face Processing after Priming with Emotional Faces

    PubMed Central

    Guan, Lili; Zhao, Yufang; Wang, Yige; Chen, Yujie; Yang, Juan

    2017-01-01

    The self-face processing advantage (SPA) refers to the research finding that individuals generally recognize their own face faster than another’s face; self-face also elicits an enhanced P3 amplitude compared to another’s face. It has been suggested that social evaluation threats could weaken the SPA and that self-esteem could be regarded as a threat buffer. However, little research has directly investigated the neural evidence of how self-esteem modulates the social evaluation threat to the SPA. In the current event-related potential study, 27 healthy Chinese undergraduate students were primed with emotional faces (angry, happy, or neutral) and were asked to judge whether the target face (self, friend, and stranger) was familiar or unfamiliar. Electrophysiological results showed that after priming with emotional faces (angry and happy), self-face elicited similar P3 amplitudes to friend-face in individuals with low self-esteem, but not in individuals with high self-esteem. The results suggest that as low self-esteem raises fears of social rejection and exclusion, priming with emotional faces (angry and happy) can weaken the SPA in low self-esteem individuals but not in high self-esteem individuals. PMID:28868041

  17. Self-esteem Modulates the P3 Component in Response to the Self-face Processing after Priming with Emotional Faces.

    PubMed

    Guan, Lili; Zhao, Yufang; Wang, Yige; Chen, Yujie; Yang, Juan

    2017-01-01

    The self-face processing advantage (SPA) refers to the research finding that individuals generally recognize their own face faster than another's face; self-face also elicits an enhanced P3 amplitude compared to another's face. It has been suggested that social evaluation threats could weaken the SPA and that self-esteem could be regarded as a threat buffer. However, little research has directly investigated the neural evidence of how self-esteem modulates the social evaluation threat to the SPA. In the current event-related potential study, 27 healthy Chinese undergraduate students were primed with emotional faces (angry, happy, or neutral) and were asked to judge whether the target face (self, friend, and stranger) was familiar or unfamiliar. Electrophysiological results showed that after priming with emotional faces (angry and happy), self-face elicited similar P3 amplitudes to friend-face in individuals with low self-esteem, but not in individuals with high self-esteem. The results suggest that as low self-esteem raises fears of social rejection and exclusion, priming with emotional faces (angry and happy) can weaken the SPA in low self-esteem individuals but not in high self-esteem individuals.

  18. Possible Use of Bacteriophages Active against Bacillus anthracis and Other B. cereus Group Members in the Face of a Bioterrorism Threat

    PubMed Central

    Weber-Dąbrowska, Beata; Borysowski, Jan; Górski, Andrzej

    2014-01-01

    Anthrax is an infectious fatal disease with epidemic potential. Nowadays, bioterrorism using Bacillus anthracis is a real possibility, and thus society needs an effective weapon to neutralize this threat. The pathogen may be easily transmitted to human populations. It is easy to store, transport, and disseminate and may survive for many decades. Recent data strongly support the effectiveness of bacteriophage in treating bacterial diseases. Moreover, it is clear that bacteriophages should be considered a potential incapacitative agent against bioterrorism using bacteria belonging to B. cereus group, especially B. anthracis. Therefore, we have reviewed the possibility of using bacteriophages active against Bacillus anthracis and other species of the B. cereus group in the face of a bioterrorism threat. PMID:25247187

  19. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  20. Face-to-face: Perceived personal relevance amplifies face processing

    PubMed Central

    Pittig, Andre; Schupp, Harald T.; Alpers, Georg W.

    2017-01-01

    Abstract The human face conveys emotional and social information, but it is not well understood how these two aspects influence face perception. In order to model a group situation, two faces displaying happy, neutral or angry expressions were presented. Importantly, faces were either facing the observer, or they were presented in profile view directed towards, or looking away from each other. In Experiment 1 (n = 64), face pairs were rated regarding perceived relevance, wish-to-interact, and displayed interactivity, as well as valence and arousal. All variables revealed main effects of facial expression (emotional > neutral), face orientation (facing observer > towards > away) and interactions showed that evaluation of emotional faces strongly varies with their orientation. Experiment 2 (n = 33) examined the temporal dynamics of perceptual-attentional processing of these face constellations with event-related potentials. Processing of emotional and neutral faces differed significantly in N170 amplitudes, early posterior negativity (EPN), and sustained positive potentials. Importantly, selective emotional face processing varied as a function of face orientation, indicating early emotion-specific (N170, EPN) and late threat-specific effects (LPP, sustained positivity). Taken together, perceived personal relevance to the observer—conveyed by facial expression and face direction—amplifies emotional face processing within triadic group situations. PMID:28158672

  1. Face-to-face: Perceived personal relevance amplifies face processing.

    PubMed

    Bublatzky, Florian; Pittig, Andre; Schupp, Harald T; Alpers, Georg W

    2017-05-01

    The human face conveys emotional and social information, but it is not well understood how these two aspects influence face perception. In order to model a group situation, two faces displaying happy, neutral or angry expressions were presented. Importantly, faces were either facing the observer, or they were presented in profile view directed towards, or looking away from each other. In Experiment 1 (n = 64), face pairs were rated regarding perceived relevance, wish-to-interact, and displayed interactivity, as well as valence and arousal. All variables revealed main effects of facial expression (emotional > neutral), face orientation (facing observer > towards > away) and interactions showed that evaluation of emotional faces strongly varies with their orientation. Experiment 2 (n = 33) examined the temporal dynamics of perceptual-attentional processing of these face constellations with event-related potentials. Processing of emotional and neutral faces differed significantly in N170 amplitudes, early posterior negativity (EPN), and sustained positive potentials. Importantly, selective emotional face processing varied as a function of face orientation, indicating early emotion-specific (N170, EPN) and late threat-specific effects (LPP, sustained positivity). Taken together, perceived personal relevance to the observer-conveyed by facial expression and face direction-amplifies emotional face processing within triadic group situations. © The Author (2017). Published by Oxford University Press.

  2. Crime Prevention in Schools: Specification, Installation, and Maintenance of Intruder Alarm Systems. Building Bulletin 69.

    ERIC Educational Resources Information Center

    Haworth-Roberts, A., Ed.

    Greater use of expensive equipment by schools has also increased the potential for vandalism and theft, giving an increased role to intruder alarm systems. This document provides guidance on the management and technical aspects of forming policies for installing and operating intruder alarm systems in educational buildings. Also provided are…

  3. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    PubMed

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  4. Facing the crowd: intruder pressure, within-group competition, and the resolution of conflicts over group-membership

    PubMed Central

    Port, Markus; Johnstone, Rufus A

    2013-01-01

    Recent theory in social evolution has been mainly concerned with competition and cooperation within social groups of animals and their impact on the stability of those groups. Much less attention has been paid to conflicts arising as a result of solitary floaters (outsiders) attempting to join groups of established residents (insiders). We model such conflicts over group-membership using a demographically explicit approach in which the rates of births and deaths in a population determine the availability of group-vacancies and the number of floaters competing over these vacancies. We find that the outcome of within-group competition, reflected in the partitioning of reproduction among group members, exerts surprisingly little influence on the resolution of insider-outsider conflict. The outcome of such conflict is also largely unaffected by differences in resource holding potential between insiders and outsiders. By contrast, whether or not groups form is mainly determined by demographic factors (variation in vital rates such as fecundity and mortality) and the resulting population dynamics. In particular, at high floater densities territory defense becomes too costly, and groups form because insiders give in to the intruder pressure imposed on them by outsiders. We emphasize the importance of insider-outsider conflicts in social evolution theory and highlight avenues for future research. PMID:23762508

  5. Attention Bias toward Threat in Pediatric Anxiety Disorders

    ERIC Educational Resources Information Center

    Roy, Amy Krain; Vasa, Roma A.; Bruck, Maggie; Mogg, Karin; Bradley, Brendan P.; Sweeney, Michael; Bergman, R. Lindsey; McClure-Tone, Erin B.; Pine, Daniel S.

    2008-01-01

    Attention bias towards threat faces is examined for a large sample of anxiety-disordered youths using visual probe task. The results showed that anxious individuals showed a selective bias towards threat due to perturbation in neural mechanisms that control vigilance.

  6. Exogenous testosterone affects early threat processing in socially anxious and healthy women.

    PubMed

    van Peer, Jacobien M; Enter, Dorien; van Steenbergen, Henk; Spinhoven, Philip; Roelofs, Karin

    2017-10-01

    Testosterone plays an important role in social threat processing. Recent evidence suggests that testosterone administration has socially anxiolytic effects, but it remains unknown whether this involves early vigilance or later, more sustained, processing-stages. We investigated the acute effects of testosterone administration on social threat processing in 19 female patients with Social Anxiety Disorder (SAD) and 19 healthy controls. Event-related potentials (ERPs) were recorded during an emotional Stroop task with subliminally presented faces. Testosterone induced qualitative changes in early ERPs (<200ms after stimulus onset) in both groups. An initial testosterone-induced spatial shift reflected a change in the basic processing (N170/VPP) of neutral faces, which was followed by a shift for angry faces suggesting a decrease in early threat bias. These findings suggest that testosterone specifically affects early automatic social information processing. The decreased attentional bias for angry faces explains how testosterone can decrease threat avoidance, which is particularly relevant for SAD. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. Decisions on repositioning of intruded permanent incisors; a review and case presentation.

    PubMed

    Hurley, E; Stewart, C; Gallagher, C; Kinirons, M

    2018-06-01

    Traumatic intrusion is a luxation type of injury where the tooth is displaced along the axis of the tooth, into the alveolus. This injury is regarded as serious because of the tissue damage that it causes. The traumatic movement is associated with severe damage to the periodontal ligament, pulpal tissue, root and alveolar socket. Despite its severity, the rare occurrence of this injury in permanent teeth has resulted in limited studies of immature and mature permanent incisors. The purpose of this paper is to review this luxation injury of permanent immature incisors, and to describe its diagnosis, treatment and management. In particular, we describe the repositioning strategies used in cases of intrusion injury. These include (i) monitoring spontaneous re-eruption, (ii) active orthodontic repositioning and (iii) surgical repositioning. Firstly, monitoring spontaneous re-eruption is observing and waiting for the intruded tooth to return to its original position. This process is not a normal developmental eruption and the outcome is not always predictable, nor is the time needed for this to happen. Secondly, active orthodontic repositioning is used to describe the process of rapidly moving the intruded tooth to its original position with the aid of an orthodontic appliance. Active orthodontic repositioning is often misunderstood as normal orthodontic movement. Orthodontic movement allows for periodontal ligament remodelling, using light intermittent forces. In contrast the active orthodontic repositioning used to move intruded incisors is rapid, and the primary aim is to achieve correct tooth position as rapidly as possible. Thirdly, surgical repositioning uses surgical intervention to bring the tooth back to its original position. A case of an intruded immature permanent incisor is presented, with a particular emphasis on these critical decisions on repositioning and showing the use of the three modalities of treatment in sequence, in order to achieve an outcome.

  8. Cooperative dynamics in the penetration of a group of intruders in a granular medium.

    PubMed

    Pacheco-Vázquez, F; Ruiz-Suárez, J C

    2010-11-23

    An object moving in a fluid experiences a drag force that depends on its velocity, shape and the properties of the medium. From this simplest case to the motion of a flock of birds or a school of fish, the drag forces and the hydrodynamic interactions determine the full dynamics of the system. Similar drag forces appear when a single projectile impacts and moves through a granular medium, and this case is well studied in the literature. On the other hand, the case in which a group of intruders impact a granular material has never been considered. Here, we study the simultaneous penetration of several intruders in a very low-density granular medium. We find that the intruders move through it in a collective way, following a cooperative dynamics, whose complexity resembles flocking phenomena in living systems or the movement of reptiles in sand, wherein changes in drag are exploited to efficiently move or propel.

  9. Cooperative dynamics in the penetration of a group of intruders in a granular medium

    PubMed Central

    Pacheco-Vázquez, F.; Ruiz-Suárez, J.C.

    2010-01-01

    An object moving in a fluid experiences a drag force that depends on its velocity, shape and the properties of the medium. From this simplest case to the motion of a flock of birds or a school of fish, the drag forces and the hydrodynamic interactions determine the full dynamics of the system. Similar drag forces appear when a single projectile impacts and moves through a granular medium, and this case is well studied in the literature. On the other hand, the case in which a group of intruders impact a granular material has never been considered. Here, we study the simultaneous penetration of several intruders in a very low-density granular medium. We find that the intruders move through it in a collective way, following a cooperative dynamics, whose complexity resembles flocking phenomena in living systems or the movement of reptiles in sand, wherein changes in drag are exploited to efficiently move or propel. PMID:21119636

  10. Sex-related differences in behavioral and amygdalar responses to compound facial threat cues.

    PubMed

    Im, Hee Yeon; Adams, Reginald B; Cushing, Cody A; Boshyan, Jasmine; Ward, Noreen; Kveraga, Kestutis

    2018-03-08

    During face perception, we integrate facial expression and eye gaze to take advantage of their shared signals. For example, fear with averted gaze provides a congruent avoidance cue, signaling both threat presence and its location, whereas fear with direct gaze sends an incongruent cue, leaving threat location ambiguous. It has been proposed that the processing of different combinations of threat cues is mediated by dual processing routes: reflexive processing via magnocellular (M) pathway and reflective processing via parvocellular (P) pathway. Because growing evidence has identified a variety of sex differences in emotional perception, here we also investigated how M and P processing of fear and eye gaze might be modulated by observer's sex, focusing on the amygdala, a structure important to threat perception and affective appraisal. We adjusted luminance and color of face stimuli to selectively engage M or P processing and asked observers to identify emotion of the face. Female observers showed more accurate behavioral responses to faces with averted gaze and greater left amygdala reactivity both to fearful and neutral faces. Conversely, males showed greater right amygdala activation only for M-biased averted-gaze fear faces. In addition to functional reactivity differences, females had proportionately greater bilateral amygdala volumes, which positively correlated with behavioral accuracy for M-biased fear. Conversely, in males only the right amygdala volume was positively correlated with accuracy for M-biased fear faces. Our findings suggest that M and P processing of facial threat cues is modulated by functional and structural differences in the amygdalae associated with observer's sex. © 2018 Wiley Periodicals, Inc.

  11. Threat perception in mild cognitive impairment and early dementia.

    PubMed

    Henry, Julie D; Thompson, Claire; Ruffman, Ted; Leslie, Felicity; Withall, Adrienne; Sachdev, Perminder; Brodaty, Henry

    2009-09-01

    Mild cognitive impairment (MCI) and dementia affect many aspects of emotion processing. Even though the ability to detect threat is a particularly important aspect of emotion processing, no study to date has assessed threat perception in either of these groups. The purpose of the present study was to test whether individuals with MCI (n = 38) and mild dementia (n = 34) have difficulty differentiating between faces and situations normatively judged to be either high or low in threat relative to age-matched controls (n = 34). To achieve this aim, all participants completed 2 danger rating tasks that involved viewing and rating high- and low-danger images. It was also assessed whether threat perception was related to cognitive functioning and emotion recognition. The results indicated that all 3 groups were accurately, and comparably, able to differentiate high from low-danger faces. However, the dementia group had difficulties differentiating high from low-danger situations, which reflected a bias to overattribute the level of threat posed by normatively judged nonthreatening situations. This difficulty was related to more general cognitive decline.

  12. Superior Detection of Threat-Relevant Stimuli in Infancy

    ERIC Educational Resources Information Center

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  13. Succeeding in the face of stereotype threat: the adaptive role of engagement regulation.

    PubMed

    Leitner, Jordan B; Jones, James M; Hehman, Eric

    2013-01-01

    Two experiments examined Engagement Regulation, the systematic increase or decrease of self-esteem engagement in a domain following positive or negative outcomes, respectively. We hypothesized that, under threat, more positive outcomes increase engagement, and greater engagement augments the influence of subsequent outcomes on self-esteem and performance. Female participants completed an initial math test, received bogus feedback, and then completed a second test. Results indicated that more positive feedback evoked greater engagement and that this relationship was strongest under stereotype threat (Study 1). Under stereotype threat, engagement interacted with subsequent feedback, such that greater engagement to positive feedback increased performance, but greater engagement to negative feedback decreased self-esteem and performance (Study 2). Together, these findings suggest that Engagement Regulation facilitates self-esteem maintenance and positive performance under stereotype threat.

  14. Finding a face in the crowd: testing the anger superiority effect in Asperger Syndrome.

    PubMed

    Ashwin, Chris; Wheelwright, Sally; Baron-Cohen, Simon

    2006-06-01

    Social threat captures attention and is processed rapidly and efficiently, with many lines of research showing involvement of the amygdala. Visual search paradigms looking at social threat have shown angry faces 'pop-out' in a crowd, compared to happy faces. Autism and Asperger Syndrome (AS) are neurodevelopmental conditions characterised by social deficits, abnormal face processing, and amygdala dysfunction. We tested adults with high-functioning autism (HFA) and AS using a facial visual search paradigm with schematic neutral and emotional faces. We found, contrary to predictions, that people with HFA/AS performed similarly to controls in many conditions. However, the effect was reduced in the HFA/AS group when using widely varying crowd sizes and when faces were inverted, suggesting a difference in face-processing style may be evident even with simple schematic faces. We conclude there are intact threat detection mechanisms in AS, under simple and predictable conditions, but that like other face-perception tasks, the visual search of threat faces task reveals atypical face-processing in HFA/AS.

  15. Motivated emotion and the rally around the flag effect: liberals are motivated to feel collective angst (like conservatives) when faced with existential threat.

    PubMed

    Porat, Roni; Tamir, Maya; Wohl, Michael J A; Gur, Tamar; Halperin, Eran

    2018-04-18

    A careful look at societies facing threat reveals a unique phenomenon in which liberals and conservatives react emotionally and attitudinally in a similar manner, rallying around the conservative flag. Previous research suggests that this rally effect is the result of liberals shifting in their attitudes and emotional responses toward the conservative end. Whereas theories of motivated social cognition provide a motivation-based account of cognitive processes (i.e. attitude shift), it remains unclear whether emotional shifts are, in fact, also a motivation-based process. Herein, we propose that under threat, liberals are motivated to feel existential concern about their group's future vitality (i.e. collective angst) to the same extent as conservatives, because this group-based emotion elicits support for ingroup protective action. Within the context of the Palestinian-Israeli conflict, we tested and found support for this hypothesis both inside (Study 1) and outside (Study 2) the laboratory. We did so using a behavioural index of motivation to experience collective angst. We discuss the implications of our findings for understanding motivated emotion regulation in the context of intergroup threat.

  16. Restoration of an intruded maxillary central incisor with a uniquely designed dowel and core restoration: a case report.

    PubMed

    Polat, Zelal Seyfioğlu; Tacir, Ibrahim Halil

    2007-01-01

    This article describes the restoration of an intruded root using a custom-made metal dowel and metal-ceramic veneer core restoration. The treatment plan for this patient consisted of restoring the missing esthetics and eliminating psychological trauma by utilizing the root of the intruded maxillary left central incisor to replace both missing central incisor crowns. This treatment will preserve space and bone until the patient is old enough for another prosthodontic restoration to be considered. As the lost fragments were not recovered, we considered this restoration of the intruded root to be the best therapeutic option, considering the effect on the patient's psyche. The patient was satisfied with the final result.

  17. A new measurement of the intruder configuration in 12Be

    NASA Astrophysics Data System (ADS)

    Chen, J.; Lou, J. L.; Ye, Y. L.; Li, Z. H.; Pang, D. Y.; Yuan, C. X.; Ge, Y. C.; Li, Q. T.; Hua, H.; Jiang, D. X.; Yang, X. F.; Xu, F. R.; Pei, J. C.; Li, J.; Jiang, W.; Sun, Y. L.; Zang, H. L.; Zhang, Y.; Aoi, N.; Ideguchi, E.; Ong, H. J.; Lee, J.; Wu, J.; Liu, H. N.; Wen, C.; Ayyad, Y.; Hatanaka, K.; Tran, D. T.; Yamamoto, T.; Tanaka, M.; Suzuki, T.

    2018-06-01

    A new 11Be(d , p)12Be transfer reaction experiment was carried out in inverse kinematics at 26.9A MeV, with special efforts devoted to the determination of the deuteron target thickness and of the required optical potentials from the present elastic scattering data. In addition a direct measurement of the cross section for the 02 + state was realized by applying an isomer-tagging technique. The s-wave spectroscopic factors of 0.20-0.04+0.03 and 0.41-0.11+0.11 were extracted for the 01+ and 02+ states, respectively, in 12Be. Using the ratio of these spectroscopic factors, together with the previously reported results for the p-wave components, the single-particle component intensities in the bound 0+ states of 12Be were deduced, allowing a direct comparison with the theoretical predictions. It is evidenced that the ground-state configuration of 12Be is dominated by the d-wave intruder, exhibiting a dramatic evolution of the intruding mechanism from 11Be to 12Be, with a persistence of the N = 8 magic number broken.

  18. Prototype software model for designing intruder detection systems with simulation

    NASA Astrophysics Data System (ADS)

    Smith, Jeffrey S.; Peters, Brett A.; Curry, James C.; Gupta, Dinesh

    1998-08-01

    This article explores using discrete-event simulation for the design and control of defence oriented fixed-sensor- based detection system in a facility housing items of significant interest to enemy forces. The key issues discussed include software development, simulation-based optimization within a modeling framework, and the expansion of the framework to create real-time control tools and training simulations. The software discussed in this article is a flexible simulation environment where the data for the simulation are stored in an external database and the simulation logic is being implemented using a commercial simulation package. The simulation assesses the overall security level of a building against various intruder scenarios. A series of simulation runs with different inputs can determine the change in security level with changes in the sensor configuration, building layout, and intruder/guard strategies. In addition, the simulation model developed for the design stage of the project can be modified to produce a control tool for the testing, training, and real-time control of systems with humans and sensor hardware in the loop.

  19. Intersubject Variability in Fearful Face Processing: The Link Between Behavior and Neural Activation

    PubMed Central

    Doty, Tracy J.; Japee, Shruti; Ingvar, Martin; Ungerleider, Leslie G.

    2014-01-01

    Stimuli that signal threat show considerable variability in the extent to which they enhance behavior, even among healthy individuals. However, the neural underpinning of this behavioral variability is not well understood. By manipulating expectation of threat in an fMRI study of fearful vs. neutral face categorization, we uncovered a network of areas underlying variability in threat processing in healthy adults. We explicitly altered expectation by presenting face images at three different expectation levels: 80%, 50%, and 20%. Subjects were instructed to report as fast and as accurately as possible whether the face was fearful (signaled threat) or not. An uninformative cue preceded each face by 4 seconds (s). By taking the difference between response times (RT) to fearful compared to neutral faces, we quantified an overall fear RT bias (i.e. faster to fearful than neutral faces) for each subject. This bias correlated positively with late trial fMRI activation (8 s after the face) during unexpected fearful face trials in bilateral ventromedial prefrontal cortex, the left subgenual cingulate cortex, and the right caudate nucleus and correlated negatively with early trial fMRI activation (4 s after the cue) during expected neutral face trials in bilateral dorsal striatum and the right ventral striatum. These results demonstrate that the variability in threat processing among healthy adults is reflected not only in behavior but also in the magnitude of activation in medial prefrontal and striatal regions that appear to encode affective value. PMID:24841078

  20. Intersubject variability in fearful face processing: the link between behavior and neural activation.

    PubMed

    Doty, Tracy J; Japee, Shruti; Ingvar, Martin; Ungerleider, Leslie G

    2014-12-01

    Stimuli that signal threat show considerable variability in the extents to which they enhance behavior, even among healthy individuals. However, the neural underpinning of this behavioral variability is not well understood. By manipulating expectation of threat in an fMRI study of fearful versus neutral face categorization, we uncovered a network of areas underlying variability in threat processing in healthy adults. We explicitly altered expectations by presenting face images at three different expectation levels: 80 %, 50 %, and 20 %. Subjects were instructed to report as quickly and accurately as possible whether the face was fearful (signaled threat) or not. An uninformative cue preceded each face by 4 s. By taking the difference between reaction times (RTs) to fearful and neutral faces, we quantified an overall fear RT bias (i.e., faster to fearful than to neutral faces) for each subject. This bias correlated positively with late-trial fMRI activation (8 s after the face) during unexpected-fearful-face trials in bilateral ventromedial prefrontal cortex, the left subgenual cingulate cortex, and the right caudate nucleus, and correlated negatively with early-trial fMRI activation (4 s after the cue) during expected-neutral-face trials in bilateral dorsal striatum and the right ventral striatum. These results demonstrate that the variability in threat processing among healthy adults is reflected not only in behavior, but also in the magnitude of activation in medial prefrontal and striatal regions that appear to encode affective value.

  1. Stereotype Threat: A Qualitative Study of the Challenges Facing Female Undergraduate Engineering Students

    NASA Astrophysics Data System (ADS)

    Entsminger, J. R., II

    From a sociocultural point of view, this qualitative case study explored how upper-level, female undergraduate engineering students perceived the possibility of or experience with stereotype threat as shaping their experiences. The study also investigated how these students explained their reasons for choosing their engineering major, the challenges they encountered in the major, and their reasons for persevering in spite of those challenges. Using Steele and Aronson's (1995) stereotype threat theory as a framework, and considering the documented underrepresentation of females in engineering, the study sought to examine how stereotype threat shaped the experiences of these students and if stereotype threat could be considered a valid reason for the underrepresentation. The study was conducted at a large, four-year public university. First, students in the College of Engineering and Engineering Technology completed the Participant Screening Survey. Based on responses from the survey, six female engineering students from the college were identified and invited to participate in the study. The participants came from the following majors: Electrical Engineering, Industrial and Systems Engineering, and Mechanical Engineering. After receiving the study consent letter and agreeing to participate, the students were involved in a 90-minute focus group meeting, a 45-minute one-on-one interview, and a 30-minute follow-up interview. After conducting the data collection methods, the data were then transcribed, analyzed, and coded for theme development. The themes that emerged coincided with each research question. The themes highlighted the complex interactions and experiences shared by the female engineering majors. The female students were enveloped in an environment where there existed an increased risk for activating stereotype threat. In addition, the female students described feeling pushed to prove to themselves and to others that the negative stereotype that 'females

  2. UAS Well Clear Recovery Against Non-Cooperative Intruders Using Vertical Maneuvers

    NASA Technical Reports Server (NTRS)

    Cone, Andrew C.; Thipphavong, David; Lee, Seung Man; Santiago, Confesor

    2017-01-01

    This paper documents a study that drove the development of a mathematical expression in the detect-and-avoid (DAA) minimum operational performance standards (MOPS) for unmanned aircraft systems (UAS). This equation describes the conditions under which vertical maneuver guidance should be provided during recovery of DAA well clear separation with a non-cooperative VFR aircraft. Although the original hypothesis was that vertical maneuvers for DAA well clear recovery should only be offered when sensor vertical rate errors are small, this paper suggests that UAS climb and descent performance should be considered-in addition to sensor errors for vertical position and vertical rate-when determining whether to offer vertical guidance. A fast-time simulation study involving 108,000 encounters between a UAS and a non-cooperative visual-flight-rules aircraft was conducted. Results are presented showing that, when vertical maneuver guidance for DAA well clear recovery was suppressed, the minimum vertical separation increased by roughly 50 feet (or horizontal separation by 500 to 800 feet). However, the percentage of encounters that had a risk of collision when performing vertical well clear recovery maneuvers was reduced as UAS vertical rate performance increased and sensor vertical rate errors decreased. A class of encounter is identified for which vertical-rate error had a large effect on the efficacy of horizontal maneuvers due to the difficulty of making the correct left/right turn decision: crossing conflict with intruder changing altitude. Overall, these results support logic that would allow vertical maneuvers when UAS vertical performance is sufficient to avoid the intruder, based on the intruder's estimated vertical position and vertical rate, as well as the vertical rate error of the UAS' sensor.

  3. Self-esteem, authoritarianism, and democratic values in the face of threat.

    PubMed

    Shaffer, Barbara A; Hastings, Brad M

    2004-08-01

    This study investigated the associations among terrorist threat, right-wing authoritarianism, self-esteem, and their relations in support for democratic values. Students (n = 140) completed Altemeyer's Right-Wing Authoritarianism Scale, Rosenberg's Self-esteem Scale, and the Democratic Values Scale. The participants also read an editorial regarding the events of 9/11/01 and completed two mortality-salience questions to induce a sense of threat. Results showed that self-esteem was a significant contributor to the prediction of scores on the Democratic Values Scale. Furthermore, the interaction between self-esteem and right-wing authoritarianism explained significant variance in the Democratic Values Scale scores. The results are interpreted in light of theories addressing authoritarianism and self-esteem.

  4. Fingerprint Liveness Detection in the Presence of Capable Intruders.

    PubMed

    Sequeira, Ana F; Cardoso, Jaime S

    2015-06-19

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  5. Fingerprint Liveness Detection in the Presence of Capable Intruders

    PubMed Central

    Sequeira, Ana F.; Cardoso, Jaime S.

    2015-01-01

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system. PMID:26102491

  6. Stereotype threat affects financial decision making.

    PubMed

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  7. Remixing the ‘Appropriate Mix’: Reassessing NATO’s Deterrence and Defense Posture in the Face of New Threats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Juarez, Anthony

    The North Atlantic Treaty Organization (NATO) and the countries of Europe face a renewed challenge from the east vis-à-vis the Putin regime in Moscow. In the face of these new challenges, NATO must reconsider its deterrence and defense posture in order to deter conflict in Europe. Unfortunately, Russian attempts to rewrite the rules of the post-Cold War international order by force have been coupled with nuclear saber rattling and overt nuclear threats. Russia’s nuclear threats, in addition to provocative changes to Russia’s nuclear posture in its Military Doctrine, are methods to make up for Russia’s conventional military inferiority relative tomore » NATO and the United States. Some have described Moscow’s actions as laying the groundwork for a nuclear coercion strategy. While the decrease in the nuclear arsenals of Russia and the United States has reduced the likelihood of nuclear annihilation to an all-time low since the height of the Cold War, Russia’s nuclear coercion strategy is increasing the probability of nuclear employment in Europe. The probability of nuclear use is compounded by Russia’s tremendous local military advantage around its periphery in spite of U.S. global military primacy. This military advantage increases the incentive to use military force if Russian decision-makers conclude that a quick military victory is possible, or if Russian leaders miscalculate based on an incorrect assessment of military force balance or resolve of their adversary. The integration of Lithuania, Latvia, and Estonia (referred to as the Baltics in this paper) into the NATO alliance in 2004 makes Russia’s military advantage in its periphery increasingly relevant. Each NATO state is required to assist any NATO state that comes under attack per Article V of the North Atlantic Treaty. The Baltic states’ proximity to Russia, their weak indigenous militaries, their former status as Soviet Republics, large population of ethnic Russians, and Russian

  8. Task-irrelevant fear enhances amygdala-FFG inhibition and decreases subsequent face processing.

    PubMed

    Schulte Holthausen, Barbara; Habel, Ute; Kellermann, Thilo; Schelenz, Patrick D; Schneider, Frank; Christopher Edgar, J; Turetsky, Bruce I; Regenbogen, Christina

    2016-09-01

    Facial threat is associated with changes in limbic activity as well as modifications in the cortical face-related N170. It remains unclear if task-irrelevant threat modulates the response to a subsequent facial stimulus, and whether the amygdala's role in early threat perception is independent and direct, or modulatory. In 19 participants, crowds of emotional faces were followed by target faces and a rating task while simultaneous EEG-fMRI were recorded. In addition to conventional analyses, fMRI-informed EEG analyses and fMRI dynamic causal modeling (DCM) were performed. Fearful crowds reduced EEG N170 target face amplitudes and increased responses in a fMRI network comprising insula, amygdala and inferior frontal cortex. Multimodal analyses showed that amygdala response was present ∼60 ms before the right fusiform gyrus-derived N170. DCM indicated inhibitory connections from amygdala to fusiform gyrus, strengthened when fearful crowds preceded a target face. Results demonstrated the suppressing influence of task-irrelevant fearful crowds on subsequent face processing. The amygdala may be sensitive to task-irrelevant fearful crowds and subsequently strengthen its inhibitory influence on face-responsive fusiform N170 generators. This provides spatiotemporal evidence for a feedback mechanism of the amygdala by narrowing attention in order to focus on potential threats. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  9. Brief Report: Reduced Prioritization of Facial Threat in Adults with Autism

    ERIC Educational Resources Information Center

    Sasson, Noah J.; Shasteen, Jonathon R.; Pinkham, Amy E.

    2016-01-01

    Typically-developing (TD) adults detect angry faces more efficiently within a crowd than non-threatening faces. Prior studies of this social threat superiority effect (TSE) in ASD using tasks consisting of schematic faces and homogeneous crowds have produced mixed results. Here, we employ a more ecologically-valid test of the social TSE and find…

  10. Effect of intruder mass on collisions with hard binaries. II - Dependence on impact parameter and computations of the interaction cross sections

    NASA Astrophysics Data System (ADS)

    Hills, J. G.

    1992-06-01

    Over 125,000 encounters between a hard binary with equal mass, components and orbital eccentricity of 0, and intruders with solar masses ranging from 0.01 to 10,000 are simulated. Each encounter was followed up to a maximum of 5 x 10 exp 6 integration steps to allow long-term 'resonances', temporary trinary systems, to break into a binary and a single star. These simulations were done over a range of impact parameters to find the cross sections for various processes occurring in these encounters. A critical impact parameter found in these simulations is the one beyond which no exchange collisions can occur. The energy exchange between the binary and a massive intruder decreases greatly in collisions with Rmin of not less than Rc. The semimajor axes and orbital eccentricity of the surviving binary also drops rapidly at Rc in encounters with massive intruders. The formation of temporary trinary systems is important for all intruder masses.

  11. Resident intruder paradigm-induced aggression relieves depressive-like behaviors in male rats subjected to chronic mild stress

    PubMed Central

    Wei, Sheng; Ji, Xiao-wei; Wu, Chun-ling; Li, Zi-fa; Sun, Peng; Wang, Jie-qiong; Zhao, Qi-tao; Gao, Jie; Guo, Ying-hui; Sun, Shi-guang; Qiao, Ming-qi

    2014-01-01

    Background Accumulating epidemiological evidence shows that life event stressors are major vulnerability factors for psychiatric diseases such as major depression. It is also well known that the resident intruder paradigm (RIP) results in aggressive behavior in male rats. However, it is not known how resident intruder paradigm-induced aggression affects depressive-like behavior in isolated male rats subjected to chronic mild stress (CMS), which is an animal model of depression. Material/Methods Male Wistar rats were divided into 3 groups: non-stressed controls, isolated rats subjected to the CMS protocol, and resident intruder paradigm-exposed rats subjected to the CMS protocol. Results In the sucrose intake test, ingestion of a 1% sucrose solution by rats in the CMS group was significantly lower than in control and CMS+RIP rats after 3 weeks of stress. In the open-field test, CMS rats had significantly lower open-field scores compared to control rats. Furthermore, the total scores given the CMS group were significantly lower than in the CMS+RIP rats. In the forced swimming test (FST), the immobility times of CMS rats were significantly longer than those of the control or CMS+RIP rats. However, no differences were observed between controls and CMS+RIP rats. Conclusions Our data show that aggressive behavior evoked by the resident intruder paradigm could relieve broad-spectrum depressive-like behaviors in isolated adult male rats subjected to CMS. PMID:24911067

  12. Face liveness detection for face recognition based on cardiac features of skin color image

    NASA Astrophysics Data System (ADS)

    Suh, Kun Ha; Lee, Eui Chul

    2016-07-01

    With the growth of biometric technology, spoofing attacks have been emerged a threat to the security of the system. Main spoofing scenarios in the face recognition system include the printing attack, replay attack, and 3D mask attack. To prevent such attacks, techniques that evaluating liveness of the biometric data can be considered as a solution. In this paper, a novel face liveness detection method based on cardiac signal extracted from face is presented. The key point of proposed method is that the cardiac characteristic is detected in live faces but not detected in non-live faces. Experimental results showed that the proposed method can be effective way for determining printing attack or 3D mask attack.

  13. Oxytocin attenuates neural reactivity to masked threat cues from the eyes.

    PubMed

    Kanat, Manuela; Heinrichs, Markus; Schwarzwald, Ralf; Domes, Gregor

    2015-01-01

    The neuropeptide oxytocin has recently been shown to modulate covert attention shifts to emotional face cues and to improve discrimination of masked facial emotions. These results suggest that oxytocin modulates facial emotion processing at early perceptual stages prior to full evaluation of the emotional expression. Here, we used functional magnetic resonance imaging to examine whether oxytocin alters neural responses to backwardly masked angry and happy faces while controlling for attention to the eye vs the mouth region. Intranasal oxytocin administration reduced amygdala reactivity to masked emotions when attending to salient facial features, ie, the eyes of angry faces and the mouth of happy faces. In addition, oxytocin decreased neural responses within the fusiform gyrus and brain stem areas, as well as functional coupling between the amygdala and the fusiform gyrus specifically for threat cues from the eyes. Effects of oxytocin on brain activity were not attributable to differences in behavioral performance, as oxytocin had no impact on mere emotion detection. Our results suggest that oxytocin attenuates neural correlates of early arousal by threat signals from the eye region. As reduced threat sensitivity may increase the likelihood of engaging in social interactions, our findings may have important implications for clinical states of social anxiety.

  14. Major Issues Facing the Conservation Movement in the Coming Decade and Beyond.

    ERIC Educational Resources Information Center

    Strong, Maurice

    1984-01-01

    The key issues facing the conservation movement may be grouped into three areas: (1) threats to human health; (2) threats to food and fuel supplies; and (3) long-term threats to the biosphere. Each of these areas is discussed. (JN)

  15. Failure to differentiate between threat-related and positive emotion cues in healthy adults with childhood interpersonal or adult trauma.

    PubMed

    Chu, Denise A; Bryant, Richard A; Gatt, Justine M; Harris, Anthony W F

    2016-07-01

    Enhanced threat-related processing is associated with both elevated anxiety and childhood exposure to trauma. Given the paucity of evidence regarding the effects of childhood and adult trauma exposure on subsequent psychophysiological processes in the absence of psychopathology, we investigated the relative impacts of childhood interpersonal and non-interpersonal trauma, as well as adult trauma exposure on neural processing of threat in healthy adults. We measured peak amplitudes of the N170 face-sensitive visual ERP component response to non-conscious and conscious Angry (threat) versus Happy (non-threat, positive) and Neutral (non-threat baseline) faces at temporo-occipital sites (right-T6; left-T5) in 489 psychiatrically asymptomatic adults (aged 18-70 years, 54% women, 94% right-handed). N170 peak amplitude differences between Angry vs Happy or Neutral faces were calculated and subjected to hierarchical multiple regression analysis, with trauma types (childhood interpersonal, childhood non-interpersonal and adult trauma) entered as predictors of interest. After controlling for sociodemographic and health factors, N170 peak amplitudes for non-conscious Angry vs Happy faces were inversely associated with childhood interpersonal trauma at T6 and adult trauma exposure at T5. Post-hoc repeated measures ANOVA indicated that unlike adults without trauma exposure, trauma-exposed adults failed to show significantly reduced N170 responses to Happy relative to Angry faces during non-conscious processing. This suggests that childhood interpersonal and adult trauma exposure are associated with a failure to differentiate between non-threat or positive and threat-related emotion cues. This is consistent with generalised hypervigilance seen in PTSD, and suggests trauma exposure is associated with a generalized heightened responsivity to non-conscious non-threat or positive as well as threat-related emotion cues in psychiatrically healthy adults. Copyright © 2016 Elsevier Ltd

  16. Finding a Face in the Crowd: Testing the Anger Superiority Effect in Asperger Syndrome

    ERIC Educational Resources Information Center

    Ashwin, Chris; Wheelwright, Sally; Baron-Cohen, Simon

    2006-01-01

    Social threat captures attention and is processed rapidly and efficiently, with many lines of research showing involvement of the amygdala. Visual search paradigms looking at social threat have shown angry faces "pop-out" in a crowd, compared to happy faces. Autism and Asperger Syndrome (AS) are neurodevelopmental conditions…

  17. Electrocortical processing of social signals of threat in combat-related post-traumatic stress disorder.

    PubMed

    MacNamara, Annmarie; Post, David; Kennedy, Amy E; Rabinak, Christine A; Phan, K Luan

    2013-10-01

    Post-traumatic stress disorder (PTSD) is characterized by avoidance, emotional numbing, increased arousal and hypervigilance for threat following a trauma. Thirty-three veterans (19 with PTSD, 14 without PTSD) who had experienced combat trauma while on deployment in Iraq and/or Afghanistan completed an emotional faces matching task while electroencephalography was recorded. Vertex positive potentials (VPPs) elicited by happy, angry and fearful faces were smaller in veterans with versus without PTSD. In addition, veterans with PTSD exhibited smaller late positive potentials (LPPs) to angry faces and greater intrusive symptoms predicted smaller LPPs to fearful faces in the PTSD group. Veterans with PTSD were also less accurate at identifying angry faces, and accuracy decreased in the PTSD group as hyperarousal symptoms increased. These findings show reduced early processing of emotional faces, irrespective of valence, and blunted prolonged processing of social signals of threat in conjunction with impaired perception for angry faces in PTSD. Copyright © 2013 Elsevier B.V. All rights reserved.

  18. Obstacles facing Africa's young climate scientists

    NASA Astrophysics Data System (ADS)

    Dike, Victor Nnamdi; Addi, Martin; Andang'o, Hezron Awiti; Attig, Bahar Faten; Barimalala, Rondrotiana; Diasso, Ulrich Jacques; Du Plessis, Marcel; Lamine, Salim; Mongwe, Precious N.; Zaroug, Modathir; Ochanda, Valentine Khasenye

    2018-06-01

    Current and future climate change poses a substantial threat to the African continent. Young scientists are needed to advance Earth systems science on the continent, but they face significant challenges.

  19. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    adaptation (learning). The increasingly complex demands facing analysts evaluating activity threatening to the security of the United States make the family of agent-based data collection (fusion) a promising area. This paper will discuss a system to support the collection and evaluation of potential threat activity as well as an approach fro presentation of the information.

  20. Maladaptive social information processing in childhood predicts young men's atypical amygdala reactivity to threat.

    PubMed

    Choe, Daniel Ewon; Shaw, Daniel S; Forbes, Erika E

    2015-05-01

    Maladaptive social information processing, such as hostile attributional bias and aggressive response generation, is associated with childhood maladjustment. Although social information processing problems are correlated with heightened physiological responses to social threat, few studies have examined their associations with neural threat circuitry, specifically amygdala activation to social threat. A cohort of 310 boys participated in an ongoing longitudinal study and completed questionnaires and laboratory tasks assessing their social and cognitive characteristics the boys were between 10 and 12 years of age. At age 20, 178 of these young men underwent functional magnetic resonance imaging and a social threat task. At age 22, adult criminal arrest records and self-reports of impulsiveness were obtained. Path models indicated that maladaptive social information-processing at ages 10 and 11 predicted increased left amygdala reactivity to fear faces, an ambiguous threat, at age 20 while accounting for childhood antisocial behavior, empathy, IQ, and socioeconomic status. Exploratory analyses indicated that aggressive response generation - the tendency to respond to threat with reactive aggression - predicted left amygdala reactivity to fear faces and was concurrently associated with empathy, antisocial behavior, and hostile attributional bias, whereas hostile attributional bias correlated with IQ. Although unrelated to social information-processing problems, bilateral amygdala reactivity to anger faces at age 20 was unexpectedly predicted by low IQ at age 11. Amygdala activation did not mediate associations between social information processing and number of criminal arrests, but both impulsiveness at age 22 and arrests were correlated with right amygdala reactivity to anger facial expressions at age 20. Childhood social information processing and IQ predicted young men's amygdala response to threat a decade later, which suggests that childhood social

  1. Functional connectivity between amygdala and facial regions involved in recognition of facial threat

    PubMed Central

    Harada, Tokiko; Ruffman, Ted; Sadato, Norihiro; Iidaka, Tetsuya

    2013-01-01

    The recognition of threatening faces is important for making social judgments. For example, threatening facial features of defendants could affect the decisions of jurors during a trial. Previous neuroimaging studies using faces of members of the general public have identified a pivotal role of the amygdala in perceiving threat. This functional magnetic resonance imaging study used face photographs of male prisoners who had been convicted of first-degree murder (MUR) as threatening facial stimuli. We compared the subjective ratings of MUR faces with those of control (CON) faces and examined how they were related to brain activation, particularly, the modulation of the functional connectivity between the amygdala and other brain regions. The MUR faces were perceived to be more threatening than the CON faces. The bilateral amygdala was shown to respond to both MUR and CON faces, but subtraction analysis revealed no significant difference between the two. Functional connectivity analysis indicated that the extent of connectivity between the left amygdala and the face-related regions (i.e. the superior temporal sulcus, inferior temporal gyrus and fusiform gyrus) was correlated with the subjective threat rating for the faces. We have demonstrated that the functional connectivity is modulated by vigilance for threatening facial features. PMID:22156740

  2. Storm in a coffee cup: caffeine modifies brain activation to social signals of threat

    PubMed Central

    Lawrence, Andrew D.; Diukova, Ana; Wise, Richard G.; Rogers, Peter J.

    2012-01-01

    Caffeine, an adenosine A1 and A2A receptor antagonist, is the most popular psychostimulant drug in the world, but it is also anxiogenic. The neural correlates of caffeine-induced anxiety are currently unknown. This study investigated the effects of caffeine on brain regions implicated in social threat processing and anxiety. Participants were 14 healthy male non/infrequent caffeine consumers. In a double-blind placebo-controlled crossover design, they underwent blood oxygenation level-dependent functional magnetic resonance imaging (fMRI) while performing an emotional face processing task 1 h after receiving caffeine (250 mg) or placebo in two fMRI sessions (counterbalanced, 1-week washout). They rated anxiety and mental alertness, and their blood pressure was measured, before and 2 h after treatment. Results showed that caffeine induced threat-related (angry/fearful faces > happy faces) midbrain-periaqueductal gray activation and abolished threat-related medial prefrontal cortex wall activation. Effects of caffeine on extent of threat-related amygdala activation correlated negatively with level of dietary caffeine intake. In concurrence with these changes in threat-related brain activation, caffeine increased self-rated anxiety and diastolic blood pressure. Caffeine did not affect primary visual cortex activation. These results are the first to demonstrate potential neural correlates of the anxiogenic effect of caffeine, and they implicate the amygdala as a key site for caffeine tolerance. PMID:21972425

  3. Subliminal presentation of other faces (but not own face) primes behavioral and evoked cortical processing of empathy for pain.

    PubMed

    Ibáñez, Agustín; Hurtado, Esteban; Lobos, Alejandro; Escobar, Josefina; Trujillo, Natalia; Baez, Sandra; Huepe, David; Manes, Facundo; Decety, Jean

    2011-06-29

    Current research on empathy for pain emphasizes the overlap in the neural response between the first-hand experience of pain and its perception in others. However, recent studies suggest that the perception of the pain of others may reflect the processing of a threat or negative arousal rather than an automatic pro-social response. It can thus be suggested that pain processing of other-related, but not self-related, information could imply danger rather than empathy, due to the possible threat represented in the expressions of others (especially if associated with pain stimuli). To test this hypothesis, two experiments considering subliminal stimuli were designed. In Experiment 1, neutral and semantic pain expressions previously primed with own or other faces were presented to participants. When other-face priming was used, only the detection of semantic pain expressions was facilitated. In Experiment 2, pictures with pain and neutral scenarios previously used in ERP and fMRI research were used in a categorization task. Those pictures were primed with own or other faces following the same procedure as in Experiment 1 while ERPs were recorded. Early (N1) and late (P3) cortical responses between pain and no-pain were modulated only in the other-face priming condition. These results support the threat value of pain hypothesis and suggest the necessity for the inclusion of own- versus other-related information in future empathy for pain research. Copyright © 2011 Elsevier B.V. All rights reserved.

  4. Effect of Vertical Rate Error on Recovery from Loss of Well Clear Between UAS and Non-Cooperative Intruders

    NASA Technical Reports Server (NTRS)

    Cone, Andrew; Thipphavong, David; Lee, Seung Man; Santiago, Confesor

    2016-01-01

    When an Unmanned Aircraft System (UAS) encounters an intruder and is unable to maintain required temporal and spatial separation between the two vehicles, it is referred to as a loss of well-clear. In this state, the UAS must make its best attempt to regain separation while maximizing the minimum separation between itself and the intruder. When encountering a non-cooperative intruder (an aircraft operating under visual flight rules without ADS-B or an active transponder) the UAS must rely on the radar system to provide the intruders location, velocity, and heading information. As many UAS have limited climb and descent performance, vertical position andor vertical rate errors make it difficult to determine whether an intruder will pass above or below them. To account for that, there is a proposal by RTCA Special Committee 228 to prohibit guidance systems from providing vertical guidance to regain well-clear to UAS in an encounter with a non-cooperative intruder unless their radar system has vertical position error below 175 feet (95) and vertical velocity errors below 200 fpm (95). Two sets of fast-time parametric studies was conducted, each with 54000 pairwise encounters between a UAS and non-cooperative intruder to determine the suitability of offering vertical guidance to regain well clear to a UAS in the presence of radar sensor noise. The UAS was not allowed to maneuver until it received well-clear recovery guidance. The maximum severity of the loss of well-clear was logged and used as the primary indicator of the separation achieved by the UAS. One set of 54000 encounters allowed the UAS to maneuver either vertically or horizontally, while the second permitted horizontal maneuvers, only. Comparing the two data sets allowed researchers to see the effect of allowing vertical guidance to a UAS for a particular encounter and vertical rate error. Study results show there is a small reduction in the average severity of a loss of well-clear when vertical maneuvers

  5. ATTENTION BIAS OF ANXIOUS YOUTH DURING EXTENDED EXPOSURE OF EMOTIONAL FACE PAIRS: AN EYE-TRACKING STUDY

    PubMed Central

    Shechner, Tomer; Jarcho, Johanna M.; Britton, Jennifer C.; Leibenluft, Ellen; Pine, Daniel S.; Nelson, Eric E.

    2012-01-01

    Background Previous studies demonstrate that anxiety is characterized by biased attention toward threats, typically measured by differences in motor reaction time to threat and neutral cues. Using eye-tracking methodology, the current study measured attention biases in anxious and nonanxious youth, using unrestricted free viewing of angry, happy, and neutral faces. Methods Eighteen anxious and 15 nonanxious youth (8–17 years old) passively viewed angry-neutral and happy-neutral face pairs for 10 s while their eye movements were recorded. Results Anxious youth displayed a greater attention bias toward angry faces than nonanxious youth, and this bias occurred in the earliest phases of stimulus presentation. Specifically, anxious youth were more likely to direct their first fixation to angry faces, and they made faster fixations to angry than neutral faces. Conclusions Consistent with findings from earlier, reaction-time studies, the current study shows that anxious youth, like anxious adults, exhibit biased orienting to threat-related stimuli. This study adds to the existing literature by documenting that threat biases in eye-tracking patterns are manifest at initial attention orienting. PMID:22815254

  6. Measuring attentional biases for threat in children and adults.

    PubMed

    LoBue, Vanessa

    2014-10-19

    Investigators have long been interested in the human propensity for the rapid detection of threatening stimuli. However, until recently, research in this domain has focused almost exclusively on adult participants, completely ignoring the topic of threat detection over the course of development. One of the biggest reasons for the lack of developmental work in this area is likely the absence of a reliable paradigm that can measure perceptual biases for threat in children. To address this issue, we recently designed a modified visual search paradigm similar to the standard adult paradigm that is appropriate for studying threat detection in preschool-aged participants. Here we describe this new procedure. In the general paradigm, we present participants with matrices of color photographs, and ask them to find and touch a target on the screen. Latency to touch the target is recorded. Using a touch-screen monitor makes the procedure simple and easy, allowing us to collect data in participants ranging from 3 years of age to adults. Thus far, the paradigm has consistently shown that both adults and children detect threatening stimuli (e.g., snakes, spiders, angry/fearful faces) more quickly than neutral stimuli (e.g., flowers, mushrooms, happy/neutral faces). Altogether, this procedure provides an important new tool for researchers interested in studying the development of attentional biases for threat.

  7. Attention Training and the Threat Bias: An ERP Study

    PubMed Central

    O’Toole, Laura; Dennis, Tracy A.

    2011-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these changes remain unclear. To address this issue, 49 non-anxious adults were randomly assigned to either attentional training toward or training away from threat using a modified version of the dot probe task. Behavioral measures of attentional biases were also generated pre- and post-training using the dot probe task. Event-related potentials (ERPs) were generated to threat and non-threat face pairs and probes during pre- and post-training assessments. Effects of training on behavioral measures of the threat bias were significant, but only for those participants showing pre-training biases. Attention training also influenced early spatial attention, as measured by post-training P1 amplitudes to cues. Results illustrate the importance of taking pre-training attention biases in non-anxious individuals into account when evaluating the effects of attention training and tracking physiological changes in attention following training. PMID:22083026

  8. Outcomes and stability in patients with anterior open bite and long anterior face height treated with temporary anchorage devices and a maxillary intrusion splint

    PubMed Central

    Scheffler, Nicole R.; Proffit, William R.; Phillips, Ceib

    2015-01-01

    Introduction Temporary skeletal anchorage devices now offer the possibility of closing anterior open bites and decreasing anterior face height by intruding maxillary posterior teeth, but data for treatment outcomes are lacking. This article presents outcomes and posttreatment changes for consecutive patients treated with a standardized technique. Methods The sample included 33 consecutive patients who had intrusion of maxillary posterior teeth with a maxillary occlusal splint and nickel-titanium coil springs to temporary anchorage devices in the zygomatic buttress area, buccal and apical to the maxillary molars. Of this group, 30 had adequate cephalograms available for the period of treatment, 27 had cephalograms including 1-year posttreatment, and 25 had cephalograms from 2 years or longer. Results During splint therapy, the mean molar intrusion was 2.3 mm. The mean decrease in anterior face height was 1.6 mm, less than expected because of a 0.6-mm mean eruption of the mandibular molars. During the postintrusion orthodontics, the mean change in maxillary molar position was a 0.2-mm extrusion, and there was a mean 0.5-mm increase in face height. Positive overbite was maintained in all patients, with a slight elongation (<2 mm) of the incisors contributing to this. During the 1 year of posttreatment retention, the mean changes were a further eruption of 0.5 mm of the maxillary molars, whereas the mandibular molars intruded by 0.6 mm, and there was a small decrease in anterior face height. Changes beyond 1 year posttreatment were small and attributable to growth rather than relapse in tooth positions. Conclusions Intrusion of the maxillary posterior teeth can give satisfactory correction of moderately severe anterior open bites, but 0.5 to 1.5 mm of reeruption of these teeth is likely to occur. Controlling the vertical position of the mandibular molars so that they do not erupt as the maxillary teeth are intruded is important in obtaining a decrease in face height

  9. Reactivity Indexes of Fullerene and Bismullene Mixed Clusters: How the Intruders Modify the Properties.

    PubMed

    Martínez, Ana

    2016-11-03

    In this investigation, the feasibility of functionalizing fullerene and bismullene with Bi and C as intruders is theoretically explored. The systems analyzed are C 60-x Bi x (with x = 0-10, fullerene-like) and Bi 60-y C y (with y = 0-10, bismullene-like). Optimized geometries, reactivity indexes, and highest occupied molecular orbital to lowest unoccupied molecular orbital (HOMO-LUMO) gaps (for analyzing the potential application of these molecules as materials for solar cells) are reported. The most stable structures of bismullene-like systems have cage geometries. The most stable fullerene-like geometries resemble a cup with bismuth atoms at the edge of the bowl. The presence of intruders increases the electron acceptor power and decreases the electron donor power in most cases. HOMO-LUMO gaps indicate that bismullene-like clusters represent better candidates for building solar cells than fullerene-like clusters. This information could be useful for future experiments.

  10. At a global scale, do climate change threatened species also face a greater number of non-climatic threats?

    USGS Publications Warehouse

    Fortini, Lucas B.; Dye, Kaipo

    2017-01-01

    found other (but not all) anthropogenic threats are also similarly associated with more threats. Our findings serve as a reminder that ecological research should seriously consider these potential threat interactions, especially for species under elevated conservation concern.

  11. Maladaptive social information processing in childhood predicts young men’s atypical amygdala reactivity to threat

    PubMed Central

    Choe, Daniel Ewon; Shaw, Daniel S.; Forbes, Erika E.

    2014-01-01

    Background Maladaptive social information processing, such as hostile attributional bias and aggressive response generation, is associated with childhood maladjustment. Although social information processing problems are correlated with heightened physiological responses to social threat, few studies have examined their associations with neural threat circuitry, specifically amygdala activation to social threat. Methods A cohort of 310 boys participated in an ongoing longitudinal study and completed questionnaires and laboratory tasks assessing their social and cognitive characteristics between 10- and 12-years-old. At age 20, 178 of these young men underwent functional magnetic resonance imaging and a social threat task. At age 22, adult criminal arrest records and self-reports of impulsiveness were obtained. Results Path models indicated that maladaptive social information processing at ages 10 and 11 predicted increased left amygdala reactivity to fear faces, an ambiguous threat, at age 20 while accounting for childhood antisocial behavior, empathy, IQ, and socioeconomic status. Exploratory analyses indicated that aggressive response generation—the tendency to respond to threat with reactive aggression—predicted left amygdala reactivity to fear faces and was concurrently associated with empathy, antisocial behavior, and hostile attributional bias, whereas hostile attributional bias correlated with IQ. Although unrelated to social information processing problems, bilateral amygdala reactivity to anger faces at age 20 was unexpectedly predicted by low IQ at age 11. Amygdala activation did not mediate associations between social information processing and number of criminal arrests, but both impulsiveness at age 22 and arrests were correlated with right amygdala reactivity to anger facial expressions at age 20. Conclusions Childhood social information processing and IQ predicted young men’s amygdala response to threat a decade later, which suggests that

  12. How Moral Threat Shapes Laypersons' Engagement With Science.

    PubMed

    Bender, Jens; Rothmund, Tobias; Nauroth, Peter; Gollwitzer, Mario

    2016-12-01

    Laypersons' engagement with science has grown over the last decade, especially in Internet environments. While this development has many benefits, scientists also face the challenge of devaluation and public criticism by laypersons. Embedding this phenomenon in social-psychological theories and research on value-behavior correspondence, we investigated moral threat as a factor influencing laypersons' engagement with science. Across three studies, we hypothesized and found that moral values shape the way laypersons evaluate and communicate about science when these values are threatened in a given situation and central to people's self-concept. However, prior research on the underlying mechanism of moral threat effects cannot fully rule out value salience as an alternative explanation. To close this gap, we situationally induced value salience while varying the degree of moral threat (Study 3). Our findings indicate that moral threat amplifies the influence of moral values on laypersons' evaluation of science above and beyond value salience. © 2016 by the Society for Personality and Social Psychology, Inc.

  13. Evidence from Meta-Analyses of the Facial Width-to-Height Ratio as an Evolved Cue of Threat.

    PubMed

    Geniole, Shawn N; Denson, Thomas F; Dixson, Barnaby J; Carré, Justin M; McCormick, Cheryl M

    2015-01-01

    The facial width-to-height ratio (FWHR) is the width of the face divided by the height of the upper face. There is mixed evidence for the hypothesis that the FWHR is a cue of threat and dominance in the human face. We conducted a systematic review and meta-analyses of all peer-reviewed studies (and 2 unpublished studies) to estimate the magnitude of the sex difference in the FWHR, and the magnitude of the relationship between the FWHR and threatening and dominant behaviours and perceptions. Studies were eligible for inclusion if the authors reported an analysis involving the FWHR. Our analyses revealed that the FWHR was larger in men than in women (d = .11, n = 10,853), cued judgements of masculinity in men (r = .35, n of faces = 487; n of observers = 339), and was related to body mass index (r = .31, n = 2,506). Further, the FWHR predicted both threat behaviour in men (r = .16, n = 4,603) and dominance behaviour in both sexes (r = .12, n = 948) across a variety of indices. Individuals with larger FWHRs were judged by observers as more threatening (r = .46, n of faces = 1,691; n of observers = 2,076) and more dominant (r = .20, n of faces = 603; n of observers = 236) than those with smaller FWHRs. Individuals with larger FWHRs were also judged as less attractive (r = -.26, n of faces = 721; n of observers = 335), especially when women made the judgements. These findings provide some support for the hypothesis that the FWHR is part of an evolved cueing system of intra-sexual threat and dominance in men. A limitation of the meta-analyses on perceptions of threat and dominance were the low number of stimuli involving female and older adult faces.

  14. Evidence from Meta-Analyses of the Facial Width-to-Height Ratio as an Evolved Cue of Threat

    PubMed Central

    Geniole, Shawn N.; Denson, Thomas F.; Dixson, Barnaby J.; Carré, Justin M.; McCormick, Cheryl M.

    2015-01-01

    The facial width-to-height ratio (FWHR) is the width of the face divided by the height of the upper face. There is mixed evidence for the hypothesis that the FWHR is a cue of threat and dominance in the human face. We conducted a systematic review and meta-analyses of all peer-reviewed studies (and 2 unpublished studies) to estimate the magnitude of the sex difference in the FWHR, and the magnitude of the relationship between the FWHR and threatening and dominant behaviours and perceptions. Studies were eligible for inclusion if the authors reported an analysis involving the FWHR. Our analyses revealed that the FWHR was larger in men than in women (d¯ = .11, n = 10,853), cued judgements of masculinity in men (r¯ = .35, n of faces = 487; n of observers = 339), and was related to body mass index (r¯ = .31, n = 2,506). Further, the FWHR predicted both threat behaviour in men (r¯ = .16, n = 4,603) and dominance behaviour in both sexes (r¯ = .12, n = 948) across a variety of indices. Individuals with larger FWHRs were judged by observers as more threatening (r¯ = .46, n of faces = 1,691; n of observers = 2,076) and more dominant (r¯ = .20, n of faces = 603; n of observers = 236) than those with smaller FWHRs. Individuals with larger FWHRs were also judged as less attractive (r¯ = -.26, n of faces = 721; n of observers = 335), especially when women made the judgements. These findings provide some support for the hypothesis that the FWHR is part of an evolved cueing system of intra-sexual threat and dominance in men. A limitation of the meta-analyses on perceptions of threat and dominance were the low number of stimuli involving female and older adult faces. PMID:26181579

  15. Expressing and negotiating face in community pharmacist-patient interactions.

    PubMed

    Murad, Muna S; Spiers, Judith A; Guirguis, Lisa M

    2017-11-01

    A collaborative patient-pharmacist interaction is fundamental to greater patient satisfaction with pharmacy care and improved medication adherence. Effective pharmacist-patient communication occurs when both pharmacist and patient are able to successfully attend to not only the typical tasks and goals of the interaction but also basic face needs that underlie all social interaction; autonomy, competence or esteem, and fellowship. Addressing face needs occurs through conventional and strategic communication strategies that respond to the emerging needs throughout an interaction. Pharmacist-patient interactions are not just about transfer of information and medications. Both parties assess the situation, the others' intentions within the context of their own goals and this influences how they choose to act throughout the interaction. Face-work Theory provides a framework to understand these interaction processes in pharmacist-patient communication. The aim of this study was to determine face needs, threats and the strategic communication strategies used to address these within community pharmacist-patient interactions. This exploratory descriptive study drew upon principles of ethology to first describe naturally occurring behaviour and then to interpret this behaviour within the context of Face-work theory. Twenty-five audio-recorded community pharmacist-patient interactions were collected and analyzed. The average length of these interactions was 3:67 min with a range of 0.39 s-9:35 min. Multiple face needs for both pharmacist and patient were evident in most interactions. Autonomy, competence and fellowship face needs were negotiated in the following contexts: participative relationships, concordant role expectations, sensitive topics, and negotiating expertise and knowledge. Competence face needs for both parties were the most dominant need found in negotiating role expectations. The most common communication strategies used to support face were solidarity

  16. Amygdala hyperactivation to angry faces in intermittent explosive disorder.

    PubMed

    McCloskey, Michael S; Phan, K Luan; Angstadt, Mike; Fettich, Karla C; Keedy, Sarah; Coccaro, Emil F

    2016-08-01

    Individuals with intermittent explosive disorder (IED) were previously found to exhibit amygdala hyperactivation and relatively reduced orbital medial prefrontal cortex (OMPFC) activation to angry faces while performing an implicit emotion information processing task during functional magnetic resonance imaging (fMRI). This study examines the neural substrates associated with explicit encoding of facial emotions among individuals with IED. Twenty unmedicated IED subjects and twenty healthy, matched comparison subjects (HC) underwent fMRI while viewing blocks of angry, happy, and neutral faces and identifying the emotional valence of each face (positive, negative or neutral). We compared amygdala and OMPFC reactivity to faces between IED and HC subjects. We also examined the relationship between amygdala/OMPFC activation and aggression severity. Compared to controls, the IED group exhibited greater amygdala response to angry (vs. neutral) facial expressions. In contrast, IED and control groups did not differ in OMPFC activation to angry faces. Across subjects amygdala activation to angry faces was correlated with number of prior aggressive acts. These findings extend previous evidence of amygdala dysfunction in response to the identification of an ecologically-valid social threat signal (processing angry faces) among individuals with IED, further substantiating a link between amygdala hyperactivity to social signals of direct threat and aggression. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Investigating the genetic and environmental bases of biases in threat recognition and avoidance in children with anxiety problems

    PubMed Central

    2012-01-01

    Background Adults with anxiety show biased categorization and avoidance of threats. Such biases may emerge through complex interplay between genetics and environments, occurring early in life. Research on threat biases in children has focuses on a restricted range of biases, with insufficient focus on genetic and environmental origins. Here, we explore differences between children with and without anxiety problems in under-studied areas of threat bias. We focused both on associations with anxious phenotype and the underlying gene-environmental correlates for two specific processes: the categorisation of threat faces and avoidance learning. Method Two-hundred and fifty 10-year old MZ and DZ twin pairs (500 individuals) completed tasks assessing accuracy in the labelling of threatening facial expressions and in the acquisition of avoidant responses to a card associated with a masked threatening face. To assess whether participants met criteria for an anxiety disorder, parents of twins completed a self-guided computerized version of the Development and Well-being Assessment (DAWBA). Comparison of MZ and DZ twin correlations using model-fitting were used to compute estimates of genetic, shared and non-shared environmental effects. Results Of the 500 twins assessed, 25 (5%) met diagnostic criteria for a current anxiety disorder. Children with anxiety disorders were more accurate in their ability to recognize disgust faces than those without anxiety disorders, but were commensurate on identifying other threatening face emotions (angry, fearful, sad). Children with anxiety disorders but also more strongly avoided selecting a conditioned stimulus than non-anxious children. While recognition of socially threatening faces was moderately heritable, avoidant responses were heavily influenced by the non-shared environment. Conclusion These data add to other findings on threat biases in anxious children. Specifically, we found biases in the labelling of some negative

  18. Neural circuitry governing anxious individuals' mis-allocation of working memory to threat.

    PubMed

    Stout, Daniel M; Shackman, Alexander J; Pedersen, Walker S; Miskovich, Tara A; Larson, Christine L

    2017-08-18

    Dispositional anxiety is a trait-like phenotype that confers increased risk for a range of debilitating neuropsychiatric disorders. Like many patients with anxiety disorders, individuals with elevated levels of dispositional anxiety are prone to intrusive and distressing thoughts in the absence of immediate threat. Recent electrophysiological research suggests that these symptoms are rooted in the mis-allocation of working memory (WM) resources to threat-related information. Here, functional MRI was used to identify the network of brain regions that support WM for faces and to quantify the allocation of neural resources to threat-related distracters in 81 young adults. Results revealed widespread evidence of mis-allocation. This was evident in both face-selective regions of the fusiform cortex and domain-general regions of the prefrontal and parietal cortices. This bias was exaggerated among individuals with a more anxious disposition. Mediation analyses provided compelling evidence that anxious individuals' tendency to mis-allocate WM resources to threat-related distracters is statistically explained by heightened amygdala reactivity. Collectively, these results provide a neurocognitive framework for understanding the pathways linking anxious phenotypes to the development of internalizing psychopathology and set the stage for developing improved intervention strategies.

  19. Taking chances in the face of threat: romantic risk regulation and approach motivation.

    PubMed

    Cavallo, Justin V; Fitzsimons, Gráinne M; Holmes, John G

    2009-06-01

    Four studies examine the hypothesis that goals adopted by high and low self-esteem people (HSEs and LSEs) to manage risk in romantic relationships may reflect global shifts in approach motivation and subsequently affect risk taking in nonsocial domains. In Studies 1 and 2, threats to participants' romantic relationships heightened HSEs' self-reported general approach motivation while lowering LSEs' approach motivation. In Studies 2 through 4, HSEs exhibited riskier decision making (i.e., a greater tendency to pursue rewards and ignore risks) in nonsocial domains following a relationship threat manipulation whereas LSEs made more conservative decisions. These results suggest that the romantic risk regulation may be inherently linked to a broader approach and avoidance system and that specific risk regulation behaviors may be driven by global motivational shifts to a greater degree than previously theorized.

  20. Identification of the crossing point at N =21 between normal and intruder configurations

    NASA Astrophysics Data System (ADS)

    Licǎ, R.; Rotaru, F.; Borge, M. J. G.; Grévy, S.; NegoiÅ£ǎ, F.; Poves, A.; Sorlin, O.; Andreyev, A. N.; Borcea, R.; Costache, C.; De Witte, H.; Fraile, L. M.; Greenlees, P. T.; Huyse, M.; Ionescu, A.; Kisyov, S.; Konki, J.; Lazarus, I.; Madurga, M.; Mǎrginean, N.; Mǎrginean, R.; Mihai, C.; Mihai, R. E.; Negret, A.; Page, R. D.; Pakarinen, J.; Pascu, S.; Pucknell, V.; Rahkila, P.; Rapisarda, E.; Şerban, A.; Sotty, C. O.; Stan, L.; Stǎnoiu, M.; Tengblad, O.; Turturicǎ, A.; Van Duppen, P.; Wadsworth, R.; Warr, N.; IDS Collaboration

    2017-02-01

    The β- decay of 34Mg was used to study the 34Al nucleus through γ spectroscopy at the Isotope Separator On-Line facility of CERN. Previous studies identified two β -decaying states in 34Al having spin-parity assignments Jπ=4- dominated by the normal configuration π (d5/2) -1⊗ν (f7 /2) and Jπ=1+ by the intruder configuration π (d5/2) -1⊗ν (d3/2) -1(f7/2) 2 . Their unknown ordering and relative energy have been the subject of debate for the placement of 34Al inside or outside the N =20 "island of inversion." We report here that the 1+ intruder lies only 46.6 keV above the 4- ground state. In addition, a new half-life of T1 /2=44.9 (4 ) ms , that is twice as long as the previously measured 20(10) ms, has been determined for 34Mg. Large-scale shell-model calculations with the recently developed sdpf-u-mix interaction are compared with the new data and used to interpret the mechanisms at play at the very border of the N =20 island of inversion.

  1. Does parental anxiety cause biases in the processing of child-relevant threat material?

    PubMed

    Cartwright-Hatton, Sam; Abeles, Paul; Dixon, Clare; Holliday, Christine; Hills, Becky

    2014-06-01

    Anxiety leads to biases in processing personally relevant information. This study set out to examine whether anxious parents also experience biases in processing child-relevant material. Ninety parents acted as a control condition, or received a social anxiety or child-related anxiety induction. They completed a task examining attentional biases in relation to child-threat words and social-threat words, and a task examining ability to categorize emotion in children's faces and voices. There was a trend indicating group differences in attentional bias towards social-threat words, and this appears to have been only in the social anxiety condition, but not the child anxiety or control conditions. For child-threat words, attentional bias was present in the child anxiety condition, but not the social anxiety or control conditions. In the emotion recognition task, there was no difference between the control and child anxiety conditions, but the social anxiety condition were more likely to erroneously label children's faces and voices as sad. Parents' anxious biases may spill over into their child's world. Parents' anxious biases may spill over into their child's world. Anxious parents may have attentional biases towards threats in their children's environment. Anxious parents may over-attribute negative emotion to children. © 2013 The British Psychological Society.

  2. Psychopaths lack the automatic avoidance of social threat: relation to instrumental aggression.

    PubMed

    Louise von Borries, Anna Katinka; Volman, Inge; de Bruijn, Ellen Rosalia Aloïs; Bulten, Berend Hendrik; Verkes, Robbert Jan; Roelofs, Karin

    2012-12-30

    Psychopathy (PP) is associated with marked abnormalities in social emotional behaviour, such as high instrumental aggression (IA). A crucial but largely ignored question is whether automatic social approach-avoidance tendencies may underlie this condition. We tested whether offenders with PP show lack of automatic avoidance tendencies, usually activated when (healthy) individuals are confronted with social threat stimuli (angry faces). We applied a computerized approach-avoidance task (AAT), where participants pushed or pulled pictures of emotional faces using a joystick, upon which the faces decreased or increased in size, respectively. Furthermore, participants completed an emotion recognition task which was used to control for differences in recognition of facial emotions. In contrast to healthy controls (HC), PP patients showed total absence of avoidance tendencies towards angry faces. Interestingly, those responses were related to levels of instrumental aggression and the (in)ability to experience personal distress (PD). These findings suggest that social performance in psychopaths is disturbed on a basic level of automatic action tendencies. The lack of implicit threat avoidance tendencies may underlie their aggressive behaviour. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  3. Self-concept clarity buffers the impact of societal threat to safety on right-wing authoritarianism.

    PubMed

    Russo, Silvia; Manzi, Claudia; Roccato, Michele

    2017-01-01

    Exposure to societal threat can elicit an increase in right-wing authoritarianism (RWA). In this study, using a quasi-experimental vignette design (Italian community sample, N = 86), we tested the moderating role of self-concept clarity (SCC). A moderated regression showed that manipulated societal threat to safety fostered RWA only among low SCC scorers. It is concluded that SCC is an important resource for individuals facing threat conditions.

  4. What Recent History Has Taught Us About Responding to Emerging Infectious Disease Threats.

    PubMed

    Paules, Catharine I; Eisinger, Robert W; Marston, Hilary D; Fauci, Anthony S

    2017-12-05

    Presidential administrations face any number of unexpected crises during their tenure, and global pandemics are among the most challenging. As of January 2017, one of the authors had served under 5 presidents as the director of the National Institute of Allergy and Infectious Diseases at the National Institutes of Health. During each administration, the government faced unexpected pandemics, ranging from the HIV/AIDS pandemic, which began during the Reagan administration, to the recent Zika outbreak in the Americas, which started during the Obama administration. These experiences underscored the need to optimize preparation for and response to these threats whenever and wherever they emerge. This article recounts selected outbreaks occurring during this period and highlights lessons that were learned that can be applied to the infectious disease threats that will inevitably be faced in the current presidential administration and beyond.

  5. Men appear more lateralized when noticing emotion in male faces.

    PubMed

    Rahman, Qazi; Anchassi, Tarek

    2012-02-01

    Empirical tests of the "right hemisphere dominance" versus "valence" theories of emotion processing are confounded by known sex differences in lateralization. Moreover, information about the sex of the person posing an emotion might be processed differently by men and women because of an adaptive male bias to notice expressions of threat and vigilance in other male faces. The purpose of this study was to investigate whether sex of poser and emotion displayed influenced lateralization in men and women by analyzing "laterality quotient" scores on a test which depicts vertically split chimeric faces, formed with one half showing a neutral expression and the other half showing an emotional expression. We found that men (N = 50) were significantly more lateralized for emotions indicative of vigilance and threat (happy, sad, angry, and surprised) in male faces relative to female faces and compared to women (N = 44). These data indicate that sex differences in functional cerebral lateralization for facial emotion may be specific to the emotion presented and the sex of face presenting it. PsycINFO Database Record (c) 2012 APA, all rights reserved

  6. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    NASA Astrophysics Data System (ADS)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  7. Nuclear threat in the post cold-war era. Monograph

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurey, W.S.

    1995-05-14

    This monograph discusses the nuclear threat that the United States faces following the downfall of the Soviet Union. The Russian and Chinese nuclear arsenals represent a formidable threat that must be countered and a new threat is emerging in the third world despite efforts to counter the proliferation of weapons of mass destruction. The monograph reviews the current status of both the Russian and Chinese arsenals and lists the programs that are being undertaken to modernize and improve their respective nuclear capabilities. Both nations are taking significant steps to preserve and improve their nuclear strike capability. The proliferation of nuclearmore » weapons technology, fissile material, and ballistic missiles in the third world is an emerging threat to national security interests. The lack of appropriate security measures during the on-going dismantling of the former Soviet nuclear arsenal presents an opportunity for rogue states and terrorist organizations to readily obtain the materials to produce their own nuclear weapons.« less

  8. Anxiety dissociates the adaptive functions of sensory and motor response enhancements to social threats

    PubMed Central

    El Zein, Marwa; Wyart, Valentin; Grèzes, Julie

    2015-01-01

    Efficient detection and reaction to negative signals in the environment is essential for survival. In social situations, these signals are often ambiguous and can imply different levels of threat for the observer, thereby making their recognition susceptible to contextual cues – such as gaze direction when judging facial displays of emotion. However, the mechanisms underlying such contextual effects remain poorly understood. By computational modeling of human behavior and electrical brain activity, we demonstrate that gaze direction enhances the perceptual sensitivity to threat-signaling emotions – anger paired with direct gaze, and fear paired with averted gaze. This effect arises simultaneously in ventral face-selective and dorsal motor cortices at 200 ms following face presentation, dissociates across individuals as a function of anxiety, and does not reflect increased attention to threat-signaling emotions. These findings reveal that threat tunes neural processing in fast, selective, yet attention-independent fashion in sensory and motor systems, for different adaptive purposes. DOI: http://dx.doi.org/10.7554/eLife.10274.001 PMID:26712157

  9. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    PubMed

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  10. Assessing Women's Responses to Sexual Threat: Validity of a Virtual Role-Play Procedure

    ERIC Educational Resources Information Center

    Jouriles, Ernest N.; Rowe, Lorelei Simpson; McDonald, Renee; Platt, Cora G.; Gomez, Gabriella S.

    2011-01-01

    This study evaluated the validity of a role-play procedure that uses virtual reality technology to assess women's responses to sexual threat. Forty-eight female undergraduate students were randomly assigned to either a standard, face-to-face role-play (RP) or a virtual role-play (VRP) of a sexually coercive situation. A multimethod assessment…

  11. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    ERIC Educational Resources Information Center

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  12. Layoffs and tradeoffs: production, quality, and safety demands under the threat of job loss.

    PubMed

    Probst, Tahira M

    2002-07-01

    Employees often face a conflict between production targets, quality assurance, and adherence to safety policies. In a time when layoffs are on the rise, it is important to understand the effects of employee job insecurity on these potentially competing demands. A laboratory experiment manipulated the threat of layoffs in a simulated organization and assessed its effect on employee productivity, product quality, and adherence to safety policies. Results suggest that student participants faced with the threat of layoffs were more productive, yet violated more safety rules and produced lower quality outputs, than participants in the control condition. Implications for organizations contemplating layoffs and directions for future research are discussed.

  13. Threats to US energy security: the challenge of Arab oil

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, J.

    1979-08-13

    Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.

  14. Neural predictors and mechanisms of cognitive behavioral therapy on threat processing in social anxiety disorder.

    PubMed

    Klumpp, Heide; Fitzgerald, Daniel A; Phan, K Luan

    2013-08-01

    Cognitive behavioral therapy (CBT) is "gold standard" psychotherapy for social anxiety disorder (SAD). Cognitive models posit that preferential processing of threat mediates excessive forms of anxiety, which is supported by exaggerated amygdala, insula, and cortical reactivity to threatening socio-emotional signals in SAD. However, little is known about neural predictors of CBT success or the mechanisms by which CBT exerts its therapeutic effects. Functional magnetic resonance imaging (fMRI) was conducted during responses to social signals of threat (fearful/angry faces) against positive signals (happy faces) in 14 patients with SAD before and after 12 weeks of CBT. For comparison, 14 healthy control (HC) participants also underwent two fMRI scans, 12 weeks apart. Whole-brain voxel-wise analyses showed therapeutic success was predicted by enhanced pre-treatment activation to threatening faces in higher-order visual (superior and middle temporal gyrus), cognitive, and emotion processing areas (dorsal anterior cingulate cortex, dorsomedial prefrontal cortex). Moreover, a group by time interaction was revealed in prefrontal regions (dorsomedial, medial gyrus) and insula. The interaction was driven by relatively greater activity during threat processing in SAD, which significantly reduced after CBT but did not significantly predict response to CBT. Therefore, pre-treatment cortical hyperactivity to social threat signals may serve as a prognostic indicator of CBT success in SAD. Collectively, CBT-related brain changes involved a reduction in activity in insula, prefrontal, and extrastriate regions. Results are consistent with cognitive models, which associate decreases in threat processing bias with recovery. Copyright © 2013 Elsevier Inc. All rights reserved.

  15. Information fusion: telling the story (or threat narrative)

    NASA Astrophysics Data System (ADS)

    Fenstermacher, Laurie

    2014-06-01

    Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.

  16. Attentional Bias for Emotional Faces in Children with Generalized Anxiety Disorder

    ERIC Educational Resources Information Center

    Waters, Allison M.; Mogg, Karin; Bradley, Brendan P.; Pine, Daniel S.

    2008-01-01

    Attentional bias for angry and happy faces in 7-12 year old children with general anxiety disorder (GAD) is examined. Results suggest that an attentional bias toward threat faces depends on a certain degree of clinical severity and/or the type of anxiety diagnosis in children.

  17. The Proliferation Of Unmanned Aerial Vehicles And The Threat To The United States

    DTIC Science & Technology

    2016-02-10

    and in other cases, technology enables the violence. Regardless of the reason, nations invest heavily in research and development to develop new...anyone the ability to purchase and operate it. This proliferation in UAV technology will pose a significant threat to our national security, which must be...terrorism is not a new threat faced by nations ; unfortunately, terrorism has existed for almost as long as civilization. The first documented use of

  18. Elevated amygdala response to faces and gaze aversion in autism spectrum disorder.

    PubMed

    Tottenham, Nim; Hertzig, Margaret E; Gillespie-Lynch, Kristen; Gilhooly, Tara; Millner, Alexander J; Casey, B J

    2014-01-01

    Autism spectrum disorders (ASD) are often associated with impairments in judgment of facial expressions. This impairment is often accompanied by diminished eye contact and atypical amygdala responses to face stimuli. The current study used a within-subjects design to examine the effects of natural viewing and an experimental eye-gaze manipulation on amygdala responses to faces. Individuals with ASD showed less gaze toward the eye region of faces relative to a control group. Among individuals with ASD, reduced eye gaze was associated with higher threat ratings of neutral faces. Amygdala signal was elevated in the ASD group relative to controls. This elevated response was further potentiated by experimentally manipulating gaze to the eye region. Potentiation by the gaze manipulation was largest for those individuals who exhibited the least amount of naturally occurring gaze toward the eye region and was associated with their subjective threat ratings. Effects were largest for neutral faces, highlighting the importance of examining neutral faces in the pathophysiology of autism and questioning their use as control stimuli with this population. Overall, our findings provide support for the notion that gaze direction modulates affective response to faces in ASD.

  19. Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations

    PubMed Central

    Conesa-Muñoz, Jesus; Ribeiro, Angela

    2012-01-01

    Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN). The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders’ behaviour is inferred through sequences of sensors’ activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final state of the

  20. Intruders: New Neighbors in "Dawn of the Planet of the Apes" and "The Hundred-Foot Journey"

    ERIC Educational Resources Information Center

    Beck, Bernard

    2015-01-01

    Conflicts over territory are about the power to establish dominant cultures in territories and are often accompanied by cultural claims to legitimacy by each side. The cultural claims, or ideologies, are often expressed in terms of "homeland" dwellers versus "intruders." Two recent movies, "Dawn of the Planet of the…

  1. A Threat-Detection Advantage in Those with Autism Spectrum Disorders

    ERIC Educational Resources Information Center

    Krysko, Krysko M.; Rutherford, M. D.

    2009-01-01

    Identifying threatening expressions is a significant social perceptual skill. Individuals with autism spectrum disorders (ASD) are impaired in social interaction, show deficits in face and emotion processing, show amygdala abnormalities and display a disadvantage in the perception of social threat. According to the anger superiority hypothesis,…

  2. Sensitivity to social and non-social threats in temperamentally shy children at-risk for anxiety.

    PubMed

    LoBue, Vanessa; Pérez-Edgar, Koraly

    2014-03-01

    In the current brief report, we examined threat perception in a group of young children who may be at-risk for anxiety due to extreme temperamental shyness. Results demonstrate specific differences in the processing of social threats: 4- to 7-year-olds in the high-shy group demonstrated a greater bias for social threats (angry faces) than did a comparison group of low-shy children. This pattern did not hold for non-social threats like snakes: Both groups showed an equal bias for the detection of snakes over frogs. The results suggest that children who are tempermentally shy have a heightened sensitivity to social signs of threat early in development. These findings have implications for understanding mechanisms of early threat sensitivity that may predict later socioemotional maladjustment. © 2013 John Wiley & Sons Ltd.

  3. When nasty breeds nice: threats of violence amplify agreeableness at national, individual, and situational levels.

    PubMed

    White, Andrew Edward; Kenrick, Douglas T; Li, Yexin Jessica; Mortensen, Chad R; Neuberg, Steven L; Cohen, Adam B

    2012-10-01

    Humans have perennially faced threats of violence from other humans and have developed functional strategies for surviving those threats. Five studies examined the relation between threats of violence and agreeableness at the level of nations, individuals, and situations. People living in countries with higher military spending (Study 1) and those who chronically perceive threats from others (Study 2) were more agreeable. However, this threat-linked agreeableness was selective (Studies 3-5). Participants primed with threat were more agreeable and willing to help familiar others but were less agreeable and willing to help unfamiliar others. Additionally, people from large families, for whom affiliation may be a salient response to threat, were more likely than people from small families to shift in agreeableness. Returning to the national level, military spending was associated with increased trust in ingroup members but decreased trust in outgroups. Together, these findings demonstrate that agreeableness is selectively modulated by threats of violence.

  4. Generalized Anxiety Disorder, worry and attention to threat: A systematic review.

    PubMed

    Goodwin, Huw; Yiend, Jenny; Hirsch, Colette R

    2017-06-01

    Among anxious populations, attention has been demonstrated to be preferentially biased to threatening material compared to neutral or other valenced material. Individuals who have high levels of trait worry, such as those with Generalized Anxiety Disorder (GAD), may be biased to threat but research has produced equivocal findings. This review aimed to systematically review the extant experimental literature to establish the current evidence of attentional bias to threat among trait worriers compared to healthy controls and other clinical populations. Twenty-nine published articles were included in the final review. There was strong evidence of a bias to threat among GAD patients compared to other groups and this was found across most experimental paradigms. Few studies had investigated this bias in non-clinical trait worriers. Among GAD patients this bias to threat was most strongly evidenced when visual threat material was in a verbal-linguistic format (i.e., words) rather than when in pictorial form (i.e., images or faces). The bias was also found across several domains of negative material, supporting the general nature of worry. Further research should look to examine the specific components of the threat bias in GAD, as well as investigating the bias to threat in trait worriers. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Degrees of Integrity: The Threat of Corruption in Higher Education

    ERIC Educational Resources Information Center

    Chapman, David W.; Lindner, Samira

    2016-01-01

    Corruption in higher education is the focus of growing international concern among governments, educators, students, and other stakeholders. Those working in higher education institutions now face a unique convergence of pressures that is creating a heightened threat to the integrity of the higher education enterprise worldwide. This paper draws…

  6. Western US volcanism due to intruding oceanic mantle driven by ancient Farallon slabs

    NASA Astrophysics Data System (ADS)

    Zhou, Quan; Liu, Lijun; Hu, Jiashun

    2018-01-01

    The origin of late Cenozoic intraplate volcanism over the western United States is debated. One important reason is the lack of a clear understanding of the mantle dynamics during this volcanic history. Here we reconstruct the mantle thermal states beneath North America since 20 million years ago using a hybrid inverse geodynamic model with data assimilation. The model simultaneously satisfies the past subduction kinematics, present mantle tomographic image and the volcanic history. We find that volcanism in both the Yellowstone volcanic province and the Basin and Range province corresponds to a similar eastward-intruding mantle derived from beneath the Pacific Ocean and driven mostly by the sinking Farallon slab below the central-eastern United States. The hot mantle that forms the Columbia River flood basalt and subsequent Yellowstone-Newberry hotspot tracks first enters the western United States through tears within the Juan de Fuca slab. Subsequent coexistence of the westward asthenospheric flow above the retreating Juan de Fuca slab and eastward-propagating mantle beyond the back-arc region reproduces the bifurcating hotspot chains. A similar but weaker heat source intrudes below the Basin and Range around the southern edge of the slab, and can explain the diffuse basaltic volcanism in this region. According to our models, the putative Yellowstone plume contributes little to the formation of the Yellowstone volcanic province.

  7. Enhanced processing of threat stimuli under limited attentional resources.

    PubMed

    De Martino, Benedetto; Kalisch, Raffael; Rees, Geraint; Dolan, Raymond J

    2009-01-01

    The ability to process stimuli that convey potential threat, under conditions of limited attentional resources, confers adaptive advantages. This study examined the neurobiology underpinnings of this capacity. Employing an attentional blink paradigm, in conjunction with functional magnetic resonance imaging, we manipulated the salience of the second of 2 face target stimuli (T2), by varying emotionality. Behaviorally, fearful T2 faces were identified significantly more than neutral faces. Activity in fusiform face area increased with correct identification of T2 faces. Enhanced activity in rostral anterior cingulate cortex (rACC) accounted for the benefit in detection of fearful stimuli reflected in a significant interaction between target valence and correct identification. Thus, under conditions of limited attention resources activation in rACC correlated with enhanced processing of emotional stimuli. We suggest that these data support a model in which a prefrontal "gate" mechanism controls conscious access of emotional information under conditions of limited attentional resources.

  8. Amygdala lesions in rhesus macaques decrease attention to threat

    PubMed Central

    Dal Monte, Olga; Costa, Vincent D.; Noble, Pamela L.; Murray, Elisabeth A.; Averbeck, Bruno B.

    2015-01-01

    Evidence from animal and human studies has suggested that the amygdala plays a role in detecting threat and in directing attention to the eyes. Nevertheless, there has been no systematic investigation of whether the amygdala specifically facilitates attention to the eyes or whether other features can also drive attention via amygdala processing. The goal of the present study was to examine the effects of amygdala lesions in rhesus monkeys on attentional capture by specific facial features, as well as gaze patterns and changes in pupil dilation during free viewing. Here we show reduced attentional capture by threat stimuli, specifically the mouth, and reduced exploration of the eyes in free viewing in monkeys with amygdala lesions. Our findings support a role for the amygdala in detecting threat signals and in directing attention to the eye region of faces when freely viewing different expressions. PMID:26658670

  9. Participation Apprehensive Students: The Influence of Face Support and Instructor-Student Rapport on Classroom Participation

    ERIC Educational Resources Information Center

    Frisby, Brandi N.; Berger, Erin; Burchett, Molly; Herovic, Emina; Strawser, Michael G.

    2014-01-01

    Participation is considered a positive student classroom behavior that can also create a face-threatening classroom climate that may be alleviated through interpersonal relationships with the instructor. Participants (N?=?189) categorized as low apprehensives perceived less face threat and more face support when participating; moderate…

  10. If it bleeds, it leads: separating threat from mere negativity

    PubMed Central

    Boshyan, Jasmine; Adams, Reginald B.; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F.

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. PMID:24493851

  11. High spin structure and intruder configurations in 31P

    NASA Astrophysics Data System (ADS)

    Ionescu-Bujor, M.; Iordachescu, A.; Napoli, D. R.; Lenzi, S. M.; Mărginean, N.; Otsuka, T.; Utsuno, Y.; Ribas, R. V.; Axiotis, M.; Bazzacco, D.; Bizzeti-Sona, A. M.; Bizzeti, P. G.; Brandolini, F.; Bucurescu, D.; Cardona, M. A.; De Angelis, G.; De Poli, M.; Della Vedova, F.; Farnea, E.; Gadea, A.; Hojman, D.; Kalfas, C. A.; Kröll, Th.; Lunardi, S.; Martínez, T.; Mason, P.; Pavan, P.; Quintana, B.; Alvarez, C. Rossi; Ur, C. A.; Vlastou, R.; Zilio, S.

    2006-02-01

    The nucleus 31P has been studied in the 24Mg(16O,2αp) reaction with a 70-MeV 16O beam. A complex level scheme extended up to spins 17/2+ and 15/2-, on positive and negative parity, respectively, has been established. Lifetimes for the new states have been investigated by the Doppler shift attenuation method. Two shell-model calculations have been performed to describe the experimental data, one by using the code ANTOINE in a valence space restricted to the sd shell, and the other by applying the Monte Carlo shell model in a valence space including the sd-fp shells. The latter calculation indicates that intruder excitations, involving the promotion of a T=0 proton-neutron pair to the fp shell, play a dominant role in the structure of the positive-parity high-spin states of 31P.

  12. Neural responses to facial expressions support the role of the amygdala in processing threat

    PubMed Central

    Sormaz, Mladen; Flack, Tessa; Asghar, Aziz U. R.; Fan, Siyan; Frey, Julia; Manssuer, Luis; Usten, Deniz; Young, Andrew W.; Andrews, Timothy J.

    2014-01-01

    The amygdala is known to play an important role in the response to facial expressions that convey fear. However, it remains unclear whether the amygdala’s response to fear reflects its role in the interpretation of danger and threat, or whether it is to some extent activated by all facial expressions of emotion. Previous attempts to address this issue using neuroimaging have been confounded by differences in the use of control stimuli across studies. Here, we address this issue using a block design functional magnetic resonance imaging paradigm, in which we compared the response to face images posing expressions of fear, anger, happiness, disgust and sadness with a range of control conditions. The responses in the amygdala to different facial expressions were compared with the responses to a non-face condition (buildings), to mildly happy faces and to neutral faces. Results showed that only fear and anger elicited significantly greater responses compared with the control conditions involving faces. Overall, these findings are consistent with the role of the amygdala in processing threat, rather than in the processing of all facial expressions of emotion, and demonstrate the critical importance of the choice of comparison condition to the pattern of results. PMID:24097376

  13. Backward masked fearful faces enhance contralateral occipital cortical activity for visual targets within the spotlight of attention

    PubMed Central

    Reinke, Karen S.; LaMontagne, Pamela J.; Habib, Reza

    2011-01-01

    Spatial attention has been argued to be adaptive by enhancing the processing of visual stimuli within the ‘spotlight of attention’. We previously reported that crude threat cues (backward masked fearful faces) facilitate spatial attention through a network of brain regions consisting of the amygdala, anterior cingulate and contralateral visual cortex. However, results from previous functional magnetic resonance imaging (fMRI) dot-probe studies have been inconclusive regarding a fearful face-elicited contralateral modulation of visual targets. Here, we tested the hypothesis that the capture of spatial attention by crude threat cues would facilitate processing of subsequently presented visual stimuli within the masked fearful face-elicited ‘spotlight of attention’ in the contralateral visual cortex. Participants performed a backward masked fearful face dot-probe task while brain activity was measured with fMRI. Masked fearful face left visual field trials enhanced activity for spatially congruent targets in the right superior occipital gyrus, fusiform gyrus and lateral occipital complex, while masked fearful face right visual field trials enhanced activity in the left middle occipital gyrus. These data indicate that crude threat elicited spatial attention enhances the processing of subsequent visual stimuli in contralateral occipital cortex, which may occur by lowering neural activation thresholds in this retinotopic location. PMID:20702500

  14. The impact of uncertain threat on affective bias: Individual differences in response to ambiguity.

    PubMed

    Neta, Maital; Cantelon, Julie; Haga, Zachary; Mahoney, Caroline R; Taylor, Holly A; Davis, F Caroline

    2017-12-01

    Individuals who operate under highly stressful conditions (e.g., military personnel and first responders) are often faced with the challenge of quickly interpreting ambiguous information in uncertain and threatening environments. When faced with ambiguity, it is likely adaptive to view potentially dangerous stimuli as threatening until contextual information proves otherwise. One laboratory-based paradigm that can be used to simulate uncertain threat is known as threat of shock (TOS), in which participants are told that they might receive mild but unpredictable electric shocks while performing an unrelated task. The uncertainty associated with this potential threat induces a state of emotional arousal that is not overwhelmingly stressful, but has widespread-both adaptive and maladaptive-effects on cognitive and affective function. For example, TOS is thought to enhance aversive processing and abolish positivity bias. Importantly, in certain situations (e.g., when walking home alone at night), this anxiety can promote an adaptive state of heightened vigilance and defense mobilization. In the present study, we used TOS to examine the effects of uncertain threat on valence bias, or the tendency to interpret ambiguous social cues as positive or negative. As predicted, we found that heightened emotional arousal elicited by TOS was associated with an increased tendency to interpret ambiguous cues negatively. Such negative interpretations are likely adaptive in situations in which threat detection is critical for survival and should override an individual's tendency to interpret ambiguity positively in safe contexts. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  15. The impact of threat of shock-induced anxiety on memory encoding and retrieval

    PubMed Central

    Bolton, Sorcha

    2017-01-01

    Anxiety disorders are the most common mental health disorders, and daily transient feelings of anxiety (or “stress”) are ubiquitous. However, the precise impact of both transient and pathological anxiety on higher-order cognitive functions, including short- and long-term memory, is poorly understood. A clearer understanding of the anxiety–memory relationship is important as one of the core symptoms of anxiety, most prominently in post-traumatic stress disorder (PTSD), is intrusive reexperiencing of traumatic events in the form of vivid memories. This study therefore aimed to examine the impact of induced anxiety (threat of shock) on memory encoding and retrieval. Eighty-six healthy participants completed tasks assessing: visuospatial working memory, verbal recognition, face recognition, and associative memory. Critically, anxiety was manipulated within-subjects: information was both encoded and retrieved under threat of shock and safe (no shock) conditions. Results revealed that visuospatial working memory was enhanced when information was encoded and subsequently retrieved under threat, and that threat impaired the encoding of faces regardless of the condition in which it was retrieved. Episodic memory and verbal short-term recognition were, however, unimpaired. These findings indicate that transient anxiety in healthy individuals has domain-specific, rather than domain-general, impacts on memory. Future studies would benefit from expanding these findings into anxiety disorder patients to delineate the differences between adaptive and maladaptive responding. PMID:28916628

  16. Association of enhanced limbic response to threat with decreased cortical facial recognition memory response in schizophrenia

    PubMed Central

    Satterthwaite, Theodore D.; Wolf, Daniel H.; Loughead, James; Ruparel, Kosha; Valdez, Jeffrey N.; Siegel, Steven J.; Kohler, Christian G.; Gur, Raquel E.; Gur, Ruben C.

    2014-01-01

    Objective Recognition memory of faces is impaired in patients with schizophrenia, as is the neural processing of threat-related signals, but how these deficits interact to produce symptoms is unclear. Here we used an affective face recognition paradigm to examine possible interactions between cognitive and affective neural systems in schizophrenia. Methods fMRI (3T) BOLD response was examined in 21 controls and 16 patients during a two-choice recognition task using images of human faces. Each target face had previously been displayed with a threatening or non-threatening affect, but here were displayed with neutral affect. Responses to successful recognition and for the effect of previously threatening vs. non-threatening affect were evaluated, and correlations with total BPRS examined. Functional connectivity analyses examined the relationship between activation in the amygdala and cortical regions involved in recognition memory. Results Patients performed the task more slowly than controls. Controls recruited the expected cortical regions to a greater degree than patients, and patients with more severe symptoms demonstrated proportionally less recruitment. Increased symptoms were also correlated with augmented amygdala and orbitofrontal cortex response to threatening faces. Controls exhibited a negative correlation between activity in the amygdala and cortical regions involved in cognition, while patients showed a weakening of that relationship. Conclusions Increased symptoms were related to an enhanced threat response in limbic regions and a diminished recognition memory response in cortical regions, supporting a link between two brain systems often examined in isolation. This finding suggests that abnormal processing of threat-related signals in the environment may exacerbate cognitive impairment in schizophrenia. PMID:20194482

  17. The functional basis of face evaluation

    PubMed Central

    Oosterhof, Nikolaas N.; Todorov, Alexander

    2008-01-01

    People automatically evaluate faces on multiple trait dimensions, and these evaluations predict important social outcomes, ranging from electoral success to sentencing decisions. Based on behavioral studies and computer modeling, we develop a 2D model of face evaluation. First, using a principal components analysis of trait judgments of emotionally neutral faces, we identify two orthogonal dimensions, valence and dominance, that are sufficient to describe face evaluation and show that these dimensions can be approximated by judgments of trustworthiness and dominance. Second, using a data-driven statistical model for face representation, we build and validate models for representing face trustworthiness and face dominance. Third, using these models, we show that, whereas valence evaluation is more sensitive to features resembling expressions signaling whether the person should be avoided or approached, dominance evaluation is more sensitive to features signaling physical strength/weakness. Fourth, we show that important social judgments, such as threat, can be reproduced as a function of the two orthogonal dimensions of valence and dominance. The findings suggest that face evaluation involves an overgeneralization of adaptive mechanisms for inferring harmful intentions and the ability to cause harm and can account for rapid, yet not necessarily accurate, judgments from faces. PMID:18685089

  18. Children and adolescents facing a continuous security threat: Aggressive behavior and post-traumatic stress symptoms.

    PubMed

    Nuttman-Shwartz, Orit

    2017-07-01

    There is extensive research evidence indicating that children and youth are the most vulnerable population for developing psychological symptoms relating to war and terror. Although studies have documented a wide range of detrimental emotional and behavioral effects of such exposure, much less is known about the effects of exposure to a continuous security threat for children and adolescents. Against this background, the current article examined the implications of continuous exposure to missile attacks among 1096 children and adolescents enrolled in public schools near the Israeli border with Gaza. Participants filled out quantitative questionnaires, which relate to the pathological consequences of continuous exposure to security threats, and to the role of the school and the community as a protective environment against disruptive behavior resulting from such exposure. The findings revealed that PTSS responses were mainly related to the security threat, whereas interpersonal aggression resulted from other types of traumatic events. Significant differences were found between aggression and posttraumatic symptoms, by age and gender. PTSS was found to be lower for older participants and higher for girls, whereas aggression was higher for boys and higher for older participants. Furthermore, the sense of belonging to the place of residence was negatively associated with PTSS as well as with aggressive behavior: the higher the participants' sense of belonging, the lower their levels of PTSS and aggressive responses. In contrast, the sense of belonging to the school was negatively associated only with aggressive behavior: the higher the participants' sense of belonging to the school, the lower their aggressive responses. The findings are discussed in the light of trauma theories and in light of the results of previous research. The study contributed to knowledge about the differential consequences of exposure to a security threat, and highlighted the importance of

  19. Threat and parochialism in intergroup relations: lab-in-the-field evidence from rural Georgia.

    PubMed

    Schaub, Max

    2017-10-25

    Competition between groups is widely considered to foster cooperation within groups. Evidence from laboratory experiments hints at the existence of a proximate mechanism by which humans increase their level of cooperation with their ingroup when faced with an external threat. Further work suggests that ingroup cooperation should go along with aggressive behaviour towards the outgroup, although these theories are at odds with others that see high investments in outgroup relations as important means of stabilizing intergroup relations. Surprisingly, few of these arguments have been tested in the field, and existing studies are also limited by the lack of a direct measure of threat perception and aggressive behaviour. This study presents lab-in-the-field results from a rural context where exposure to an ethnic outgroup varies between villages. This context makes it possible to capture levels of threat perception, aggressive behaviour and cooperation without inducing intergroup competition artificially in the laboratory. All concepts are measured behaviourally. In- and outgroup cooperation was measured with a standard public goods game, and a novel experimental protocol was developed that measures perceived threat and aggressive behaviour: the threat game. The results show that levels of perceived threat, ingroup cooperation and aggressive behaviour are higher in regions more strongly exposed to ethnic outsiders. However, exposed regions also show high levels of outgroup cooperation and a concomitant lack of elevated ingroup bias. This pattern is explained by theorizing that communities show parochial altruism when faced with an ethnic outgroup, but balance aggressive behaviour with cooperative offers to diffuse tensions and to keep open channels of mutually beneficial exchange. © 2017 The Author(s).

  20. If it bleeds, it leads: separating threat from mere negativity.

    PubMed

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  1. Attentional Bias for Threat in Older Adults: Moderation of the Positivity Bias by Trait Anxiety and Stimulus Modality

    PubMed Central

    Lee, Lewina O.; Knight, Bob G.

    2009-01-01

    Socioemotional selectivity theory suggests that emotion regulation goals motivate older adults to preferentially allocate attention to positive stimuli and away from negative stimuli. This study examined whether anxiety moderates the effect of the positivity bias on attention for threat. We employed the dot probe task to compare subliminal and supraliminal attention for threat in 103 young and 44 older adults. Regardless of anxiety, older but not younger adults demonstrated a vigilant-avoidant response to angry faces. Anxiety influenced older adults’ attention such that anxious individuals demonstrated a vigilant-avoidant reaction to sad faces, but an avoidant-vigilant reaction to negative words. PMID:19739931

  2. Categorizing threat : building and using a generic threat matrix.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and ismore » not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.« less

  3. Personal privacy, information assurance, and the threat posed by malware techology

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2006-04-01

    In spite of our best efforts to secure the cyber world, the threats posed to personal privacy by attacks upon networks and software continue unabated. While there are many reasons for this state of affairs, clearly one of the reasons for continued vulnerabilities in software is the inability to assess their security properties and test their security systems while they are in development. A second reason for this growing threat to personal privacy is the growing sophistication and maliciousness of malware coupled with the increasing difficulty of detecting malware. The pervasive threat posed by malware coupled with the difficulties faced when trying to detect its presence or an attempted intrusion make addressing the malware threat one of the most pressing issues that must be solved in order to insure personal privacy to users of the internet. In this paper, we will discuss the threat posed by malware, the types of malware found in the wild (outside of computer laboratories), and current techniques that are available for from a successful malware penetration. The paper includes a discussion of anti-malware tools and suggestions for future anti-malware efforts.

  4. A horizon scanning assessment of current and potential future threats to migratory shorebirds

    USGS Publications Warehouse

    Sutherland, William J.; Alves, José A.; Amano, Tatsuya; Chang, Charlotte H.; Davidson, Nicholas C.; Finlayson, C. Max; Gill, Jennifer A.; Gill, Robert E.; González, Patricia M.; Gunnarsson, Tómas Grétar; Kleijn, David; Spray, Chris J.; Székely, Tamás; Thompson, Des B.A.

    2012-01-01

    We review the conservation issues facing migratory shorebird populations that breed in temperate regions and use wetlands in the non-breeding season. Shorebirds are excellent model organisms for understanding ecological, behavioural and evolutionary processes and are often used as indicators of wetland health. A global team of experienced shorebird researchers identified 45 issues facing these shorebird populations, and divided them into three categories (natural, current anthropogenic and future issues). The natural issues included megatsunamis, volcanoes and regional climate changes, while current anthropogenic threats encompassed agricultural intensification, conversion of tidal flats and coastal wetlands by human infrastructure developments and eutrophication of coastal systems. Possible future threats to shorebirds include microplastics, new means of recreation and infectious diseases. We suggest that this review process be broadened to other taxa to aid the identification and ranking of current and future conservation actions.

  5. Politeness Theory in Computer Mediated Communication: Face Threatening Acts in a "Faceless" Medium.

    ERIC Educational Resources Information Center

    Simmons, Thomas L.

    A study of distinctive characteristics of the style in which people communicate in computer-mediated communication (CMC), focusing on use of politeness conventions, is reported. Aspects of the concept of "face" and politeness in social interaction are first reviewed, and threats to speaker's and hearer's face are outlined. The…

  6. Mission Continuity Planning: Strategically Assessing and Planning for Threats to Operations.

    ERIC Educational Resources Information Center

    Qayoumi, Mohammad H.

    This book covers the principles of risk and risk management and offers a framework for analyzing the significant, often unforeseen threats facing higher education institutions today. It examines the critical elements of a disaster preparedness plan and addresses business continuity and mission continuity planning. The book also provides tools for…

  7. The silent threat of low genetic diversity

    USGS Publications Warehouse

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  8. Dreading the boards: stress response to a competitive audition characterized by social-evaluative threat.

    PubMed

    Boyle, Neil Bernard; Lawton, Clare; Arkbage, Karin; Thorell, Lars; Dye, Louise

    2013-01-01

    The capacity of psychosocial stressors to provoke the hypothalamic-pituitary-adrenal axis has been demonstrated to vary depending upon a number of psychological factors. Laboratory stressors characterized by social-evaluative threat are proposed to be the most efficacious in the elicitation of a cortisol stress response. Salivary cortisol, cardiovascular, and subjective responses of 16 healthy adults facing a naturalistic stressor characterized by social-evaluative threat (competitive performance auditions) were examined. Audition exposure was sufficient to provoke significant cortisol, arterial blood pressure (systolic and diastolic), and subjective stress responses. Cortisol response reactivity (area under the curve with respect to increase [AUCi]) also correlated with participants' subjective rating of social-evaluative threat. The competitive performance audition context is therefore considered a promising context in which to further explore cortisol responsivity to social-evaluative threat.

  9. The effects of social stress and cortisol responses on the preconscious selective attention to social threat.

    PubMed

    Roelofs, Karin; Bakvis, Patricia; Hermans, Erno J; van Pelt, Johannes; van Honk, Jack

    2007-04-01

    The purpose of the present study was to investigate the effects of social stress and stress-induced cortisol on the preconscious selective attention to social threat. Twenty healthy participants were administered a masked emotional Stroop task (comparing color-naming latencies for angry, neutral and happy faces) in conditions of rest and social stress. Stress was induced by means of the Trier social stress test. Based on the stress-induced increase in cortisol levels, participants were allocated post hoc (median-split) to a high and low responders group. In contrast to low responders, high responders showed a negative or avoidant attentional bias to threat (i.e. shorter latencies for angry than neutral faces) in the rest condition. Most importantly, although low responders became avoidant, the high responders became vigilant to the angry faces after stress induction. There were no such effects for happy faces. Our findings are in line with previous studies in both animals and humans, that associate high glucocorticoid stress-responsiveness with diminished avoidance and prolonged freezing reactions during stress.

  10. Alarums false, alarums real: challenges and threats to the future of epidemiology.

    PubMed

    Bracken, M B

    1998-02-01

    A review of recent threats and challenges to epidemiology suggests that some represent an opportunity to advance the discipline while others are a major threat to conducting epidemiologic work. Two issues are identified which should advance the publication and conduct of epidemiologic research. Three are discussed that exemplify current threats. Epidemiologists have a role in helping journalists improve the communication of risk information in the media. Methodological advances for studies of rare exposure being related to rare disease should reduce the frequency of conflicting results in the epidemiologic literature. Three significant external forces that threaten epidemiologic research are identified. These are: unbridled discovery during litigation as exemplified by Bendectin, breast implants and cellular telephones; over zealous privacy laws; and the negative impact of managed care on epidemiologic research. The American College of Epidemiology has a major role to play in protecting the profession from some of the real threats that face it, and in helping meet the challenges.

  11. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  12. Chronic treatment with 13-cis-retinoic acid changes aggressive behaviours in the resident-intruder paradigm in rats.

    PubMed

    Trent, Simon; Drew, Cheney J G; Mitchell, Paul J; Bailey, Sarah J

    2009-12-01

    Retinoids, vitamin A related compounds, have an established role in the development of the nervous system and are increasingly recognized to play a role in adult brain function. The synthetic retinoid, 13-cis-retinoic acid (13-cis-RA, Roaccutane) is widely used to treat severe acne but has been linked to an increased risk of neuropsychiatric side effects, including depression. Here we report that chronic administration with 13-cis-RA (1 mg/kg i.p. daily, 7-14 days) in adult rats reduced aggression- and increased flight-related behaviours in the resident-intruder paradigm. However, in the forced swim, sucrose consumption and open field tests treatment for up to 6 weeks with 13-cis-RA did not modify behaviour in adult or juvenile animals. The behavioural change observed in the resident-intruder paradigm is directly opposite to that observed with chronic antidepressant administration. These findings indicate that when a suitably sensitive behavioural test is employed then chronic administration of 13-cis-RA in adult rats induces behavioural changes consistent with a pro-depressant action.

  13. Age Differences in Selective Memory of Goal-Relevant Stimuli Under Threat.

    PubMed

    Durbin, Kelly A; Clewett, David; Huang, Ringo; Mather, Mara

    2018-02-01

    When faced with threat, people often selectively focus on and remember the most pertinent information while simultaneously ignoring any irrelevant information. Filtering distractors under arousal requires inhibitory mechanisms, which take time to recruit and often decline in older age. Despite the adaptive nature of this ability, relatively little research has examined how both threat and time spent preparing these inhibitory mechanisms affect selective memory for goal-relevant information across the life span. In this study, 32 younger and 31 older adults were asked to encode task-relevant scenes, while ignoring transparent task-irrelevant objects superimposed onto them. Threat levels were increased on some trials by threatening participants with monetary deductions if they later forgot scenes that followed threat cues. We also varied the time between threat induction and a to-be-encoded scene (i.e., 2 s, 4 s, 6 s) to determine whether both threat and timing effects on memory selectivity differ by age. We found that age differences in memory selectivity only emerged after participants spent a long time (i.e., 6 s) preparing for selective encoding. Critically, this time-dependent age difference occurred under threatening, but not neutral, conditions. Under threat, longer preparation time led to enhanced memory for task-relevant scenes and greater memory suppression of task-irrelevant objects in younger adults. In contrast, increased preparation time after threat induction had no effect on older adults' scene memory and actually worsened memory suppression of task-irrelevant objects. These findings suggest that increased time to prepare top-down encoding processes benefits younger, but not older, adults' selective memory for goal-relevant information under threat. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  14. Close encounters of the third-body kind. [intruding bodies in binary star systems

    NASA Technical Reports Server (NTRS)

    Davies, M. B.; Benz, W.; Hills, J. G.

    1994-01-01

    We simulated encounters involving binaries of two eccentricities: e = 0 (i.e., circular binaries) and e = 0.5. In both cases the binary contained a point mass of 1.4 solar masses (i.e., a neutron star) and a 0.8 solar masses main-sequence star modeled as a polytrope. The semimajor axes of both binaries were set to 60 solar radii (0.28 AU). We considered intruders of three masses: 1.4 solar masses (a neutron star), 0.8 solar masses (a main-sequence star or a higher mass white dwarf), and 0.64 solar masses (a more typical mass white dwarf). Our strategy was to perform a large number (40,000) of encounters using a three-body code, then to rerun a small number of cases with a three-dimensional smoothed particle hydrodynamics (SPH) code to determine the importance of hydrodynamical effects. Using the results of the three-body runs, we computed the exchange across sections, sigma(sub ex). From the results of the SPH runs, we computed the cross sections for clean exchange, denoted by sigma(sub cx); the formation of a triple system, denoted by sigma(sub trp); and the formation of a merged binary with an object formed from the merger of two of the stars left in orbit around the third star, denoted by sigma(sub mb). For encounters between either binary and a 1.4 solar masses neutron star, sigma(sub cx) approx. 0.7 sigma(sub ex) and sigma(sub mb) + sigma(sub trp) approx. 0.3 sigma(sub ex). For encounters between either binary and the 0.8 solar masses main-sequence star, sigma(sub cx) approx. 0.50 sigma(sub ex) and sigma(sub mb) + sigma(sub trp) approx. 1.0 sigma(sub ex). If the main sequence star is replaced by a main-sequence star of the same mass, we have sigma(sub cx) approx. 0.5 sigma(sub ex) and sigma(sub mb) + sigma(sub trp) approx. 1.6 sigma(sub ex). Although the exchange cross section is a sensitive function of intruder mass, we see that the cross section to produce merged binaries is roughly independent of intruder mass. The merged binaries produced have semi

  15. Intruder signature analysis from a phase-sensitive distributed fiber-optic perimeter sensor

    NASA Astrophysics Data System (ADS)

    Madsen, C. K.; Bae, T.; Snider, T.

    2007-09-01

    Using a phase-sensitive optical time-domain reflectometer developed at Texas A&M University, this paper reports on recent advances in intruder detection and classificatoin for long perimeters or borders. The system uses light pulses from a narrow linewidth CW laser with low frequency drift to interrogate an optical fiber. The backscattered light is detected, and real-time processing of the received signal is performed. Signatures from single and multiple humans on foot, nearby vehicle traffic on a road, construction-like vehicle activity, and animals have been obtained. Individual footsteps are clearly identified and the cadence readily observed. Time-frequency plots are used to compare the signatures. The detected signal contains information regarding the weight of the intruder as well. An adult weighing around 60kg may produce several π-radian shifts in the optical phase, which is detected by the system. While distances up to 20km have been monitored in previous remote field tests, we report measurements on a local test site with a total fiber length of 12km. A 3-mm diameter fiber cable is buried at a depth of 20-46 cm over a distance of 44m, with a 2km spool of fiber attached prior to the buried fiber and a 10km fiber spool connected in series after the buried section. Recent advances in data acquisition and signal processing allow us to avoid false alarms due to drifts in the laser center frequency and greatly improve the probability of detection. With these advancements, this technology is prime for low-cost perimeter monitoring of high-value and high-security installations such as nuclear power plants and military bases as well as national borders.

  16. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.

    PubMed

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V

    2017-03-21

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider's server contains a lot of valuable resources. LoBSs' users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs' risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs' risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.

  17. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks

    PubMed Central

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V.

    2017-01-01

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. PMID:28335569

  18. The need to rationalize and prioritize threatening processes used to determine threat status in the IUCN Red List.

    PubMed

    Hayward, Matt W

    2009-12-01

    Thorough evaluation has made the International Union for Conservation of Nature (IUCN) Red List the most widely used and accepted authority on the conservation status of biodiversity. Although the system used to determine risk of extinction is rigorously and objectively applied, the list of threatening processes affecting a species is far more subjectively determined and has not had adequate review. I reviewed the threats listed in the IUCN Red List for randomly selected groups within the three most threatened orders of mammals: Artiodactyla, Carnivora, and Primates. These groups are taxonomically related and often ecologically similar, so I expected they would suffer relatively similar threats. Hominoid primates and all other terrestrial fauna faced similar threats, except for bovine artiodactyls and large, predatory carnivores, which faced significantly different threats. Although the status of bovines and hominoids and the number of threats affecting them were correlated, this was not the case for large carnivores. Most notable, however, was the great variation in the threats affecting individual members of each group. For example, the endangered European bison (Bison bonasus) has no threatening processes listed for it, and the lion (Panthera leo) is the only large predator listed as threatened with extinction by civil war. Some threatening processes appear spurious for the conservation of the species, whereas other seemingly important factors are not recorded as threats. The subjective nature of listing threatening processes, via expert opinion, results in substantial biases that may be allayed by independent peer review, use of technical manuals, consensus among multiple assessors, incorporation of probability modeling via decision-tree analysis, and adequate coordination among evaluators. The primary focus should be on species-level threats rather than population-level threats because the IUCN Red List is a global assessment and smaller-scale threats are more

  19. Association of enhanced limbic response to threat with decreased cortical facial recognition memory response in schizophrenia.

    PubMed

    Satterthwaite, Theodore D; Wolf, Daniel H; Loughead, James; Ruparel, Kosha; Valdez, Jeffrey N; Siegel, Steven J; Kohler, Christian G; Gur, Raquel E; Gur, Ruben C

    2010-04-01

    Recognition memory of faces is impaired in patients with schizophrenia, as is the neural processing of threat-related signals, but how these deficits interact to produce symptoms is unclear. The authors used an affective face recognition paradigm to examine possible interactions between cognitive and affective neural systems in schizophrenia. Blood-oxygen-level-dependent response was examined by means of functional magnetic resonance imaging (3 Tesla) in healthy comparison subjects (N=21) and in patients with schizophrenia (N=12) or schizoaffective disorder, depressed type (N=4), during a two-choice recognition task that used images of human faces. Each target face, previously displayed with a threatening or nonthreatening affect, was displayed with neutral affect. Responses to successful recognition and responses to the effect of previously threatening versus nonthreatening affect were evaluated, and correlations with symptom severity (total Brief Psychiatric Rating Scale score) were examined. Functional connectivity analyses examined the relationship between activation in the amygdala and cortical regions involved in recognition memory. Patients performed the task more slowly than healthy comparison subjects. Comparison subjects recruited the expected cortical regions to a greater degree than patients, and patients with more severe symptoms demonstrated proportionally less recruitment. Increased symptoms were also correlated with augmented amygdala and orbitofrontal cortex response to threatening faces. Comparison subjects exhibited a negative correlation between activity in the amygdala and cortical regions involved in cognition, while patients showed weakening of this relationship. Increased symptoms were related to an enhanced threat response in limbic regions and a diminished recognition memory response in cortical regions, supporting a link between these two brain systems that are often examined in isolation. This finding suggests that abnormal processing of

  20. Getting along or ahead: Effects of gender identity threat on communal and agentic self-presentations.

    PubMed

    Sinclair, Samantha; Carlsson, Rickard; Björklund, Fredrik

    2016-10-01

    When faced with a threat to gender identity, people may try to restore their gender status by acting in a more gender-typical manner. The present research investigated effects of gender identity threat on self-presentations of agentic and communal traits in a Swedish and an Argentine sample (N = 242). Under threat (vs. affirmation), Swedish women deemphasized agentic traits (d [95% CI] = -0.41 [-0.93, 0.11]), Argentine women increased their emphasis on communal traits (d = 0.44 [-0.08, 0.97]), and Argentine men increased their emphasis on agentic traits (d = 0.49 [-0.03, 1.01]). However, Swedish men did not appear to be affected by the threat regarding agentic (d = 0.04 [-0.47, 0.55]) or communal traits (d = 0.23 [-0.29, 0.74]). The findings are to be considered tentative. Implications for identity threat research are discussed. © 2016 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  1. The effects of angry and happy expressions on recognition memory for unfamiliar faces in delusion-prone individuals.

    PubMed

    Larøi, Frank; D'Argembeau, Arnaud; Van der Linden, Martial

    2006-12-01

    Numerous studies suggest a cognitive bias for threat-related material in delusional ideation. However, few studies have examined this bias using a memory task. We investigated the influence of delusion-proneness on identity and expression memory for angry and happy faces. Participants high and low in delusion-proneness were presented with happy and angry faces and were later asked to recognise the same faces displaying a neutral expression. They also had to remember what the initial expressions of the faces had been. Remember/know/guess judgments were asked for both identity and expression memory. Results showed that delusion-prone participants better recognised the identity of angry faces compared to non-delusional participants. Also, this difference between the two groups was mainly due to a greater number of remember responses in delusion-prone participants. These findings extend previous studies by showing that delusions are associated with a memory bias for threat-related stimuli.

  2. Mastering one's destiny: mastery goals promote challenge and success despite social identity threat.

    PubMed

    Stout, Jane G; Dasgupta, Nilanjana

    2013-06-01

    We used an achievement goal framework to enhance identity-threatened individuals' motivation and performance by way of an understudied mechanism, namely, challenge appraisals. In three experiments, women were given a mastery goal (focus on building skills) or a performance goal (perform well, avoid errors) before a mock job interview. Women who focused on mastery rather than performance felt more challenged and less threatened when anticipating an identity-threatening interview; goals did not affect appraisals of a nonthreatening interview (Experiment 1). Mastery relative to performance goals enhanced women's intention to be assertive (Experiment 2) and their actual face-to-face performance during the job interview (Experiment 3); challenge appraisals (but not threat appraisals) served as a mediator for these effects. Whereas a great deal of prior work has alleviated identity threat by altering construals of one's identity, the current research uses an alternative strategy--modifying appraisals of the situation, leaving one's self-concept intact.

  3. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  4. Dynamics of attentional bias to threat in anxious adults: bias towards and/or away?

    PubMed

    Zvielli, Ariel; Bernstein, Amit; Koster, Ernst H W

    2014-01-01

    The aim of the present study was to question untested assumptions about the nature of the expression of Attentional Bias (AB) towards and away from threat stimuli. We tested the idea that high trait anxious individuals (N = 106; M(SD)age = 23.9(3.2) years; 68% women) show a stable AB towards multiple categories of threatening information using the emotional visual dot probe task. AB with respect to five categories of threat stimuli (i.e., angry faces, attacking dogs, attacking snakes, pointed weapons, violent scenes) was evaluated. In contrast with current theories, we found that 34% of participants expressed AB towards threat stimuli, 20.8% AB away from threat stimuli, and 34% AB towards some categories of threat stimuli and away from others. The multiple observed expressions of AB were not an artifact of a specific criterion AB score cut-off; not specific to certain categories of threat stimuli; not an artifact of differences in within-subject variability in reaction time; nor accounted for by individual differences in anxiety-related variables. Findings are conceptualized as reflecting the understudied dynamics of AB expression, with implications for AB measurement and quantification, etiology, relations, and intervention research.

  5. Dynamics of Attentional Bias to Threat in Anxious Adults: Bias towards and/or Away?

    PubMed Central

    Zvielli, Ariel; Bernstein, Amit; Koster, Ernst H. W.

    2014-01-01

    The aim of the present study was to question untested assumptions about the nature of the expression of Attentional Bias (AB) towards and away from threat stimuli. We tested the idea that high trait anxious individuals (N = 106; M(SD)age = 23.9(3.2) years; 68% women) show a stable AB towards multiple categories of threatening information using the emotional visual dot probe task. AB with respect to five categories of threat stimuli (i.e., angry faces, attacking dogs, attacking snakes, pointed weapons, violent scenes) was evaluated. In contrast with current theories, we found that 34% of participants expressed AB towards threat stimuli, 20.8% AB away from threat stimuli, and 34% AB towards some categories of threat stimuli and away from others. The multiple observed expressions of AB were not an artifact of a specific criterion AB score cut-off; not specific to certain categories of threat stimuli; not an artifact of differences in within-subject variability in reaction time; nor accounted for by individual differences in anxiety-related variables. Findings are conceptualized as reflecting the understudied dynamics of AB expression, with implications for AB measurement and quantification, etiology, relations, and intervention research. PMID:25093664

  6. Altered attentional and perceptual processes as indexed by N170 during gaze perception in schizophrenia: Relationship with perceived threat and paranoid delusions.

    PubMed

    Tso, Ivy F; Calwas, Anita M; Chun, Jinsoo; Mueller, Savanna A; Taylor, Stephan F; Deldin, Patricia J

    2015-08-01

    Using gaze information to orient attention and guide behavior is critical to social adaptation. Previous studies have suggested that abnormal gaze perception in schizophrenia (SCZ) may originate in abnormal early attentional and perceptual processes and may be related to paranoid symptoms. Using event-related brain potentials (ERPs), this study investigated altered early attentional and perceptual processes during gaze perception and their relationship to paranoid delusions in SCZ. Twenty-eight individuals with SCZ or schizoaffective disorder and 32 demographically matched healthy controls (HCs) completed a gaze-discrimination task with face stimuli varying in gaze direction (direct, averted), head orientation (forward, deviated), and emotion (neutral, fearful). ERPs were recorded during the task. Participants rated experienced threat from each face after the task. Participants with SCZ were as accurate as, though slower than, HCs on the task. Participants with SCZ displayed enlarged N170 responses over the left hemisphere to averted gaze presented in fearful relative to neutral faces, indicating a heightened encoding sensitivity to faces signaling external threat. This abnormality was correlated with increased perceived threat and paranoid delusions. Participants with SCZ also showed a reduction of N170 modulation by head orientation (normally increased amplitude to deviated faces relative to forward faces), suggesting less integration of contextual cues of head orientation in gaze perception. The psychophysiological deviations observed during gaze discrimination in SCZ underscore the role of early attentional and perceptual abnormalities in social information processing and paranoid symptoms of SCZ. (c) 2015 APA, all rights reserved).

  7. Developmental relations between behavioral inhibition, anxiety, and attention biases to threat and positive information

    PubMed Central

    White, Lauren K.; Degnan, Kathryn A.; Henderson, Heather A.; Pérez-Edgar, Koraly; Walker, Olga L.; Shechner, Tomer; Leibenluft, Ellen; Bar-Haim, Yair; Pine, Daniel S.; Fox, Nathan A.

    2016-01-01

    The current study examined relations between behavioral inhibition (BI) assessed in toddlerhood (n=268) and attention biases (AB) to threat and positive faces and maternal reported anxiety assessed when children were 5 and 7-years old. Results revealed that BI predicted anxiety at age 7 in children with AB toward threat, away from positive, or with no bias, at age 7; BI did not predict anxiety for children displaying AB away from threat or toward positive. Five-year AB did not moderate the link between BI and 7-year anxiety. No direct association between AB and BI or anxiety was detected; moreover, children did not show stable AB across development. These findings extend our understanding of the developmental links between BI, AB, and anxiety. PMID:28042902

  8. Potential Stereotype Threat and Face Validity Effects on Cognitive-Based Test Performance in the Classroom

    ERIC Educational Resources Information Center

    Hollis-Sawyer, Lisa A.; Sawyer, Thomas P., Jr.

    2008-01-01

    Evaluation is an inherent part of education for an increasingly diverse student population. Confidence in one's test-taking skills, and the associated testing environment, needs to be examined from a perspective that combines the concept of Bandurian self-efficacy with the concept of stereotype threat reactions in a diverse student sample. Factors…

  9. Radiative decay of neutron-unbound intruder states in 19O

    NASA Astrophysics Data System (ADS)

    Dungan, R.; Tabor, S. L.; Tripathi, Vandana; Volya, A.; Kravvaris, K.; Abromeit, B.; Caussyn, D. D.; Morrow, S.; Parker, J. J.; Tai, P.-L.; VonMoss, J. M.

    2016-02-01

    The 9Be(14C, α γ ) reaction at EL a b=30 and 35 MeV was used to study excited states of 19O. The Florida State University (FSU) γ detector array was used to detect γ radiation in coincidence with charged particles detected and identified with a silicon Δ E -E particle telescope. γ decays have been observed for the first time from six states ranging from 368 to 2147 keV above the neutron separation energy (Sn=3962 keV) in 19O. The γ -decaying states are interspersed among states previously observed to decay by neutron emission. The ability of electromagnetic decay to compete successfully with neutron decay is explained in terms of neutron angular momentum barriers and small spectroscopic factors implying higher spin and complex structure for these intruder states. These results illustrate the need for complementary experimental approaches to best illuminate the complete nuclear structure.

  10. Genotypic differences in intruder-evoked immediate early gene activation in male, but not female, vasopressin 1b receptor knockout mice.

    PubMed

    Witchey, Shannah K; Stevenson, Erica L; Caldwell, Heather K

    2016-11-24

    The neuropeptide arginine vasopressin (Avp) modulates social behaviors via its two centrally expressed receptors, the Avp 1a receptor and the Avp 1b receptor (Avpr1b). Recent work suggests that, at least in mice, Avp signaling through Avpr1b within the CA2 region of the hippocampus is critical for normal aggressive behaviors and social recognition memory. However, this brain area is just one part of a larger neural circuit that is likely to be impacted in Avpr1b knockout (-/-) mice. To identify other brain areas that are affected by altered Avpr1b signaling, genotypic differences in immediate early gene activation, i.e. c-FOS and early growth response factor 1 (EGR-1), were quantified using immunocytochemistry following a single exposure to an intruder. In females, no genotypic differences in intruder-evoked c-FOS or EGR-1 immunoreactivity were observed in any of the brain areas measured. In males, while there were no intruder-evoked genotypic differences in c-FOS immunoreactivity, genotypic differences were observed in EGR-1 immunoreactivity within the ventral bed nucleus of the stria terminalis and the anterior hypothalamus; with Avpr1b -/- males having less EGR-1 immunoreactivity in these regions than controls. These data are the first to identify specific brain areas that may be a part of a neural circuit that includes Avpr1b-expressing cells in the CA2 region of the hippocampus. It is thought that this circuit, when working properly, plays a role in how an animal evaluates its social context.

  11. Attention Bias to Emotional Faces Varies by IQ and Anxiety in Williams Syndrome.

    PubMed

    McGrath, Lauren M; Oates, Joyce M; Dai, Yael G; Dodd, Helen F; Waxler, Jessica; Clements, Caitlin C; Weill, Sydney; Hoffnagle, Alison; Anderson, Erin; MacRae, Rebecca; Mullett, Jennifer; McDougle, Christopher J; Pober, Barbara R; Smoller, Jordan W

    2016-06-01

    Individuals with Williams syndrome (WS) often experience significant anxiety. A promising approach to anxiety intervention has emerged from cognitive studies of attention bias to threat. To investigate the utility of this intervention in WS, this study examined attention bias to happy and angry faces in individuals with WS (N = 46). Results showed a significant difference in attention bias patterns as a function of IQ and anxiety. Individuals with higher IQ or higher anxiety showed a significant bias toward angry, but not happy faces, whereas individuals with lower IQ or lower anxiety showed the opposite pattern. These results suggest that attention bias interventions to modify a threat bias may be most effectively targeted to anxious individuals with WS with relatively high IQ.

  12. Attention bias to emotional faces varies by IQ and anxiety in Williams syndrome

    PubMed Central

    McGrath, Lauren M.; Oates, Joyce M.; Dai, Yael G.; Dodd, Helen F.; Waxler, Jessica; Clements, Caitlin C.; Weill, Sydney; Hoffnagle, Alison; Anderson, Erin; MacRae, Rebecca; Mullett, Jennifer; McDougle, Christopher J.; Pober, Barbara R.; Smoller, Jordan W.

    2016-01-01

    Individuals with Williams syndrome (WS) often experience significant anxiety. A promising approach to anxiety intervention has emerged from cognitive studies of attention bias to threat. To investigate the utility of this intervention in WS, this study examined attention bias to happy and angry faces in individuals with WS (N=46). Results showed a significant difference in attention bias patterns as a function of IQ and anxiety. Individuals with higher IQ or higher anxiety showed a significant bias toward angry, but not happy faces, whereas individuals with lower IQ or lower anxiety showed the opposite pattern. These results suggest that attention bias interventions to modify a threat bias may be most effectively targeted to anxious individuals with WS with relatively high IQ. PMID:26886469

  13. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  14. Threatening faces induce fear circuitry hypersynchrony in soldiers with post-traumatic stress disorder.

    PubMed

    Dunkley, Benjamin T; Pang, Elizabeth W; Sedge, Paul A; Jetly, Rakesh; Doesburg, Sam M; Taylor, Margot J

    2016-01-01

    Post-traumatic stress disorder (PTSD) is associated with atypical responses to emotional face stimuli with preferential processing given to threat-related facial expressions via hyperactive amygdalae disengaged from medial prefrontal modulation. We examined implicit emotional face perception in soldiers with (n = 20) and without (n = 25) PTSD using magnetoencephalography to define spatiotemporal network interactions, and a subsequent region-of-interest analysis to characterize the network role of the right amygdala and medial prefrontal cortex in threatening face perception. Contrasts of network interactions revealed the PTSD group were hyperconnected compared to controls in the phase-locking response in the 2-24 Hz range for angry faces, but not for happy faces when contrasting groups. Hyperconnectivity in PTSD was greatest in the posterior cingulate, right ventromedial prefrontal cortex, right parietal regions and the right temporal pole, as well as the right amygdala. Graph measures of right amygdala and medial prefrontal connectivity revealed increases in node strength and clustering in PTSD, but not inter-node connectivity. Additionally, these measures were found to correlate with anxiety and depression. In line with prior studies, amygdala hyperconnectivity was observed in PTSD in relation to threatening faces, but the medial prefrontal cortex also displayed enhanced connectivity in our network-based approach. Overall, these results support preferential neurophysiological encoding of threat-related facial expressions in those with PTSD.

  15. Validity threats: overcoming interference with proposed interpretations of assessment data.

    PubMed

    Downing, Steven M; Haladyna, Thomas M

    2004-03-01

    Factors that interfere with the ability to interpret assessment scores or ratings in the proposed manner threaten validity. To be interpreted in a meaningful manner, all assessments in medical education require sound, scientific evidence of validity. The purpose of this essay is to discuss 2 major threats to validity: construct under-representation (CU) and construct-irrelevant variance (CIV). Examples of each type of threat for written, performance and clinical performance examinations are provided. The CU threat to validity refers to undersampling the content domain. Using too few items, cases or clinical performance observations to adequately generalise to the domain represents CU. Variables that systematically (rather than randomly) interfere with the ability to meaningfully interpret scores or ratings represent CIV. Issues such as flawed test items written at inappropriate reading levels or statistically biased questions represent CIV in written tests. For performance examinations, such as standardised patient examinations, flawed cases or cases that are too difficult for student ability contribute CIV to the assessment. For clinical performance data, systematic rater error, such as halo or central tendency error, represents CIV. The term face validity is rejected as representative of any type of legitimate validity evidence, although the fact that the appearance of the assessment may be an important characteristic other than validity is acknowledged. There are multiple threats to validity in all types of assessment in medical education. Methods to eliminate or control validity threats are suggested.

  16. Protection of children in forward-facing child restraint systems during oblique side impact sled tests: Intrusion and tether effects.

    PubMed

    Hauschild, Hans W; Humm, John R; Pintar, Frank A; Yoganandan, Narayan; Kaufman, Bruce; Kim, Jinyong; Maltese, Matthew R; Arbogast, Kristy B

    2016-09-01

    Testing was conducted to quantify the kinematics, potential for head impact, and influence on head injury metrics for a center-seated Q3s in a forward-facing child restraint system (FFCRS) in oblique impacts. The influences of a tether and intruded door on these measures were explored. Nine lateral oblique sled tests were conducted on a convertible forward-facing child restraint seat (FFCRS). The FFCRSs were secured to a bench seat from a popular production small SUV at the center seating position utilizing the lower anchor and tether for children (LATCH). The vehicle seat was fixed on the sled carriage at 60° and 80° from full frontal (30° and 10° forward rotation from pure lateral) providing an oblique lateral acceleration to the Q3s and FFCRS. A structure simulating an intruded door was mounted to the near (left) side of vehicle seat. The sled input acceleration was the proposed FMVSS 213 lateral pulse scaled to a 35 km/h delta-V. Tests were conducted with and without the tether attached to the FFCRS. Results indicate the influence of the tether on kinematics and injury measures in oblique side impact crashes for a center- or far-side-seated child occupant. All tests without a tether resulted in head contact with the simulated door, and 2 tests at the less oblique angle (80°) with a tether also resulted in head contact. No head-to-door contact was observed in 2 tests utilizing a tether. High-speed video analysis showed that the head moved beyond the CRS head side wings and made contact with the simulated intruded door. Head injury criterion (HIC) 15 median values were 589 without the tether vs. 332 with the tether attached. Tests utilizing a tether had less lateral head excursion than tests without a tether (median 400 vs. 442 mm). These tests demonstrate the important role of the tether in controlling head excursion for center- or far-side-seated child occupants in oblique side impact crashes and limiting the head injury potential with an intruded door

  17. Sensing the intruder: a quantitative threshold for recognition cues perception in honeybees

    NASA Astrophysics Data System (ADS)

    Cappa, Federico; Bruschini, Claudia; Cipollini, Maria; Pieraccini, Giuseppe; Cervo, Rita

    2014-02-01

    The ability to discriminate among nestmates and non-nestmate is essential to defend social insect colonies from intruders. Over the years, nestmate recognition has been extensively studied in the honeybee Apis mellifera; nevertheless, the quantitative perceptual aspects at the basis of the recognition system represent an unexplored subject in this species. To test the existence of a cuticular hydrocarbons' quantitative perception threshold for nestmate recognition cues, we conducted behavioural assays by presenting different amounts of a foreign forager's chemical profile to honeybees at the entrance of their colonies. We found an increase in the explorative and aggressive responses as the amount of cues increased based on a threshold mechanism, highlighting the importance of the quantitative perceptual features for the recognition processes in A. mellifera.

  18. Experimental study of isomeric intruder 1 2 + states in At 197 , 203

    DOE PAGES

    Auranen, K.; Uusitalo, J.; Juutinen, S.; ...

    2017-04-10

    A newly observed isomeric intruder ½ + state [T ½=3.5(6)ms] is identified in 203At using a gas-filled recoil separator and fusion-evaporation reactions. The isomer is depopulated through a cascade of E3 and mixed M1/E2 transitions to the 9/2 – ground state, and it is suggested to originate from the π(s ½) –1 configuration. In addition, the structures above the ½ + state in 203At and 197At are studied using in-beam γ-ray spectroscopy, recoil-decay tagging, and recoil-isomer decay tagging methods. As a result, the ½ + state is fed from 3/2 + and 5/2 + states, and the origin of thesemore » states are discussed.« less

  19. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  20. "Otherness" as Threat: Social and Educational Exclusion of Roma People in Greece

    ERIC Educational Resources Information Center

    Parthenis, Christos; Fragoulis, George

    2016-01-01

    This paper focuses on aspects of the social and educational exclusion that Roma people face in the Greek context. It argues that diversity has been constructed as a threat for the security, the social cohesion, and the well-being of western societies. Drawing from two case studies of primary schools conducted in a highly deprived suburb of Athens,…

  1. Situation-based social anxiety enhances the neural processing of faces: evidence from an intergroup context

    PubMed Central

    Ofan, Renana H.; Rubin, Nava

    2014-01-01

    Social anxiety is the intense fear of negative evaluation by others, and it emerges uniquely from a social situation. Given its social origin, we asked whether an anxiety-inducing social situation could enhance the processing of faces linked to the situational threat. While past research has focused on how individual differences in social anxiety relate to face processing, we tested the effect of manipulated social anxiety in the context of anxiety about appearing racially prejudiced in front of a peer. Visual processing of faces was indexed by the N170 component of the event-related potential. Participants viewed faces of Black and White males, along with nonfaces, either in private or while being monitored by the experimenter for signs of prejudice in a ‘public’ condition. Results revealed a difference in the N170 response to Black and Whites faces that emerged only in the public condition and only among participants high in dispositional social anxiety. These results provide new evidence that anxiety arising from the social situation modulates the earliest stages of face processing in a way that is specific to a social threat, and they shed new light on how anxiety effects on perception may contribute to the regulation of intergroup responses. PMID:23709354

  2. Dopaminergic stimulation increases selfish behavior in the absence of punishment threat.

    PubMed

    Pedroni, Andreas; Eisenegger, Christoph; Hartmann, Matthias N; Fischbacher, Urs; Knoch, Daria

    2014-01-01

    People often face decisions that pit self-interested behavior aimed at maximizing personal reward against normative behavior such as acting cooperatively, which benefits others. The threat of social sanctions for defying the fairness norm prevents people from behaving overly selfish. Thus, normative behavior is influenced by both seeking rewards and avoiding punishment. However, the neurochemical processes mediating the impact of these influences remain unknown. Several lines of evidence link the dopaminergic system to reward and punishment processing, respectively, but this evidence stems from studies in non-social contexts. The present study investigates dopaminergic drug effects on individuals' reward seeking and punishment avoidance in social interaction. Two-hundred one healthy male participants were randomly assigned to receive 300 mg of L-3,4-dihydroxyphenylalanine (L-DOPA) or a placebo before playing an economic bargaining game. This game involved two conditions, one in which unfair behavior could be punished and one in which unfair behavior could not be punished. In the absence of punishment threats, L-DOPA administration led to more selfish behavior, likely mediated through an increase in reward seeking. In contrast, L-DOPA administration had no significant effect on behavior when faced with punishment threats. The results of this study broaden the role of the dopaminergic system in reward seeking to human social interactions. We could show that even a single dose of a dopaminergic drug may bring selfish behavior to the fore, which in turn may shed new light on potential causal relationships between the dopaminergic system and norm abiding behaviors in certain clinical subpopulations.

  3. [Indirect usage of miniscrew anchorage to intrude overerupted mandibular incisors in a Class II patient with a deep overbite].

    PubMed

    Ishihara, Yoshihito; Kuroda, Shingo; Sugawara, Yasuyo; Balam, Tarek A; Takano-Yamamoto, Teruko; Yamashiro, Takashi

    2016-06-01

    Vertical dentoalveolar discrepancies are a common problem in orthodontic patients but are often difficult to treat with traditional mechanics. This case report illustrates the successful treatment of overerupted mandibular incisors via the indirect use of miniscrew anchorage. A woman (age, 22 years 9 months) had chief complaints of maxillary incisor protrusion and crooked teeth. An excessive curve of Spee caused by elongation of the mandibular incisors was also found. The patient was diagnosed with a severe Class II Division 1 malocclusion and a deep overbite. After extraction of the mandibular first premolars and the subsequent leveling phase, the elongated incisors were intruded with a novel method, which involved the combined use of sectional archwires and miniscrews placed in the premolar areas. After the procedure, the mandibular incisors had been intruded by 6.5 mm with no undesirable side effects. The total active treatment period was 42 months. The resultant occlusion and satisfactory facial profile were maintained after 30 months of retention. Our novel intrusion approach shows potential for correcting a deep overbite. © EDP Sciences, SFODF, 2016.

  4. Vigilant attention to threat, sleep patterns, and anxiety in peripubertal youth.

    PubMed

    Ricketts, Emily J; Price, Rebecca B; Siegle, Greg J; Silk, Jennifer S; Forbes, Erika E; Ladouceur, Cecile D; Harvey, Allison G; Ryan, Neal D; Dahl, Ronald E; McMakin, Dana L

    2018-05-02

    Vigilant attention to threat is commonly observed in anxiety, undergoes developmental changes in early adolescence, and has been proposed to interfere with sleep initiation and maintenance. We present one of the first studies to use objective measures to examine associations between vigilant attention to threat and difficulties initiating and maintaining sleep in an early adolescent anxious sample. We also explore the moderating role of development (age, puberty) and sex. Participants were 66 peripubertal youth (ages 9-14) with a primary anxiety disorder and 24 healthy control subjects. A dot-probe task was used to assess attentional bias to fearful relative to neutral face stimuli. Eye-tracking indexed selective attentional bias to threat, and reaction time bias indexed action readiness to threat. Sleep was assessed via actigraphy (e.g. sleep onset delay, wake after sleep onset, etc.), parent report (Children's Sleep Habits Questionnaire), and child report (Sleep Self-Report). The Pediatric Anxiety Rating Scale assessed anxiety severity. Eye-tracking initial threat fixation bias (β = .33, p = .001) and threat dwell time bias (β = .22, p = .041) were positively associated with sleep onset latency. Reaction time bias was positively associated with wake after sleep onset (β = .24, p = .026) and parent-reported sleep disturbance (β = .25, p = .019). Anxiety (severity, diagnosis) was not associated with these outcomes. Sex (β = -.32, p = .036) moderated the relation between initial threat fixation bias and sleep onset latency, with a positive association for males (p = .005), but not for females (p = .289). Age and pubertal status did not moderate effects. Vigilant attention to threat is related to longer sleep onset and reduced sleep maintenance. These associations are not stronger in early adolescents with anxiety. Implications for early intervention or prevention that targets vigilant attention to threat to impact sleep disturbance, and

  5. Attentional bias to threat in children at-risk for emotional disorders: role of gender and type of maternal emotional disorder.

    PubMed

    Montagner, Rachel; Mogg, Karin; Bradley, Brendan P; Pine, Daniel S; Czykiel, Marcelo S; Miguel, Euripedes Constantino; Rohde, Luis A; Manfro, Gisele G; Salum, Giovanni A

    2016-07-01

    Previous studies suggested that threat biases underlie familial risk for emotional disorders in children. However, major questions remain concerning the moderating role of the offspring gender and the type of parental emotional disorder on this association. This study addresses these questions in a large sample of boys and girls. Participants were 6-12 years old (at screening) typically developing children participating in the High Risk Cohort Study for Psychiatric Disorders (n = 1280; 606 girls, 674 boys). Children were stratified according to maternal emotional disorder (none; mood disorder; anxiety disorder; comorbid anxiety/mood disorder) and gender. Attention biases were assessed using a dot-probe paradigm with threat, happy and neutral faces. A significant gender-by-parental emotional disorder interaction predicted threat bias, independent of anxiety and depression symptoms in children. Daughters of mothers with an emotional disorder showed increased attention to threat compared with daughters of disorder-free mothers, irrespective of the type of maternal emotion disorder. In contrast, attention bias to threat in boys only occurred in mothers with a non-comorbid mood disorder. No group differences were found for biases for happy-face cues. Gender and type of maternal emotional disorder predict attention bias in disorder-free children. This highlights the need for longitudinal research to clarify whether this pattern of threat-attention bias in children relates to the risk of developing anxiety and mood disorders later in life.

  6. How is cyber threat evolving and what do organisations need to consider?

    PubMed

    Borrett, Martin; Carter, Roger; Wespi, Andreas

    Organisations and members of the public are becoming accustomed to the increasing velocity, frequency and variety of cyber-attacks that they have been facing over the last few years. In response to this challenge, it is important to explore what can be done to offer commercial and private users a reliable and functioning environment. This paper discusses how cyber threats might evolve in the future and seeks to explore these threats more fully. Attention is paid to the changing nature of cyber-attackers and their motivations and what this means for organisations. Finally, useful and actionable steps are provided, which practitioners can use to understand how they can start to address the future challenges of cyber security.

  7. Roseate Spoonbill squawks at intruder in the Merritt Island National Wildlife Refuge.

    NASA Technical Reports Server (NTRS)

    2000-01-01

    In the shallow waters of the Merritt Island National Wildlife Refuge, a roseate spoonbill squawks at nearby intruders. The birds, named for their brilliant pink color and paddle-shaped bill, feed in shallow water by swinging their bill back and forth, scooping up small fish and crustaceans. They typically inhabit mangroves on the coasts of southern Florida, Louisiana and Texas. The 92,000-acre refuge, which shares a boundary with Kennedy Space Center, is a habitat for more than 330 species of birds, 31 mammals, 117 fishes and 65 amphibians and reptiles. The marshes and open water of the refuge provide wintering areas for 23 species of migratory waterfowl, as well as a year-round home for great blue herons, great egrets, wood storks, cormorants, brown pelicans and other species of marsh and shore birds.

  8. The Trier Social Stress Test as a paradigm to study how people respond to threat in social interactions

    PubMed Central

    Frisch, Johanna U.; Häusser, Jan A.; Mojzisch, Andreas

    2015-01-01

    In our lives, we face countless situations in which we are observed and evaluated by our social interaction partners. Social-evaluative threat is frequently associated with strong neurophysiological stress reactions, in particular, an increase in cortisol levels. Yet, social variables do not only cause stress, but they can also buffer the neurophysiological stress response. Furthermore, social variables can themselves be affected by the threat or the threat-induced neurophysiological stress response. In order to study this complex interplay of social-evaluative threat, social processes and neurophysiological stress responses, a paradigm is needed that (a) reliably induces high levels of social-evaluative threat and (b) is extremely adaptable to the needs of the researcher. The Trier Social Stress Test (TSST) is a well-established paradigm in biopsychology that induces social-evaluative threat in the laboratory by subjecting participants to a mock job-interview. In this review, we aim at demonstrating the potential of the TSST for studying the complex interplay of social-evaluative threat, social processes and neurophysiological stress responses. PMID:25698987

  9. Evaluation of an Inexpensive Field Test for Ruling Out the Presence of Biological Threat Agents in Suspicious Powders

    DTIC Science & Technology

    2006-02-01

    4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply... responders frequently are faced with suspicious white powders, which are suspected to be biological threats such as anthrax; therefore, a need exists for an... responders for use in the differentiation of a true threat from a hoax. 15. SUBJECT TERMS Suspicious white powders Anthrax Pre-screening 16. SECURITY

  10. The mighty oak faces challenges in the Pacific West

    Treesearch

    Gail Wells

    2010-01-01

    In popular imagination, the oak tree stands for strength, endurance, and longevity. But in the coastal lowlands and central valleys of British Columbia, Washington, Oregon, and California, oaks face a battery of natural and human-induced threats. Sudden oak death, caused by a virulent pathogen identified in 2000, has killed millions of tanoaks, California black oaks,...

  11. Everybody's Scared--But Life Goes On: Coping, Defense and Action in the Face of Nuclear Threat.

    ERIC Educational Resources Information Center

    Haste, Helen

    1989-01-01

    Presents model of sequence of processes by which people deal with recurrent fears about nuclear war, drawing on risk perception and stress paradigms. Shows activism to be but one coping mechanism rather than the logical outcome of effective coping. Discusses implications for psychologists concerned about nuclear threat. (Author/NB)

  12. Social identity modifies face perception: an ERP study of social categorization

    PubMed Central

    Stedehouder, Jeffrey; Ito, Tiffany A.

    2015-01-01

    Two studies examined whether social identity processes, i.e. group identification and social identity threat, amplify the degree to which people attend to social category information in early perception [assessed with event-related brain potentials (ERPs)]. Participants were presented with faces of Muslims and non-Muslims in an evaluative priming task while ERPs were measured and implicit evaluative bias was assessed. Study 1 revealed that non-Muslims showed stronger differentiation between ingroup and outgroup faces in both early (N200) and later processing stages (implicit evaluations) when they identified more strongly with their ethnic group. Moreover, identification effects on implicit bias were mediated by intergroup differentiation in the N200. In Study 2, social identity threat (vs control) was manipulated among Muslims. Results revealed that high social identity threat resulted in stronger differentiation of Muslims from non-Muslims in early (N200) and late (implicit evaluations) processing stages, with N200 effects again predicting implicit bias. Combined, these studies reveal how seemingly bottom-up early social categorization processes are affected by individual and contextual variables that affect the meaning of social identity. Implications of these results for the social identity perspective as well as social cognitive theories of person perception are discussed. PMID:25140049

  13. Response to learned threat: An FMRI study in adolescent and adult anxiety.

    PubMed

    Britton, Jennifer C; Grillon, Christian; Lissek, Shmuel; Norcross, Maxine A; Szuhany, Kristin L; Chen, Gang; Ernst, Monique; Nelson, Eric E; Leibenluft, Ellen; Shechner, Tomer; Pine, Daniel S

    2013-10-01

    Poor threat-safety discrimination reflects prefrontal cortex dysfunction in adult anxiety disorders. While adolescent anxiety disorders are impairing and predict high risk for adult anxiety disorders, the neural correlates of threat-safety discrimination have not been investigated in this population. The authors compared prefrontal cortex function in anxious and healthy adolescents and adults following conditioning and extinction, processes requiring threat-safety learning. Anxious and healthy adolescents and adults (N=114) completed fear conditioning and extinction in the clinic. The conditioned stimuli (CS+) were neutral faces, paired with an aversive scream. Physiological and subjective data were acquired. Three weeks later, 82 participants viewed the CS+ and morphed images resembling the CS+ in an MRI scanner. During scanning, participants made difficult threat-safety discriminations while appraising threat and explicit memory of the CS+. During conditioning and extinction, the anxious groups reported more fear than the healthy groups, but the anxious adolescent and adult groups did not differ on physiological measures. During imaging, both anxious adolescents and adults exhibited lower activation in the subgenual anterior cingulate cortex than their healthy counterparts, specifically when appraising threat. Compared with their age-matched counterpart groups, anxious adults exhibited reduced activation in the ventromedial prefrontal cortex when appraising threat, whereas anxious adolescents exhibited a U-shaped pattern of activation, with greater activation in response to the most extreme CS+ and CS-. Two regions of the prefrontal cortex are involved in anxiety disorders. Reduced subgenual anterior cingulate cortex engagement is a shared feature in adult and adolescent anxiety disorders, but ventromedial prefrontal cortex dysfunction is age-specific. The unique U-shaped pattern of activation in the ventromedial prefrontal cortex in many anxious adolescents may

  14. Who Cries Wolf, and When? Manipulation of Perceived Threats to Preserve Rank in Cooperative Groups

    PubMed Central

    Barclay, Pat; Benard, Stephen

    2013-01-01

    People perform greater within-group cooperation when their groups face external threats, such as hostile outgroups or natural disasters. Researchers and social commentators suggest that high-ranking group members manipulate this “threat-dependent” cooperation by exaggerating threats in order to promote cooperation and suppress competition for their position. However, little systematic research tests this claim or possible situational moderators. In three studies, we use a cooperative group game to show that participants pay to increase others’ perceptions of group threats, and spend more on manipulation when holding privileged positions. This manipulation cost-effectively elicits cooperation and sustains privilege, and is fostered by competition over position, not only position per se. Less cooperative people do more manipulation than more cooperative people do. Furthermore, these effects generalize to broader definitions of privilege. Conceptually, these results offer new insights into an understudied dimension of group behavior. Methodologically, the research extends cooperative group games to allow for analyzing more complex group dynamics. PMID:24069239

  15. A global threats overview for Numeniini populations: synthesising expert knowledge for a group of declining migratory birds.

    USGS Publications Warehouse

    Pearce-Higgins, James W.; Brown, Daniel J.; Douglas, David J.T.; Alves, José A.; Bellio, Mariagrazia; Bocher, Pierrick; Buchannan, Graeme M.; Clay, Robert P.; Conklin, Jesse R.; Crockford, Nicola; Dann, Peter; Elts, Jaanus; Friis, Christian; Fuller, Richard A.; Gill, Jennifer A.; Gosbell, Ken; Johnson, James A.; Marquez-Ferrando, Rocio; Masero, José A.; Melville, David S.; Millington, Spike; Minton, Clive; Mundkur, Taej; Nol, Erika; Pehlak, Hannes; Piersma, Theunis; Rogers, Danny I.; Ruthrauff, Daniel R.; Senner, Nathan R.; Nazeer Shah, Junid; Sheldon, Rob D.; Soloviev, Sergej A.; Tomkovich, Pavel S.; Verkuil, Yvonne I.

    2017-01-01

    The Numeniini is a tribe of 13 wader species (Scolopacidae, Charadriiformes) of which seven are Near Threatened or globally threatened, including two Critically Endangered. To help inform conservation management and policy responses, we present the results of an expert assessment of the threats that members of this taxonomic group face across migratory flyways. Most threats are increasing in intensity, particularly in non-breeding areas, where habitat loss resulting from residential and commercial development, aquaculture, mining, transport, disturbance, problematic invasive species, pollution and climate change were regarded as having the greatest detrimental impact. Fewer threats (mining, disturbance, problematic native species and climate change) were identified as widely affecting breeding areas. Numeniini populations face the greatest number of non-breeding threats in the East Asian-Australasian Flyway, especially those associated with coastal reclamation; related threats were also identified across the Central and Atlantic Americas, and East Atlantic flyways. Threats on the breeding grounds were greatest in Central and Atlantic Americas, East Atlantic and West Asian flyways. Three priority actions were associated with monitoring and research: to monitor breeding population trends (which for species breeding in remote areas may best be achieved through surveys at key non-breeding sites), to deploy tracking technologies to identify migratory connectivity, and to monitor land-cover change across breeding and non-breeding areas. Two priority actions were focused on conservation and policy responses: to identify and effectively protect key non-breeding sites across all flyways (particularly in the East Asian- Australasian Flyway), and to implement successful conservation interventions at a sufficient scale across human-dominated landscapes for species' recovery to be achieved. If implemented urgently, these measures in combination have the potential to alter the

  16. "The impact of uncertain threat on affective bias: Individual differences in response to ambiguity": Correction.

    PubMed

    2018-04-01

    Reports an error in "The impact of uncertain threat on affective bias: Individual differences in response to ambiguity" by Maital Neta, Julie Cantelon, Zachary Haga, Caroline R. Mahoney, Holly A. Taylor and F. Caroline Davis ( Emotion , 2017[Dec], Vol 17[8], 1137-1143). In this article, the copyright attribution was incorrectly listed under the Creative Commons CC-BY license due to production-related error. The correct copyright should be "In the public domain." The online version of this article has been corrected. (The following abstract of the original article appeared in record 2017-40275-001.) Individuals who operate under highly stressful conditions (e.g., military personnel and first responders) are often faced with the challenge of quickly interpreting ambiguous information in uncertain and threatening environments. When faced with ambiguity, it is likely adaptive to view potentially dangerous stimuli as threatening until contextual information proves otherwise. One laboratory-based paradigm that can be used to simulate uncertain threat is known as threat of shock (TOS), in which participants are told that they might receive mild but unpredictable electric shocks while performing an unrelated task. The uncertainty associated with this potential threat induces a state of emotional arousal that is not overwhelmingly stressful, but has widespread-both adaptive and maladaptive-effects on cognitive and affective function. For example, TOS is thought to enhance aversive processing and abolish positivity bias. Importantly, in certain situations (e.g., when walking home alone at night), this anxiety can promote an adaptive state of heightened vigilance and defense mobilization. In the present study, we used TOS to examine the effects of uncertain threat on valence bias, or the tendency to interpret ambiguous social cues as positive or negative. As predicted, we found that heightened emotional arousal elicited by TOS was associated with an increased tendency to

  17. Investigation of the Stability of Human Freezing-Like Responses to Social Threat From Mid to Late Adolescence.

    PubMed

    Niermann, Hannah C M; Figner, Bernd; Tyborowska, Anna; Cillessen, Antonius H N; Roelofs, Karin

    2018-01-01

    Freezing behavior, a commonly observed defensive stress response, shows relatively high stability over time in animals. Given the relevance of freezing for stress-coping and human psychopathology, it is relevant to know whether freezing behavior is also stable in humans, particularly during adolescence, when most affective symptoms develop. In a prospective longitudinal study, we investigated freezing-like behavior in response to social threat in 75 adolescents at age 14, repeated 3 years later at age 17. We used a well-established method combining electrocardiography (ECG; heart rate) and posturography (body sway) in response to emotional picture-viewing of angry, happy, and neutral faces. We hypothesized that individual differences in freezing-like behavior in response to social threat-operationalized by contrasting angry vs. neutral faces-would be relatively stable over time. Our results indeed showed relative stability between ages 14 and 17 in individual differences in freezing-like behavior in heart rate ( r = 0.82), as well as in combined heart rate and body sway measures ( r = 0.65). These effects were not specific for the angry vs. neutral contrast; they were also visible in other emotion contrasts. Exploratory analysis in males and females separately showed stability in body sway specifically for angry vs. neutral faces only in females. Together, these results suggest moderate to strong stability in human freezing-like behavior in response to social threat from mid to late adolescence (with exception for the body sway measure in males). This relative stability was not specific for threat-induction and may reflect a general stability that is particularly strong for heart rate. The fact that this relative stability was found over a relatively long time range of 3 years is promising for studies aiming to use freezing-like behavior as a marker for internalizing symptoms in adolescent development.

  18. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  19. Overestimation of threat from neutral faces and voices in social anxiety.

    PubMed

    Peschard, Virginie; Philippot, Pierre

    2017-12-01

    Social anxiety (SA) is associated with a tendency to interpret social information in a more threatening manner. Most of the research in SA has focused on unimodal exploration (mostly based on facial expressions), thus neglecting the ubiquity of cross-modality. To fill this gap, the present study sought to explore whether SA influences the interpretation of facial and vocal expressions presented separately or jointly. Twenty-five high socially anxious (HSA) and 29 low socially anxious (LSA) participants completed a forced two-choice emotion identification task consisting of angry and neutral expressions conveyed by faces, voices or combined faces and voices. Participants had to identify the emotion (angry or neutral) of the presented cues as quickly and precisely as possible. Our results showed that, compared to LSA, HSA individuals show a higher propensity to misattribute anger to neutral expressions independent of cue modality and despite preserved decoding accuracy. We also found a cross-modal facilitation effect at the level of accuracy (i.e., higher accuracy in the bimodal condition compared to unimodal ones). However, such effect was not moderated by SA. Although the HSA group showed clinical cut-off scores at the Liebowitz Social Anxiety Scale, one limitation is that we did not administer diagnostic interviews. Upcoming studies may want to test whether these results can be generalized to a clinical population. These findings highlight the usefulness of a cross-modal perspective to probe the specificity of biases in SA. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    PubMed

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  1. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. PMID:23736227

  2. Social Media and Higher Education: The Problem of Anonymous Electronic Threats to the Campus Community

    ERIC Educational Resources Information Center

    Reynolds, Cristin Lee; Platt, R. Eric; Malone Schaffer, Lenore; Foster, Holly

    2017-01-01

    This case is for use in graduate courses pertaining to student affairs and higher education administration. It presents challenges higher education professionals face concerning anonymous social media, and specifically how threats made through anonymous social media platforms such as Yik Yak affect the entire university community. The anonymity of…

  3. Countering Threat Networks

    DTIC Science & Technology

    2016-12-21

    PLANNING TO COUNTER THREAT NETWORKS  Joint Intelligence Preparation of the Operational Environment and Threat Networks...Army Expeditionary Forensic Facility in Afghanistan ........ E-9 E-4 Exploitation Support to Intelligence Fusion and Decision Making ......... E-10...Approach The groundwork for successful countering threat networks activities starts with information and intelligence to develop an understanding

  4. Stricter School Soda Limits Offered: Facing Lawsuit Threat, Beverage Industry Vows to Curb High-Calorie Drinks

    ERIC Educational Resources Information Center

    Samuels, Christina A.

    2006-01-01

    The soft-drink industry vowed to voluntarily curb selling sugary sodas and other high-calorie beverages in schools, a move that was taken under threat of litigation by critics who see the industry as a prime culprit in a national obesity crisis. The promise offered no guarantee that schools would go along with the restrictions, though many…

  5. Technologies to counter aviation security threats

    NASA Astrophysics Data System (ADS)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  6. Fluctuations in [11C]SB207145 PET Binding Associated with Change in Threat-Related Amygdala Reactivity in Humans

    PubMed Central

    Fisher, Patrick MacDonald; Haahr, Mette Ewers; Jensen, Christian Gaden; Frokjaer, Vibe Gedsoe; Siebner, Hartwig Roman; Knudsen, Gitte Moos

    2015-01-01

    Serotonin critically affects the neural processing of emotionally salient stimuli, including indices of threat; however, how alterations in serotonin signaling contribute to changes in brain function is not well understood. Recently, we showed in a placebo-controlled study of 32 healthy males that brain serotonin 4 receptor (5-HT4) binding, assessed with [11C]SB207145 PET, was sensitive to a 3-week intervention with the selective serotonin reuptake inhibitor fluoxetine, supporting it as an in vivo model for fluctuations in central serotonin levels. Participants also underwent functional magnetic resonance imaging while performing a gender discrimination task of fearful, angry, and neutral faces. This offered a unique opportunity to evaluate whether individual fluctuations in central serotonin levels, indexed by change in [11C]SB207145 binding, predicted changes in threat-related reactivity (ie, fear and angry vs neutral faces) within a corticolimbic circuit including the amygdala and medial prefrontal and anterior cingulate cortex. We observed a significant association such that decreased brain-wide [11C]SB207145 binding (ie, increased brain serotonin levels) was associated with lower threat-related amygdala reactivity, whereas intervention group status did not predict change in corticolimbic reactivity. This suggests that in the healthy brain, interindividual responses to pharmacologically induced and spontaneously occurring fluctuations in [11C]SB207145 binding, a putative marker of brain serotonin levels, affect amygdala reactivity to threat. Our finding also supports that change in brain [11C]SB207145 binding may be a relevant marker for evaluating neurobiological mechanisms underlying sensitivity to threat and serotonin signaling. PMID:25560201

  7. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  8. Formation of Kuiper-belt binaries through multiple chaotic scattering encounters with low-mass intruders

    NASA Astrophysics Data System (ADS)

    Astakhov, Sergey A.; Lee, Ernestine A.; Farrelly, David

    2005-06-01

    The discovery that many trans-Neptunian objects exist in pairs, or binaries, is proving invaluable for shedding light on the formation, evolution and structure of the outer Solar system. Based on recent systematic searches it has been estimated that up to 10 per cent of Kuiper-belt objects might be binaries. However, all examples discovered to date are unusual, as compared with near-Earth and main-belt asteroid binaries, for their mass ratios of the order of unity and their large, eccentric orbits. In this article we propose a common dynamical origin for these compositional and orbital properties based on four-body simulations in the Hill approximation. Our calculations suggest that binaries are produced through the following chain of events. Initially, long-lived quasi-bound binaries form by two bodies getting entangled in thin layers of dynamical chaos produced by solar tides within the Hill sphere. Next, energy transfer through gravitational scattering with a low-mass intruder nudges the binary into a nearby non-chaotic, stable zone of phase space. Finally, the binary hardens (loses energy) through a series of relatively gentle gravitational scattering encounters with further intruders. This produces binary orbits that are well fitted by Kepler ellipses. Dynamically, the overall process is strongly favoured if the original quasi-bound binary contains comparable masses. We propose a simplified model of chaotic scattering to explain these results. Our findings suggest that the observed preference for roughly equal-mass ratio binaries is probably a real effect; that is, it is not primarily due to an observational bias for widely separated, comparably bright objects. Nevertheless, we predict that a sizeable population of very unequal-mass Kuiper-belt binaries is probably awaiting discovery.

  9. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  10. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    PubMed

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  11. Assessing Student Threats

    ERIC Educational Resources Information Center

    Brunner, Judy; Emmendorfer, Beth; Lewis, Dennis

    2009-01-01

    For administrators at the secondary level, not many school days go according to plan or script, but few things are more disruptive than a student threat of violence. When threats are made--or if there is a rumor of a serious student threat--it can take both time and resources to investigate, interview, and analyze multiple pieces of information in…

  12. Status and threats analysis for the Florida manatee (Trichechus manatus latirostris), 2012

    USGS Publications Warehouse

    Runge, Michael C.; Langtimm, Catherine A.; Martin, Julien; Fonnesbeck, Christopher J.

    2015-01-01

    The endangered West Indian manatee (Trichechus manatus), especially the Florida subspecies (T. m. latirostris), has been the focus of conservation efforts and extensive research since its listing under the Endangered Species Act. On the basis of the best information available as of December 2012, the threats facing the Florida manatee were determined to be less severe than previously thought, either because the conservation efforts have been successful, or because our knowledge of the demographic effects of those threats is increased, or both. Using the manatee Core Biological Model, we estimated the probability of the Florida manatee population on either the Atlantic or Gulf coast falling below 500 adults in the next 150 years to be 0.92 percent. The primary threats remain watercraft-related mortality and long-term loss of warm-water habitat. Since 2009, however, there have been a number of unusual events that have not yet been incorporated into this analysis, including several severely cold winters, a severe red-tide die off, and substantial loss of seagrass habitat in Brevard County, Fla. Further, the version of the Core Biological Model used in 2012 makes a number of assumptions that are under investigation. A revision of the Core Biological Model and an update of this quantitative threats analysis are underway as of 2015.

  13. Response to learned threat: an fMRI study in adolescent and adult anxiety

    PubMed Central

    Britton, Jennifer C.; Grillon, Christian; Lissek, Shmuel; Norcross, Maxine A.; Szuhany, Kristin L.; Chen, Gang; Ernst, Monique; Nelson, Eric E.; Leibenluft, Ellen; Shechner, Tomer; Pine, Daniel S.

    2013-01-01

    Objective Poor threat-safety discrimination reflects prefrontal cortex dysfunction in adult anxiety disorders. While adolescent anxiety disorders are impairing and predict high risk for adult anxiety disorders, no prior study examines neural correlates of threat-safety discrimination in this group. The current study compares prefrontal cortex function in anxious and healthy adolescents and adults following conditioning and extinction, processes requiring threat-safety learning. Method Anxious and healthy adolescents and adults (n=114) completed fear conditioning and extinction in the clinic. Conditioned stimuli (CS+) were neutral faces, paired with an aversive scream. Physiological and subjective data were acquired. Several weeks later, 82 participants viewed the CS+ and morphed images resembling the CS+ in a magnetic resonance imaging (MRI) scanner. During scanning, participants made difficult threat-safety discriminations while appraising threat and explicit memory of the CS+. Results During conditioning and extinction, anxious groups reported more fear than healthy groups, but patient groups did not differ on physiology. During imaging, both anxious adolescents and adults exhibited lower sub-genual anterior cingulate (sgACC) activation than healthy peers, specifically when appraising threat. In ventromedial prefrontal cortex (vmPFC), relative to their age-matched peer groups, anxious adults exhibited reduced activation when appraising threat, whereas anxious adolescents exhibited a U-shaped pattern of activation, with greater activation to the most extreme CS and CS−. Conclusions Two regions of the prefrontal cortex are involved in anxiety disorders. Reduced sgACC engagement is a shared feature in adult and adolescent anxiety disorders, but vmPFC dysfunction is age-specific. The unique U-shaped pattern of vmPFC activation in many anxious adolescents could reflect heightened sensitivity to threat and safety conditions. How variations in the pattern relate to

  14. Social identity modifies face perception: an ERP study of social categorization.

    PubMed

    Derks, Belle; Stedehouder, Jeffrey; Ito, Tiffany A

    2015-05-01

    Two studies examined whether social identity processes, i.e. group identification and social identity threat, amplify the degree to which people attend to social category information in early perception [assessed with event-related brain potentials (ERPs)]. Participants were presented with faces of Muslims and non-Muslims in an evaluative priming task while ERPs were measured and implicit evaluative bias was assessed. Study 1 revealed that non-Muslims showed stronger differentiation between ingroup and outgroup faces in both early (N200) and later processing stages (implicit evaluations) when they identified more strongly with their ethnic group. Moreover, identification effects on implicit bias were mediated by intergroup differentiation in the N200. In Study 2, social identity threat (vs control) was manipulated among Muslims. Results revealed that high social identity threat resulted in stronger differentiation of Muslims from non-Muslims in early (N200) and late (implicit evaluations) processing stages, with N200 effects again predicting implicit bias. Combined, these studies reveal how seemingly bottom-up early social categorization processes are affected by individual and contextual variables that affect the meaning of social identity. Implications of these results for the social identity perspective as well as social cognitive theories of person perception are discussed. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  15. Nonconscious attention bias to threat is correlated with anterior cingulate cortex gray matter volume: a voxel-based morphometry result and replication.

    PubMed

    Carlson, Joshua M; Beacher, Felix; Reinke, Karen S; Habib, Reza; Harmon-Jones, Eddie; Mujica-Parodi, Lilianne R; Hajcak, Greg

    2012-01-16

    An important aspect of the fear response is the allocation of spatial attention toward threatening stimuli. This response is so powerful that modulations in spatial attention can occur automatically without conscious awareness. Functional neuroimaging research suggests that the amygdala and anterior cingulate cortex (ACC) form a network involved in the rapid orienting of attention to threat. A hyper-responsive attention bias to threat is a common component of anxiety disorders. Yet, little is known of how individual differences in underlying brain morphometry relate to variability in attention bias to threat. Here, we performed two experiments using dot-probe tasks that measured individuals' attention bias to backward masked fearful faces. We collected whole-brain structural magnetic resonance images and used voxel-based morphometry to measure brain morphometry. We tested the hypothesis that reduced gray matter within the amygdala and ACC would be associated with reduced attention bias to threat. In Experiment 1, we found that backward masked fearful faces captured spatial attention and that elevated attention bias to masked threat was associated with greater ACC gray matter volumes. In Experiment 2, this association was replicated in a separate sample. Thus, we provide initial and replicating evidence that ACC gray matter volume is correlated with biased attention to threat. Importantly, we demonstrate that variability in affective attention bias within the healthy population is associated with ACC morphometry. This result opens the door for future research into the underlying brain morphometry associated with attention bias in clinically anxious populations. Copyright © 2011 Elsevier Inc. All rights reserved.

  16. Brain drain? An examination of stereotype threat effects during training on knowledge acquisition and organizational effectiveness.

    PubMed

    Grand, James A

    2017-02-01

    Stereotype threat describes a situation in which individuals are faced with the risk of upholding a negative stereotype about their subgroup based on their actions. Empirical work in this area has primarily examined the impact of negative stereotypes on performance for threatened individuals. However, this body of research seldom acknowledges that performance is a function of learning-which may also be impaired by pervasive group stereotypes. This study presents evidence from a 3-day self-guided training program demonstrating that stereotype threat impairs acquisition of cognitive learning outcomes for females facing a negative group stereotype. Using hierarchical Bayesian modeling, results revealed that stereotyped females demonstrated poorer declarative knowledge acquisition, spent less time reflecting on learning activities, and developed less efficiently organized knowledge structures compared with females in a control condition. Findings from a Bayesian mediation model also suggested that despite stereotyped individuals "working harder" to perform well, their underachievement was largely attributable to failures in learning to "work smarter." Building upon these empirical results, a computational model and computer simulation is also presented to demonstrate the practical significance of stereotype-induced impairments to learning on the development of an organization's human capital resources and capabilities. The simulation results show that even the presence of small effects of stereotype threat during learning/training have the potential to exert a significant negative impact on an organization's performance potential. Implications for future research and practice examining stereotype threat during learning are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  17. I don't know where to look: the impact of intolerance of uncertainty on saccades towards non-predictive emotional face distractors.

    PubMed

    Morriss, Jayne; McSorley, Eugene; van Reekum, Carien M

    2017-08-24

    Attentional bias to uncertain threat is associated with anxiety disorders. Here we examine the extent to which emotional face distractors (happy, angry and neutral) and individual differences in intolerance of uncertainty (IU), impact saccades in two versions of the "follow a cross" task. In both versions of the follow the cross task, the probability of receiving an emotional face distractor was 66.7%. To increase perceived uncertainty regarding the location of the face distractors, in one of the tasks additional non-predictive cues were presented before the onset of the face distractors and target. We did not find IU to impact saccades towards non-cued face distractors. However, we found IU, over Trait Anxiety, to impact saccades towards non-predictive cueing of face distractors. Under these conditions, IU individuals' eyes were pulled towards angry face distractors and away from happy face distractors overall, and the speed of this deviation of the eyes was determined by the combination of the cue and emotion of the face. Overall, these results suggest a specific role of IU on attentional bias to threat during uncertainty. These findings highlight the potential of intolerance of uncertainty-based mechanisms to help understand anxiety disorder pathology and inform potential treatment targets.

  18. Non Profit Leaders Face New Realities: Status Report on Non Profit Care

    ERIC Educational Resources Information Center

    Neugebauer, Roger

    2010-01-01

    When "Exchange" surveyed leaders of North America's largest non profit child care organizations about threats facing their organizations, not surprisingly, the "state of the economy" was foremost on their minds. What is surprising is that these organizations have been able to weather the economic storm quite well. One should…

  19. Patterns and biases of climate change threats in the IUCN Red List.

    PubMed

    Trull, Nicholas; Böhm, Monika; Carr, Jamie

    2018-02-01

    International Union for Conservation of Nature (IUCN) Red List assessments rely on published data and expert inputs, and biases can be introduced where underlying definitions and concepts are ambiguous. Consideration of climate change threat is no exception, and recently numerous approaches to assessing the threat of climate change to species have been developed. We explored IUCN Red List assessments of amphibians and birds to determine whether species listed as threatened by climate change display distinct patterns in terms of habitat occupied and additional nonclimatic threats faced. We compared IUCN Red List data with a published data set of species' biological and ecological traits believed to infer high vulnerability to climate change and determined whether distributions of climate change-threatened species on the IUCN Red List concur with those of climate change-threatened species identified with the trait-based approach and whether species possessing these traits are more likely to have climate change listed as a threat on the IUCN Red List. Species in some ecosystems (e.g., grassland, shrubland) and subject to particular threats (e.g., invasive species) were more likely to have climate change as a listed threat. Geographical patterns of climate change-threatened amphibians and birds on the IUCN Red List were incongruent with patterns of global species richness and patterns identified using trait-based approaches. Certain traits were linked to increases or decreases in the likelihood of a species being threatened by climate change. Broad temperature tolerance of a species was consistently related to an increased likelihood of climate change threat, indicating counterintuitive relationships in IUCN assessments. To improve the robustness of species assessments of the vulnerability or extinction risk associated with climate change, we suggest IUCN adopt a more cohesive approach whereby specific traits highlighted by our results are considered in Red List

  20. Threat in dreams: an adaptation?

    PubMed

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, p<.00012). Contrary to TST's predictions, the SA participants reported significantly fewer threat dreams (chi([1,N=287])(2)=6.11, p<.0134), and did not differ from the Welsh participants in responses to dream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  1. Moral fixations: The role of moral integrity and social anxiety in the selective avoidance of social threat.

    PubMed

    Van Dillen, Lotte F; Enter, Dorien; Peters, Leonie P M; van Dijk, Wilco W; Rotteveel, Mark

    2017-01-01

    People derive their sense of belonging from perceptions of being a moral person. Research moreover suggests that social cues of rejection rapidly influence visual scanning, and result in avoidant gaze behavior, especially in socially anxious individuals. With the current eye-tracking experiment, we therefore examined whether moral integrity threats and affirmations influence selective avoidance of social threat, and how this varies with individual differences in social anxiety. Fifty-nine participants retrieved a memory of a past immoral, moral, or neutral act. Next, participants passively viewed angry, happy, and neutral faces, while we recorded how often they first fixated on the eyes. In addition, we administered the Liebowitz Social Anxiety Scale (1987). Participants first fixated less on angry eyes compared to happy or neutral eyes when their moral integrity was threatened, and this selective avoidance was enhanced with increasing social anxiety. Following a moral affirmation, however, participants no longer selectively avoided the eyes of angry faces, regardless of individual differences in social anxiety. The results thus suggest that both low and high socially anxious people adjust their social gaze behavior in response to threats and affirmations of their moral integrity, pointing to the importance of the social context when considering affective processing biases. Copyright © 2016 Elsevier B.V. All rights reserved.

  2. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    PubMed Central

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2013-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232

  3. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    PubMed

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  4. Dimensions of Small Unit Resilience in Organizations Facing Threats, Disruption, and Stress

    DTIC Science & Technology

    2011-06-15

    upbeat. ‘He was looking forward to getting back to Iraq,’ Scott recalls. ‘He missed his buddies. He wanted to learn to play the guitar when he got...the face of adversity,), as well as, a tool to mathematically measure and score the results. One possible solution is that survey questions on...resilience could be added to existing tools and scored separately, or a separate survey could be conducted in conjunction with the other tools

  5. Childhood Poverty Predicts Adult Amygdala and Frontal Activity and Connectivity in Response to Emotional Faces.

    PubMed

    Javanbakht, Arash; King, Anthony P; Evans, Gary W; Swain, James E; Angstadt, Michael; Phan, K Luan; Liberzon, Israel

    2015-01-01

    Childhood poverty negatively impacts physical and mental health in adulthood. Altered brain development in response to social and environmental factors associated with poverty likely contributes to this effect, engendering maladaptive patterns of social attribution and/or elevated physiological stress. In this fMRI study, we examined the association between childhood poverty and neural processing of social signals (i.e., emotional faces) in adulthood. Fifty-two subjects from a longitudinal prospective study recruited as children, participated in a brain imaging study at 23-25 years of age using the Emotional Faces Assessment Task. Childhood poverty, independent of concurrent adult income, was associated with higher amygdala and medial prefrontal cortical (mPFC) responses to threat vs. happy faces. Also, childhood poverty was associated with decreased functional connectivity between left amygdala and mPFC. This study is unique, because it prospectively links childhood poverty to emotional processing during adulthood, suggesting a candidate neural mechanism for negative social-emotional bias. Adults who grew up poor appear to be more sensitive to social threat cues and less sensitive to positive social cues.

  6. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    PubMed

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior.

  7. Modeling and Validation of a Navy A6-Intruder Actively Controlled Landing Gear System

    NASA Technical Reports Server (NTRS)

    Horta, Lucas G.; Daugherty, Robert H.; Martinson, Veloria J.

    1999-01-01

    Concepts for long-range air travel are characterized by airframe designs with long, slender, relatively flexible fuselages. One aspect often overlooked is ground-induced vibration of these aircraft. This paper presents an analytical and experimental study of reducing ground-induced aircraft vibration loads by using actively controlled landing gear. A facility has been developed to test various active landing gear control concepts and their performance, The facility uses a Navy A6 Intruder landing gear fitted with an auxiliary hydraulic supply electronically controlled by servo valves. An analytical model of the gear is presented, including modifications to actuate the gear externally, and test data are used to validate the model. The control design is described and closed-loop test and analysis comparisons are presented.

  8. Information Exchange Between Resilient and High-Threat Networks: Techniques for Threat Mitigation

    DTIC Science & Technology

    2004-11-01

    Information Exchange between Resilient and High-Threat Networks : Techniques for Threat Mitigation Tim Dean and Graham Wyatt QinetiQ...SUMMARY High resilience military networks frequently have requirements for exchange of information with networks of low assurance, including networks of...assured, two-way, information flow between high resilience networks and other networks of unknown threat. The techniques include conventional and

  9. Amazonian freshwater habitats experiencing environmental and socioeconomic threats affecting subsistence fisheries.

    PubMed

    Alho, Cleber J R; Reis, Roberto E; Aquino, Pedro P U

    2015-09-01

    Matching the trend seen among the major large rivers of the globe, the Amazon River and its tributaries are facing aquatic ecosystem disruption that is affecting freshwater habitats and their associated biodiversity, including trends for decline in fishery resources. The Amazon's aquatic ecosystems, linked natural resources, and human communities that depend on them are increasingly at risk from a number of identified threats, including expansion of agriculture; cattle pastures; infrastructure such as hydroelectric dams, logging, mining; and overfishing. The forest, which regulates the hydrological pulse, guaranteeing the distribution of rainfall and stabilizing seasonal flooding, has been affected by deforestation. Flooding dynamics of the Amazon Rivers are a major factor in regulating the intensity and timing of aquatic organisms. This study's objective was to identify threats to the integrity of freshwater ecosystems, and to seek instruments for conservation and sustainable use, taking principally fish diversity and fisheries as factors for analysis.

  10. Attention bias for social threat in youth with tic disorders: Links with tic severity and social anxiety.

    PubMed

    Pile, Victoria; Robinson, Sally; Topor, Marta; Hedderly, Tammy; Lau, Jennifer Y F

    2018-06-07

    Many individuals with Tourette syndrome and chronic tic disorders (TS/CTDs) report poor social functioning and comorbid social anxiety. Yet limited research has investigated the role of cognitive factors that highlight social threats in youth with TS/CTD, and whether these biases underlie tic severity and co-occurring social anxiety. This study examined whether selective attention to social threat is enhanced young people with TS/CTDs compared to healthy controls, and whether attention biases are associated with tic severity and social anxiety. Twenty seven young people with TS/CTDs and 25 matched control participants completed an experimental measure of attention bias toward/away from threat stimuli. A clinician-rated interview measuring tic severity/impairment (YGTSS Total Score) and questionnaire measures of social anxiety were completed by participants and their parents. Young people with TS/CTD showed an attention bias to social threat words (relative to benign words) compared to controls but no such bias for social threat faces. Attention bias for social threat words was associated with increasing YGTSS Total Score and parent-reported social anxiety in the TS/CTDs group. Mediation analysis revealed a significant indirect path between YGTSS Total Score and social anxiety, via attention to social threat. Tentatively, these associations appeared to be driven by impairment rather than tic severity scores. Preliminary data suggests that youth with TS/CTD have enhanced attention to threat, compared to controls, and this is associated with impairment and social anxiety. Attention to threat could offer a cognitive mechanism connecting impairment and social anxiety, and so be a valuable trans-diagnostic treatment target.

  11. Identity Implications of Influence Goals: A Revised Analysis of Face-Threatening Acts and Application to Seeking Compliance with Same-Sex Friends.

    ERIC Educational Resources Information Center

    Wilson, Steven R.; Aleman, Carlos G.; Leatham, Geoff B.

    1998-01-01

    Challenges and revises politeness theory by analyzing potential implications for both parties' face when the logical preconditions for seeking compliance are framed by specific influence goals. Tests undergraduate students' imagining asking favors, giving advice, and enforcing obligations with same-sex friends. Finds perceived face threats varied…

  12. Anxiety promotes memory for mood-congruent faces but does not alter loss aversion

    PubMed Central

    Charpentier, Caroline J.; Hindocha, Chandni; Roiser, Jonathan P.; Robinson, Oliver J.

    2016-01-01

    Pathological anxiety is associated with disrupted cognitive processing, including working memory and decision-making. In healthy individuals, experimentally-induced state anxiety or high trait anxiety often results in the deployment of adaptive harm-avoidant behaviours. However, how these processes affect cognition is largely unknown. To investigate this question, we implemented a translational within-subjects anxiety induction, threat of shock, in healthy participants reporting a wide range of trait anxiety scores. Participants completed a gambling task, embedded within an emotional working memory task, with some blocks under unpredictable threat and others safe from shock. Relative to the safe condition, threat of shock improved recall of threat-congruent (fearful) face location, especially in highly trait anxious participants. This suggests that threat boosts working memory for mood-congruent stimuli in vulnerable individuals, mirroring memory biases in clinical anxiety. By contrast, Bayesian analysis indicated that gambling decisions were better explained by models that did not include threat or treat anxiety, suggesting that: (i) higher-level executive functions are robust to these anxiety manipulations; and (ii) decreased risk-taking may be specific to pathological anxiety. These findings provide insight into the complex interactions between trait anxiety, acute state anxiety and cognition, and may help understand the cognitive mechanisms underlying adaptive anxiety. PMID:27098489

  13. Anxiety promotes memory for mood-congruent faces but does not alter loss aversion.

    PubMed

    Charpentier, Caroline J; Hindocha, Chandni; Roiser, Jonathan P; Robinson, Oliver J

    2016-04-21

    Pathological anxiety is associated with disrupted cognitive processing, including working memory and decision-making. In healthy individuals, experimentally-induced state anxiety or high trait anxiety often results in the deployment of adaptive harm-avoidant behaviours. However, how these processes affect cognition is largely unknown. To investigate this question, we implemented a translational within-subjects anxiety induction, threat of shock, in healthy participants reporting a wide range of trait anxiety scores. Participants completed a gambling task, embedded within an emotional working memory task, with some blocks under unpredictable threat and others safe from shock. Relative to the safe condition, threat of shock improved recall of threat-congruent (fearful) face location, especially in highly trait anxious participants. This suggests that threat boosts working memory for mood-congruent stimuli in vulnerable individuals, mirroring memory biases in clinical anxiety. By contrast, Bayesian analysis indicated that gambling decisions were better explained by models that did not include threat or treat anxiety, suggesting that: (i) higher-level executive functions are robust to these anxiety manipulations; and (ii) decreased risk-taking may be specific to pathological anxiety. These findings provide insight into the complex interactions between trait anxiety, acute state anxiety and cognition, and may help understand the cognitive mechanisms underlying adaptive anxiety.

  14. Emotional facial expressions reduce neural adaptation to face identity.

    PubMed

    Gerlicher, Anna M V; van Loon, Anouk M; Scholte, H Steven; Lamme, Victor A F; van der Leij, Andries R

    2014-05-01

    In human social interactions, facial emotional expressions are a crucial source of information. Repeatedly presented information typically leads to an adaptation of neural responses. However, processing seems sustained with emotional facial expressions. Therefore, we tested whether sustained processing of emotional expressions, especially threat-related expressions, would attenuate neural adaptation. Neutral and emotional expressions (happy, mixed and fearful) of same and different identity were presented at 3 Hz. We used electroencephalography to record the evoked steady-state visual potentials (ssVEP) and tested to what extent the ssVEP amplitude adapts to the same when compared with different face identities. We found adaptation to the identity of a neutral face. However, for emotional faces, adaptation was reduced, decreasing linearly with negative valence, with the least adaptation to fearful expressions. This short and straightforward method may prove to be a valuable new tool in the study of emotional processing.

  15. Age-Related Changes in Amygdala-Frontal Connectivity during Emotional Face Processing from Childhood into Young Adulthood

    PubMed Central

    Wu, Minjie; Kujawa, Autumn; Lu, Lisa H.; Fitzgerald, Daniel A.; Klumpp, Heide; Fitzgerald, Kate D.; Monk, Christopher S.; Phan, K. Luan

    2016-01-01

    The ability to process and respond to emotional facial expressions is a critical skill for healthy social and emotional development. There has been growing interest in understanding the neural circuitry underlying development of emotional processing, with previous research implicating functional connectivity between amygdala and frontal regions. However, existing work has focused on threatening emotional faces, raising questions regarding the extent to which these developmental patterns are specific to threat or to emotional face processing more broadly. In the current study, we examined age-related changes in brain activity and amygdala functional connectivity during an fMRI emotional face matching task (including angry, fearful and happy faces) in 61 healthy subjects aged 7–25 years. We found age-related decreases in ventral medial prefrontal cortex (vmPFC) activity in response to happy faces but not to angry or fearful faces, and an age-related change (shifting from positive to negative correlation) in amygdala-anterior cingulate cortex/medial prefrontal cortex (ACC/mPFC) functional connectivity to all emotional faces. Specifically, positive correlations between amygdala and ACC/mPFC in children changed to negative correlations in adults, which may suggest early emergence of bottom-up amygdala excitatory signaling to ACC/mPFC in children and later development of top-down inhibitory control of ACC/mPFC over amygdala in adults. Age-related changes in amygdala-ACC/mPFC connectivity did not vary for processing of different facial emotions, suggesting changes in amygdala-ACC/mPFC connectivity may underlie development of broad emotional processing, rather than threat-specific processing. PMID:26931629

  16. The virtual-hand illusion: effects of impact and threat on perceived ownership and affective resonance

    PubMed Central

    Ma, Ke; Hommel, Bernhard

    2013-01-01

    The rubber hand illusion refers to the observation that participants perceive “body ownership” for a rubber hand if it moves, or is stroked in synchrony with the participant's real (covered) hand. Research indicates that events targeting artificial body parts can trigger affective responses (affective resonance) only with perceived body ownership, while neuroscientific findings suggest affective resonance irrespective of ownership (e.g., when observing other individuals under threat). We hypothesized that this may depend on the severity of the event. We first replicated previous findings that the rubber hand illusion can be extended to virtual hands—the virtual-hand illusion. We then tested whether hand ownership and affective resonance (assessed by galvanic skin conductance) are modulated by the experience of an event that either “impacted” (a ball hitting the hand) or “threatened” (a knife cutting the hand) the virtual hand. Ownership was stronger if the virtual hand moved synchronously with the participant's own hand, but this effect was independent from whether the hand was impacted or threatened. Affective resonance was mediated by ownership however: In the face of mere impact, participants showed more resonance in the synchronous condition (i.e., with perceived ownership) than in the asynchronous condition. In the face of threat, in turn, affective resonance was independent of synchronicity—participants were emotionally involved even if a threat was targeting a hand that they did not perceive as their own. Our findings suggest that perceived body ownership and affective responses to body-related impact or threat can be dissociated and are thus unlikely to represent the same underlying process. We argue that affective reactions to impact are produced in a top-down fashion if the impacted effector is assumed to be part of one's own body, whereas threatening events trigger affective responses more directly in a bottom-up fashion—irrespective of

  17. Cognitive appraisals of stereotype threat.

    PubMed

    Berjot, S; Roland-Levy, C; Girault-Lidvan, N

    2011-04-01

    Using the cognitive appraisal conceptualisation of the transactional model of stress, the goal was to assess how victims of stereotype threat respond to this situation in terms of primary appraisals (threat/challenge) and to investigate whether those appraisals may mediate the relation between stereotype threat and performance. Results show that, while participants from North Africa living in France did appraise the situation more as a threat and less as a challenge, only challenge appraisal mediated between stereotype threat and performance.

  18. Cannabis use in early adolescence: Evidence of amygdala hypersensitivity to signals of threat.

    PubMed

    Spechler, Philip A; Orr, Catherine A; Chaarani, Bader; Kan, Kees-Jan; Mackey, Scott; Morton, Aaron; Snowe, Mitchell P; Hudson, Kelsey E; Althoff, Robert R; Higgins, Stephen T; Cattrell, Anna; Flor, Herta; Nees, Frauke; Banaschewski, Tobias; Bokde, Arun L W; Whelan, Robert; Büchel, Christian; Bromberg, Uli; Conrod, Patricia; Frouin, Vincent; Papadopoulos, Dimitri; Gallinat, Jurgen; Heinz, Andreas; Walter, Henrik; Ittermann, Bernd; Gowland, Penny; Paus, Tomáš; Poustka, Luise; Martinot, Jean-Luc; Artiges, Eric; Smolka, Michael N; Schumann, Gunter; Garavan, Hugh

    2015-12-01

    Cannabis use in adolescence may be characterized by differences in the neural basis of affective processing. In this study, we used an fMRI affective face processing task to compare a large group (n=70) of 14-year olds with a history of cannabis use to a group (n=70) of never-using controls matched on numerous characteristics including IQ, SES, alcohol and cigarette use. The task contained short movies displaying angry and neutral faces. Results indicated that cannabis users had greater reactivity in the bilateral amygdalae to angry faces than neutral faces, an effect that was not observed in their abstinent peers. In contrast, activity levels in the cannabis users in cortical areas including the right temporal-parietal junction and bilateral dorsolateral prefrontal cortex did not discriminate between the two face conditions, but did differ in controls. Results did not change after excluding subjects with any psychiatric symptomology. Given the high density of cannabinoid receptors in the amygdala, our findings suggest cannabis use in early adolescence is associated with hypersensitivity to signals of threat. Hypersensitivity to negative affect in adolescence may place the subject at-risk for mood disorders in adulthood. Copyright © 2015. Published by Elsevier Ltd.

  19. Lizard threat display handicaps endurance.

    PubMed Central

    Brandt, Y

    2003-01-01

    Honest-signalling theory asserts that threat displays reliably advertise attributes that influence fighting success. Endurance, as measured by treadmill performance, predicts the outcome of agonistic interactions among lizards. If threat displays in lizards function to advertise endurance capacity then variation in threat displays should correlate with endurance. I tested this prediction for the duration of threat posturing in male side-blotched lizards (Uta stansburiana) and examined whether threat displays act as quality handicaps, reliable signals that expend the attribute that is advertised. Individual variation in the duration of threat posturing correlated with endurance, while an experimental reduction of endurance diminished the duration of threat posturing. As expected of a quality handicap, endurance fell below baseline after display production. A restriction of aerobic metabolism can account for this effect. In threat posturing, lateral compression of the thorax may interfere with respiration or with circulation, limiting aerobic metabolism and causing a compensatory increase in anaerobic metabolism, thereby generating lactate and diminishing locomotor capacity. Concentrations of lactate measured after display production were higher than baseline, consistent with the proposed mechanism. By restricting aerobic metabolism, the threat posture can act as a quality handicap, simultaneously advertising and expending the endurance capacity of displaying lizards. PMID:12803896

  20. How disgust facilitates avoidance: an ERP study on attention modulation by threats.

    PubMed

    Liu, Yunzhe; Zhang, Dandan; Luo, Yuejia

    2015-04-01

    This study investigated the attention modulation of disgust in comparison with anger in a dot-probe task. Results indicated a two-stage processing of attention modulation by threats. When participants viewed the cues that were represented by Chinese faces (i.e. the in-group condition), it was found at the early processing stage that an angry face elicited a larger occipital P1 component whereas a disgusted face elicited a smaller P1 for validly than for invalidly cued targets. However, the result pattern was reversed at the later processing stage: the P3 amplitudes were larger for valid disgust cues but were smaller for valid angry cues, when both were compared with invalid cue conditions. In addition, when participants viewed the cues that were represented by foreign faces (i.e. the out-group condition), the attention modulation of disgust/anger diminished at the early stage, whereas enhanced P3 amplitudes were observed in response to validly cued targets in both disgusting and angry conditions at the later stage. The current result implied that although people can perceptually differentiate the emotional categories of out-group faces as accurately as in-group faces, they may still be not able to psychologically understand the subtle differences behind different categories of out-group facial expressions. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  1. Avoidance maneuevers selected while viewing cockpit traffic displays

    NASA Technical Reports Server (NTRS)

    Smith, J. D.; Ellis, S. R.; Lee, E.

    1982-01-01

    Ten airline pilots rates the collision danger of air traffic presented on cockpit displays of traffic information while they monitored simulated departures from Denver. They selected avoidance maneuvers when necessary for separation. Most evasive maneuvers were turns rather than vertical maneuvers. Evasive maneuvers chosen for encounters with low or moderate collision danger were generally toward the intruding aircraft. This tendency lessened as the perceived threat level increased. In the highest threst situations pilots turned toward the intruder only at chance levels. Intruders coming from positions in front of the pilot's own ship were more frequently avoided by turns toward than when intruders approached laterally or from behind. Some of the implications of the pilots' turning-toward tendencies are discussed with respect to automatic collision avoidance systems and coordination of avoidance maneuvers of conflicting aircraft.

  2. Stimulus-driven attention, threat bias, and sad bias in youth with a history of an anxiety disorder or depression

    PubMed Central

    Sylvester, Chad M.; Hudziak, James J.; Gaffrey, Michael S.; Barch, Deanna M.; Luby, Joan L.

    2015-01-01

    Attention biases towards threatening and sad stimuli are associated with pediatric anxiety and depression, respectively. The basic cognitive mechanisms associated with attention biases in youth, however, remain unclear. Here, we tested the hypothesis that threat bias (selective attention for threatening versus neutral stimuli) but not sad bias relies on stimulus-driven attention. We collected measures of stimulus-driven attention, threat bias, sad bias, and current clinical symptoms in youth with a history of an anxiety disorder and/or depression (ANX/DEP; n=40) as well as healthy controls (HC; n=33). Stimulus-driven attention was measured with a non-emotional spatial orienting task, while threat bias and sad bias were measured at a short time interval (150 ms) with a spatial orienting task using emotional faces and at a longer time interval (500 ms) using a dot-probe task. In ANX/DEP but not HC, early attention bias towards threat was negatively correlated with later attention bias to threat, suggesting that early threat vigilance was associated with later threat avoidance. Across all subjects, stimulus-driven orienting was not correlated with early threat bias but was negatively correlated with later threat bias, indicating that rapid stimulus-driven orienting is linked to later threat avoidance. No parallel relationships were detected for sad bias. Current symptoms of depression but not anxiety were related to decreased stimulus-driven attention. Together, these results are consistent with the hypothesis that threat bias but not sad bias relies on stimulus-driven attention. These results inform the design of attention bias modification programs that aim to reverse threat biases and reduce symptoms associated with pediatric anxiety and depression. PMID:25702927

  3. Stimulus-Driven Attention, Threat Bias, and Sad Bias in Youth with a History of an Anxiety Disorder or Depression.

    PubMed

    Sylvester, Chad M; Hudziak, James J; Gaffrey, Michael S; Barch, Deanna M; Luby, Joan L

    2016-02-01

    Attention biases towards threatening and sad stimuli are associated with pediatric anxiety and depression, respectively. The basic cognitive mechanisms associated with attention biases in youth, however, remain unclear. Here, we tested the hypothesis that threat bias (selective attention for threatening versus neutral stimuli) but not sad bias relies on stimulus-driven attention. We collected measures of stimulus-driven attention, threat bias, sad bias, and current clinical symptoms in youth with a history of an anxiety disorder and/or depression (ANX/DEP; n = 40) as well as healthy controls (HC; n = 33). Stimulus-driven attention was measured with a non-emotional spatial orienting task, while threat bias and sad bias were measured at a short time interval (150 ms) with a spatial orienting task using emotional faces and at a longer time interval (500 ms) using a dot-probe task. In ANX/DEP but not HC, early attention bias towards threat was negatively correlated with later attention bias to threat, suggesting that early threat vigilance was associated with later threat avoidance. Across all subjects, stimulus-driven orienting was not correlated with early threat bias but was negatively correlated with later threat bias, indicating that rapid stimulus-driven orienting is linked to later threat avoidance. No parallel relationships were detected for sad bias. Current symptoms of depression but not anxiety were related to decreased stimulus-driven attention. Together, these results are consistent with the hypothesis that threat bias but not sad bias relies on stimulus-driven attention. These results inform the design of attention bias modification programs that aim to reverse threat biases and reduce symptoms associated with pediatric anxiety and depression.

  4. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glenn, Colleen; Sterbentz, Dane; Wright, Aaron

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best

  5. The Domestic IED Threat

    DTIC Science & Technology

    2008-01-01

    threat that could use IEDs in the homeland is single-issue organizations. This threat includes such groups as the Okla- homa City bombers and other...threat during joint Army–Air Force exercise U .S . A ir Fo rc e (S te ph en O te ro ) ndupress .ndu.edu issue 48, 1st quarter 2008 / JFQ        69

  6. Direction of attention bias to threat relates to differences in fear acquisition and extinction in anxious children.

    PubMed

    Waters, Allison M; Kershaw, Rachel

    2015-01-01

    Anxious children show attention biases towards and away from threat stimuli. Moreover, threat avoidance compared to vigilance predicts a poorer outcome from exposure-based treatments, such as cognitive-behavioural therapy (CBT), yet the mechanisms underlying this differential response are unclear. Pavlovian fear conditioning is a widely accepted theory to explain the acquisition and extinction of fear, including exposure-based treatments, such as CBT. In typical fear conditioning experiments, anxious children have shown larger physiological responses to an aversive unconditional stimulus (i.e., US on CS+ trials) and to non-reinforced stimuli (CS-) during fear acquisition and to both CSs during fear extinction compared to non-anxious peers. This study examined whether threat avoidance compared to threat vigilance was related to differences in fear acquisition and extinction in anxious children. Thirty-four clinically-anxious children completed a visual probe task including angry-neutral face pairs to determine the direction of threat attention bias as well as a discriminant conditioning and extinction task in which a geometric shape CS+ was paired with an aversive tone US, while the CS- geometric shape was always presented alone during acquisition trials. Both CSs were presented alone during extinction trials. Fear acquisition and extinction were indexed by skin conductance responses (SCR) and subjective measures. Children were classified as threat vigilant (N = 18) and threat avoidant (n = 16) based on the direction of threat attention bias on the visual probe task. During acquisition, threat avoidant relative to threat vigilant anxious children displayed larger orienting SCRs to both CSs during the first block of trials and larger third interval SCRs to the US on CS+ trials as well as on CS- trials. During extinction, threat avoidant anxious children showed delayed extinction of SCRs to both the CS+ and CS- and reported higher subjective anxiety ratings after

  7. Variations in the serotonin-transporter gene are associated with attention bias patterns to positive and negative emotion faces.

    PubMed

    Pérez-Edgar, Koraly; Bar-Haim, Yair; McDermott, Jennifer Martin; Gorodetsky, Elena; Hodgkinson, Colin A; Goldman, David; Ernst, Monique; Pine, Daniel S; Fox, Nathan A

    2010-03-01

    Both attention biases to threat and a serotonin-transporter gene polymorphism (5-HTTLPR) have been linked to heightened neural activation to threat and the emergence of anxiety. The short allele of 5-HTTLPR may act via its effect on neurotransmitter availability, while attention biases shape broad patterns of cognitive processing. We examined individual differences in attention bias to emotion faces as a function of 5-HTTLPR genotype. Adolescents (N=117) were classified for presumed SLC6A4 expression based on 5-HTTLPR-low (SS, SL(G), or L(G)L(G)), intermediate (SL(A) or L(A)L(G)), or high (L(A)L(A)). Participants completed the dot-probe task, measuring attention biases toward or away from angry and happy faces. Biases for angry faces increased with the genotype-predicted neurotransmission levels (low>intermediate>high). The reverse pattern was evident for happy faces. The data indicate a linear relation between 5-HTTLPR allelic status and attention biases to emotion, demonstrating a genetic mechanism for biased attention using ecologically valid stimuli that target socioemotional adaptation. Copyright 2009 Elsevier B.V. All rights reserved.

  8. Attention Bias to Emotional Faces Varies by IQ and Anxiety in Williams Syndrome

    ERIC Educational Resources Information Center

    McGrath, Lauren M.; Oates, Joyce M.; Dai, Yael G.; Dodd, Helen F.; Waxler, Jessica; Clements, Caitlin C.; Weill, Sydney; Hoffnagle, Alison; Anderson, Erin; MacRae, Rebecca; Mullett, Jennifer; McDougle, Christopher J.; Pober, Barbara R.; Smoller, Jordan W.

    2016-01-01

    Individuals with Williams syndrome (WS) often experience significant anxiety. A promising approach to anxiety intervention has emerged from cognitive studies of attention bias to threat. To investigate the utility of this intervention in WS, this study examined attention bias to happy and angry faces in individuals with WS (N = 46). Results showed…

  9. Reactions to a health threat: dispositional threat orientations and message characteristics.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Gonzalez, Amelia; Denison, Elizabeth

    2011-05-01

    This study explored the interactive effects of dispositional threat orientation, type of message, and having children on reactions to a message about exposure to bisphenol A (BPA) in plastics. The study used a 2 (message: Fear Arousal or Plain)×2 (parenting status: child or no child)×2 (threat orientation: high or low) mixed factorial design. Adults (N= 200) recruited via the Internet completed measures of threat orientations, reported whether they were a parent, and read either a low or high fear-arousal message about the risks of BPA exposure. They then completed measures of reactions to the message (perceived susceptibility to BPA effects, negative emotions, and behavioural intentions to engage in protection). Depending on threat orientations, the fear arousal version of the message and parenthood had strikingly different effects, ranging from no effect (for those high in a control-based approach) to prompting change (for those low in a control-based approach) to counterproductive (for those high in an optimistic denial approach). These findings suggest that considering individual differences and their interactions with situational factors could improve both the predictive ability of threat protection theories and the delivery of messages intended to change behaviour. ©2010 The British Psychological Society.

  10. Age-related changes in amygdala-frontal connectivity during emotional face processing from childhood into young adulthood.

    PubMed

    Wu, Minjie; Kujawa, Autumn; Lu, Lisa H; Fitzgerald, Daniel A; Klumpp, Heide; Fitzgerald, Kate D; Monk, Christopher S; Phan, K Luan

    2016-05-01

    The ability to process and respond to emotional facial expressions is a critical skill for healthy social and emotional development. There has been growing interest in understanding the neural circuitry underlying development of emotional processing, with previous research implicating functional connectivity between amygdala and frontal regions. However, existing work has focused on threatening emotional faces, raising questions regarding the extent to which these developmental patterns are specific to threat or to emotional face processing more broadly. In the current study, we examined age-related changes in brain activity and amygdala functional connectivity during an fMRI emotional face matching task (including angry, fearful, and happy faces) in 61 healthy subjects aged 7-25 years. We found age-related decreases in ventral medial prefrontal cortex activity in response to happy faces but not to angry or fearful faces, and an age-related change (shifting from positive to negative correlation) in amygdala-anterior cingulate cortex/medial prefrontal cortex (ACC/mPFC) functional connectivity to all emotional faces. Specifically, positive correlations between amygdala and ACC/mPFC in children changed to negative correlations in adults, which may suggest early emergence of bottom-up amygdala excitatory signaling to ACC/mPFC in children and later development of top-down inhibitory control of ACC/mPFC over amygdala in adults. Age-related changes in amygdala-ACC/mPFC connectivity did not vary for processing of different facial emotions, suggesting changes in amygdala-ACC/mPFC connectivity may underlie development of broad emotional processing, rather than threat-specific processing. Hum Brain Mapp 37:1684-1695, 2016. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  11. Assessing the antecedents and consequences of threat appraisal of an acute psychosocial stressor: the role of optimism, displacement behavior, and physiological responses.

    PubMed

    Zandara, Martina; Villada, Carolina; Hidalgo, Vanesa; Salvador, Alicia

    2018-03-13

    The feeling of stress is increasing in today's societies, particularly in young adults subjected to social evaluative situations in highly competitive academic and work contexts. Threat appraisal is a primary and fundamental reaction when people face a stressful situation. The aim of this study was to investigate the role of dispositional optimism as an antecedent and displacement behavior as a consequence of threat appraisal of a social-evaluative situation of stress. A second objective was to verify the moderating role of physiological responses to stress (heart rate and cortisol reactivity) in the relationship between threat appraisal and displacement behavior. To do this, we combined the Trier Social Stress Test (TSST) with ethological analysis, self-report questionnaires, and physiological data. As expected, people who scored higher on dispositional optimism perceived stress as less threatening, and a higher perception of threat was positively related to displacement behavior patterns. Moreover, the results showed that threat appraisal fully mediates the relationship between dispositional optimism and displacement behavior, and that only heart rate reactivity (not cortisol) moderates the relationship between threat appraisal and displacement behavior.

  12. Latent Variables Affecting Behavioral Response to the Human Intruder Test in Infant Rhesus Macaques (Macaca mulatta)

    PubMed Central

    Gottlieb, Daniel H.; Capitanio, John P.

    2012-01-01

    The human intruder test is a testing paradigm designed to measure rhesus macaques’ behavioral responses to a stressful and threatening situation. In the test, an unfamiliar human positions him/herself in various threatening positions relative to a caged macaque. This paradigm has been utilized for over twenty years to measure a variety of behavioral constructs, including fear and anxiety, behavioral inhibition, emotionality, and aggression. To date there have been no attempts to evaluate comprehensively the structure of the behavioral responses to the test. Our first goal was to identify the underlying latent factors affecting the different responses among subjects, and our second goal was determine if rhesus reared in different environments respond differently in this testing paradigm. To accomplish this, we first performed exploratory and confirmatory factor analyses on the behavioral responses of 3–4 month-old rhesus macaques, utilizing data from over 2,000 separate tests conducted between 2001–2007. Using the resulting model, we then tested to see whether early rearing experience affected responses in the test. Our first analyses suggested that most of the variation in infant behavioral responses to the human intruder test could be explained by four latent factors: “Activity,” “Emotionality,” “Aggression,” and “Displacement.” Our second analyses revealed a significant effect of rearing condition for each factor score (P < 0.001); most notable socially-reared animals had the lowest Activity score (P < 0.001), indoor mother-reared animals had the highest Displacement score (P < 0.001), and nursery-reared animals had the highest Emotionality (P < 0.001) and lowest Aggression scores (P < 0.001). These results demonstrate that this standardized testing paradigm reveals multiple patterns of response, which are influenced by an animal’s rearing history. PMID:23229557

  13. Latent variables affecting behavioral response to the human intruder test in infant rhesus macaques (Macaca mulatta).

    PubMed

    Gottlieb, Daniel H; Capitanio, John P

    2013-04-01

    The human intruder test is a testing paradigm designed to measure rhesus macaques' behavioral responses to a stressful and threatening situation. In the test, an unfamiliar human positions him/herself in various threatening positions relative to a caged macaque. This paradigm has been utilized for over 20 years to measure a variety of behavioral constructs, including fear and anxiety, behavioral inhibition, emotionality, and aggression. To date, there have been no attempts to evaluate comprehensively the structure of the behavioral responses to the test. Our first goal was to identify the underlying latent factors affecting the different responses among subjects, and our second goal was to determine if rhesus reared in different environments respond differently in this testing paradigm. To accomplish this, we first performed exploratory and confirmatory factor analyses on the behavioral responses of 3- to 4-month-old rhesus macaques, utilizing data from over 2,000 separate tests conducted between 2001-2007. Using the resulting model, we then tested to see whether early rearing experience affected responses in the test. Our first analyses suggested that most of the variation in infant behavioral responses to the human intruder test could be explained by four latent factors: "activity," "emotionality," "aggression," and "displacement." Our second analyses revealed a significant effect of rearing condition for each factor score (P < 0.001); most notable socially reared animals had the lowest activity score (P < 0.001), indoor mother-reared animals had the highest displacement score (P < 0.001), and nursery-reared animals had the highest emotionality (P < 0.001) and lowest aggression scores (P < 0.001). These results demonstrate that this standardized testing paradigm reveals multiple patterns of response, which are influenced by an animal's rearing history. © 2012 Wiley Periodicals, Inc.

  14. Combatting Insider Threats

    NASA Astrophysics Data System (ADS)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  15. Abnormal brain activation during threatening face processing in schizophrenia: A meta-analysis of functional neuroimaging studies.

    PubMed

    Dong, Debo; Wang, Yulin; Jia, Xiaoyan; Li, Yingjia; Chang, Xuebin; Vandekerckhove, Marie; Luo, Cheng; Yao, Dezhong

    2017-11-15

    Impairment of face perception in schizophrenia is a core aspect of social cognitive dysfunction. This impairment is particularly marked in threatening face processing. Identifying reliable neural correlates of the impairment of threatening face processing is crucial for targeting more effective treatments. However, neuroimaging studies have not yet obtained robust conclusions. Through comprehensive literature search, twenty-one whole brain datasets were included in this meta-analysis. Using seed-based d-Mapping, in this voxel-based meta-analysis, we aimed to: 1) establish the most consistent brain dysfunctions related to threating face processing in schizophrenia; 2) address task-type heterogeneity in this impairment; 3) explore the effect of potential demographic or clinical moderator variables on this impairment. Main meta-analysis indicated that patients with chronic schizophrenia demonstrated attenuated activations in limbic emotional system along with compensatory over-activation in medial prefrontal cortex (MPFC) during threatening faces processing. Sub-task analyses revealed under-activations in right amygdala and left fusiform gyrus in both implicit and explicit tasks. The remaining clusters were found to be differently involved in different types of tasks. Moreover, meta-regression analyses showed brain abnormalities in schizophrenia were partly modulated by age, gender, medication and severity of symptoms. Our results highlighted breakdowns in limbic-MPFC circuit in schizophrenia, suggesting general inability to coordinate and contextualize salient threat stimuli. These findings provide potential targets for neurotherapeutic and pharmacological interventions for schizophrenia. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  17. Barrier Coverage for 3D Camera Sensor Networks.

    PubMed

    Si, Pengju; Wu, Chengdong; Zhang, Yunzhou; Jia, Zixi; Ji, Peng; Chu, Hao

    2017-08-03

    Barrier coverage, an important research area with respect to camera sensor networks, consists of a number of camera sensors to detect intruders that pass through the barrier area. Existing works on barrier coverage such as local face-view barrier coverage and full-view barrier coverage typically assume that each intruder is considered as a point. However, the crucial feature (e.g., size) of the intruder should be taken into account in the real-world applications. In this paper, we propose a realistic resolution criterion based on a three-dimensional (3D) sensing model of a camera sensor for capturing the intruder's face. Based on the new resolution criterion, we study the barrier coverage of a feasible deployment strategy in camera sensor networks. Performance results demonstrate that our barrier coverage with more practical considerations is capable of providing a desirable surveillance level. Moreover, compared with local face-view barrier coverage and full-view barrier coverage, our barrier coverage is more reasonable and closer to reality. To the best of our knowledge, our work is the first to propose barrier coverage for 3D camera sensor networks.

  18. The structural and functional correlates of the efficiency in fearful face detection.

    PubMed

    Wang, Yongchao; Guo, Nana; Zhao, Li; Huang, Hui; Yao, Xiaonan; Sang, Na; Hou, Xin; Mao, Yu; Bi, Taiyong; Qiu, Jiang

    2017-06-01

    Human visual system is found to be much efficient in searching for a fearful face. Some individuals are more sensitive to this threat-related stimulus. However, we still know little about the neural correlates of such variability. In the current study, we exploited a visual search paradigm, and asked the subjects to search for a fearful face or a target gender. Every subject showed a shallower search function for fearful face search than face gender search, indicating a stable fearful face advantage. We then used voxel-based morphometry (VBM) analysis and correlated this advantage to the gray matter volume (GMV) of some presumably face related cortical areas. The result revealed that only the left fusiform gyrus showed a significant positive correlation. Next, we defined the left fusiform gyrus as the seed region and calculated its resting state functional connectivity to the whole brain. Correlations were also calculated between fearful face advantage and these connectivities. In this analysis, we found positive correlations in the inferior parietal lobe and the ventral medial prefrontal cortex. These results suggested that the anatomical structure of the left fusiform gyrus might determine the search efficiency of fearful face, and frontoparietal attention network involved in this process through top-down attentional modulation. Copyright © 2017. Published by Elsevier Ltd.

  19. Spatiotemporal dynamics in human visual cortex rapidly encode the emotional content of faces.

    PubMed

    Dima, Diana C; Perry, Gavin; Messaritaki, Eirini; Zhang, Jiaxiang; Singh, Krish D

    2018-06-08

    Recognizing emotion in faces is important in human interaction and survival, yet existing studies do not paint a consistent picture of the neural representation supporting this task. To address this, we collected magnetoencephalography (MEG) data while participants passively viewed happy, angry and neutral faces. Using time-resolved decoding of sensor-level data, we show that responses to angry faces can be discriminated from happy and neutral faces as early as 90 ms after stimulus onset and only 10 ms later than faces can be discriminated from scrambled stimuli, even in the absence of differences in evoked responses. Time-resolved relevance patterns in source space track expression-related information from the visual cortex (100 ms) to higher-level temporal and frontal areas (200-500 ms). Together, our results point to a system optimised for rapid processing of emotional faces and preferentially tuned to threat, consistent with the important evolutionary role that such a system must have played in the development of human social interactions. © 2018 The Authors Human Brain Mapping Published by Wiley Periodicals, Inc.

  20. Multi-Action Planning for Threat Management: A Novel Approach for the Spatial Prioritization of Conservation Actions

    PubMed Central

    Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J.; Linke, Simon

    2015-01-01

    Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms. PMID:26020794

  1. Multi-action planning for threat management: a novel approach for the spatial prioritization of conservation actions.

    PubMed

    Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J; Linke, Simon

    2015-01-01

    Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms.

  2. Are visual threats prioritized without awareness? A critical review and meta-analysis involving 3 behavioral paradigms and 2696 observers.

    PubMed

    Hedger, Nicholas; Gray, Katie L H; Garner, Matthew; Adams, Wendy J

    2016-09-01

    Given capacity limits, only a subset of stimuli give rise to a conscious percept. Neurocognitive models suggest that humans have evolved mechanisms that operate without awareness and prioritize threatening stimuli over neutral stimuli in subsequent perception. In this meta-analysis, we review evidence for this 'standard hypothesis' emanating from 3 widely used, but rather different experimental paradigms that have been used to manipulate awareness. We found a small pooled threat-bias effect in the masked visual probe paradigm, a medium effect in the binocular rivalry paradigm and highly inconsistent effects in the breaking continuous flash suppression paradigm. Substantial heterogeneity was explained by the stimulus type: the only threat stimuli that were robustly prioritized across all 3 paradigms were fearful faces. Meta regression revealed that anxiety may modulate threat-biases, but only under specific presentation conditions. We also found that insufficiently rigorous awareness measures, inadequate control of response biases and low level confounds may undermine claims of genuine unconscious threat processing. Considering the data together, we suggest that uncritical acceptance of the standard hypothesis is premature: current behavioral evidence for threat-sensitive visual processing that operates without awareness is weak. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  3. The Influence of Anxiety on the Initial Selection of Emotional Faces Presented in Binocular Rivalry

    ERIC Educational Resources Information Center

    Gray, Katie L. H.; Adams, Wendy J.; Garner, Matthew

    2009-01-01

    Neurocognitive theories of anxiety predict that threat-related information can be evaluated before attentional selection, and can influence behaviour differentially in high anxious compared to low anxious individuals. We investigate this further by presenting emotional and neutral faces in an adapted binocular rivalry paradigm. We show that the…

  4. When knowledge activated from memory intrudes on probabilistic inferences from description - the case of stereotypes.

    PubMed

    Dorrough, Angela R; Glöckner, Andreas; Betsch, Tilmann; Wille, Anika

    2017-10-01

    To make decisions in probabilistic inference tasks, individuals integrate relevant information partly in an automatic manner. Thereby, potentially irrelevant stimuli that are additionally presented can intrude on the decision process (e.g., Söllner, Bröder, Glöckner, & Betsch, 2014). We investigate whether such an intrusion effect can also be caused by potentially irrelevant or even misleading knowledge activated from memory. In four studies that combine a standard information board paradigm from decision research with a standard manipulation from social psychology, we investigate the case of stereotypes and demonstrate that stereotype knowledge can yield intrusion biases in probabilistic inferences from description. The magnitude of these biases increases with stereotype accessibility and decreases with a clarification of the rational solution. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Emotional intelligence is associated with reduced insula responses to masked angry faces.

    PubMed

    Alkozei, Anna; Killgore, William D S

    2015-07-08

    High levels of emotional intelligence (EI) have been associated with increased success in the workplace, greater quality of personal relationships, and enhanced wellbeing. Evidence suggests that EI is mediated extensively by the interplay of key emotion regions including the amygdala, insula, and ventromedial prefrontal cortex, among others. The insula, in particular, is important for processing interoceptive and somatic cues that are interpreted as emotional responses. We investigated the association between EI and functional brain responses within the aforementioned neurocircuitry in response to subliminal presentations of social threat. Fifty-four healthy adults completed the Mayer-Salovey-Caruso Emotional Intelligence Test (MSCEIT) and underwent functional magnetic brain imaging while viewing subliminal presentations of faces displaying anger, using a backward masked facial affect paradigm to minimize conscious awareness of the expressed emotion. In response to masked angry faces, the total MSCEIT scores correlated negatively with a cluster of activation located within the left insula, but not with activation in any other region of interest. Considering the insula's role in the processing of interoceptive emotional cues, the results suggest that greater EI is associated with reduced emotional visceral reactivity and/or more accurate interoceptive prediction when confronted with stimuli indicative of social threat.

  6. Can we match ultraviolet face images against their visible counterparts?

    NASA Astrophysics Data System (ADS)

    Narang, Neeru; Bourlai, Thirimachos; Hornak, Lawrence A.

    2015-05-01

    In law enforcement and security applications, the acquisition of face images is critical in producing key trace evidence for the successful identification of potential threats. However, face recognition (FR) for face images captured using different camera sensors, and under variable illumination conditions, and expressions is very challenging. In this paper, we investigate the advantages and limitations of the heterogeneous problem of matching ultra violet (from 100 nm to 400 nm in wavelength) or UV, face images against their visible (VIS) counterparts, when all face images are captured under controlled conditions. The contributions of our work are three-fold; (i) We used a camera sensor designed with the capability to acquire UV images at short-ranges, and generated a dual-band (VIS and UV) database that is composed of multiple, full frontal, face images of 50 subjects. Two sessions were collected that span over the period of 2 months. (ii) For each dataset, we determined which set of face image pre-processing algorithms are more suitable for face matching, and, finally, (iii) we determined which FR algorithm better matches cross-band face images, resulting in high rank-1 identification rates. Experimental results show that our cross spectral matching (the heterogeneous problem, where gallery and probe sets consist of face images acquired in different spectral bands) algorithms achieve sufficient identification performance. However, we also conclude that the problem under study, is very challenging, and it requires further investigation to address real-world law enforcement or military applications. To the best of our knowledge, this is first time in the open literature the problem of cross-spectral matching of UV against VIS band face images is being investigated.

  7. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  8. Why We Respond Faster to the Self than to Others? An Implicit Positive Association Theory of Self-Advantage during Implicit Face Recognition

    ERIC Educational Resources Information Center

    Ma, Yina; Han, Shihui

    2010-01-01

    Human adults usually respond faster to their own faces rather than to those of others. We tested the hypothesis that an implicit positive association (IPA) with self mediates self-advantage in face recognition through 4 experiments. Using a self-concept threat (SCT) priming that associated the self with negative personal traits and led to a…

  9. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  10. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    PubMed

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  11. Flight Test Evaluation of AVOID I (Avionic Observation of Intruder Danger) Collision Avoidance System

    DTIC Science & Technology

    1975-05-01

    memory registers A through G ( 2048 bit shift registers) for each of the basic altitude bands (1+26, 113 1+6) to store intruder responses. Since the 1...af EV 11z iIIV~ ~l~~ NADlC-75056-60_ _ _- 2 w< -I- LI- ~jw 0IU oo2 W I aJ W %L6fI9~~AVdI tVOV~ aN9Ao ccH % VdI I11813iA-di V GN Ed a3IV0 %AIII1IilV11W...tei mix ;;; c le z - Is’ %~~~~~~~~~~;s AJIiV1 VdI ~ %AIIV~ v~iO VIR 1ý 123 Lz NADC-7056-6 w, M w o ~2IV ONY Ed CIRNIGVNOO at p 00 CLt % 118I3iAVldSIC3

  12. Short-term serotonergic but not noradrenergic antidepressant administration reduces attentional vigilance to threat in healthy volunteers.

    PubMed

    Murphy, Susannah E; Yiend, Jenny; Lester, Kathryn J; Cowen, Philip J; Harmer, Catherine J

    2009-03-01

    Anxiety is associated with threat-related biases in information processing such as heightened attentional vigilance to potential threat. Such biases are an important focus of psychological treatments for anxiety disorders. Selective serotonin reuptake inhibitors (SSRIs) are effective in the treatment of a range of anxiety disorders. The aim of this study was to assess the effect of an SSRI on the processing of threat in healthy volunteers. A selective noradrenergic reuptake inhibitor (SNRI), which is not generally used in the treatment of anxiety, was used as a contrast to assess the specificity of SSRI effects on threat processing. Forty-two healthy volunteers were randomly assigned to 7 d double-blind intervention with the SSRI citalopram (20 mg/d), the SNRI reboxetine (8 mg/d), or placebo. On the final day, attentional and interpretative bias to threat was assessed using the attentional probe and the homograph primed lexical decision tasks. Citalopram reduced attentional vigilance towards fearful faces but did not affect the interpretation of ambiguous homographs as threatening. Reboxetine had no significant effect on either of these measures. Citalopram reduces attentional orienting to threatening stimuli, which is potentially relevant to its clinical use in the treatment of anxiety disorders. This finding supports a growing literature suggesting that an important mechanism through which pharmacological agents may exert their effects on mood is by reversing the cognitive biases that characterize the disorders that they treat. Future studies are needed to clarify the neural mechanisms through which these effects on threat processing are mediated.

  13. Threat interferes with response inhibition.

    PubMed

    Hartikainen, Kaisa M; Siiskonen, Anna R; Ogawa, Keith H

    2012-05-09

    A potential threat, such as a spider, captures attention and engages executive functions to adjust ongoing behavior and avoid danger. We and many others have reported slowed responses to neutral targets in the context of emotional distractors. This behavioral slowing has been explained in the framework of attentional competition for limited resources with emotional stimuli prioritized. Alternatively, slowed performance could reflect the activation of avoidance/freezing-type motor behaviors associated with threat. Although the interaction of attention and emotion has been widely studied, little is known on the interaction between emotion and executive functions. We studied how threat-related stimuli (spiders) interact with executive performance and whether the interaction profile fits with a resource competition model or avoidance/freezing-type motor behaviors. Twenty-one young healthy individuals performed a Go-NoGo visual discrimination reaction time (RT) task engaging several executive functions with threat-related and emotionally neutral distractors. The threat-related distractors had no effect on the RT or the error rate in the Go trials. The NoGo error rate, reflecting failure in response inhibition, increased significantly because of threat-related distractors in contrast to neutral distractors, P less than 0.05. Thus, threat-related distractors temporarily impaired response inhibition. Threat-related distractors associated with increased commission errors and no effect on RT does not suggest engagement of avoidance/freezing-type motor behaviors. The results fit in the framework of the resource competition model. A potential threat calls for evaluation of affective significance as well as inhibition of undue emotional reactivity. We suggest that these functions tax executive resources and may render other executive functions, such as response inhibition, temporarily compromised when the demands for resources exceed availability.

  14. Capacity Building in Response to Pandemic Influenza Threats: Lao PDR Case Study

    PubMed Central

    Phommasack, Bounlay; Moen, Ann; Vongphrachanh, Phengta; Tsuyuoka, Reiko; Cox, Nancy; Khamphaphongphanh, Bouaphanh; Phonekeo, Darouny; Kasai, Takeshi; Ketmayoon, Pakapak; Lewis, Hannah; Kounnavong, Bounheuang; Khanthamaly, Viengphone; Corwin, Andrew

    2012-01-01

    The Lao People's Democratic Republic (PDR) committed to pandemic detection and response preparations when faced with the threat of avian influenza. Since 2006, the National Center for Laboratory and Epidemiology of Lao PDR has developed credible laboratory, surveillance, and epidemiological (human) capacity and as a result was designated a World Health Organization National Influenza Center in 2010. The Lao PDR experience in building influenza capacities provides a case study of the considerable crossover effect of such investments to augment the capacity to combat emerging and re-emerging diseases other than influenza. PMID:23222137

  15. The measurement of threat orientations.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Bovin, Michelle J

    2006-01-01

    To develop measures of 3 threat orientations that affect responses to health behavior messages. In Study 1, college students (N = 47) completed items assessing threat orientations and health behaviors. In Study 2, college students and community adults (N = 110) completed the threat orientation items and measures of convergent and discriminant validity. In Study 1, the control-based, denial-based, and heightened-sensitivity-based threat orientation scales demonstrated good internal consistency and correlated with engagement in health behaviors. In Study 2, the convergent and discriminant validity of the 3 measures was established. The 3 scales have good internal reliability and construct validity.

  16. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  17. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  18. Attentional bias to threat in the general population is contingent on target competition, not on attentional control settings.

    PubMed

    Wirth, Benedikt Emanuel; Wentura, Dirk

    2018-04-01

    Dot-probe studies usually find an attentional bias towards threatening stimuli only in anxious participants. Here, we investigated under what conditions such a bias occurs in unselected samples. According to contingent-capture theory, an irrelevant cue only captures attention if it matches an attentional control setting. Therefore, we first tested the hypothesis that an attentional control setting tuned to threat must be activated in (non-anxious) individuals. In Experiment 1, we used a dot-probe task with a manipulation of attentional control settings ('threat' - set vs. control set). Surprisingly, we found an (anxiety-independent) attentional bias to angry faces that was not moderated by attentional control settings. Since we presented two stimuli (i.e., a target and a distractor) on the target screen in Experiment 1 (a necessity to realise the test of contingent capture), but most dot-probe studies only employ a single target, we conducted Experiment 2 to test the hypothesis that attentional bias in the general population is contingent on target competition. Participants performed a dot-probe task, involving presentation of a stand-alone target or a target competing with a distractor. We found an (anxiety-independent) attentional bias towards angry faces in the latter but not the former condition. This suggests that attentional bias towards angry faces in unselected samples is not contingent on attentional control settings but on target competition.

  19. [Coral reefs in the face of ecological threats of XXI century].

    PubMed

    Tkachenko, K S

    2015-01-01

    To date, more than a quarter of tropical coral reefs of the World Ocean are believed to be totally de- stroyed. Given the present rates of reefs degradation, this value may be doubled in the nearest 30 years. For the essential part of coastal community, the destruction of coral ecosystems implies the loss of the major food sources, natural protection from storms, and significant (if not the only) revenue from exploi- tation of reefs especially in tourism industry. Finally, the disappearance of low-laying coral islands may threat the local communities by deprivation of living space. Global negative effects include temperature anomalies of sea surface waters and an increase of atmospheric CO2 concentration leading to ocean acidification. Local negative effects are related to in- crease of sedimentation and eutrophication, cyclone and storm passes, coral diseases, chemical pollution, mechanical destruction of corals by humans, anthropogenic depletion of functional groups of fish and invertebrates. An entire set of responses of coral ecosystems to stressful factors on the levels of both separate taxa and ecosystem is discussed. An analysis of published data suggests that with high probability the tropical coral communities will come to collapse stage by the middle of the current century at more than 50% of the area of their biogeographic range, especially in the regions of dense human population. At the most optimistic scenario, complex effect of reviewed negative factors will result in coral ecosystems main- taining in some areas. However, after global transformations, these ecosystems will be dominated by the most resistant taxa, mainly massive and encrusting forms of long-lived species with low growth rates and high competitive ability. Among such taxa, Poritidae demonstrates the highest adaptive capability. At the most pessimistic scenario, scleractinian communities will be replaced by alternative communities of macroalgae and non-calcareous anthozoans.

  20. New records of the Japanese seahorse Hippocampus mohnikei in Southeast Asia lead to updates in range, habitat and threats.

    PubMed

    Aylesworth, L; Lawson, J M; Laksanawimol, P; Ferber, P; Loh, T-L

    2016-04-01

    New records of the Japanese seahorse Hippocampus mohnikei from Cambodia, Malaysia, Thailand and Vietnam, along with recently published studies from India and Singapore, have greatly expanded the known range of H. mohnikei within Southeast Asia. These new records reveal novel habitat preferences and threats to H. mohnikei in the region. Although the global conservation status of H. mohnikei is classified as Data Deficient according to the IUCN Red List of Threatened Species, new sightings indicate that this species is found in similar habitats and faces similar threats as other Hippocampus species that are considered Vulnerable. © 2016 The Fisheries Society of the British Isles.

  1. Traits, States, and Attentional Gates: Temperament and Threat Relevance as Predictors of Attentional Bias to Social Threat

    PubMed Central

    Helzer, Erik G.; Connor-Smith, Jennifer K.; Reed, Marjorie A.

    2009-01-01

    This study investigated the influence of situational and dispositional factors on attentional biases toward social threat, and the impact of these attentional biases on distress in a sample of adolescents. Results suggest greater biases for personally-relevant threat cues, as individuals reporting high social stress were vigilant to subliminal social threat cues, but not physical threat cues, and those reporting low social stress showed no attentional biases. Individual differences in fearful temperament and attentional control interacted to influence attentional biases, with fearful temperament predicting biases to supraliminal social threat only for individuals with poor attentional control. Multivariate analyses exploring relations between attentional biases for social threat and symptoms of anxiety and depression revealed that attentional biases alone were rarely related to symptoms. However, biases did interact with social stress, fearful temperament, and attentional control to predict distress. Results are discussed in terms of automatic and effortful cognitive mechanisms underlying threat cue processing. PMID:18791905

  2. Identification of threats using linguistics-based knowledge extraction.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chew, Peter A.

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is themore » WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results

  3. Theory of Prejudice and American Identity Threat Transfer for Latino and Asian Americans.

    PubMed

    Sanchez, Diana T; Chaney, Kimberly E; Manuel, Sara K; Remedios, Jessica D

    2018-03-01

    Latinos and Asian Americans confront similar stereotypes as they are often presumed to be foreigners and subjected to American identity denial. Across six studies (total N = 992), we demonstrate that Latinos and Asians anticipate ingroup prejudice and specific types of subordination (e.g., American identity threat) in the face of outgroup threats that target one another (i.e., stigma transfer). The studies explore whether stigma transfer occurred primarily when shared Latino and Asian stereotype content was a salient component of the prejudice remark (e.g., foreigner stereotypes; Study 3), or when outgroup prejudice targeted a social group with shared stereotype content (Study 4), though neither appeared to substantively moderate stigma transfer. Minority group members who conceptualize prejudiced people as holding multiple biases (i.e., a monolithic prejudice theory) were more susceptible to stigma transfer suggesting that stereotype content is not necessary for stigma transfer because people assume that prejudice is not singular.

  4. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  5. Impact of attention biases to threat and effortful control on individual variations in negative affect and social withdrawal in very young children.

    PubMed

    Cole, Claire E; Zapp, Daniel J; Fettig, Nicole B; Pérez-Edgar, Koraly

    2016-01-01

    Early temperamental sensitivity may form the basis for the later development of socioemotional maladjustment. In particular, temperamental negative affect places children at risk for the development of anxiety. However, not all children who show negative affect go on to develop anxiety or extreme social withdrawal. Recent research indicates that reactive control, in the form of attention to threat, may serve as a bridge between early temperament and the development of later social difficulties. In addition, variation in effortful control may also modulate this trajectory. Children (mean age=5.57 years) were assessed for attention bias to threatening and pleasant faces using a dot-probe paradigm. Attention bias to threatening (but not happy) faces moderated the direct positive relation between negative affect and social withdrawal. Children with threat biases showed a significant link between negative affect and social withdrawal, whereas children who avoided threat did not. In contrast, effortful control did not moderate the relation between negative affect and social withdrawal. Rather, there was a direct negative relation between effortful control and social withdrawal. The findings from this short report indicate that the relations among temperament, attention bias, and social withdrawal appears early in life and point to early emerging specificity in reactive and regulatory functioning. Copyright © 2015 Elsevier Inc. All rights reserved.

  6. Impact of Attention Biases to Threat and Effortful Control on Individual Variations in Negative Affect and Social Withdrawal in Very Young Children

    PubMed Central

    Zapp, Daniel J.; Fettig, Nicole B.; Pérez-Edgar, Koraly

    2015-01-01

    Early temperamental sensitivity may form the basis for the later development of socioemotional maladjustment. In particular, temperamental negative affect places children at risk for the development of anxiety. However, not all children who show negative affect go on to develop anxiety or extreme social withdrawal. Recent research indicates that reactive control, in the form of attention to threat, may serve as a bridge between early temperament and the development of later social difficulties. In addition, variation in effortful control may also modulate this trajectory. Children (MeanAge=5.57 years) were assessed for attention bias to threatening and pleasant faces using a dot-probe paradigm. Attention bias to threatening (but not happy) faces moderated the direct positive relation between negative affect and social withdrawal. Children with threat biases showed a significant link between negative affect and social withdrawal, while children who avoided threat did not. In contrast, effortful control did not moderate the relation between negative affect and social withdrawal. Rather, there was a direct negative relation between effortful control and social withdrawal. The findings from this short report indicate that the relation amongst temperament, attention bias, and social withdrawal appears early in life and point to early emerging specificity in reactive and regulatory functioning. PMID:26477597

  7. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  8. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    PubMed

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  10. Analyzing tradeoffs between the threat of invasion by brook trout and effects of intentional isolation for native westslope cutthroat trout

    Treesearch

    Douglas P. Peterson; Bruce E. Rieman; Jason B. Dunham; Kurt D. Fausch; Michael K. Young

    2007-01-01

    Native fishes often face simultaneous threats from habitat fragmentation and invasion by nonnative trout. Unfortunately, management actions to address one may create or exacerbate the other. A consistent decision process would include a systematic analysis of when and where intentional use or removal of barriers is most appropriate. We developed a Bayesian belief...

  11. Community Capacity in The Face Of Landslide Hazards in the Southern Of Semarang City

    NASA Astrophysics Data System (ADS)

    Tjahjono, Heri; Suripin; Kismartini

    2018-02-01

    The study was done at Semarang, Central Java. The aims of the study are: (a) to know the variation in the level of community capacity in dealing with landslide hazards in the southern of Semarang city; (B) to know the factors that affect the capacity of communities in facing the hazards of landslides. This research was conducted by the sample method with a sample of 198 people, taken by purposive sampling. Samples taken are people living in areas that have experienced landslide or in areas that are expected to be vulnerable to landslides. The variables used in this research are (1) regulatory and institutional capacity in the prevention of landslide disaster, (2) early warning system in community, (3) education of disaster skill training, (4) mitigation to reduce basic risk factor, and (5) Preparedness on all fronts. Data were collected with questioner and interviews. Data analysis was performed by percentage descriptions, and map overlay analysis using ArcGIS release 10.3 technology. The result of the research shows that there are 5 variations of society's capacity level in facing the landslide hazard in southern Semarang city, that is the very high capacity of society as much as 4,35 % of the people that researched, the high community capacity is 7,25 % of the people that researched, the medium community capacity is 30.43 %. of the people that researched, low community capacity as much as 36.23 % of the people that researched and very low community capacity as much as 21.74% of the people that researched. Based on the result of overlay map of landslide threat in southern Semarang City with map about variation of community capacity level in facing landslide hazard indicate that community capacity with very high criterion and high occupancy area of threat of landslide with high and medium criterion which have been experienced landslide. While the capacity of the community with the criteria of medium, low and very low occupies the threat of landslide areas with high

  12. Autobiographical memory sources of threats in dreams.

    PubMed

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. UAS Well Clear Recovery Against Non-Cooperative Intruders Using Vertical Maneuvers

    NASA Technical Reports Server (NTRS)

    Cone, Andrew; Thipphavong, David; Lee, Seung Man; Santiago, Confesor

    2017-01-01

    This paper documents a study that drove the development of a mathematical expression in the minimum operational performance standards (MOPS) of detect-and-avoid (DAA) systems for unmanned aircraft systems (UAS). This equation describes the conditions under which vertical maneuver guidance could be provided during recovery of well clear separation with a non-cooperative VFR aircraft in addition to horizontal maneuver guidance. Although suppressing vertical maneuver guidance in these situations increased the minimum horizontal separation from 500 to 800 feet, the maximum severity of loss of well clear increased in about 35 of the encounters compared to when a vertical maneuver was preferred and allowed. Additionally, analysis of individual cases led to the identification of a class of encounter where vertical rate error had a large effect on horizontal maneuvers due to the difficulty of making the correct left-right turn decision: crossing conflict with intruder changing altitude. These results supported allowing vertical maneuvers when UAS vertical performance exceeds the relative vertical position and velocity accuracy of the DAA tracker given the current velocity of the UAS and the relative vertical position and velocity estimated by the DAA tracker. Looking ahead, these results indicate a need to improve guidance algorithms by utilizing maneuver stability and near mid-air collision risk when determining maneuver guidance to regain well clear separation.

  14. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to this subpart must ensure that each of the following undergoes a security threat assessment or a comparable...

  15. Spatially explicit multi-threat assessment of food tree species in Burkina Faso: A fine-scale approach

    PubMed Central

    Kindt, Roeland; Loo, Judy; Schmidt, Marco; Bognounou, Fidèle; Da, Sié Sylvestre; Diallo, Ousmane Boukary; Ganaba, Souleymane; Gnoumou, Assan; Lompo, Djingdia; Lykke, Anne Mette; Mbayngone, Elisée; Nacoulma, Blandine Marie Ivette; Ouedraogo, Moussa; Ouédraogo, Oumarou; Parkouda, Charles; Porembski, Stefan; Savadogo, Patrice; Thiombiano, Adjima; Zerbo, Guibien; Vinceti, Barbara

    2017-01-01

    Over the last decades agroforestry parklands in Burkina Faso have come under increasing demographic as well as climatic pressures, which are threatening indigenous tree species that contribute substantially to income generation and nutrition in rural households. Analyzing the threats as well as the species vulnerability to them is fundamental for priority setting in conservation planning. Guided by literature and local experts we selected 16 important food tree species (Acacia macrostachya, Acacia senegal, Adansonia digitata, Annona senegalensis, Balanites aegyptiaca, Bombax costatum, Boscia senegalensis, Detarium microcarpum, Lannea microcarpa, Parkia biglobosa, Sclerocarya birrea, Strychnos spinosa, Tamarindus indica, Vitellaria paradoxa, Ximenia americana, Ziziphus mauritiana) and six key threats to them (overexploitation, overgrazing, fire, cotton production, mining and climate change). We developed a species-specific and spatially explicit approach combining freely accessible datasets, species distribution models (SDMs), climate models and expert survey results to predict, at fine scale, where these threats are likely to have the greatest impact. We find that all species face serious threats throughout much of their distribution in Burkina Faso and that climate change is predicted to be the most prevalent threat in the long term, whereas overexploitation and cotton production are the most important short-term threats. Tree populations growing in areas designated as ‘highly threatened’ due to climate change should be used as seed sources for ex situ conservation and planting in areas where future climate is predicting suitable habitats. Assisted regeneration is suggested for populations in areas where suitable habitat under future climate conditions coincides with high threat levels due to short-term threats. In the case of Vitellaria paradoxa, we suggest collecting seed along the northern margins of its distribution and considering assisted regeneration in

  16. Spatially explicit multi-threat assessment of food tree species in Burkina Faso: A fine-scale approach.

    PubMed

    Gaisberger, Hannes; Kindt, Roeland; Loo, Judy; Schmidt, Marco; Bognounou, Fidèle; Da, Sié Sylvestre; Diallo, Ousmane Boukary; Ganaba, Souleymane; Gnoumou, Assan; Lompo, Djingdia; Lykke, Anne Mette; Mbayngone, Elisée; Nacoulma, Blandine Marie Ivette; Ouedraogo, Moussa; Ouédraogo, Oumarou; Parkouda, Charles; Porembski, Stefan; Savadogo, Patrice; Thiombiano, Adjima; Zerbo, Guibien; Vinceti, Barbara

    2017-01-01

    Over the last decades agroforestry parklands in Burkina Faso have come under increasing demographic as well as climatic pressures, which are threatening indigenous tree species that contribute substantially to income generation and nutrition in rural households. Analyzing the threats as well as the species vulnerability to them is fundamental for priority setting in conservation planning. Guided by literature and local experts we selected 16 important food tree species (Acacia macrostachya, Acacia senegal, Adansonia digitata, Annona senegalensis, Balanites aegyptiaca, Bombax costatum, Boscia senegalensis, Detarium microcarpum, Lannea microcarpa, Parkia biglobosa, Sclerocarya birrea, Strychnos spinosa, Tamarindus indica, Vitellaria paradoxa, Ximenia americana, Ziziphus mauritiana) and six key threats to them (overexploitation, overgrazing, fire, cotton production, mining and climate change). We developed a species-specific and spatially explicit approach combining freely accessible datasets, species distribution models (SDMs), climate models and expert survey results to predict, at fine scale, where these threats are likely to have the greatest impact. We find that all species face serious threats throughout much of their distribution in Burkina Faso and that climate change is predicted to be the most prevalent threat in the long term, whereas overexploitation and cotton production are the most important short-term threats. Tree populations growing in areas designated as 'highly threatened' due to climate change should be used as seed sources for ex situ conservation and planting in areas where future climate is predicting suitable habitats. Assisted regeneration is suggested for populations in areas where suitable habitat under future climate conditions coincides with high threat levels due to short-term threats. In the case of Vitellaria paradoxa, we suggest collecting seed along the northern margins of its distribution and considering assisted regeneration in the

  17. Early Adverse Experience Increases Emotional Reactivity in Juvenile Rhesus Macaques: Relation to Amygdala Volume

    PubMed Central

    Howell, B.R.; Grand, A. P.; McCormack, K. M.; Shi, Y.; LaPrarie, J.; Maestripieri, D.; Styner, M. A.; Sanchez, M. M.

    2015-01-01

    This study investigated the impact of infant maltreatment on juvenile rhesus monkeys’ behavioral reactivity to novel stimuli and its associations with amygdala volume. Behavioral reactivity to novel stimuli of varying threat intensity was measured using Approach/Avoidance (AA) and Human Intruder (HI) tasks. In vivo magnetic resonance imaging (MRI) was used to measure amygdala volume. Interestingly, group behavioral differences were context-dependent. When exposed to a human intruder, maltreated subjects displayed more anxious behaviors than controls; however, when presented with fear-evoking objects, maltreated animals exhibited increased aggression and a shorter latency to inspect the objects. Finally, under testing conditions with the lowest levels of threat (neutral novel objects) maltreated animals also showed shorter latencies to inspect objects, and reduced avoidance and increased exploration compared to controls. This suggests alterations in threat assessment and less behavioral inhibition in animals with early adverse experience compared to controls. Some of these behavioral responses were associated with amygdala volume, which was positively correlated with abuse rates received during infancy, particularly reflecting a relationship with exploration, consistent with previous studies. PMID:25196846

  18. A Comparison of the Attitudes of Spanish and American Secondary Science Teachers toward Global Science and Technology Based Problems/Threats

    ERIC Educational Resources Information Center

    Guisasola, Jenaro; Robinson, Mike; Zuza, Kristina

    2007-01-01

    In this study, Spanish and US secondary science teacher data is used to address the relationship between what science teachers teach and the science and technology based environmental problems/threats faced by the world. The results of a two part questionnaire indicated that teachers of both countries are worried about the problem of pollution of…

  19. Conditioned social dominance threat: observation of others’ social dominance biases threat learning

    PubMed Central

    Molapour, Tanaz; Olsson, Andreas

    2016-01-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants’ eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. PMID:27217107

  20. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  1. Why we respond faster to the self than to others? An implicit positive association theory of self-advantage during implicit face recognition.

    PubMed

    Ma, Yina; Han, Shihui

    2010-06-01

    Human adults usually respond faster to their own faces rather than to those of others. We tested the hypothesis that an implicit positive association (IPA) with self mediates self-advantage in face recognition through 4 experiments. Using a self-concept threat (SCT) priming that associated the self with negative personal traits and led to a weakened IPA with self, we found that self-face advantage in an implicit face-recognition task that required identification of face orientation was eliminated by the SCT priming. Moreover, the SCT effect on self-face recognition was evident only with the left-hand responses. Furthermore, the SCT effect on self-face recognition was observed in both Chinese and American participants. Our findings support the IPA hypothesis that defines a social cognitive mechanism of self-advantage in face recognition.

  2. Postural threat influences vestibular-evoked muscular responses.

    PubMed

    Lim, Shannon B; Cleworth, Taylor W; Horslen, Brian C; Blouin, Jean-Sébastien; Inglis, J Timothy; Carpenter, Mark G

    2017-02-01

    Standing balance is significantly influenced by postural threat. While this effect has been well established, the underlying mechanisms of the effect are less understood. The involvement of the vestibular system is under current debate, and recent studies that investigated the effects of height-induced postural threat on vestibular-evoked responses provide conflicting results based on kinetic (Horslen BC, Dakin CJ, Inglis JT, Blouin JS, Carpenter MG. J Physiol 592: 3671-3685, 2014) and kinematic (Osler CJ, Tersteeg MC, Reynolds RF, Loram ID. Eur J Neurosci 38: 3239-3247, 2013) data. We examined the effect of threat of perturbation, a different form of postural threat, on coupling (cross-correlation, coherence, and gain) of the vestibulo-muscular relationship in 25 participants who maintained standing balance. In the "No-Threat" conditions, participants stood quietly on a stable surface. In the "Threat" condition, participants' balance was threatened with unpredictable mediolateral support surface tilts. Quiet standing immediately before the surface tilts was compared to an equivalent time from the No-Threat conditions. Surface EMG was recorded from bilateral trunk, hip, and leg muscles. Hip and leg muscles exhibited significant increases in peak cross-correlation amplitudes, coherence, and gain (1.23-2.66×) in the Threat condition compared with No-Threat conditions, and significant correlations were observed between threat-related changes in physiological arousal and medium-latency peak cross-correlation amplitude in medial gastrocnemius (r = 0.408) muscles. These findings show a clear threat effect on vestibular-evoked responses in muscles in the lower body, with less robust effects of threat on trunk muscles. Combined with previous work, the present results can provide insight into observed changes during balance control in threatening situations. This is the first study to show increases in vestibular-evoked responses of the lower body muscles under conditions

  3. Flexibility in the face of fear: Hippocampal-prefrontal regulation of fear and avoidance.

    PubMed

    Moscarello, Justin M; Maren, Stephen

    2018-02-01

    Generating appropriate defensive behaviors in the face of threat is essential to survival. Although many of these behaviors are 'hard-wired', they are also flexible. For example, Pavlovian fear conditioning generates learned defensive responses, such as conditioned freezing, that can be suppressed through extinction. The expression of extinguished responses is highly context-dependent, allowing animals to engage behavioral responses appropriate to the contexts in which threats are encountered. Likewise, animals and humans will avoid noxious outcomes if given the opportunity. In instrumental avoidance learning, for example, animals overcome conditioned defensive responses, including freezing, in order to actively avoid aversive stimuli. Recent work has greatly advanced understanding of the neural basis of these phenomena and has revealed common circuits involved in the regulation of fear. Specifically, the hippocampus and medial prefrontal cortex play pivotal roles in gating fear reactions and instrumental actions, mediated by the amygdala and nucleus accumbens, respectively. Because an inability to adaptively regulate fear and defensive behavior is a central component of many anxiety disorders, the brain circuits that promote flexible responses to threat are of great clinical significance.

  4. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  5. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model.

    PubMed

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 ( N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 ( N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 ( N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 ( N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict.

  6. Threats: power, family mealtimes, and social influence.

    PubMed

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  7. The role of threats in animal cooperation

    PubMed Central

    Cant, Michael A.

    2011-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors—impact, accuracy and perception—that together determine the effectiveness of threats to induce cooperation. PMID:20798110

  8. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    DTIC Science & Technology

    2013-08-01

    potential threats present in this scene and explain the meaning and implications of these threats. You have two minutes to write a response...could be due to the nature of the tasks or to fatigue. Requiring Soldiers to write answers on multiple trials, and across similar tasks, might have...tasks will likely be significantly different from those experienced in the trainer. This would remove the writing requirement over multiple trials

  9. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  10. Informed actions: where to cost effectively manage multiple threats to species to maximize return on investment.

    PubMed

    Auerbach, Nancy A; Tulloch, Ayesha I T; Possingham, Hugh P

    Conservation practitioners, faced with managing multiple threats to biodiversity and limited funding, must prioritize investment in different management actions. From an economic perspective, it is routine practice to invest where the highest rate of return is expected. This return-on-investment (ROI) thinking can also benefit species conservation, and researchers are developing sophisticated approaches to support decision-making for cost-effective conservation. However, applied use of these approaches is limited. Managers may be wary of “black-box” algorithms or complex methods that are difficult to explain to funding agencies. As an alternative, we demonstrate the use of a basic ROI analysis for determining where to invest in cost-effective management to address threats to species. This method can be applied using basic geographic information system and spreadsheet calculations. We illustrate the approach in a management action prioritization for a biodiverse region of eastern Australia. We use ROI to prioritize management actions for two threats to a suite of threatened species: habitat degradation by cattle grazing, and predation by invasive red foxes (Vulpes vulpes). We show how decisions based on cost-effective threat management depend upon how expected benefits to species are defined and how benefits and costs co-vary. By considering a combination of species richness, restricted habitats, species vulnerability, and costs of management actions, small investments can result in greater expected benefit compared with management decisions that consider only species richness. Furthermore, a landscape management strategy that implements multiple actions is more efficient than managing only for one threat, or more traditional approaches that don't consider ROI. Our approach provides transparent and logical decision support for prioritizing different actions intended to abate threats associated with multiple species; it is of use when managers need a justifiable

  11. Insider Threat to Computer Security at Nuclear Facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    West, Rebecca Lynn

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  12. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  13. Combating Terrorism, Rebel Groups, and Armed Militias in the Face of Economic Prosperity Opportunities

    DTIC Science & Technology

    2012-05-04

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17

  14. Conditioned social dominance threat: observation of others' social dominance biases threat learning.

    PubMed

    Haaker, Jan; Molapour, Tanaz; Olsson, Andreas

    2016-10-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants' eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  15. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    PubMed Central

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  16. Attentional Bias to Threat-Related Information Among Individuals With Dental Complaints: The Role of Pain Expectancy.

    PubMed

    Dehghani, Mohsen; Mohammadi, Somayyeh; Sharpe, Louise; Khatibi, Ali

    2018-01-01

    Expecting pain can be perceived as a threat may involve recruitment of cognitive strategies (such as attentional avoidance) which might help the person to reduce distress. The ecological validity of the paradigms aiming to study the attentional biases toward or away from threatening stimuli by manipulating the perception of threat in experimental settings has been questioned. Therefore, the current study aims to investigate the attentional bias toward or away from the threat when a confrontation with a real threatening and painful condition would be expected (i.e., dental treatment). One hundred and twenty-seven patients referred to three dentistry clinics for a dental treatment (experiment participants) and 30 individuals with no dental complaints (control participants) completed this study. Patients were randomly allocated to a high pain expectancy (HPE: n = 65) or a low pain expectancy (LPE: n = 62) expectancy condition. All participants completed questionnaires of distress, fear of pain, and fear of dental pain. Furthermore, they participated in a dot-probe task that assessed their attention to painful faces, dental pictures, and happy faces. In addition, before the treatment, participants reported their anticipated pain intensity and after the treatment, they reported the pain intensity that they perceived during the treatment using two separate visual analog scales. Patients in the HPE group showed a bias away from dental pictures compared to LPE and control group participants. HPE group patients also reported greater pain intensity during the treatment compared to LPE patients. Greater attentional bias away from dental pictures among HPE patients was associated with higher levels of fear of pain, fear of dental pain, and stress. Avoidance of highly salient threatening images can be seen as an unhelpful emotion-regulation strategy that individuals use to manage their fears. However, in this study, avoidance was associated with poorer outcomes.

  17. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    PubMed

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  18. Insular threat associations within taxa worldwide.

    PubMed

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  19. A vulnerability assessment of 300 species in Florida: threats from sea level rise, land use, and climate change.

    PubMed

    Reece, Joshua Steven; Noss, Reed F; Oetting, Jon; Hoctor, Tom; Volk, Michael

    2013-01-01

    Species face many threats, including accelerated climate change, sea level rise, and conversion and degradation of habitat from human land uses. Vulnerability assessments and prioritization protocols have been proposed to assess these threats, often in combination with information such as species rarity; ecological, evolutionary or economic value; and likelihood of success. Nevertheless, few vulnerability assessments or prioritization protocols simultaneously account for multiple threats or conservation values. We applied a novel vulnerability assessment tool, the Standardized Index of Vulnerability and Value, to assess the conservation priority of 300 species of plants and animals in Florida given projections of climate change, human land-use patterns, and sea level rise by the year 2100. We account for multiple sources of uncertainty and prioritize species under five different systems of value, ranging from a primary emphasis on vulnerability to threats to an emphasis on metrics of conservation value such as phylogenetic distinctiveness. Our results reveal remarkable consistency in the prioritization of species across different conservation value systems. Species of high priority include the Miami blue butterfly (Cyclargus thomasi bethunebakeri), Key tree cactus (Pilosocereus robinii), Florida duskywing butterfly (Ephyriades brunnea floridensis), and Key deer (Odocoileus virginianus clavium). We also identify sources of uncertainty and the types of life history information consistently missing across taxonomic groups. This study characterizes the vulnerabilities to major threats of a broad swath of Florida's biodiversity and provides a system for prioritizing conservation efforts that is quantitative, flexible, and free from hidden value judgments.

  20. A Vulnerability Assessment of 300 Species in Florida: Threats from Sea Level Rise, Land Use, and Climate Change

    PubMed Central

    Reece, Joshua Steven; Noss, Reed F.; Oetting, Jon; Hoctor, Tom; Volk, Michael

    2013-01-01

    Species face many threats, including accelerated climate change, sea level rise, and conversion and degradation of habitat from human land uses. Vulnerability assessments and prioritization protocols have been proposed to assess these threats, often in combination with information such as species rarity; ecological, evolutionary or economic value; and likelihood of success. Nevertheless, few vulnerability assessments or prioritization protocols simultaneously account for multiple threats or conservation values. We applied a novel vulnerability assessment tool, the Standardized Index of Vulnerability and Value, to assess the conservation priority of 300 species of plants and animals in Florida given projections of climate change, human land-use patterns, and sea level rise by the year 2100. We account for multiple sources of uncertainty and prioritize species under five different systems of value, ranging from a primary emphasis on vulnerability to threats to an emphasis on metrics of conservation value such as phylogenetic distinctiveness. Our results reveal remarkable consistency in the prioritization of species across different conservation value systems. Species of high priority include the Miami blue butterfly (Cyclargus thomasi bethunebakeri), Key tree cactus (Pilosocereus robinii), Florida duskywing butterfly (Ephyriades brunnea floridensis), and Key deer (Odocoileus virginianus clavium). We also identify sources of uncertainty and the types of life history information consistently missing across taxonomic groups. This study characterizes the vulnerabilities to major threats of a broad swath of Florida’s biodiversity and provides a system for prioritizing conservation efforts that is quantitative, flexible, and free from hidden value judgments. PMID:24260447

  1. Zika Virus: An Emerging Worldwide Threat

    PubMed Central

    Rather, Irfan A.; Lone, Jameel B.; Bajpai, Vivek K.; Paek, Woon K.; Lim, Jeongheui

    2017-01-01

    ZIKA virus (ZIKV) poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV) and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is being performed by RT-PCR and IgM-captured enzyme-linked immunosorbent assay (MAC-ELISA). The real brunt of the virus is, however, borne by children and adults alike. Case studies of the ZIKV outbreaks in the French Polynesia and other places have suggested that there is a close link between the ZIKV and Gullian-Barre syndrome (GBS). The GBS has closely followed in areas facing ZIKV outbreaks. Although solid evidence is yet to emerge, clinical data integration has revealed a large number of ZIKV patients having GBS. Moreover, the amniotic fluids, blood cord, and miscarriage tissues of mothers have been detected with ZIKV, which indicates that the virus either gets transferred from mother to fetus or seeks direct entry in the fetus, causing microcephaly and other brain anomalies in the newborn babies. Studies on mice have confirmed the link between the ZIKV infection during pregnancy and microcephaly in babies. Reports have highlighted the sexual transmission of the ZIKV, as it has been detected in the semen and saliva of affected persons. The intensity with which the ZIKA is spreading can collapse the health sector of several countries, which are poor. A comprehensive strategy is a need of an hour to combat this virus so as to prevent its transmission and avert the looming threat. At the same time, more research on the cure of the ZIKV is imperative. PMID:28798738

  2. Zika Virus: An Emerging Worldwide Threat.

    PubMed

    Rather, Irfan A; Lone, Jameel B; Bajpai, Vivek K; Paek, Woon K; Lim, Jeongheui

    2017-01-01

    ZIKA virus (ZIKV) poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV) and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is being performed by RT-PCR and IgM-captured enzyme-linked immunosorbent assay (MAC-ELISA). The real brunt of the virus is, however, borne by children and adults alike. Case studies of the ZIKV outbreaks in the French Polynesia and other places have suggested that there is a close link between the ZIKV and Gullian-Barre syndrome (GBS). The GBS has closely followed in areas facing ZIKV outbreaks. Although solid evidence is yet to emerge, clinical data integration has revealed a large number of ZIKV patients having GBS. Moreover, the amniotic fluids, blood cord, and miscarriage tissues of mothers have been detected with ZIKV, which indicates that the virus either gets transferred from mother to fetus or seeks direct entry in the fetus, causing microcephaly and other brain anomalies in the newborn babies. Studies on mice have confirmed the link between the ZIKV infection during pregnancy and microcephaly in babies. Reports have highlighted the sexual transmission of the ZIKV, as it has been detected in the semen and saliva of affected persons. The intensity with which the ZIKA is spreading can collapse the health sector of several countries, which are poor. A comprehensive strategy is a need of an hour to combat this virus so as to prevent its transmission and avert the looming threat. At the same time, more research on the cure of the ZIKV is imperative.

  3. Credible threats and promises.

    PubMed

    McNamara, John M; Houston, Alasdair I

    2002-11-29

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest.

  4. Subliminal cues bias perception of facial affect in patients with social phobia: evidence for enhanced unconscious threat processing

    PubMed Central

    Jusyte, Aiste; Schönenberg, Michael

    2014-01-01

    Socially anxious individuals have been shown to exhibit altered processing of facial affect, especially expressions signaling threat. Enhanced unaware processing has been suggested an important mechanism which may give rise to anxious conscious cognition and behavior. This study investigated whether individuals with social anxiety disorder (SAD) are perceptually more vulnerable to the biasing effects of subliminal threat cues compared to healthy controls. In a perceptual judgment task, 23 SAD and 23 matched control participants were asked to rate the affective valence of parametrically manipulated affective expressions ranging from neutral to angry. Each trial was preceded by subliminal presentation of an angry/neutral cue. The SAD group tended to rate target faces as “angry” when the preceding subliminal stimulus was angry vs. neutral, while healthy participants were not biased by the subliminal stimulus presentation. The perceptual bias in SAD was also associated with higher reaction time latencies in the subliminal angry cue condition. The results provide further support for enhanced unconscious threat processing in SAD individuals. The implications for etiology, maintenance, and treatment of SAD are discussed. PMID:25136307

  5. Subliminal cues bias perception of facial affect in patients with social phobia: evidence for enhanced unconscious threat processing.

    PubMed

    Jusyte, Aiste; Schönenberg, Michael

    2014-01-01

    Socially anxious individuals have been shown to exhibit altered processing of facial affect, especially expressions signaling threat. Enhanced unaware processing has been suggested an important mechanism which may give rise to anxious conscious cognition and behavior. This study investigated whether individuals with social anxiety disorder (SAD) are perceptually more vulnerable to the biasing effects of subliminal threat cues compared to healthy controls. In a perceptual judgment task, 23 SAD and 23 matched control participants were asked to rate the affective valence of parametrically manipulated affective expressions ranging from neutral to angry. Each trial was preceded by subliminal presentation of an angry/neutral cue. The SAD group tended to rate target faces as "angry" when the preceding subliminal stimulus was angry vs. neutral, while healthy participants were not biased by the subliminal stimulus presentation. The perceptual bias in SAD was also associated with higher reaction time latencies in the subliminal angry cue condition. The results provide further support for enhanced unconscious threat processing in SAD individuals. The implications for etiology, maintenance, and treatment of SAD are discussed.

  6. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  7. Threats, conservation strategies, and prognosis for suckers (Catostomidae) in North America: insights from regional case studies of a diverse family of non-game fishes

    USGS Publications Warehouse

    Cooke, Steven J.; Bunt, Christopher M.; Hamilton, Steven J.; Jennings, Cecil A.; Pearson, Micheal P.; Cooperman, Michael S.; Markle, Douglas F.

    2005-01-01

    Catostomid fishes are a diverse family of 76+ freshwater species that are distributed across North America in many different habitats. This group of fish is facing a variety of impacts and conservation issues that are somewhat unique relative to more economically valuable and heavily managed fish species. Here, we present a brief series of case studies to highlight the threats such as migration barriers, flow regulation, environmental contamination, habitat degradation, exploitation and impacts from introduced (non-native) species that are facing catostomids in different regions. Collectively, the case studies reveal that individual species usually are not threatened by a single, isolated factor. Instead, species in general face numerous stressors that threaten multiple stages of their life history. Several factors have retarded sucker conservation including widespread inabilities of field workers to distinguish some species, lack of basic natural history and ecological knowledge of life history, and the misconception that suckers are tolerant of degraded conditions and are of little social or ecological value. Without a specific constituent group lobbying for conservation of non-game fishes, all such species, including members of the catostomid family, will continue to face serious risks because of neglect, ignorance, and misunderstanding. We suggest that conservation strategies should incorporate research and education/outreach components. Other conservation strategies that would be effective for protecting suckers include freshwater protected areas for critical habitat, restoration of degraded habitat, and design of catostomid-friendly fish bypass facilities. We believe that the plight of the catostomids is representative of the threats facing many other non-game freshwater fishes with diverse life-history strategies globally.

  8. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. Copyright © 2016 Elsevier Inc. All rights reserved.

  9. Use of fear and threat-based messages to motivate preparedness: Costs, consequences and other choices: part one.

    PubMed

    Jones, Ana-Marie

    Over the last several decades, billions of dollars have been spent in the USA to increase its disaster readiness and response capacity. Virtually every poll and survey shows that the US public remains woefully underprepared. At the 2012 'Awareness to Action' workshop convened by the Federal Emergency Management Agency (FEMA) and the American Red Cross to examine the future of the long-standing 'Have a Kit. Make a Plan. Be Informed' preparedness campaign, FEMA Administrator Craig Fugate acknowledged that traditional efforts have not 'moved the preparedness needle'. The most frequently cited causes for lack of preparedness in the general public are consumer apathy, lack of time, lack of money and the lack of knowledge on how best to prepare. This paper explores the reliance on fear- and threat-based messages (also referred to as 'fear appeals' to promote preparedness as a significant cause for this lack of preparation. It will look at the growing body of fear research, how fear and threat appeals are pervasive in emergency management, as well as its costs, unintended consequences and the other choices that can be made. The author asserts that by eliminating fear and threat-based messages, new messengers can share readiness as an accessible, empowering and valued pursuit for all communities - entirely distinct from the disasters and threats that people face.

  10. Use of fear and threat-based messages to motivate preparedness: costs, consequences and other choices. Part Two.

    PubMed

    Jones, Ana-Marie

    2013-01-01

    Over the last several decades, billions of dollars have been spent in the USA to increase disaster readiness and response capacity. Virtually every poll and survey shows that the US public remains woefully underprepared. At the 2012 'Awareness to Action' workshop convened by the Federal Emergency Management Agency (FEMA) and the American Red Cross to examine the future of the long-standing 'Have a Kit. Make a Plan. Be Informed' preparedness campaign, FEMA Administrator Craig Fugate acknowledged that traditional efforts have not 'moved the preparedness needle'. The most frequently cited causes for lack of preparedness in the general public are consumer apathy, lack of time, lack of money and the lack of knowledge on how best to prepare. This paper explores the reliance on fear and threat-based messages (also referred to as 'fear appeals') to promote preparedness as a significant cause for this lack of preparation. It will look at the growing body of fear research, how fear and threat appeals are pervasive in emergency management, as well as their costs, unintended consequences and the other choices that can be made. The author asserts that by eliminating fear and threat-based messages, new messengers can share readiness as an accessible, empowering and valued pursuit for all communities - entirely distinct from the disasters and threats that are faced.

  11. Insider Threat Mitigation Workshop Instructional Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  12. Context-dependent responses to neighbours and strangers in wild European rabbits (Oryctolagus cuniculus).

    PubMed

    Monclús, Raquel; Saavedra, Irene; de Miguel, Javier

    2014-07-01

    Territorial animals defend their territories against intruders. The level of aggression directed to intruders depends on the familiarity and/or the relative threat they pose, and it could be modified by the context of the interaction. We explored in a wild social mammal, the European rabbit (Oryctolagus cuniculus), whether residents responded more aggressively to strangers or to neighbours (dear enemy or nasty neighbour effects, respectively). We simulated the intrusion of neighbours or strangers in different parts of the territory of wild European rabbits in a suburban area in central Spain. For that, we placed faecal pellets of neighbouring or stranger rabbits in the territory of 5 rabbit colonies. Resident rabbits counter-marked preferably the odour stations with stranger odour, compared to the ones with neighbour odour, and they did not make a difference between neighbour and a non-odour control stimuli. The results suggest that rabbits show a dear enemy effect. However, repeated intrusions escalated the responses of rabbits towards neighbours. The location within the territory or the sex of the stranger did not affect the level of response. We conclude that in rabbits the relative threat posed by the intruder triggers the intensity of the interaction. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. Psychoanalysis and the nuclear threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threatmore » to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.« less

  14. Linking terrestrial and marine conservation planning and threats analysis.

    PubMed

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  15. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  16. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  17. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    PubMed

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  18. Assessing fear and anxiety in humans using the threat of predictable and unpredictable aversive events (the NPU-threat test)

    PubMed Central

    Schmitz, Anja; Grillon, Christian

    2012-01-01

    The threat of predictable and unpredictable aversive events was developed to assess short-duration (fear) and long-duration (anxiety) aversive states in humans. A typical experiment consists of three conditions: a safe condition (neutral (N)), during which participants are safe from aversive stimuli, and two threat conditions—one in which aversive events are administered predictably (P) (i.e., signaled by a threat cue), and one in which aversive stimuli are administered unpredictably (U). During the so-called NPU -threat test, ongoing change in aversive states is measured with the startle reflex. The NPU -threat test has been validated in pharmacological and clinical studies and can be implemented in children and adults. Similar procedures have been applied in animal models, making the NPU -threat test an ideal tool for translational research. The procedure is relatively short (35 min), simple to implement and generates consistent results with large effect sizes. PMID:22362158

  19. Stereotype threat can reduce older adults' memory errors.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  20. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  1. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  2. Toward a Framework for Conducting Ecoregional Threats Assessments

    Treesearch

    Jamison Ervin; Jeffrey Parrish

    2006-01-01

    Assessing threats to biodiversity is widely recognized as a critical step in conservation planning. While there have been recent advances in understanding how to assess threats at a site level, there has been relatively little consensus on how threats can be meaningfully assessed at an ecoregional scale. Drawing from numerous threat assessment studies, this paper...

  3. Reading the lines in the face: The contribution of angularity and roundness to perceptions of facial anger and joy.

    PubMed

    Franklin, Robert G; Adams, Reginald B; Steiner, Troy G; Zebrowitz, Leslie A

    2018-05-14

    Through 3 studies, we investigated whether angularity and roundness present in faces contributes to the perception of anger and joyful expressions, respectively. First, in Study 1 we found that angry expressions naturally contain more inward-pointing lines, whereas joyful expressions contain more outward-pointing lines. Then, using image-processing techniques in Studies 2 and 3, we filtered images to contain only inward-pointing or outward-pointing lines as a way to approximate angularity and roundness. We found that filtering images to be more angular increased how threatening and angry a neutral face was rated, increased how intense angry expressions were rated, and enhanced the recognition of anger. Conversely, filtering images to be rounder increased how warm and joyful a neutral face was rated, increased the intensity of joyful expressions, and enhanced recognition of joy. Together these findings show that angularity and roundness play a direct role in the recognition of angry and joyful expressions. Given evidence that angularity and roundness may play a biological role in indicating threat and safety in the environment, this suggests that angularity and roundness represent primitive facial cues used to signal threat-anger and warmth-joy pairings. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  4. Investigation of the Stability of Human Freezing-Like Responses to Social Threat From Mid to Late Adolescence

    PubMed Central

    Niermann, Hannah C. M.; Figner, Bernd; Tyborowska, Anna; Cillessen, Antonius H. N.; Roelofs, Karin

    2018-01-01

    Freezing behavior, a commonly observed defensive stress response, shows relatively high stability over time in animals. Given the relevance of freezing for stress-coping and human psychopathology, it is relevant to know whether freezing behavior is also stable in humans, particularly during adolescence, when most affective symptoms develop. In a prospective longitudinal study, we investigated freezing-like behavior in response to social threat in 75 adolescents at age 14, repeated 3 years later at age 17. We used a well-established method combining electrocardiography (ECG; heart rate) and posturography (body sway) in response to emotional picture-viewing of angry, happy, and neutral faces. We hypothesized that individual differences in freezing-like behavior in response to social threat—operationalized by contrasting angry vs. neutral faces—would be relatively stable over time. Our results indeed showed relative stability between ages 14 and 17 in individual differences in freezing-like behavior in heart rate (r = 0.82), as well as in combined heart rate and body sway measures (r = 0.65). These effects were not specific for the angry vs. neutral contrast; they were also visible in other emotion contrasts. Exploratory analysis in males and females separately showed stability in body sway specifically for angry vs. neutral faces only in females. Together, these results suggest moderate to strong stability in human freezing-like behavior in response to social threat from mid to late adolescence (with exception for the body sway measure in males). This relative stability was not specific for threat-induction and may reflect a general stability that is particularly strong for heart rate. The fact that this relative stability was found over a relatively long time range of 3 years is promising for studies aiming to use freezing-like behavior as a marker for internalizing symptoms in adolescent development. PMID:29867396

  5. Neural synchronization during face-to-face communication.

    PubMed

    Jiang, Jing; Dai, Bohan; Peng, Danling; Zhu, Chaozhe; Liu, Li; Lu, Chunming

    2012-11-07

    Although the human brain may have evolutionarily adapted to face-to-face communication, other modes of communication, e.g., telephone and e-mail, increasingly dominate our modern daily life. This study examined the neural difference between face-to-face communication and other types of communication by simultaneously measuring two brains using a hyperscanning approach. The results showed a significant increase in the neural synchronization in the left inferior frontal cortex during a face-to-face dialog between partners but none during a back-to-back dialog, a face-to-face monologue, or a back-to-back monologue. Moreover, the neural synchronization between partners during the face-to-face dialog resulted primarily from the direct interactions between the partners, including multimodal sensory information integration and turn-taking behavior. The communicating behavior during the face-to-face dialog could be predicted accurately based on the neural synchronization level. These results suggest that face-to-face communication, particularly dialog, has special neural features that other types of communication do not have and that the neural synchronization between partners may underlie successful face-to-face communication.

  6. Threats to family planning services in Michigan: organizational responses to economic and political challenges.

    PubMed

    Dalton, Vanessa K; Jacobson, Peter D; Berson-Grand, Julie; Weisman, Carol S

    2005-01-01

    Title X is the only federal funding specifically for contraception and family planning services. This study identifies the threats and challenges Title X family planning organizations face in Michigan, and examines organizational responses to these challenges. We hypothesized that organizational responses to current challenges, including recent legislation, would differ between organizational types. We used a multiple case study design to examine safety net providers that received Title X funding in 2001. Cases were selected to represent economic and geographic diversity and included a mix of population densities. Key informants at each organization participated in face-to-face, semistructured interviews. Interviews collected data on current challenges, organizational planning processes, and organizational responses. All Title X organizations reported significant challenges, including rising costs, increasing need, and inadequate funding. Private organizations were more concerned about political challenges, especially recent Michigan legislation, than health departments. Organizational type was associated with the type of response. Health departments tended to close clinics or cut services, whereas private organizations recruited insured populations and increased patient fees. Based on these findings, the family planning safety net in Michigan appears to be undergoing significant change. These changes may decrease the availability of affordable family planning services in Michigan.

  7. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  8. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  9. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  10. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  11. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  12. Stereotype threat can reduce older adults' memory errors

    PubMed Central

    Barber, Sarah J.; Mather, Mara

    2014-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment (Seibt & Förster, 2004). Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 & 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well. PMID:24131297

  13. Land-use threats and protected areas: a scenario-based, landscape level approach

    USGS Publications Warehouse

    Wilson, Tamara S.; Sleeter, Benjamin M.; Sleeter, Rachel R.; Soulard, Christopher E.

    2014-01-01

    Anthropogenic land use will likely present a greater challenge to biodiversity than climate change this century in the Pacific Northwest, USA. Even if species are equipped with the adaptive capacity to migrate in the face of a changing climate, they will likely encounter a human-dominated landscape as a major dispersal obstacle. Our goal was to identify, at the ecoregion-level, protected areas in close proximity to lands with a higher likelihood of future land-use conversion. Using a state-and-transition simulation model, we modeled spatially explicit (1 km2) land use from 2000 to 2100 under seven alternative land-use and emission scenarios for ecoregions in the Pacific Northwest. We analyzed scenario-based land-use conversion threats from logging, agriculture, and development near existing protected areas. A conversion threat index (CTI) was created to identify ecoregions with highest projected land-use conversion potential within closest proximity to existing protected areas. Our analysis indicated nearly 22% of land area in the Coast Range, over 16% of land area in the Puget Lowland, and nearly 11% of the Cascades had very high CTI values. Broader regional-scale land-use change is projected to impact nearly 40% of the Coast Range, 30% of the Puget Lowland, and 24% of the Cascades (i.e., two highest CTI classes). A landscape level, scenario-based approach to modeling future land use helps identify ecoregions with existing protected areas at greater risk from regional land-use threats and can help prioritize future conservation efforts.

  14. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  15. A simple, sufficient, and consistent method to score the status of threats and demography of imperiled species

    PubMed Central

    Webber, Whitney M.; Li, Ya-Wei

    2016-01-01

    Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species’ demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key’s utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand

  16. A simple, sufficient, and consistent method to score the status of threats and demography of imperiled species.

    PubMed

    Malcom, Jacob W; Webber, Whitney M; Li, Ya-Wei

    2016-01-01

    Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species' demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key's utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand overall

  17. Future of health care delivery in iran, opportunities and threats.

    PubMed

    Rajabi, F; Esmailzadeh, H; Rostamigooran, N; Majdzadeh, R; Doshmangir, L

    2013-01-01

    The aim of this study was to determine the impact of important social and technological trends on health care delivery, in the context of developing "Iran's Health System Reform Plan by 2025". A detailed review of the national and international literature was done to identify the main trends affecting health system. To collect the experts' opinions about important trends and their impact on health care delivery, Focus Group Discussions (FGDs) and semi-structured in-depth interviews techniques were used. The study was based on the STEEP model. Final results were approved in an expert's panel session. The important social and technological trends, affecting health system in Iran in the next 15 years are demographic transition, epidemiologic transition, increasing bio-environmental pollution, increasing slums, increasing private sector partnership in health care delivery, moving toward knowledge-based society, development of information and communication technology, increasing use of high technologies in health system, and development of traditional and alternative medicine. The opportunities and threats resulting from the above mentioned trends were also assessed in this study. Increasing healthcare cost due to some trends like demographic and epidemiologic transition and uncontrolled increase in using new technologies in health care is one of the most important threats that the health system will be facing. The opportunities that advancement in technology and moving toward knowledge-based society create are important and should not be ignored.

  18. Altered medial prefrontal activity during dynamic face processing in schizophrenia spectrum patients.

    PubMed

    Mothersill, Omar; Morris, Derek W; Kelly, Sinead; Rose, Emma Jane; Bokde, Arun; Reilly, Richard; Gill, Michael; Corvin, Aiden P; Donohoe, Gary

    2014-08-01

    Processing the emotional content of faces is recognised as a key deficit of schizophrenia, associated with poorer functional outcomes and possibly contributing to the severity of clinical symptoms such as paranoia. At the neural level, fMRI studies have reported altered limbic activity in response to facial stimuli. However, previous studies may be limited by the use of cognitively demanding tasks and static facial stimuli. To address these issues, the current study used a face processing task involving both passive face viewing and dynamic social stimuli. Such a task may (1) lack the potentially confounding effects of high cognitive demands and (2) show higher ecological validity. Functional MRI was used to examine neural activity in 25 patients with a DSM-IV diagnosis of schizophrenia/schizoaffective disorder and 21 age- and gender-matched healthy controls while they participated in a face processing task, which involved viewing videos of angry and neutral facial expressions, and a non-biological baseline condition. While viewing faces, patients showed significantly weaker deactivation of the medial prefrontal cortex, including the anterior cingulate, and decreased activation in the left cerebellum, compared to controls. Patients also showed weaker medial prefrontal deactivation while viewing the angry faces relative to baseline. Given that the anterior cingulate plays a role in processing negative emotion, weaker deactivation of this region in patients while viewing faces may contribute to an increased perception of social threat. Future studies examining the neurobiology of social cognition in schizophrenia using fMRI may help establish targets for treatment interventions. Copyright © 2014 Elsevier B.V. All rights reserved.

  19. Bio-threat preparedness: Need for a paradigm shift.

    PubMed

    Jindal, A K; Roy, Kaushik

    2014-04-01

    India of late has been vulnerable to Chemical, Biological, Radiological and Nuclear (CBRN) threat, on account of its unique geographic position. Biological threat is an imminent threat in the hands of a terrorist. The public health system of our country is overburdened due to its present role and bio-attack response is not a priority area. This paper suggests that as the prime focus is on the CR and N threats in the integrated CBRN preparedness strategy and that specialized and technical forces are needed to deal with a bio-threat; hence there is a need for a paradigm shift in policy. The emerging field of bio-threat needs to be delinked from the joint family of 'CBRN', with consequent structural and functional changes. A separate specialized cadre needs to be formed for dealing with bio-threat, created from the pool of doctors and non-medical scientists from the AFMS and the DRDO. Structural changes are needed in the organization, to bring in the resources of NCDC, New Delhi for enhanced disease surveillance capacity and creation of a bio-threat mitigation node in the AFMC, Pune.

  20. Are Older Adults Perceived as A Threat to Society? Exploring Perceived Age-Based Threats in 29 Nations.

    PubMed

    Ayalon, Liat

    2017-08-05

    The present study adds to the current body of literature by simultaneously examining the public perception of young and old people as posing realistic threats (e.g., to the group's power, resources, and welfare) and symbolic threats (e.g., to one's world view, belief system and values). The fourth wave of the European Social Survey was administered to individuals from 29 countries. Analysis is based on 56,170 individuals, who had data on the four relevant indicators. The study relied on a latent profile analysis to develop a typology of perceived realistic and symbolic threats to society by younger and older adults. A three-profile solution indicated that the perception of older and younger adults as threats to society often co-occurs. Sociodemographic characteristics at the individual-level and the Gini coefficient (e.g., an inequality indicator) at the country-level had differential associations with the profiles identified. The study calls for a more balanced approach which evaluates attitudes toward both younger and older adults as potential sources of threat. Attention should be paid to individual- and national-level characteristics associated with age-based threats (e.g., the perception of a group, defined by its chronological age, as threatening). © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  1. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  2. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  3. Social identity threat motivates science-discrediting online comments.

    PubMed

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as "gamers") were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition.

  4. Organizational Silence and Hidden Threats to Patient Safety

    PubMed Central

    Henriksen, Kerm; Dayton, Elizabeth

    2006-01-01

    Organizational silence refers to a collective-level phenomenon of saying or doing very little in response to significant problems that face an organization. The paper focuses on some of the less obvious factors contributing to organizational silence that can serve as threats to patient safety. Converging areas of research from the cognitive, social, and organizational sciences and the study of sociotechnical systems help to identify some of the underlying factors that serve to shape and sustain organizational silence. These factors have been organized under three levels of analysis: (1) individual factors, including the availability heuristic, self-serving bias, and the status quo trap; (2) social factors, including conformity, diffusion of responsibility, and microclimates of distrust; and (3) organizational factors, including unchallenged beliefs, the good provider fallacy, and neglect of the interdependencies. Finally, a new role for health care leaders and managers is envisioned. It is one that places high value on understanding system complexity and does not take comfort in organizational silence. PMID:16898978

  5. Organizational silence and hidden threats to patient safety.

    PubMed

    Henriksen, Kerm; Dayton, Elizabeth

    2006-08-01

    Organizational silence refers to a collective-level phenomenon of saying or doing very little in response to significant problems that face an organization. The paper focuses on some of the less obvious factors contributing to organizational silence that can serve as threats to patient safety. Converging areas of research from the cognitive, social, and organizational sciences and the study of sociotechnical systems help to identify some of the underlying factors that serve to shape and sustain organizational silence. These factors have been organized under three levels of analysis: (1) individual factors, including the availability heuristic, self-serving bias, and the status quo trap; (2) social factors, including conformity, diffusion of responsibility, and microclimates of distrust; and (3) organizational factors, including unchallenged beliefs, the good provider fallacy, and neglect of the interdependencies. Finally, a new role for health care leaders and managers is envisioned. It is one that places high value on understanding system complexity and does not take comfort in organizational silence.

  6. Social Identity Threat Motivates Science-Discrediting Online Comments

    PubMed Central

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as “gamers”) were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition. PMID:25646725

  7. When and Why Threats Go Undetected: Impacts of Event Rate and Shift Length on Threat Detection Accuracy During Airport Baggage Screening.

    PubMed

    Meuter, Renata F I; Lacherez, Philippe F

    2016-03-01

    We aimed to assess the impact of task demands and individual characteristics on threat detection in baggage screeners. Airport security staff work under time constraints to ensure optimal threat detection. Understanding the impact of individual characteristics and task demands on performance is vital to ensure accurate threat detection. We examined threat detection in baggage screeners as a function of event rate (i.e., number of bags per minute) and time on task across 4 months. We measured performance in terms of the accuracy of detection of Fictitious Threat Items (FTIs) randomly superimposed on X-ray images of real passenger bags. Analyses of the percentage of correct FTI identifications (hits) show that longer shifts with high baggage throughput result in worse threat detection. Importantly, these significant performance decrements emerge within the first 10 min of these busy screening shifts only. Longer shift lengths, especially when combined with high baggage throughput, increase the likelihood that threats go undetected. Shorter shift rotations, although perhaps difficult to implement during busy screening periods, would ensure more consistently high vigilance in baggage screeners and, therefore, optimal threat detection and passenger safety. © 2015, Human Factors and Ergonomics Society.

  8. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  9. Content specificity of attentional bias to threat in post-traumatic stress disorder.

    PubMed

    Zinchenko, A; Al-Amin, M M; Alam, M M; Mahmud, W; Kabir, N; Reza, H M; Burne, T H J

    2017-08-01

    Attentional bias to affective information and reduced cognitive control may maintain the symptoms of post-traumatic stress disorder (PTSD) and impair cognitive functioning. However, the role of content specificity of affective stimuli (e.g., trauma-related, emotional trauma-unrelated) in the observed attentional bias and cognitive control is less clear, as this has not been tested simultaneously before. Therefore, we examined the content specificity of attentional bias to threat in PTSD. PTSD participants (survivors of a multistory factory collapse, n=30) and matched controls (n=30) performed an Eriksen Flanker task. They identified the direction of a centrally presented target arrow, which was flanked by several task-irrelevant distractor arrows pointed to the same (congruent) or opposite direction (incongruent). Additionally, participants were presented with a picture of a face (neutral, emotional) or building (neutral=normal, emotional=collapsed multistory factory) as a task-irrelevant background image. We found that PTSD participants produced overall larger conflict effects and longer reaction times (RT) to emotional than to neutral stimuli relative to their healthy counterparts. Moreover, PTSD, but not healthy participants showed a stimulus specific dissociation in processing emotional stimuli. Emotional faces elicited longer RTs compared to neutral faces, while emotional buildings elicited faster responses, compared to neutral buildings. PTSD patients show a content-sensitive attentional bias to emotional information and impaired cognitive control. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Famous face recognition, face matching, and extraversion.

    PubMed

    Lander, Karen; Poyarekar, Siddhi

    2015-01-01

    It has been previously established that extraverts who are skilled at interpersonal interaction perform significantly better than introverts on a face-specific recognition memory task. In our experiment we further investigate the relationship between extraversion and face recognition, focusing on famous face recognition and face matching. Results indicate that more extraverted individuals perform significantly better on an upright famous face recognition task and show significantly larger face inversion effects. However, our results did not find an effect of extraversion on face matching or inverted famous face recognition.

  11. Technosocial Modeling of IED Threat Scenarios and Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less

  12. Barrier Coverage for 3D Camera Sensor Networks

    PubMed Central

    Wu, Chengdong; Zhang, Yunzhou; Jia, Zixi; Ji, Peng; Chu, Hao

    2017-01-01

    Barrier coverage, an important research area with respect to camera sensor networks, consists of a number of camera sensors to detect intruders that pass through the barrier area. Existing works on barrier coverage such as local face-view barrier coverage and full-view barrier coverage typically assume that each intruder is considered as a point. However, the crucial feature (e.g., size) of the intruder should be taken into account in the real-world applications. In this paper, we propose a realistic resolution criterion based on a three-dimensional (3D) sensing model of a camera sensor for capturing the intruder’s face. Based on the new resolution criterion, we study the barrier coverage of a feasible deployment strategy in camera sensor networks. Performance results demonstrate that our barrier coverage with more practical considerations is capable of providing a desirable surveillance level. Moreover, compared with local face-view barrier coverage and full-view barrier coverage, our barrier coverage is more reasonable and closer to reality. To the best of our knowledge, our work is the first to propose barrier coverage for 3D camera sensor networks. PMID:28771167

  13. Exogenous cortisol facilitates responses to social threat under high provocation.

    PubMed

    Bertsch, Katja; Böhnke, Robina; Kruk, Menno R; Richter, Steffen; Naumann, Ewald

    2011-04-01

    Stress is one of the most important promoters of aggression. Human and animal studies have found associations between basal and acute levels of the stress hormone cortisol and (abnormal) aggression. Irrespective of the direction of these changes--i.e., increased or decreased aggressive behavior--the results of these studies suggest dramatic alterations in the processing of threat-related social information. Therefore, the effects of cortisol and provocation on social information processing were addressed by the present study. After a placebo-controlled pharmacological manipulation of acute cortisol levels, we exposed healthy individuals to high or low levels of provocation in a competitive aggression paradigm. Influences of cortisol and provocation on emotional face processing were then investigated with reaction times and event-related potentials (ERPs) in an emotional Stroop task. In line with previous results, enhanced early and later positive, posterior ERP components indicated a provocation-induced enhanced relevance for all kinds of social information. Cortisol, however, reduced an early frontocentral bias for angry faces and--despite the provocation-enhancing relevance--led to faster reactions for all facial expressions in highly provoked participants. The results thus support the moderating role of social information processing in the 'vicious circle of stress and aggression'. Copyright © 2010 Elsevier Inc. All rights reserved.

  14. How to test the threat-simulation theory.

    PubMed

    Revonsuo, Antti; Valli, Katja

    2008-12-01

    Malcolm-Smith, Solms, Turnbull and Tredoux [Malcolm-Smith, S., Solms, M.,Turnbull, O., & Tredoux, C. (2008). Threat in dreams: An adaptation? Consciousness and Cognition, 17, 1281-1291.] have made an attempt to test the Threat-Simulation Theory (TST), a theory offering an evolutionary psychological explanation for the function of dreaming [Revonsuo, A. (2000a). The reinterpretation of dreams: An evolutionary hypothesis of the function of dreaming. Behavioral and Brain Sciences, 23(6), 877-901]. Malcolm-Smith et al. argue that empirical evidence from their own study as well as from some other studies in the literature does not support the main predictions of the TST: that threatening events are frequent and overrepresented in dreams, that exposure to real threats activates the threat-simulation system, and that dream threats contain realistic rehearsals of threat avoidance responses. Other studies, including our own, have come up with results and conclusions that are in conflict with those of Malcolm-Smith et al. In this commentary, we provide an analysis of the sources of these disagreements, and their implications to the TST. Much of the disagreement seems to stem from differing interpretations of the theory and, consequently, of differing methods to test it.

  15. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  16. Threatening scenes but not threatening faces shorten time-to-contact estimates.

    PubMed

    DeLucia, Patricia R; Brendel, Esther; Hecht, Heiko; Stacy, Ryan L; Larsen, Jeff T

    2014-08-01

    We previously reported that time-to-contact (TTC) judgments of threatening scene pictures (e.g., frontal attacks) resulted in shortened estimations and were mediated by cognitive processes, and that judgments of threatening (e.g., angry) face pictures resulted in a smaller effect and did not seem cognitively mediated. In the present study, the effects of threatening scenes and faces were compared in two different tasks. An effect of threatening scene pictures occurred in a prediction-motion task, which putatively requires cognitive motion extrapolation, but not in a relative TTC judgment task, which was designed to be less reliant on cognitive processes. An effect of threatening face pictures did not occur in either task. We propose that an object's explicit potential of threat per se, and not only emotional valence, underlies the effect of threatening scenes on TTC judgments and that such an effect occurs only when the task allows sufficient cognitive processing. Results are consistent with distinctions between predator and social fear systems and different underlying physiological mechanisms. Not all threatening information elicits the same responses, and whether an effect occurs at all may depend on the task and the degree to which the task involves cognitive processes.

  17. The Perceived Threat of Affirmative Action Policy

    DTIC Science & Technology

    1975-06-06

    as- sumption was made that affirmative action threat was a phenomenon which was separate and distinct from general racial feelings. The...the respond- ents. However, affirmative action threat was found to be differentially related to general racial feelings at the .001 confidence...level. Thus, affirmative action threat feelings were not independent from general racial feelings. Based on the findings of this study, it was

  18. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... threat; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... SECURITY: GENERAL RULES Security Threat Assessments § 1540.205 Procedures for security threat assessment...

  19. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart. (a...

  20. Analysis of trade-offs between threats of invasion by nonnative brook trout (Salvelinus fontinalis) and intentional isolation for native westslope cutthroat trout (Oncorhynchus clarkii lewisi)

    Treesearch

    Douglas P. Peterson; Bruce E. Reiman; Jason B. Dunham; Kurt D. Fausch; Michael K. Young

    2008-01-01

    Native salmonid fishes often face simultaneous threats from habitat fragmentation and invasion by nonnative trout species. Unfortunately, management actions to address one may create or exacerbate the other. A consistent decision process would include a systematic analysis of when and where intentional use or removal of barriers is the most appropriate action. We...

  1. Too real for comfort? Uncanny responses to computer generated faces

    PubMed Central

    MacDorman, Karl F.; Green, Robert D.; Ho, Chin-Chang; Koch, Clinton T.

    2014-01-01

    As virtual humans approach photorealistic perfection, they risk making real humans uncomfortable. This intriguing phenomenon, known as the uncanny valley, is well known but not well understood. In an effort to demystify the causes of the uncanny valley, this paper proposes several perceptual, cognitive, and social mechanisms that have already helped address riddles like empathy, mate selection, threat avoidance, cognitive dissonance, and psychological defenses. In the four studies described herein, a computer generated human character’s facial proportions, skin texture, and level of detail were varied to examine their effect on perceived eeriness, human likeness, and attractiveness. In Study I, texture photorealism and polygon count increased human likeness. In Study II, texture photorealism heightened the accuracy of human judgments of ideal facial proportions. In Study III, atypical facial proportions were shown to be more disturbing on photorealistic faces than on other faces. In Study IV, a mismatch in the size and texture of the eyes and face was especially prone to make a character eerie. These results contest the depiction of the uncanny valley as a simple relation between comfort level and human likeness. This paper concludes by introducing a set of design principles for bridging the uncanny valley. PMID:25506126

  2. A Systematic Screen of FDA-Approved Drugs for Inhibitors of Biological Threat Agents

    PubMed Central

    Madrid, Peter B.; Chopra, Sidharth; Manger, Ian D.; Gilfillan, Lynne; Keepers, Tiffany R.; Shurtleff, Amy C.; Green, Carol E.; Iyer, Lalitha V.; Dilks, Holli Hutcheson; Davey, Robert A.; Kolokoltsov, Andrey A.; Carrion, Ricardo; Patterson, Jean L.; Bavari, Sina; Panchal, Rekha G.; Warren, Travis K.; Wells, Jay B.; Moos, Walter H.; Burke, RaeLyn L.; Tanga, Mary J.

    2013-01-01

    Background The rapid development of effective medical countermeasures against potential biological threat agents is vital. Repurposing existing drugs that may have unanticipated activities as potential countermeasures is one way to meet this important goal, since currently approved drugs already have well-established safety and pharmacokinetic profiles in patients, as well as manufacturing and distribution networks. Therefore, approved drugs could rapidly be made available for a new indication in an emergency. Methodology/Principal Findings A large systematic effort to determine whether existing drugs can be used against high containment bacterial and viral pathogens is described. We assembled and screened 1012 FDA-approved drugs for off-label broad-spectrum efficacy against Bacillus anthracis; Francisella tularensis; Coxiella burnetii; and Ebola, Marburg, and Lassa fever viruses using in vitro cell culture assays. We found a variety of hits against two or more of these biological threat pathogens, which were validated in secondary assays. As expected, antibiotic compounds were highly active against bacterial agents, but we did not identify any non-antibiotic compounds with broad-spectrum antibacterial activity. Lomefloxacin and erythromycin were found to be the most potent compounds in vivo protecting mice against Bacillus anthracis challenge. While multiple virus-specific inhibitors were identified, the most noteworthy antiviral compound identified was chloroquine, which disrupted entry and replication of two or more viruses in vitro and protected mice against Ebola virus challenge in vivo. Conclusions/Significance The feasibility of repurposing existing drugs to face novel threats is demonstrated and this represents the first effort to apply this approach to high containment bacteria and viruses. PMID:23577127

  3. Face recognition system and method using face pattern words and face pattern bytes

    DOEpatents

    Zheng, Yufeng

    2014-12-23

    The present invention provides a novel system and method for identifying individuals and for face recognition utilizing facial features for face identification. The system and method of the invention comprise creating facial features or face patterns called face pattern words and face pattern bytes for face identification. The invention also provides for pattern recognitions for identification other than face recognition. The invention further provides a means for identifying individuals based on visible and/or thermal images of those individuals by utilizing computer software implemented by instructions on a computer or computer system and a computer readable medium containing instructions on a computer system for face recognition and identification.

  4. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    PubMed Central

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  5. Stereotype threat lowers older adults’ self-reported hearing abilities

    PubMed Central

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  6. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    PubMed

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  7. Childhood maltreatment and threats with weapons.

    PubMed

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  8. The effect of emotionally valenced eye region images on visuocortical processing of surprised faces.

    PubMed

    Li, Shuaixia; Li, Ping; Wang, Wei; Zhu, Xiangru; Luo, Wenbo

    2018-05-01

    In this study, we presented pictorial representations of happy, neutral, and fearful expressions projected in the eye regions to determine whether the eye region alone is sufficient to produce a context effect. Participants were asked to judge the valence of surprised faces that had been preceded by a picture of an eye region. Behavioral results showed that affective ratings of surprised faces were context dependent. Prime-related ERPs with presentation of happy eyes elicited a larger P1 than those for neutral and fearful eyes, likely due to the recognition advantage provided by a happy expression. Target-related ERPs showed that surprised faces in the context of fearful and happy eyes elicited dramatically larger C1 than those in the neutral context, which reflected the modulation by predictions during the earliest stages of face processing. There were larger N170 with neutral and fearful eye contexts compared to the happy context, suggesting faces were being integrated with contextual threat information. The P3 component exhibited enhanced brain activity in response to faces preceded by happy and fearful eyes compared with neutral eyes, indicating motivated attention processing may be involved at this stage. Altogether, these results indicate for the first time that the influence of isolated eye regions on the perception of surprised faces involves preferential processing at the early stages and elaborate processing at the late stages. Moreover, higher cognitive processes such as predictions and attention can modulate face processing from the earliest stages in a top-down manner. © 2017 Society for Psychophysiological Research.

  9. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  10. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  11. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  12. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  13. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  14. Stereotype Threat in Classroom Settings: The Interactive Effect of Domain Identification, Task Difficulty and Stereotype Threat on Female Students' Maths Performance

    ERIC Educational Resources Information Center

    Keller, Johannes

    2007-01-01

    Background: Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths…

  15. Salient eyes deter conspecific nest intruders in wild jackdaws (Corvus monedula).

    PubMed

    Davidson, Gabrielle L; Clayton, Nicola S; Thornton, Alex

    2014-02-01

    Animals often respond fearfully when encountering eyes or eye-like shapes. Although gaze aversion has been documented in mammals when avoiding group-member conflict, the importance of eye coloration during interactions between conspecifics has yet to be examined in non-primate species. Jackdaws (Corvus monedula) have near-white irides, which are conspicuous against their dark feathers and visible when seen from outside the cavities where they nest. Because jackdaws compete for nest sites, their conspicuous eyes may act as a warning signal to indicate that a nest is occupied and deter intrusions by conspecifics. We tested whether jackdaws' pale irides serve as a deterrent to prospecting conspecifics by comparing prospectors' behaviour towards nest-boxes displaying images with bright eyes (BEs) only, a jackdaw face with natural BEs, or a jackdaw face with dark eyes. The jackdaw face with BEs was most effective in deterring birds from making contact with nest-boxes, whereas both BE conditions reduced the amount of time jackdaws spent in proximity to the image. We suggest BEs in jackdaws may function to prevent conspecific competitors from approaching occupied nest sites.

  16. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    PubMed Central

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  17. Airborne Particulate Threat Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. governmentmore » agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing

  18. Virtual & Real Face to Face Teaching

    ERIC Educational Resources Information Center

    Teneqexhi, Romeo; Kuneshka, Loreta

    2016-01-01

    In traditional "face to face" lessons, during the time the teacher writes on a black or white board, the students are always behind the teacher. Sometimes, this happens even in the recorded lesson in videos. Most of the time during the lesson, the teacher shows to the students his back not his face. We do not think the term "face to…

  19. Combating the Insider Cyber Threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  20. Keeping Schools Safe through Threat Assessment

    ERIC Educational Resources Information Center

    Barton, Rhonda

    2008-01-01

    This article illustrates how effective a threat assessment program like the Mid-Valley Student Threat Assessment (STAT) program can be in dealing with violent and threatening students. STAT is a a regional system that draws together resources from schools, mental health agencies, law enforcement bureaus, and other youth-serving organizations in…

  1. Framing faces: Frame alignment impacts holistic face perception.

    PubMed

    Curby, Kim M; Entenman, Robert

    2016-11-01

    Traditional accounts of face perception emphasise the importance of the prototypical configuration of features within faces. However, here we probe influences of more general perceptual grouping mechanisms on holistic face perception. Participants made part-matching judgments about composite faces presented in intact external oval frames or frames made from misaligned oval parts. This manipulation served to disrupt basic perceptual grouping cues that facilitate the grouping of the two face halves together. This manipulation also produced an external face contour like that in the standard misaligned condition used within the classic composite face task. Notably, by introducing a discontinuity in the external contour, grouping of the face halves into a cohesive unit was discouraged, but face configuration was preserved. Conditions where both the face parts and the frames were misaligned together, as in the typical composite task paradigm, or where just the internal face parts where misaligned, were also included. Disrupting only the face frame similarly disrupted holistic face perception as disrupting both the frame and face configuration. However, misaligned face parts presented in aligned frames also incurred a cost to holistic perception. These findings provide support for the contribution of general-purpose perceptual grouping mechanisms to holistic face perception and are presented and discussed in the context of an enhanced object-based selection account of holistic perception.

  2. The face of conservation responding to a dynamically changing world.

    PubMed

    Wiederholt, Ruscena; Trainor, Anne M; Michel, Nicole; Shirey, Patrick D; Swaisgood, Ronald R; Tallamy, Doug; Cook-Patton, Susan C

    2015-09-01

    In its 40-year history, the science of conservation has faced unprecedented challenges in terms of environmental damage and rapid global change, and environmental problems are only increasing as greater demands are placed on limited natural resources. Conservation science has been adapting to keep pace with these changes. Here, we highlight contemporary and emerging trends and innovations in conservation science that we believe represent the most effective responses to biodiversity threats. We focus on specific areas where conservation science has had to adjust its approach to address emerging threats to biodiversity, including habitat destruction and degradation, climate change, declining populations and invasive species. We also document changes in attitudes, norms and practices among conservation scientists. A key component to success is engaging and maintaining public support for conservation, which can be facilitated through the use of technology. These recent trends in conservation and management are innovative and will assist in optimizing conservation strategies, increasing our leverage with the general public and tackling our current environmental challenges. © 2015 International Society of Zoological Sciences, Institute of Zoology/Chinese Academy of Sciences and Wiley Publishing Asia Pty Ltd.

  3. The wandering mind of men: ERP evidence for gender differences in attention bias towards attractive opposite sex faces

    PubMed Central

    Crawford, Helen; van Vugt, Mark

    2011-01-01

    To examine the time course and automaticity of our attention bias towards attractive opposite sex faces, event-related potentials (ERPs) were recorded from 20 males and 20 females while they carried out a covert orienting task. Faces that were high, low or average in attractiveness, were presented in focus of attention, but were unrelated to task goals. Across the entire sample larger P2 amplitudes were found in response to both attractive and unattractive opposite sex faces, presumably reflecting early implicit selective attention to distinctive faces. In male but not female participants this was followed by an increased late slow wave for the attractive faces, signifying heightened processing linked to motivated attention. This latter finding is consistent with sexual strategy theory, which suggests that men and women have evolved to pursue different mating strategies with men being more attentive to cues such as facial beauty. In general, our ERP results suggest that, in addition to threat-related stimuli, other evolutionary-relevant information is also prioritized by our attention systems. PMID:20601424

  4. The wandering mind of men: ERP evidence for gender differences in attention bias towards attractive opposite sex faces.

    PubMed

    van Hooff, Johanna C; Crawford, Helen; van Vugt, Mark

    2011-09-01

    To examine the time course and automaticity of our attention bias towards attractive opposite sex faces, event-related potentials (ERPs) were recorded from 20 males and 20 females while they carried out a covert orienting task. Faces that were high, low or average in attractiveness, were presented in focus of attention, but were unrelated to task goals. Across the entire sample larger P2 amplitudes were found in response to both attractive and unattractive opposite sex faces, presumably reflecting early implicit selective attention to distinctive faces. In male but not female participants this was followed by an increased late slow wave for the attractive faces, signifying heightened processing linked to motivated attention. This latter finding is consistent with sexual strategy theory, which suggests that men and women have evolved to pursue different mating strategies with men being more attentive to cues such as facial beauty. In general, our ERP results suggest that, in addition to threat-related stimuli, other evolutionary-relevant information is also prioritized by our attention systems.

  5. Predictive Features of a Cockpit Traffic Display: A Workload Assessment

    NASA Technical Reports Server (NTRS)

    Wickens, Christopher D.; Morphew, Ephimia

    1997-01-01

    Eighteen pilots flew a series of traffic avoidance maneuvers in an experiment designed to assess the support offered and workload imposed by different levels of traffic display information in a free flight simulation. Three display prototypes were compared which differed in traffic information provided. A BASELINE (BL) display provided current and (2nd order) predicted information regarding ownship and current information of an intruder aircraft, represented on lateral and vertical displays in a coplanar suite. An INTRUDER PREDICTOR (IP) display, augmented the baseline display by providing lateral and vertical prediction of the intruder aircraft. A THREAT VECTOR (TV) display added to the IP display a vector that indicates the direction from ownship to the intruder at the predicted point of closest contact (POCC). The length of the vector corresponds to the radius of the protected zone, and the distance of the intersection of the vector with ownship predictor, corresponds to the time available till POCC or loss of separation. Pilots time shared the traffic avoidance task with a secondary task requiring them to monitor the top of the display for faint targets. This task simulated the visual demands of out-of-cockpit scanning, and hence was used to estimate the head-down time required by the different display formats. The results revealed that both display augmentations improved performance (safety) as assessed by predicted and actual loss of separation (i.e., penetration of the protected zone). Both enhancements also reduced workload, as assessed by the NASA TLX scale. The intruder predictor display produced these benefits with no substantial impact on the qualitative nature of the avoidance maneuvers that were selected. The threat vector produced the safety benefits by inducing a greater degree of (effective) lateral maneuvering, thus partially offsetting the benefits of reduced workload. The three displays did not differ in terms of their effect on performance of

  6. Four billion people facing severe water scarcity

    PubMed Central

    Mekonnen, Mesfin M.; Hoekstra, Arjen Y.

    2016-01-01

    Freshwater scarcity is increasingly perceived as a global systemic risk. Previous global water scarcity assessments, measuring water scarcity annually, have underestimated experienced water scarcity by failing to capture the seasonal fluctuations in water consumption and availability. We assess blue water scarcity globally at a high spatial resolution on a monthly basis. We find that two-thirds of the global population (4.0 billion people) live under conditions of severe water scarcity at least 1 month of the year. Nearly half of those people live in India and China. Half a billion people in the world face severe water scarcity all year round. Putting caps to water consumption by river basin, increasing water-use efficiencies, and better sharing of the limited freshwater resources will be key in reducing the threat posed by water scarcity on biodiversity and human welfare. PMID:26933676

  7. Four billion people facing severe water scarcity.

    PubMed

    Mekonnen, Mesfin M; Hoekstra, Arjen Y

    2016-02-01

    Freshwater scarcity is increasingly perceived as a global systemic risk. Previous global water scarcity assessments, measuring water scarcity annually, have underestimated experienced water scarcity by failing to capture the seasonal fluctuations in water consumption and availability. We assess blue water scarcity globally at a high spatial resolution on a monthly basis. We find that two-thirds of the global population (4.0 billion people) live under conditions of severe water scarcity at least 1 month of the year. Nearly half of those people live in India and China. Half a billion people in the world face severe water scarcity all year round. Putting caps to water consumption by river basin, increasing water-use efficiencies, and better sharing of the limited freshwater resources will be key in reducing the threat posed by water scarcity on biodiversity and human welfare.

  8. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    PubMed

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  9. How Well Do Computer-Generated Faces Tap Face Expertise?

    PubMed

    Crookes, Kate; Ewing, Louise; Gildenhuys, Ju-Dith; Kloth, Nadine; Hayward, William G; Oxner, Matt; Pond, Stephen; Rhodes, Gillian

    2015-01-01

    The use of computer-generated (CG) stimuli in face processing research is proliferating due to the ease with which faces can be generated, standardised and manipulated. However there has been surprisingly little research into whether CG faces are processed in the same way as photographs of real faces. The present study assessed how well CG faces tap face identity expertise by investigating whether two indicators of face expertise are reduced for CG faces when compared to face photographs. These indicators were accuracy for identification of own-race faces and the other-race effect (ORE)-the well-established finding that own-race faces are recognised more accurately than other-race faces. In Experiment 1 Caucasian and Asian participants completed a recognition memory task for own- and other-race real and CG faces. Overall accuracy for own-race faces was dramatically reduced for CG compared to real faces and the ORE was significantly and substantially attenuated for CG faces. Experiment 2 investigated perceptual discrimination for own- and other-race real and CG faces with Caucasian and Asian participants. Here again, accuracy for own-race faces was significantly reduced for CG compared to real faces. However the ORE was not affected by format. Together these results signal that CG faces of the type tested here do not fully tap face expertise. Technological advancement may, in the future, produce CG faces that are equivalent to real photographs. Until then caution is advised when interpreting results obtained using CG faces.

  10. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  11. Independent component analysis (ICA) and self-organizing map (SOM) approach to multidetection system for network intruders

    NASA Astrophysics Data System (ADS)

    Abdi, Abdi M.; Szu, Harold H.

    2003-04-01

    With the growing rate of interconnection among computer systems, network security is becoming a real challenge. Intrusion Detection System (IDS) is designed to protect the availability, confidentiality and integrity of critical network information systems. Today"s approach to network intrusion detection involves the use of rule-based expert systems to identify an indication of known attack or anomalies. However, these techniques are less successful in identifying today"s attacks. Hackers are perpetually inventing new and previously unanticipated techniques to compromise information infrastructure. This paper proposes a dynamic way of detecting network intruders on time serious data. The proposed approach consists of a two-step process. Firstly, obtaining an efficient multi-user detection method, employing the recently introduced complexity minimization approach as a generalization of a standard ICA. Secondly, we identified unsupervised learning neural network architecture based on Kohonen"s Self-Organizing Map for potential functional clustering. These two steps working together adaptively will provide a pseudo-real time novelty detection attribute to supplement the current intrusion detection statistical methodology.

  12. Nucleon-anti-nucleon intruder state of Dirac equation for nucleon in deep scalar potential well

    NASA Astrophysics Data System (ADS)

    Kuo, T. T. S.; Kuo, T. K.; Osnes, E.; Shu, S.

    We solve the Dirac radial equation for a nucleon in a scalar Woods-Saxon potential well of depth V0 and radius r0. A sequence of values for the depth and radius are considered. For shallow potentials with -1000MeV ≤ V0 < 0 the wave functions for the positive-energy states ψ+(r) are dominated by their nucleon component f(r). But for deeper potentials with V0 ≤ -1500MeV the ψ+(r) s begin to have dominant anti-nucleon component f(r). In particular, a special intruder state enters with wave function ψ1/2(r) and energy E1/2. We have considered several r0 values between 2 and 8fm. For V0 ≤ -2000 MeV and the above r0 values. ψ1/2(r) is the only bound positive-energy state and has its g(r) closely equal to -f(r), both having a narrow wave packet shape centered around r0. The E1/2 of this state is practically independent of V0 for the above V0 range and obeys closely the relation E1/2 = ℏc/r0.

  13. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... prevent completion of the threat assessment). (5) Gender. (6) Country of citizenship. (7) If the applicant... subpart remains valid for five years from the date that TSA issues a Determination of No Security Threat...

  14. Project GUARDIAN: proposals for the development of information technology policy in context of the war on terror

    NASA Astrophysics Data System (ADS)

    Gallington, Daniel J.

    2004-09-01

    Heretofore, we always thought of our greatest national security threats as being external. Now, however, the threat is pervasive, i.e., internal as well. As the attacks of September 11, 2001 exhibited, the old methods of collecting and analyzing information have failed to protect us from the terrorist threat. While new technologies exist to counter terrorism, there is a hesitation to accept many of these for fear that they intrude upon personal privacy. Hence, the Potomac Institute is seeking to create the policy paradigm that will allow for the use of new information technologies that will enable the disruption of terrorist before they occur, while protecting our fundamental civil liberties.

  15. Stereotype Threat Alters the Subjective Experience of Memory.

    PubMed

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  16. Pictures cueing threat: brain dynamics in viewing explicitly instructed danger cues

    PubMed Central

    Schupp, Harald T.

    2012-01-01

    Recent event-related brain potential studies revealed the selective processing of emotional and threatening pictures. Integrating the picture viewing and threat-of-shock paradigm, the present study examined the processing of emotional pictures while they were explicitly instructed to cue threat of real world danger (i.e. electric shocks). Toward this end, 60 pleasant, neutral and unpleasant IAPS-pictures were presented (1 s) as a continuous random stream while high-density EEG and self-reported threat were assessed. In three experimental runs, each picture category was used once as a threat-cue, whereas in the other conditions the same category served as safety-cue. An additional passive viewing run served as a no-threat condition, thus, establishing a threat–safety continuum (threat-cue–safety-cue–no-threat) for each picture category. Threat-of-shock modulated P1, P2 and parieto-occipital LPP amplitudes. While the P1 component differentiated among threat- and no-threat conditions, the P2 and LPP effects were specific to pictures signaling threat-of-shock. Thus, stimulus processing progressively gained more accurate information about environmental threat conditions. Interestingly, the finding of increased EPN and centro-parietal LPP amplitudes to emotional pictures was independent from threat-of-shock manipulation. Accordingly, the results indicate distinct effects associated with the intrinsic significance of emotional pictures and explicitly instructed threat contingencies. PMID:21719425

  17. Eastern forest environmental threat assessment center

    Treesearch

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  18. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  19. Working memory regulates trait anxiety-related threat processing biases.

    PubMed

    Booth, Robert W; Mackintosh, Bundy; Sharma, Dinkar

    2017-06-01

    High trait anxious individuals tend to show biased processing of threat. Correlational evidence suggests that executive control could be used to regulate such threat-processing. On this basis, we hypothesized that trait anxiety-related cognitive biases regarding threat should be exaggerated when executive control is experimentally impaired by loading working memory. In Study 1, 68 undergraduates read ambiguous vignettes under high and low working memory load; later, their interpretations of these vignettes were assessed via a recognition test. Trait anxiety predicted biased interpretation of social threat vignettes under high working memory load, but not under low working memory load. In Study 2, 53 undergraduates completed a dot probe task with fear-conditioned Japanese characters serving as threat stimuli. Trait anxiety predicted attentional bias to the threat stimuli but, again, this only occurred under high working memory load. Interestingly however, actual eye movements toward the threat stimuli were only associated with state anxiety, and this was not moderated by working memory load, suggesting that executive control regulates biased threat-processing downstream of initial input processes such as orienting. These results suggest that cognitive loads can exacerbate trait anxiety-related cognitive biases, and therefore represent a useful tool for assessing cognitive biases in future research. More importantly, since biased threat-processing has been implicated in the etiology and maintenance of anxiety, poor executive control may be a risk factor for anxiety disorders. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. Pervasive competition between threat and reward in the brain

    PubMed Central

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip

    2014-01-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the ‘salience hypothesis’, in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the ‘competition hypothesis’, the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. PMID:23547242

  1. Interactions between stereotype threat, subjective aging, and memory in older adults.

    PubMed

    Marquet, Manon; Missotten, Pierre; Dardenne, Benoit; Adam, Stéphane

    2017-12-08

    This study examined whether the effects of stereotype threat on memory and subjective age were moderated by positive age stereotypes and self-perceptions of aging among older adults. Perceived threat as a mechanism underlying these effects was also explored. Results showed that stereotype threat (high vs. low threat) did not affect the dependent variables. Moreover, self-perceptions of aging did not moderate the effect of stereotype threat on the dependent variables. However, for people with more positive age stereotypes, older people under highthreat perceived more threat than people under low threat. This could be explained by an effect of age stereotypes in the high-threat group: the more positive age stereotypes held by participants, the more they perceived threat, which in turn decreased their memory performance and made them feel mentally older. We hypothesized that age group identity is stronger in people with more positive age stereotypes, which increase perceived threat.

  2. Status and threats analysis for the Florida manatee (Trichechus manatus latirostris), 2016

    USGS Publications Warehouse

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Hostetler, Jeffrey A.; Martin, Julien; Deutsch, Charles J.; Ward-Geiger, Leslie I.; Mahon, Gary L.

    2017-04-11

    exceptions are scenarios in which the rate of watercraft-related mortality increases, carrying capacity is only a fraction of the current estimates, a new chronic source of mortality emerges, or multiple threats emerge in concert. Even in these scenarios, however, the risk of falling below 500 adults on either the East coast or the Gulf coast within 100 years from 2011 is less than 10 percent. High adult survival provides the population with strong resilience to a variety of current and future threats. On the basis of these analyses, we conclude that if these threats continue to be managed effectively, manatees are likely to persist on both coasts of Florida and remain an integral part of the coastal Florida ecosystem through the 21st century. If vigilance in management is reduced, however, the scenarios in which manatees could face risk of decline become more likely.

  3. An examination of stereotype threat effects on girls' mathematics performance.

    PubMed

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias.

  4. Identity threat and stigma in cancer patients

    PubMed Central

    Marziliano, Allison; Moyer, Anne

    2014-01-01

    Cancer stigma has undergone an important transformation in recent decades. In general, this disease no longer fits squarely into Goffman’s classic taxonomy of stigmatized conditions. This review will demonstrate that, with important adaptations, an identity-threat model of stigma can be used to organize cancer stigma research post-Goffman. This adapted model postulates that one’s personal attributions, responses to situational threat, and disease/treatment characteristics can be used to predict identity threat and well-being of individuals with cancer. Implications for further research and clinical practice are discussed. PMID:28070343

  5. Modelling the tsunami threat to Sydney Harbour, Australia, with comparisons to historical events.

    NASA Astrophysics Data System (ADS)

    Wilson, O.; Power, H.

    2016-12-01

    Sydney Harbour is an iconic location with a dense population and low-lying development. On the east coast of Australia, facing the Pacific Ocean it is exposed to several tsunamigenic trenches. To date, this is the most detailed assessment of the potential for earthquake-generated tsunami impact on Sydney Harbour. The tsunami wave trains modelled include tsunami modelled from earthquakes of magnitude 7.5, 8.0, 8.5 and 9.0 MW from the Puysegur and New Hebrides trenches. Historical events from Chile in 1960 and Japan in 2011 are also modelled for comparison. Using the hydrodynamic model ANUGA, results show that the events modelled have the potential to cause high current speeds, hazardous waves and rapid changes in water level. These effects are most dramatic at pinch points such as Spit Bridge and Anzac Bridge, particularly with regard to current speeds. Large waves are shown to be a particular threat at the mouth of the harbour, where the bathymetry causes the tsunami wave train to shoal. Inundation is less of a hazard for the tsunami events modlled, although some inundation is evident at several low-lying embayments in the south of the harbour. These results will provide an evidence base for tsunami threat emergency management.

  6. Facing Aggression: Cues Differ for Female versus Male Faces

    PubMed Central

    Geniole, Shawn N.; Keyes, Amanda E.; Mondloch, Catherine J.; Carré, Justin M.; McCormick, Cheryl M.

    2012-01-01

    The facial width-to-height ratio (face ratio), is a sexually dimorphic metric associated with actual aggression in men and with observers' judgements of aggression in male faces. Here, we sought to determine if observers' judgements of aggression were associated with the face ratio in female faces. In three studies, participants rated photographs of female and male faces on aggression, femininity, masculinity, attractiveness, and nurturing. In Studies 1 and 2, for female and male faces, judgements of aggression were associated with the face ratio even when other cues in the face related to masculinity were controlled statistically. Nevertheless, correlations between the face ratio and judgements of aggression were smaller for female than for male faces (F1,36 = 7.43, p = 0.01). In Study 1, there was no significant relationship between judgements of femininity and of aggression in female faces. In Study 2, the association between judgements of masculinity and aggression was weaker in female faces than for male faces in Study 1. The weaker association in female faces may be because aggression and masculinity are stereotypically male traits. Thus, in Study 3, observers rated faces on nurturing (a stereotypically female trait) and on femininity. Judgements of nurturing were associated with femininity (positively) and masculinity (negatively) ratings in both female and male faces. In summary, the perception of aggression differs in female versus male faces. The sex difference was not simply because aggression is a gendered construct; the relationships between masculinity/femininity and nurturing were similar for male and female faces even though nurturing is also a gendered construct. Masculinity and femininity ratings are not associated with aggression ratings nor with the face ratio for female faces. In contrast, all four variables are highly inter-correlated in male faces, likely because these cues in male faces serve as “honest signals”. PMID:22276184

  7. Facing aggression: cues differ for female versus male faces.

    PubMed

    Geniole, Shawn N; Keyes, Amanda E; Mondloch, Catherine J; Carré, Justin M; McCormick, Cheryl M

    2012-01-01

    The facial width-to-height ratio (face ratio), is a sexually dimorphic metric associated with actual aggression in men and with observers' judgements of aggression in male faces. Here, we sought to determine if observers' judgements of aggression were associated with the face ratio in female faces. In three studies, participants rated photographs of female and male faces on aggression, femininity, masculinity, attractiveness, and nurturing. In Studies 1 and 2, for female and male faces, judgements of aggression were associated with the face ratio even when other cues in the face related to masculinity were controlled statistically. Nevertheless, correlations between the face ratio and judgements of aggression were smaller for female than for male faces (F(1,36) = 7.43, p = 0.01). In Study 1, there was no significant relationship between judgements of femininity and of aggression in female faces. In Study 2, the association between judgements of masculinity and aggression was weaker in female faces than for male faces in Study 1. The weaker association in female faces may be because aggression and masculinity are stereotypically male traits. Thus, in Study 3, observers rated faces on nurturing (a stereotypically female trait) and on femininity. Judgements of nurturing were associated with femininity (positively) and masculinity (negatively) ratings in both female and male faces. In summary, the perception of aggression differs in female versus male faces. The sex difference was not simply because aggression is a gendered construct; the relationships between masculinity/femininity and nurturing were similar for male and female faces even though nurturing is also a gendered construct. Masculinity and femininity ratings are not associated with aggression ratings nor with the face ratio for female faces. In contrast, all four variables are highly inter-correlated in male faces, likely because these cues in male faces serve as "honest signals".

  8. You may worry, but can you recognize threats when you see them?; Neuroticism, threat identifications, and negative affect.

    PubMed

    Tamir, Maya; Robinson, Michael D; Solberg, Emily Crawford

    2006-10-01

    The present studies sought to investigate the hedonic consequences of threat-identification skills at low and high levels of neuroticism. Such skills were assessed in terms of both speed (Study 1) and accuracy (Study 2) of identifying threatening objects in cognitive tasks. As predicted, threat-identification skills interacted with trait neuroticism in predicting subjective experiences. Specifically, individuals high in neuroticism experienced lower levels of negative affect during their everyday lives if they were also skilled in identifying threats in the cognitive tasks (Studies 1-2). Such skills did not matter at low levels of neuroticism. This interactive pattern was also replicated in the context of life domain satisfaction (Study 2). The results support the view that avoidance motivation encompasses multiple component processes, including some that are cognitive in nature, and specifically extends self-regulatory views of neuroticism. Of most importance, our data indicate that threat-identification skills can be hedonically beneficial, rather than costly, at high levels of neuroticism.

  9. Communicating Homeland Security Threats: Government and Public Efforts

    DTIC Science & Technology

    2010-12-01

    States has never operated at a threat level lower than blue - guarded risk. The Homeland Security Advisory Council’s primary recommendations included...changing the alert level baseline to blue (guarded risk). Their rationale for resetting the threat level baseline includes acknowledging that a...accustomed to the guarded blue level indicative of a general threat of terrorist attack. To assume that public officials and citizens would ever

  10. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  11. Pervasive competition between threat and reward in the brain.

    PubMed

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  12. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    PubMed

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  13. The many faces of research on face perception.

    PubMed

    Little, Anthony C; Jones, Benedict C; DeBruine, Lisa M

    2011-06-12

    Face perception is fundamental to human social interaction. Many different types of important information are visible in faces and the processes and mechanisms involved in extracting this information are complex and can be highly specialized. The importance of faces has long been recognized by a wide range of scientists. Importantly, the range of perspectives and techniques that this breadth has brought to face perception research has, in recent years, led to many important advances in our understanding of face processing. The articles in this issue on face perception each review a particular arena of interest in face perception, variously focusing on (i) the social aspects of face perception (attraction, recognition and emotion), (ii) the neural mechanisms underlying face perception (using brain scanning, patient data, direct stimulation of the brain, visual adaptation and single-cell recording), and (iii) comparative aspects of face perception (comparing adult human abilities with those of chimpanzees and children). Here, we introduce the central themes of the issue and present an overview of the articles.

  14. Prefrontal Reactivity to Social Signals of Threat as a Predictor of Treatment Response in Anxious Youth

    PubMed Central

    Kujawa, Autumn; Swain, James E; Hanna, Gregory L; Koschmann, Elizabeth; Simpson, David; Connolly, Sucheta; Fitzgerald, Kate D; Monk, Christopher S; Phan, K Luan

    2016-01-01

    Neuroimaging has shown promise as a tool to predict likelihood of treatment response in adult anxiety disorders, with potential implications for clinical decision-making. Despite the relatively high prevalence and emergence of anxiety disorders in youth, very little work has evaluated neural predictors of response to treatment. The goal of the current study was to examine brain function during emotional face processing as a predictor of response to treatment in children and adolescents (age 7–19 years; N=41) with generalized, social, and/or separation anxiety disorder. Prior to beginning treatment with the selective serotonin reuptake inhibitor (SSRI) sertraline or cognitive behavior therapy (CBT), participants completed an emotional faces matching task during functional magnetic resonance imaging (fMRI). Whole brain responses to threatening (ie, angry and fearful) and happy faces were examined as predictors of change in anxiety severity following treatment. Greater activation in inferior and superior frontal gyri, including dorsolateral prefrontal cortex and ventrolateral prefrontal cortex, as well as precentral/postcentral gyri during processing of threatening faces predicted greater response to CBT and SSRI treatment. For processing of happy faces, activation in postcentral gyrus was a significant predictor of treatment response. Post-hoc analyses indicated that effects were not significantly moderated by type of treatment. Findings suggest that greater activation in prefrontal regions involved in appraising and regulating responses to social signals of threat predict better response to SSRI and CBT treatment in anxious youth and that neuroimaging may be a useful tool for predicting how youth will respond to treatment. PMID:26708107

  15. Stereotype threat in salary negotiations is mediated by reservation salary.

    PubMed

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  16. Face-space: A unifying concept in face recognition research.

    PubMed

    Valentine, Tim; Lewis, Michael B; Hills, Peter J

    2016-10-01

    The concept of a multidimensional psychological space, in which faces can be represented according to their perceived properties, is fundamental to the modern theorist in face processing. Yet the idea was not clearly expressed until 1991. The background that led to the development of face-space is explained, and its continuing influence on theories of face processing is discussed. Research that has explored the properties of the face-space and sought to understand caricature, including facial adaptation paradigms, is reviewed. Face-space as a theoretical framework for understanding the effect of ethnicity and the development of face recognition is evaluated. Finally, two applications of face-space in the forensic setting are discussed. From initially being presented as a model to explain distinctiveness, inversion, and the effect of ethnicity, face-space has become a central pillar in many aspects of face processing. It is currently being developed to help us understand adaptation effects with faces. While being in principle a simple concept, face-space has shaped, and continues to shape, our understanding of face perception.

  17. A combined emitter threat assessment method based on ICW-RCM

    NASA Astrophysics Data System (ADS)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  18. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    PubMed

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Defense policy planners and countermeasure developers are often faced with vexing problems involving the prioritization of resources and efforts. This is especially true in the area of Biodefense, where each new emerging infectious disease outbreak brings with it questions regarding the causative agent's potential for weaponization. Recent experience with West Nile Virus, Severe Acute Respiratory Syndrome, Monkeypox, and H1N1 Influenza highlights this problem. Appropriately, in each of these cases, the possibility of bioterrorism was raised, although each outbreak ultimately proved to have a natural origin. In fact, determining whether an outbreak has an unnatural origin can be quite difficult. Thus, the questions remain: could the causative agents of these and other emerging infectious disease outbreaks pose a future weaponization threat? And how great is that threat? Should precious resources be diverted from other defense efforts in order to prepare for possible hostile employment of novel diseases by belligerents? Answering such critical questions requires some form of systematic threat assessment. Through extensive collaborative work conducted within NATO's Biomedical Advisory Council, we developed a scoring matrix for evaluating the weaponization potential of the causative agents of such diseases and attempted to validate our matrix by examining the reproducibility of data using known threat agents. Our matrix included 12 attributes of a potential weapon and was provided, along with detailed scoring instructions, to 12 groups of biodefense experts in 6 NATO nations. Study participants were asked to score each of these 12 attributes on a scale of 0-3: Infectivity, Infection-to-Disease Ratio (Reliability), Predictability (& Incubation Period), Morbidity & Mortality (Virulence), Ease of Large-Scale Production & Storage, Aerosol Stability, Atmospheric Stability, Ease of Dispersal, Communicability, Prophylactic Countermeasure Availability, Therapeutic

  19. Left-Wing Extremism: The Current Threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders frommore » that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.« less

  20. Development of the Academic Stereotype Threat Inventory

    ERIC Educational Resources Information Center

    Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.

    2008-01-01

    The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…

  1. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    .... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...

  2. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...

  3. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  4. Advanced Insider Threat Mitigation Workshop Instructional Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing theirmore » effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.« less

  5. Implicit self-esteem compensation: automatic threat defense.

    PubMed

    Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly

    2007-11-01

    Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.

  6. Species co-occurrence analysis predicts management outcomes for multiple threats.

    PubMed

    Tulloch, Ayesha I T; Chadès, Iadine; Lindenmayer, David B

    2018-03-01

    Mitigating the impacts of global anthropogenic change on species is conservation's greatest challenge. Forecasting the effects of actions to mitigate threats is hampered by incomplete information on species' responses. We develop an approach to predict community restructuring under threat management, which combines models of responses to threats with network analyses of species co-occurrence. We discover that contributions by species to network co-occurrence predict their recovery under reduction of multiple threats. Highly connected species are likely to benefit more from threat management than poorly connected species. Importantly, we show that information from a few species on co-occurrence and expected responses to alternative threat management actions can be used to train a response model for an entire community. We use a unique management dataset for a threatened bird community to validate our predictions and, in doing so, demonstrate positive feedbacks in occurrence and co-occurrence resulting from shared threat management responses during ecosystem recovery.

  7. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    PubMed

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  8. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    PubMed Central

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2013-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat. PMID:22746674

  9. Stereotype threat can both enhance and impair older adults' memory.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  10. A decoy chain deployment method based on SDN and NFV against penetration attack

    PubMed Central

    Zhao, Qi; Zhang, Chuanhao

    2017-01-01

    Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack. PMID:29216257

  11. A decoy chain deployment method based on SDN and NFV against penetration attack.

    PubMed

    Zhao, Qi; Zhang, Chuanhao; Zhao, Zheng

    2017-01-01

    Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack.

  12. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  13. Quantifying a threat: Evidence of a numeric processing bias.

    PubMed

    Hamamouche, Karina A; Niemi, Laura; Cordes, Sara

    2017-06-01

    Humans prioritize the processing of threats over neutral stimuli; thus, not surprisingly, the presence of threats has been shown to alter performance on both perceptual and cognitive tasks. Yet whether the quantification process is disrupted in the presence of threat is unknown. In three experiments, we examined numerical estimation and discrimination abilities in adults in the context of threatening (spiders) and non-threatening (e.g., flowers) stimuli. Results of the numerical estimation task (Experiment 1) showed that participants underestimated the number of threatening relative to neutral stimuli. Additionally, numerical discrimination data reveal that participants' abilities to discriminate between the number of entities in two arrays were worsened when the arrays consisted of threatening entities versus neutral entities (Experiment 2). However, discrimination abilities were enhanced when threatening content was presented immediately before neutral dot arrays (Experiment 3). Together, these studies suggest that threats impact our processing of visual numerosity via changes in attention to numerical stimuli, and that the nature of the threat (intrinsic or extrinsic to the stimulus) is vital in determining the direction of this impact. Intrinsic threat content in stimuli impedes its own quantification; yet threat that is extrinsic to the sets to be enumerated enhances numerical processing for subsequently presented neutral stimuli. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Chapter 25: Pollution and Fishing Threats to Marbled Murrelets

    Treesearch

    D. Michael Fry

    1995-01-01

    The principal pollutant threats to Marbled Murrelets are chlorinated organic effluent discharges from chlorine bleach pulp mills located in California, Washington, and British Columbia. The distribution of murrelets away from riverine input of agricultural chemicals reduces the threat from these pollutants. Plastic ingestion does not appear to pose a serious threat to...

  15. Seeing faces is necessary for face-domain formation.

    PubMed

    Arcaro, Michael J; Schade, Peter F; Vincent, Justin L; Ponce, Carlos R; Livingstone, Margaret S

    2017-10-01

    Here we report that monkeys raised without exposure to faces did not develop face domains, but did develop domains for other categories and did show normal retinotopic organization, indicating that early face deprivation leads to a highly selective cortical processing deficit. Therefore, experience must be necessary for the formation (or maintenance) of face domains. Gaze tracking revealed that control monkeys looked preferentially at faces, even at ages prior to the emergence of face domains, but face-deprived monkeys did not, indicating that face looking is not innate. A retinotopic organization is present throughout the visual system at birth, so selective early viewing behavior could bias category-specific visual responses toward particular retinotopic representations, thereby leading to domain formation in stereotyped locations in inferotemporal cortex, without requiring category-specific templates or biases. Thus, we propose that environmental importance influences viewing behavior, viewing behavior drives neuronal activity, and neuronal activity sculpts domain formation.

  16. Proliferation: Threat and response

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of thesemore » weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.« less

  17. Threat evaluation for impact assessment in situation analysis systems

    NASA Astrophysics Data System (ADS)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  18. Personality Correlates of Nuclear War Threat Perception.

    ERIC Educational Resources Information Center

    Mayton, Daniel M., II

    This study investigated the relationship between individual personality characteristics and the threat of nuclear war among 192 introductory psychology students at a small college in the Pacific Northwest. One measure of nuclear threat perception was spontaneous concern, which was assessed using five presentations each of the incomplete sentences,…

  19. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    PubMed Central

    Pennington, Charlotte R.; McCann, Joseph J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females’ gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group’s ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females’ gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group’s gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat. PMID:29444126

  20. Identifying key conservation threats to Alpine birds through expert knowledge

    PubMed Central

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  1. Finding Hope in the Face-to-Face.

    PubMed

    Edgoose, Jennifer Y C; Edgoose, Julian M

    2017-05-01

    What does it mean to look into the face of a patient who looks back? Face-to-face encounters are at the heart of the patient-clinician relationship but their singular significance is often lost amid the demands of today's high-tech, metric-driven health care systems. Using the framework provided by the philosopher and Holocaust survivor Emmanuel Levinas, the authors explore the unique responsibility and potential for hope found only in face-to-face encounters. Revisiting this most fundamental attribute of medicine is likely our greatest chance to reclaim who we are as clinicians and why we do what we do. © 2017 Annals of Family Medicine, Inc.

  2. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    PubMed

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  3. Prefrontal inhibition of threat processing reduces working memory interference

    PubMed Central

    Clarke, Robert; Johnstone, Tom

    2013-01-01

    Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM) task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modeling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesized that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat-related interference. PMID

  4. The wilderness threats matrix: A framework for assessing impacts

    Treesearch

    David N. Cole

    1994-01-01

    A comprehensive framework for assessing threats to wilderness is described. The framework is represented as a matrix of potential threats and attributes of wilderness character. Cells in the matrix represent the impacts of threats on each attribute. Potential applications of the matrix are described. An application of the matrix to the wildernesses in the Forest...

  5. Vibrational spectroscopy standoff detection of threat chemicals

    NASA Astrophysics Data System (ADS)

    Ortiz-Rivera, William; Pacheco-Londoño, Leonardo C.; Castro-Suarez, John R.; Felix-Rivera, Hilsamar; Hernandez-Rivera, Samuel P.

    2011-06-01

    Spectroscopy based standoff detection systems: Raman and FTIR have been tested for detection of threat chemicals, including highly energetic materials, homemade explosives, explosives formulations and high explosives mixtures. Other threat chemicals studied included toxic industrial compounds (TIC) and chemical agent simulants. Microorganisms and biological threat agent simulants have also been detected at standoff distances. Open Path FTIR has been used to detect vapors and chemicals deposited on metal surfaces at μg/cm2 levels at distances as far as 30 m in active mode and 60 m in passive mode. In the case of Raman telescope, standoff distances for acetonitrile and ammonium nitrate were 140 m.

  6. Emerging oomycete threats to plants and animals

    PubMed Central

    Chaparro-Garcia, Angela

    2016-01-01

    Oomycetes, or water moulds, are fungal-like organisms phylogenetically related to algae. They cause devastating diseases in both plants and animals. Here, we describe seven oomycete species that are emerging or re-emerging threats to agriculture, horticulture, aquaculture and natural ecosystems. They include the plant pathogens Phytophthora infestans, Phytophthora palmivora, Phytophthora ramorum, Plasmopara obducens, and the animal pathogens Aphanomyces invadans, Saprolegnia parasitica and Halioticida noduliformans. For each species, we describe its pathology, importance and impact, discuss why it is an emerging threat and briefly review current research activities. This article is part of the themed issue ‘Tackling emerging fungal threats to animal health, food security and ecosystem resilience’. PMID:28080985

  7. Seeing faces is necessary for face-patch formation

    PubMed Central

    Arcaro, Michael J.; Schade, Peter F.; Vincent, Justin L.; Ponce, Carlos R.; Livingstone, Margaret S.

    2017-01-01

    Here we report that monkeys raised without exposure to faces did not develop face patches, but did develop domains for other categories, and did show normal retinotopic organization, indicating that early face deprivation leads to a highly selective cortical processing deficit. Therefore experience must be necessary for the formation, or maintenance, of face domains. Gaze tracking revealed that control monkeys looked preferentially at faces, even at ages prior to the emergence of face patches, but face-deprived monkeys did not, indicating that face looking is not innate. A retinotopic organization is present throughout the visual system at birth, so selective early viewing behavior could bias category-specific visual responses towards particular retinotopic representations, thereby leading to domain formation in stereotyped locations in IT, without requiring category-specific templates or biases. Thus we propose that environmental importance influences viewing behavior, viewing behavior drives neuronal activity, and neuronal activity sculpts domain formation. PMID:28869581

  8. Bayesian Face Recognition and Perceptual Narrowing in Face-Space

    PubMed Central

    Balas, Benjamin

    2012-01-01

    During the first year of life, infants’ face recognition abilities are subject to “perceptual narrowing,” the end result of which is that observers lose the ability to distinguish previously discriminable faces (e.g. other-race faces) from one another. Perceptual narrowing has been reported for faces of different species and different races, in developing humans and primates. Though the phenomenon is highly robust and replicable, there have been few efforts to model the emergence of perceptual narrowing as a function of the accumulation of experience with faces during infancy. The goal of the current study is to examine how perceptual narrowing might manifest as statistical estimation in “face space,” a geometric framework for describing face recognition that has been successfully applied to adult face perception. Here, I use a computer vision algorithm for Bayesian face recognition to study how the acquisition of experience in face space and the presence of race categories affect performance for own and other-race faces. Perceptual narrowing follows from the establishment of distinct race categories, suggesting that the acquisition of category boundaries for race is a key computational mechanism in developing face expertise. PMID:22709406

  9. School Crisis Prevention and Response. NSSC Resource Paper.

    ERIC Educational Resources Information Center

    Harper, Suzanne

    The possibility of an armed intruder, serious bomb threat, or suicide cluster may seem remote, but even without a major crisis, schools are subjected to a number of other potentially disruptive events. Each year three million crimes are committed on school grounds, and on any given day an estimated 100,000 students carry a gun to school. Being…

  10. Threat-Related Attention Bias Variability and Posttraumatic Stress.

    PubMed

    Naim, Reut; Abend, Rany; Wald, Ilan; Eldar, Sharon; Levi, Ofir; Fruchter, Eyal; Ginat, Karen; Halpern, Pinchas; Sipos, Maurice L; Adler, Amy B; Bliese, Paul D; Quartana, Phillip J; Pine, Daniel S; Bar-Haim, Yair

    2015-12-01

    Threat monitoring facilitates survival by allowing one to efficiently and accurately detect potential threats. Traumatic events can disrupt healthy threat monitoring, inducing biased and unstable threat-related attention deployment. Recent research suggests that greater attention bias variability, that is, attention fluctuations alternating toward and away from threat, occurs in participants with PTSD relative to healthy comparison subjects who were either exposed or not exposed to traumatic events. The current study extends findings on attention bias variability in PTSD. Previous measurement of attention bias variability was refined by employing a moving average technique. Analyses were conducted across seven independent data sets; in each, data on attention bias variability were collected by using variants of the dot-probe task. Trauma-related and anxiety symptoms were evaluated across samples by using structured psychiatric interviews and widely used self-report questionnaires, as specified for each sample. Analyses revealed consistent evidence of greater attention bias variability in patients with PTSD following various types of traumatic events than in healthy participants, participants with social anxiety disorder, and participants with acute stress disorder. Moreover, threat-related, and not positive, attention bias variability was correlated with PTSD severity. These findings carry possibilities for using attention bias variability as a specific cognitive marker of PTSD and for tailoring protocols for attention bias modification for this disorder.

  11. Fear-related behaviors in situations of mass threat

    PubMed Central

    Espinola, Maria; Shultz, James M.; Espinel, Zelde; Althouse, Benjamin M.; Cooper, Janice L.; Baingana, Florence; Marcelin, Louis Herns; Cela, Toni; Towers, Sherry; Mazurik, Laurie; Greene, M. Claire; Beck, Alyssa; Fredrickson, Michelle; McLean, Andrew; Rechkemmer, Andreas

    2016-01-01

    ABSTRACT This Disaster Health Briefing focuses on the work of an expanding team of researchers that is exploring the dynamics of fear-related behaviors in situations of mass threat. Fear-related behaviors are individual or collective behaviors and actions initiated in response to fear reactions that are triggered by a perceived threat or actual exposure to a potentially traumatizing event. Importantly, fear-related behaviors modulate the future risk of harm. Disaster case scenarios are presented to illustrate how fear-related behaviors operate when a potentially traumatic event threatens or endangers the physical and/or psychological health, wellbeing, and integrity of a population. Fear-related behaviors may exacerbate harm, leading to severe and sometimes deadly consequences as exemplified by the Ebola pandemic in West Africa. Alternatively, fear-related behaviors may be channeled in a constructive and life-saving manner to motivate protective behaviors that mitigate or prevent harm, depending upon the nature of the threat scenario that is confronting the population. The interaction between fear-related behaviors and a mass threat is related to the type, magnitude, and consequences of the population encounter with the threat or hazard. The expression of FRBs, ranging from risk exacerbation to risk reduction, is also influenced by such properties of the threat as predictability, familiarity, controllability, preventability, and intentionality. PMID:28265486

  12. Contributions of individual face features to face discrimination.

    PubMed

    Logan, Andrew J; Gordon, Gael E; Loffler, Gunter

    2017-08-01

    Faces are highly complex stimuli that contain a host of information. Such complexity poses the following questions: (a) do observers exhibit preferences for specific information? (b) how does sensitivity to individual face parts compare? These questions were addressed by quantifying sensitivity to different face features. Discrimination thresholds were determined for synthetic faces under the following conditions: (i) 'full face': all face features visible; (ii) 'isolated feature': single feature presented in isolation; (iii) 'embedded feature': all features visible, but only one feature modified. Mean threshold elevations for isolated features, relative to full-faces, were 0.84x, 1.08, 2.12, 3.34, 4.07 and 4.47 for head-shape, hairline, nose, mouth, eyes and eyebrows respectively. Hence, when two full faces can be discriminated at threshold, the difference between the eyes is about four times less than what is required when discriminating between isolated eyes. In all cases, sensitivity was higher when features were presented in isolation than when they were embedded within a face context (threshold elevations of 0.94x, 1.74, 2.67, 2.90, 5.94 and 9.94). This reveals a specific pattern of sensitivity to face information. Observers are between two and four times more sensitive to external than internal features. The pattern for internal features (higher sensitivity for the nose, compared to mouth, eyes and eyebrows) is consistent with lower sensitivity for those parts affected by facial dynamics (e.g. facial expressions). That isolated features are easier to discriminate than embedded features supports a holistic face processing mechanism which impedes extraction of information about individual features from full faces. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Effects of threat management interactions on conservation priorities.

    PubMed

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  14. Successful Decoding of Famous Faces in the Fusiform Face Area

    PubMed Central

    Axelrod, Vadim; Yovel, Galit

    2015-01-01

    What are the neural mechanisms of face recognition? It is believed that the network of face-selective areas, which spans the occipital, temporal, and frontal cortices, is important in face recognition. A number of previous studies indeed reported that face identity could be discriminated based on patterns of multivoxel activity in the fusiform face area and the anterior temporal lobe. However, given the difficulty in localizing the face-selective area in the anterior temporal lobe, its role in face recognition is still unknown. Furthermore, previous studies limited their analysis to occipito-temporal regions without testing identity decoding in more anterior face-selective regions, such as the amygdala and prefrontal cortex. In the current high-resolution functional Magnetic Resonance Imaging study, we systematically examined the decoding of the identity of famous faces in the temporo-frontal network of face-selective and adjacent non-face-selective regions. A special focus has been put on the face-area in the anterior temporal lobe, which was reliably localized using an optimized scanning protocol. We found that face-identity could be discriminated above chance level only in the fusiform face area. Our results corroborate the role of the fusiform face area in face recognition. Future studies are needed to further explore the role of the more recently discovered anterior face-selective areas in face recognition. PMID:25714434

  15. Successful decoding of famous faces in the fusiform face area.

    PubMed

    Axelrod, Vadim; Yovel, Galit

    2015-01-01

    What are the neural mechanisms of face recognition? It is believed that the network of face-selective areas, which spans the occipital, temporal, and frontal cortices, is important in face recognition. A number of previous studies indeed reported that face identity could be discriminated based on patterns of multivoxel activity in the fusiform face area and the anterior temporal lobe. However, given the difficulty in localizing the face-selective area in the anterior temporal lobe, its role in face recognition is still unknown. Furthermore, previous studies limited their analysis to occipito-temporal regions without testing identity decoding in more anterior face-selective regions, such as the amygdala and prefrontal cortex. In the current high-resolution functional Magnetic Resonance Imaging study, we systematically examined the decoding of the identity of famous faces in the temporo-frontal network of face-selective and adjacent non-face-selective regions. A special focus has been put on the face-area in the anterior temporal lobe, which was reliably localized using an optimized scanning protocol. We found that face-identity could be discriminated above chance level only in the fusiform face area. Our results corroborate the role of the fusiform face area in face recognition. Future studies are needed to further explore the role of the more recently discovered anterior face-selective areas in face recognition.

  16. The Population Threat

    ERIC Educational Resources Information Center

    McNamara, Robert S.

    1969-01-01

    In an address delivered at the University of Notre Dame, May 1969, Secretary McNamara discussed the threat of unmanageable population pressure which is undervalued and misunderstood by the general public. Unrestricted population growth will have catastrophic consequences unless it is dealt with rapidly and rationally. Copies from: Office of…

  17. Stereotype Threat, Identity Salience, and Spatial Reasoning

    ERIC Educational Resources Information Center

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups…

  18. Who's afraid of the boss: cultural differences in social hierarchies modulate self-face recognition in Chinese and Americans.

    PubMed

    Liew, Sook-Lei; Ma, Yina; Han, Shihui; Aziz-Zadeh, Lisa

    2011-02-16

    Human adults typically respond faster to their own face than to the faces of others. However, in Chinese participants, this self-face advantage is lost in the presence of one's supervisor, and they respond faster to their supervisor's face than to their own. While this "boss effect" suggests a strong modulation of self-processing in the presence of influential social superiors, the current study examined whether this effect was true across cultures. Given the wealth of literature on cultural differences between collectivist, interdependent versus individualistic, independent self-construals, we hypothesized that the boss effect might be weaker in independent than interdependent cultures. Twenty European American college students were asked to identify orientations of their own face or their supervisors' face. We found that European Americans, unlike Chinese participants, did not show a "boss effect" and maintained the self-face advantage even in the presence of their supervisor's face. Interestingly, however, their self-face advantage decreased as their ratings of their boss's perceived social status increased, suggesting that self-processing in Americans is influenced more by one's social status than by one's hierarchical position as a social superior. In addition, when their boss's face was presented with a labmate's face, American participants responded faster to the boss's face, indicating that the boss may represent general social dominance rather than a direct negative threat to oneself, in more independent cultures. Altogether, these results demonstrate a strong cultural modulation of self-processing in social contexts and suggest that the very concept of social positions, such as a boss, may hold markedly different meanings to the self across Western and East Asian cultures.

  19. Who's Afraid of the Boss: Cultural Differences in Social Hierarchies Modulate Self-Face Recognition in Chinese and Americans

    PubMed Central

    Liew, Sook-Lei; Ma, Yina; Han, Shihui; Aziz-Zadeh, Lisa

    2011-01-01

    Human adults typically respond faster to their own face than to the faces of others. However, in Chinese participants, this self-face advantage is lost in the presence of one's supervisor, and they respond faster to their supervisor's face than to their own. While this “boss effect” suggests a strong modulation of self-processing in the presence of influential social superiors, the current study examined whether this effect was true across cultures. Given the wealth of literature on cultural differences between collectivist, interdependent versus individualistic, independent self-construals, we hypothesized that the boss effect might be weaker in independent than interdependent cultures. Twenty European American college students were asked to identify orientations of their own face or their supervisors' face. We found that European Americans, unlike Chinese participants, did not show a “boss effect” and maintained the self-face advantage even in the presence of their supervisor's face. Interestingly, however, their self-face advantage decreased as their ratings of their boss's perceived social status increased, suggesting that self-processing in Americans is influenced more by one's social status than by one's hierarchical position as a social superior. In addition, when their boss's face was presented with a labmate's face, American participants responded faster to the boss's face, indicating that the boss may represent general social dominance rather than a direct negative threat to oneself, in more independent cultures. Altogether, these results demonstrate a strong cultural modulation of self-processing in social contexts and suggest that the very concept of social positions, such as a boss, may hold markedly different meanings to the self across Western and East Asian cultures. PMID:21359209

  20. An overview of wetlands of Saudi Arabia: Values, threats, and perspectives.

    PubMed

    Al-Obaid, Sami; Samraoui, Boudjéma; Thomas, Jacob; El-Serehy, Hamed A; Alfarhan, Ahmed H; Schneider, Wolfgang; O'Connell, Mark

    2017-02-01

    The wetlands of Saudi Arabia are located in a water-stressed region that is highly vulnerable to climate and other global changes. Sebkhas, mudflats, mangroves, and wadis are the dominant wetlands in the arid regions of North Africa and the Arabian Peninsula. These unique wetlands are recognized as a sanctuary for biodiversity and for their economic services generated from mineral extraction, agriculture, and grazing. Despite their ecological values and societal services, the long-term permanence of Saudi Arabia's wetlands faces strong challenges resulting from human activities associated with sustained population growth, habitat degradation, and coastal development. This paper consolidates a literature review of Saudi Arabia's wetlands from local to global importance, highlights their biodiversity, and identifies threats and evolution of these vulnerable ecosystems in the arid Arabian Peninsula by focusing on the status of key freshwater taxa (Odonata, freshwater fishes, amphibians, and waterbirds) and documenting changes affecting important wetlands.