Sample records for identify potential threats

  1. In Silico Screening-Level Prioritization of 8468 Chemicals Produced in OECD Countries to Identify Potential Planetary Boundary Threats.

    PubMed

    Reppas-Chrysovitsinos, Efstathios; Sobek, Anna; MacLeod, Matthew

    2018-01-01

    Legislation such as the Stockholm Convention and REACH aim to identify and regulate the production and use of chemicals that qualify as persistent organic pollutants (POPs) and very persistent and very bioaccumulative (vPvB) chemicals, respectively. Recently, a series of studies on planetary boundary threats proposed seven chemical hazard profiles that are distinct from the POP and vPvB profiles. We previously defined two exposure-based hazard profiles; airborne persistent contaminants (APCs) and waterborne persistent contaminants (WPCs) that correspond to two profiles of chemicals that are planetary boundary threats. Here, we extend our method to screen a database of chemicals consisting of 8648 substances produced within the OECD countries. We propose a new scoring scheme to disentangle the POP, vPvB, APC and WPC profiles by focusing on the spatial range of exposure potential, discuss the relationship between high exposure hazard and elemental composition of chemicals, and identify chemicals with high exposure hazard potential.

  2. Potential future land use threats to California's protected areas

    USGS Publications Warehouse

    Wilson, Tamara Sue; Sleeter, Benjamin Michael; Davis, Adam Wilkinson

    2015-01-01

    Increasing pressures from land use coupled with future changes in climate will present unique challenges for California’s protected areas. We assessed the potential for future land use conversion on land surrounding existing protected areas in California’s twelve ecoregions, utilizing annual, spatially explicit (250 m) scenario projections of land use for 2006–2100 based on the Intergovernmental Panel on Climate Change Special Report on Emission Scenarios to examine future changes in development, agriculture, and logging. We calculated a conversion threat index (CTI) for each unprotected pixel, combining land use conversion potential with proximity to protected area boundaries, in order to identify ecoregions and protected areas at greatest potential risk of proximal land conversion. Our results indicate that California’s Coast Range ecoregion had the highest CTI with competition for extractive logging placing the greatest demand on land in close proximity to existing protected areas. For more permanent land use conversions into agriculture and developed uses, our CTI results indicate that protected areas in the Central California Valley and Oak Woodlands are most vulnerable. Overall, the Eastern Cascades, Central California Valley, and Oak Woodlands ecoregions had the lowest areal percent of protected lands and highest conversion threat values. With limited resources and time, rapid, landscape-level analysis of potential land use threats can help quickly identify areas with higher conversion probability of future land use and potential changes to both habitat and potential ecosystem reserves. Given the broad range of future uncertainties, LULC projections are a useful tool allowing land managers to visualize alternative landscape futures, improve planning, and optimize management practices.

  3. Identifying chemicals that are planetary boundary threats.

    PubMed

    MacLeod, Matthew; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; Persson, Linn M; Rudén, Christina; McLachlan, Michael S

    2014-10-07

    Rockström et al. proposed a set of planetary boundaries that delimit a "safe operating space for humanity". Many of the planetary boundaries that have so far been identified are determined by chemical agents. Other chemical pollution-related planetary boundaries likely exist, but are currently unknown. A chemical poses an unknown planetary boundary threat if it simultaneously fulfills three conditions: (1) it has an unknown disruptive effect on a vital Earth system process; (2) the disruptive effect is not discovered until it is a problem at the global scale, and (3) the effect is not readily reversible. In this paper, we outline scenarios in which chemicals could fulfill each of the three conditions, then use the scenarios as the basis to define chemical profiles that fit each scenario. The chemical profiles are defined in terms of the nature of the effect of the chemical and the nature of exposure of the environment to the chemical. Prioritization of chemicals in commerce against some of the profiles appears feasible, but there are considerable uncertainties and scientific challenges that must be addressed. Most challenging is prioritizing chemicals for their potential to have a currently unknown effect on a vital Earth system process. We conclude that the most effective strategy currently available to identify chemicals that are planetary boundary threats is prioritization against profiles defined in terms of environmental exposure combined with monitoring and study of the biogeochemical processes that underlie vital Earth system processes to identify currently unknown disruptive effects.

  4. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    PubMed

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  5. Assessing the Potential Threat Landscape of a Proposed Reintroduction Site for Carnivores

    PubMed Central

    Page, Samantha K.; Parker, Daniel M.; Peinke, Dean M.; Davies-Mostert, Harriet T.

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent’s first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid. PMID:25822468

  6. Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.

    In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they can be assessed. A psychosocial model was developed to assess an employee's behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. To test the model's agreement with human resourcesmore » and management professionals, we conducted an experiment with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment to identify employees who pose a greater insider threat.« less

  7. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    PubMed

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  8. Identifying key conservation threats to Alpine birds through expert knowledge

    PubMed Central

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  9. Identifying species threat hotspots from global supply chains.

    PubMed

    Moran, Daniel; Kanemoto, Keiichiro

    2017-01-04

    Identifying hotspots of species threat has been a successful approach for setting conservation priorities. One important challenge in conservation is that, in many hotspots, export industries continue to drive overexploitation. Conservation measures must consider not just the point of impact, but also the consumer demand that ultimately drives resource use. To understand which species threat hotspots are driven by which consumers, we have developed a new approach to link a set of biodiversity footprint accounts to the hotspots of threatened species on the IUCN Red List of Threatened Species. The result is a map connecting consumption to spatially explicit hotspots driven by production on a global scale. Locating biodiversity threat hotspots driven by consumption of goods and services can help to connect conservationists, consumers, companies and governments in order to better target conservation actions.

  10. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such... its integrity management program addressing actions it will take to respond to findings from this data...

  11. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such... its integrity management program addressing actions it will take to respond to findings from this data...

  12. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such... its integrity management program addressing actions it will take to respond to findings from this data...

  13. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such... its integrity management program addressing actions it will take to respond to findings from this data...

  14. Characterization of potential security threats in modern automobiles: a composite modeling approach

    DOT National Transportation Integrated Search

    2014-10-01

    The primary objective of the work detailed in this report is to describe a composite modeling approach for potential cybersecurity threats in modern vehicles. Threat models, threat descriptions, and examples of various types of conceivable threats to...

  15. On the front lines: Stakeholder threat cues determine how identified employees cope with scandal.

    PubMed

    Grandey, Alicia A; Krannitz, Morgan A; Slezak, Tyler

    2015-07-01

    When organizational identity is threatened as a result of scandal, highly identified members who represent the threatened organization to stakeholders have a particularly challenging and overlooked experience. Addressing a theoretical paradox, we propose that organizational identification interacts with the threat cues from stakeholders to determine employee responses. We conducted a multimethod, in vivo test of these ideas with university fundraising employees after events threatened the university's moral identity. Interview and archival data demonstrated that stakeholders expressed identity threat to fundraisers, who experienced their own identity-related distress and engaged in both group-dissociative and group-affirming responses. Surveys of professional and student university fundraisers demonstrated that more identified employees were more distressed (e,g., felt anxious, grief, betrayed) regardless of stakeholder threat cues. Yet, when employees perceived weak threat cues from stakeholders, more identified members were less likely to dissociate from the group and more likely to affirm the group's positive identity with stakeholders. These benefits of identification were not present when the stakeholder threat cues were strong. We discuss future research and practical implications of front-line employee identification and stakeholder cues during scandal. (c) 2015 APA, all rights reserved).

  16. Potential threats to the effective communication of genetic risk information: the case of cystic fibrosis.

    PubMed

    Dillard, James Price; Shen, Lijiang; Laxova, Anita; Farrell, Phillip

    2008-01-01

    The dramatic increase in genetic knowledge engendered by the mapping of the human genome brings with it a need for greater understanding of how to effectively communicate genetic risk information. Using a combination of observational and self-report data, this study examined potential threats to effective risk communication in 17 families whose infant received a positive newborn screening test for cystic fibrosis. Five specific problems are identified: (a) copresence of interactants (or the lack thereof), (b) disruptions in the communication environment, (c) variations in parents' initial knowledge, (d) rigidity in counselors' behavioral scripts, and (e) emotional interference with information acquisition. We advance 3 proposals for research aimed at improving our understanding of these potential threats.

  17. Force versus fury: Sex differences in the relationships among physical and psychological threat potential, the facial width-to-height ratio, and judgements of aggressiveness.

    PubMed

    MacDonell, Elliott T; Geniole, Shawn N; McCormick, Cheryl M

    2018-06-07

    Individuals with larger facial width-to-height ratios (FWHRs) are judged as more threatening, and engage in more threat-related behavior, than do individuals with smaller FWHRs. Here we identified components of threat potential that are related to the FWHR. In Study 1, the FWHR was correlated positively with physical threat potential (bicep size) in women and with both physical and psychological (anger proneness) threat potential in men. Behavioral aggression was measured in a subset of these participants using the Point Subtraction Aggression Paradigm (costly aggression) and a Money Allocation Task (non-costly aggression). Psychological (but not physical) threat potential predicted non-costly aggression and physical (but not psychological) threat potential predicted costly aggression. In Study 2, a separate set of participants judged the anger proneness, strength, or aggressiveness of male participants photographed in Study 1. Participants' judgements of all three characteristics were associated with the FWHR, and there were sex differences in how aggressiveness was conceptualized (for women, aggressiveness was associated with anger proneness, for men, aggressiveness was associated with strength). These results are consistent with the hypothesis that the FWHR may be an adaptation to cue the threat potential of men. © 2018 Wiley Periodicals, Inc.

  18. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  19. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    PubMed

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  1. Hydro-geomorphic connectivity and landslide features extraction to identifying potential threats and hazardous areas

    NASA Astrophysics Data System (ADS)

    Tarolli, Paolo; Fuller, Ian C.; Basso, Federica; Cavalli, Marco; Sofia, Giulia

    2017-04-01

    Hydro-geomorphic connectivity has significantly emerged as a new concept to understand the transfer of surface water and sediment through landscapes. A further scientific challenge is determining how the concept can be used to enable sustainable land and water management. This research proposes an interesting approach to integrating remote sensing techniques, connectivity theory, and geomorphometry based on high-resolution digital terrain model (HR-DTMs) to automatically extract landslides crowns and gully erosion, to determine the different rate of connectivity among the main extracted features and the river network, and thus determine a possible categorization of hazardous areas. The study takes place in two mountainous regions in the Wellington Region (New Zealand). The methodology is a three step approach. Firstly, we performed an automatic detection of the likely landslides crowns through the use of thresholds obtained by the statistical analysis of the variability of landform curvature. After that, the research considered the Connectivity Index to analyse how a complex and rugged topography induces large variations in erosion and sediment delivery in the two catchments. Lastly, the two methods have been integrated to create a unique procedure able to classify the different rate of connectivity among the main features and the river network and thus identifying potential threats and hazardous areas. The methodology is fast, and it can produce a detailed and updated inventory map that could be a key tool for erosional and sediment delivery hazard mitigation. This fast and simple method can be a useful tool to manage emergencies giving priorities to more failure-prone zones. Furthermore, it could be considered to do a preliminary interpretations of geomorphological phenomena and more in general, it could be the base to develop inventory maps. References Cavalli M, Trevisani S, Comiti F, Marchi L. 2013. Geomorphometric assessment of spatial sediment connectivity

  2. Leptospira interrogans at the human-wildlife interface in northern Botswana: a newly identified public health threat.

    PubMed

    Jobbins, S E; Sanderson, C E; Alexander, K A

    2014-03-01

    Leptospirosis is the most widespread zoonosis in the world. In northern Botswana, humans live in close proximity to a diversity of wildlife and peridomestic rodents and may be exposed to a variety of zoonotic pathogens. Little is known regarding the occurrence and epidemiology of L. interrogans in Africa despite the recognized global importance of this zoonotic disease and the threat it poses to public health. In Botswana, banded mongooses (Mungos mungo) live in close proximity to humans across protected and unprotected landscapes and may be a useful sentinel species for assessing the occurrence of zoonotic organisms, such as L. interrogans. We utilized PCR to screen banded mongoose kidneys for leptospiral DNA and identified 41.5% prevalence of renal carriage of L. interrogans (exact binomial 95% CI 27.7-56.7%, n = 41). Renal carriage was also detected in one Selous' mongoose (Paracynictis selousi). This is the first published confirmation of carriage of L. interrogans in either species. This is also the first report of L. interrogans occurrence in northern Botswana and the only report of this organism in a wildlife host in the country. Pathogenic Leptospira are usually transmitted indirectly to humans through soil or water contaminated with infected urine. Other avenues, such as direct contact between humans and wildlife, as well as consumption of mongooses and other wildlife as bushmeat, may pose additional exposure risk and must be considered in public health management of this newly identified zoonotic disease threat. There is a critical need to characterize host species involvement and pathogen transmission dynamics, including human-wildlife interactions that may increase human exposure potential and infection risk. We recommend that public health strategy be modified to include sensitization of medical practitioners to the presence of L. interrogans in the region, the potential for human infection, and implementation of clinical screening. This study

  3. Riverine threat indices to assess watershed condition and identify primary management capacity of agriculture natural resource management agencies.

    PubMed

    Fore, Jeffrey D; Sowa, Scott P; Galat, David L; Annis, Gust M; Diamond, David D; Rewa, Charles

    2014-03-01

    Managers can improve conservation of lotic systems over large geographies if they have tools to assess total watershed conditions for individual stream segments and can identify segments where conservation practices are most likely to be successful (i.e., primary management capacity). The goal of this research was to develop a suite of threat indices to help agriculture resource management agencies select and prioritize watersheds across Missouri River basin in which to implement agriculture conservation practices. We quantified watershed percentages or densities of 17 threat metrics that represent major sources of ecological stress to stream communities into five threat indices: agriculture, urban, point-source pollution, infrastructure, and all non-agriculture threats. We identified stream segments where agriculture management agencies had primary management capacity. Agriculture watershed condition differed by ecoregion and considerable local variation was observed among stream segments in ecoregions of high agriculture threats. Stream segments with high non-agriculture threats were most concentrated near urban areas, but showed high local variability. 60 % of stream segments in the basin were classified as under U.S. Department of Agriculture's Natural Resources Conservation Service (NRCS) primary management capacity and most segments were in regions of high agricultural threats. NRCS primary management capacity was locally variable which highlights the importance of assessing total watershed condition for multiple threats. Our threat indices can be used by agriculture resource management agencies to prioritize conservation actions and investments based on: (a) relative severity of all threats, (b) relative severity of agricultural threats, and (c) and degree of primary management capacity.

  4. Combating the Insider Cyber Threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  5. Hybrid Warfare in the Baltics: Threats and Potential Responses

    DTIC Science & Technology

    2017-02-23

    9 Martin Hurt, Lessons Identified in Crimea: Does Estonia’s National Defence Model Meet Our Needs? Tallinn, Estonia: International...Monuments’ in Estonia,” Nationalities Papers, Vol. 36, No. 3, July 2008, p. 436; Martin Ehala, “The Bronze Soldier: Identity Threat and Maintenance in...Ukraine Petro Poroshenko,” July 1, 2014. As of June 20, 2016: http://www.president.gov.ua/en/news/zvernennya-prezidenta-ukrayini- petra -poroshenka

  6. A freshwater biodiversity hotspot under pressure - assessing threats and identifying conservation needs for ancient Lake Ohrid

    NASA Astrophysics Data System (ADS)

    Kostoski, G.; Albrecht, C.; Trajanovski, S.; Wilke, T.

    2010-12-01

    Immediate conservation measures for world-wide freshwater resources are of eminent importance. This is particularly true for so-called ancient lakes. While these lakes are famous for being evolutionary theatres, often displaying an extraordinarily high degree of biodiversity and endemism, in many cases these biota are also experiencing extreme anthropogenic impact. Lake Ohrid, a major European biodiversity hotspot situated in a trans-frontier setting on the Balkans, is a prime example for a lake with a magnitude of narrow range endemic taxa that are under increasing anthropogenic pressure. Unfortunately, evidence for a "creeping biodiversity crisis" has accumulated over the last decades, and major socio-political changes have gone along with human-mediated environmental changes. Based on field surveys, monitoring data, published records, and expert interviews, we aimed to (1) assess threats to Lake Ohrids' (endemic) biodiversity, (2) summarize existing conservation activities and strategies, and (3) outline future conservation needs for Lake Ohrid. We compiled threats to both specific taxa (and in cases to particular species) as well as to the lake ecosystems itself. Major conservation concerns identified for Lake Ohrid are: (1) watershed impacts, (2) agriculture and forestry, (3) tourism and population growth, (4) non-indigenous species, (5) habitat alteration or loss, (6) unsustainable exploitation of fisheries, and (7) global climate change. Among the major (well-known) threats with high impact are nutrient input (particularly of phosphorus), habitat conversion and silt load. Other threats are potentially of high impact but less well known. Such threats include pollution with hazardous substances (from sources such as mines, former industries, agriculture) or climate change. We review and discuss institutional responsibilities, environmental monitoring and ecosystem management, existing parks and reserves, biodiversity and species measures, international

  7. Data fusion and machine learning to identify threat vectors for the Zika virus and classify vulnerability

    NASA Astrophysics Data System (ADS)

    Gentle, J. N., Jr.; Kahn, A.; Pierce, S. A.; Wang, S.; Wade, C.; Moran, S.

    2016-12-01

    With the continued spread of the zika virus in the United States in both Florida and Virginia, increased public awareness, prevention and targeted prediction is necessary to effectively mitigate further infection and propagation of the virus throughout the human population. The goal of this project is to utilize publicly accessible data and HPC resources coupled with machine learning algorithms to identify potential threat vectors for the spread of the zika virus in Texas, the United States and globally by correlating available zika case data collected from incident reports in medical databases (e.g., CDC, Florida Department of Health) with known bodies of water in various earth science databases (e.g., USGS NAQWA Data, NASA ASTER Data, TWDB Data) and by using known mosquito population centers as a proxy for trends in population distribution (e.g., WHO, European CDC, Texas Data) while correlating historical trends in the spread of other mosquito borne diseases (e.g., chikungunya, malaria, dengue, yellow fever, west nile, etc.). The resulting analysis should refine the identification of the specific threat vectors for the spread of the virus which will correspondingly increase the effectiveness of the limited resources allocated towards combating the disease through better strategic implementation of defense measures. The minimal outcome of this research is a better understanding of the factors involved in the spread of the zika virus, with the greater potential to save additional lives through more effective resource utilization and public outreach.

  8. Identifying at-risk employees: A behavioral model for predicting potential insider threats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.

    A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. In many of these crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they could be assessed by a person experienced in psychosocial evaluations.more » We have developed a model using a Bayesian belief network with the help of human resources staff, experienced in evaluating behaviors in staff. We conducted an experiment to assess its agreement with human resources and management professionals, with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment that can raise an alarm about employees who pose higher insider threat risks. In separate work, we combine this psychosocial model’s assessment with computer workstation behavior to raise the efficacy of recognizing an insider crime in the making.« less

  9. Future Infectious Disease Threats to Europe

    PubMed Central

    Suk, Jonathan E.

    2011-01-01

    We examined how different drivers of infectious disease could interact to threaten control efforts in Europe. We considered projected trends through 2020 for 3 broad groups of drivers: globalization and environmental change, social and demographic change, and health system capacity. Eight plausible infectious disease threats with the potential to be significantly more problematic than they are today were identified through an expert consultation: extensively drug-resistant bacteria, vector-borne diseases, sexually transmitted infections, food-borne infections, a resurgence of vaccine-preventable diseases, health care–associated infections, multidrug-resistant tuberculosis, and pandemic influenza. Preemptive measures to be taken by the public health community to counteract these threats were identified. PMID:21940915

  10. Identifying changing aviation threat environments within an adaptive Homeland Security Advisory System.

    PubMed

    Lee, Adrian J; Jacobson, Sheldon H

    2012-02-01

    A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.

  11. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  12. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  13. Intolerance of uncertainty and startle potentiation in relation to different threat reinforcement rates.

    PubMed

    Chin, Brian; Nelson, Brady D; Jackson, Felicia; Hajcak, Greg

    2016-01-01

    Fear conditioning research on threat predictability has primarily examined the impact of temporal (i.e., timing) predictability on the startle reflex. However, there are other key features of threat that can vary in predictability. For example, the reinforcement rate (i.e., frequency) of threat is a crucial factor underlying fear learning. The present study examined the impact of threat reinforcement rate on the startle reflex and self-reported anxiety during a fear conditioning paradigm. Forty-five participants completed a fear learning task in which the conditioned stimulus was reinforced with an electric shock to the forearm on 50% of trials in one block and 75% of trials in a second block, in counter-balanced order. The present study also examined whether intolerance of uncertainty (IU), the tendency to perceive or experience uncertainty as stressful or unpleasant, was associated with the startle reflex during conditions of low (50%) vs. high (75%) reinforcement. Results indicated that, across all participants, startle was greater during the 75% relative to the 50% reinforcement condition. IU was positively correlated with startle potentiation (i.e., increased startle response to the CS+ relative to the CS-) during the 50%, but not the 75%, reinforcement condition. Thus, despite receiving fewer electric shocks during the 50% reinforcement condition, individuals with high IU uniquely demonstrated greater defense system activation when impending threat was more uncertain. The association between IU and startle was independent of state anxiety. The present study adds to a growing literature on threat predictability and aversive responding, and suggests IU is associated with abnormal responding in the context of uncertain threat. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. Chemical-Sensing Cables Detect Potential Threats

    NASA Technical Reports Server (NTRS)

    2007-01-01

    Intelligent Optical Systems Inc. (IOS) completed Phase I and II Small Business Innovation Research (SBIR) contracts with NASA's Langley Research Center to develop moisture- and pH-sensitive sensors to detect corrosion or pre-corrosive conditions, warning of potentially dangerous conditions before significant structural damage occurs. This new type of sensor uses a specially manufactured optical fiber whose entire length is chemically sensitive, changing color in response to contact with its target, and demonstrated to detect potentially corrosive moisture incursions to within 2 cm. After completing the work with NASA, the company received a Defense Advanced Research Projects Agency (DARPA) Phase III SBIR to develop the sensors further for detecting chemical warfare agents, for which they proved just as successful. The company then worked with the U.S. Department of Defense (DoD) to fine tune the sensors for detecting potential threats, such as toxic industrial compounds and nerve agents. In addition to the work with government agencies, Intelligent Optical Systems has sold the chemically sensitive fiber optic cables to major automotive and aerospace companies, who are finding a variety of uses for the devices. Marketed under the brand name Distributed Intrinsic Chemical Agent Sensing and Transmission (DICAST), these unique continuous-cable fiber optic chemical sensors can serve in a variety of applications: Corrosive-condition monitoring, aiding experimentation with nontraditional power sources, as an economical means of detecting chemical release in large facilities, as an inexpensive "alarm" systems to alert the user to a change in the chemical environment anywhere along the cable, or in distance-resolved optical time domain reflectometry systems to provide detailed profiles of chemical concentration versus length.

  15. Avoiding and identifying errors and other threats to the credibility of health economic models.

    PubMed

    Tappenden, Paul; Chilcott, James B

    2014-10-01

    Health economic models have become the primary vehicle for undertaking economic evaluation and are used in various healthcare jurisdictions across the world to inform decisions about the use of new and existing health technologies. Models are required because a single source of evidence, such as a randomised controlled trial, is rarely sufficient to provide all relevant information about the expected costs and health consequences of all competing decision alternatives. Whilst models are used to synthesise all relevant evidence, they also contain assumptions, abstractions and simplifications. By their very nature, all models are therefore 'wrong'. As such, the interpretation of estimates of the cost effectiveness of health technologies requires careful judgements about the degree of confidence that can be placed in the models from which they are drawn. The presence of a single error or inappropriate judgement within a model may lead to inappropriate decisions, an inefficient allocation of healthcare resources and ultimately suboptimal outcomes for patients. This paper sets out a taxonomy of threats to the credibility of health economic models. The taxonomy segregates threats to model credibility into three broad categories: (i) unequivocal errors, (ii) violations, and (iii) matters of judgement; and maps these across the main elements of the model development process. These three categories are defined according to the existence of criteria for judging correctness, the degree of force with which such criteria can be applied, and the means by which these credibility threats can be handled. A range of suggested processes and techniques for avoiding and identifying these threats is put forward with the intention of prospectively improving the credibility of models.

  16. Startle Potentiation to Uncertain Threat as a Psychophysiological Indicator of Fear-based Psychopathology: An Examination across Multiple Internalizing Disorders

    PubMed Central

    Gorka, Stephanie M.; Lieberman, Lynne; Shankman, Stewart A.; Phan, K. Luan

    2016-01-01

    Heightened reactivity to uncertain threat (U-threat) is an important individual difference factor that may characterize fear-based internalizing psychopathologies (IPs) and distinguish them from distress/misery IPs. To date, however, the majority of existing research examining reactivity to U-threat has been within individuals with panic disorder and major depressive disorder (MDD) and no prior study has directly tested this hypothesis across multiple IPs. The current study therefore explored whether heightened reactivity to U-threat is a psychophysiological indicator of fear-based psychopathology across five groups: current 1) social anxiety disorder (SAD), 2) specific phobia (SP), 3) generalized anxiety disorder (GAD), 4) MDD, and 5) individuals with no history of psychopathology (controls). All 160 adults completed a well-validated threat-of-shock task designed to probe responses to predictable (P-) and U-threat. Startle eyeblink potentiation was recorded as an index of aversive arousal. Results indicated that individuals with SAD and SP evidenced greater startle potentiation to U-threat, but not P-threat, relative to individuals with GAD, MDD and controls (who did not differ). The current findings, along with the prior panic disorder and MDD literature, suggest that heightened reactivity to U-threat is a psychophysiological indicator of fear-based disorders and could represent a neurobiological organizing principle for internalizing psychopathology. The findings also suggest that individuals with fear disorders generally display a hypersensitivity to uncertain aversive events, which could contribute to their psychopathology. PMID:27868423

  17. Startle potentiation to uncertain threat as a psychophysiological indicator of fear-based psychopathology: An examination across multiple internalizing disorders.

    PubMed

    Gorka, Stephanie M; Lieberman, Lynne; Shankman, Stewart A; Phan, K Luan

    2017-01-01

    Heightened reactivity to uncertain threat (U-threat) is an important individual difference factor that may characterize fear-based internalizing psychopathologies (IPs) and distinguish them from distress/misery IPs. To date, however, the majority of existing research examining reactivity to U-threat has been within individuals with panic disorder and major depressive disorder (MDD) and no prior study has directly tested this hypothesis across multiple IPs. The current study therefore explored whether heightened reactivity to U-threat is a psychophysiological indicator of fear-based psychopathology across 5 groups: current (a) social anxiety disorder (SAD); (b) specific phobia (SP); (c) generalized anxiety disorder (GAD); (d) MDD; and (c) individuals with no history of psychopathology (controls). All 160 adults completed a well-validated threat-of-shock task designed to probe responses to predictable (P-) and U-threat. Startle eyeblink potentiation was recorded as an index of aversive arousal. Results indicated that individuals with SAD and SP evidenced greater startle potentiation to U-threat, but not P-threat, relative to individuals with GAD, MDD, and controls (who did not differ). The current findings, along with the prior panic disorder and MDD literature, suggest that heightened reactivity to U-threat is a psychophysiological indicator of fear-based disorders and could represent a neurobiological organizing principle for internalizing psychopathology. The findings also suggest that individuals with fear disorders generally display a hypersensitivity to uncertain aversive events, which could contribute to their psychopathology. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  18. The effect of panic disorder versus anxiety sensitivity on event-related potentials during anticipation of threat.

    PubMed

    Stevens, Elizabeth S; Weinberg, Anna; Nelson, Brady D; Meissel, Emily E E; Shankman, Stewart A

    2018-03-01

    Attention-related abnormalities are key components of the abnormal defensive responding observed in panic disorder (PD). Although behavioral studies have found aberrant attentional biases towards threat in PD, psychophysiological studies have been mixed. Predictability of threat, an important feature of threat processing, may have contributed to these mixed findings. Additionally, anxiety sensitivity, a dimensional trait associated with PD, may yield stronger associations with cognitive processes than categorical diagnoses of PD. In this study, 171 participants with PD and/or depression and healthy controls completed a task that differentiated anticipation of predictable vs. unpredictable shocks, while startle eyeblink and event-related potentials (ERPs [N100, P300]) were recorded. In all participants, relative to the control condition, probe N100 was enhanced to both predictable and unpredictable threat, whereas P300 suppression was unique to predictable threat. Probe N100, but not P300, was associated with startle eyeblink during both threatening conditions, and was strongest for unpredictable threat. PD was not associated with ERPs, but anxiety sensitivity (physical concerns) was positively associated with probe N100 (indicating reduced responding) in the unpredictable condition independent of PD diagnosis. Vulnerability to panic-related psychopathology may be characterized by aberrant early processing of threat, which may be especially evident during anticipation of unpredictable threats. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Recognition of an important water quality issue at zoos: prevalence and potential threat of toxic cyanobacteria.

    PubMed

    Doster, Enrique; Chislock, Michael F; Roberts, John F; Kottwitz, Jack J; Wilson, Alan E

    2014-03-01

    Zoo animals may be particularly vulnerable to water sources contaminated with cyanobacterial toxins given their nonvoluntary close association with this resource. However, the prevalence and potential threat of toxic cyanobacteria in this setting are unknown. Several otherwise unexplained yellow-bellied slider (Trachemys scripta scripta) deaths were documented in a zoo moat with recurring blooms of toxic Microcystis aeruginosa. Furthermore, an extremely high and potentially lethal concentration of the hepatotoxin microcystin (166 ng/g) was found in the liver of a necropsied turtle that died in this moat. A subsequent monthly survey of water quality revealed detectable concentrations of microcystin in all moats (0.0001 to 7.5 microg/L), with moats higher than 1 microg/L being significantly higher than the threshold for safe drinking water recommended by the World Health Organization. These results demonstrate that cyanobacterial blooms are an important water quality issue in zoos, and future research is necessary to identify potential associations among water quality, zoo animal health, and moat management strategies.

  20. Defensive motivation and attention in anticipation of different types of predictable and unpredictable threat: A startle and event-related potential investigation.

    PubMed

    Nelson, Brady D; Hajcak, Greg

    2017-08-01

    Predictability is an important characteristic of threat that impacts defensive motivation and attentional engagement. Supporting research has primarily focused on actual threat (e.g., shocks), and it is unclear whether the predictability of less intense threat (e.g., unpleasant pictures) similarly affects motivation and attention. The present study utilized a within-subject design and examined defensive motivation (startle reflex and self-reported anxiety) and attention (probe N100 and P300) in anticipation of shocks and unpleasant pictures during a no, predictable, and unpredictable threat task. This study also examined the impact of predictability on the P300 to shocks and late positive potential (LPP) to unpleasant pictures. The startle reflex and self-reported anxiety were increased in anticipation of both types of threat relative to no threat. Furthermore, startle potentiation in anticipation of unpredictable threat was greater for shocks compared to unpleasant pictures, but there was no difference for predictable threat. The probe N100 was enhanced in anticipation of unpredictable threat relative to predictable threat and no threat, and the probe P300 was suppressed in anticipation of predictable and unpredictable threat relative to no threat. These effects did not differ between the shock and unpleasant picture trials. Finally, the P300 and early LPP component were increased in response to unpredictable relative to predictable shocks and unpleasant pictures, respectively. The present study suggests that the unpredictability of unpleasant pictures increases defensive motivation, but to a lesser degree relative to actual threat. Moreover, unpredictability enhances attentional engagement in anticipation of, and in reaction to, both types of threat. © 2017 Society for Psychophysiological Research.

  1. Threats from urban expansion, agricultural transformation and forest loss on global conservation priority areas.

    PubMed

    Veach, Victoria; Moilanen, Atte; Di Minin, Enrico

    2017-01-01

    Including threats in spatial conservation prioritization helps identify areas for conservation actions where biodiversity is at imminent risk of extinction. At the global level, an important limitation when identifying spatial priorities for conservation actions is the lack of information on the spatial distribution of threats. Here, we identify spatial conservation priorities under three prominent threats to biodiversity (residential and commercial development, agricultural expansion, and forest loss), which are primary drivers of habitat loss and threaten the persistence of the highest number of species in the International Union for the Conservation of Nature (IUCN) Red List, and for which spatial data is available. We first explore how global priority areas for the conservation of vertebrate (mammals, birds, and amphibians) species coded in the Red List as vulnerable to each threat differ spatially. We then identify spatial conservation priorities for all species vulnerable to all threats. Finally, we identify the potentially most threatened areas by overlapping the identified priority areas for conservation with maps for each threat. We repeat the same with four other well-known global conservation priority area schemes, namely Key Biodiversity Areas, Biodiversity Hotspots, the global Protected Area Network, and Wilderness Areas. We find that residential and commercial development directly threatens only about 4% of the global top 17% priority areas for species vulnerable under this threat. However, 50% of the high priority areas for species vulnerable to forest loss overlap with areas that have already experienced some forest loss. Agricultural expansion overlapped with ~20% of high priority areas. Biodiversity Hotspots had the greatest proportion of their total area under direct threat from all threats, while expansion of low intensity agriculture was found to pose an imminent threat to Wilderness Areas under future agricultural expansion. Our results

  2. Threats from urban expansion, agricultural transformation and forest loss on global conservation priority areas

    PubMed Central

    Moilanen, Atte; Di Minin, Enrico

    2017-01-01

    Including threats in spatial conservation prioritization helps identify areas for conservation actions where biodiversity is at imminent risk of extinction. At the global level, an important limitation when identifying spatial priorities for conservation actions is the lack of information on the spatial distribution of threats. Here, we identify spatial conservation priorities under three prominent threats to biodiversity (residential and commercial development, agricultural expansion, and forest loss), which are primary drivers of habitat loss and threaten the persistence of the highest number of species in the International Union for the Conservation of Nature (IUCN) Red List, and for which spatial data is available. We first explore how global priority areas for the conservation of vertebrate (mammals, birds, and amphibians) species coded in the Red List as vulnerable to each threat differ spatially. We then identify spatial conservation priorities for all species vulnerable to all threats. Finally, we identify the potentially most threatened areas by overlapping the identified priority areas for conservation with maps for each threat. We repeat the same with four other well-known global conservation priority area schemes, namely Key Biodiversity Areas, Biodiversity Hotspots, the global Protected Area Network, and Wilderness Areas. We find that residential and commercial development directly threatens only about 4% of the global top 17% priority areas for species vulnerable under this threat. However, 50% of the high priority areas for species vulnerable to forest loss overlap with areas that have already experienced some forest loss. Agricultural expansion overlapped with ~20% of high priority areas. Biodiversity Hotspots had the greatest proportion of their total area under direct threat from all threats, while expansion of low intensity agriculture was found to pose an imminent threat to Wilderness Areas under future agricultural expansion. Our results

  3. State Anxiety Carried Over From Prior Threat Increases Late Positive Potential Amplitude During an Instructed Emotion Regulation Task

    PubMed Central

    Pedersen, Walker S.; Larson, Christine L.

    2018-01-01

    Emotion regulation has important consequences for emotional and mental health (Saxena, Dubey & Pandey, 2011) and is dependent on executive function (Eisenberg, Smith & Spinrad, 2011). Because state anxiety disrupts executive function (Robinson, Vytal, Cornwell & Grillon, 2013), we tested whether state anxiety disrupts emotion regulation by having participants complete an instructed emotion regulation task, while under threat of unpredictable shock and while safe from shock. We used the late positive potential (LPP) component of the event related potential to measure emotion regulation success. We predicted that LPP responses to negatively valenced images would be modulated by participants’ attempts to increase and decrease their emotions when safe from shock, but not while under threat of shock. Our manipulation check revealed an order effect such that for participants who completed the threat of shock condition first self-reported state anxiety carried over into the subsequent safe condition. Additionally, we found that although instructions to regulate affected participants’ ratings of how unpleasant the images made them feel, instructions to regulate had no effect on LPP amplitude regardless of threat condition. Instead we found that participants who received the threat condition prior to safe had greater LPP responses to all images in the safe condition. We posit that the carryover of anxiety resulted in misattribution of arousal and potentiation of neural responses to the images in the safe condition. Thus, our results imply that physiological arousal and cognition combine to influence the basic neural response to emotional stimuli. PMID:27055095

  4. Are Older Adults Perceived as A Threat to Society? Exploring Perceived Age-Based Threats in 29 Nations.

    PubMed

    Ayalon, Liat

    2017-08-05

    The present study adds to the current body of literature by simultaneously examining the public perception of young and old people as posing realistic threats (e.g., to the group's power, resources, and welfare) and symbolic threats (e.g., to one's world view, belief system and values). The fourth wave of the European Social Survey was administered to individuals from 29 countries. Analysis is based on 56,170 individuals, who had data on the four relevant indicators. The study relied on a latent profile analysis to develop a typology of perceived realistic and symbolic threats to society by younger and older adults. A three-profile solution indicated that the perception of older and younger adults as threats to society often co-occurs. Sociodemographic characteristics at the individual-level and the Gini coefficient (e.g., an inequality indicator) at the country-level had differential associations with the profiles identified. The study calls for a more balanced approach which evaluates attitudes toward both younger and older adults as potential sources of threat. Attention should be paid to individual- and national-level characteristics associated with age-based threats (e.g., the perception of a group, defined by its chronological age, as threatening). © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    PubMed

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  6. Worker training for new threats: a proposed framework.

    PubMed

    Mitchell, Clifford S; Doyle, Mary L; Moran, John B; Lippy, Bruce; Hughes, Joseph T; Lum, Max; Agnew, Jacqueline

    2004-11-01

    In an effort to identify health and safety training needs for various groups of workers related to weapons of mass destruction, including chemical, biological, radiological, and nuclear weapons and high yield explosives (CBRNE), a conference, "Worker Training in a New Era: Responding to New Threats," was held at the Johns Hopkins Bloomberg School of Public Health in October 2002. Two questions were addressed: Which general skills and knowledge are common to all workers who might be exposed to terrorist threats from CBRNE weapons? What are the particular skills and knowledge relevant to these threats that are specific to workers in different sectors? Thirteen core components for pre- and post-event training were identified. Pre-event training applies to all workers. Post-event training applies to selected personnel including first responders, skilled support personnel, and other workers involved in these operations. Recommendations to improve worker safety training related to preparedness include: identify specific competencies for worker pre- and post-event training; coordinate Federal policy on worker training for CBRNE hazards; adopt federal guidelines or standards on worker training for new CBRNE threats, based on the competencies and coordinated Federal policy; conduct an inventory of training programs and other resources that could be used or adapted for use for new threats; and develop new training content and methods for pre- and post-event training to address specific competencies. Given the possibility for the introduction of CBRNE threats into the workplace, all workers need some training in the potential hazards involved: the individual worker's specific role in an emergency; incident command; activation of the emergency notification system; use of personal protective equipment (PPE); and safe evacuation of the workplace. While some occupational sectors have developed effective training related to these new threats, there is a need to develop, implement

  7. A horizon scanning assessment of current and potential future threats to migratory shorebirds

    USGS Publications Warehouse

    Sutherland, William J.; Alves, José A.; Amano, Tatsuya; Chang, Charlotte H.; Davidson, Nicholas C.; Finlayson, C. Max; Gill, Jennifer A.; Gill, Robert E.; González, Patricia M.; Gunnarsson, Tómas Grétar; Kleijn, David; Spray, Chris J.; Székely, Tamás; Thompson, Des B.A.

    2012-01-01

    We review the conservation issues facing migratory shorebird populations that breed in temperate regions and use wetlands in the non-breeding season. Shorebirds are excellent model organisms for understanding ecological, behavioural and evolutionary processes and are often used as indicators of wetland health. A global team of experienced shorebird researchers identified 45 issues facing these shorebird populations, and divided them into three categories (natural, current anthropogenic and future issues). The natural issues included megatsunamis, volcanoes and regional climate changes, while current anthropogenic threats encompassed agricultural intensification, conversion of tidal flats and coastal wetlands by human infrastructure developments and eutrophication of coastal systems. Possible future threats to shorebirds include microplastics, new means of recreation and infectious diseases. We suggest that this review process be broadened to other taxa to aid the identification and ranking of current and future conservation actions.

  8. The effect of stereotype threat on performance of a rhythmic motor skill.

    PubMed

    Huber, Meghan E; Seitchik, Allison E; Brown, Adam J; Sternad, Dagmar; Harkins, Stephen G

    2015-04-01

    Many studies using cognitive tasks have found that stereotype threat, or concern about confirming a negative stereotype about one's group, debilitates performance. The few studies that documented similar effects on sensorimotor performance have used only relatively coarse measures to quantify performance. This study tested the effect of stereotype threat on a rhythmic ball bouncing task, where previous analyses of the task dynamics afforded more detailed quantification of the effect of threat on motor control. In this task, novices hit the ball with positive racket acceleration, indicative of unstable performance. With practice, they learn to stabilize error by changing their ball-racket impact from positive to negative acceleration. Results showed that for novices, stereotype threat potentiated hitting the ball with positive racket acceleration, leading to poorer performance of stigmatized females. However, when the threat manipulation was delivered after having acquired some skill, reflected by negative racket acceleration, the stigmatized females performed better. These findings are consistent with the mere effort account that argues that stereotype threat potentiates the most likely response on the given task. The study also demonstrates the value of identifying the control mechanisms through which stereotype threat has its effects on outcome measures. (c) 2015 APA, all rights reserved.

  9. The Effect of Stereotype Threat on Performance of a Rhythmic Motor Skill

    PubMed Central

    Huber, Meghan E.; Seitchik, Allison E.; Brown, Adam J.; Sternad, Dagmar; Harkins, Stephen G.

    2015-01-01

    Many studies using cognitive tasks have found that stereotype threat, or concern about confirming a negative stereotype about one's group, debilitates performance. The few studies that documented similar effects on sensorimotor performance have used only relatively coarse measures to quantify performance. Three experiments tested the effect of stereotype threat on a rhythmic ball bouncing task, both at the novice and skilled level. Previous analysis of the task dynamics afforded more detailed quantification of the effect of threat on motor control. In this task, novices hit the ball with positive racket acceleration, indicative of unstable performance. With practice, they learn to stabilize error by changing their ball-racket impact from positive to negative acceleration. Results showed that for novices, stereotype threat potentiated hitting the ball with positive racket acceleration, leading to poorer performance of stigmatized females. However, when the threat manipulation was delivered after having acquired some skill, reflected by negative racket acceleration, the stigmatized females performed better. These findings are consistent with the mere effort account that argues that stereotype threat potentiates the most likely response on the given task. The study also demonstrates the value of identifying the control mechanisms through which stereotype threat has its effects on outcome measures. PMID:25706769

  10. Attentional Modulation of Visual-Evoked Potentials by Threat: Investigating the Effect of Evolutionary Relevance

    ERIC Educational Resources Information Center

    Brown, Christopher; El-Deredy, Wael; Blanchette, Isabelle

    2010-01-01

    In dot-probe tasks, threatening cues facilitate attention to targets and enhance the amplitude of the target P1 peak of the visual-evoked potential. While theories have suggested that evolutionarily relevant threats should obtain preferential neural processing, this has not been examined empirically. In this study we examined the effects of…

  11. A horizon scan of future threats and opportunities for pollinators and pollination.

    PubMed

    Brown, Mark J F; Dicks, Lynn V; Paxton, Robert J; Baldock, Katherine C R; Barron, Andrew B; Chauzat, Marie-Pierre; Freitas, Breno M; Goulson, Dave; Jepsen, Sarina; Kremen, Claire; Li, Jilian; Neumann, Peter; Pattemore, David E; Potts, Simon G; Schweiger, Oliver; Seymour, Colleen L; Stout, Jane C

    2016-01-01

    Background. Pollinators, which provide the agriculturally and ecologically essential service of pollination, are under threat at a global scale. Habitat loss and homogenisation, pesticides, parasites and pathogens, invasive species, and climate change have been identified as past and current threats to pollinators. Actions to mitigate these threats, e.g., agri-environment schemes and pesticide-use moratoriums, exist, but have largely been applied post-hoc. However, future sustainability of pollinators and the service they provide requires anticipation of potential threats and opportunities before they occur, enabling timely implementation of policy and practice to prevent, rather than mitigate, further pollinator declines. Methods.Using a horizon scanning approach we identified issues that are likely to impact pollinators, either positively or negatively, over the coming three decades. Results.Our analysis highlights six high priority, and nine secondary issues. High priorities are: (1) corporate control of global agriculture, (2) novel systemic pesticides, (3) novel RNA viruses, (4) the development of new managed pollinators, (5) more frequent heatwaves and drought under climate change, and (6) the potential positive impact of reduced chemical use on pollinators in non-agricultural settings. Discussion. While current pollinator management approaches are largely driven by mitigating past impacts, we present opportunities for pre-emptive practice, legislation, and policy to sustainably manage pollinators for future generations.

  12. A horizon scan of future threats and opportunities for pollinators and pollination

    PubMed Central

    Dicks, Lynn V.; Paxton, Robert J.; Baldock, Katherine C.R.; Barron, Andrew B.; Chauzat, Marie-Pierre; Freitas, Breno M.; Goulson, Dave; Jepsen, Sarina; Kremen, Claire; Li, Jilian; Neumann, Peter; Pattemore, David E.; Potts, Simon G.; Schweiger, Oliver; Seymour, Colleen L.; Stout, Jane C.

    2016-01-01

    Background. Pollinators, which provide the agriculturally and ecologically essential service of pollination, are under threat at a global scale. Habitat loss and homogenisation, pesticides, parasites and pathogens, invasive species, and climate change have been identified as past and current threats to pollinators. Actions to mitigate these threats, e.g., agri-environment schemes and pesticide-use moratoriums, exist, but have largely been applied post-hoc. However, future sustainability of pollinators and the service they provide requires anticipation of potential threats and opportunities before they occur, enabling timely implementation of policy and practice to prevent, rather than mitigate, further pollinator declines. Methods.Using a horizon scanning approach we identified issues that are likely to impact pollinators, either positively or negatively, over the coming three decades. Results.Our analysis highlights six high priority, and nine secondary issues. High priorities are: (1) corporate control of global agriculture, (2) novel systemic pesticides, (3) novel RNA viruses, (4) the development of new managed pollinators, (5) more frequent heatwaves and drought under climate change, and (6) the potential positive impact of reduced chemical use on pollinators in non-agricultural settings. Discussion. While current pollinator management approaches are largely driven by mitigating past impacts, we present opportunities for pre-emptive practice, legislation, and policy to sustainably manage pollinators for future generations. PMID:27602260

  13. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    PubMed

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  14. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. PMID:23736227

  15. When fear forms memories: threat of shock and brain potentials during encoding and recognition.

    PubMed

    Weymar, Mathias; Bradley, Margaret M; Hamm, Alfons O; Lang, Peter J

    2013-03-01

    The anticipation of highly aversive events is associated with measurable defensive activation, and both animal and human research suggests that stress-inducing contexts can facilitate memory. Here, we investigated whether encoding stimuli in the context of anticipating an aversive shock affects recognition memory. Event-related potentials (ERPs) were measured during a recognition test for words that were encoded in a font color that signaled threat or safety. At encoding, cues signaling threat of shock, compared to safety, prompted enhanced P2 and P3 components. Correct recognition of words encoded in the context of threat, compared to safety, was associated with an enhanced old-new ERP difference (500-700 msec; centro-parietal), and this difference was most reliable for emotional words. Moreover, larger old-new ERP differences when recognizing emotional words encoded in a threatening context were associated with better recognition, compared to words encoded in safety. Taken together, the data indicate enhanced memory for stimuli encoded in a context in which an aversive event is merely anticipated, which could assist in understanding effects of anxiety and stress on memory processes. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. Disarming the Threat to Feminist Identification: An Application of Personal Construct Theory to Measurement and Intervention

    ERIC Educational Resources Information Center

    Moradi, Bonnie; Martin, Annelise; Brewster, Melanie E.

    2012-01-01

    Many individuals endorse feminist values but do not identify as feminist. The present set of studies tests the concept of threat, grounded in G. A. Kelly's personal construct theory of personality, as a potential factor in feminist nonidentification. Study 1 introduces the theoretically grounded "Feminist Threat Index" and evaluates its…

  17. A freshwater biodiversity hotspot under pressure - assessing threats and identifying conservation needs for ancient Lake Ohrid

    NASA Astrophysics Data System (ADS)

    Kostoski, G.; Albrecht, C.; Trajanovski, S.; Wilke, T.

    2010-07-01

    Freshwater habitats and species living in freshwater are generally more prone to extinction than terrestrial or marine ones. Immediate conservation measures for world-wide freshwater resources are thus of eminent importance. This is particularly true for so called ancient lakes. While these lakes are famous for being evolutionary theatres, often displaying an extraordinarily high degree of biodiversity and endemism, in many cases these biota are also experiencing extreme anthropogenic impact. Lake Ohrid, the European biodiversity hotspot, is a prime example for a lake with a magnitude of narrow range endemic taxa that are under increasing anthropogenic pressure. Unfortunately, evidence for a "creeping biodiversity crisis" has accumulated over the last decades, and major socio-political changes have gone along with human-mediated environmental changes. Based on field surveys, monitoring data, published records, and expert interviews, we aimed to (1) assess threats to Lake Ohrids' (endemic) biodiversity, (2) summarize existing conservation activities and strategies, and (3) outline future conservation needs for Lake Ohrid. We compiled threats to both specific taxa (and in cases to particular species) as well as to the lake ecosystems itself. Major conservation concerns identified for Lake Ohrid are: (1) watershed impacts, (2) agriculture and forestry, (3) tourism and population growth, (4) non-indigenous species, (5) habitat alteration or loss, (6) unsustainable exploitation of fisheries, and (7) global climate change. Of the 11 IUCN (International Union for Conservation of Nature and Natural Resources) threat classes scored, seven have moderate and three severe impacts. These latter threat classes are energy production and mining, biological resource use, and pollution. We review and discuss institutional responsibilities, environmental monitoring and ecosystem management, existing parks and reserves, biodiversity and species measures, international conservation

  18. Threat and error management for anesthesiologists: a predictive risk taxonomy

    PubMed Central

    Ruskin, Keith J.; Stiegler, Marjorie P.; Park, Kellie; Guffey, Patrick; Kurup, Viji; Chidester, Thomas

    2015-01-01

    Purpose of review Patient care in the operating room is a dynamic interaction that requires cooperation among team members and reliance upon sophisticated technology. Most human factors research in medicine has been focused on analyzing errors and implementing system-wide changes to prevent them from recurring. We describe a set of techniques that has been used successfully by the aviation industry to analyze errors and adverse events and explain how these techniques can be applied to patient care. Recent findings Threat and error management (TEM) describes adverse events in terms of risks or challenges that are present in an operational environment (threats) and the actions of specific personnel that potentiate or exacerbate those threats (errors). TEM is a technique widely used in aviation, and can be adapted for the use in a medical setting to predict high-risk situations and prevent errors in the perioperative period. A threat taxonomy is a novel way of classifying and predicting the hazards that can occur in the operating room. TEM can be used to identify error-producing situations, analyze adverse events, and design training scenarios. Summary TEM offers a multifaceted strategy for identifying hazards, reducing errors, and training physicians. A threat taxonomy may improve analysis of critical events with subsequent development of specific interventions, and may also serve as a framework for training programs in risk mitigation. PMID:24113268

  19. Summary of pheromone lures of potentially invasive moths (Lymantriidae: Lepidoptera) and a ranking of their potential threat to certain North American habitats

    Treesearch

    Paul W. Schaefer; Gerhard Gries

    2007-01-01

    Many Asian lymantriid moths in the genera Lymantria and Orgyia pose imminent threats of being accidentally introduced into North America. Based on their (a) extent of polyphagy; (b) potential of transoceanic transportation; (c) likelihood of establishment in North America; and (d) life history traits, we propose a ranked list (...

  20. Towards a general framework for predicting threat status of data-deficient species from phylogenetic, spatial and environmental information.

    PubMed

    Jetz, Walter; Freckleton, Robert P

    2015-02-19

    In taxon-wide assessments of threat status many species remain not included owing to lack of data. Here, we present a novel spatial-phylogenetic statistical framework that uses a small set of readily available or derivable characteristics, including phylogenetically imputed body mass and remotely sensed human encroachment, to provide initial baseline predictions of threat status for data-deficient species. Applied to assessed mammal species worldwide, the approach effectively identifies threatened species and predicts the geographical variation in threat. For the 483 data-deficient species, the models predict highly elevated threat, with 69% 'at-risk' species in this set, compared with 22% among assessed species. This results in 331 additional potentially threatened mammals, with elevated conservation importance in rodents, bats and shrews, and countries like Colombia, Sulawesi and the Philippines. These findings demonstrate the future potential for combining phylogenies and remotely sensed data with species distributions to identify species and regions of conservation concern. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  1. Linking terrestrial and marine conservation planning and threats analysis.

    PubMed

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  2. Threat interferes with response inhibition.

    PubMed

    Hartikainen, Kaisa M; Siiskonen, Anna R; Ogawa, Keith H

    2012-05-09

    A potential threat, such as a spider, captures attention and engages executive functions to adjust ongoing behavior and avoid danger. We and many others have reported slowed responses to neutral targets in the context of emotional distractors. This behavioral slowing has been explained in the framework of attentional competition for limited resources with emotional stimuli prioritized. Alternatively, slowed performance could reflect the activation of avoidance/freezing-type motor behaviors associated with threat. Although the interaction of attention and emotion has been widely studied, little is known on the interaction between emotion and executive functions. We studied how threat-related stimuli (spiders) interact with executive performance and whether the interaction profile fits with a resource competition model or avoidance/freezing-type motor behaviors. Twenty-one young healthy individuals performed a Go-NoGo visual discrimination reaction time (RT) task engaging several executive functions with threat-related and emotionally neutral distractors. The threat-related distractors had no effect on the RT or the error rate in the Go trials. The NoGo error rate, reflecting failure in response inhibition, increased significantly because of threat-related distractors in contrast to neutral distractors, P less than 0.05. Thus, threat-related distractors temporarily impaired response inhibition. Threat-related distractors associated with increased commission errors and no effect on RT does not suggest engagement of avoidance/freezing-type motor behaviors. The results fit in the framework of the resource competition model. A potential threat calls for evaluation of affective significance as well as inhibition of undue emotional reactivity. We suggest that these functions tax executive resources and may render other executive functions, such as response inhibition, temporarily compromised when the demands for resources exceed availability.

  3. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    DTIC Science & Technology

    2013-08-01

    potential threats present in this scene and explain the meaning and implications of these threats. You have two minutes to write a response...could be due to the nature of the tasks or to fatigue. Requiring Soldiers to write answers on multiple trials, and across similar tasks, might have...tasks will likely be significantly different from those experienced in the trainer. This would remove the writing requirement over multiple trials

  4. The wilderness threats matrix: A framework for assessing impacts

    Treesearch

    David N. Cole

    1994-01-01

    A comprehensive framework for assessing threats to wilderness is described. The framework is represented as a matrix of potential threats and attributes of wilderness character. Cells in the matrix represent the impacts of threats on each attribute. Potential applications of the matrix are described. An application of the matrix to the wildernesses in the Forest...

  5. The role of threats in animal cooperation

    PubMed Central

    Cant, Michael A.

    2011-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors—impact, accuracy and perception—that together determine the effectiveness of threats to induce cooperation. PMID:20798110

  6. Aversive Startle Potentiation and Fear Pathology: Mediating Role of Threat Sensitivity and Moderating Impact of Depression

    PubMed Central

    Yancey, James R.; Vaidyanathan, Uma; Patrick, Christopher J.

    2015-01-01

    Enhanced startle during exposure to unpleasant cues (aversive startle potentiation; ASP) appears in the RDoC matrix as a physiological index of acute threat response. Increased ASP has been linked to focal fear disorders and to scale measures of dispositional fearfulness (i.e., threat sensitivity; THT+). However, some studies have reported reduced ASP for fear pathology accompanied by major depressive disorder (MDD) or pervasive distress. The current study evaluated whether (a) THT+ as indexed by reported dispositional fearfulness mediates the relationship between fear disorders (when unaccompanied by depression) and ASP, and (b) depression moderates relations of THT+ and fear disorders with ASP. Fear disorder participants without MDD showed enhanced ASP whereas those with MDD (or other distress conditions) showed evidence of reduced ASP. Continuous THT+ scores also predicted ASP, and this association: (a) was likewise moderated by depression/distress, and (b) accounted for the relationship between ASP and fear pathology without MDD. These findings point to a role for the RDoC construct of acute threat, operationalized dispositionally, in enhanced ASP shown by individuals with fear pathology unaccompanied by distress pathology. PMID:25448265

  7. The effect of challenge and threat states on performance: An examination of potential mechanisms

    PubMed Central

    Moore, Lee J; Vine, Samuel J; Wilson, Mark R; Freeman, Paul

    2012-01-01

    Challenge and threat states predict future performance; however, no research has examined their immediate effect on motor task performance. The present study examined the effect of challenge and threat states on golf putting performance and several possible mechanisms. One hundred twenty-seven participants were assigned to a challenge or threat group and performed six putts during which emotions, gaze, putting kinematics, muscle activity, and performance were recorded. Challenge and threat states were successively manipulated via task instructions. The challenge group performed more accurately, reported more favorable emotions, and displayed more effective gaze, putting kinematics, and muscle activity than the threat group. Multiple putting kinematic variables mediated the relationship between group and performance, suggesting that challenge and threat states impact performance at a predominately kinematic level. PMID:22913339

  8. EU alerting and reporting systems for potential chemical public health threats and hazards.

    PubMed

    Orford, R; Crabbe, H; Hague, C; Schaper, A; Duarte-Davidson, R

    2014-11-01

    A number of European and international IT platforms are used to notify competent authorities of new potential chemical exposures. Recently the European Parliament and the Council of European Union adopted new legislation that aims to improve the co-ordinated response to cross border health threats (Decision 1082/2013/EU). The Decision, inter alia, sets provisions on notification, ad hoc monitoring and coordination of public health measures following serious cross border threats to health from biological, chemical and environmental events as well as events that have an unknown origin. The legal instrument applies to all European Union Member States and is comparable to the International Health Regulations in its content, requirements and adoption of a multiple hazards approach. An inter-sectoral and multidisciplinary response to events with potentially dangerous cross border exposure pathways is often required. For example, European Poisons Centres may be aware of cases of toxic exposure to a product and, in parallel, trading standards may be aware of the same product due to a breach of consumer product standards. Whilst both cases would have been recorded for separate purposes in different alerting systems, they relate to the same exposure pathway; therefore a process for linking these records would allow a more robust approach to risk assessment and risk mitigation. The Decision seeks to reconcile this issue for serious threats by linking relevant platforms into one overarching higher level risk management IT platform called the Early Warning Response System (EWRS). This system will serve to link other sectors within the European Commission (EC) to public health (e.g. medicines), as well as other EU agencies and international bodies via co-notification features. Other European alert systems will be linked to EWRS to facilitate information sharing at both the assessment and management levels. This paper provides a timely overview of the main systems run by the EC

  9. Prefrontal inhibition of threat processing reduces working memory interference

    PubMed Central

    Clarke, Robert; Johnstone, Tom

    2013-01-01

    Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM) task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modeling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesized that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat-related interference. PMID

  10. Potential threats on pottery as local wisdom in Sitiwinangun Cirebon district

    NASA Astrophysics Data System (ADS)

    Putri, D. P.

    2018-05-01

    This study is aimed to find out the type of threats of pottery as a local wisdom of Sitiwinangun Village. The study used qualitative approach which included observation, interviews, direct involvement and literature study as technique to collect the data. The data was analyzed by descriptive exploratory analysis. The finding results showed that the production of Sitiwinangun pottery, in the technique and motifs, were still produced according to the ancestors. Pottery has a closed-relationship to agrarian culture of Sitiwinangun's society. In cultivating season, the soil was used not only used to cultivate rice and palawija (crops planted as second crop in dry season) but it was also used to dig a layer of soil as the raw material of pottery. There were some potential threats on Sitiwinangun Pottery such as a reduction in raw material because of the land-settlement, slow regeneration, and consumers' preferred on household appliance made of plastic. Nevertheless, it never decreases the spirit of Sitiwinangun society to maintain the pottery as their local wisdom. They keep on their principle that the nature gives the value on their life and the value is an ancestral heritage that must be maintained in modern era in order to preserve the environment. Furthermore, the most important is that pottery is not only made as the functional object for human activity but it is made as the local knowledge of Sitiwinagun that very allows to be learnt intact and sustainable.

  11. Orthodontic treatment with fixed appliances and biofilm formation--a potential public health threat?

    PubMed

    Ren, Yijin; Jongsma, Marije A; Mei, Li; van der Mei, Henny C; Busscher, Henk J

    2014-09-01

    Orthodontic treatment is highly popular for restoring functional and facial esthetics in juveniles and adults. As a downside, prevalence of biofilm-related complications is high. Objectives of this review are to (1) identify special features of biofilm formation in orthodontic patients and (2) emphasize the need for strong concerted action to prevent biofilm-related complications during orthodontic treatment. Literature on biofilm formation in the oral cavity is reviewed to identify special features of biofilm formation in orthodontic patients. Estimates are made of juvenile and adult orthodontic patient population sizes, and biofilm-related complication rates are used to indicate the costs and clinical workload resulting from biofilm-related complications. Biofilm formation in orthodontic patients is governed by similar mechanisms as common in the oral cavity. However, orthodontic appliances hamper the maintenance of oral hygiene and provide numerous additional surfaces, with properties alien to the oral cavity, to which bacteria can adhere and form a biofilm. Biofilm formation may lead to gingivitis and white spot lesions, compromising facial esthetics. Whereas gingivitis after orthodontic treatment is often transient, white spot lesions may turn into cavities requiring professional restoration. Complications requiring professional care develop in 15 % of all orthodontic patients, implying an annual cost of over US$500,000,000 and a workload of 1,000 full-time dentists in the USA alone. Improved preventive measures and antimicrobial materials are urgently required to prevent biofilm-related complications of orthodontic treatment from overshadowing its functional and esthetic advantages. High treatment demand and occurrence of biofilm-related complications requiring professional care make orthodontic treatment a potential public health threat.

  12. Space Station crew safety alternatives study. Volume 2: Threat development

    NASA Technical Reports Server (NTRS)

    Raasch, R. F.; Peercy, R. L., Jr.; Rockoff, L. A.

    1985-01-01

    The first 15 years of accumulated space station concepts for initial operational capability (IOC) during the early 1990's were considered. Twenty-five threats to the space station are identified and selected threats addressed as impacting safety criteria, escape and rescue, and human factors safety concerns. Of the 25 threats identified, eight are discussed including strategy options for threat control: fire, biological or toxic contamination, injury/illness, explosion, loss of pressurization, radiation, meteoroid penetration, and debris.

  13. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    PubMed

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  14. Global threat to agriculture from invasive species.

    PubMed

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-05

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread.

  15. Global threat to agriculture from invasive species

    PubMed Central

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  16. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  17. You may worry, but can you recognize threats when you see them?; Neuroticism, threat identifications, and negative affect.

    PubMed

    Tamir, Maya; Robinson, Michael D; Solberg, Emily Crawford

    2006-10-01

    The present studies sought to investigate the hedonic consequences of threat-identification skills at low and high levels of neuroticism. Such skills were assessed in terms of both speed (Study 1) and accuracy (Study 2) of identifying threatening objects in cognitive tasks. As predicted, threat-identification skills interacted with trait neuroticism in predicting subjective experiences. Specifically, individuals high in neuroticism experienced lower levels of negative affect during their everyday lives if they were also skilled in identifying threats in the cognitive tasks (Studies 1-2). Such skills did not matter at low levels of neuroticism. This interactive pattern was also replicated in the context of life domain satisfaction (Study 2). The results support the view that avoidance motivation encompasses multiple component processes, including some that are cognitive in nature, and specifically extends self-regulatory views of neuroticism. Of most importance, our data indicate that threat-identification skills can be hedonically beneficial, rather than costly, at high levels of neuroticism.

  18. Use of multi-criteria decision analysis to identify potentially dangerous glacial lakes.

    PubMed

    Kougkoulos, Ioannis; Cook, Simon J; Jomelli, Vincent; Clarke, Leon; Symeonakis, Elias; Dortch, Jason M; Edwards, Laura A; Merad, Myriam

    2018-04-15

    Glacial Lake Outburst Floods (GLOFs) represent a significant threat in deglaciating environments, necessitating the development of GLOF hazard and risk assessment procedures. Here, we outline a Multi-Criteria Decision Analysis (MCDA) approach that can be used to rapidly identify potentially dangerous lakes in regions without existing tailored GLOF risk assessments, where a range of glacial lake types exist, and where field data are sparse or non-existent. Our MCDA model (1) is desk-based and uses freely and widely available data inputs and software, and (2) allows the relative risk posed by a range of glacial lake types to be assessed simultaneously within any region. A review of the factors that influence GLOF risk, combined with the strict rules of criteria selection inherent to MCDA, has allowed us to identify 13 exhaustive, non-redundant, and consistent risk criteria. We use our MCDA model to assess the risk of 16 extant glacial lakes and 6 lakes that have already generated GLOFs, and found that our results agree well with previous studies. For the first time in GLOF risk assessment, we employed sensitivity analyses to test the strength of our model results and assumptions, and to identify lakes that are sensitive to the criteria and risk thresholds used. A key benefit of the MCDA method is that sensitivity analyses are readily undertaken. Overall, these sensitivity analyses lend support to our model, although we suggest that further work is required to determine the relative importance of assessment criteria, and the thresholds that determine the level of risk for each criterion. As a case study, the tested method was then applied to 25 potentially dangerous lakes in the Bolivian Andes, where GLOF risk is poorly understood; 3 lakes are found to pose 'medium' or 'high' risk, and require further detailed investigation. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. An examination of stereotype threat effects on girls' mathematics performance.

    PubMed

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias.

  20. Near Earth Asteroid Characterization for Threat Assessment

    NASA Technical Reports Server (NTRS)

    Dotson, Jessie; Mathias, Donovan; Wheeler, Lorien; Wooden, Diane; Bryson, Kathryn; Ostrowski, Daniel

    2017-01-01

    Physical characteristics of NEAs are an essential input to modeling behavior during atmospheric entry and to assess the risk of impact but determining these properties requires a non-trivial investment of time and resources. The characteristics relevant to these models include size, density, strength and ablation coefficient. Some of these characteristics cannot be directly measured, but rather must be inferred from related measurements of asteroids and/or meteorites. Furthermore, for the majority of NEAs, only the basic measurements exist so often properties must be inferred from statistics of the population of more completely characterized objects. The Asteroid Threat Assessment Project at NASA Ames Research Center has developed a probabilistic asteroid impact risk (PAIR) model in order to assess the risk of asteroid impact. Our PAIR model and its use to develop probability distributions of impact risk are discussed in other contributions to PDC 2017 (e.g., Mathias et al.). Here we utilize PAIR to investigate which NEA characteristics are important for assessing the impact threat by investigating how changes in these characteristics alter the damage predicted by PAIR. We will also provide an assessment of the current state of knowledge of the NEA characteristics of importance for asteroid threat assessment. The relative importance of different properties as identified using PAIR will be combined with our assessment of the current state of knowledge to identify potential high impact investigations. In addition, we will discuss an ongoing effort to collate the existing measurements of NEA properties of interest to the planetary defense community into a readily accessible database.

  1. Attention bias to threat indicates anxiety differences in sheep

    PubMed Central

    Lee, Caroline; Verbeek, Else; Doyle, Rebecca

    2016-01-01

    Humans and animals show increased attention towards threatening stimuli when they are in increased states of anxiety. The few animal studies that have examined this phenomenon, known as attention bias, have applied environmental manipulations to induce anxiety but the effects of drug-induced anxiety levels on attention bias have not been demonstrated. Here, we present an attention bias test to identify high and low anxiety states in sheep using pharmacological manipulation. Increased anxiety was induced using 1-methyl-chlorophenylpiperazine (m-CPP) and decreased anxiety with diazepam, and then we examined the behaviour of sheep in response to the presence of a dog as a threat. Increased attention towards the threat and increased vigilance were shown in sheep that received the m-CPP and reduced in sheep receiving the diazepam. The modulated attention towards a threat displayed by the m-CPP and diazepam animals suggests that attention bias can assess different levels of anxiety in sheep. Measuring attention bias has the potential to improve animal welfare assessment protocols. PMID:27277950

  2. Content specificity of attention bias to threat in anxiety disorders: a meta-analysis.

    PubMed

    Pergamin-Hight, Lee; Naim, Reut; Bakermans-Kranenburg, Marian J; van IJzendoorn, Marinus H; Bar-Haim, Yair

    2015-02-01

    Despite the established evidence for threat-related attention bias in anxiety, the mechanisms underlying this bias remain unclear. One important unresolved question is whether disorder-congruent threats capture attention to a greater extent than do more general or disorder-incongruent threat stimuli. Evidence for attention bias specificity in anxiety would implicate involvement of previous learning and memory processes in threat-related attention bias, whereas lack of content specificity would point to perturbations in more generic attention processes. Enhanced clarity of mechanism could have clinical implications for the stimuli types used in Attention Bias Modification Treatments (ABMT). Content specificity of threat-related attention bias in anxiety and potential moderators of this effect were investigated. A systematic search identified 37 samples from 29 articles (N=866). Relevant data were extracted based on specific coding rules, and Cohen's d effect size was used to estimate bias specificity effects. The results indicate greater attention bias toward disorder-congruent relative to disorder-incongruent threat stimuli (d=0.28, p<0.0001). This effect was not moderated by age, type of anxiety disorder, visual attention tasks, or type of disorder-incongruent stimuli. No evidence of publication bias was observed. Implications for threat bias in anxiety and ABMT are discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Evaluating Threats in Multinational Marine Ecosystems: A Coast Salish First Nations and Tribal Perspective.

    PubMed

    Gaydos, Joseph K; Thixton, Sofie; Donatuto, Jamie

    2015-01-01

    Despite the merit of managing natural resources on the scale of ecosystems, evaluating threats and managing risk in ecosystems that span multiple countries or jurisdictions can be challenging. This requires each government involved to consider actions in concert with actions being taken in other countries by co-managing entities. Multiple proposed fossil fuel-related and port development projects in the Salish Sea, a 16,925 km2 inland sea shared by Washington State (USA), British Columbia (Canada), and Indigenous Coast Salish governments, have the potential to increase marine vessel traffic and negatively impact natural resources. There is no legal mandate or management mechanism requiring a comprehensive review of the potential cumulative impacts of these development activities throughout the Salish Sea and across the international border. This project identifies ongoing and proposed energy-related development projects that will increase marine vessel traffic in the Salish Sea and evaluates the threats each project poses to natural resources important to the Coast Salish. While recognizing that Coast Salish traditions identify all species as important and connected, we used expert elicitation to identify 50 species upon which we could evaluate impact. These species were chosen because Coast Salish depend upon them heavily for harvest revenue or as a staple food source, they were particularly culturally or spiritually significant, or they were historically part of Coast Salish lifeways. We identified six development projects, each of which had three potential impacts (pressures) associated with increased marine vessel traffic: oil spill, vessel noise and vessel strike. Projects varied in their potential for localized impacts (pressures) including shoreline development, harbor oil spill, pipeline spill, coal dust accumulation and nearshore LNG explosion. Based on available published data, impact for each pressure/species interaction was rated as likely, possible or

  4. Evaluating Threats in Multinational Marine Ecosystems: A Coast Salish First Nations and Tribal Perspective

    PubMed Central

    Gaydos, Joseph K.; Thixton, Sofie; Donatuto, Jamie

    2015-01-01

    Despite the merit of managing natural resources on the scale of ecosystems, evaluating threats and managing risk in ecosystems that span multiple countries or jurisdictions can be challenging. This requires each government involved to consider actions in concert with actions being taken in other countries by co-managing entities. Multiple proposed fossil fuel-related and port development projects in the Salish Sea, a 16,925 km2 inland sea shared by Washington State (USA), British Columbia (Canada), and Indigenous Coast Salish governments, have the potential to increase marine vessel traffic and negatively impact natural resources. There is no legal mandate or management mechanism requiring a comprehensive review of the potential cumulative impacts of these development activities throughout the Salish Sea and across the international border. This project identifies ongoing and proposed energy-related development projects that will increase marine vessel traffic in the Salish Sea and evaluates the threats each project poses to natural resources important to the Coast Salish. While recognizing that Coast Salish traditions identify all species as important and connected, we used expert elicitation to identify 50 species upon which we could evaluate impact. These species were chosen because Coast Salish depend upon them heavily for harvest revenue or as a staple food source, they were particularly culturally or spiritually significant, or they were historically part of Coast Salish lifeways. We identified six development projects, each of which had three potential impacts (pressures) associated with increased marine vessel traffic: oil spill, vessel noise and vessel strike. Projects varied in their potential for localized impacts (pressures) including shoreline development, harbor oil spill, pipeline spill, coal dust accumulation and nearshore LNG explosion. Based on available published data, impact for each pressure/species interaction was rated as likely, possible or

  5. Cyber Intelligence Threat Prioritization

    DTIC Science & Technology

    2014-10-01

    platform that allows anyone to make their organization more visible to threat actors. Online Presence Extracurricular Activities Motive Risk...intelligence • The acquisition and analysis of information to identify, track, and predict cyber capabilities, intentions, and activities to offer courses of...access can significantly aid in identifying the risk to employees. Physical and Network-Based Access Position Abnormal Activity Infrastructure

  6. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  7. Parallel processing of general and specific threat during early stages of perception

    PubMed Central

    2016-01-01

    Differential processing of threat can consummate as early as 100 ms post-stimulus. Moreover, early perception not only differentiates threat from non-threat stimuli but also distinguishes among discrete threat subtypes (e.g. fear, disgust and anger). Combining spatial-frequency-filtered images of fear, disgust and neutral scenes with high-density event-related potentials and intracranial source estimation, we investigated the neural underpinnings of general and specific threat processing in early stages of perception. Conveyed in low spatial frequencies, fear and disgust images evoked convergent visual responses with similarly enhanced N1 potentials and dorsal visual (middle temporal gyrus) cortical activity (relative to neutral cues; peaking at 156 ms). Nevertheless, conveyed in high spatial frequencies, fear and disgust elicited divergent visual responses, with fear enhancing and disgust suppressing P1 potentials and ventral visual (occipital fusiform) cortical activity (peaking at 121 ms). Therefore, general and specific threat processing operates in parallel in early perception, with the ventral visual pathway engaged in specific processing of discrete threats and the dorsal visual pathway in general threat processing. Furthermore, selectively tuned to distinctive spatial-frequency channels and visual pathways, these parallel processes underpin dimensional and categorical threat characterization, promoting efficient threat response. These findings thus lend support to hybrid models of emotion. PMID:26412811

  8. A Systematic Screen of FDA-Approved Drugs for Inhibitors of Biological Threat Agents

    PubMed Central

    Madrid, Peter B.; Chopra, Sidharth; Manger, Ian D.; Gilfillan, Lynne; Keepers, Tiffany R.; Shurtleff, Amy C.; Green, Carol E.; Iyer, Lalitha V.; Dilks, Holli Hutcheson; Davey, Robert A.; Kolokoltsov, Andrey A.; Carrion, Ricardo; Patterson, Jean L.; Bavari, Sina; Panchal, Rekha G.; Warren, Travis K.; Wells, Jay B.; Moos, Walter H.; Burke, RaeLyn L.; Tanga, Mary J.

    2013-01-01

    Background The rapid development of effective medical countermeasures against potential biological threat agents is vital. Repurposing existing drugs that may have unanticipated activities as potential countermeasures is one way to meet this important goal, since currently approved drugs already have well-established safety and pharmacokinetic profiles in patients, as well as manufacturing and distribution networks. Therefore, approved drugs could rapidly be made available for a new indication in an emergency. Methodology/Principal Findings A large systematic effort to determine whether existing drugs can be used against high containment bacterial and viral pathogens is described. We assembled and screened 1012 FDA-approved drugs for off-label broad-spectrum efficacy against Bacillus anthracis; Francisella tularensis; Coxiella burnetii; and Ebola, Marburg, and Lassa fever viruses using in vitro cell culture assays. We found a variety of hits against two or more of these biological threat pathogens, which were validated in secondary assays. As expected, antibiotic compounds were highly active against bacterial agents, but we did not identify any non-antibiotic compounds with broad-spectrum antibacterial activity. Lomefloxacin and erythromycin were found to be the most potent compounds in vivo protecting mice against Bacillus anthracis challenge. While multiple virus-specific inhibitors were identified, the most noteworthy antiviral compound identified was chloroquine, which disrupted entry and replication of two or more viruses in vitro and protected mice against Ebola virus challenge in vivo. Conclusions/Significance The feasibility of repurposing existing drugs to face novel threats is demonstrated and this represents the first effort to apply this approach to high containment bacteria and viruses. PMID:23577127

  9. Assessing Potential of VIIRS Data for Contribution to a Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.

    2007-01-01

    This viewgraph presentation reviews the contributions by the Rapid Prototyping Capability (RPC) towards using Visible Infrared Imager / Radiometer Suite (VIIRS) data in assessing the damage to forests. The Healthy Forest Restoration Act of 2003 mandates development of national Early Warning System (EWS) for forest threat monitoring and mitigation. NASA Stennis is working with the US Forest Service to develop needed components of this EWS. The use of MODIS data for monitoring forest disturbance at broad regional scales is a componet of this program. This RPC experiment was initiated to assess potential of the MODIS follow-on, VIIRS, for monitoring forest disturbance at broad scales and thereby contributing to the EWS. This presentation reviews the potential use of the VIIRS to examine the damage to forests caused by gyspy moths in the West Virginia and Virginia area.

  10. The European Union Joint Procurement Agreement for cross-border health threats: what is the potential for this new mechanism of health system collaboration?

    PubMed

    Azzopardi-Muscat, Natasha; Schroder-Bäck, Peter; Brand, Helmut

    2017-01-01

    The Joint Procurement Agreement (JPA) is an innovative instrument for multi-country procurement of medical countermeasures against cross-border health threats. This paper aims to assess its potential performance. A literature review was conducted to identify key features of successful joint procurement programmes. Documentary analysis and a key informants' interview were carried out to analyse the European Union (EU) JPA. Ownership, equity, transparency, stable central financing, standardisation, flexibility and gradual development were identified as important prerequisites for successful establishment of multi-country joint procurement programmes in the literature while security of supply, favourable prices, reduction of operational costs and administrative burden and creation of professional expert networks were identified as desirable outcomes. The EU JPA appears to fulfil the criteria of ownership, transparency, equity, flexibility and gradual development. Standardisation is only partly fulfilled and central EU level financing is not provided. Security of supply is an important outcome for all EU Member States (MS). Price savings, reduction in administrative burden and creation of professional networks may be particularly attractive for the smaller MS. The JPA has the potential to increase health system collaboration and efficiency at EU level provided that the incentives for sustained commitment of larger MS are sufficiently attractive.

  11. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    ERIC Educational Resources Information Center

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  12. Reactivity to uncertain threat as a familial vulnerability factor for alcohol use disorder.

    PubMed

    Gorka, S M; Hee, D; Lieberman, L; Mittal, V A; Phan, K L; Shankman, S A

    2016-12-01

    When sober, problematic drinkers display exaggerated reactivity to threats that are uncertain (U-threat). Since this aversive affective state can be alleviated via acute alcohol intoxication, it has been posited that individuals who exhibit heightened reactivity to U-threat at baseline are motivated to use alcohol as a means of avoidance-based coping, setting the stage for excessive drinking. To date, however, no study has attempted to characterize the dispositional nature of exaggerated reactivity to U-threat and test whether it is a vulnerability factor or exclusively a disease marker of problematic alcohol use. The current investigation utilized a family study design to address these gaps by examining whether (1) reactivity to U-threat is associated with risk for problematic alcohol use, defined by family history of alcohol use disorder (AUD) and (2) reactivity to U-threat is correlated amongst adult biological siblings. A total of 157 families, and 458 individuals, participated in the study and two biological siblings completed a threat-of-shock task designed to probe reactivity to U-threat and predictable threat (P-threat). Startle potentiation was collected as an index of aversive responding. Within biological siblings, startle potentiation to U-threat [intraclass correlation (ICC) = 0.35] and P-threat (ICC = 0.63) was significantly correlated. In addition, independent of an individuals' own AUD status, startle potentiation to U-threat, but not P-threat, was positively associated with risk for AUD (i.e. AUD family history). This suggests that heightened reactivity to U-threat may be a familial vulnerability factor for problematic drinking and a novel prevention target for AUD.

  13. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  14. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  15. Categorizing threat : building and using a generic threat matrix.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and ismore » not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.« less

  16. Threats to information security of real-time disease surveillance systems.

    PubMed

    Henriksen, Eva; Johansen, Monika A; Baardsgaard, Anders; Bellika, Johan G

    2009-01-01

    This paper presents the main results from a qualitative risk assessment of information security aspects for a new real-time disease surveillance approach in general, and for the Snow surveillance system in particular. All possible security threats and acceptable solutions, and the implications these solutions had to the design of the system, were discussed. Approximately 30 threats were identified. None of these got an unacceptable high risk level originally, but two got medium risk level, of which one was concluded to be unacceptable after further investigation. Of the remaining low risk threats, some have severe consequence, thus requiring particular assessment. Since it is very important to identify and solve all security threats before real-time solutions can be used in a wide scale, additional investigations are needed.

  17. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    PubMed

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  18. A global threats overview for Numeniini populations: synthesising expert knowledge for a group of declining migratory birds.

    USGS Publications Warehouse

    Pearce-Higgins, James W.; Brown, Daniel J.; Douglas, David J.T.; Alves, José A.; Bellio, Mariagrazia; Bocher, Pierrick; Buchannan, Graeme M.; Clay, Robert P.; Conklin, Jesse R.; Crockford, Nicola; Dann, Peter; Elts, Jaanus; Friis, Christian; Fuller, Richard A.; Gill, Jennifer A.; Gosbell, Ken; Johnson, James A.; Marquez-Ferrando, Rocio; Masero, José A.; Melville, David S.; Millington, Spike; Minton, Clive; Mundkur, Taej; Nol, Erika; Pehlak, Hannes; Piersma, Theunis; Rogers, Danny I.; Ruthrauff, Daniel R.; Senner, Nathan R.; Nazeer Shah, Junid; Sheldon, Rob D.; Soloviev, Sergej A.; Tomkovich, Pavel S.; Verkuil, Yvonne I.

    2017-01-01

    The Numeniini is a tribe of 13 wader species (Scolopacidae, Charadriiformes) of which seven are Near Threatened or globally threatened, including two Critically Endangered. To help inform conservation management and policy responses, we present the results of an expert assessment of the threats that members of this taxonomic group face across migratory flyways. Most threats are increasing in intensity, particularly in non-breeding areas, where habitat loss resulting from residential and commercial development, aquaculture, mining, transport, disturbance, problematic invasive species, pollution and climate change were regarded as having the greatest detrimental impact. Fewer threats (mining, disturbance, problematic native species and climate change) were identified as widely affecting breeding areas. Numeniini populations face the greatest number of non-breeding threats in the East Asian-Australasian Flyway, especially those associated with coastal reclamation; related threats were also identified across the Central and Atlantic Americas, and East Atlantic flyways. Threats on the breeding grounds were greatest in Central and Atlantic Americas, East Atlantic and West Asian flyways. Three priority actions were associated with monitoring and research: to monitor breeding population trends (which for species breeding in remote areas may best be achieved through surveys at key non-breeding sites), to deploy tracking technologies to identify migratory connectivity, and to monitor land-cover change across breeding and non-breeding areas. Two priority actions were focused on conservation and policy responses: to identify and effectively protect key non-breeding sites across all flyways (particularly in the East Asian- Australasian Flyway), and to implement successful conservation interventions at a sufficient scale across human-dominated landscapes for species' recovery to be achieved. If implemented urgently, these measures in combination have the potential to alter the

  19. Fear-related behaviors in situations of mass threat

    PubMed Central

    Espinola, Maria; Shultz, James M.; Espinel, Zelde; Althouse, Benjamin M.; Cooper, Janice L.; Baingana, Florence; Marcelin, Louis Herns; Cela, Toni; Towers, Sherry; Mazurik, Laurie; Greene, M. Claire; Beck, Alyssa; Fredrickson, Michelle; McLean, Andrew; Rechkemmer, Andreas

    2016-01-01

    ABSTRACT This Disaster Health Briefing focuses on the work of an expanding team of researchers that is exploring the dynamics of fear-related behaviors in situations of mass threat. Fear-related behaviors are individual or collective behaviors and actions initiated in response to fear reactions that are triggered by a perceived threat or actual exposure to a potentially traumatizing event. Importantly, fear-related behaviors modulate the future risk of harm. Disaster case scenarios are presented to illustrate how fear-related behaviors operate when a potentially traumatic event threatens or endangers the physical and/or psychological health, wellbeing, and integrity of a population. Fear-related behaviors may exacerbate harm, leading to severe and sometimes deadly consequences as exemplified by the Ebola pandemic in West Africa. Alternatively, fear-related behaviors may be channeled in a constructive and life-saving manner to motivate protective behaviors that mitigate or prevent harm, depending upon the nature of the threat scenario that is confronting the population. The interaction between fear-related behaviors and a mass threat is related to the type, magnitude, and consequences of the population encounter with the threat or hazard. The expression of FRBs, ranging from risk exacerbation to risk reduction, is also influenced by such properties of the threat as predictability, familiarity, controllability, preventability, and intentionality. PMID:28265486

  20. Social identity threat motivates science-discrediting online comments.

    PubMed

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as "gamers") were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition.

  1. Social Identity Threat Motivates Science-Discrediting Online Comments

    PubMed Central

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as “gamers”) were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition. PMID:25646725

  2. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  3. Superior Detection of Threat-Relevant Stimuli in Infancy

    ERIC Educational Resources Information Center

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  4. Geospatiotemporal data mining in an early warning system for forest threats in the United States

    Treesearch

    F.M. Hoffman; R.T. Mills; J. Kumar; S.S. Vulli; W.W. Hargrove

    2010-01-01

    We investigate the potential of geospatiotemporal data mining of multi-year land surface phenology data (250 m Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectroradiometer (MODIS) in this study) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster...

  5. Asians demonstrate reduced sensitivity to unpredictable threat: a preliminary startle investigation using genetic ancestry in a multiethnic sample.

    PubMed

    Nelson, Brady D; Bishop, Jeffrey R; Sarapas, Casey; Kittles, Rick A; Shankman, Stewart A

    2014-06-01

    Research has indicated that individuals of Asian descent, relative to other racial groups, demonstrate reduced emotional responding and lower prevalence rates of several anxiety disorders. It is unclear though whether these group differences extend to biomarkers of anxiety disorders and whether genetic differences play a role. This study compared self-identified Caucasian, Latino, and Asian persons (total N = 174) on startle response during a baseline period and while anticipating unpredictable threat-a putative biomarker for certain anxiety disorders--as well as predictable threat. In addition, the association between genetic ancestry and startle response was examined within each racial group to determine potential genetic influences on responding. For the baseline period, Asian participants exhibited a smaller startle response relative to Caucasian and Latino participants, who did not differ. Within each racial group, genetic ancestry was associated with baseline startle. Furthermore, genetic ancestry mediated racial group differences in baseline startle. For the threat conditions, a Race × Condition interaction indicated that Asian participants exhibited reduced startle potentiation to unpredictable, but not predicable, threat relative to Caucasian and Latino participants, who did not differ. However, genetic ancestry was not associated with threat-potentiated startle in any racial group. This study adds to the growing literature on racial differences in emotional responding and provides preliminary evidence suggesting that genetic ancestry may play an important role. Moreover, reduced sensitivity to unpredictable threat may reflect a mechanism for why individuals of Asian descent are at less risk for particular anxiety disorders relative to other racial groups.

  6. Threats to the viability of California spotted owls

    Treesearch

    John J. Keane

    2017-01-01

    The California spotted owl (Strix occidentalis occidentalis) is a species of conservation concern owing to threats to its habitat and populations. Verner et al. (1992) first assessed the status of the California spotted owl "The California Spotted Owl: A technical Assessment of it’s current status" (CASPO) and identified four factors as either threats or...

  7. Cyber threats to health information systems: A systematic review.

    PubMed

    Luna, Raul; Rhine, Emily; Myhra, Matthew; Sullivan, Ross; Kruse, Clemens Scott

    2016-01-01

    Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. The rationale behind this systematic review is to provide a framework for future research by identifying themes and trends of cybercrime in the healthcare industry. The authors conducted a systematic search through the CINAHL, Academic Search Complete, PubMed, and ScienceDirect databases to gather literature relative to cyber threats in healthcare. All authors reviewed the articles collected and excluded literature that did not focus on the objective. Researchers selected and examined 19 articles for common themes. The most prevalent cyber-criminal activity in healthcare is identity theft through data breach. Other concepts identified are internal threats, external threats, cyber-squatting, and cyberterrorism. The industry has now come to rely heavily on digital technologies, which increase risks such as denial of service and data breaches. Current healthcare cyber-security systems do not rival the capabilities of cyber criminals. Security of information is a costly resource and therefore many HCOs may hesitate to invest what is required to protect sensitive information.

  8. Forecasting Potential Crises.

    ERIC Educational Resources Information Center

    Neufeld, William P.

    1984-01-01

    By foreseeing the possibility of crisis, we can plan how to respond. Five potential crisis areas are identified and possible consequences discussed. The areas are the warming of the earth; water shortage; collapse of the physical infrastructure, e.g., decay of roads; global financial crisis; and the threat of nuclear war. (Author/RM)

  9. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    PubMed Central

    Pennington, Charlotte R.; McCann, Joseph J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females’ gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group’s ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females’ gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group’s gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat. PMID:29444126

  10. SWOT analysis: strengths, weaknesses, opportunities and threats of the Israeli Smallpox Revaccination Program.

    PubMed

    Huerta, Michael; Balicer, Ran D; Leventhal, Alex

    2003-01-01

    During September 2002, Israel began its current revaccination program against smallpox, targeting previously vaccinated "first responders" among medical and emergency workers. In order to identify the potential strengths and weaknesses of this program and the conditions under which critical decisions were reached, we conducted a SWOT analysis of the current Israeli revaccination program, designed to identify its intrinsic strengths and weaknesses, as well as opportunities for its success and threats against it. SWOT analysis--a practical tool for the study of public health policy decisions and the social and political contexts in which they are reached--revealed clear and substantial strengths and weaknesses of the current smallpox revaccination program, intrinsic to the vaccine itself. A number of threats were identified that may jeopardize the success of the current program, chief among them the appearance of severe complications of vaccination. Our finding of a lack of a generation of knowledge on smallpox vaccination highlights the need for improved physician education and dissipation of misconceptions that are prevalent in the public today.

  11. Threat effects on human oculo-motor function.

    PubMed

    Naranjo, E N; Cleworth, T W; Allum, J H J; Inglis, J T; Lea, J; Westerberg, B D; Carpenter, M G

    2017-09-17

    Neuro-anatomical evidence supports the potential for threat-related factors, such as fear, anxiety and vigilance, to influence brainstem motor nuclei controlling eye movements, as well as the vestibular nuclei. However, little is known about how threat influences human ocular responses, such as eye saccades (ES), smooth pursuit eye tracking (SP), and optokinetic nystagmus (OKN), and whether these responses can be facilitated above normal baseline levels with a natural source of threat. This study was designed to examine the effects of height-induced postural threat on the gain of ES, SP and OKN responses in humans. Twenty participants stood at two different surface heights while performing ES (ranging from 8° to 45° from center), SP (15, 20, 30°/s) and OKN (15, 30, 60°/s) responses in the horizontal plane. Height did not significantly increase the slope of the relationship between ES peak velocity and initial amplitude, or the gain of ES amplitude. In contrast height significantly increased SP and OKN gain. Significant correlations were found between changes in physiological arousal and OKN gain. Observations of changes with height in OKN and SP support neuro-anatomical evidence of threat-related mechanisms influencing both oculo-motor nuclei and vestibular reflex pathways. Although further study is warranted, the findings suggest that potential influences of fear, anxiety and arousal/alertness should be accounted for, or controlled, during clinical vestibular and oculo-motor testing. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.

  12. Postdeployment threat-related attention bias interacts with combat exposure to account for PTSD and anxiety symptoms in soldiers.

    PubMed

    Sipos, Maurice L; Bar-Haim, Yair; Abend, Rany; Adler, Amy B; Bliese, Paul D

    2014-02-01

    Recent studies suggest that assessment of threat-related attention bias may be useful in identifying soldiers at risk for clinical symptoms. The present study assessed the degree to which soldiers experienced combat events and showed attentional threat avoidance affected their reported levels of post-traumatic stress disorder (PTSD) and anxiety symptoms. Four months after a combat deployment to Iraq, 63 US soldiers completed a survey assessing combat exposures and clinical symptoms as well as a dot-probe task assessing threat-related attention bias. Significant three-way interactions regressing threat reaction times (RTs), neutral RTs, and combat exposure on PTSD and anxiety symptoms were observed. Specifically, soldiers with high levels of combat exposure, who were more likely to demonstrate attentional bias away from threat, were also more symptomatic. These results demonstrate the potential of threat-related attention bias as a behavioral marker of PTSD and anxiety symptoms in a high-risk military occupational context. Published 2013. This article is a U.S. Government work and is in the public domain in the USA.

  13. Methods of identifying potential vanpool riders.

    DOT National Transportation Integrated Search

    1977-01-01

    Identifying potential vanpool riders and matching them to form pools are fundamental tasks in the initiation of a vanpool program. The manner in which these tasks are done will determine the costs and benefits of the program. This report presents the...

  14. Are ranger patrols effective in reducing poaching-related threats within protected areas?

    USGS Publications Warehouse

    Moore, Jennnifer F.; Mulindahabi, Felix; Masozera, Michel K.; Nichols, James; Hines, James; Turikunkiko, Ezechiel; Oli, Madan K.

    2018-01-01

    Poaching is one of the greatest threats to wildlife conservation world-wide. However, the spatial and temporal patterns of poaching activities within protected areas, and the effectiveness of ranger patrols and ranger posts in mitigating these threats, are relatively unknown.We used 10 years (2006–2015) of ranger-based monitoring data and dynamic multi-season occupancy models to quantify poaching-related threats, to examine factors influencing the spatio-temporal dynamics of these threats and to test the efficiency of management actions to combat poaching in Nyungwe National Park (NNP), Rwanda.The probability of occurrence of poaching-related threats was highest at lower elevations (1,801–2,200 m), especially in areas that were close to roads and tourist trails; conversely, occurrence probability was lowest at high elevation sites (2,601–3,000 m), and near the park boundary and ranger posts. The number of ranger patrols substantially increased the probability that poaching-related threats disappear at a site if threats were originally present (i.e. probability of extinction of threats). Without ranger visits, the annual probability of extinction of poaching-related threats was an estimated 7%; this probability would increase to 20% and 57% with 20 and 50 ranger visits per year, respectively.Our results suggest that poaching-related threats can be effectively reduced in NNP by adding ranger posts in areas where they do not currently exist, and by increasing the number of patrols to sites where the probability of poaching activities is high.Synthesis and applications. Our application of dynamic occupancy models to predict the probability of presence of poaching-related threats is novel, and explicitly considers imperfect detection of illegal activities. Based on the modelled relationships, we identify areas that are most vulnerable to poaching, and offer insights regarding how ranger patrols can be optimally deployed to reduce poaching-related threats and

  15. Persistent and novel threats to the biodiversity of Kazakhstan’s steppes and semi-deserts

    USGS Publications Warehouse

    Kamp, Johannes; Koshkin, Maxim A; Bragina, Tatyana M; Katzner, Todd E.; Milner-Gulland, E J; Schreiber, Dagmar; Sheldon, Robert; Shmalenko, Alyona; Smelansky, Ilya; Terraube, Julien; Urazaliev, Ruslan

    2016-01-01

    Temperate grasslands have suffered disproportionally from conversion to cropland, degradation and fragmentation. A large proportion of the world’s remaining near-natural grassland is situated in Kazakhstan. We aimed to assess current and emerging threats to steppe and semi-desert biodiversity in Kazakhstan and evaluate conservation research priorities. We conducted a horizon-scanning exercise among conservationists from academia and practice. We first compiled a list of 45 potential threats. These were then ranked by the survey participants according to their perceived severity, the need for research on them, and their novelty. The highest-ranked threats were related to changes in land use (leading to habitat loss and deterioration), direct persecution of wildlife, and rapid infrastructure development due to economic and population growth. Research needs were identified largely in the same areas, and the mean scores of threat severity and research need were highly correlated. Novel threats comprised habitat loss by photovoltaic and wind power stations, climate change and changes in agriculture such as the introduction of biofuels. However, novelty was not correlated with threat severity or research priority, suggesting that the most severe threats are the established ones. Important goals towards more effective steppe and semi-desert conservation in Kazakhstan include more cross-sector collaboration (e.g. by involving stakeholders in conservation and agriculture), greater allocation of funds to under-staffed areas (e.g. protected area management), better representativeness and complementarity in the protected area system and enhanced data collection for wildlife monitoring and threat assessments (including the use of citizen-science databases).

  16. Invasive Lionfish (Pterois volitans): A Potential Human Health Threat for Ciguatera Fish Poisoning in Tropical Waters

    PubMed Central

    Robertson, Alison; Garcia, Ana C.; Flores Quintana, Harold A.; Smith, Tyler B.; Castillo, Bernard F.; Reale-Munroe, Kynoch; Gulli, Joseph A.; Olsen, David A.; Hooe-Rollman, Jennifer I.; Jester, Edward L. E.; Klimek, Brian J.; Plakas, Steven M.

    2013-01-01

    Invasive Indo-Pacific lionfish (Pterois volitans) have rapidly expanded in the Western Atlantic over the past decade and have had a significant negative impact on reef fish biodiversity, habitat, and community structure, with lionfish out-competing native predators for resources. In an effort to reduce this population explosion, lionfish have been promoted for human consumption in the greater Caribbean region. This study examined whether the geographical expansion of the lionfish into a known ciguatera-endemic region can pose a human health threat for ciguatera fish poisoning (CFP). More than 180 lionfish were collected from waters surrounding the US Virgin Islands throughout 2010 and 2011. Ciguatoxin testing included an in vitro neuroblastoma cytotoxicity assay for composite toxicity assessment of sodium-channel toxins combined with confirmatory liquid chromatography tandem mass spectrometry. A 12% prevalence rate of ciguatoxic lionfish exceeding the FDA guidance level of 0.1 µg/kg C-CTX-1 equivalents was identified in fish from the U.S. Virgin Islands, highlighting a potential consumption risk in this region. This study presents the first evidence that the invasive lionfish, pose a direct human health risk for CFP and highlights the need for awareness and research on this food safety hazard in known endemic areas. PMID:24378919

  17. Invasive lionfish (Pterois volitans): a potential human health threat for ciguatera fish poisoning in tropical waters.

    PubMed

    Robertson, Alison; Garcia, Ana C; Quintana, Harold A Flores; Smith, Tyler B; Castillo, Bernard F; Reale-Munroe, Kynoch; Gulli, Joseph A; Olsen, David A; Hooe-Rollman, Jennifer I; Jester, Edward L E; Klimek, Brian J; Plakas, Steven M

    2013-12-27

    Invasive Indo-Pacific lionfish (Pterois volitans) have rapidly expanded in the Western Atlantic over the past decade and have had a significant negative impact on reef fish biodiversity, habitat, and community structure, with lionfish out-competing native predators for resources. In an effort to reduce this population explosion, lionfish have been promoted for human consumption in the greater Caribbean region. This study examined whether the geographical expansion of the lionfish into a known ciguatera-endemic region can pose a human health threat for ciguatera fish poisoning (CFP). More than 180 lionfish were collected from waters surrounding the US Virgin Islands throughout 2010 and 2011. Ciguatoxin testing included an in vitro neuroblastoma cytotoxicity assay for composite toxicity assessment of sodium-channel toxins combined with confirmatory liquid chromatography tandem mass spectrometry. A 12% prevalence rate of ciguatoxic lionfish exceeding the FDA guidance level of 0.1 µg/kg C-CTX-1 equivalents was identified in fish from the U.S. Virgin Islands, highlighting a potential consumption risk in this region. This study presents the first evidence that the invasive lionfish, pose a direct human health risk for CFP and highlights the need for awareness and research on this food safety hazard in known endemic areas.

  18. Eight habitats, 38 threats and 55 experts: Assessing ecological risk in a multi-use marine region

    PubMed Central

    Jones, Alice R.; Deveney, Marty R.; Ward, Tim M.; Gillanders, Bronwyn M.

    2017-01-01

    Identifying the relative risk human activities pose to a habitat, and the ecosystem services they provide, can guide management prioritisation and resource allocation. Using a combination of expert elicitation to assess the probable effect of a threat and existing data to assess the level of threat exposure, we conducted a risk assessment for 38 human-mediated threats to eight marine habitats (totalling 304 threat-habitat combinations) in Spencer Gulf, Australia. We developed a score-based survey to collate expert opinion and assess the relative effect of each threat to each habitat, as well as a novel and independent measure of knowledge-based uncertainty. Fifty-five experts representing multiple sectors and institutions participated in the study, with 6 to 15 survey responses per habitat (n = 81 surveys). We identified key threats specific to each habitat; overall, climate change threats received the highest risk rankings, with nutrient discharge identified as a key local-scale stressor. Invasive species and most fishing-related threats, which are commonly identified as major threats to the marine environment, were ranked as low-tier threats to Spencer Gulf, emphasising the importance of regionally-relevant assessments. Further, we identified critical knowledge gaps and quantified uncertainty scores for each risk. Our approach will facilitate prioritisation of resource allocation in a region of increasing social, economic and environmental importance, and can be applied to marine regions where empirical data are lacking. PMID:28489912

  19. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  20. Threat evaluation for impact assessment in situation analysis systems

    NASA Astrophysics Data System (ADS)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  1. SWATH-based proteomics identified carbonic anhydrase 2 as a potential diagnosis biomarker for nasopharyngeal carcinoma

    PubMed Central

    Luo, Yanzhang; Mok, Tin Seak; Lin, Xiuxian; Zhang, Wanling; Cui, Yizhi; Guo, Jiahui; Chen, Xing; Zhang, Tao; Wang, Tong

    2017-01-01

    Nasopharyngeal carcinoma (NPC) is a serious threat to public health, and the biomarker discovery is of urgent needs. The data-independent mode (DIA) based sequential window acquisition of all theoretical fragment-ion spectra (SWATH) mass spectrometry (MS) has been proved to be precise in protein quantitation and efficient for cancer biomarker researches. In this study, we performed the first SWATH-MS analysis comparing the NPC and normal tissues. Spike-in stable isotope labeling by amino acids in cell culture (super-SILAC) MS was used as a shotgun reference. We identified and quantified 1414 proteins across all SWATH-MS analyses. We found that SWATH-MS had a unique feature to preferentially detect proteins with smaller molecular weights than either super-SILAC MS or human proteome background. With SWATH-MS, 29 significant differentially express proteins (DEPs) were identified. Among them, carbonic anhydrase 2 (CA2) was selected for further validation per novelty, MS quality and other supporting rationale. With the tissue microarray analysis, we found that CA2 had an AUC of 0.94 in differentiating NPC from normal tissue samples. In conclusion, SWATH-MS has unique features in proteome analysis, and it leads to the identification of CA2 as a potentially new diagnostic biomarker for NPC. PMID:28117408

  2. Evaluating and ranking the vulnerability of global marine ecosystems to anthropogenic threats.

    PubMed

    Halpern, Benjamin S; Selkoe, Kimberly A; Micheli, Fiorenza; Kappel, Carrie V

    2007-10-01

    Marine ecosystems are threatened by a suite of anthropogenic stressors. Mitigating multiple threats is a daunting task, particularly when funding constraints limit the number of threats that can be addressed. Threats are typically assessed and prioritized via expert opinion workshops that often leave no record of the rationale for decisions, making it difficult to update recommendations with new information. We devised a transparent, repeatable, and modifiable method for collecting expert opinion that describes and documents how threats affect marine ecosystems. Experts were asked to assess the functional impact, scale, and frequency of a threat to an ecosystem; the resistance and recovery time of an ecosystem to a threat; and the certainty of these estimates. To quantify impacts of 38 distinct anthropogenic threats on 23 marine ecosystems, we surveyed 135 experts from 19 different countries. Survey results showed that all ecosystems are threatened by at least nine threats and that nine ecosystems are threatened by >90% of existing threats. The greatest threats (highest impact scores) were increasing sea temperature, demersal destructive fishing, and point-source organic pollution. Rocky reef, coral reef, hard-shelf, mangrove, and offshore epipelagic ecosystems were identified as the most threatened. These general results, however, may be partly influenced by the specific expertise and geography of respondents, and should be interpreted with caution. This approach to threat analysis can identify the greatest threats (globally or locally), most widespread threats, most (or least) sensitive ecosystems, most (or least) threatened ecosystems, and other metrics of conservation value. Additionally, it can be easily modified, updated as new data become available, and scaled to local or regional settings, which would facilitate informed and transparent conservation priority setting.

  3. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  4. Land-use threats and protected areas: a scenario-based, landscape level approach

    USGS Publications Warehouse

    Wilson, Tamara S.; Sleeter, Benjamin M.; Sleeter, Rachel R.; Soulard, Christopher E.

    2014-01-01

    Anthropogenic land use will likely present a greater challenge to biodiversity than climate change this century in the Pacific Northwest, USA. Even if species are equipped with the adaptive capacity to migrate in the face of a changing climate, they will likely encounter a human-dominated landscape as a major dispersal obstacle. Our goal was to identify, at the ecoregion-level, protected areas in close proximity to lands with a higher likelihood of future land-use conversion. Using a state-and-transition simulation model, we modeled spatially explicit (1 km2) land use from 2000 to 2100 under seven alternative land-use and emission scenarios for ecoregions in the Pacific Northwest. We analyzed scenario-based land-use conversion threats from logging, agriculture, and development near existing protected areas. A conversion threat index (CTI) was created to identify ecoregions with highest projected land-use conversion potential within closest proximity to existing protected areas. Our analysis indicated nearly 22% of land area in the Coast Range, over 16% of land area in the Puget Lowland, and nearly 11% of the Cascades had very high CTI values. Broader regional-scale land-use change is projected to impact nearly 40% of the Coast Range, 30% of the Puget Lowland, and 24% of the Cascades (i.e., two highest CTI classes). A landscape level, scenario-based approach to modeling future land use helps identify ecoregions with existing protected areas at greater risk from regional land-use threats and can help prioritize future conservation efforts.

  5. Mental Health Problems in Adolescence and the Interpretation of Unambiguous Threat

    PubMed Central

    Henry, Julie D.; Moses, Ernestina; Castellini, Julieta; Scott, James

    2015-01-01

    Aberrant threat perception has been linked to paranoia, anxiety and other mental health problems, and is widely considered to be a core, transdiagnostic feature of psychopathology. However, to date there has been only limited investigation of whether mental health problems are associated with a biased interpretation of stimuli that have explicit (as opposed to ambiguous) connotations of threat. In the present study, 41 adolescents diagnosed with a mental illness and 45 demographically matched controls were asked to provide danger ratings of stimuli normatively rated as being either low or high in potential threat. All participants were also asked to complete background measures of cognitive function, mental health and wellbeing. The results indicated that the two groups did not differ in their capacity to discriminate between low and high threat stimuli, nor did they differ in the absolute level of threat that they attributed to these stimuli. However, for the control group, the overall level of threat perceived in facial stimuli was correlated with two important indices of mental health (depression and anxiety). No associations emerged in the clinical group. These data are discussed in relation to their potential implications for the role of aberrant threat perception in transdiagnostic models of mental health. PMID:26039081

  6. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  7. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heineke, J.M.

    1978-12-20

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)

  8. Defining the public health threat of food fraud.

    PubMed

    Spink, John; Moyer, Douglas C

    2011-01-01

    Food fraud, including the more defined subcategory of economically motivated adulteration, is a food risk that is gaining recognition and concern. Regardless of the cause of the food risk, adulteration of food is both an industry and a government responsibility. Food safety, food fraud, and food defense incidents can create adulteration of food with public health threats. Food fraud is an intentional act for economic gain, whereas a food safety incident is an unintentional act with unintentional harm, and a food defense incident is an intentional act with intentional harm. Economically motivated adulteration may be just that-economically motivated-but the food-related public health risks are often more risky than traditional food safety threats because the contaminants are unconventional. Current intervention systems are not designed to look for a near infinite number of potential contaminants. The authors developed the core concepts reported here following comprehensive research of articles and reports, expert elicitation, and an extensive peer review. The intent of this research paper is to provide a base reference document for defining food fraud-it focuses specifically on the public health threat-and to facilitate a shift in focus from intervention to prevention. This will subsequently provide a framework for future quantitative or innovative research. The fraud opportunity is deconstructed using the criminology and behavioral science applications of the crime triangle and the chemistry of the crime. The research provides a food risk matrix and identifies food fraud incident types. This project provides a starting point for future food science, food safety, and food defense research. Food fraud, including the more defined subcategory of economically motivated adulteration, is a food protection threat that has not been defined or holistically addressed. The terrorist attacks of September 11, 2001, led to the development of food defense as an autonomous area of

  9. Emotion blocks the path to learning under stereotype threat

    PubMed Central

    Good, Catherine; Whiteman, Ronald C.; Maniscalco, Brian; Dweck, Carol S.

    2012-01-01

    Gender-based stereotypes undermine females’ performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback related negativity (FRN), P3a], as well as any subsequent sustained attention/arousal to that information [late positive potential (LPP)]. Learning was defined as success in applying tutorial information to correction of initial test errors on a surprise retest 24-h later. Under non-threat conditions, emotional responses to negative feedback did not curtail exploration of the tutor, and the amount of tutor exploration predicted learning success. In the stereotype threat condition, however, greater initial salience of the failure (FRN) predicted less exploration of the tutor, and sustained attention to the negative feedback (LPP) predicted poor learning from what was explored. Thus, under stereotype threat, emotional responses to negative feedback predicted both disengagement from learning and interference with learning attempts. We discuss the importance of emotion regulation in successful rebound from failure for stigmatized groups in stereotype-salient environments. PMID:21252312

  10. Emotion blocks the path to learning under stereotype threat.

    PubMed

    Mangels, Jennifer A; Good, Catherine; Whiteman, Ronald C; Maniscalco, Brian; Dweck, Carol S

    2012-02-01

    Gender-based stereotypes undermine females' performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback related negativity (FRN), P3a], as well as any subsequent sustained attention/arousal to that information [late positive potential (LPP)]. Learning was defined as success in applying tutorial information to correction of initial test errors on a surprise retest 24-h later. Under non-threat conditions, emotional responses to negative feedback did not curtail exploration of the tutor, and the amount of tutor exploration predicted learning success. In the stereotype threat condition, however, greater initial salience of the failure (FRN) predicted less exploration of the tutor, and sustained attention to the negative feedback (LPP) predicted poor learning from what was explored. Thus, under stereotype threat, emotional responses to negative feedback predicted both disengagement from learning and interference with learning attempts. We discuss the importance of emotion regulation in successful rebound from failure for stigmatized groups in stereotype-salient environments.

  11. Anticipation of interoceptive threat in highly anxiety sensitive persons.

    PubMed

    Melzig, Christiane A; Michalowski, Jaroslaw M; Holtz, Katharina; Hamm, Alfons O

    2008-10-01

    Anticipatory anxiety plays a major role in the etiology of panic disorder. Although anticipatory anxiety elicited by expectation of interoceptive cues is specifically relevant for panic patients, it has rarely been studied. Using a population analogue in high fear of such interoceptive arousal sensations (highly anxiety sensitive persons) we evaluated a new experimental paradigm to assess anticipatory anxiety during anticipation of interoceptive (somatic sensations evoked by hyperventilation) and exteroceptive (electric shock) threat. Symptom reports, autonomic arousal, and defensive response mobilization (startle eyeblink response) were monitored during threat and matched safe conditions in 26 highly anxiety sensitive persons and 22 controls. The anticipation of exteroceptive threat led to a defensive and autonomic mobilization as indexed by a potentiation of the startle response and an increase in skin conductance level in both experimental groups. During interoceptive threat, however, only highly anxiety sensitive persons but not the controls exhibited a startle response potentiation as well as autonomic activation. The anticipation of a hyperventilation procedure thus seems a valid paradigm to investigate anticipatory anxiety elicited by interoceptive cues in the clinical context.

  12. Electrophysiological responses to threat in youth with and without Posttraumatic Stress Disorder.

    PubMed

    Grasso, Damion J; Simons, Robert F

    2012-04-01

    The current study was designed to examine event-related brain potentials and autonomic responses to pictures indicating threat, relative to non-threat, and acoustic startle reflexes in traumatized youth diagnosed with PTSD, relative to non-exposed children, before and after receiving psychotherapy. Children in the control group were individually yoked and demographically matched to the PTSD group. Both groups displayed enhanced late positive potentials and more prolonged heart rate deceleration to pictures indicating threat, relative to non-threat, and larger skin conductance responses to pictures indicating threat, relative to non-threat, at time one. At time two, controls appeared to habituate, as reflected by an overall attenuated skin conductance response, whereas the PTSD group showed little change. Across time points the PTSD group exhibited greater acoustic startle reflexes than the control group. Psychotherapy and symptom reduction was not associated with electrophysiology. Drawing from the adult literature, this study was an attempt to address the scarcity of research examining electrophysiological irregularities in childhood PTSD. The overall results suggest that children and adolescents allocate more attention to threat-related stimuli regardless of PTSD status, and exaggerated startle and a possible failure to habituate skin conductance responses to threat-related stimuli in youth with versus without PTSD. Copyright © 2012 Elsevier B.V. All rights reserved.

  13. Threats during sex work and association with mental health among young female sex workers in Hong Kong.

    PubMed

    Mo, Phoenix K H; Mak, Winnie W S; Kwok, Yvonne T Y; Xin, Meiqi; Chan, Charlie W L; Yip, Louise W M

    2018-08-01

    Young female sex workers (YFSWs) are confronted with significant threats during sex work. The present cross-sectional study examined different levels of threats (i.e., threats to life and health, threats to humanity, threats to control of work and financial security, and the threats to future) experienced by 87 YFSWs (age 16-25) in Hong Kong, and identified their association with mental health (i.e., psychological well-being) together with other factors, including childhood trauma, self-efficacy, hope, and social support. Results showed that the participants encountered a significant number of threats. More than half reported that they had a condom removed by clients during sex (51.7%); or have been humililated by clients (51.7%). Because of sex work, about a quarter (25.3%) have had sexually transmitted disease, and respectively 10.3% and 12.6% have had abortion and unplanned pregnancy. The majority have had friends found out that they engaged in sex work (72.4%). They also showed a high level of worry about the various threats. Multiple linear regression analysis showed that childhood trauma (β = -.26) and worry about threats during sex work (β = -.22) were significantly negative predictors, while self-efficacy (β = .20) and hope (β = .27) were significantly positive predictors of mental health. Future services should improve YFSWs' skills to minimize potential threats during female sex work, address the structural correlates and relieve their worries, and empower them with more hope and self-efficacy in choosing clients.

  14. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers.

    PubMed

    Carey, Rachel N; Sarma, Kiran M

    2016-07-27

    Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These 'threat appeals' feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62) examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81) investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Findings suggest that threat-based road safety communications that target affective (fear) and cognitive (perceived efficacy) mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.

  15. Potential and real ecological threat of heavy metals in contaminated soils

    NASA Astrophysics Data System (ADS)

    Motuzova, Galina; Barsova, Natalia; Makarichev, Ivan; Karpova, Elena

    2013-04-01

    Introduction. Microelements or heavy metals (HM) occur in nature and are required for living organisms at low concentrations. High content of HM in soils characterize their potential danger for ecosystem. Their real ecological threat is presented by the mobility of HM in soils. The aim of this work was to characterize the potential and real danger of HM on the basis of HM mobility in soils and their influence of the most important soils properties. Materials and methods. Two types of materials are presented in this paper. The first ones are presented by the summarized information about the content of Cu, Zn, Mn and their mobile species in the soils of Russia and are included into the National Atlas of Russian soils (2011). The second part is presented by the results of laboratory experiments with some samples of Podzols, Podzoluvisol and Chernozem. The following parameters have been determined: a) the main chemical properties of soils; b) the water extracts from soils were investigated by the potentiometric titration with HM salts; c) the properties of the samples of humic acids (HA, extracted by 1n. NaOH) and HA-Cu complexes were determined: molecular-masses distribution (MMD), infrared spectra (IRS), hydrophobility, 1? NMR spectra Results and discussions. The major part of HM in soils of natural landscapes is firmly bound to several minerals. Their threat for living organisms is largely dependent on a relatively higher mobility of HM in soils. The main factors affecting the mobility of HM include soil reaction and sorption processes. In soils of natural landscapes the share of mobile HM compounds is estimated as some per cents from their total content. Having used the data about microelements in soils, their availability to living organisms, 14 natural biogeochemical provinces have been distinguished at the territory of the European part of the former USSR. It permitted to show the adverse impact rendered by microelements at low or high concentrations on living

  16. Meeting the challenge of interacting threats in freshwater ecosystems: A call to scientists and managers

    USGS Publications Warehouse

    Craig, Laura S.; Olden, Julian D.; Arthington, Angela; Entrekin, Sally; Hawkins, Charles P.; Kelly, John J.; Kennedy, Theodore A.; Maitland, Bryan M.; Rosi, Emma J.; Roy, Allison; Strayer, David L.; Tank, Jennifer L.; West, Amie O.; Wooten, Matthew S.

    2017-01-01

    Human activities create threats that have consequences for freshwater ecosystems and, in most watersheds, observed ecological responses are the result of complex interactions among multiple threats and their associated ecological alterations. Here we discuss the value of considering multiple threats in research and management, offer suggestions for filling knowledge gaps, and provide guidance for addressing the urgent management challenges posed by multiple threats in freshwater ecosystems. There is a growing literature assessing responses to multiple alterations, and we build off this background to identify three areas that require greater attention: linking observed alterations to threats, understanding when and where threats overlap, and choosing metrics that best quantify the effects of multiple threats. Advancing science in these areas will help us understand existing ecosystem conditions and predict future risk from multiple threats. Because addressing the complex issues and novel ecosystems that arise from the interaction of multiple threats in freshwater ecosystems represents a significant management challenge, and the risks of management failure include loss of biodiversity, ecological goods, and ecosystem services, we also identify actions that could improve decision-making and management outcomes. These actions include drawing insights from management of individual threats, using threat attributes (e.g., causes and spatio-temporal dynamics) to identify suitable management approaches, testing management strategies that are likely to be successful despite uncertainties about the nature of interactions among threats, avoiding unintended consequences, and maximizing conservation benefits. We also acknowledge the broadly applicable challenges of decision-making within a socio-political and economic framework, and suggest that multidisciplinary teams will be needed to innovate solutions to meet the current and future challenge of interacting threats in

  17. Interaction of threat and verbal working memory in adolescents.

    PubMed

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  18. Electrocortical processing of social signals of threat in combat-related post-traumatic stress disorder.

    PubMed

    MacNamara, Annmarie; Post, David; Kennedy, Amy E; Rabinak, Christine A; Phan, K Luan

    2013-10-01

    Post-traumatic stress disorder (PTSD) is characterized by avoidance, emotional numbing, increased arousal and hypervigilance for threat following a trauma. Thirty-three veterans (19 with PTSD, 14 without PTSD) who had experienced combat trauma while on deployment in Iraq and/or Afghanistan completed an emotional faces matching task while electroencephalography was recorded. Vertex positive potentials (VPPs) elicited by happy, angry and fearful faces were smaller in veterans with versus without PTSD. In addition, veterans with PTSD exhibited smaller late positive potentials (LPPs) to angry faces and greater intrusive symptoms predicted smaller LPPs to fearful faces in the PTSD group. Veterans with PTSD were also less accurate at identifying angry faces, and accuracy decreased in the PTSD group as hyperarousal symptoms increased. These findings show reduced early processing of emotional faces, irrespective of valence, and blunted prolonged processing of social signals of threat in conjunction with impaired perception for angry faces in PTSD. Copyright © 2013 Elsevier B.V. All rights reserved.

  19. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: a review.

    PubMed

    Upadhyayula, Venkata K K

    2012-02-17

    There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad range of threat agents, including radioactive substances, explosive compounds, chemical warfare agents, biotoxins, and biothreat pathogens through any of the four sensory means mentioned previously. Copyright © 2011 Elsevier B.V. All rights reserved.

  20. Habitat preferences and conservation threats to Black-necked Cranes wintering in Bhutan.

    PubMed

    Namgay, Rinchen; Wangchuk, Sangay

    2016-01-01

    Black-necked Crane (Grus nigricollis) is a vulnerable Red list species whose populations are declining. However, little is known about Black-necked Cranes' habitat requirements or the causes of their population decline. We identified Black-necked Cranes' winter roost and foraging preferences of Black-necked Cranes in Bhutan during the winter of 2013-2014. Black-necked Cranes' roosts were recorded using Garmin GPSmap 60CSx, while foraging preferences and threats to the birds were identified based on a survey of household heads (n = 107) residing within a 3 km radius of roost sites. We grouped the threats identified by the communities into four major categories, viz. biological, social, political and natural threats based on the relevance. Of the four major threats, communities residing within the roosting and foraging habitat of the Black-necked Crane reported biological threat as major. Biological threats as reported by communities include loss of habitat, food shortage and competition from other animals. We recommend the present roosting areas be designated as part of the conservation areas for Black-necked Crane wintering in Bumthang district. In addition to preserving these areas, government should also encourage farming in foraging habitats of Black-necked Crane, because they mainly feed on barley, wheat, paddy, potatoes and buckwheat, besides roots, tubers and insects in the wetlands.

  1. Perceived control qualifies the effects of threat on prejudice.

    PubMed

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  2. Yellow Fever Remains a Potential Threat to Public Health.

    PubMed

    Vasconcelos, Pedro F C; Monath, Thomas P

    2016-08-01

    Yellow fever (YF) remains a serious public health threat in endemic countries. The recent re-emergence in Africa, initiating in Angola and spreading to Democratic Republic of Congo and Uganda, with imported cases in China and Kenya is of concern. There is such a shortage of YF vaccine in the world that the World Health Organization has proposed the use of reduced doses (1/5) during emergencies. In this short communication, we discuss these and other problems including the risk of spread of YF to areas free of YF for decades or never before affected by this arbovirus disease.

  3. Raising consciousness about the nuclear threat through music

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field ofmore » peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.« less

  4. Mitigation Policy Scenario of Space Debris Threat Related with National Security

    NASA Astrophysics Data System (ADS)

    Herdiansyah, Herdis; Frimawaty, Evy; Munir, Ahmad

    2016-02-01

    The development of air space recently entered a new phase, when the space issues correlated with the future of a country. In past time, the space authorization was related with advancing technology by many space mission and various satellite launchings, or it could be said that who ruled technology will rule the space. Therefore, the numerous satellites in the space could be a threat for the countries which are mainly located in the path of the satellite, especially in the equatorial region including Indonesia. This study aims to create a policy scenario in mitigating the threat of space debris. The results showed that although space debris was not threatened national security for now, but the potential and its impact on the future potentially harmful. The threats of orbit circulation for some experts considered as a threat for national security, because its danger potential which caused by space debris could significantly damage the affected areas. However, until now Indonesia has no comprehensive mitigation strategy for space matters although it has been ratified by the United Nations Convention.

  5. Threats to riparian ecosystems in western North America: An analysis of existing literature

    Treesearch

    Boris Poff; Karen A. Koestner; Dan Neary; Victoria Henderson

    2011-01-01

    A total of 453 journal articles, reports, books, and book chapters addressing threats to riparian ecosystems in western North America were analyzed to identify, quantify, and qualify the major threats to these ecosystems as represented in the existing literature. Publications were identified either as research, policy, literature review, historical comparison, or...

  6. Attention Training and the Threat Bias: An ERP Study

    PubMed Central

    O’Toole, Laura; Dennis, Tracy A.

    2011-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these changes remain unclear. To address this issue, 49 non-anxious adults were randomly assigned to either attentional training toward or training away from threat using a modified version of the dot probe task. Behavioral measures of attentional biases were also generated pre- and post-training using the dot probe task. Event-related potentials (ERPs) were generated to threat and non-threat face pairs and probes during pre- and post-training assessments. Effects of training on behavioral measures of the threat bias were significant, but only for those participants showing pre-training biases. Attention training also influenced early spatial attention, as measured by post-training P1 amplitudes to cues. Results illustrate the importance of taking pre-training attention biases in non-anxious individuals into account when evaluating the effects of attention training and tracking physiological changes in attention following training. PMID:22083026

  7. Tetanus: A Potential Public Health Threat in Times of Disaster.

    PubMed

    Finkelstein, Paige; Teisch, Laura; Allen, Casey J; Ruiz, Gabriel

    2017-06-01

    for trauma and critical patients to become familiar with the protocols for treatment and immunization of patients that have tetanus-prone wounds, as well as recognize the potential for outbreaks in the settings of major natural disasters. Finkelstein P , Teisch L , Allen CJ , Ruiz G . Tetanus: a potential public health threat in times of disaster. Prehosp Disaster Med. 2017;32(3):339-342.

  8. Pictures cueing threat: brain dynamics in viewing explicitly instructed danger cues

    PubMed Central

    Schupp, Harald T.

    2012-01-01

    Recent event-related brain potential studies revealed the selective processing of emotional and threatening pictures. Integrating the picture viewing and threat-of-shock paradigm, the present study examined the processing of emotional pictures while they were explicitly instructed to cue threat of real world danger (i.e. electric shocks). Toward this end, 60 pleasant, neutral and unpleasant IAPS-pictures were presented (1 s) as a continuous random stream while high-density EEG and self-reported threat were assessed. In three experimental runs, each picture category was used once as a threat-cue, whereas in the other conditions the same category served as safety-cue. An additional passive viewing run served as a no-threat condition, thus, establishing a threat–safety continuum (threat-cue–safety-cue–no-threat) for each picture category. Threat-of-shock modulated P1, P2 and parieto-occipital LPP amplitudes. While the P1 component differentiated among threat- and no-threat conditions, the P2 and LPP effects were specific to pictures signaling threat-of-shock. Thus, stimulus processing progressively gained more accurate information about environmental threat conditions. Interestingly, the finding of increased EPN and centro-parietal LPP amplitudes to emotional pictures was independent from threat-of-shock manipulation. Accordingly, the results indicate distinct effects associated with the intrinsic significance of emotional pictures and explicitly instructed threat contingencies. PMID:21719425

  9. Asians Demonstrate Reduced Sensitivity to Unpredictable Threat: A Preliminary Startle Investigation using Genetic Ancestry in a Multi-Ethnic Sample

    PubMed Central

    Nelson, Brady D.; Bishop, Jeffrey R.; Sarapas, Casey; Kittles, Rick A.; Shankman, Stewart A.

    2014-01-01

    Research has indicated that individuals of Asian descent, relative to other racial groups, demonstrate reduced emotional responding and lower prevalence rates of several anxiety disorders. It is unclear though whether these group differences extend to biomarkers of anxiety disorders and whether genetic differences play a role. The present study compared self-identified Caucasians, Latinos, and Asians (total N = 174) on startle response during a baseline period and while anticipating unpredictable threat–a putative biomarker for certain anxiety disorders–as well as predictable threat. In addition, the association between genetic ancestry and startle response was examined within each racial group to determine potential genetic influences on responding. For the baseline period, Asian participants exhibited a smaller startle response relative to Caucasian and Latino participants, who did not differ. Within each racial group, genetic ancestry was associated with baseline startle. Furthermore, genetic ancestry mediated racial group differences in baseline startle. For the threat conditions, a Race × Condition interaction indicated that Asian participants exhibited reduced startle potentiation to unpredictable, but not predicable, threat relative to Caucasian and Latino participants, who did not differ. However, genetic ancestry was not associated with threat-potentiated startle in any racial group. The present study adds to the growing literature on racial differences in emotional responding and provides preliminary evidence suggesting that genetic ancestry may play an important role. Moreover, reduced sensitivity to unpredictable threat may reflect a mechanism for why individuals of Asian descent are at less risk for particular anxiety disorders relative to other racial groups. PMID:24708496

  10. A strategy for prioritizing threats and recovery actions for at-risk species.

    PubMed

    Darst, Catherine R; Murphy, Philip J; Strout, Nathan W; Campbell, Steven P; Field, Kimberleigh J; Allison, Linda; Averill-Murray, Roy C

    2013-03-01

    Ensuring the persistence of at-risk species depends on implementing conservation actions that ameliorate threats. We developed and implemented a method to quantify the relative importance of threats and to prioritize recovery actions based on their potential to affect risk to Mojave desert tortoises (Gopherus agassizii). We used assessments of threat importance and elasticities of demographic rates from population matrix models to estimate the relative contributions of threats to overall increase in risk to the population. We found that urbanization, human access, military operations, disease, and illegal use of off highway vehicles are the most serious threats to the desert tortoise range-wide. These results suggest that, overall, recovery actions that decrease habitat loss, predation, and crushing will be most effective for recovery; specifically, we found that habitat restoration, topic-specific environmental education, and land acquisition are most likely to result in the greatest decrease in risk to the desert tortoise across its range. In addition, we have developed an application that manages the conceptual model and all supporting information and calculates threat severity and potential effectiveness of recovery actions. Our analytical approach provides an objective process for quantifying threats, prioritizing recovery actions, and developing monitoring metrics for those actions for adaptive management of any at-risk species.

  11. Biological warfare agents as threats to potable water.

    PubMed Central

    Burrows, W D; Renner, S E

    1999-01-01

    Nearly all known biological warfare agents are intended for aerosol application. Although less effective as potable water threats, many are potentially capable of inflicting heavy casualties when ingested. Significant loss of mission capability can be anticipated even when complete recovery is possible. Properly maintained field army water purification equipment can counter this threat, but personnel responsible for the operation and maintenance of the equipment may be most at risk of exposure. Municipal water treatment facilities would be measurably less effective. Some replicating (infectious) agents and a few biotoxins are inactivated by chlorine disinfection; for others chlorine is ineffective or of unknown efficacy. This report assesses the state of our knowledge of agents as potable water threats and contemplates the consequences of intentional or collateral contamination of potable water supplies by 18 replicating agents and 9 biotoxins known or likely to be weaponized or otherwise used as threats. PMID:10585901

  12. Association between problematic alcohol use and reactivity to uncertain threat in two independent samples

    PubMed Central

    Gorka, Stephanie M.; Lieberman, Lynne; Phan, K. Luan; Shankman, Stewart A.

    2016-01-01

    Background Recent laboratory studies have shown that acute alcohol intoxication selectively and effectively dampens aversive responding to an uncertain threat. An emerging hypothesis is that individuals who exhibit heightened reactivity to an uncertain threat may be especially motivated to use alcohol to dampen their distress, setting the stage for negative reinforcement processes to drive excessive alcohol use. However, no study to date has directly examined whether current problematic drinkers exhibit heightened reactivity to an uncertain threat as would be expected. Methods The present study was therefore designed to examine the association between current problematic alcohol use and reactivity to an uncertain threat during sobriety in two, independent samples. In Study 1 (n = 221) and Study 2 (n = 74), adult participants completed the same well-validated threat-of-shock task which separately probes responses to temporally predictable and unpredictable threat. Startle potentiation was measured as an index of aversive responding. Problematic alcohol use was defined as number of binge episodes within the past 30 days in Study 1 and total scores on a self-report measure of hazardous drinking in Study 2. Results As hypothesized, across both studies greater levels of problematic drinking were associated with greater startle potentiation to an unpredictable threat. In Study 2, hazardous drinking scores were also positively associated with startle potentiation to predictable threat. Conclusions The findings are notably consistent with the notion that heightened reactivity to an uncertain threat is an important individual difference factor associated with the onset and/or maintenance of problematic drinking behaviors and may therefore be a novel prevention and intervention target. PMID:27173662

  13. Threat driven modeling framework using petri nets for e-learning system.

    PubMed

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  14. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  15. Using Broken Windows Theory as the Backdrop for a Proactive Approach to Threat Identification in Health Care.

    PubMed

    Boquet, Albert J; Cohen, Tara N; Cabrera, Jennifer S; Litzinger, Tracy L; Captain, Kevin A; Fabian, Michael A; Miles, Steven G; Shappell, Scott A

    2016-09-09

    Historically, health care has relied on error management techniques to measure and reduce the occurrence of adverse events. This study proposes an alternative approach for identifying and analyzing hazardous events. Whereas previous research has concentrated on investigating individual flow disruptions, we maintain the industry should focus on threat windows, or the accumulation of these disruptions. This methodology, driven by the broken windows theory, allows us to identify process inefficiencies before they manifest and open the door for the occurrence of errors and adverse events. Medical human factors researchers observed disruptions during 34 trauma cases at a Level II trauma center. Data were collected during resuscitation and imaging and were classified using a human factors taxonomy: Realizing Improved Patient Care Through Human-Centered Operating Room Design for Threat Window Analysis (RIPCHORD-TWA). Of the 576 total disruptions observed, communication issues were the most prevalent (28%), followed by interruptions and coordination issues (24% each). Issues related to layout (16%), usability (5%), and equipment (2%) comprised the remainder of the observations. Disruptions involving communication issues were more prevalent during resuscitation, whereas coordination problems were observed more frequently during imaging. Rather than solely investigating errors and adverse events, we propose conceptualizing the accumulation of disruptions in terms of threat windows as a means to analyze potential threats to the integrity of the trauma care system. This approach allows for the improved identification of system weaknesses or threats, affording us the ability to address these inefficiencies and intervene before errors and adverse events may occur.

  16. Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities

    DOE PAGES

    Solodov, Alexander; Williams, Adam; Al Hanaei, Sara; ...

    2017-04-18

    Unmanned aerial vehicles (UAV) are among the major growing technologies that have many beneficial applications, yet they can also pose a significant threat. Recently, several incidents occurred with UAVs violating privacy of the public and security of sensitive facilities, including several nuclear power plants in France. The threat of UAVs to the security of nuclear facilities is of great importance and is the focus of this work. This paper presents an overview of UAV technology and classification, as well as its applications and potential threats. We show several examples of recent security incidents involving UAVs in France, USA, and Unitedmore » Arab Emirates. Further, the potential threats to nuclear facilities and measures to prevent them are evaluated. The importance of measures for detection, delay, and response (neutralization) of UAVs at nuclear facilities are discussed. An overview of existing technologies along with their strength and weaknesses are shown. Finally, the results of a gap analysis in existing approaches and technologies is presented in the form of potential technological and procedural areas for research and development. Furthermore based on this analysis, directions for future work in the field can be devised and prioritized.« less

  17. Case study comparison of functional vs. organic stability approaches for assessing threat potential at closed landfills in the USA.

    PubMed

    O'Donnell, Sean T; Caldwell, Michael D; Barlaz, Morton A; Morris, Jeremy W F

    2018-05-01

    Municipal solid waste (MSW) landfills in the USA are regulated under Subtitle D of the Resource Conservation and Recovery Act (RCRA), which includes the requirement to protect human health and the environment (HHE) during the post-closure care (PCC) period. Several approaches have been published for assessment of potential threats to HHE. These approaches can be broadly divided into organic stabilization, which establishes an inert waste mass as the ultimate objective, and functional stability, which considers long-term emissions in the context of minimizing threats to HHE in the absence of active controls. The objective of this research was to conduct a case study evaluation of a closed MSW landfill using long-term data on landfill gas (LFG) production, leachate quality, site geology, and solids decomposition. Evaluations based on both functional and organic stability criteria were compared. The results showed that longer periods of LFG and leachate management would be required using organic stability criteria relative to an approach based on functional stability. These findings highlight the somewhat arbitrary and overly stringent nature of assigning universal stability criteria without due consideration of the landfill's hydrogeologic setting and potential environmental receptors. This supports previous studies that advocated for transition to a passive or inactive control stage based on a performance-based functional stability framework as a defensible mechanism for optimizing and ending regulatory PCC. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Identifying Hazards

    EPA Pesticide Factsheets

    The federal government has established a system of labeling hazardous materials to help identify the type of material and threat posed. Summaries of information on over 300 chemicals are maintained in the Envirofacts Master Chemical Integrator.

  19. The cyber threat landscape: Challenges and future research directions

    NASA Astrophysics Data System (ADS)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  20. Countering Threat Networks

    DTIC Science & Technology

    2016-12-21

    PLANNING TO COUNTER THREAT NETWORKS  Joint Intelligence Preparation of the Operational Environment and Threat Networks...Army Expeditionary Forensic Facility in Afghanistan ........ E-9 E-4 Exploitation Support to Intelligence Fusion and Decision Making ......... E-10...Approach The groundwork for successful countering threat networks activities starts with information and intelligence to develop an understanding

  1. "His skin doesn't match what he wants to do": Children's perceptions of stereotype threat.

    PubMed

    Wegmann, Kate M

    2017-01-01

    Stereotype threat is a key contributor to chronic racial/ethnic disparities in mental health, physical health, and academic outcomes. Emerging evidence suggests that stereotype threat may be a critical concern for narrowing these disparities. The objective of the current study is to determine whether children between the ages of 7-11 consciously perceive stereotype threat, and to examine children's descriptions of the phenomenon. Age-appropriate vignettes illustrated 6 forms of stereotype threat. 15 children from diverse racial/ethnic backgrounds read and responded to 3 vignettes each. Interview transcripts were analyzed to determine if participants identified and articulated the core concept and eliciting conditions for each form of threat. All children were able to recognize and describe the core concept for at least 1 form of stereotype threat. Threats to a person's own self-concept were the most commonly identified, whereas threats directed toward a group were less easily recognized and articulated. Children were able to describe conditions associated with threat, although not all conditions were recognized in the context of each particular vignette. Children's responses to the vignettes illustrating stereotype threat suggest that children are able to perceive and describe stereotype threat in ways similar to adults. The primary importance of threats to the self and secondary importance of group threats may be explained by the developmental context of children's emerging social perspective taking skills. Addressing the effects of stereotype threat at younger ages may prevent persistent and cumulative disparities in health, mental health, and academic outcomes from arising. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  2. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  3. Transmitting the sum of all fears: Iranian nuclear threat salience among offspring of Holocaust survivors.

    PubMed

    Shrira, Amit

    2015-07-01

    Many Israelis are preoccupied with the prospect of a nuclear-armed Iran, frequently associating it with the danger of annihilation that existed during the Holocaust. The current article examined whether offspring of Holocaust survivors (OHS) are especially preoccupied and sensitive to the Iranian threat, and whether this susceptibility is a part of their increased general image of actual and potential threats, defined as the hostile world scenario (HWS). Study 1 (N = 106) showed that relative to comparisons, OHS reported more preoccupation with the Iranian nuclear threat. Moreover, the positive relationship between the salience of the Iranian threat and symptoms of anxiety was stronger among OHS. Study 2 (N = 450) replicated these findings, while focusing on the Iranian nuclear threat salience and symptoms of psychological distress. It further showed that OHS reported more negative engagement with the HWS (i.e., feeling that surrounding threats decrease one's sense of competence), which in turn mediated their increased preoccupation with the Iranian threat. The results suggest that intergenerational transmission of the Holocaust trauma includes heightened preoccupation with and sensitivity to potential threats of annihilation, and that the specific preoccupation with threats of annihilation reflects a part of a more general preoccupation with surrounding threats. (c) 2015 APA, all rights reserved).

  4. Threat captures attention but does not affect learning of contextual regularities.

    PubMed

    Yamaguchi, Motonori; Harwood, Sarah L

    2017-04-01

    Some of the stimulus features that guide visual attention are abstract properties of objects such as potential threat to one's survival, whereas others are complex configurations such as visual contexts that are learned through past experiences. The present study investigated the two functions that guide visual attention, threat detection and learning of contextual regularities, in visual search. Search arrays contained images of threat and non-threat objects, and their locations were fixed on some trials but random on other trials. Although they were irrelevant to the visual search task, threat objects facilitated attention capture and impaired attention disengagement. Search time improved for fixed configurations more than for random configurations, reflecting learning of visual contexts. Nevertheless, threat detection had little influence on learning of the contextual regularities. The results suggest that factors guiding visual attention are different from factors that influence learning to guide visual attention.

  5. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  6. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  7. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    PubMed

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  8. Threat-Related Attention Bias Variability and Posttraumatic Stress.

    PubMed

    Naim, Reut; Abend, Rany; Wald, Ilan; Eldar, Sharon; Levi, Ofir; Fruchter, Eyal; Ginat, Karen; Halpern, Pinchas; Sipos, Maurice L; Adler, Amy B; Bliese, Paul D; Quartana, Phillip J; Pine, Daniel S; Bar-Haim, Yair

    2015-12-01

    Threat monitoring facilitates survival by allowing one to efficiently and accurately detect potential threats. Traumatic events can disrupt healthy threat monitoring, inducing biased and unstable threat-related attention deployment. Recent research suggests that greater attention bias variability, that is, attention fluctuations alternating toward and away from threat, occurs in participants with PTSD relative to healthy comparison subjects who were either exposed or not exposed to traumatic events. The current study extends findings on attention bias variability in PTSD. Previous measurement of attention bias variability was refined by employing a moving average technique. Analyses were conducted across seven independent data sets; in each, data on attention bias variability were collected by using variants of the dot-probe task. Trauma-related and anxiety symptoms were evaluated across samples by using structured psychiatric interviews and widely used self-report questionnaires, as specified for each sample. Analyses revealed consistent evidence of greater attention bias variability in patients with PTSD following various types of traumatic events than in healthy participants, participants with social anxiety disorder, and participants with acute stress disorder. Moreover, threat-related, and not positive, attention bias variability was correlated with PTSD severity. These findings carry possibilities for using attention bias variability as a specific cognitive marker of PTSD and for tailoring protocols for attention bias modification for this disorder.

  9. Prey use by dingoes in a contested landscape: Ecosystem service provider or biodiversity threat?

    PubMed

    Morrant, Damian S; Wurster, Christopher M; Johnson, Christopher N; Butler, James R A; Congdon, Bradley C

    2017-11-01

    In Australia, dingoes ( Canis lupus dingo ) have been implicated in the decline and extinction of a number of vertebrate species. The lowland Wet Tropics of Queensland, Australia is a biologically rich area with many species of rainforest-restricted vertebrates that could be threatened by dingoes; however, the ecological impacts of dingoes in this region are poorly understood. We determined the potential threat posed by dingoes to native vertebrates in the lowland Wet Tropics using dingo scat/stomach content and stable isotope analyses of hair from dingoes and potential prey species. Common mammals dominated dingo diets. We found no evidence of predation on threatened taxa or rainforest specialists within our study areas. The most significant prey species were northern brown bandicoots ( Isoodon macrourus ), canefield rats ( Rattus sordidus ), and agile wallabies ( Macropus agilis ). All are common species associated with relatively open grass/woodland habitats. Stable isotope analysis suggested that prey species sourced their nutrients primarily from open habitats and that prey choice, as identified by scat/stomach analysis alone, was a poor indicator of primary foraging habitats. In general, we find that prey use by dingoes in the lowland Wet Tropics does not pose a major threat to native and/or threatened fauna, including rainforest specialists. In fact, our results suggest that dingo predation on "pest" species may represent an important ecological service that outweighs potential biodiversity threats. A more targeted approach to managing wild canids is needed if the ecosystem services they provide in these contested landscapes are to be maintained, while simultaneously avoiding negative conservation or economic impacts.

  10. Flexible training under threat.

    PubMed

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  11. Assessing Student Threats

    ERIC Educational Resources Information Center

    Brunner, Judy; Emmendorfer, Beth; Lewis, Dennis

    2009-01-01

    For administrators at the secondary level, not many school days go according to plan or script, but few things are more disruptive than a student threat of violence. When threats are made--or if there is a rumor of a serious student threat--it can take both time and resources to investigate, interview, and analyze multiple pieces of information in…

  12. Information fusion: telling the story (or threat narrative)

    NASA Astrophysics Data System (ADS)

    Fenstermacher, Laurie

    2014-06-01

    Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.

  13. Potential threat of heavy metals in re-suspended dusts on building surfaces in oilfield city

    NASA Astrophysics Data System (ADS)

    Kong, Shaofei; Lu, Bing; Bai, Zhipeng; Zhao, Xueyan; Chen, Li; Han, Bin; Li, Zhiyong; Ji, Yaqin; Xu, Yonghai; Liu, Yong; Jiang, Hua

    2011-08-01

    30 re-suspended dust samples were collected from building surfaces of an oilfield city, then re-suspended through PM 2.5, PM 10 and PM 100 inlets and analyzed for 10 metals including V, Cr, Mn, Co, Ni, Cu, Zn, As, Cd and Pb by inductively coupled plasma-mass spectroscopy. Metals concentrations in different fractions and locations were studied. Metals sources were identified by cluster and primary component analysis. The potential risk to human health was assessed by human exposure model. Results showed that Zn, Mn, Pb and Cu were higher in all the three fractions. V, Cr, Mn and Co ranged close to the background values of Chinese soil indicating that they were mainly from crustal materials. Concentrations of Zn, Mn, Pb, V, Cr, Ni, Co and Cd were higher in old district than that in new district for the three fractions. The PM 2.5/PM 10, PM 10/PM 100 and PM 2.5/PM 100 ratios were higher for Zn, Cd, Cu, Pb, Ni, As and Cr (all higher than 1.0), and lower for Co, Mn and V (all less than or close to 1.0) which meant that anthropologic sources associated metals were more easily accumulated in finer particles than metals from crustal materials. Spatial variations indicated that the ten metals peaked at surroundings near railway station, gas stations, industrial boilers and machine manufacturing plant implying the influence of local vehicle emission, fossil fuel combustion and industrial activities as well as crustal materials which was verified by cluster analysis and primary component analysis results. Ingestion of dust particles appeared to be the main route of exposure to re-suspended dust. Hazard Indexes of As were both highest for children and adult which could be a potential threat to human health for non-cancer effect and it also exhibited the highest values for cancer effect as 1.01E-06, 7.04E-07 and 7.21E-07 for PM 2.5, PM 10 and PM 100, respectively.

  14. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    NASA Astrophysics Data System (ADS)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  15. Patterns and biases of climate change threats in the IUCN Red List.

    PubMed

    Trull, Nicholas; Böhm, Monika; Carr, Jamie

    2018-02-01

    International Union for Conservation of Nature (IUCN) Red List assessments rely on published data and expert inputs, and biases can be introduced where underlying definitions and concepts are ambiguous. Consideration of climate change threat is no exception, and recently numerous approaches to assessing the threat of climate change to species have been developed. We explored IUCN Red List assessments of amphibians and birds to determine whether species listed as threatened by climate change display distinct patterns in terms of habitat occupied and additional nonclimatic threats faced. We compared IUCN Red List data with a published data set of species' biological and ecological traits believed to infer high vulnerability to climate change and determined whether distributions of climate change-threatened species on the IUCN Red List concur with those of climate change-threatened species identified with the trait-based approach and whether species possessing these traits are more likely to have climate change listed as a threat on the IUCN Red List. Species in some ecosystems (e.g., grassland, shrubland) and subject to particular threats (e.g., invasive species) were more likely to have climate change as a listed threat. Geographical patterns of climate change-threatened amphibians and birds on the IUCN Red List were incongruent with patterns of global species richness and patterns identified using trait-based approaches. Certain traits were linked to increases or decreases in the likelihood of a species being threatened by climate change. Broad temperature tolerance of a species was consistently related to an increased likelihood of climate change threat, indicating counterintuitive relationships in IUCN assessments. To improve the robustness of species assessments of the vulnerability or extinction risk associated with climate change, we suggest IUCN adopt a more cohesive approach whereby specific traits highlighted by our results are considered in Red List

  16. Alcohol's effects on emotionally motivated attention, defensive reactivity and subjective anxiety during uncertain threats.

    PubMed

    Bradford, Daniel E; Motschman, Courtney A; Starr, Mark J; Curtin, John J

    2017-11-01

    Developing a better understanding of how and under what circumstances alcohol affects the emotions, cognitions and neural functions that precede and contribute to dangerous behaviors during intoxication may help to reduce their occurrence. Alcohol intoxication has recently been shown to reduce defensive reactivity and anxiety more during uncertain vs certain threat. However, alcohol's effects on emotionally motivated attention to these threats are unknown. Alcohol may disrupt both affective response to and attentional processing of uncertain threats making intoxicated individuals less able to avoid dangerous and costly behaviors. To test this possibility, we examined the effects of a broad range of blood alcohol concentrations on 96 participants' sub-cortically mediated defensive reactivity (startle potentiation), retrospective subjective anxiety (self-report) and cortically assessed emotionally motivated attention (probe P3 event related potential) while they experienced visually cued uncertain and certain location electric shock threat. As predicted, alcohol decreased defensive reactivity and subjective anxiety more during uncertain vs certain threat. In a novel finding, alcohol dampened emotionally motivated attention during uncertain but not certain threat. This effect appeared independent of alcohol's effects on defensive reactivity and subjective anxiety. These results suggest that alcohol intoxication dampens processing of uncertain threats while leaving processing of certain threats intact. © The Author (2017). Published by Oxford University Press.

  17. Quantifying anthropogenic threats to orchids using the IUCN Red List.

    PubMed

    Wraith, Jenna; Pickering, Catherine

    2018-04-01

    Orchids are diverse, occur in a wide range of habitats and dominate threatened species lists, but which orchids are threatened, where and by what? Using the International Union for Conservation of Nature Red List, we assessed the range and diversity of threats to orchids globally including identifying four threat syndromes: (1) terrestrial orchids in forests that are endemic to a country and threatened by illegal collecting; (2) orchids threatened by climate change, pollution, transportation and disturbance/development for tourism, and recreation activities, often in East Asia; (3) epiphytic orchids in Sub-Saharan Africa including Madagascar with diverse threats; and (4) South and Southeast Asia orchids threatened by land clearing for shifting agriculture. Despite limitations in the Red List data, the results highlight how conservation efforts can focus on clusters of co-occurring threats in regions while remaining aware of the trifecta of broad threats from plant collecting, land clearing and climate change.

  18. Shape-based human detection for threat assessment

    NASA Astrophysics Data System (ADS)

    Lee, Dah-Jye; Zhan, Pengcheng; Thomas, Aaron; Schoenberger, Robert B.

    2004-07-01

    Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when monitoring open environments. Any moving objects including animals can falsely trigger the security system. Other security systems that utilize video equipment require human interpretation of the scene in order to make real-time threat assessment. Shape-based human detection technique has been developed for accurate early threat assessments for open and remote environment. Potential threats are isolated from the static background scene using differential motion analysis and contours of the intruding objects are extracted for shape analysis. Contour points are simplified by removing redundant points connecting short and straight line segments and preserving only those with shape significance. Contours are represented in tangent space for comparison with shapes stored in database. Power cepstrum technique has been developed to search for the best matched contour in database and to distinguish a human from other objects from different viewing angles and distances.

  19. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, Shannon

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, andmore » proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.« less

  20. Developing vaccines to counter bioterrorist threats.

    PubMed

    Altmann, Daniel M

    2005-06-01

    Large and innovative research programs are underway to define the immune parameters for vaccines against a wide array of pathogens considered to represent a potential bioterrorist threat. However, the development and utilization of such vaccines presents a number of predicaments that have not previously been addressed by the field of vaccinology.

  1. Alarums false, alarums real: challenges and threats to the future of epidemiology.

    PubMed

    Bracken, M B

    1998-02-01

    A review of recent threats and challenges to epidemiology suggests that some represent an opportunity to advance the discipline while others are a major threat to conducting epidemiologic work. Two issues are identified which should advance the publication and conduct of epidemiologic research. Three are discussed that exemplify current threats. Epidemiologists have a role in helping journalists improve the communication of risk information in the media. Methodological advances for studies of rare exposure being related to rare disease should reduce the frequency of conflicting results in the epidemiologic literature. Three significant external forces that threaten epidemiologic research are identified. These are: unbridled discovery during litigation as exemplified by Bendectin, breast implants and cellular telephones; over zealous privacy laws; and the negative impact of managed care on epidemiologic research. The American College of Epidemiology has a major role to play in protecting the profession from some of the real threats that face it, and in helping meet the challenges.

  2. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    PubMed Central

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  3. Protected areas in tropical Africa: assessing threats and conservation activities.

    PubMed

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  4. Development and assessment of a landscape-scale ecological threat index for the Lower Colorado River Basin

    USGS Publications Warehouse

    Paukert, Craig P.; Pitts, K.L.; Whittier, Joanna B.; Olden, Julian D.

    2011-01-01

    a stressor in a watershed) provides similar results to the more subjective measure of threats (i.e., peer-reviewed threat severity). Because these threats have been linked to ecological health, the development of the index should be a useful tool to identify regions of greatest potential threat to aquatic biota and can aid in conservation planning for the Lower Colorado River Basin.

  5. Vocal fundamental and formant frequencies are honest signals of threat potential in peripubertal males.

    PubMed

    Hodges-Simeon, Carolyn R; Gurven, Michael; Puts, David A; Gaulin, Steven J C

    2014-07-01

    Fundamental and formant frequencies influence perceived pitch and are sexually dimorphic in humans. The information content of these acoustic parameters can illuminate the forces of sexual selection shaping vocal sex differences as well as the mechanisms that ensure signal reliability. We use multiple regression to examine the relationships between somatic (height, adiposity, and strength) and acoustic (fundamental frequency [ F 0 ], formant position [ P f ], and fundamental frequency variation [ F 0 -SD]) characteristics in a sample of peripubertal Bolivian Tsimane. Results indicate that among males-but not females-strength is the strongest predictor of F 0 and P f and that F 0 and P f are independent predictors of strength when height and adiposity are controlled. These findings suggest that listeners may attend to vocal frequencies because they signal honest, nonredundant information about male strength and threat potential, which are strongly related to physical maturity and which cannot be ascertained from visual or other indicators of height or adiposity alone.

  6. Laser Remediation of Threats Posed by Small Orbital Debris

    NASA Technical Reports Server (NTRS)

    Fork, Richard L.; Rogers, Jan R.; Hovater, Mary A.

    2012-01-01

    The continually increasing amount of orbital debris in near Earth space poses an increasing challenge to space situational awareness. Recent collisions of spacecraft caused abrupt increases in the density of both large and small debris in near Earth space. An especially challenging class of threats is that due to the increasing density of small (1 mm to 10 cm dimension) orbital debris. This small debris poses a serious threat since: (1) The high velocity enables even millimeter dimension debris to cause serious damage to vulnerable areas of space assets, e.g., detector windows; (2) The small size and large number of debris elements prevent adequate detection and cataloguing. We have identified solutions to this threat in the form of novel laser systems and novel ways of using these laser systems. While implementation of the solutions we identify is challenging we find approaches offering threat mitigation within time frames and at costs of practical interest. We base our analysis on the unique combination of coherent light specifically structured in both space and time and applied in novel ways entirely within the vacuum of space to deorbiting small debris. We compare and contrast laser based small debris removal strategies using ground based laser systems with strategies using space based laser systems. We find laser systems located and used entirely within space offer essential and decisive advantages over groundbased laser systems.

  7. Robust global identifiability theory using potentials--Application to compartmental models.

    PubMed

    Wongvanich, N; Hann, C E; Sirisena, H R

    2015-04-01

    This paper presents a global practical identifiability theory for analyzing and identifying linear and nonlinear compartmental models. The compartmental system is prolonged onto the potential jet space to formulate a set of input-output equations that are integrals in terms of the measured data, which allows for robust identification of parameters without requiring any simulation of the model differential equations. Two classes of linear and non-linear compartmental models are considered. The theory is first applied to analyze the linear nitrous oxide (N2O) uptake model. The fitting accuracy of the identified models from differential jet space and potential jet space identifiability theories is compared with a realistic noise level of 3% which is derived from sensor noise data in the literature. The potential jet space approach gave a match that was well within the coefficient of variation. The differential jet space formulation was unstable and not suitable for parameter identification. The proposed theory is then applied to a nonlinear immunological model for mastitis in cows. In addition, the model formulation is extended to include an iterative method which allows initial conditions to be accurately identified. With up to 10% noise, the potential jet space theory predicts the normalized population concentration infected with pathogens, to within 9% of the true curve. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. Threat in dreams: an adaptation?

    PubMed

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, p<.00012). Contrary to TST's predictions, the SA participants reported significantly fewer threat dreams (chi([1,N=287])(2)=6.11, p<.0134), and did not differ from the Welsh participants in responses to dream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  9. Does stereotype threat affect women in academic medicine?

    PubMed

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  10. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    PubMed Central

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2013-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232

  11. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    PubMed

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  12. Threats and opportunities for freshwater conservation under future land use change scenarios in the United States.

    PubMed

    Martinuzzi, Sebastián; Januchowski-Hartley, Stephanie R; Pracheil, Brenda M; McIntyre, Peter B; Plantinga, Andrew J; Lewis, David J; Radeloff, Volker C

    2014-01-01

    Freshwater ecosystems provide vital resources for humans and support high levels of biodiversity, yet are severely threatened throughout the world. The expansion of human land uses, such as urban and crop cover, typically degrades water quality and reduces freshwater biodiversity, thereby jeopardizing both biodiversity and ecosystem services. Identifying and mitigating future threats to freshwater ecosystems requires forecasting where land use changes are most likely. Our goal was to evaluate the potential consequences of future land use on freshwater ecosystems in the coterminous United States by comparing alternative scenarios of land use change (2001-2051) with current patterns of freshwater biodiversity and water quality risk. Using an econometric model, each of our land use scenarios projected greater changes in watersheds of the eastern half of the country, where freshwater ecosystems already experience higher stress from human activities. Future urban expansion emerged as a major threat in regions with high freshwater biodiversity (e.g., the Southeast) or severe water quality problems (e.g., the Midwest). Our scenarios reflecting environmentally oriented policies had some positive effects. Subsidizing afforestation for carbon sequestration reduced crop cover and increased natural vegetation in areas that are currently stressed by low water quality, while discouraging urban sprawl diminished urban expansion in areas of high biodiversity. On the other hand, we found that increases in crop commodity prices could lead to increased agricultural threats in areas of high freshwater biodiversity. Our analyses illustrate the potential for policy changes and market factors to influence future land use trends in certain regions of the country, with important consequences for freshwater ecosystems. Successful conservation of aquatic biodiversity and ecosystem services in the United States into the future will require attending to the potential threats and opportunities

  13. Twenty Years of Stereotype Threat Research: A Review of Psychological Mediators.

    PubMed

    Pennington, Charlotte R; Heim, Derek; Levy, Andrew R; Larkin, Derek T

    2016-01-01

    This systematic literature review appraises critically the mediating variables of stereotype threat. A bibliographic search was conducted across electronic databases between 1995 and 2015. The search identified 45 experiments from 38 articles and 17 unique proposed mediators that were categorized into affective/subjective (n = 6), cognitive (n = 7) and motivational mechanisms (n = 4). Empirical support was accrued for mediators such as anxiety, negative thinking, and mind-wandering, which are suggested to co-opt working memory resources under stereotype threat. Other research points to the assertion that stereotype threatened individuals may be motivated to disconfirm negative stereotypes, which can have a paradoxical effect of hampering performance. However, stereotype threat appears to affect diverse social groups in different ways, with no one mediator providing unequivocal empirical support. Underpinned by the multi-threat framework, the discussion postulates that different forms of stereotype threat may be mediated by distinct mechanisms.

  14. Twenty Years of Stereotype Threat Research: A Review of Psychological Mediators

    PubMed Central

    Pennington, Charlotte R.; Heim, Derek; Levy, Andrew R.; Larkin, Derek T.

    2016-01-01

    This systematic literature review appraises critically the mediating variables of stereotype threat. A bibliographic search was conducted across electronic databases between 1995 and 2015. The search identified 45 experiments from 38 articles and 17 unique proposed mediators that were categorized into affective/subjective (n = 6), cognitive (n = 7) and motivational mechanisms (n = 4). Empirical support was accrued for mediators such as anxiety, negative thinking, and mind-wandering, which are suggested to co-opt working memory resources under stereotype threat. Other research points to the assertion that stereotype threatened individuals may be motivated to disconfirm negative stereotypes, which can have a paradoxical effect of hampering performance. However, stereotype threat appears to affect diverse social groups in different ways, with no one mediator providing unequivocal empirical support. Underpinned by the multi-threat framework, the discussion postulates that different forms of stereotype threat may be mediated by distinct mechanisms. PMID:26752551

  15. Effects of threat management interactions on conservation priorities.

    PubMed

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  16. Identifying and Classifying Pollution Hotspots to Guide Watershed Management in a Large Multiuse Watershed.

    PubMed

    Su, Fangli; Kaplan, David; Li, Lifeng; Li, Haifu; Song, Fei; Liu, Haisheng

    2017-03-03

    In many locations around the globe, large reservoir sustainability is threatened by land use change and direct pollution loading from the upstream watershed. However, the size and complexity of upstream basins makes the planning and implementation of watershed-scale pollution management a challenge. In this study, we established an evaluation system based on 17 factors, representing the potential point and non-point source pollutants and the environmental carrying capacity which are likely to affect the water quality in the Dahuofang Reservoir and watershed in northeastern China. We used entropy methods to rank 118 subwatersheds by their potential pollution threat and clustered subwatersheds according to the potential pollution type. Combining ranking and clustering analyses allowed us to suggest specific areas for prioritized watershed management (in particular, two subwatersheds with the greatest pollution potential) and to recommend the conservation of current practices in other less vulnerable locations (91 small watersheds with low pollution potential). Finally, we identified the factors most likely to influence the water quality of each of the 118 subwatersheds and suggested adaptive control measures for each location. These results provide a scientific basis for improving the watershed management and sustainability of the Dahuofang reservoir and a framework for identifying threats and prioritizing the management of watersheds of large reservoirs around the world.

  17. Identifying and Classifying Pollution Hotspots to Guide Watershed Management in a Large Multiuse Watershed

    PubMed Central

    Su, Fangli; Kaplan, David; Li, Lifeng; Li, Haifu; Song, Fei; Liu, Haisheng

    2017-01-01

    In many locations around the globe, large reservoir sustainability is threatened by land use change and direct pollution loading from the upstream watershed. However, the size and complexity of upstream basins makes the planning and implementation of watershed-scale pollution management a challenge. In this study, we established an evaluation system based on 17 factors, representing the potential point and non-point source pollutants and the environmental carrying capacity which are likely to affect the water quality in the Dahuofang Reservoir and watershed in northeastern China. We used entropy methods to rank 118 subwatersheds by their potential pollution threat and clustered subwatersheds according to the potential pollution type. Combining ranking and clustering analyses allowed us to suggest specific areas for prioritized watershed management (in particular, two subwatersheds with the greatest pollution potential) and to recommend the conservation of current practices in other less vulnerable locations (91 small watersheds with low pollution potential). Finally, we identified the factors most likely to influence the water quality of each of the 118 subwatersheds and suggested adaptive control measures for each location. These results provide a scientific basis for improving the watershed management and sustainability of the Dahuofang reservoir and a framework for identifying threats and prioritizing the management of watersheds of large reservoirs around the world. PMID:28273834

  18. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    PubMed

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior.

  19. Conceptualizing threats to tobacco control from international economic agreements: the Brazilian experience.

    PubMed

    Drope, Jeffrey; McGrady, Benn; Bialous, Stella Aguinaga; Lencucha, Raphael; Silva, Vera Luiza da Costa E

    2017-10-19

    Using the results of dozens of interviews with key actors involved in tobacco control policymaking, we examine these actors' perceptions of threats to tobacco control policy efforts from international economic policies on trade and investment. We also evaluate, from a legal perspective, the genuine threats that exist or potential challenges that economic policies may pose to the Brazilian government's public health efforts. We find that most actors did not perceive these economic policies as a major threat to tobacco control. Objectively, we found that some threats do exist. For example, Brazil's attempt to ban most tobacco additives and flavorings continues to met resistance at the World Trade Organization.

  20. Future land use threats to range-restricted fish species in the United States

    DOE PAGES

    Januchowski-Hartley, Stephanie R.; Holtz, Lauren A.; Martinuzzi, Sebastian; ...

    2016-03-04

    Land use change is one major threat to freshwater biodiversity, and land use change scenarios can help to assess threats from future land use change, thereby guiding proactive conservation decisions. Furthermore, our goal was to identify which range-restricted freshwater fish species are most likely to be affected by land use change and to determine where threats to these species from future land use change in the conterminous United States are most pronounced.

  1. Future land use threats to range-restricted fish species in the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Januchowski-Hartley, Stephanie R.; Holtz, Lauren A.; Martinuzzi, Sebastian

    Land use change is one major threat to freshwater biodiversity, and land use change scenarios can help to assess threats from future land use change, thereby guiding proactive conservation decisions. Furthermore, our goal was to identify which range-restricted freshwater fish species are most likely to be affected by land use change and to determine where threats to these species from future land use change in the conterminous United States are most pronounced.

  2. Information Exchange Between Resilient and High-Threat Networks: Techniques for Threat Mitigation

    DTIC Science & Technology

    2004-11-01

    Information Exchange between Resilient and High-Threat Networks : Techniques for Threat Mitigation Tim Dean and Graham Wyatt QinetiQ...SUMMARY High resilience military networks frequently have requirements for exchange of information with networks of low assurance, including networks of...assured, two-way, information flow between high resilience networks and other networks of unknown threat. The techniques include conventional and

  3. Airborne Particulate Threat Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. governmentmore » agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing

  4. Attention to Threats and Combat-Related Posttraumatic Stress Symptoms

    PubMed Central

    Wald, Ilan; Degnan, Kathryn A.; Gorodetsky, Elena; Charney, Dennis S.; Fox, Nathan A.; Fruchter, Eyal; Goldman, David; Lubin, Gad; Pine, Daniel S.; Bar-Haim, Yair

    2015-01-01

    Importance Combat places soldiers at risk for post-traumatic stress disorder (PTSD). The excessive rates of PTSD and other adjustment disorders in soldiers returning home make it imperative to identify risk and resilience factors that could be targeted by novel therapeutic treatments. Objective To investigate the interplay among attention to threat, combat exposure, and other risk factors for PTSD symptoms in soldiers deployed to combat. Design and Setting Longitudinal prospective study of Israeli Defense Force infantry soldiers carried out in 2008 through 2010. Repeated measurements during a 1-year period included baseline and predeployment data collected in training camps and deployment data collected in the combat theater. Participants Infantry soldiers (1085 men; mean age,18.8 years). Main Outcome Measures Postcombat PTSD symptoms. Results Soldiers developed threat vigilance during combat deployment, particularly when they were exposed to high-intensity combat, as indicated by faster response times to targets appearing at the location of threat relative to neutral stimuli (P < .001). Threat-related attention bias also interacted with combat exposure to predict risk for PTSD (P <.05). Bias toward threat at recruitment (P <.001) and bias away from threat just before deployment (P < .05) predicted postcombat PTSD symptoms. Moreover, these threat-related attention associations with PTSD were moderated by genetic and environmental factors, including serotonin transporter (5-HTTLPR) genotype. Conclusions and Relevance Combat exposure interacts with threat-related attention to place soldiers at risk for PTSD, and interactions with other risk factors account for considerable variance in PTSD vulnerability. Understanding these associations informs research on novel attention bias modification techniques and prevention of PTSD. PMID:23407816

  5. Student Threat Assessment as a Standard School Safety Practice: Results from a Statewide Implementation Study

    ERIC Educational Resources Information Center

    Cornell, Dewey; Maeng, Jennifer L.; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick

    2018-01-01

    Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat…

  6. Identifying potential academic leaders

    PubMed Central

    White, David; Krueger, Paul; Meaney, Christopher; Antao, Viola; Kim, Florence; Kwong, Jeffrey C.

    2016-01-01

    Objective To identify variables associated with willingness to undertake leadership roles among academic family medicine faculty. Design Web-based survey. Bivariate and multivariable analyses (logistic regression) were used to identify variables associated with willingness to undertake leadership roles. Setting Department of Family and Community Medicine at the University of Toronto in Ontario. Participants A total of 687 faculty members. Main outcome measures Variables related to respondents’ willingness to take on various academic leadership roles. Results Of all 1029 faculty members invited to participate in the survey, 687 (66.8%) members responded. Of the respondents, 596 (86.8%) indicated their level of willingness to take on various academic leadership roles. Multivariable analysis revealed that the predictors associated with willingness to take on leadership roles were as follows: pursuit of professional development opportunities (odds ratio [OR] 3.79, 95% CI 2.29 to 6.27); currently holding at least 1 leadership role (OR 5.37, 95% CI 3.38 to 8.53); a history of leadership training (OR 1.86, 95% CI 1.25 to 2.78); the perception that mentorship is important for one’s current role (OR 2.25, 95% CI 1.40 to 3.60); and younger age (OR 0.97, 95% CI 0.95 to 0.99). Conclusion Willingness to undertake new or additional leadership roles was associated with 2 variables related to leadership experiences, 2 variables related to perceptions of mentorship and professional development, and 1 demographic variable (younger age). Interventions that support opportunities in these areas might expand the pool and strengthen the academic leadership potential of faculty members. PMID:27331226

  7. Student threat assessment as a standard school safety practice: Results from a statewide implementation study.

    PubMed

    Cornell, Dewey; Maeng, Jennifer L; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick

    2018-06-01

    Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat assessment teams distinguish serious from nonserious threats. The sample consisted of 1,865 threat assessment cases reported by 785 elementary, middle, and high schools. Students ranged from pre-K to Grade 12, including 74.4% male, 34.6% receiving special education services, 51.2% White, 30.2% Black, 6.8% Hispanic, and 2.7% Asian. Survey data were collected from school-based teams to measure student demographics, threat characteristics, and assessment results. Logistic regression indicated that threat assessment teams were more likely to identify a threat as serious if it was made by a student above the elementary grades (odds ratio 0.57; 95% lower and upper bound 0.42-0.78), a student receiving special education services (1.27; 1.00-1.60), involved battery (1.61; 1.20-2.15), homicide (1.40; 1.07-1.82), or weapon possession (4.41; 2.80-6.96), or targeted an administrator (3.55; 1.73-7.30). Student race and gender were not significantly associated with a serious threat determination. The odds ratio that a student would attempt to carry out a threat classified as serious was 12.48 (5.15-30.22). These results provide new information on the nature and prevalence of threats in schools using threat assessment that can guide further work to develop this emerging school safety practice. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  8. Psychological Effects of the Threat of Nuclear War

    PubMed Central

    Kiraly, S. J.

    1986-01-01

    Systematic studies are emerging on the prevailing harmful psychological effect of the threat of nuclear war. The most recent surveys have identified populations which are particularly vulnerable. Anxiety was found to be a factor in criminal behavior, and threat of nuclear war to be a factor in anxiety. Psychiatric morbidity has been correlated with work deprivation and threat of annihilation. Many studies have focused on children, finding that anxiety about social issues is high, but that cynicism and apathy set in rapidly. Conclusions from such studies show that denial and avoidance are some of the worst results, since they are a barrier to meaningful reaction. The most vulnerable groups are children, adolescents, the unemployed, and those responsible for the welfare of others. Appropriate action is seen to be acknowledgement of fear and disillusionment as valid feelings, education towards a stronger sense of reality, and mobilization of goal-directed activity. PMID:21274254

  9. Exploring the function of selective attention and hypervigilance for threat in anxiety.

    PubMed

    Richards, Helen J; Benson, Valerie; Donnelly, Nick; Hadwin, Julie A

    2014-02-01

    Theoretical frameworks of anxiety propose that attentional biases to threat-related stimuli cause or maintain anxious states. The current paper draws on theoretical frameworks and key empirical studies to outline the distinctive attentional processes highlighted as being important in understanding anxiety. We develop a conceptual framework to make a distinction between two attentional biases: selective attention to threat and hypervigilance for threat. We suggest that these biases each have a different purpose and can account for the typical patterns of facilitated and impaired attention evident in anxious individuals. The framework is novel in its specification of the eye movement behavior associated with these attentional biases. We highlight that selective attention involves narrowing overt attention onto threat to ensure that these stimuli receive processing priority, leading to rapid engagement with task-relevant threat and delayed disengagement from task-irrelevant threat. We show that hypervigilance operates in the presence and absence of threat and involves monitoring for potential dangers via attentional broadening or excessive scanning of the environment with numerous eye movements, leading to improved threat detection and increased distraction from task-irrelevant threat. We conclude that future research could usefully employ eye movement measures to more clearly understand the diverse roles of attention in anxiety. Copyright © 2013 Elsevier Ltd. All rights reserved.

  10. The Threat Among Us: Insiders Intensify Aviation Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krull, Katie E.

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway formore » attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.« less

  11. Does Stereotype Threat Affect Women in Academic Medicine?

    PubMed Central

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  12. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    PubMed

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  13. Perturbed threat monitoring following a traumatic event predicts risk for post-traumatic stress disorder.

    PubMed

    Naim, R; Wald, I; Lior, A; Pine, D S; Fox, N A; Sheppes, G; Halpern, P; Bar-Haim, Y

    2014-07-01

    Post-traumatic stress disorder (PTSD) is a chronic and difficult to treat psychiatric disorder. Objective, performance-based diagnostic markers that uniquely index risk for PTSD above and beyond subjective self-report markers could inform attempts to improve prevention and early intervention. We evaluated the predictive value of threat-related attention bias measured immediately after a potentially traumatic event, as a risk marker for PTSD at a 3-month follow-up. We measured the predictive contribution of attentional threat bias above and beyond that of the more established marker of risk for PTSD, self-reported psychological dissociation. Dissociation symptoms and threat-related attention bias were measured in 577 motor vehicle accident (MVA) survivors (mean age = 35.02 years, 356 males) within 24 h of admission to an emergency department (ED) of a large urban hospital. PTSD symptoms were assessed at a 3-month follow-up using the Clinician-Administered PTSD Scale (CAPS). Self-reported dissociation symptoms significantly accounted for 16% of the variance in PTSD at follow-up, and attention bias toward threat significantly accounted for an additional 4% of the variance in PTSD. Threat-related attention bias can be reliably measured in the context of a hospital ED and significantly predicts risk for later PTSD. Possible mechanisms underlying the association between threat bias following a potentially traumatic event and risk for PTSD are discussed. The potential application of an attention bias modification treatment (ABMT) tailored to reduce risk for PTSD is suggested.

  14. Cognitive appraisals of stereotype threat.

    PubMed

    Berjot, S; Roland-Levy, C; Girault-Lidvan, N

    2011-04-01

    Using the cognitive appraisal conceptualisation of the transactional model of stress, the goal was to assess how victims of stereotype threat respond to this situation in terms of primary appraisals (threat/challenge) and to investigate whether those appraisals may mediate the relation between stereotype threat and performance. Results show that, while participants from North Africa living in France did appraise the situation more as a threat and less as a challenge, only challenge appraisal mediated between stereotype threat and performance.

  15. Evaluative threat and ambulatory blood pressure: cardiovascular effects of social stress in daily experience.

    PubMed

    Smith, Timothy W; Birmingham, Wendy; Uchino, Bert N

    2012-11-01

    Physiological effects of social evaluation are central in models of psychosocial influences on physical health. Experimental manipulations of evaluative threat evoke substantial cardiovascular and neuroendocrine responses in laboratory studies, but only preliminary evidence is available regarding naturally occurring evaluative threats in daily life. In such nonexperimental ambulatory studies, it is essential to distinguish effects of evaluative threat from related constructs known to alter stress, such as ability perceptions and concerns about appearance. 94 married, working couples (mean age 29.2 years) completed a 1-day (8 a.m. to 10 p.m.) ambulatory blood pressure protocol with random interval-contingent measurements using a Suntech monitor and Palm Pilot-based measures of control variables and momentary experiences of social-evaluative threat, concerns about appearance, and perceived ability. In hierarchical analyses for couples and multiple measurement occasions (Proc Mixed; SAS) and controlling individual differences (BMI, age, income) and potential confounds (e.g., posture, activity), higher reports of social-evaluative threat were associated with higher concurrent systolic (estimate = .87, SE = .34) and diastolic blood pressure (estimate = 1.06; SE = .26), both p < .02. Effects of social-evaluative threat remained significant when perceived ability and appearance concerns were controlled. Naturally occurring social-evaluative threat during daily activity is associated with increased systolic and diastolic blood pressure. Given associations between ambulatory blood pressure and risk of cardiovascular disease, the findings support conceptual models of threats to the social self as a potentially important influence on physical health.

  16. Poland and Global Threats

    NASA Astrophysics Data System (ADS)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  17. Stereotype Threat Reinterpreted as a Regulatory Mismatch

    PubMed Central

    Grimm, Lisa R.; Markman, Arthur B.; Maddox, W. Todd; Baldwin, Grant C.

    2008-01-01

    Research documents performance decrements resulting from the activation of a negative task-relevant stereotype. We combine a number of strands of work to identify causes of stereotype threat in a way that allows us to reverse the effects and improve the performance of individuals with negative task-relevant stereotypes. We draw on prior work suggesting that negative stereotypes induce a prevention focus, and other research suggesting that people exhibit greater flexibility when their regulatory focus matches the reward structure of the task. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks that have an explicit or implicit gains reward structure. We find flexible performance can be induced in individuals who have a negative task-relevant stereotype by using a losses reward structure. We demonstrate the interaction of stereotypes and the reward structure of the task using chronic stereotypes and GRE math problems (Experiment 1), and primed stereotypes and a category learning task (Experiments 2a and 2b). We discuss implications of this research for other work on stereotype threat. PMID:19159133

  18. Lizard threat display handicaps endurance.

    PubMed Central

    Brandt, Y

    2003-01-01

    Honest-signalling theory asserts that threat displays reliably advertise attributes that influence fighting success. Endurance, as measured by treadmill performance, predicts the outcome of agonistic interactions among lizards. If threat displays in lizards function to advertise endurance capacity then variation in threat displays should correlate with endurance. I tested this prediction for the duration of threat posturing in male side-blotched lizards (Uta stansburiana) and examined whether threat displays act as quality handicaps, reliable signals that expend the attribute that is advertised. Individual variation in the duration of threat posturing correlated with endurance, while an experimental reduction of endurance diminished the duration of threat posturing. As expected of a quality handicap, endurance fell below baseline after display production. A restriction of aerobic metabolism can account for this effect. In threat posturing, lateral compression of the thorax may interfere with respiration or with circulation, limiting aerobic metabolism and causing a compensatory increase in anaerobic metabolism, thereby generating lactate and diminishing locomotor capacity. Concentrations of lactate measured after display production were higher than baseline, consistent with the proposed mechanism. By restricting aerobic metabolism, the threat posture can act as a quality handicap, simultaneously advertising and expending the endurance capacity of displaying lizards. PMID:12803896

  19. Adolescents expressing school massacre threats online: something to be extremely worried about?

    PubMed Central

    2012-01-01

    Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic. PMID:23241433

  20. When a threat to the brand is a threat to the self: the importance of brand identification and implicit self-esteem in predicting defensiveness.

    PubMed

    Lisjak, Monika; Lee, Angela Y; Gardner, Wendi L

    2012-09-01

    This research examines how people respond when a commercial brand they identify with is threatened. Across four studies, the authors found that among participants who identified with a brand, a threat to the brand elicited the same responses as a threat to the self. Specifically, participants with low implicit self-esteem defended the brand when the self was activated, unlike their high implicit self-esteem counterparts. In addition, brand defense was reduced when individuals had the opportunity to affirm a valued aspect of their self-concept. These findings suggest that when a brand that people identify with is threatened, they may defend the brand to preserve the integrity of the self. More broadly, these findings are consistent with the notion that brands may be included into the extended self-concept, which supports William James's original ideas concerning the breadth and heterogeneity of the self.

  1. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  2. At a global scale, do climate change threatened species also face a greater number of non-climatic threats?

    USGS Publications Warehouse

    Fortini, Lucas B.; Dye, Kaipo

    2017-01-01

    found other (but not all) anthropogenic threats are also similarly associated with more threats. Our findings serve as a reminder that ecological research should seriously consider these potential threat interactions, especially for species under elevated conservation concern.

  3. The Domestic IED Threat

    DTIC Science & Technology

    2008-01-01

    threat that could use IEDs in the homeland is single-issue organizations. This threat includes such groups as the Okla- homa City bombers and other...threat during joint Army–Air Force exercise U .S . A ir Fo rc e (S te ph en O te ro ) ndupress .ndu.edu issue 48, 1st quarter 2008 / JFQ        69

  4. Automated recognition and tracking of aerosol threat plumes with an IR camera pod

    NASA Astrophysics Data System (ADS)

    Fauth, Ryan; Powell, Christopher; Gruber, Thomas; Clapp, Dan

    2012-06-01

    Protection of fixed sites from chemical, biological, or radiological aerosol plume attacks depends on early warning so that there is time to take mitigating actions. Early warning requires continuous, autonomous, and rapid coverage of large surrounding areas; however, this must be done at an affordable cost. Once a potential threat plume is detected though, a different type of sensor (e.g., a more expensive, slower sensor) may be cued for identification purposes, but the problem is to quickly identify all of the potential threats around the fixed site of interest. To address this problem of low cost, persistent, wide area surveillance, an IR camera pod and multi-image stitching and processing algorithms have been developed for automatic recognition and tracking of aerosol plumes. A rugged, modular, static pod design, which accommodates as many as four micro-bolometer IR cameras for 45deg to 180deg of azimuth coverage, is presented. Various OpenCV1 based image-processing algorithms, including stitching of multiple adjacent FOVs, recognition of aerosol plume objects, and the tracking of aerosol plumes, are presented using process block diagrams and sample field test results, including chemical and biological simulant plumes. Methods for dealing with the background removal, brightness equalization between images, and focus quality for optimal plume tracking are also discussed.

  5. Climate change and nesting behaviour in vertebrates: a review of the ecological threats and potential for adaptive responses.

    PubMed

    Mainwaring, Mark C; Barber, Iain; Deeming, Denis C; Pike, David A; Roznik, Elizabeth A; Hartley, Ian R

    2017-11-01

    Nest building is a taxonomically widespread and diverse trait that allows animals to alter local environments to create optimal conditions for offspring development. However, there is growing evidence that climate change is adversely affecting nest-building in animals directly, for example via sea-level rises that flood nests, reduced availability of building materials, and suboptimal sex allocation in species exhibiting temperature-dependent sex determination. Climate change is also affecting nesting species indirectly, via range shifts into suboptimal nesting areas, reduced quality of nest-building environments, and changes in interactions with nest predators and parasites. The ability of animals to adapt to sustained and rapid environmental change is crucial for the long-term persistence of many species. Many animals are known to be capable of adjusting nesting behaviour adaptively across environmental gradients and in line with seasonal changes, and this existing plasticity potentially facilitates adaptation to anthropogenic climate change. However, whilst alterations in nesting phenology, site selection and design may facilitate short-term adaptations, the ability of nest-building animals to adapt over longer timescales is likely to be influenced by the heritable basis of such behaviour. We urgently need to understand how the behaviour and ecology of nest-building in animals is affected by climate change, and particularly how altered patterns of nesting behaviour affect individual fitness and population persistence. We begin our review by summarising how predictable variation in environmental conditions influences nest-building animals, before highlighting the ecological threats facing nest-building animals experiencing anthropogenic climate change and examining the potential for changes in nest location and/or design to provide adaptive short- and long-term responses to changing environmental conditions. We end by identifying areas that we believe warrant the

  6. Identification of the Fire Threat in Urban Transit Vehicles

    DOT National Transportation Integrated Search

    1980-06-01

    To improve mass transportation, UMTA tasked the Transportation Systems Center (TSC) to assess the overall fire threat in transit systems and to identify and recommend suitable remedial actions. This report presents the identification of the fire thre...

  7. From Threat to Fear: The neural organization of defensive fear systems in humans

    PubMed Central

    Mobbs, Dean; Marchant, Jennifer L; Hassabis, Demis; Seymour, Ben; Tan, Geoffrey; Gray, Marcus; Petrovic, Predrag; Dolan, Raymond J.; Frith, Christopher D.

    2009-01-01

    Post-encounter and circa-strike defensive contexts represent two adaptive responses to potential and imminent danger. In the context of a predator, the post-encounter reflects the initial detection of the potential threat, whilst the circa-strike is associated with direct predatory attack. We used fMRI to investigate the neural organization of anticipation and avoidance of artificial predators with high or low probability of capturing the subject across analogous post-encounter and circa-strike contexts of threat. Consistent with defense systems models, post-encounter threat elicited activity in forebrain areas including subgenual anterior cingulate cortex (sgACC), hippocampus and amygdala. Conversely, active avoidance during circa-strike threat increased activity in mid-dorsal ACC and midbrain areas. During the circa-strike condition, subjects showed increased coupling between the midbrain and mid-dorsal ACC and decreased coupling with the sgACC, amygdala and hippocampus. Greater activity was observed in the right pregenual ACC for high compared to low probability of capture during circa-strike threat. This region showed decreased coupling with the amygdala, insula and ventromedial prefrontal cortex. Finally, we found that locomotor errors correlated with subjective reports of panic for the high compared to low probability of capture during the circa-strike threat and these panic-related locomotor errors were correlated with midbrain activity. These findings support models suggesting that higher forebrain areas are involved in early threat responses, including the assignment and control of fear, whereas as imminent danger results in fast, likely “hard-wired”, defensive reactions mediated by the midbrain. PMID:19793982

  8. Detecting underwater improvised explosive threats (DUIET)

    NASA Astrophysics Data System (ADS)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  9. A comprehensive approach to managing threats of violence on a university or college campus.

    PubMed

    Regehr, Cheryl; Glancy, Graham D; Carter, Andrea; Ramshaw, Lisa

    Horrifying, high profile acts of violence on campuses remain relatively rare, nevertheless, academic administrators are required to manage threats of violence on campus on an increasingly regular basis. These threats take two primary forms, those in which the perpetrator and the intended victim(s) are clearly identified, often involving repeated threats and threatening behaviour towards an individual; and those involving anonymous threats to commit acts of larger scale violence. Complicating factors in managing these threats include: fear contagion; mass media and social media attention; responsibilities to all members of the university community sometimes including individuals issuing the threat and the intended victims; demands for safety and security measures that are often at odds with professional advice; and permeable campus boundaries that cause security challenges. This paper considers the changing landscape of threat assessment and risk assessment on university and college campuses and suggests opportunities for partnerships between forensic mental health professionals and academic administrators. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Temporal allocation of attention toward threat in individuals with posttraumatic stress symptoms.

    PubMed

    Amir, Nader; Taylor, Charles T; Bomyea, Jessica A; Badour, Christal L

    2009-12-01

    Research suggests that individuals with posttraumatic stress disorder (PTSD) selectively attend to threat-relevant information. However, little is known about how initial detection of threat influences the processing of subsequently encountered stimuli. To address this issue, we used a rapid serial visual presentation paradigm (RSVP; Raymond, J. E., Shapiro, K. L., & Arnell, K. M. (1992). Temporary suppression of visual processing in an RSVP task: An attentional blink? Journal of Experimental Psychology: Human Perception and Performance, 18, 849-860) to examine temporal allocation of attention to threat-related and neutral stimuli in individuals with PTSD symptoms (PTS), traumatized individuals without PTSD symptoms (TC), and non-anxious controls (NAC). Participants were asked to identify one or two targets in an RSVP stream. Typically processing of the first target decreases accuracy of identifying the second target as a function of the temporal lag between targets. Results revealed that the PTS group was significantly more accurate in detecting a neutral target when it was presented 300 or 500ms after threat-related stimuli compared to when the target followed neutral stimuli. These results suggest that individuals with PTSD may process trauma-relevant information more rapidly and efficiently than benign information.

  11. If it bleeds, it leads: separating threat from mere negativity

    PubMed Central

    Boshyan, Jasmine; Adams, Reginald B.; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F.

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. PMID:24493851

  12. Reactions to a health threat: dispositional threat orientations and message characteristics.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Gonzalez, Amelia; Denison, Elizabeth

    2011-05-01

    This study explored the interactive effects of dispositional threat orientation, type of message, and having children on reactions to a message about exposure to bisphenol A (BPA) in plastics. The study used a 2 (message: Fear Arousal or Plain)×2 (parenting status: child or no child)×2 (threat orientation: high or low) mixed factorial design. Adults (N= 200) recruited via the Internet completed measures of threat orientations, reported whether they were a parent, and read either a low or high fear-arousal message about the risks of BPA exposure. They then completed measures of reactions to the message (perceived susceptibility to BPA effects, negative emotions, and behavioural intentions to engage in protection). Depending on threat orientations, the fear arousal version of the message and parenthood had strikingly different effects, ranging from no effect (for those high in a control-based approach) to prompting change (for those low in a control-based approach) to counterproductive (for those high in an optimistic denial approach). These findings suggest that considering individual differences and their interactions with situational factors could improve both the predictive ability of threat protection theories and the delivery of messages intended to change behaviour. ©2010 The British Psychological Society.

  13. Identifying Potential Kidney Donors Using Social Networking Websites

    PubMed Central

    Chang, Alexander; Anderson, Emily E.; Turner, Hang T.; Shoham, David; Hou, Susan H.; Grams, Morgan

    2013-01-01

    Social networking sites like Facebook may be a powerful tool for increasing rates of live kidney donation. They allow for wide dissemination of information and discussion, and could lessen anxiety associated with a face-to-face request for donation. However, sparse data exist on the use of social media for this purpose. We searched Facebook, the most popular social networking site, for publicly available English-language pages seeking kidney donors for a specific individual, abstracting information on the potential recipient, characteristics of the page itself, and whether potential donors were tested. In the 91 pages meeting inclusion criteria, the mean age of potential recipients was 37 (range: 2–69); 88% were U.S. residents. Other posted information included the individual’s photograph (76%), blood type (64%), cause of kidney disease (43%), and location (71%). Thirty-two percent of pages reported having potential donors tested, and 10% reported receiving a live donor kidney transplant. Those reporting donor testing shared more potential recipient characteristics, provided more information about transplantation, and had higher page traffic. Facebook is already being used to identify potential kidney donors. Future studies should focus on how to safely, ethically, and effectively use social networking sites to inform potential donors and potentially expand live kidney donation. PMID:23600791

  14. Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework

    NASA Astrophysics Data System (ADS)

    Tsigkritis, Theocharis; Spanoudakis, George; Kloukinas, Christos; Lorenzoli, Davide

    The SERENITY monitoring framework offers mechanisms for diagnosing the causes of violations of security and dependability (S&D) properties and detecting potential violations of such properties, called "Cthreats". Diagnostic information and threat detection are often necessary for deciding what an appropriate reaction to a violation is and taking pre-emptive actions against predicted violations, respectively. In this chapter, we describe the mechanisms of the SERENITY monitoring framework which generate diagnostic information for violations of S&D properties and detecting threats.

  15. Pubertal testosterone influences threat-related amygdala–orbitofrontal cortex coupling

    PubMed Central

    Forbes, Erika E.; Ladouceur, Cecile D.; Worthman, Carol M.; Olino, Thomas M.; Ryan, Neal D.; Dahl, Ronald E.

    2015-01-01

    Growing evidence indicates that normative pubertal maturation is associated with increased threat reactivity, and this developmental shift has been implicated in the increased rates of adolescent affective disorders. However, the neural mechanisms involved in this pubertal increase in threat reactivity remain unknown. Research in adults indicates that testosterone transiently decreases amygdala–orbitofrontal cortex (OFC) coupling. Consequently, we hypothesized that increased pubertal testosterone disrupts amygdala–OFC coupling, which may contribute to developmental increases in threat reactivity in some adolescents. Hypotheses were tested in a longitudinal study by examining the impact of testosterone on functional connectivity. Findings were consistent with hypotheses and advance our understanding of normative pubertal changes in neural systems instantiating affect/motivation. Finally, potential novel insights into the neurodevelopmental pathways that may contribute to adolescent vulnerability to behavioral and emotional problems are discussed. PMID:24795438

  16. Stereotype Threat: A Qualitative Study of the Challenges Facing Female Undergraduate Engineering Students

    NASA Astrophysics Data System (ADS)

    Entsminger, J. R., II

    From a sociocultural point of view, this qualitative case study explored how upper-level, female undergraduate engineering students perceived the possibility of or experience with stereotype threat as shaping their experiences. The study also investigated how these students explained their reasons for choosing their engineering major, the challenges they encountered in the major, and their reasons for persevering in spite of those challenges. Using Steele and Aronson's (1995) stereotype threat theory as a framework, and considering the documented underrepresentation of females in engineering, the study sought to examine how stereotype threat shaped the experiences of these students and if stereotype threat could be considered a valid reason for the underrepresentation. The study was conducted at a large, four-year public university. First, students in the College of Engineering and Engineering Technology completed the Participant Screening Survey. Based on responses from the survey, six female engineering students from the college were identified and invited to participate in the study. The participants came from the following majors: Electrical Engineering, Industrial and Systems Engineering, and Mechanical Engineering. After receiving the study consent letter and agreeing to participate, the students were involved in a 90-minute focus group meeting, a 45-minute one-on-one interview, and a 30-minute follow-up interview. After conducting the data collection methods, the data were then transcribed, analyzed, and coded for theme development. The themes that emerged coincided with each research question. The themes highlighted the complex interactions and experiences shared by the female engineering majors. The female students were enveloped in an environment where there existed an increased risk for activating stereotype threat. In addition, the female students described feeling pushed to prove to themselves and to others that the negative stereotype that 'females

  17. Distinct responses to predictable and unpredictable threat in anxiety pathologies: effect of panic attack.

    PubMed

    Grillon, Christian; O'Connell, Katherine; Lieberman, Lynne; Alvarez, Gabriella; Geraci, Marilla; Pine, Daniel S; Ernst, Monique

    2017-10-01

    Delineating specific clinical phenotypes of anxiety disorders is a crucial step toward better classification and understanding of these conditions. The present study sought to identify differential aversive responses to predictable and unpredictable threat of shock in healthy comparisons and in non-medicated anxiety patients with and without a history of panic attacks (PAs). 143 adults (72 healthy controls; 71 patients with generalized anxiety disorder (GAD) or/and social anxiety disorder (SAD), 24 with and 47 without PAs) were exposed to three conditions: 1) predictable shocks signaled by a cue, 2) unpredictable shocks, and 3) no shock. Startle magnitude was used to assess aversive responses. Across disorders, a PA history was specifically associated with hypersensitivity to unpredictable threat. By disorder, SAD was associated with hypersensitivity to predictable threat, whereas GAD was associated with exaggerated baseline startle. These results identified three physiological patterns. The first is hypersensitivity to unpredictable threat in individuals with PAs. The second is hypersensitivity to predictable threat, which characterizes SAD. The third is enhanced baseline startle in GAD, which may reflect propensity for self-generated anxious thoughts in the absence of imminent danger. These results inform current thinking by linking specific clinical features to particular physiology profiles.

  18. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector

    DTIC Science & Technology

    2005-06-01

    as a computer fraud case investigated by the Secret Service. Each case was analyzed from a behavioral and a technical perspective to identify...insider threat and address the issue from an approach that draws on human resources, corporate security, and information security perspectives. The ... Secret Service National Threat Assessment Center and the CERT Coordination Center of Carnegie Mellon University’s Software Engineering Institute joined

  19. Combatting Insider Threats

    NASA Astrophysics Data System (ADS)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  20. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    PubMed Central

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  1. Heterogeneous Defensive Naval Weapon Assignment To Swarming Threats In Real Time

    DTIC Science & Technology

    2016-03-01

    threat Damage potential of target t if it hits the ship [integer from 0 to 3] _ ttarget phit Probability that target t hits the ship [probability...secondary weapon systems on target t [integer] _ tsec phit Probability that secondary weapon systems launched from target t hit the ship...pairing. These parameters are calculated as follows: 310 _ _t t tpriority target threat target phit = × × (3.1) 3_ 10 _ _t t tsec priority sec

  2. Major Threats to Environmental Quality in North America.

    ERIC Educational Resources Information Center

    Vogl, Robert; And Others

    1986-01-01

    Reports study findings of environmental educators' opinions on issues which pose threats to environmental quality in North America and the status of the availability of educational materials for the issues. Identified as priority items were hazardous wastes management, water contamination, and acid deposition. Compares responses of American and…

  3. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  4. Volume-holographic memory for laser threat discrimination

    NASA Astrophysics Data System (ADS)

    Delong, Mark L.; Duncan, Bradley D.; Parker, Jack H., Jr.

    1996-10-01

    Using conventional volume-holographic angle multiplexing in an Fe:LiNbO3 crystal, we have developed a compact laser threat discriminator, intended for aircraft integration, that optically detects laser spatial coherence and angle of arrival while simultaneously rejecting incoherent background sources, such as the Sun. The device is intended for a specific type of psychophysical laser attack against U.S. Air Force pilots, namely, third-world-country exploitation of inexpensive and powerful cw Ar-ion or doubled Nd:YAG lasers in the visible spectrum to blind or disorient U.S. pilots. The component does not solve the general tactical laser weapon situation, which includes identifying precision-guided munitions, range finders, and lidar systems that use pulsed infrared lasers. These are fundamentally different threats requiring different detector solutions. The device incorporates a sequence of highly redundant, simple black-and-white warning patterns that are keyed to be reconstructed as the incident laser threat, playing the role of an uncooperative probe beam, changes angle with respect to the crystal. The device tracks both azimuth and elevation, using a nonconventional hologram viewing system. Recording and playback conditions are simplified because nonzero cross talk is a desirable feature of this discriminator, inasmuch as our application requires a nonzero probability of detection for arbitrary directions of arrival within the sensor's field of view. The device can exploit phase-matched grating trade-off with probe-beam wavelength, accommodating wavelength-tunable threats, while still maintaining high direction-of-arrival tracking accuracy. .

  5. Threats to Feminist Identity and Reactions to Gender Discrimination.

    PubMed

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists ( M age  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed.

  6. Modeling Channel Movement Response to Rainfall Variability and Potential Threats to Post-earthquake Reconstruction

    NASA Astrophysics Data System (ADS)

    Xie, J.; Wang, M.; Liu, K.

    2017-12-01

    The 2008 Wenchuan Ms 8.0 earthquake caused overwhelming destruction to vast mountains areas in Sichuan province. Numerous seismic landslides damaged the forest and vegetation cover, and caused substantial loose sediment piling up in the valleys. The movement and fill-up of loose materials led to riverbeds aggradation, thus made the earthquake-struck area more susceptible to flash floods with increasing frequency and intensity of extreme rainfalls. This study investigated the response of sediment and river channel evolution to different rainfall scenarios after the Wenchuan earthquake. The study area was chosen in a catchment affected by the earthquake in Northeast Sichuan province, China. We employed the landscape evolution model CAESAR-lisflood to explore the material migration rules and then assessed the potential effects under two rainfall scenarios. The model parameters were calibrated using the 2013 extreme rainfall event, and the experimental rainfall scenarios were of different intensity and frequency over a 10-year period. The results indicated that CAESAR-lisflood was well adapted to replicate the sediment migration, particularly the fluvial processes after earthquake. With respect to the effects of rainfall intensity, the erosion severity in upstream gullies and the deposition severity in downstream channels, correspondingly increased with the increasing intensity of extreme rainfalls. The modelling results showed that buildings in the catchment suffered from flash floods increased by more than a quarter from the normal to the enhanced rainfall scenarios in ten years, which indicated a potential threat to the exposures nearby the river channel, in the context of climate change. Simulation on landscape change is of great significance, and contributes to early warning of potential geological risks after earthquake. Attention on the high risk area by local government and the public is highly suggested in our study.

  7. Release of genetically engineered insects: a framework to identify potential ecological effects

    PubMed Central

    David, Aaron S; Kaser, Joe M; Morey, Amy C; Roth, Alexander M; Andow, David A

    2013-01-01

    Genetically engineered (GE) insects have the potential to radically change pest management worldwide. With recent approvals of GE insect releases, there is a need for a synthesized framework to evaluate their potential ecological and evolutionary effects. The effects may occur in two phases: a transitory phase when the focal population changes in density, and a steady state phase when it reaches a new, constant density. We review potential effects of a rapid change in insect density related to population outbreaks, biological control, invasive species, and other GE organisms to identify a comprehensive list of potential ecological and evolutionary effects of GE insect releases. We apply this framework to the Anopheles gambiae mosquito – a malaria vector being engineered to suppress the wild mosquito population – to identify effects that may occur during the transitory and steady state phases after release. Our methodology reveals many potential effects in each phase, perhaps most notably those dealing with immunity in the transitory phase, and with pathogen and vector evolution in the steady state phase. Importantly, this framework identifies knowledge gaps in mosquito ecology. Identifying effects in the transitory and steady state phases allows more rigorous identification of the potential ecological effects of GE insect release. PMID:24198955

  8. Water storage equity and safety assurance policy to mitigate potential 'dual-extreme cumulative threats' in agricultural catchments

    NASA Astrophysics Data System (ADS)

    Pisaniello, John D.; Tingey-Holyoak, Joanne L.

    2017-02-01

    Farm dams that are not managed properly at the individual level can create water storage equity and safety threats to downstream communities and the environment that aggregate at the catchment level: a potential 'dual-extreme cumulative' problem. The paper provides indicative evidence and develops understanding of this novel phenomenon and associated policy needs within the Australian setting comprising dual hydrologic extremes of floods and droughts, further exacerbated by climate change. This is achieved through comparative case studies involving surveys of both dam owner perceptions and dam management practices in four States representing a complete range of integrated policy approaches from weak to strong. Survey results find most farmers do not believe dam maintenance is important, will undertake spillway blocking and do not plan for emergencies. These results are supported by physical on-site findings of farmers neglecting dams and blocking or under-designing spillways, in turn storing more water than they are entitled and creating unsafe dams at both the individual and cumulative levels. From detailed cross-case comparative assessment against policy context, it emerges that on-farm perceptions and practices form a range of 'acceptability' of dam management that directly reflects policy strength and integration in each setting. The paper advances the international small dams policy, agricultural water management and hydrology literatures, evidencing the need for effective integrated policy to mitigate dual extreme cumulative threats. Importantly, guidance is provided to jurisdictions internationally with high inter-annual rainfall variation on how best to design integrated policy that can achieve both water storage equity and safety in agricultural catchments.

  9. Do frequent exposures to threats and violence at work affect later workforce participation?

    PubMed

    Biering, Karin; Andersen, Lars Peter Sønderbo; Hogh, Annie; Andersen, Johan Hviid

    2018-05-01

    Threats and violence at work are common problems in the human service sector. It can result in physical and psychological health symptoms. The aim of this study was to examine the association between exposure to threats and violence and workforce participation in four human service sectors. 5170 employees answered questionnaires about threats and violence in 2010 and were followed in a register for public transfer incomes for 3.5 years to identify episodes of sick leave, general workforce participation, and permanent health-related benefits. We found associations between exposures to threats and violence at work and workforce participation, though only a few specific types of threats and violence were associated on their own. Self-rated severity of both threatening and violent episodes was associated with overall low workforce participation, new sick leave episodes, and permanent health-related benefits. However, the latter was not statistically significant. The same pattern seems to be present in the relation between the total amount of exposure to threats and violence (threats score and violence score), respectively, and overall low workforce participation and new sick leave episodes. The threats score was also related to permanent health-related benefits. Exposure to threats and violence is associated with temporary and permanent health-related benefits as well as with low workforce participation in general, although some of the associations were not statistically significant.

  10. Threats to US energy security: the challenge of Arab oil

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, J.

    1979-08-13

    Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.

  11. Pubertal testosterone influences threat-related amygdala-orbitofrontal cortex coupling.

    PubMed

    Spielberg, Jeffrey M; Forbes, Erika E; Ladouceur, Cecile D; Worthman, Carol M; Olino, Thomas M; Ryan, Neal D; Dahl, Ronald E

    2015-03-01

    Growing evidence indicates that normative pubertal maturation is associated with increased threat reactivity, and this developmental shift has been implicated in the increased rates of adolescent affective disorders. However, the neural mechanisms involved in this pubertal increase in threat reactivity remain unknown. Research in adults indicates that testosterone transiently decreases amygdala-orbitofrontal cortex (OFC) coupling. Consequently, we hypothesized that increased pubertal testosterone disrupts amygdala-OFC coupling, which may contribute to developmental increases in threat reactivity in some adolescents. Hypotheses were tested in a longitudinal study by examining the impact of testosterone on functional connectivity. Findings were consistent with hypotheses and advance our understanding of normative pubertal changes in neural systems instantiating affect/motivation. Finally, potential novel insights into the neurodevelopmental pathways that may contribute to adolescent vulnerability to behavioral and emotional problems are discussed. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  12. Building Regional Threat-Based Networks for Estuaries in the Western United States

    PubMed Central

    Merrifield, Matthew S.; Hines, Ellen; Liu, Xiaohang; Beck, Michael W.

    2011-01-01

    Estuaries are ecologically and economically valuable and have been highly degraded from both land and sea. Estuarine habitats in the coastal zone are under pressure from a range of human activities. In the United States and elsewhere, very few conservation plans focused on estuaries are regional in scope; fewer still address threats to estuary long term viability.We have compiled basic information about the spatial extent of threats to identify commonalities. To do this we classify estuaries into hierarchical networks that share similar threat characteristics using a spatial database (geodatabase) of threats to estuaries from land and sea in the western U.S.Our results show that very few estuaries in this region (16%) have no or minimal stresses from anthropogenic activity. Additionally, one quarter (25%) of all estuaries in this study have moderate levels of all threats. The small number of un-threatened estuaries is likely not representative of the ecological variability in the region and will require working to abate threats at others. We think the identification of these estuary groups can foster sharing best practices and coordination of conservation activities amongst estuaries in any geography. PMID:21387006

  13. Assessing Threat Detection Scenarios through Hypothesis Generation and Testing

    DTIC Science & Technology

    2015-12-01

    Dog Day scenario .............................................................................................................. 9...Figure 1. Rankings of priority threats identified in the Dog Day scenario ............................... 9 Figure 2. Rankings of priority...making in uncertain environments relies heavily on pattern matching. Cohen, Freeman, and Wolf (1996) reported that features of the decision problem

  14. Explosive and chemical threat detection by surface-enhanced Raman scattering: a review.

    PubMed

    Hakonen, Aron; Andersson, Per Ola; Stenbæk Schmidt, Michael; Rindzevicius, Tomas; Käll, Mikael

    2015-09-17

    Acts of terror and warfare threats are challenging tasks for defense agencies around the world and of growing importance to security conscious policy makers and the general public. Explosives and chemical warfare agents are two of the major concerns in this context, as illustrated by the recent Boston Marathon bombing and nerve gas attacks on civilians in the Middle East. To prevent such tragic disasters, security personnel must be able to find, identify and deactivate the threats at multiple locations and levels. This involves major technical and practical challenges, such as detection of ultra-low quantities of hazardous compounds at remote locations for anti-terror purposes and monitoring of environmental sanitation of dumped or left behind toxic substances and explosives. Surface-enhanced Raman scattering (SERS) is one of todays most interesting and rapidly developing methods for label-free ultrasensitive vibrational "fingerprinting" of a variety of molecular compounds. Performance highlights include attomolar detection of TNT and DNT explosives, a sensitivity that few, if any, other technique can compete with. Moreover, instrumentation needed for SERS analysis are becoming progressively better, smaller and cheaper, and can today be acquired for a retail price close to 10,000 US$. This contribution aims to give a comprehensive overview of SERS as a technique for detection of explosives and chemical threats. We discuss the prospects of SERS becoming a major tool for convenient in-situ threat identification and we summarize existing SERS detection methods and substrates with particular focus on ultra-sensitive real-time detection. General concepts, detection capabilities and perspectives are discussed in order to guide potential users of the technique for homeland security and anti-warfare purposes. Copyright © 2015 Elsevier B.V. All rights reserved.

  15. Ocean acidification increases cadmium accumulation in marine bivalves: a potential threat to seafood safety.

    PubMed

    Shi, Wei; Zhao, Xinguo; Han, Yu; Che, Zhumei; Chai, Xueliang; Liu, Guangxu

    2016-01-21

    To date, the effects of ocean acidification on toxic metals accumulation and the underlying molecular mechanism remains unknown in marine bivalve species. In the present study, the effects of the realistic future ocean pCO2 levels on the cadmium (Cd) accumulation in the gills, mantle and adductor muscles of three bivalve species, Mytilus edulis, Tegillarca granosa, and Meretrix meretrix, were investigated. The results obtained suggested that all species tested accumulated significantly higher Cd (p < 0.05) in the CO2 acidified seawater during the 30 days experiment and the health risk of Cd (based on the estimated target hazard quotients, THQ) via consumption of M. meretrix at pH 7.8 and 7.4 significantly increased 1.21 and 1.32 times respectively, suggesting a potential threat to seafood safety. The ocean acidification-induced increase in Cd accumulation may have occurred due to (i) the ocean acidification increased the concentration of Cd and the Cd(2+)/Ca(2+) in the seawater, which in turn increased the Cd influx through Ca channel; (ii) the acidified seawater may have brought about epithelia damage, resulting in easier Cd penetration; and (iii) ocean acidification hampered Cd exclusion.

  16. Ocean acidification increases cadmium accumulation in marine bivalves: a potential threat to seafood safety

    PubMed Central

    Shi, Wei; Zhao, Xinguo; Han, Yu; Che, Zhumei; Chai, Xueliang; Liu, Guangxu

    2016-01-01

    To date, the effects of ocean acidification on toxic metals accumulation and the underlying molecular mechanism remains unknown in marine bivalve species. In the present study, the effects of the realistic future ocean pCO2 levels on the cadmium (Cd) accumulation in the gills, mantle and adductor muscles of three bivalve species, Mytilus edulis, Tegillarca granosa, and Meretrix meretrix, were investigated. The results obtained suggested that all species tested accumulated significantly higher Cd (p < 0.05) in the CO2 acidified seawater during the 30 days experiment and the health risk of Cd (based on the estimated target hazard quotients, THQ) via consumption of M. meretrix at pH 7.8 and 7.4 significantly increased 1.21 and 1.32 times respectively, suggesting a potential threat to seafood safety. The ocean acidification-induced increase in Cd accumulation may have occurred due to (i) the ocean acidification increased the concentration of Cd and the Cd2+/Ca2+ in the seawater, which in turn increased the Cd influx through Ca channel; (ii) the acidified seawater may have brought about epithelia damage, resulting in easier Cd penetration; and (iii) ocean acidification hampered Cd exclusion. PMID:26795597

  17. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  18. If it bleeds, it leads: separating threat from mere negativity.

    PubMed

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  19. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  20. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    PubMed

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  1. The globalization of public health, I: Threats and opportunities.

    PubMed Central

    Yach, D; Bettcher, D

    1998-01-01

    The globalization of public health poses new threats to health but also holds important opportunities in the coming century. This commentary identifies the major threats and opportunities presented by the process of globalization and emphasizes the need for transnational public health approaches to take advantage of the positive aspects of global change and to minimize the negative ones. Transnational public health issues are areas of mutual concern for the foreign policies of all countries. These trends indicate a need for cross-national comparisons (e.g., in the areas of health financing and policy development) and for the development of a transnational research agenda in public health. PMID:9585736

  2. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  3. The Role of Health Educators in Dealing with Biological Threats in the United States

    ERIC Educational Resources Information Center

    Perez, Miguel A.; Pinzon-Perez, Helda; Sowby, Sherman

    2002-01-01

    Health educators play a key role in assisting the nation deal with and be prepared for potential biological attacks. This article summarizes information found in the literature about likely bioterrorist threats to the U.S. population and discusses the responsibilities of health educators in regard to these threats. Among the important roles health…

  4. Incorporating threat in hotspots and coldspots of biodiversity and ecosystem services.

    PubMed

    Schröter, Matthias; Kraemer, Roland; Ceauşu, Silvia; Rusch, Graciela M

    2017-11-01

    Spatial prioritization could help target conservation actions directed to maintain both biodiversity and ecosystem services. We delineate hotspots and coldspots of two biodiversity conservation features and five regulating and cultural services by incorporating an indicator of 'threat', i.e. timber harvest profitability for forest areas in Telemark (Norway). We found hotspots, where high values of biodiversity, ecosystem services and threat coincide, ranging from 0.1 to 7.1% of the area, depending on varying threshold levels. Targeting of these areas for conservation follows reactive conservation approaches. In coldspots, high biodiversity and ecosystem service values coincide with low levels of threat, and cover 0.1-3.4% of the forest area. These areas might serve proactive conservation approaches at lower opportunity cost (foregone timber harvest profits). We conclude that a combination of indicators of biodiversity, ecosystem services and potential threat is an appropriate approach for spatial prioritization of proactive and reactive conservation strategies.

  5. Predictive Validity of Explicit and Implicit Threat Overestimation in Contamination Fear

    PubMed Central

    Green, Jennifer S.; Teachman, Bethany A.

    2012-01-01

    We examined the predictive validity of explicit and implicit measures of threat overestimation in relation to contamination-fear outcomes using structural equation modeling. Undergraduate students high in contamination fear (N = 56) completed explicit measures of contamination threat likelihood and severity, as well as looming vulnerability cognitions, in addition to an implicit measure of danger associations with potential contaminants. Participants also completed measures of contamination-fear symptoms, as well as subjective distress and avoidance during a behavioral avoidance task, and state looming vulnerability cognitions during an exposure task. The latent explicit (but not implicit) threat overestimation variable was a significant and unique predictor of contamination fear symptoms and self-reported affective and cognitive facets of contamination fear. On the contrary, the implicit (but not explicit) latent measure predicted behavioral avoidance (at the level of a trend). Results are discussed in terms of differential predictive validity of implicit versus explicit markers of threat processing and multiple fear response systems. PMID:24073390

  6. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  7. Using in situ simulation to identify and resolve latent environmental threats to patient safety: case study involving operational changes in a labor and delivery ward.

    PubMed

    Hamman, William R; Beaudin-Seiler, Beth M; Beaubien, Jeffrey M; Gullickson, Amy M; Orizondo-Korotko, Krystyna; Gross, Amy C; Fuqua, Wayne; Lammers, Richard

    2010-01-01

    Since the publication of "To Err Is Human" in 1999, health care professionals have looked to high-reliability industries such as aviation for guidance on improving system safety. One of the most widely adopted aviation-derived approaches is simulation-based team training, also known as crew resource management training. In the health care domain, crew resource management training often takes place in custom-built simulation laboratories that are designed to replicate operating rooms or labor and delivery rooms. Unlike these traditional crew resource management training programs, "in situ simulation" occurs on actual patient care units, involves actual health care team members, and uses actual organization processes to train and assess team performance. During the past 24 months, our research team has conducted nearly 40 in situ simulations. In this article, we present the results from 1 such simulation: a patient who experienced a difficult labor that resulted in an emergency caesarian section and hysterectomy. During the simulation, a number of latent environmental threats to safety were identified. This article presents the latent threats and the steps that the hospital has taken to remedy them.

  8. Measuring Transnational Organized Crime Threats to US National Security

    DTIC Science & Technology

    2016-05-26

    typology is not designed to score TOC networks, so it is not an obvious choice, but it could be easily modified by the TMWG to rank-order TOC networks...States Strategy to Combat Transnational Organized Crime (SCTOC). The strategy identified Transnational Organized Crime ( TOC ) as a national security...identify the TOC groups that present the national security threat defined in the SCTOC? A literature review of existing organized crime assessments

  9. Sigma-1 receptor ligands control a switch between passive and active threat responses

    PubMed Central

    Rennekamp, Andrew J.; Huang, Xi-Ping; Wang, You; Patel, Samir; Lorello, Paul J.; Cade, Lindsay; Gonzales, Andrew P. W.; Yeh, Jing-Ruey Joanna; Caldarone, Barbara J.; Roth, Bryan L.; Kokel, David; Peterson, Randall T.

    2016-01-01

    Humans and many animals exhibit freezing behavior in response to threatening stimuli. In humans, inappropriate threat responses are fundamental characteristics of several mental illnesses. To identify small molecules that modulate threat responses, we developed a high-throughput behavioral assay in zebrafish (Danio rerio) and characterized the effects of 10,000 compounds on freezing behavior. We found three classes of compounds that switch the threat response from freezing to escape-like behavior. We then screened these for binding activity across 45 candidate targets. Using target profile clustering we implicated the sigma-1 receptor in the mechanism of behavioral switching and confirmed that known sigma-1 ligands also disrupt freezing behavior. Furthermore, mutation of the sigma-1 gene prevented the behavioral effect of escape-inducing compounds. The compound ‘finazine’ potently bound mammalian sigma-1 and altered rodent threat response behavior. Thus, pharmacological and genetic interrogation of the freezing response revealed sigma-1 as a mediator of vertebrate threat responses. PMID:27239788

  10. The measurement of threat orientations.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Bovin, Michelle J

    2006-01-01

    To develop measures of 3 threat orientations that affect responses to health behavior messages. In Study 1, college students (N = 47) completed items assessing threat orientations and health behaviors. In Study 2, college students and community adults (N = 110) completed the threat orientation items and measures of convergent and discriminant validity. In Study 1, the control-based, denial-based, and heightened-sensitivity-based threat orientation scales demonstrated good internal consistency and correlated with engagement in health behaviors. In Study 2, the convergent and discriminant validity of the 3 measures was established. The 3 scales have good internal reliability and construct validity.

  11. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  12. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  13. Use of Event-Related Potentials to Identify Language and Reading Skills

    ERIC Educational Resources Information Center

    Molfese, Victoria J.; Molfese, Dennis L.; Beswick, Jennifer L.; Jacobi-Vessels, Jill; Molfese, Peter J.; Molnar, Andrew E.; Wagner, Mary C.; Haines, Brittany L.

    2008-01-01

    The extent to which oral language and emergent literacy skills are influenced by event-related potential measures of phonological processing was examined. Results revealed that event-related potential responses identify differences in letter naming but not receptive language skills.

  14. Additive Effects of Threat-of-Shock and Picture Valence on Startle Reflex Modulation

    PubMed Central

    Bublatzky, Florian; Guerra, Pedro M.; Pastor, M. Carmen; Schupp, Harald T.; Vila, Jaime

    2013-01-01

    The present study examined the effects of sustained anticipatory anxiety on the affective modulation of the eyeblink startle reflex. Towards this end, pleasant, neutral and unpleasant pictures were presented as a continuous stream during alternating threat-of-shock and safety periods, which were cued by colored picture frames. Orbicularis-EMG to auditory startle probes and electrodermal activity were recorded. Previous findings regarding affective picture valence and threat-of-shock modulation were replicated. Of main interest, anticipating aversive events and viewing affective pictures additively modulated defensive activation. Specifically, despite overall potentiated startle blink magnitude in threat-of-shock conditions, the startle reflex remained sensitive to hedonic picture valence. Finally, skin conductance level revealed sustained sympathetic activation throughout the entire experiment during threat- compared to safety-periods. Overall, defensive activation by physical threat appears to operate independently from reflex modulation by picture media. The present data confirms the importance of simultaneously manipulating phasic-fear and sustained-anxiety in studying both normal and abnormal anxiety. PMID:23342060

  15. Disconfirming contamination-related threat beliefs by exposure plus safety behavior.

    PubMed

    van Uijen, Sophie L; van den Hout, Marcel A; Klein Schiphorst, Anne T; Knol, Emma S; Engelhard, Iris M

    2017-06-01

    Safety behavior (SB) is detrimental to the beneficial effects of exposure, because it prevents patients from obtaining evidence that disconfirms their excessive threat beliefs. However, previous studies showed that cleaning SB during exposure to a contaminant does not prevent a reduction in feelings of contamination, fear of contamination, danger, and disgust (CFDD). We aimed to directly examine the effect of SB during exposure to a contaminant on threat beliefs associated with CFDD. Healthy participants were randomly assigned to one of three groups: repeated exposure to a contaminant whilst abstaining from SB (exposure plus response prevention; E + RP); with the use of disinfectant wipes after each instance of exposure (exposure plus SB; E + SB); or no exposure or safety behavior (control condition). Participants identified their threat belief associated with the contaminant and rated CFDD and the degree to which they believed their threat belief at the pre- and post-test. The E + RP and E + SB condition resulted in a larger decrease of CFDD and threat belief ratings than the control condition, whereas these reductions did not differ between the E + RP and E + SB condition. Results were obtained from a nonclinical sample, and with a single session of exposure. Cleaning SB did not impede the beneficial effects of exposure. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Traits, States, and Attentional Gates: Temperament and Threat Relevance as Predictors of Attentional Bias to Social Threat

    PubMed Central

    Helzer, Erik G.; Connor-Smith, Jennifer K.; Reed, Marjorie A.

    2009-01-01

    This study investigated the influence of situational and dispositional factors on attentional biases toward social threat, and the impact of these attentional biases on distress in a sample of adolescents. Results suggest greater biases for personally-relevant threat cues, as individuals reporting high social stress were vigilant to subliminal social threat cues, but not physical threat cues, and those reporting low social stress showed no attentional biases. Individual differences in fearful temperament and attentional control interacted to influence attentional biases, with fearful temperament predicting biases to supraliminal social threat only for individuals with poor attentional control. Multivariate analyses exploring relations between attentional biases for social threat and symptoms of anxiety and depression revealed that attentional biases alone were rarely related to symptoms. However, biases did interact with social stress, fearful temperament, and attentional control to predict distress. Results are discussed in terms of automatic and effortful cognitive mechanisms underlying threat cue processing. PMID:18791905

  17. Potential of VIIRS Data for Regional Monitoring of Gypsy Moth Defoliation: Implications for Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.; Ryan, Robert E.; Smoot, James C.; Prados, Donald; McKellip, Rodney; Sader. Steven A.; Gasser, Jerry; May, George; Hargrove, William

    2007-01-01

    A NASA RPC (Rapid Prototyping Capability) experiment was conducted to assess the potential of VIIRS (Visible/Infrared Imager/Radiometer Suite) data for monitoring non-native gypsy moth (Lymantria dispar) defoliation of forests. This experiment compares defoliation detection products computed from simulated VIIRS and from MODIS (Moderate Resolution Imaging Spectroradiometer) time series products as potential inputs to a forest threat EWS (Early Warning System) being developed for the USFS (USDA Forest Service). Gypsy moth causes extensive defoliation of broadleaved forests in the United States and is specifically identified in the Healthy Forest Restoration Act (HFRA) of 2003. The HFRA mandates development of a national forest threat EWS. This system is being built by the USFS and NASA is aiding integration of needed satellite data products into this system, including MODIS products. This RPC experiment enabled the MODIS follow-on, VIIRS, to be evaluated as a data source for EWS forest monitoring products. The experiment included 1) assessment of MODIS-simulated VIIRS NDVI products, and 2) evaluation of gypsy moth defoliation mapping products from MODIS-simulated VIIRS and from MODIS NDVI time series data. This experiment employed MODIS data collected over the approximately 15 million acre mid-Appalachian Highlands during the annual peak defoliation time frame (approximately June 10 through July 27) during 2000-2006. NASA Stennis Application Research Toolbox software was used to produce MODIS-simulated VIIRS data and NASA Stennis Time Series Product Tool software was employed to process MODIS and MODIS-simulated VIIRS time series data scaled to planetary reflectance. MODIS-simulated VIIRS data was assessed through comparison to Hyperion-simulated VIIRS data using data collected during gypsy moth defoliation. Hyperion-simulated MODIS data showed a high correlation with actual MODIS data (NDVI R2 of 0.877 and RMSE of 0.023). MODIS-simulated VIIRS data for the same

  18. Ionospheric threats to the integrity of airborne GPS users

    NASA Astrophysics Data System (ADS)

    Datta-Barua, Seebany

    The Global Positioning System (GPS) has both revolutionized and entwined the worlds of aviation and atmospheric science. As the largest and most unpredictable source of GPS positioning error, the ionospheric layer of the atmosphere, if left unchecked, can endanger the safety, or "integrity," of the single frequency airborne user. An augmentation system is a differential-GPS-based navigation system that provides integrity through independent ionospheric monitoring by reference stations. However, the monitor stations are not in general colocated with the user's GPS receiver. The augmentation system must protect users from possible ionosphere density variations occurring between its measurements and the user's. This study analyzes observations from ionospherically active periods to identify what types of ionospheric disturbances may cause threats to user safety if left unmitigated. This work identifies when such disturbances may occur using a geomagnetic measure of activity and then considers two disturbances as case studies. The first case study indicates the need for a non-trivial threat model for the Federal Aviation Administration's Local Area Augmentation System (LAAS) that was not known prior to the work. The second case study uses ground- and space-based data to model an ionospheric disturbance of interest to the Federal Aviation Administration's Wide Area Augmentation System (WAAS). This work is a step in the justification for, and possible future refinement of, one of the WAAS integrity algorithms. For both WAAS and LAAS, integrity threats are basically caused by events that may be occurring but are unobservable. Prior to the data available in this solar cycle, events of such magnitude were not known to be possible. This work serves as evidence that the ionospheric threat models developed for WARS and LAAS are warranted and that they are sufficiently conservative to maintain user integrity even under extreme ionospheric behavior.

  19. Classifying threats with a 14-MeV neutron interrogation system.

    PubMed

    Strellis, Dan; Gozani, Tsahi

    2005-01-01

    SeaPODDS (Sea Portable Drug Detection System) is a non-intrusive tool for detecting concealed threats in hidden compartments of maritime vessels. This system consists of an electronic neutron generator, a gamma-ray detector, a data acquisition computer, and a laptop computer user-interface. Although initially developed to detect narcotics, recent algorithm developments have shown that the system is capable of correctly classifying a threat into one of four distinct categories: narcotic, explosive, chemical weapon, or radiological dispersion device (RDD). Detection of narcotics, explosives, and chemical weapons is based on gamma-ray signatures unique to the chemical elements. Elements are identified by their characteristic prompt gamma-rays induced by fast and thermal neutrons. Detection of RDD is accomplished by detecting gamma-rays emitted by common radioisotopes and nuclear reactor fission products. The algorithm phenomenology for classifying threats into the proper categories is presented here.

  20. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glenn, Colleen; Sterbentz, Dane; Wright, Aaron

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best

  1. A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olama, Mohammed M; Allgood, Glenn O; Davenport, Kristen M

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) asmore » well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.« less

  2. Neutron Interrogation System For Underwater Threat Detection And Identification

    NASA Astrophysics Data System (ADS)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C.

    2009-03-01

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  3. Toward a Visualization-Supported Workflow for Cyber Alert Management using Threat Models and Human-Centered Design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Franklin, Lyndsey; Pirrung, Megan A.; Blaha, Leslie M.

    Cyber network analysts follow complex processes in their investigations of potential threats to their network. Much research is dedicated to providing automated tool support in the effort to make their tasks more efficient, accurate, and timely. This tool support comes in a variety of implementations from machine learning algorithms that monitor streams of data to visual analytic environments for exploring rich and noisy data sets. Cyber analysts, however, often speak of a need for tools which help them merge the data they already have and help them establish appropriate baselines against which to compare potential anomalies. Furthermore, existing threat modelsmore » that cyber analysts regularly use to structure their investigation are not often leveraged in support tools. We report on our work with cyber analysts to understand they analytic process and how one such model, the MITRE ATT&CK Matrix [32], is used to structure their analytic thinking. We present our efforts to map specific data needed by analysts into the threat model to inform our eventual visualization designs. We examine data mapping for gaps where the threat model is under-supported by either data or tools. We discuss these gaps as potential design spaces for future research efforts. We also discuss the design of a prototype tool that combines machine-learning and visualization components to support cyber analysts working with this threat model.« less

  4. Threat-Related Information Suggests Competence: A Possible Factor in the Spread of Rumors

    PubMed Central

    Boyer, Pascal; Parren, Nora

    2015-01-01

    Information about potential danger is a central component of many rumors, urban legends, ritual prescriptions, religious prohibitions and witchcraft crazes. We investigate a potential factor in the cultural success of such material, namely that a source of threat-related information may be intuitively judged as more competent than a source that does not convey such information. In five studies, we asked participants to judge which of two sources of information, only one of which conveyed threat-related information, was more knowledgeable. Results suggest that mention of potential danger makes a source appear more competent than others, that the effect is not due to a general negativity bias, and that it concerns competence rather than a more generally positive evaluation of the source. PMID:26061409

  5. Threat Perception and Attitudes of Adolescents Towards Re-Introduced Wild Animals: A qualitative study of young learners from affected regions in Germany

    NASA Astrophysics Data System (ADS)

    Hermann, Nadin; Menzel, Susanne

    2013-12-01

    Conservation efforts such as the restoration of European bison or the support of wolf immigration into Germany are often socio-scientifically controversial. In many cases, disputes are based on individuals' threat perception and attitudes towards the animal involved. The herewith reported study provides qualitative insights into German adolescents' (n = 31, Mage = 16.6 years) attitudes towards animal reintroduction, their threat and coping appraisal about wildlife and their knowledge of local endangered species. We found that students had rather limited knowledge of local endangered species. After Kellert's categories of animal attitudes, the adolescents showed a strong moralistic view on wildlife return. Naturalistic, ecologistic and utilitarian views were also strongly apparent. According to the Protection Motivation Theory, perceived threats could be identified as threats to animals on the one hand and threats to human interests on the other. Such threat perceptions often lead to a dilemma, which made it difficult to decide upon the priorities of wildlife protection versus protection of human interests. Coping mechanism to reduce threats to human interests as mentioned by the participants included restrictions of the animal as well as strategies that focused on responsibility by humans. Regarding coping mechanism to prevent the species' extinction, participants showed a relatively superficial understanding. Furthermore, we found that participants from regions where wolves are currently immigrating or European bison are being reintroduced showed a more positive understanding of the respective animal. Our findings are discussed in the light of this topic's potential as an example of a real-life socio-scientific issue in classroom discussions.

  6. The influence of clarification and threats on life situation: patients’ experiences 1 year after TSCI

    PubMed Central

    Bjørnshave Noe, Bodil; Bjerrum, Merete; Angel, Sanne

    2017-01-01

    Introduction: The study was conducted at the Spinal Cord Injury Centre of Western Denmark (VCR). The aim of the study was to explore patients’ experiences following traumatic spinal cord injury and to identify characteristics of positive versus negative life situation 1 year post discharge from hospital rehabilitation. This was a qualitative study conducted using inductive content analysis. Case Presentation: In this qualitative study seven patients were interviewed one year after discharge from initial rehabilitation at the VCR. The interviews were analysed using inductive content analysis. Discussion: We found that two categories condensed the patients’ experiences of their life situation 1 year post discharge: ‘clarification in relation to overall life situation’ and ‘threat to core competences’. The transversal analysis across the derived categories identified different combinations of clarification and threats to core competences explaining the patients’ experiences: high degree of clarification combined with low degree of threat to core competences was indicative of positive life situation. Also, positive life situation was seen when a high degree of clarification compensated for high degree of threats on core competencies. In contrast, an overall stressful and negative life situation was influenced by poor clarification combined with a high degree of threat to core competences. However, when core competences can be transformed into new skills, threats were manageable. This study revealed that clarification related to overall life situation in combination with threat to core competences may explain traumatic spinal cord injury patients’ overall life situation 1 year post discharge. An appropriate balance characterises a positive life situation. There might be a need to pay attention to patients who are challenged by low degree of clarification and high degree of threats on core competencies 1 year post discharge as this may influence the life

  7. The influence of stereotype threat on immigrants: review and meta-analysis

    PubMed Central

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256

  8. The Legal Side of Campus Threat Assessment and Management: What Student Counselors Need to Know

    ERIC Educational Resources Information Center

    Nolan, Jeffrey J.; Moncure, Thomas M., Jr.

    2012-01-01

    This article identifies what student mental health professionals need to know about legal issues of relevance to threat assessment and management. The article summarizes the common law duties and the common law and statutory standards of care that are likely to apply to the work of college and university threat assessment and management teams. The…

  9. SARS: An Emerging Global Microbial Threat.

    PubMed Central

    Hughes, James M.

    2004-01-01

    In March 2003, the Institute of Medicine published an update to its 1992 landmark report on emerging infections. The new report, Microbial Threats to Health: Emergence, Detection, and Response, describes the current spectrum of global microbial threats, factors affecting their emergence or resurgence, and measures that should be undertaken to effectively address them. Coincident with this publication came increasing reports of severe atypical pneumonia of unknown etiology among persons in southeast Asia. This new disease, designated severe acute respiratory syndrome (SARS), spread globally in a matter of weeks, infecting primarily close contacts of index patients (e.g., household members and healthcare workers caring for index patients) but also resulting in community transmission in some areas. An unprecedented worldwide collaborative effort was undertaken to determine the cause of the illness and implement prevention measures. A previously unrecognized coronavirus was identified as the causative agent, and health officials throughout the world struggled to implement measures to contain its spread, including isolation of suspect SARS cases and quarantine of exposed persons. The emergence of SARS is a timely reminder of the need to expect the unexpected and to ensure strong national and global public health partnerships when preparing for and responding to infectious diseases. Effectively addressing the threat of SARS will require enhanced global infectious disease surveillance, the development of rapid diagnostics, new therapies, and vaccines, implementation of aggressive evidence-based infection control strategies, and effective communication. Images Fig. 2 Fig. 3 PMID:17060979

  10. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  11. Child Maltreatment and Autonomic Nervous System Reactivity: Identifying Dysregulated Stress Reactivity Patterns using the Biopsychosocial Model of Challenge and Threat

    PubMed Central

    McLaughlin, Katie A.; Sheridan, Margaret A.; Alves, Sonia; Mendes, Wendy Berry

    2014-01-01

    OBJECTIVE Disruptions in stress response system development have been posited as mechanisms linking child maltreatment (CM) to psychopathology. Existing theories predict elevated sympathetic nervous system (SNS) reactivity following CM, but evidence for this is inconsistent. We present a novel framework for conceptualizing stress reactivity following CM using the biopsychosocial model of challenge and threat. We predicted that in the context of a social-evaluative stressor, maltreated adolescents would exhibit a threat pattern of reactivity, involving SNS activation paired with elevated vascular resistance and blunted cardiac output (CO) reactivity. METHODS A sample of 168 adolescents (mean age=14.9 years) participated. Recruitment targeted maltreated adolescents; 38.2% qualified as maltreated. Electrocardiogram, impedance cardiography, and blood pressure were acquired at rest and during an evaluated social stressor (Trier Social Stress Test). Pre-ejection period (PEP), CO, and total peripheral resistance (TPR) reactivity were computed during task preparation, speech-delivery, and verbal mental-arithmetic. Internalizing and externalizing symptoms were assessed. RESULTS Maltreatment was unrelated to PEP reactivity during preparation or speech, but maltreated adolescents had reduced PEP reactivity during math. Maltreatment exposure (F(1,145)=3.8-9.4, p=.053-<.001) and severity (β=−.10-.12, p=.030-.007) were associated with significantly reduced CO reactivity during all components of the stress-task and marginally associated with elevated TPR reactivity (F(1,145)=3.8-9.4, p=.053-<.001; β=.07-.11, p=.11-.009, respectively). Threat reactivity was negatively associated with externalizing symptoms. CONCLUSIONS Child maltreatment is associated with a dysregulated pattern of physiological reactivity consistent with theoretical conceptualizations of threat but not previously examined in relation to maltreatment, suggesting a more nuanced pattern of stress reactivity than

  12. The effects of disturbance threat on leaf-cutting ant colonies: a laboratory study.

    PubMed

    Norman, V C; Pamminger, T; Hughes, W O H

    2017-01-01

    The flexibility of organisms to respond plastically to their environment is fundamental to their fitness and evolutionary success. Social insects provide some of the most impressive examples of plasticity, with individuals exhibiting behavioral and sometimes morphological adaptations for their specific roles in the colony, such as large soldiers for nest defense. However, with the exception of the honey bee model organism, there has been little investigation of the nature and effects of environmental stimuli thought to instigate alternative phenotypes in social insects. Here, we investigate the effect of repeated threat disturbance over a prolonged (17 month) period on both behavioral and morphological phenotypes, using phenotypically plastic leaf-cutting ants ( Atta colombica ) as a model system. We found a rapid impact of threat disturbance on the behavioral phenotype of individuals within threat-disturbed colonies becoming more aggressive, threat responsive, and phototactic within as little as 2 weeks. We found no effect of threat disturbance on morphological phenotypes, potentially, because constraints such as resource limitation outweighed the benefit for colonies of producing larger individuals. The results suggest that plasticity in behavioral phenotypes can enable insect societies to respond to threats even when constraints prevent alteration of morphological phenotypes.

  13. Identifying potential kidney donors using social networking web sites.

    PubMed

    Chang, Alexander; Anderson, Emily E; Turner, Hang T; Shoham, David; Hou, Susan H; Grams, Morgan

    2013-01-01

    Social networking sites like Facebook may be a powerful tool for increasing rates of live kidney donation. They allow for wide dissemination of information and discussion and could lessen anxiety associated with a face-to-face request for donation. However, sparse data exist on the use of social media for this purpose. We searched Facebook, the most popular social networking site, for publicly available English-language pages seeking kidney donors for a specific individual, abstracting information on the potential recipient, characteristics of the page itself, and whether potential donors were tested. In the 91 pages meeting inclusion criteria, the mean age of potential recipients was 37 (range: 2-69); 88% were US residents. Other posted information included the individual's photograph (76%), blood type (64%), cause of kidney disease (43%), and location (71%). Thirty-two percent of pages reported having potential donors tested, and 10% reported receiving a live-donor kidney transplant. Those reporting donor testing shared more potential recipient characteristics, provided more information about transplantation, and had higher page traffic. Facebook is already being used to identify potential kidney donors. Future studies should focus on how to safely, ethically, and effectively use social networking sites to inform potential donors and potentially expand live kidney donation. © 2013 John Wiley & Sons A/S.

  14. From avoidance to approach: The influence of threat-of-shock on reward-based decision making.

    PubMed

    Bublatzky, Florian; Alpers, Georg W; Pittig, Andre

    2017-09-01

    Potential threat can prime defensive responding and avoidance behavior, which may result in the loss of rewards. When aversive consequences do not occur, avoidance should, thus, be quickly overcome in healthy individuals. This study examined the impact of threat anticipation on reward-based decisions. Sixty-five participants completed a decision-making task in which they had to choose between high- and low-reward options. To model an approach-avoidance conflict, the high-reward option was contingent with a threat-of-shock cue; the low-reward option was contingent with a safety cue. In control trials, decisions were made without threat/safety instructions. Overall, behavioral data documented a typical preference for the profitable option. Importantly, under threat-of-shock, participants initially avoided the profitable option (i.e., safe, but less profitable choices). However, when they experienced that shocks did actually not occur, participants overcame initial avoidance in favor of larger gains. Furthermore, autonomic arousal (skin conductance and heart rate responses) was elevated during threat cues compared to safety and non-threatening control cues. Taken together, threat-of-shock was associated with behavioral consequences: initially, participants avoided threat-related options but made more profitable decisions as they experienced no aversive consequences. Although socially acquired threat contingencies are typically stable, incentives for approach can help to overcome threat-related avoidance. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. More on Inoculating Against Reactance to Persuasive Health Messages: The Paradox of Threat.

    PubMed

    Richards, Adam S; Banas, John A; Magid, Yoav

    2017-07-01

    This research examined the efficacy of inoculation as a strategy to mitigate psychological reactance based on the level of threat communicated in the forewarning and subsequent persuasive health appeal. Two 2 (inoculation) × 2 (freedom-threatening language) experiments were conducted. The first (N = 181) used elaborated inoculation designed to enhance the threat of impending reactance to a message advocating for responsible alcohol consumption. The second (N = 159) used limited inoculation designed to minimize the threat of impending reactance to a message advocating for responsible soft drink consumption. Results showed that elaborated inoculation increased reactance, whereas limited inoculation decreased reactance but only when the subsequent appeal used less freedom-threatening language. These findings suggest that inoculation has the potential to facilitate or buffer reactance depending on the level of threat communicated in inoculation forewarnings and in subsequent persuasive health appeals.

  16. Child Soldiers: Are U.S. Military Members Prepared to Deal with the Threat?

    DTIC Science & Technology

    2006-02-15

    killing child soldiers. Additional attention should also be invested into identifying interventions that would decrease the negative stigma of mental...AIR WAR COLLEGE AIR UNIVERSITY CHILD SOLDIERS: ARE U.S. MILITARY MEMBERS PREPARED TO DEAL WITH THE THREAT? by Judith Hughes, LtCol, USAF A...COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Child Soldiers: Are U.S. Military Members Prepared to Deal with the Threat? 5a. CONTRACT

  17. Exogenous testosterone affects early threat processing in socially anxious and healthy women.

    PubMed

    van Peer, Jacobien M; Enter, Dorien; van Steenbergen, Henk; Spinhoven, Philip; Roelofs, Karin

    2017-10-01

    Testosterone plays an important role in social threat processing. Recent evidence suggests that testosterone administration has socially anxiolytic effects, but it remains unknown whether this involves early vigilance or later, more sustained, processing-stages. We investigated the acute effects of testosterone administration on social threat processing in 19 female patients with Social Anxiety Disorder (SAD) and 19 healthy controls. Event-related potentials (ERPs) were recorded during an emotional Stroop task with subliminally presented faces. Testosterone induced qualitative changes in early ERPs (<200ms after stimulus onset) in both groups. An initial testosterone-induced spatial shift reflected a change in the basic processing (N170/VPP) of neutral faces, which was followed by a shift for angry faces suggesting a decrease in early threat bias. These findings suggest that testosterone specifically affects early automatic social information processing. The decreased attentional bias for angry faces explains how testosterone can decrease threat avoidance, which is particularly relevant for SAD. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Autobiographical memory sources of threats in dreams.

    PubMed

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Towards a Threat Assessment Framework for Ecosystem Services.

    PubMed

    Maron, Martine; Mitchell, Matthew G E; Runting, Rebecca K; Rhodes, Jonathan R; Mace, Georgina M; Keith, David A; Watson, James E M

    2017-04-01

    How can we tell if the ecosystem services upon which we rely are at risk of being lost, potentially permanently? Ecosystem services underpin human well-being, but we lack a consistent approach for categorizing the extent to which they are threatened. We present an assessment framework for assessing the degree to which the adequate and sustainable provision of a given ecosystem service is threatened. Our framework combines information on the states and trends of both ecosystem service supply and demand, with reference to two critical thresholds: demand exceeding supply and ecosystem service 'extinction'. This framework can provide a basis for global, national, and regional assessments of threat to ecosystem services, and accompany existing assessments of threat to species and ecosystems. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to this subpart must ensure that each of the following undergoes a security threat assessment or a comparable...

  1. A global response roadmap to the asteroid impact threat: The NEOShield perspective

    NASA Astrophysics Data System (ADS)

    Perna, D.; Barucci, M. A.; Drube, L.; Falke, A.; Fulchignoni, M.; Harris, A. W.; Harris, A. W.; Kanuchova, Z.

    2015-12-01

    Besides being of great scientific interest, near-Earth objects represent a well-founded threat to life on our planet. Nonetheless, up to now there has been no concerted international plan on how to deal with the impact threat, and how to prepare and implement mitigation measures. The NEOShield project is funded by the European Commission to address such issues, to investigate the feasibility of techniques to prevent a potentially catastrophic impact on Earth by an asteroid or a comet, and to develop detailed designs of appropriate space missions to test deflection techniques. In this work we present and discuss the scientific and strategic aspects of the asteroid impact threat, highlighting the necessary steps so as to be ready to react to future hazardous objects.

  2. Exome Sequencing Identifies Potentially Druggable Mutations in Nasopharyngeal Carcinoma.

    PubMed

    Chow, Yock Ping; Tan, Lu Ping; Chai, San Jiun; Abdul Aziz, Norazlin; Choo, Siew Woh; Lim, Paul Vey Hong; Pathmanathan, Rajadurai; Mohd Kornain, Noor Kaslina; Lum, Chee Lun; Pua, Kin Choo; Yap, Yoke Yeow; Tan, Tee Yong; Teo, Soo Hwang; Khoo, Alan Soo-Beng; Patel, Vyomesh

    2017-03-03

    In this study, we first performed whole exome sequencing of DNA from 10 untreated and clinically annotated fresh frozen nasopharyngeal carcinoma (NPC) biopsies and matched bloods to identify somatically mutated genes that may be amenable to targeted therapeutic strategies. We identified a total of 323 mutations which were either non-synonymous (n = 238) or synonymous (n = 85). Furthermore, our analysis revealed genes in key cancer pathways (DNA repair, cell cycle regulation, apoptosis, immune response, lipid signaling) were mutated, of which those in the lipid-signaling pathway were the most enriched. We next extended our analysis on a prioritized sub-set of 37 mutated genes plus top 5 mutated cancer genes listed in COSMIC using a custom designed HaloPlex target enrichment panel with an additional 88 NPC samples. Our analysis identified 160 additional non-synonymous mutations in 37/42 genes in 66/88 samples. Of these, 99/160 mutations within potentially druggable pathways were further selected for validation. Sanger sequencing revealed that 77/99 variants were true positives, giving an accuracy of 78%. Taken together, our study indicated that ~72% (n = 71/98) of NPC samples harbored mutations in one of the four cancer pathways (EGFR-PI3K-Akt-mTOR, NOTCH, NF-κB, DNA repair) which may be potentially useful as predictive biomarkers of response to matched targeted therapies.

  3. Exome Sequencing Identifies Potentially Druggable Mutations in Nasopharyngeal Carcinoma

    PubMed Central

    Chow, Yock Ping; Tan, Lu Ping; Chai, San Jiun; Abdul Aziz, Norazlin; Choo, Siew Woh; Lim, Paul Vey Hong; Pathmanathan, Rajadurai; Mohd Kornain, Noor Kaslina; Lum, Chee Lun; Pua, Kin Choo; Yap, Yoke Yeow; Tan, Tee Yong; Teo, Soo Hwang; Khoo, Alan Soo-Beng; Patel, Vyomesh

    2017-01-01

    In this study, we first performed whole exome sequencing of DNA from 10 untreated and clinically annotated fresh frozen nasopharyngeal carcinoma (NPC) biopsies and matched bloods to identify somatically mutated genes that may be amenable to targeted therapeutic strategies. We identified a total of 323 mutations which were either non-synonymous (n = 238) or synonymous (n = 85). Furthermore, our analysis revealed genes in key cancer pathways (DNA repair, cell cycle regulation, apoptosis, immune response, lipid signaling) were mutated, of which those in the lipid-signaling pathway were the most enriched. We next extended our analysis on a prioritized sub-set of 37 mutated genes plus top 5 mutated cancer genes listed in COSMIC using a custom designed HaloPlex target enrichment panel with an additional 88 NPC samples. Our analysis identified 160 additional non-synonymous mutations in 37/42 genes in 66/88 samples. Of these, 99/160 mutations within potentially druggable pathways were further selected for validation. Sanger sequencing revealed that 77/99 variants were true positives, giving an accuracy of 78%. Taken together, our study indicated that ~72% (n = 71/98) of NPC samples harbored mutations in one of the four cancer pathways (EGFR-PI3K-Akt-mTOR, NOTCH, NF-κB, DNA repair) which may be potentially useful as predictive biomarkers of response to matched targeted therapies. PMID:28256603

  4. Law Enforcement Use of Threat Assessments to Predict Violence

    ERIC Educational Resources Information Center

    Wood, Tracey Michelle

    2016-01-01

    The purpose of this qualitative, descriptive multiple case study was to explore what process, policies and procedures, or set of empirically supported norms governed law enforcement officers in a selected county in the southwest region of the United States when threat assessments were conducted on potentially violent subjects threatening mass…

  5. The past, present and future supernova threat to Earth's biosphere

    NASA Astrophysics Data System (ADS)

    Beech, Martin

    2011-12-01

    A brief review of the threat posed to Earth's biosphere via near-by supernova detonations is presented. The expected radiation dosage, cosmic ray flux and expanding blast wave collision effects are considered, and it is argued that a typical supernova must be closer than ˜10-pc before any appreciable and potentially harmful atmosphere/biosphere effects are likely to occur. In contrast, the critical distance for Gamma-ray bursts is of order 1-kpc. In spite of the high energy effects potentially involved, the geological record provides no clear-cut evidence for any historic supernova induced mass extinctions and/or strong climate change episodes. This, however, is mostly a reflection of their being numerous possible (terrestrial and astronomical) forcing mechanisms acting upon the biosphere and the difficulty of distinguishing between competing scenarios. Key to resolving this situation, it is suggested, is the development of supernova specific extinction and climate change linked ecological models. Moving to the future, we estimate that over the remaining lifetime of the biosphere (˜2 Gyr) the Earth might experience 1 GRB and 20 supernova detonations within their respective harmful threat ranges. There are currently at least 12 potential pre-supernova systems within 1-kpc of the Sun. Of these systems IK Pegasi is the closest Type Ia pre-supernova candidate and Betelgeuse is the closest potential Type II supernova candidate. We review in some detail the past, present and future behavior of these two systems. Developing a detailed evolutionary model we find that IK Pegasi will likely not detonate until some 1.9 billion years hence, and that it affords absolutely no threat to Earth's biosphere. Betelgeuse is the closest, reasonably well understood, pre-supernova candidate to the Sun at the present epoch, and may undergo detonation any time within the next several million years. The stand-off distance of Betelgeuse at the time of its detonation is estimated to fall

  6. Evaluation and Verification of the Global Rapid Identification of Threats System for Infectious Diseases in Textual Data Sources.

    PubMed

    Huff, Andrew G; Breit, Nathan; Allen, Toph; Whiting, Karissa; Kiley, Christopher

    2016-01-01

    The Global Rapid Identification of Threats System (GRITS) is a biosurveillance application that enables infectious disease analysts to monitor nontraditional information sources (e.g., social media, online news outlets, ProMED-mail reports, and blogs) for infectious disease threats. GRITS analyzes these textual data sources by identifying, extracting, and succinctly visualizing epidemiologic information and suggests potentially associated infectious diseases. This manuscript evaluates and verifies the diagnoses that GRITS performs and discusses novel aspects of the software package. Via GRITS' web interface, infectious disease analysts can examine dynamic visualizations of GRITS' analyses and explore historical infectious disease emergence events. The GRITS API can be used to continuously analyze information feeds, and the API enables GRITS technology to be easily incorporated into other biosurveillance systems. GRITS is a flexible tool that can be modified to conduct sophisticated medical report triaging, expanded to include customized alert systems, and tailored to address other biosurveillance needs.

  7. 'More than skin-deep': biological essentialism in response to a distinctiveness threat in a stigmatized fan community.

    PubMed

    Plante, Courtney N; Roberts, Sharon E; Snider, Jamie S; Schroy, Catherine; Reysen, Stephen; Gerbasi, Kathleen

    2015-06-01

    We investigated how group distinctiveness threats affect essentialist beliefs about group membership in a stigmatized fan community. An experiment conducted on 817 members of the fan community revealed that highly identified fans who perceived significant stigmatization were the most likely to endorse essentialist beliefs about group membership when exposed to a distinctiveness threat via comparison to a highly similar (vs. dissimilar) outgroup. These results bridge essentialism research and research on distinctiveness threat by demonstrating the mutability of group essentialism beliefs as a defensive response to distinctiveness threats. Implications for future research are discussed. © 2014 The British Psychological Society.

  8. Conditioned social dominance threat: observation of others’ social dominance biases threat learning

    PubMed Central

    Molapour, Tanaz; Olsson, Andreas

    2016-01-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants’ eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. PMID:27217107

  9. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  10. Confucian Values as a Buffer Against Age-Based Stereotype Threat for Chinese Older Adults.

    PubMed

    Tan, Shyuan Ching; Barber, Sarah J

    2018-05-16

    Research has shown that stereotype threat can impair older adults' memory in Western cultures. We tested whether this also occurs for older adults from the East Asian Chinese culture. We also tested whether an intervention that highlighted Confucian principles would protect Chinese older adults from stereotype threat's detrimental effects. Culturally-Chinese older adults residing in the United States completed a memory test either under age-based stereotype threat about cognitive decline or not. Prior to this, some participants were also reminded of Confucian traditions of filial piety and were assured these values had been transmitted to the younger generation. Stereotype threat impaired Chinese older adults' memory performance. However, our intervention was effective in eliminating this deficit. When the Chinese participants were reminded of the Confucian principle of filial piety they did not exhibit stereotype threat effects. Confirming that younger adults have an obligation to respect their elders can eliminate the social-evaluative pressure of stereotype threat for Chinese older adults. These findings are noteworthy since population aging is happening at an unprecedented pace in East Asia. Although our results suggest that stereotype threat can adversely affect older adults' cognitive performance in these societies, we also identify a culturally-based intervention to alleviate this impairment.

  11. Sex-related differences in behavioral and amygdalar responses to compound facial threat cues.

    PubMed

    Im, Hee Yeon; Adams, Reginald B; Cushing, Cody A; Boshyan, Jasmine; Ward, Noreen; Kveraga, Kestutis

    2018-03-08

    During face perception, we integrate facial expression and eye gaze to take advantage of their shared signals. For example, fear with averted gaze provides a congruent avoidance cue, signaling both threat presence and its location, whereas fear with direct gaze sends an incongruent cue, leaving threat location ambiguous. It has been proposed that the processing of different combinations of threat cues is mediated by dual processing routes: reflexive processing via magnocellular (M) pathway and reflective processing via parvocellular (P) pathway. Because growing evidence has identified a variety of sex differences in emotional perception, here we also investigated how M and P processing of fear and eye gaze might be modulated by observer's sex, focusing on the amygdala, a structure important to threat perception and affective appraisal. We adjusted luminance and color of face stimuli to selectively engage M or P processing and asked observers to identify emotion of the face. Female observers showed more accurate behavioral responses to faces with averted gaze and greater left amygdala reactivity both to fearful and neutral faces. Conversely, males showed greater right amygdala activation only for M-biased averted-gaze fear faces. In addition to functional reactivity differences, females had proportionately greater bilateral amygdala volumes, which positively correlated with behavioral accuracy for M-biased fear. Conversely, in males only the right amygdala volume was positively correlated with accuracy for M-biased fear faces. Our findings suggest that M and P processing of facial threat cues is modulated by functional and structural differences in the amygdalae associated with observer's sex. © 2018 Wiley Periodicals, Inc.

  12. Addressing the insider threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approachmore » to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.« less

  13. Addressing the insider threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approachmore » to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.« less

  14. Stereotype Threat and College Academic Performance: A Latent Variables Approach*

    PubMed Central

    Owens, Jayanti; Massey, Douglas S.

    2013-01-01

    Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using summed indicators and predicted relationships modeled using ordinary least squares. Using the National Longitudinal Survey of Freshman, this study overcomes previous methodological shortcomings by developing a latent construct model of stereotype threat. Theoretical constructs and equations are estimated simultaneously from multiple indicators, yielding a more reliable, valid, and parsimonious test of key propositions. Findings additionally support the view that social stigma can indeed have strong negative effects on the academic performance of pejoratively stereotyped racial-minority group members, not only in laboratory settings, but also in the real world. PMID:23950616

  15. Prioritizing Threats to Patient Safety in Rural Primary Care

    ERIC Educational Resources Information Center

    Singh, Ranjit; Singh, Ashok; Servoss, Timothy J.; Singh, Gurdev

    2007-01-01

    Context: Rural primary care is a complex environment in which multiple patient safety challenges can arise. To make progress in improving safety with limited resources, each practice needs to identify those safety problems that pose the greatest threat to patients and focus efforts on these. Purpose: To describe and field-test a novel approach to…

  16. A Threat-Detection Advantage in Those with Autism Spectrum Disorders

    ERIC Educational Resources Information Center

    Krysko, Krysko M.; Rutherford, M. D.

    2009-01-01

    Identifying threatening expressions is a significant social perceptual skill. Individuals with autism spectrum disorders (ASD) are impaired in social interaction, show deficits in face and emotion processing, show amygdala abnormalities and display a disadvantage in the perception of social threat. According to the anger superiority hypothesis,…

  17. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    PubMed

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Defense policy planners and countermeasure developers are often faced with vexing problems involving the prioritization of resources and efforts. This is especially true in the area of Biodefense, where each new emerging infectious disease outbreak brings with it questions regarding the causative agent's potential for weaponization. Recent experience with West Nile Virus, Severe Acute Respiratory Syndrome, Monkeypox, and H1N1 Influenza highlights this problem. Appropriately, in each of these cases, the possibility of bioterrorism was raised, although each outbreak ultimately proved to have a natural origin. In fact, determining whether an outbreak has an unnatural origin can be quite difficult. Thus, the questions remain: could the causative agents of these and other emerging infectious disease outbreaks pose a future weaponization threat? And how great is that threat? Should precious resources be diverted from other defense efforts in order to prepare for possible hostile employment of novel diseases by belligerents? Answering such critical questions requires some form of systematic threat assessment. Through extensive collaborative work conducted within NATO's Biomedical Advisory Council, we developed a scoring matrix for evaluating the weaponization potential of the causative agents of such diseases and attempted to validate our matrix by examining the reproducibility of data using known threat agents. Our matrix included 12 attributes of a potential weapon and was provided, along with detailed scoring instructions, to 12 groups of biodefense experts in 6 NATO nations. Study participants were asked to score each of these 12 attributes on a scale of 0-3: Infectivity, Infection-to-Disease Ratio (Reliability), Predictability (& Incubation Period), Morbidity & Mortality (Virulence), Ease of Large-Scale Production & Storage, Aerosol Stability, Atmospheric Stability, Ease of Dispersal, Communicability, Prophylactic Countermeasure Availability, Therapeutic

  18. Postural threat influences vestibular-evoked muscular responses.

    PubMed

    Lim, Shannon B; Cleworth, Taylor W; Horslen, Brian C; Blouin, Jean-Sébastien; Inglis, J Timothy; Carpenter, Mark G

    2017-02-01

    Standing balance is significantly influenced by postural threat. While this effect has been well established, the underlying mechanisms of the effect are less understood. The involvement of the vestibular system is under current debate, and recent studies that investigated the effects of height-induced postural threat on vestibular-evoked responses provide conflicting results based on kinetic (Horslen BC, Dakin CJ, Inglis JT, Blouin JS, Carpenter MG. J Physiol 592: 3671-3685, 2014) and kinematic (Osler CJ, Tersteeg MC, Reynolds RF, Loram ID. Eur J Neurosci 38: 3239-3247, 2013) data. We examined the effect of threat of perturbation, a different form of postural threat, on coupling (cross-correlation, coherence, and gain) of the vestibulo-muscular relationship in 25 participants who maintained standing balance. In the "No-Threat" conditions, participants stood quietly on a stable surface. In the "Threat" condition, participants' balance was threatened with unpredictable mediolateral support surface tilts. Quiet standing immediately before the surface tilts was compared to an equivalent time from the No-Threat conditions. Surface EMG was recorded from bilateral trunk, hip, and leg muscles. Hip and leg muscles exhibited significant increases in peak cross-correlation amplitudes, coherence, and gain (1.23-2.66×) in the Threat condition compared with No-Threat conditions, and significant correlations were observed between threat-related changes in physiological arousal and medium-latency peak cross-correlation amplitude in medial gastrocnemius (r = 0.408) muscles. These findings show a clear threat effect on vestibular-evoked responses in muscles in the lower body, with less robust effects of threat on trunk muscles. Combined with previous work, the present results can provide insight into observed changes during balance control in threatening situations. This is the first study to show increases in vestibular-evoked responses of the lower body muscles under conditions

  19. H1N1 was not all that scary: uncertainty and stressor appraisals predict anxiety related to a coming viral threat.

    PubMed

    Taha, Sheena Aislinn; Matheson, Kimberly; Anisman, Hymie

    2014-04-01

    H1N1 reached pandemic proportions in 2009, yet considerable ambivalence was apparent concerning the threat presented and the inclination to be vaccinated. The present investigation assessed several factors, notably appraisals of the threat, intolerance of uncertainty, and familiarity with the virus, that might contribute to reactions to a potential future viral threat. Canadian adults (N = 316) provided with several scenarios regarding viral threats reported moderate feelings of anxiety, irrespective of whether the viral threat was one that was familiar versus one that was entirely unfamiliar to them (H1N1 recurrence, H5N1, a fictitious virus: D3N4). Participants appraised the stressfulness of the threats to be moderate and believed that they would have control in this situation. However, among individuals with high intolerance of uncertainty, the viral threat was accompanied by high levels of anxiety, which was mediated by aspects of appraisals, particularly control and stressfulness. In addition, among those individuals that generally appraised ambiguous life events as being stressful, the viral threat appraisals were accompanied by still greater anxiety. Given the limited response to potential viral threats, these results raise concerns that the public may be hesitant to heed recommendations should another pandemic occur. © 2013 John Wiley & Sons, Ltd.

  20. Using a watershed-centric approach to identify potentially impacted beaches

    EPA Science Inventory

    Beaches can be affected by a variety of contaminants. Of particular concern are beaches impacted by human fecal contamination and urban runoff. This poster demonstrates a methodology to identify potentially impacted beaches using Geographic Information Systems (GIS). Since h...

  1. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  2. Potential of VIIRS Time Series Data for Aiding the USDA Forest Service Early Warning System for Forest Health Threats: A Gypsy Moth Defoliation Case Study

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.; Ryan, Robert E.; McKellip, Rodney

    2008-01-01

    The Healthy Forest Restoration Act of 2003 mandated that a national forest threat Early Warning System (EWS) be developed. The USFS (USDA Forest Service) is currently building this EWS. NASA is helping the USFS to integrate remotely sensed data into the EWS, including MODIS data for monitoring forest disturbance at broad regional scales. This RPC experiment assesses the potential of VIIRS (Visible/Infrared Imager/Radiometer Suite) and MODIS (Moderate Resolution Imaging Spectroradiometer) data for contribution to the EWS. In doing so, the RPC project employed multitemporal simulated VIIRS and MODIS data for detecting and monitoring forest defoliation from the non-native Eurasian gypsy moth (Lymantria despar). Gypsy moth is an invasive species threatening eastern U.S. hardwood forests. It is one of eight major forest insect threats listed in the Healthy Forest Restoration Act of 2003. This RPC experiment is relevant to several nationally important mapping applications, including carbon management, ecological forecasting, coastal management, and disaster management

  3. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model.

    PubMed

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 ( N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 ( N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 ( N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 ( N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict.

  4. Threats: power, family mealtimes, and social influence.

    PubMed

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  5. Effects of Aging Stereotype Threat on Working Self-Concepts: An Event-Related Potentials Approach

    PubMed Central

    Zhang, Baoshan; Lin, Yao; Gao, Qianyun; Zawisza, Magdalena; Kang, Qian; Chen, Xuhai

    2017-01-01

    Although the influence of stereotype threat (ST) on working self-concepts has been highlighted in recent years, its neural underpinnings are unclear. Notably, the aging ST, which largely influences older adults’ cognitive ability, mental and physical health, did not receive much attention. In order to investigate these issues, electroencephalogram (EEG) data were obtained from older adults during a modified Stroop task using neutral words, positive and negative self-concept words in aging ST vs. neutral control conditions. Results showed longer reaction times (RTs) for identifying colors of words under the aging ST compared to the neutral condition. More importantly, the negative self-concept elicited more positive late P300 amplitudes and enhanced theta band activities compared to the positive self-concept or neutral words under the aging ST condition, whereas no difference was found between these self-concepts and neutral words in the control condition. Furthermore, the aging ST induced smaller theta band synchronization and enhanced alpha band synchronization compared to the control condition. Moreover, we also observed valence differences in self-concepts where the negative self-concept words reduced early P150/N170 complex relative to neutral words. These findings suggest that priming ST could activate negative self-concepts as current working self-concept, and that this influence occurred during a late neural time course. PMID:28747885

  6. Bomb Threats in Schools. Problem-Oriented Guides for Police. Problem-Specific Guides Series. Guide Number 32

    ERIC Educational Resources Information Center

    Newman, Graeme R.

    2005-01-01

    This guide addresses the problem of bomb threats in schools, public or private, kindergarten through 12th grade. Colleges and universities are excluded because they generally differ from schools. The guide reviews the factors that increase the risk of bomb threats in schools and then identifies a series of questions that might assist departments…

  7. Potential Stereotype Threat and Face Validity Effects on Cognitive-Based Test Performance in the Classroom

    ERIC Educational Resources Information Center

    Hollis-Sawyer, Lisa A.; Sawyer, Thomas P., Jr.

    2008-01-01

    Evaluation is an inherent part of education for an increasingly diverse student population. Confidence in one's test-taking skills, and the associated testing environment, needs to be examined from a perspective that combines the concept of Bandurian self-efficacy with the concept of stereotype threat reactions in a diverse student sample. Factors…

  8. Chronology of awareness about US National Park external threats.

    PubMed

    Shafer, Craig L

    2012-12-01

    The objective of this paper is to raise understanding of the history of protected area external threat awareness in the United States and at World Protected Area Congresses. The earliest concerns about external threats to US national parks began in the late nineteenth century: a potential railroad transgression of Yellowstone National Park in the 1880s. During the early and mid 1930s, George Wright and colleagues focused on outside boundary concerns like of hunting and trapping of furbearers, grazing, logging, disease and hybridization between species. In the 1960s, a worldwide recognition began about the role of outside habitat fragmentation/isolation on nature reserves and human generated stressors crossing their boundaries. The State of the Park Report 1980 added a plethora of threats: oil/gas and geothermal exploration and development, hydropower and reclamation projects, urban encroachment, roads, resorts, and recreational facilities. The early 1980s ushered in political interference with NPS threats abatement efforts as well as Congressional legislative initiatives to support the abatement challenges of the agency. By 1987, the Government Accounting Office issued its first report on National Park Service (NPS) progress in dealing with external threats. Climate change impacts on parks, especially in terms of animals adjusting their temperature and moisture requirements by latitude and altitude, surfaced in the technical literature by the mid-1980s. By 1992, the world parks community stressed the need to integrate protected areas into the surrounding landscape and human community. The importance of the matrix has gradually gained appreciation in the scientific community. This chronology represents one example of national park and protected areas' institutional history contributing to the breath of modern conservation science.

  9. Chronology of Awareness About US National Park External Threats

    NASA Astrophysics Data System (ADS)

    Shafer, Craig L.

    2012-12-01

    The objective of this paper is to raise understanding of the history of protected area external threat awareness in the United States and at World Protected Area Congresses. The earliest concerns about external threats to US national parks began in the late nineteenth century: a potential railroad transgression of Yellowstone National Park in the 1880s. During the early and mid 1930s, George Wright and colleagues focused on outside boundary concerns like of hunting and trapping of furbearers, grazing, logging, disease and hybridization between species. In the 1960s, a worldwide recognition began about the role of outside habitat fragmentation/isolation on nature reserves and human generated stressors crossing their boundaries. The State of the Park Report 1980 added a plethora of threats: oil/gas and geothermal exploration and development, hydropower and reclamation projects, urban encroachment, roads, resorts, and recreational facilities. The early 1980s ushered in political interference with NPS threats abatement efforts as well as Congressional legislative initiatives to support the abatement challenges of the agency. By 1987, the Government Accounting Office issued its first report on National Park Service (NPS) progress in dealing with external threats. Climate change impacts on parks, especially in terms of animals adjusting their temperature and moisture requirements by latitude and altitude, surfaced in the technical literature by the mid-1980s. By 1992, the world parks community stressed the need to integrate protected areas into the surrounding landscape and human community. The importance of the matrix has gradually gained appreciation in the scientific community. This chronology represents one example of national park and protected areas' institutional history contributing to the breath of modern conservation science.

  10. Accountable care organizations and radiology: threat or opportunity?

    PubMed

    Abramson, Richard G; Berger, Paul E; Brant-Zawadzki, Michael N

    2012-12-01

    Although the anticipated rise of accountable care organizations brings certain potential threats to radiologists, including direct threats to revenue and indirect systemic changes jeopardizing the bargaining leverage of radiology groups, accountable care organizations, and other integrated health care delivery models may provide radiology with an important opportunity to reassert its leadership and assume a more central role within health care systems. Capitalizing on this potential opportunity, however, will require radiology groups to abandon the traditional "film reader" mentality and engage actively in the design and implementation of nontraditional systems service lines aimed at adding differentiated value to larger health care organizations. Important interlinked and mutually reinforcing components of systems service lines, derived from radiology's core competencies, may include utilization management and decision support, IT leadership, quality and safety assurance, and operational enhancements to meet organizational goals. Such systems-oriented service products, tailored to the needs of individual integrated care entities and supported by objective performance metrics, may provide market differentiation to shield radiology from commoditization and could become an important source of new nonclinical revenue. Copyright © 2012 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  11. Workplace violence investigations and activation of the threat management teams in a multinational corporation.

    PubMed

    Peek-Asa, Corinne; Casteel, Carri; Rugala, Eugene; Romano, Steve; Ramirez, Marizen

    2013-11-01

    We examined threat management investigations conducted by a large multinational company. The company provided a database, removing any identifiers, of investigations by the corporate Threat Management Teams in 2009 and 2010. Rates were calculated using worker population data. During the 2-year study period, the company investigated threat management cases at a rate of 13.9 per 10,000 employees per year. Cases that activated a Threat Management Team were more likely to lead to corrective action (odds ratio = 2.0; 95% confidence interval = 1.08 to 3.87) and referral to the Employee Assistance Program (odds ratio = 4.8; 95% confidence interval = 3.00 to 7.77), but were not related to likelihood of termination. When the multidisciplinary teams were involved, cases were more likely to result in some type of action but were not more likely to lead to termination.

  12. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  13. Stereotype Threat Among Black and White Women in Health Care Settings

    PubMed Central

    Abdou, Cleopatra M.; Fingerhut, Adam W.

    2016-01-01

    The first of its kind, the present experiment applied stereotype threat—the threat of being judged by or confirming negative group-based stereotypes—to the health sciences. Black and White women (N = 162) engaged in a virtual health care situation. In the experimental condition, one’s ethnic identity and negative stereotypes of Black women specifically were made salient. As predicted, Black women in the stereotype threat condition who were strongly identified as Black (in terms of having explored what their ethnic identity means to them and the role it plays in their lives) reported significantly greater anxiety while waiting to see the doctor in the virtual health care setting than all other women. It is hypothesized that stereotype threat experienced in health care settings is one overlooked social barrier contributing to disparities in health care utilization and broader health disparities among Black women. PMID:25045944

  14. Enhanced processing of threat stimuli under limited attentional resources.

    PubMed

    De Martino, Benedetto; Kalisch, Raffael; Rees, Geraint; Dolan, Raymond J

    2009-01-01

    The ability to process stimuli that convey potential threat, under conditions of limited attentional resources, confers adaptive advantages. This study examined the neurobiology underpinnings of this capacity. Employing an attentional blink paradigm, in conjunction with functional magnetic resonance imaging, we manipulated the salience of the second of 2 face target stimuli (T2), by varying emotionality. Behaviorally, fearful T2 faces were identified significantly more than neutral faces. Activity in fusiform face area increased with correct identification of T2 faces. Enhanced activity in rostral anterior cingulate cortex (rACC) accounted for the benefit in detection of fearful stimuli reflected in a significant interaction between target valence and correct identification. Thus, under conditions of limited attention resources activation in rACC correlated with enhanced processing of emotional stimuli. We suggest that these data support a model in which a prefrontal "gate" mechanism controls conscious access of emotional information under conditions of limited attentional resources.

  15. Preliminary development of a GIS-tool to assess threats to shallow groundwater quality from soil pollutants in Glasgow, UK (GRASP).

    NASA Astrophysics Data System (ADS)

    Dochartaigh, B. É. Ó.; Fordyce, F. M.; Ander, E. L.; Bonsor, H. C.

    2009-04-01

    The protection of groundwater and related surface water quality is a key aspect of the European Union Water Framework Directive and environmental legislation in many countries worldwide. Globally, the protection of urban groundwater resources and related ecosystem services is of growing concern as urbanisation increases. Although urban areas are often where groundwater resources are most in need of protection, there is frequently a lack of information about threats to groundwater quality. Most studies of soil and groundwater contamination, although detailed, are site-specific, and city-wide overviews are generally lacking. The British Geological Survey (BGS) is currently undertaking the Clyde Urban Super-Project (CUSP), delivering multi-disciplinary geoscience products for the Glasgow conurbation. Under this project, a GIS-based prioritisation tool known as GRASP (GRoundwater And Soil Pollutants) has been trialled to aid urban planning and sustainable development by providing a broad-scale assessment of threats to groundwater quality across the conurbation. GRASP identifies areas where shallow groundwater quality is at greatest threat from the leaching and downward movement of potentially harmful metals in the soil. Metal contamination is a known problem in many urban centres including Glasgow, which has a long industrial heritage and associated contamination legacy, notably with respect to Cr. GRASP is based primarily upon an existing British Standard - International Standards Organisation methodology to determine the leaching potential of metals from soils, which has been validated for 11 metals: Al, Fe, Cd, Co, Cr, Cu, Hg, Ni, Mn, Pb and Zn (BS-ISO 15175:2004). However, the GRASP tool is innovative as it combines assessments of soil leaching potential with soil metal content data to highlight threats to shallow groundwater quality. The input parameters required for GRASP (soil pH, clay, organic matter, sesquioxide and metal content) are based upon a systematic

  16. Insider Threat to Computer Security at Nuclear Facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    West, Rebecca Lynn

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  17. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  18. Does intolerance of uncertainty predict anticipatory startle responses to uncertain threat?

    PubMed

    Nelson, Brady D; Shankman, Stewart A

    2011-08-01

    Intolerance of uncertainty (IU) has been proposed to be an important maintaining factor in several anxiety disorders, including generalized anxiety disorder, obsessive-compulsive disorder, and social phobia. While IU has been shown to predict subjective ratings and decision-making during uncertain/ambiguous situations, few studies have examined whether IU also predicts emotional responding to uncertain threat. The present study examined whether IU predicted aversive responding (startle and subjective ratings) during the anticipation of temporally uncertain shocks. Sixty-nine participants completed three experimental conditions during which they received: no shocks, temporally certain/predictable shocks, and temporally uncertain shocks. Results indicated that IU was negatively associated with startle during the uncertain threat condition in that those with higher IU had a smaller startle response. IU was also only related to startle during the uncertain (and not the certain/predictable) threat condition, suggesting that it was not predictive of general aversive responding, but specific to responses to uncertain aversiveness. Perceived control over anxiety-related events mediated the relation between IU and startle to uncertain threat, such that high IU led to lowered perceived control, which in turn led to a smaller startle response. We discuss several potential explanations for these findings, including the inhibitory qualities of IU. Overall, our results suggest that IU is associated with attenuated aversive responding to uncertain threat. Copyright © 2011 Elsevier B.V. All rights reserved.

  19. The impact of uncertain threat on affective bias: Individual differences in response to ambiguity.

    PubMed

    Neta, Maital; Cantelon, Julie; Haga, Zachary; Mahoney, Caroline R; Taylor, Holly A; Davis, F Caroline

    2017-12-01

    Individuals who operate under highly stressful conditions (e.g., military personnel and first responders) are often faced with the challenge of quickly interpreting ambiguous information in uncertain and threatening environments. When faced with ambiguity, it is likely adaptive to view potentially dangerous stimuli as threatening until contextual information proves otherwise. One laboratory-based paradigm that can be used to simulate uncertain threat is known as threat of shock (TOS), in which participants are told that they might receive mild but unpredictable electric shocks while performing an unrelated task. The uncertainty associated with this potential threat induces a state of emotional arousal that is not overwhelmingly stressful, but has widespread-both adaptive and maladaptive-effects on cognitive and affective function. For example, TOS is thought to enhance aversive processing and abolish positivity bias. Importantly, in certain situations (e.g., when walking home alone at night), this anxiety can promote an adaptive state of heightened vigilance and defense mobilization. In the present study, we used TOS to examine the effects of uncertain threat on valence bias, or the tendency to interpret ambiguous social cues as positive or negative. As predicted, we found that heightened emotional arousal elicited by TOS was associated with an increased tendency to interpret ambiguous cues negatively. Such negative interpretations are likely adaptive in situations in which threat detection is critical for survival and should override an individual's tendency to interpret ambiguity positively in safe contexts. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. The role of warning behaviors in threat assessment: an exploration and suggested typology.

    PubMed

    Reid Meloy, J; Hoffmann, Jens; Guldimann, Angela; James, David

    2012-01-01

    The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors. Previous research on risk factors associated with such warning behaviors is reviewed, and examples of each warning behavior from various intended violence cases are presented, including public figure assassination, adolescent and adult mass murder, corporate celebrity stalking, and both domestic and foreign acts of terrorism. Practical applications and future research into warning behaviors are suggested. Copyright © 2011 John Wiley & Sons, Ltd.

  1. Conditioned social dominance threat: observation of others' social dominance biases threat learning.

    PubMed

    Haaker, Jan; Molapour, Tanaz; Olsson, Andreas

    2016-10-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants' eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  2. Cutting costs in response to predatory threat by Geoffroy's marmosets (Callithrix geoffroyi).

    PubMed

    Caine, N G

    1998-01-01

    Ideally, prey should respond to their predators efficiently, without over- or underreacting to the threat. This may be particularly important for small-bodied species for whom metabolic demands are high and predatory risk is great. In the current study, two family groups of Callithrix geoffroyi living outside in a rural setting at the Center for Reproduction of Endangered Species, San Diego Wild Animal Park, were observed before, during, and after ten presentations of a great horned owl model. The owl was mounted on a post on a nearby hillside, simulating a situation in which a real but nonimminent threat is posed. As controls, a model of a crow and a cloth bag were also presented, each for ten trials. During the 10 min presentations of the owl, rates of play and foraging decreased, and rates of locomotion and vigilant looking increased from baseline rates. Data on occupation of the best viewing area suggest that the marmosets shared the job of monitoring a potential threat. After the owl was removed, behavior quickly returned to baseline rates, with the exception of looking at the place where the owl had been, and play. Neither the bag nor the crow generated significant differences from the baseline condition that preceded it. Marmosets may reduce the costs of antipredator behavior by appropriately assessing the degree of risk and by quickly resuming important activities once a potential threat has passed.

  3. Stereotype threat and social function in opioid substitution therapy patients.

    PubMed

    von Hippel, Courtney; Henry, Julie D; Terrett, Gill; Mercuri, Kimberly; McAlear, Karen; Rendell, Peter G

    2017-06-01

    People with a history of substance abuse are subject to widespread stigmatization. It seems likely that this societal disapproval will result in feelings of stereotype threat, or the belief that one is the target of demeaning stereotypes. If so, stereotype threat has the potential to contribute to functional difficulties including poor social outcomes. Eighty drug users on opioid substitution therapy and 84 demographically matched controls completed measures of mental health and social function. The opioid substitution therapy group were additionally asked to complete a measure that focused on their feelings of stereotype threat in relation to their drug use history. Bivariate correlations and hierarchical regression analyses were conducted to establish the magnitude and specificity of the relationship between stereotype threat and social functioning. Relative to controls, the opioid substitution therapy group reported higher levels of negative affect and schizotypy, and poorer social functioning, with all three of these indices significantly correlated with their feelings of stereotype threat. The results also showed that stereotype threat contributed significant unique variance to social functioning in the opioid substitution therapy group, even after taking into account other background, clinical, and mental health variables. Social functioning is an important aspect of recovery, yet these data indicate that people with a history of drug abuse who believe they are the target of stereotypical attitudes have poorer social functioning. This relationship holds after controlling for the impact of other variables on social functioning, including mental health. The theoretical and practical implications of these findings are discussed. Concerns about being stereotyped can shape the social experiences of opioid substitution therapy patients. Opioid substitution therapy patients who feel negatively stereotyped experience greater social function deficits, and this

  4. Anxiety and Depression Symptom Dimensions Demonstrate Unique Relationships with the Startle Reflex in Anticipation of Unpredictable Threat in 8 to 14 Year-Old Girls

    PubMed Central

    Nelson, Brady D.; Hajcak, Greg

    2016-01-01

    There is growing evidence that heightened sensitivity to unpredictability is a core mechanism of anxiety disorders. In adults, multiple anxiety disorders have been associated with a heightened startle reflex in anticipation of unpredictable threat. Child and adolescent anxiety has been linked to an increased startle reflex across baseline, safety, and threat conditions. However, it is unclear whether anxiety in youth is related to the startle reflex as a function of threat predictability. In a sample of 90 8 to 14 year-old girls, the present study examined the association between anxiety symptom dimensions and startle potentiation during a no, predictable, and unpredictable threat task. Depression symptom dimensions were also examined given their high comorbidity with anxiety and mixed relationship with the startle reflex and sensitivity to unpredictability. To assess current symptoms, participants completed the self-report Screen for Child Anxiety Related Emotional Disorders and Children’s Depression Inventory. Results indicated that social phobia symptoms were associated with heightened startle potentiation in anticipation of unpredictable threat and attenuated startle potentiation in anticipation of predictable threat. Negative mood and negative self-esteem symptoms were associated with attenuated and heightened startle potentiation in anticipation of unpredictable threat, respectively. All results remained significant after controlling for the other symptom dimensions. The present study provides initial evidence that anxiety and depression symptom dimensions demonstrate unique associations with the startle reflex in anticipation of unpredictable threat in children and adolescents. PMID:27224989

  5. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    USGS Publications Warehouse

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  6. Threat Reappraisal as a Mediator of Symptom Change in Cognitive-Behavioral Treatment of Anxiety Disorders: A Systematic Review

    ERIC Educational Resources Information Center

    Smits, Jasper A. J.; Julian, Kristin; Rosenfield, David; Powers, Mark B.

    2012-01-01

    Objective: Identifying mediators of therapeutic change is important to the development of interventions and augmentation strategies. Threat reappraisal is considered a key mediator underlying the effects of cognitive-behavioral therapy (CBT) for anxiety disorders. The present study systematically reviewed the evidence for the threat reappraisal…

  7. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192...

  8. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign andmore » threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.« less

  9. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    PubMed Central

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  10. Amazonian freshwater habitats experiencing environmental and socioeconomic threats affecting subsistence fisheries.

    PubMed

    Alho, Cleber J R; Reis, Roberto E; Aquino, Pedro P U

    2015-09-01

    Matching the trend seen among the major large rivers of the globe, the Amazon River and its tributaries are facing aquatic ecosystem disruption that is affecting freshwater habitats and their associated biodiversity, including trends for decline in fishery resources. The Amazon's aquatic ecosystems, linked natural resources, and human communities that depend on them are increasingly at risk from a number of identified threats, including expansion of agriculture; cattle pastures; infrastructure such as hydroelectric dams, logging, mining; and overfishing. The forest, which regulates the hydrological pulse, guaranteeing the distribution of rainfall and stabilizing seasonal flooding, has been affected by deforestation. Flooding dynamics of the Amazon Rivers are a major factor in regulating the intensity and timing of aquatic organisms. This study's objective was to identify threats to the integrity of freshwater ecosystems, and to seek instruments for conservation and sustainable use, taking principally fish diversity and fisheries as factors for analysis.

  11. Ports and pests: Assessing the threat of aquatic invasive species introduced by maritime shipping activity in Cuba.

    PubMed

    O'Brien, Charleen E; Johnston, Matthew W; Kerstetter, David W

    2017-12-15

    Aquatic invasive species (AIS) are biological pollutants that cause detrimental ecological, economic, and human-health effects in their introduced communities. With increasing globalization through maritime trade, ports are vulnerable to AIS exposure via commercial vessels. The Cuban Port of Mariel is poised to become a competitive transshipment hub in the Caribbean and the intent of this study was to evaluate present and potential impacts AIS pose with the likely future increase in shipping activity. We utilized previous assessment frameworks and publicly accessible information to rank AIS by level of threat. Fifteen AIS were identified in Cuba and one, the Asian green mussel Perna viridis (Linnaeus, 1758), had repeated harmful economic impacts. Five species associated with trade partners of Port Mariel were considered potentially detrimental to Cuba if introduced through shipping routes. The results presented herein identify species of concern and emphasize the importance of prioritizing AIS prevention and management within Cuba. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Regulation in a Brave New World: Safeguarding against Subversive Threats

    ERIC Educational Resources Information Center

    Hornosty, Jason

    2011-01-01

    Biotechnology is a rapidly advancing science that has the potential to revolutionize medicine and transform human abilities. Accompanying these positives are an underdiscussed category of threats to principles of human rights and equality. Although any technology might be used to inegalitarian ends, biotechnology has the capacity to beget…

  13. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    PubMed

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  14. Evaluation and Verification of the Global Rapid Identification of Threats System for Infectious Diseases in Textual Data Sources

    PubMed Central

    Breit, Nathan

    2016-01-01

    The Global Rapid Identification of Threats System (GRITS) is a biosurveillance application that enables infectious disease analysts to monitor nontraditional information sources (e.g., social media, online news outlets, ProMED-mail reports, and blogs) for infectious disease threats. GRITS analyzes these textual data sources by identifying, extracting, and succinctly visualizing epidemiologic information and suggests potentially associated infectious diseases. This manuscript evaluates and verifies the diagnoses that GRITS performs and discusses novel aspects of the software package. Via GRITS' web interface, infectious disease analysts can examine dynamic visualizations of GRITS' analyses and explore historical infectious disease emergence events. The GRITS API can be used to continuously analyze information feeds, and the API enables GRITS technology to be easily incorporated into other biosurveillance systems. GRITS is a flexible tool that can be modified to conduct sophisticated medical report triaging, expanded to include customized alert systems, and tailored to address other biosurveillance needs. PMID:27698665

  15. Insular threat associations within taxa worldwide.

    PubMed

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  16. Signaling threat: how situational cues affect women in math, science, and engineering settings.

    PubMed

    Murphy, Mary C; Steele, Claude M; Gross, James J

    2007-10-01

    This study examined the cues hypothesis, which holds that situational cues, such as a setting's features and organization, can make potential targets vulnerable to social identity threat. Objective and subjective measures of identity threat were collected from male and female math, science, and engineering (MSE) majors who watched an MSE conference video depicting either an unbalanced ratio of men to women or a balanced ratio. Women who viewed the unbalanced video exhibited more cognitive and physiological vigilance, and reported a lower sense of belonging and less desire to participate in the conference, than did women who viewed the gender-balanced video. Men were unaffected by this situational cue. The implications for understanding vulnerability to social identity threat, particularly among women in MSE settings, are discussed.

  17. Credible threats and promises.

    PubMed

    McNamara, John M; Houston, Alasdair I

    2002-11-29

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest.

  18. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  19. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. Matching species traits to projected threats and opportunities from climate change

    PubMed Central

    Garcia, Raquel A; Araújo, Miguel B; Burgess, Neil D; Foden, Wendy B; Gutsche, Alexander; Rahbek, Carsten; Cabeza, Mar

    2014-01-01

    Aim Climate change can lead to decreased climatic suitability within species' distributions, increased fragmentation of climatically suitable space, and/or emergence of newly suitable areas outside present distributions. Each of these extrinsic threats and opportunities potentially interacts with specific intrinsic traits of species, yet this specificity is seldom considered in risk assessments. We present an analytical framework for examining projections of climate change-induced threats and opportunities with reference to traits that are likely to mediate species' responses, and illustrate the applicability of the framework. Location Sub-Saharan Africa. Methods We applied the framework to 195 sub-Saharan African amphibians with both available bioclimatic envelope model projections for the mid-21st century and trait data. Excluded were 500 narrow-ranging species mainly from montane areas. For each of projected losses, increased fragmentation and gains of climate space, we selected potential response-mediating traits and examined the spatial overlap with vulnerability due to these traits. We examined the overlap for all species, and individually for groups of species with different combinations of threats and opportunities. Results In the Congo Basin and arid Southern Africa, projected losses for wide-ranging amphibians were compounded by sensitivity to climatic variation, and expected gains were precluded by poor dispersal ability. The spatial overlap between exposure and vulnerability was more pronounced for species projected to have their climate space contracting in situ or shifting to distant geographical areas. Our results exclude the potential exposure of narrow-ranging species to shrinking climates in the African tropical mountains. Main conclusions We illustrate the application of a framework combining spatial projections of climate change exposure with traits that are likely to mediate species' responses. Although the proposed framework carries several

  1. Effect of security threats on primary care access in Logar province, Afghanistan.

    PubMed

    Morikawa, Masahiro J

    2008-01-01

    Security threats are a major concern for access to health care in many war-torn communities; however, there is little quantified data on actual access to care in rural communities during war. Kinderberg International e.V. provided primary care in rural Logar province, Afghanistan, for these three years in eight districts until they were integrated into the new health care structure led by the Ministry of Health in early 2005. We examined the number of patients visiting our clinic before and during the security threats related to the parliamentary election and subsequent national assembly in 2004. The number of patients declined in remote clinics while the number increased in central locations. This finding has an important practical implication: the monitoring of access to care should include remote clinics, otherwise it may potentially underestimate compromised access to health care due to security threats.

  2. Helping Parents Cope with Suicide Threats: An Approach Based on Nonviolent Resistance.

    PubMed

    Omer, Haim; Dolberger, Dan Isaac

    2015-09-01

    Parent training in nonviolent resistance was adapted to deal with situations of suicide threat by children, adolescents, and young adults. The approach aims at reducing the risk potential and the mutual distress surrounding the threat-interaction. Parent training in nonviolent resistance has been shown to help parents move from helplessness to presence, from isolation to connectedness, from submission to resistance, from escalation to self-control, and from mutual distancing and hostility to care and support. Those emphases can be crucial for the diminution of suicide risk. Parents show good ability to implement the approach and report gains on various areas over and beyond the reduction in suicide threat. A particular advantage is that the method can be used also in cases where the young person threatening suicide is not willing to cooperate. © 2015 Family Process Institute.

  3. Insider Threat Mitigation Workshop Instructional Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  4. Decoding negative affect personality trait from patterns of brain activation to threat stimuli.

    PubMed

    Fernandes, Orlando; Portugal, Liana C L; Alves, Rita de Cássia S; Arruda-Sanchez, Tiago; Rao, Anil; Volchan, Eliane; Pereira, Mirtes; Oliveira, Letícia; Mourao-Miranda, Janaina

    2017-01-15

    Pattern recognition analysis (PRA) applied to functional magnetic resonance imaging (fMRI) has been used to decode cognitive processes and identify possible biomarkers for mental illness. In the present study, we investigated whether the positive affect (PA) or negative affect (NA) personality traits could be decoded from patterns of brain activation in response to a human threat using a healthy sample. fMRI data from 34 volunteers (15 women) were acquired during a simple motor task while the volunteers viewed a set of threat stimuli that were directed either toward them or away from them and matched neutral pictures. For each participant, contrast images from a General Linear Model (GLM) between the threat versus neutral stimuli defined the spatial patterns used as input to the regression model. We applied a multiple kernel learning (MKL) regression combining information from different brain regions hierarchically in a whole brain model to decode the NA and PA from patterns of brain activation in response to threat stimuli. The MKL model was able to decode NA but not PA from the contrast images between threat stimuli directed away versus neutral with a significance above chance. The correlation and the mean squared error (MSE) between predicted and actual NA were 0.52 (p-value=0.01) and 24.43 (p-value=0.01), respectively. The MKL pattern regression model identified a network with 37 regions that contributed to the predictions. Some of the regions were related to perception (e.g., occipital and temporal regions) while others were related to emotional evaluation (e.g., caudate and prefrontal regions). These results suggest that there was an interaction between the individuals' NA and the brain response to the threat stimuli directed away, which enabled the MKL model to decode NA from the brain patterns. To our knowledge, this is the first evidence that PRA can be used to decode a personality trait from patterns of brain activation during emotional contexts

  5. Anxiety and Depression Symptom Dimensions Demonstrate Unique Relationships with the Startle Reflex in Anticipation of Unpredictable Threat in 8 to 14 Year-Old Girls.

    PubMed

    Nelson, Brady D; Hajcak, Greg

    2017-02-01

    There is growing evidence that heightened sensitivity to unpredictability is a core mechanism of anxiety disorders. In adults, multiple anxiety disorders have been associated with a heightened startle reflex in anticipation of unpredictable threat. Child and adolescent anxiety has been linked to an increased startle reflex across baseline, safety, and threat conditions. However, it is unclear whether anxiety in youth is related to the startle reflex as a function of threat predictability. In a sample of 90 8 to 14 year-old girls, the present study examined the association between anxiety symptom dimensions and startle potentiation during a no, predictable, and unpredictable threat task. Depression symptom dimensions were also examined given their high comorbidity with anxiety and mixed relationship with the startle reflex and sensitivity to unpredictability. To assess current symptoms, participants completed the self-report Screen for Child Anxiety Related Emotional Disorders and Children's Depression Inventory. Results indicated that social phobia symptoms were associated with heightened startle potentiation in anticipation of unpredictable threat and attenuated startle potentiation in anticipation of predictable threat. Negative mood and negative self-esteem symptoms were associated with attenuated and heightened startle potentiation in anticipation of unpredictable threat, respectively. All results remained significant after controlling for the other symptom dimensions. The present study provides initial evidence that anxiety and depression symptom dimensions demonstrate unique associations with the startle reflex in anticipation of unpredictable threat in children and adolescents.

  6. Psychoanalysis and the nuclear threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threatmore » to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.« less

  7. Stereotype threat and racial differences in citizens' experiences of police encounters.

    PubMed

    Najdowski, Cynthia J; Bottoms, Bette L; Goff, Phillip Atiba

    2015-10-01

    We conducted 2 studies to investigate how cultural stereotypes that depict Blacks as criminals affect the way Blacks experience encounters with police officers, expecting that such encounters induce Blacks to feel stereotype threat (i.e., concern about being judged and treated unfairly by police because of the stereotype). In Study 1, we asked Black and White participants to report how they feel when interacting with police officers in general. As predicted, Blacks, but not Whites, reported concern that police officers stereotype them as criminals simply because of their race. In addition, this effect was found for Black men but not Black women. In Study 2, we asked Black and White men to imagine a specific police encounter and assessed potential downstream consequences of stereotype threat. Consistent with Study 1, Black but not White men anticipated feeling stereotype threat in the hypothetical police encounter. Further, racial differences in anticipated threat translated into racial differences in anticipated anxiety, self-regulatory efforts, and behavior that is commonly perceived as suspicious by police officers. By demonstrating that Blacks might expect to be judged and treated unfairly by police because of the negative stereotype of Black criminality, this research extends stereotype threat theory to the new domain of criminal justice encounters. It also has practical implications for understanding how the stereotype could ironically contribute to bias-based policing and racial disparities in the justice system. (c) 2015 APA, all rights reserved).

  8. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  9. When anger dominates the mind: Increased motor corticospinal excitability in the face of threat

    PubMed Central

    Hortensius, Ruud

    2016-01-01

    Abstract Threat demands fast and adaptive reactions that are manifested at the physiological, behavioral, and phenomenological level and are responsive to the direction of threat and its severity for the individual. Here, we investigated the effects of threat directed toward or away from the observer on motor corticospinal excitability and explicit recognition. Sixteen healthy right‐handed volunteers completed a transcranial magnetic stimulation (TMS) task and a separate three‐alternative forced‐choice emotion recognition task. Single‐pulse TMS to the left primary motor cortex was applied to measure motor evoked potentials from the right abductor pollicis brevis in response to dynamic angry, fearful, and neutral bodily expressions with blurred faces directed toward or away from the observer. Results showed that motor corticospinal excitability increased independent of direction of anger compared with fear and neutral. In contrast, anger was better recognized when directed toward the observer compared with when directed away from the observer, while the opposite pattern was found for fear. The present results provide evidence for the differential effects of threat direction on explicit recognition and motor corticospinal excitability. In the face of threat, motor corticospinal excitability increases independently of the direction of anger, indicative of the importance of more automatic reactions to threat. PMID:27325519

  10. Hazards and accessibility: combining and visualizing threat and open infrastructure data for disaster management

    NASA Astrophysics Data System (ADS)

    Tost, Jordi; Ehmel, Fabian; Heidmann, Frank; Olen, Stephanie M.; Bookhagen, Bodo

    2018-05-01

    The assessment of natural hazards and risk has traditionally been built upon the estimation of threat maps, which are used to depict potential danger posed by a particular hazard throughout a given area. But when a hazard event strikes, infrastructure is a significant factor that can determine if the situation becomes a disaster. The vulnerability of the population in a region does not only depend on the area's local threat, but also on the geographical accessibility of the area. This makes threat maps by themselves insufficient for supporting real-time decision-making, especially for those tasks that involve the use of the road network, such as management of relief operations, aid distribution, or planning of evacuation routes, among others. To overcome this problem, this paper proposes a multidisciplinary approach divided in two parts. First, data fusion of satellite-based threat data and open infrastructure data from OpenStreetMap, introducing a threat-based routing service. Second, the visualization of this data through cartographic generalization and schematization. This emphasizes critical areas along roads in a simple way and allows users to visually evaluate the impact natural hazards may have on infrastructure. We develop and illustrate this methodology with a case study of landslide threat for an area in Colombia.

  11. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  12. Assessing fear and anxiety in humans using the threat of predictable and unpredictable aversive events (the NPU-threat test)

    PubMed Central

    Schmitz, Anja; Grillon, Christian

    2012-01-01

    The threat of predictable and unpredictable aversive events was developed to assess short-duration (fear) and long-duration (anxiety) aversive states in humans. A typical experiment consists of three conditions: a safe condition (neutral (N)), during which participants are safe from aversive stimuli, and two threat conditions—one in which aversive events are administered predictably (P) (i.e., signaled by a threat cue), and one in which aversive stimuli are administered unpredictably (U). During the so-called NPU -threat test, ongoing change in aversive states is measured with the startle reflex. The NPU -threat test has been validated in pharmacological and clinical studies and can be implemented in children and adults. Similar procedures have been applied in animal models, making the NPU -threat test an ideal tool for translational research. The procedure is relatively short (35 min), simple to implement and generates consistent results with large effect sizes. PMID:22362158

  13. The neural basis of self-face recognition after self-concept threat and comparison with important others.

    PubMed

    Guan, Lili; Qi, Mingming; Zhang, Qinglin; Yang, Juan

    2014-01-01

    The implicit positive association (IPA) theory attributed self-face advantage to the IPA with self-concept. Previous behavioral study has found that self-concept threat (SCT) could eliminate the self-advantage in face recognition over familiar-face, without taking levels of facial familiarity into account. The current event-related potential study aimed to investigate whether SCT could eliminate the self-face advantage over stranger-face. Fifteen participants completed a "self-friend" comparison task in which participants identified the face orientation of self-face and friend-face after SCT and non-self-concept threat (NSCT) priming, and a "self-stranger" comparison task was also completed in which participants identified the face orientation of self-face and stranger-face after SCT and NSCT priming. The results showed that the N2 amplitudes were more negative for processing friend-face than self-face after NSCT priming, but there was no significant difference between them after SCT priming. Moreover, the N2 amplitudes were more negative for processing stranger-face than self-face both after SCT priming and after NSCT priming. Furthermore, SCT manipulated the N2 amplitudes of friend-face rather than self-face. Overall, the present study made a supplementary to the current IPA theory and further indicated that SCT would only eliminate this self-face recognition advantage when comparing with important others.

  14. Crisis in the Philippines: A Threat to U.S. Interests.

    ERIC Educational Resources Information Center

    Gregor, A. James

    The special relationship between the United States and the Philippines is chronicled, and the potential threats to that relationship are exposed and evaluated. Special attention is paid to imposition of martial law by Marcos from 1972-1981. The human rights of the Filipino people during martial law, development programs implemented by Marcos…

  15. Short-term serotonergic but not noradrenergic antidepressant administration reduces attentional vigilance to threat in healthy volunteers.

    PubMed

    Murphy, Susannah E; Yiend, Jenny; Lester, Kathryn J; Cowen, Philip J; Harmer, Catherine J

    2009-03-01

    Anxiety is associated with threat-related biases in information processing such as heightened attentional vigilance to potential threat. Such biases are an important focus of psychological treatments for anxiety disorders. Selective serotonin reuptake inhibitors (SSRIs) are effective in the treatment of a range of anxiety disorders. The aim of this study was to assess the effect of an SSRI on the processing of threat in healthy volunteers. A selective noradrenergic reuptake inhibitor (SNRI), which is not generally used in the treatment of anxiety, was used as a contrast to assess the specificity of SSRI effects on threat processing. Forty-two healthy volunteers were randomly assigned to 7 d double-blind intervention with the SSRI citalopram (20 mg/d), the SNRI reboxetine (8 mg/d), or placebo. On the final day, attentional and interpretative bias to threat was assessed using the attentional probe and the homograph primed lexical decision tasks. Citalopram reduced attentional vigilance towards fearful faces but did not affect the interpretation of ambiguous homographs as threatening. Reboxetine had no significant effect on either of these measures. Citalopram reduces attentional orienting to threatening stimuli, which is potentially relevant to its clinical use in the treatment of anxiety disorders. This finding supports a growing literature suggesting that an important mechanism through which pharmacological agents may exert their effects on mood is by reversing the cognitive biases that characterize the disorders that they treat. Future studies are needed to clarify the neural mechanisms through which these effects on threat processing are mediated.

  16. Stereotype threat can reduce older adults' memory errors.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  17. Social/Ethical Issues in Predictive Insider Threat Monitoring

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Frincke, Deborah A.; Zabriskie, Mariah

    2011-01-01

    Combining traditionally monitored cybersecurity data with other kinds of organizational data is one option for inferring the motivations of individuals, which may in turn allow early prediction and mitigation of insider threats. While unproven, some researchers believe that this combination of data may yield better results than either cybersecurity or organizational data would in isolation. However, this nontraditional approach creates a potential conflict between goals, such as conflicts between organizational security improvements and individual privacy considerations. There are many facets to debate. Should warning signs of a potential malicious insider be addressed before a malicious event has occurred to preventmore » harm to the organization and discourage the insider from violating the organization’s rules? Would intervention violate employee trust or legal guidelines? What about the possibilities of misuse? Predictive approaches cannot be validated a priori; false accusations can affect the career of the accused; and collection/monitoring of certain types of data may affect employee morale. In this chapter, we explore some of the social and ethical issues stemming from predictive insider threat monitoring and discuss ways that a predictive modeling approach brings to the forefront social and ethical issues that should be considered and resolved by stakeholders and communities of interest.« less

  18. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  19. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  20. Neural circuitry governing anxious individuals' mis-allocation of working memory to threat.

    PubMed

    Stout, Daniel M; Shackman, Alexander J; Pedersen, Walker S; Miskovich, Tara A; Larson, Christine L

    2017-08-18

    Dispositional anxiety is a trait-like phenotype that confers increased risk for a range of debilitating neuropsychiatric disorders. Like many patients with anxiety disorders, individuals with elevated levels of dispositional anxiety are prone to intrusive and distressing thoughts in the absence of immediate threat. Recent electrophysiological research suggests that these symptoms are rooted in the mis-allocation of working memory (WM) resources to threat-related information. Here, functional MRI was used to identify the network of brain regions that support WM for faces and to quantify the allocation of neural resources to threat-related distracters in 81 young adults. Results revealed widespread evidence of mis-allocation. This was evident in both face-selective regions of the fusiform cortex and domain-general regions of the prefrontal and parietal cortices. This bias was exaggerated among individuals with a more anxious disposition. Mediation analyses provided compelling evidence that anxious individuals' tendency to mis-allocate WM resources to threat-related distracters is statistically explained by heightened amygdala reactivity. Collectively, these results provide a neurocognitive framework for understanding the pathways linking anxious phenotypes to the development of internalizing psychopathology and set the stage for developing improved intervention strategies.

  1. Toward a Framework for Conducting Ecoregional Threats Assessments

    Treesearch

    Jamison Ervin; Jeffrey Parrish

    2006-01-01

    Assessing threats to biodiversity is widely recognized as a critical step in conservation planning. While there have been recent advances in understanding how to assess threats at a site level, there has been relatively little consensus on how threats can be meaningfully assessed at an ecoregional scale. Drawing from numerous threat assessment studies, this paper...

  2. Confronting unknown planetary boundary threats from chemical pollution.

    PubMed

    Persson, Linn M; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; MacLeod, Matthew; McLachlan, Michael S

    2013-11-19

    Rockström et al. proposed a set of planetary boundaries that delimitate a "safe operating space for humanity". One of the planetary boundaries is determined by "chemical pollution", however no clear definition was provided. Here, we propose that there is no single chemical pollution planetary boundary, but rather that many planetary boundary issues governed by chemical pollution exist. We identify three conditions that must be simultaneously met for chemical pollution to pose a planetary boundary threat. We then discuss approaches to identify chemicals that could fulfill those conditions, and outline a proactive hazard identification strategy that considers long-range transport and the reversibility of chemical pollution.

  3. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  4. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  5. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  6. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  7. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  8. Classification-free threat detection based on material-science-informed clustering

    NASA Astrophysics Data System (ADS)

    Yuan, Siyang; Wolter, Scott D.; Greenberg, Joel A.

    2017-05-01

    X-ray diffraction (XRD) is well-known for yielding composition and structural information about a material. However, in some applications (such as threat detection in aviation security), the properties of a material are more relevant to the task than is a detailed material characterization. Furthermore, the requirement that one first identify a material before determining its class may be difficult or even impossible for a sufficiently large pool of potentially present materials. We therefore seek to learn relevant composition-structure-property relationships between materials to enable material-identification-free classification. We use an expert-informed, data-driven approach operating on a library of XRD spectra from a broad array of stream of commerce materials. We investigate unsupervised learning techniques in order to learn about naturally emergent groupings, and apply supervised learning techniques to determine how well XRD features can be used to separate user-specified classes in the presence of different types and degrees of signal degradation.

  9. Faecal pollution loads in the wastewater effluents and receiving water bodies: a potential threat to the health of Sedibeng and Soshanguve communities, South Africa.

    PubMed

    Teklehaimanot, Giorgis Z; Coetzee, Martie A A; Momba, Maggy N B

    2014-01-01

    The discharge of untreated or inadequately treated effluents has been identified among the activities responsible for the spread of a wide range of potentially infectious agents. The aim of this study was to determine whether inadequate treatment of wastewater and the faecal pollution load of effluents and receiving water bodies in Sedibeng District and Soshanguve peri-urban area of the Tshwane Metropolitan Municipality could be a potential threat to the health of the surrounding communities. Variations in the counts of faecal indicator bacteria and pathogenic microorganisms and compliance of the effluents and receiving water bodies with South African and World Health Organization standards were assessed between August 2011 and May 2012 using culture-based methods and molecular techniques. The overall quality of effluents did not comply with the South African special standard of no risk for unrestricted irrigation (zero Escherichia coli/100 ml). The quality of the receiving water bodies did not comply with South African regulatory limits set for domestic purposes (zero E. coli/100 ml, <30 faecal enterococci/100 ml and <1 somatic coliphages/100 ml), for full contact recreation (<20 somatic coliphages/100 ml) and aquaculture (<10 E. coli/100 ml) and WHO standards for full and intermediate contact recreational use (<1 E. coli/100 ml and <40 faecal enterococci/100 ml, respectively). The PCR results revealed the prevalence of pathogenic microorganisms; between 0 and 60 % of samples tested positive for Salmonella Typhimurium and Shigella dysenteriae, and between 20 and 60% of samples tested positive for Vibrio cholerae. These findings demonstrated that potential health risks might be associated with the use of the target river waters for domestic, recreational and irrigation purposes. This study calls for a prompt intervention to improve wastewater management.

  10. Stereotype threat affects financial decision making.

    PubMed

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  11. Stereotype threat can reduce older adults' memory errors

    PubMed Central

    Barber, Sarah J.; Mather, Mara

    2014-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment (Seibt & Förster, 2004). Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 & 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well. PMID:24131297

  12. Temporospatial dynamics and public health significance of bacterial flora identified on a major leatherback turtle (Dermochelys coriacea) nesting beach in the Southern Caribbean

    USGS Publications Warehouse

    Phillips, Ayanna Carla N.; Couteau, Johanna; Rajh, Stacy; Stewart, Neville; Watson, Antonio; Jehu, Adam; Asmath, Hamish; Unakal, Chandrashekhar; Dziva, Francis; Holder, Ridley; Carthy, Raymond R.

    2017-01-01

    Grande Riviere beach, on the island of Trinidad, supports the largest nesting population of leatherback turtles in the Caribbean region. Throughout the nesting season, nests are naturally disturbed by newly nesting females, resulting in egg breakage and loss of some nest viability. This environment is ideal for the growth and proliferation of microorganisms. The range of bacterial flora present in beach sand and egg shells was examined, with emphasis on bacteria that may pose a threat to public and animal health. The extent to which the bacterial load and genera on the beach changed throughout the season was also assessed. Twenty-five genera were identified, with Pseudomonas spp. found to be the most predominant environmental bacteria. Four genera identified possess zoonotic potential, while five additional genera are known to be of public and animal health significance. Distinct shifts in the density and distribution of bacteria were observed along the beach from early to peak nesting season. Shifts were seen across heavily traversed zones, thus highlighting the potential exposure threats posed to beach visitors and animals alike. Further studies aimed at speciating this population of bacteria, as well as isolating potential fungal pathogens may mitigate this threat. Identification of bacterial agents that are specifically pathogenic to leatherback turtles, turtle eggs, hatchlings and those who may interact with these animals will serve to enhance and guide efforts to better conserve this species and protect the health of all who visit this ecologically significant site.

  13. Brazilian obligatory subterranean fauna and threats to the hypogean environment

    PubMed Central

    Gallão, Jonas Eduardo; Bichuette, Maria Elina

    2018-01-01

    Abstract The subterranean environment harbors species that are not capable of establishing populations in the epigean environment, i.e., the obligatory subterranean species. These organisms live in a unique selective regime in permanent darkness and usually low food availability, high air humidity in terrestrial habitats, and low temperature range allied to other unique conditions related to lithologies and past climatic influences. The pressure to increase Brazil’s economic growth relies on agricultural/pastoral industries and exporting of raw materials such as iron, limestone, ethanol, soybean, cotton, and meat, as well as huge reservoir constructions to generate electricity. Mining (even on a small scale), agricultural expansion, and hydroelectric projects are extremely harmful to subterranean biodiversity, via the modification and even destruction of hypogean habitats. The Brazilian subterranean species were analyzed with respect to their distributions, presence on the IUCN Red List, and current and potential threats to hypogean habitats. A map and three lists are presented, one with the described obligatory subterranean species, one with undescribed taxa, and one with the current and potential threats to the hypogean environment. To date, 150 obligatory subterranean species have been recorded in Brazil, plus at least 156 undescribed troglomorphic taxa, totaling 306 Brazilian troglobites/obligatory cave fauna. We also analyzed the current and potential cave threats and the conservation actions that are underway to attempt to compensate for loss of these habitats. In according to the Brazilian legislation (Decree 6640) only caves of maximum relevance are fully protected. One strategy to protect the subterranean fauna of Brazil is the inclusion of these species in the IUCN Red List (one of attributes that determines maximum relevance for caves); however, one of the IUCN assumptions is that the taxa must be formally described. It is clear that the description

  14. Cybersecurity in healthcare: A systematic review of modern threats and trends.

    PubMed

    Kruse, Clemens Scott; Frederick, Benjamin; Jacobson, Taylor; Monticone, D Kyle

    2017-01-01

    The adoption of healthcare technology is arduous, and it requires planning and implementation time. Healthcare organizations are vulnerable to modern trends and threats because it has not kept up with threats. The objective of this systematic review is to identify cybersecurity trends, including ransomware, and identify possible solutions by querying academic literature. The reviewers conducted three separate searches through the CINAHL and PubMed (MEDLINE) and the Nursing and Allied Health Source via ProQuest databases. Using key words with Boolean operators, database filters, and hand screening, we identified 31 articles that met the objective of the review. The analysis of 31 articles showed the healthcare industry lags behind in security. Like other industries, healthcare should clearly define cybersecurity duties, establish clear procedures for upgrading software and handling a data breach, use VLANs and deauthentication and cloud-based computing, and to train their users not to open suspicious code. The healthcare industry is a prime target for medical information theft as it lags behind other leading industries in securing vital data. It is imperative that time and funding is invested in maintaining and ensuring the protection of healthcare technology and the confidentially of patient information from unauthorized access.

  15. Autonomic Nervous System Responses to Hearing-Related Demand and Evaluative Threat.

    PubMed

    Mackersie, Carol L; Kearney, Lucia

    2017-10-12

    This paper consists of 2 parts. The purpose of Part 1 was to review the potential influence of internal (person-related) factors on listening effort. The purpose of Part 2 was to present, in support of Part 1, preliminary data illustrating the interactive effects of an external factor (task demand) and an internal factor (evaluative threat) on autonomic nervous system measures. For Part 1, we provided a brief narrative review of motivation and stress as modulators of listening effort. For Part 2, we described preliminary data from a study using a repeated-measures (2 × 2) design involving manipulations of task demand (high, low) and evaluative threat (high, low). The low-demand task consisted of repetition of sentences from a narrative. The high-demand task consisted of answering questions about the narrative, requiring both comprehension and recall. During the high evaluative threat condition, participants were filmed and told that their video recordings would be evaluated by a panel of experts. During the low evaluative threat condition, no filming occurred; participants were instructed to "do your best." Skin conductance (sympathetic nervous system activity) and heart rate variability (HRV, parasympathetic activity) were measured during the listening tasks. The HRV measure was the root mean square of successive differences of adjacent interbeat intervals. Twelve adults with hearing loss participated. Skin conductance increased and HRV decreased relative to baseline (no task) for all listening conditions. Skin conductance increased significantly with an increase in evaluative threat, but only for the more demanding task. There was no significant change in HRV in response to increasing evaluative threat or task demand. Listening effort may be influenced by factors other than task difficulty, as reviewed in Part 1. This idea is supported by the preliminary data indicating that the sympathetic nervous system response to task demand is modulated by social evaluative

  16. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  17. Discovering Potential Pathogens among Fungi Identified as Nonsporulating Molds▿

    PubMed Central

    Pounder, June I.; Simmon, Keith E.; Barton, Claudia A.; Hohmann, Sheri L.; Brandt, Mary E.; Petti, Cathy A.

    2007-01-01

    Fungal infections are increasing, particularly among immunocompromised hosts, and a rapid diagnosis is essential to initiate antifungal therapy. Often fungi cannot be identified by conventional methods and are classified as nonsporulating molds (NSM).We sequenced internal transcribed spacer regions from 50 cultures of NSM and found 16 potential pathogens that can be associated with clinical disease. In selected clinical settings, identification of NSM could prove valuable and have an immediate impact on patient management. PMID:17135442

  18. Experimental Evidence of Threat-Sensitive Collective Avoidance Responses in a Large Wild-Caught Herring School

    PubMed Central

    Rieucau, Guillaume; Boswell, Kevin M.; De Robertis, Alex; Macaulay, Gavin J.; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60 000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the “threat-sensitive hypothesis”. PMID:24489778

  19. The Risk of Risk Analysis And its Relation to the Economics of Insider Threats

    NASA Astrophysics Data System (ADS)

    Probst, Christian W.; Hunker, Jeffrey

    Insider threats to organizational information security are widely viewed as an important concern, but little is understood as to the pattern of their occurrence. We outline an argument for explaining what originally surprised us: that many practitioners report that their organizations take basic steps to prevent insider attacks, but do not attempt to address more serious attacks. We suggest that an understanding of the true cost of additional policies to control insider threats, and the dynamic nature of potential insider threats together help explain why this observed behavior is economically rational. This conclusion also suggests that further work needs to be done to understand how better to change underlying motivations of insiders, rather than simply focus on controlling and monitoring their behavior.

  20. Threat and defense as goal regulation: from implicit goal conflict to anxious uncertainty, reactive approach motivation, and ideological extremism.

    PubMed

    Nash, Kyle; McGregor, Ian; Prentice, Mike

    2011-12-01

    Four studies investigated a goal regulation view of anxious uncertainty threat (Gray & McNaughton, 2000) and ideological defense. Participants (N = 444) were randomly assigned to have achievement or relationship goals implicitly primed. The implicit goal primes were followed by randomly assigned achievement or relationship threats that have reliably caused generalized, reactive approach motivation and ideological defense in past research. The threats caused anxious uncertainty (Study 1), reactive approach motivation (Studies 2 and 3), and reactive ideological conviction (Study 4) only when threat-relevant goals had first been primed, but not when threat-irrelevant goals had first been primed. Reactive ideological conviction (Study 4) was eliminated if participants were given an opportunity to attribute their anxiety to a mundane source. Results support a goal regulation view of anxious uncertainty, threat, and defense with potential for integrating theories of defensive compensation.

  1. Proteomics-based approach identified differentially expressed proteins with potential roles in endometrial carcinoma.

    PubMed

    Li, Zhengyu; Min, Wenjiao; Huang, Canhua; Bai, Shujun; Tang, Minghai; Zhao, Xia

    2010-01-01

    We used proteomic approaches to identify altered expressed proteins in endometrial carcinoma, with the aim of discovering potential biomarkers or therapeutic targets for endometrial carcinoma. The global proteins extracted from endometrial carcinoma and normal endometrial tissues were separated by 2-dimensional electrophoresis and analyzed with PDQuest (Bio-Rad, Hercules, Calif) software. The differentially expressed spots were identified by mass spectrometry and searched against NCBInr protein database. Those proteins with potential roles were confirmed by Western blotting and immunohistochemical assays. Ninety-nine proteins were identified by mass spectrometry, and a cluster diagram analysis indicated that these proteins were involved in metabolism, cell transformation, protein folding, translation and modification, proliferation and apoptosis, signal transduction, cytoskeleton, and so on. In confirmatory immunoblotting and immunohistochemical analyses, overexpressions of epidermal fatty acid-binding protein, calcyphosine, and cyclophilin A were also observed in endometrial carcinoma tissues, which were consistent with the proteomic results. Our results suggested that these identified proteins, including epidermal fatty acid-binding protein, calcyphosine, and cyclophilin A, might be of potential values in the studies of endometrial carcinogenesis or investigations of diagnostic biomarkers or treatment targets for endometrial carcinoma.

  2. The threat of disease increases as species move toward extinction.

    PubMed

    Heard, Matthew J; Smith, Katherine F; Ripp, Kelsey; Berger, Melanie; Chen, Jane; Dittmeier, Justin; Goter, Maggie; McGarvey, Stephen T; Ryan, Elizabeth

    2013-12-01

    At local scales, infectious disease is a common driver of population declines, but globally it is an infrequent contributor to species extinction and endangerment. For species at risk of extinction from disease important questions remain unanswered, including when does disease become a threat to species and does it co-occur, predictably, with other threats? Using newly compiled data from the International Union for Conservation of Nature (IUCN) Red List, we examined the relative role and co-occurrence of threats associated with amphibians, birds, and mammals at 6 levels of extinction risk (i.e., Red List status categories: least concern, near threatened, vulnerable, endangered, critically endangered, and extinct in the wild/extinct). We tested the null hypothesis that the proportion of species threatened by disease is the same in all 6 Red List status categories. Our approach revealed a new method for determining when disease most frequently threatens species at risk of extinction. The proportion of species threatened by disease varied significantly between IUCN status categories and linearly increased for amphibians, birds, and all species combined as these taxa move from move from least concern to critically endangered. Disease was infrequently the single contributing threat. However, when a species was negatively affected by a major threat other than disease (e.g., invasive species, land-use change) that species was more likely to be simultaneously threatened by disease than species that had no other threats. Potential drivers of these trends include ecological factors, clustering of phylogenetically related species in Red List status categories, discovery bias among species at greater risk of extinction, and availability of data. We echo earlier calls for baseline data on the presence of parasites and pathogens in species when they show the first signs of extinction risk and arguably before. La Amenaza de Enfermedades Incrementa a Medida que las Especies se

  3. Bio-threat preparedness: Need for a paradigm shift.

    PubMed

    Jindal, A K; Roy, Kaushik

    2014-04-01

    India of late has been vulnerable to Chemical, Biological, Radiological and Nuclear (CBRN) threat, on account of its unique geographic position. Biological threat is an imminent threat in the hands of a terrorist. The public health system of our country is overburdened due to its present role and bio-attack response is not a priority area. This paper suggests that as the prime focus is on the CR and N threats in the integrated CBRN preparedness strategy and that specialized and technical forces are needed to deal with a bio-threat; hence there is a need for a paradigm shift in policy. The emerging field of bio-threat needs to be delinked from the joint family of 'CBRN', with consequent structural and functional changes. A separate specialized cadre needs to be formed for dealing with bio-threat, created from the pool of doctors and non-medical scientists from the AFMS and the DRDO. Structural changes are needed in the organization, to bring in the resources of NCDC, New Delhi for enhanced disease surveillance capacity and creation of a bio-threat mitigation node in the AFMC, Pune.

  4. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  5. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  6. An approach for assessing potential sediment-bound contaminant threats near the intake of a drinking water treatment plant.

    PubMed

    Chen, Fei; Anderson, William B; Huck, Peter M

    2013-01-01

    To assist in assessing a potential contaminated sediment threat near a drinking water intake in a large lake, a technique known as the fingerprint analysis of leachate contaminants (FALCON), was investigated and enhanced to help draw more statistically significant definitive conclusions. This represents the first application of this approach, originally developed by the USEPA to characterize and track leachate penetration in groundwater and contaminant migration from waste and landfill sites, in a large lake from the point-of-view of source water protection. FALCON provided valuable information regarding contaminated sediment characterization, source attribution, and transport within a surface water context without the need for knowledge of local hydrodynamic conditions, potentially reducing reliance on complicated hydrodynamic analysis. A t-test to evaluate the significance of correlations was shown to further enhance the FALCON procedure. In this study, the sensitivity of FALCON was found to be improved by using concentration data from both conserved organics and heavy metals in combination. Furthermore, data analysis indicated that it may be possible to indirectly assess the success of remediation efforts (and the corresponding need to plan for a treatment upgrade in the event of escalating contaminant concentrations) by examining the temporal change in correlation between the source and intake sediment fingerprints over time. This method has potential for widespread application in situations where conserved contaminants such as heavy metals and higher molecular weight polycyclic aromatic hydrocarbons (PAHs), are being or have previously been deposited in sediment somewhere in, or within range of, an intake protection zone. Copyright © 2012 Elsevier Ltd. All rights reserved.

  7. The Trier Social Stress Test as a paradigm to study how people respond to threat in social interactions

    PubMed Central

    Frisch, Johanna U.; Häusser, Jan A.; Mojzisch, Andreas

    2015-01-01

    In our lives, we face countless situations in which we are observed and evaluated by our social interaction partners. Social-evaluative threat is frequently associated with strong neurophysiological stress reactions, in particular, an increase in cortisol levels. Yet, social variables do not only cause stress, but they can also buffer the neurophysiological stress response. Furthermore, social variables can themselves be affected by the threat or the threat-induced neurophysiological stress response. In order to study this complex interplay of social-evaluative threat, social processes and neurophysiological stress responses, a paradigm is needed that (a) reliably induces high levels of social-evaluative threat and (b) is extremely adaptable to the needs of the researcher. The Trier Social Stress Test (TSST) is a well-established paradigm in biopsychology that induces social-evaluative threat in the laboratory by subjecting participants to a mock job-interview. In this review, we aim at demonstrating the potential of the TSST for studying the complex interplay of social-evaluative threat, social processes and neurophysiological stress responses. PMID:25698987

  8. Appalachian Women’s Perceptions of Their Community’s Health Threats

    PubMed Central

    Schoenberg, Nancy E.; Hatcher, Jennifer; Dignan, Mark B.

    2011-01-01

    Context Decades of behavioral research suggest that awareness of health threats is a necessary precursor to engage in health promotion and disease prevention, findings that can be extended to the community level. Purpose We sought to better understand local perspectives on the main health concerns of rural Appalachian communities in order to identify the key health priorities. While Kentucky Appalachian communities are often described as suffering from substandard health, resource, and socioeconomic indicators, strong traditions of community mobilization make possible positive, home-grown change. Methods To assess what women, the key health gatekeepers, perceive as the most significant health threats to their rural communities, 10 focus groups were held with 52 Appalachian women from diverse socioeconomic backgrounds. Tape-recorded narratives were content analyzed and a codebook was developed. Measures designed to increase data trustworthiness included member checks, negative case evidence, and multiple coding. Findings The following rank-ordered conditions emerged as posing the greatest threat to the health of rural Appalachian communities: (1) drug abuse/medication dependence; (2) cancer; (3) heart disease and diabetes (tied); (4) smoking; (5) poor diet/overweight; (6) lack of exercise; and (7) communicable diseases. These health threats were described as specific to the local environment, deriving from broad ecological problems and were connected to one another. Conclusion Drawing on participants’ community-relevant suggestions, we suggest ways in which rural communities may begin to confront these health concerns. These suggestions range from modest, individual-level changes to broader structural-level recommendations. PMID:18257874

  9. Exome sequencing of a large family identifies potential candidate genes contributing risk to bipolar disorder.

    PubMed

    Zhang, Tianxiao; Hou, Liping; Chen, David T; McMahon, Francis J; Wang, Jen-Chyong; Rice, John P

    2018-03-01

    Bipolar disorder is a mental illness with lifetime prevalence of about 1%. Previous genetic studies have identified multiple chromosomal linkage regions and candidate genes that might be associated with bipolar disorder. The present study aimed to identify potential susceptibility variants for bipolar disorder using 6 related case samples from a four-generation family. A combination of exome sequencing and linkage analysis was performed to identify potential susceptibility variants for bipolar disorder. Our study identified a list of five potential candidate genes for bipolar disorder. Among these five genes, GRID1(Glutamate Receptor Delta-1 Subunit), which was previously reported to be associated with several psychiatric disorders and brain related traits, is particularly interesting. Variants with functional significance in this gene were identified from two cousins in our bipolar disorder pedigree. Our findings suggest a potential role for these genes and the related rare variants in the onset and development of bipolar disorder in this one family. Additional research is needed to replicate these findings and evaluate their patho-biological significance. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. System for ranking relative threats of U.S. volcanoes

    USGS Publications Warehouse

    Ewert, J.W.

    2007-01-01

    A methodology to systematically rank volcanic threat was developed as the basis for prioritizing volcanoes for long-term hazards evaluations, monitoring, and mitigation activities. A ranking of 169 volcanoes in the United States and the Commonwealth of the Northern Mariana Islands (U.S. volcanoes) is presented based on scores assigned for various hazard and exposure factors. Fifteen factors define the hazard: Volcano type, maximum known eruptive explosivity, magnitude of recent explosivity within the past 500 and 5,000 years, average eruption-recurrence interval, presence or potential for a suite of hazardous phenomena (pyroclastic flows, lahars, lava flows, tsunami, flank collapse, hydrothermal explosion, primary lahar), and deformation, seismic, or degassing unrest. Nine factors define exposure: a measure of ground-based human population in hazard zones, past fatalities and evacuations, a measure of airport exposure, a measure of human population on aircraft, the presence of power, transportation, and developed infrastructure, and whether or not the volcano forms a significant part of a populated island. The hazard score and exposure score for each volcano are multiplied to give its overall threat score. Once scored, the ordered list of volcanoes is divided into five overall threat categories from very high to very low. ?? 2007 ASCE.

  11. An automated technique to identify potential inappropriate traditional Chinese medicine (TCM) prescriptions.

    PubMed

    Yang, Hsuan-Chia; Iqbal, Usman; Nguyen, Phung Anh; Lin, Shen-Hsien; Huang, Chih-Wei; Jian, Wen-Shan; Li, Yu-Chuan

    2016-04-01

    Medication errors such as potential inappropriate prescriptions would induce serious adverse drug events to patients. Information technology has the ability to prevent medication errors; however, the pharmacology of traditional Chinese medicine (TCM) is not as clear as in western medicine. The aim of this study was to apply the appropriateness of prescription (AOP) model to identify potential inappropriate TCM prescriptions. We used the association rule of mining techniques to analyze 14.5 million prescriptions from the Taiwan National Health Insurance Research Database. The disease and TCM (DTCM) and traditional Chinese medicine-traditional Chinese medicine (TCMM) associations are computed by their co-occurrence, and the associations' strength was measured as Q-values, which often referred to as interestingness or life values. By considering the number of Q-values, the AOP model was applied to identify the inappropriate prescriptions. Afterwards, three traditional Chinese physicians evaluated 1920 prescriptions and validated the detected outcomes from the AOP model. Out of 1920 prescriptions, 97.1% of positive predictive value and 19.5% of negative predictive value were shown by the system as compared with those by experts. The sensitivity analysis indicated that the negative predictive value could improve up to 27.5% when the model's threshold changed to 0.4. We successfully applied the AOP model to automatically identify potential inappropriate TCM prescriptions. This model could be a potential TCM clinical decision support system in order to improve drug safety and quality of care. Copyright © 2016 John Wiley & Sons, Ltd.

  12. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    PubMed

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  13. When and Why Threats Go Undetected: Impacts of Event Rate and Shift Length on Threat Detection Accuracy During Airport Baggage Screening.

    PubMed

    Meuter, Renata F I; Lacherez, Philippe F

    2016-03-01

    We aimed to assess the impact of task demands and individual characteristics on threat detection in baggage screeners. Airport security staff work under time constraints to ensure optimal threat detection. Understanding the impact of individual characteristics and task demands on performance is vital to ensure accurate threat detection. We examined threat detection in baggage screeners as a function of event rate (i.e., number of bags per minute) and time on task across 4 months. We measured performance in terms of the accuracy of detection of Fictitious Threat Items (FTIs) randomly superimposed on X-ray images of real passenger bags. Analyses of the percentage of correct FTI identifications (hits) show that longer shifts with high baggage throughput result in worse threat detection. Importantly, these significant performance decrements emerge within the first 10 min of these busy screening shifts only. Longer shift lengths, especially when combined with high baggage throughput, increase the likelihood that threats go undetected. Shorter shift rotations, although perhaps difficult to implement during busy screening periods, would ensure more consistently high vigilance in baggage screeners and, therefore, optimal threat detection and passenger safety. © 2015, Human Factors and Ergonomics Society.

  14. Hot spot analysis applied to identify ecosystem services potential in Lithuania

    NASA Astrophysics Data System (ADS)

    Pereira, Paulo; Depellegrin, Daniel; Misiune, Ieva

    2016-04-01

    Hot spot analysis are very useful to identify areas with similar characteristics. This is important for a sustainable use of the territory, since we can identify areas that need to be protected, or restored. This is a great advantage in terms of land use planning and management, since we can allocate resources, reduce the economical costs and do a better intervention in the landscape. Ecosystem services (ES) are different according land use. Since landscape is very heterogeneous, it is of major importance understand their spatial pattern and where are located the areas that provide better ES and the others that provide less services. The objective of this work is to use hot-spot analysis to identify areas with the most valuable ES in Lithuania. CORINE land-cover (CLC) of 2006 was used as the main spatial information. This classification uses a grid of 100 m resolution and extracted a total of 31 land use types. ES ranking was carried out based on expert knowledge. They were asked to evaluate the ES potential of each different CLC from 0 (no potential) to 5 (very high potential). Hot spot analysis were evaluated using the Getis-ord test, which identifies cluster analysis available in ArcGIS toolbox. This tool identifies areas with significantly high low values and significant high values at a p level of 0.05. In this work we used hot spot analysis to assess the distribution of providing, regulating cultural and total (sum of the previous 3) ES. The Z value calculated from Getis-ord was used to statistical analysis to access the clusters of providing, regulating cultural and total ES. ES with high Z value show that they have a high number of cluster areas with high potential of ES. The results showed that the Z-score was significantly different among services (Kruskal Wallis ANOVA =834. 607, p<0.001). The Z score of providing services (0.096±2.239) were significantly higher than the total (0.093±2.045), cultural (0.080±1.979) and regulating (0.076±1.961). These

  15. Towards detection of pipeline integrity threats using a smart fiber optic surveillance system: PIT-STOP project blind field test results

    NASA Astrophysics Data System (ADS)

    Tejedor, J.; Macias-Guarasa, J.; Martins, H. F.; Piote, D.; Pastor-Graells, J.; Martin-Lopez, S.; Corredera, P.; De Pauw, G.; De Smet, F.; Postvoll, W.; Ahlen, C. H.; Gonzalez-Herraez, M.

    2017-04-01

    This paper presents the first report on on-line and final blind field test results of a pipeline integrity threat surveillance system. The system integrates a machine+activity identification mode, and a threat detection mode. Two different pipeline sections were selected for the blind tests: One close to the sensor position, and the other 35 km away from it. Results of the machine+activity identification mode showed that about 46% of the times the machine, the activity or both were correctly identified. For the threat detection mode, 8 out of 10 threats were correctly detected, with 1 false alarm.

  16. Alert but less alarmed: a pooled analysis of terrorism threat perception in Australia.

    PubMed

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Jones, Alison L; Jacobs, Jennifer; Barr, Margo; Raphael, Beverley

    2011-10-12

    Previous Australian research has highlighted disparities in community perceptions of the threat posed by terrorism. A study with a large sample size is needed to examine reported concerns and anticipated responses of community sub-groups and to determine their consistency with existing Australian and international findings. Representative samples of New South Wales (NSW) adults completed terrorism perception questions as part of computer assisted telephone interviews (CATI) in 2007 (N = 2081) and 2010 (N = 2038). Responses were weighted against the NSW population. Data sets from the two surveys were pooled and multivariate multilevel analyses conducted to identify health and socio-demographic factors associated with higher perceived risk of terrorism and evacuation response intentions, and to examine changes over time. In comparison with 2007, Australians in 2010 were significantly more likely to believe that a terrorist attack would occur in Australia (Adjusted Odd Ratios (AOR) = 1.24, 95%CI:1.06-1.45) but felt less concerned that they would be directly affected by such an incident (AOR = 0.65, 95%CI:0.55-0.75). Higher perceived risk of terrorism and related changes in living were associated with middle age, female gender, lower education and higher reported psychological distress. Australians of migrant background reported significantly lower likelihood of terrorism (AOR = 0.52, 95%CI:0.39-0.70) but significantly higher concern that they would be personally affected by such an incident (AOR = 1.57, 95%CI:1.21-2.04) and having made changes in the way they live due to this threat (AOR = 2.47, 95%CI:1.88-3.25). Willingness to evacuate homes and public places in response to potential incidents increased significantly between 2007 and 2010 (AOR = 1.53, 95%CI:1.33-1.76). While an increased proportion of Australians believe that the national threat of terrorism remains high, concern about being personally affected has moderated and may reflect habituation to this threat

  17. Alert but less alarmed: a pooled analysis of terrorism threat perception in Australia

    PubMed Central

    2011-01-01

    Background Previous Australian research has highlighted disparities in community perceptions of the threat posed by terrorism. A study with a large sample size is needed to examine reported concerns and anticipated responses of community sub-groups and to determine their consistency with existing Australian and international findings. Methods Representative samples of New South Wales (NSW) adults completed terrorism perception questions as part of computer assisted telephone interviews (CATI) in 2007 (N = 2081) and 2010 (N = 2038). Responses were weighted against the NSW population. Data sets from the two surveys were pooled and multivariate multilevel analyses conducted to identify health and socio-demographic factors associated with higher perceived risk of terrorism and evacuation response intentions, and to examine changes over time. Results In comparison with 2007, Australians in 2010 were significantly more likely to believe that a terrorist attack would occur in Australia (Adjusted Odd Ratios (AOR) = 1.24, 95%CI:1.06-1.45) but felt less concerned that they would be directly affected by such an incident (AOR = 0.65, 95%CI:0.55-0.75). Higher perceived risk of terrorism and related changes in living were associated with middle age, female gender, lower education and higher reported psychological distress. Australians of migrant background reported significantly lower likelihood of terrorism (AOR = 0.52, 95%CI:0.39-0.70) but significantly higher concern that they would be personally affected by such an incident (AOR = 1.57, 95%CI:1.21-2.04) and having made changes in the way they live due to this threat (AOR = 2.47, 95%CI:1.88-3.25). Willingness to evacuate homes and public places in response to potential incidents increased significantly between 2007 and 2010 (AOR = 1.53, 95%CI:1.33-1.76). Conclusion While an increased proportion of Australians believe that the national threat of terrorism remains high, concern about being personally affected has moderated and

  18. Technologies to counter aviation security threats

    NASA Astrophysics Data System (ADS)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  19. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  20. Western gall rust -- A threat to Pinus radiata in New Zealand

    Treesearch

    Tod D. Ramsfield; Darren J. Kriticos; Detlev R. Vogler; Brian W. Geils

    2007-01-01

    Western gall rust (Peridermium harknessii J. P. Moore (syn. Endocronartium harknessii (J. P. Moore) Y. Hiratsuka) is potentially a serious threat to exotic Pinus radiata D. Don plantations of New Zealand although the pathogen has not been recorded here. Mechanisms that may have prevented invasion of the pathogen include geographic...

  1. Scientifically defensible fish conservation and recovery plans: Addressing diffuse threats and developing rigorous adaptive management plans

    USGS Publications Warehouse

    Maas-Hebner, Kathleen G.; Schreck, Carl B.; Hughes, Robert M.; Yeakley, Alan; Molina, Nancy

    2016-01-01

    We discuss the importance of addressing diffuse threats to long-term species and habitat viability in fish conservation and recovery planning. In the Pacific Northwest, USA, salmonid management plans have typically focused on degraded freshwater habitat, dams, fish passage, harvest rates, and hatchery releases. However, such plans inadequately address threats related to human population and economic growth, intra- and interspecific competition, and changes in climate, ocean, and estuarine conditions. Based on reviews conducted on eight conservation and/or recovery plans, we found that though threats resulting from such changes are difficult to model and/or predict, they are especially important for wide-ranging diadromous species. Adaptive management is also a critical but often inadequately constructed component of those plans. Adaptive management should be designed to respond to evolving knowledge about the fish and their supporting ecosystems; if done properly, it should help improve conservation efforts by decreasing uncertainty regarding known and diffuse threats. We conclude with a general call for environmental managers and planners to reinvigorate the adaptive management process in future management plans, including more explicitly identifying critical uncertainties, implementing monitoring programs to reduce those uncertainties, and explicitly stating what management actions will occur when pre-identified trigger points are reached.

  2. Mapping Historic Gypsy Moth Defoliation with MODIS Satellite Data: Implications for Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spurce, Joseph P.; Hargrove, William; Ryan, Robert E.; Smooth, James C.; Prados, Don; McKellip, Rodney; Sader, Steven A.; Gasser, Jerry; May, George

    2008-01-01

    This viewgraph presentation reviews a project, the goal of which is to study the potential of MODIS data for monitoring historic gypsy moth defoliation. A NASA/USDA Forest Service (USFS) partnership was formed to perform the study. NASA is helping USFS to implement satellite data products into its emerging Forest Threat Early Warning System. The latter system is being developed by the USFS Eastern and Western Forest Threat Assessment Centers. The USFS Forest Threat Centers want to use MODIS time series data for regional monitoring of forest damage (e.g., defoliation) preferably in near real time. The study's methodology is described, and the results of the study are shown.

  3. Technosocial Modeling of IED Threat Scenarios and Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less

  4. Information Avoidance Tendencies, Threat Management Resources, and Interest in Genetic Sequencing Feedback.

    PubMed

    Taber, Jennifer M; Klein, William M P; Ferrer, Rebecca A; Lewis, Katie L; Harris, Peter R; Shepperd, James A; Biesecker, Leslie G

    2015-08-01

    Information avoidance is a defensive strategy that undermines receipt of potentially beneficial but threatening health information and may especially occur when threat management resources are unavailable. We examined whether individual differences in information avoidance predicted intentions to receive genetic sequencing results for preventable and unpreventable (i.e., more threatening) disease and, secondarily, whether threat management resources of self-affirmation or optimism mitigated any effects. Participants (N = 493) in an NIH study (ClinSeq®) piloting the use of genome sequencing reported intentions to receive (optional) sequencing results and completed individual difference measures of information avoidance, self-affirmation, and optimism. Information avoidance tendencies corresponded with lower intentions to learn results, particularly for unpreventable diseases. The association was weaker among individuals higher in self-affirmation or optimism, but only for results regarding preventable diseases. Information avoidance tendencies may influence decisions to receive threatening health information; threat management resources hold promise for mitigating this association.

  5. How to test the threat-simulation theory.

    PubMed

    Revonsuo, Antti; Valli, Katja

    2008-12-01

    Malcolm-Smith, Solms, Turnbull and Tredoux [Malcolm-Smith, S., Solms, M.,Turnbull, O., & Tredoux, C. (2008). Threat in dreams: An adaptation? Consciousness and Cognition, 17, 1281-1291.] have made an attempt to test the Threat-Simulation Theory (TST), a theory offering an evolutionary psychological explanation for the function of dreaming [Revonsuo, A. (2000a). The reinterpretation of dreams: An evolutionary hypothesis of the function of dreaming. Behavioral and Brain Sciences, 23(6), 877-901]. Malcolm-Smith et al. argue that empirical evidence from their own study as well as from some other studies in the literature does not support the main predictions of the TST: that threatening events are frequent and overrepresented in dreams, that exposure to real threats activates the threat-simulation system, and that dream threats contain realistic rehearsals of threat avoidance responses. Other studies, including our own, have come up with results and conclusions that are in conflict with those of Malcolm-Smith et al. In this commentary, we provide an analysis of the sources of these disagreements, and their implications to the TST. Much of the disagreement seems to stem from differing interpretations of the theory and, consequently, of differing methods to test it.

  6. Identifying potential impact of lead contamination using a geographic information system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bocco, G.; Sanchez, R.

    1997-01-01

    The main objective of this research was to identify the potential hazards associated with lead contamination from fixed sources in the city of Tijuana. An exploratory model is presented that describes the potential polluting sources as well as the exposed universe. The results of the analysis provide a clear picture of the geographic distribution of hazards areas for potential lead pollution in Tijuana. The findings are indicative of the dramatic consequences of rapid industrialization and urbanization in a city where there have not been significant planning efforts to mitigate the negative effects of this growth. The approach followed helps tomore » narrow the universe of potential pollution sources, which can help to direct attention, research priorities, and resources to the most critical areas. 16 refs.« less

  7. Religious magnanimity: reminding people of their religious belief system reduces hostility after threat.

    PubMed

    Schumann, Karina; McGregor, Ian; Nash, Kyle A; Ross, Michael

    2014-09-01

    The present research tested the hypothesis that many people's ambient religious beliefs are non-hostile and magnanimous by assessing whether reminding people of their religious belief systems would reduce hostility after threat. Across religious affiliations, participants reported that their religious belief systems encourage magnanimous behavior. In addition, priming their religious belief systems caused them to act more magnanimously, but only when motivated to adhere to salient ideals (i.e., after threats; see Gailliot, Stillman, Schmeichel, Maner, & Plant, 2008; Jonas et al., 2008). Specifically, in Studies 1-5, we found that a general religious belief system prime ("Which religious belief system do you identify with?") reduced the hostility of people's thoughts, behaviors, and judgments following threat. In Studies 6 and 7, we found that the religious belief system prime only reduced hostile reactions to threat among participants who held religious beliefs that oriented them toward magnanimous ideals (Study 6) and who were dispositionally inclined to adhere to their ideals (Study 7). In Study 8, we found support for the role of magnanimous ideals by demonstrating that directly priming these ideals yielded effects similar to those produced by a religious belief system prime. These studies provide consistent evidence that, by invoking magnanimous ideals, a religious belief system prime promotes less hostile responses to threat. 2014 APA, all rights reserved

  8. Assessing the risk of ignition in the Russian far east within a modeling framework of fire threat.

    PubMed

    Loboda, Tatiana V; Csiszar, Ivan A

    2007-04-01

    The forests of high biological importance in the Russian Far East (RFE) have been experiencing increasing pressure from growing demands for natural resources under the changing economy of post-Soviet Russia. This pressure is further amplified by the rising threat of large and catastrophic fire occurrence, which threatens both the resources and the economic potential of the region. In this paper we introduce a conceptual Fire Threat Model (FTM) and use it to provide quantitative assessment of the risk of ignition in the Russian Far East. The remotely sensed data driven FTM is aimed at evaluating potential wildland fire occurrence and its impact and recovery potential for a given resource. This model is intended for use by resource managers to assist in assessing current levels of fire threat to a given resource, projecting the changes in fire threat under changing climate and land use, and evaluating the efficiency of various management approaches aimed at minimizing the fire impact. Risk of ignition (one of the major uncertainties within fire threat modeling) was analyzed using the MODIS active fire product. The risk of ignition in the RFE is shown to be highly variable in spatial and temporal domains. However, the number of ignition points is not directly proportional to the amount of fire occurrence in the area. Fire ignitions in the RFE are strongly linked to anthropogenic activity (transportation routes, settlements, and land use). An increase in the number of fire ignitions during summer months could be attributed to (1) disruption of the summer monsoons and subsequent changes in fire weather and (2) an increase in natural sources of fire ignitions.

  9. The Perceived Threat of Affirmative Action Policy

    DTIC Science & Technology

    1975-06-06

    as- sumption was made that affirmative action threat was a phenomenon which was separate and distinct from general racial feelings. The...the respond- ents. However, affirmative action threat was found to be differentially related to general racial feelings at the .001 confidence...level. Thus, affirmative action threat feelings were not independent from general racial feelings. Based on the findings of this study, it was

  10. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... threat; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... SECURITY: GENERAL RULES Security Threat Assessments § 1540.205 Procedures for security threat assessment...

  11. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart. (a...

  12. Using resilience and resistance concepts to manage persistent threats to sagebrush ecosystems and greater sage-grouse

    USGS Publications Warehouse

    Chambers, Jeanne C.; Maestas, Jeremy D.; Pyke, David A.; Boyd, Chad S.; Pellant, Mike; Wuenschel, Amarina

    2017-01-01

    Conservation of imperiled species often demands addressing a complex suite of threats that undermine species viability. Regulatory approaches, such as the US Endangered Species Act (1973), tend to focus on anthropogenic threats through adoption of policies and regulatory mechanisms. However, persistent ecosystem-based threats, such as invasive species and altered disturbance regimes, remain critical issues for most at-risk species considered to be conservation-reliant. We describe an approach for addressing persistent ecosystem threats to at-risk species based on ecological resilience and resistance concepts that is currently being used to conserve greater sage-grouse (Centrocercus urophasianus)and sagebrush ecosystems. The approach links biophysical indicators of ecosystem resilience and resistance with species-specific population and habitat requisites in a risk-based framework to identify priority areas for management and guide allocation of resources to manage persistent ecosystem-based threats. US federal land management and natural resource agencies have adopted this framework as a foundation for prioritizing sage-grouse conservation resources and determining effective restoration and management strategies. Because threats and strategies to address them cross-cut program areas, an integrated approach that includes wildland fire operations, postfire rehabilitation, fuels management, and habitat restoration is being used. We believe this approach is applicable to species conservation in other largely intact ecosystems with persistent, ecosystem-based threats.

  13. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  14. Spontaneous swallowing frequency has potential to identify dysphagia in acute stroke.

    PubMed

    Crary, Michael A; Carnaby, Giselle D; Sia, Isaac; Khanna, Anna; Waters, Michael F

    2013-12-01

    Spontaneous swallowing frequency has been described as an index of dysphagia in various health conditions. This study evaluated the potential of spontaneous swallow frequency analysis as a screening protocol for dysphagia in acute stroke. In a cohort of 63 acute stroke cases, swallow frequency rates (swallows per minute [SPM]) were compared with stroke and swallow severity indices, age, time from stroke to assessment, and consciousness level. Mean differences in SPM were compared between patients with versus without clinically significant dysphagia. Receiver operating characteristic curve analysis was used to identify the optimal threshold in SPM, which was compared with a validated clinical dysphagia examination for identification of dysphagia cases. Time series analysis was used to identify the minimally adequate time period to complete spontaneous swallow frequency analysis. SPM correlated significantly with stroke and swallow severity indices but not with age, time from stroke onset, or consciousness level. Patients with dysphagia demonstrated significantly lower SPM rates. SPM differed by dysphagia severity. Receiver operating characteristic curve analysis yielded a threshold of SPM≤0.40 that identified dysphagia (per the criterion referent) with 0.96 sensitivity, 0.68 specificity, and 0.96 negative predictive value. Time series analysis indicated that a 5- to 10-minute sampling window was sufficient to calculate spontaneous swallow frequency to identify dysphagia cases in acute stroke. Spontaneous swallowing frequency presents high potential to screen for dysphagia in acute stroke without the need for trained, available personnel.

  15. Spontaneous Swallowing Frequency [Has Potential to] Identify Dysphagia in Acute Stroke

    PubMed Central

    Carnaby, Giselle D; Sia, Isaac; Khanna, Anna; Waters, Michael

    2014-01-01

    Background and Purpose Spontaneous swallowing frequency has been described as an index of dysphagia in various health conditions. This study evaluated the potential of spontaneous swallow frequency analysis as a screening protocol for dysphagia in acute stroke. Methods In a cohort of 63 acute stroke cases swallow frequency rates (swallows per minute: SPM) were compared to stroke and swallow severity indices, age, time from stroke to assessment, and consciousness level. Mean differences in SPM were compared between patients with vs. without clinically significant dysphagia. ROC analysis was used to identify the optimal threshold in SPM which was compared to a validated clinical dysphagia examination for identification of dysphagia cases. Time series analysis was employed to identify the minimally adequate time period to complete spontaneous swallow frequency analysis. Results SPM correlated significantly with stroke and swallow severity indices but not with age, time from stroke onset, or consciousness level. Patients with dysphagia demonstrated significantly lower SPM rates. SPM differed by dysphagia severity. ROC analysis yielded a threshold of SPM ≤ 0.40 which identified dysphagia (per the criterion referent) with 0.96 sensitivity, 0.68 specificity, and 0.96 negative predictive value. Time series analysis indicated that a 5 to 10 minute sampling window was sufficient to calculate spontaneous swallow frequency to identify dysphagia cases in acute stroke. Conclusions Spontaneous swallowing frequency presents high potential to screen for dysphagia in acute stroke without the need for trained, available personnel. PMID:24149008

  16. An analytical model assessing the potential threat to natural habitats from insect resistance transgenes: continuous transgene input

    PubMed Central

    Kelly, Colleen K; Bowler, Michael; Breden, Felix

    2006-01-01

    The potential effects of ‘escape’ of genetically modified material (transgenes) into natural communities is a major concern in their use. These effects may be limited in the first instance by limiting the proportion of transgene-carrying plants in the natural community. We previously presented an analytical model of the ecological processes governing the relative abundance and persistence of insect resistance (IR) transgenes in a natural community. In that paper, we illustrated the case in which the transgene is input into the community in a single season using data from oilseed rape (OSR) and its known herbivore, Plutella macropennis. We found that the transgene is unlikely to have a great impact on the natural community. Here, we extend the model for repeated input of crop pollen carrying the transgene. We show the model output, again using OSR, for continuous input of the transgene over 10 years, the projected commercial lifetime of a transgene without associated undesirable agronomic effects. Our results do not change our original conclusion that the IR transgene need not have a large impact on the natural community and our suggestions for assessing and mitigating any threat still stand. PMID:17148386

  17. Study protocol for a framework analysis using video review to identify latent safety threats: trauma resuscitation using in situ simulation team training (TRUST)

    PubMed Central

    Petrosoniak, Andrew; Pinkney, Sonia; Hicks, Christopher; White, Kari; Almeida, Ana Paula Siquiera Silva; Campbell, Douglas; McGowan, Melissa; Gray, Alice; Trbovich, Patricia

    2016-01-01

    Introduction Errors in trauma resuscitation are common and have been attributed to breakdowns in the coordination of system elements (eg, tools/technology, physical environment and layout, individual skills/knowledge, team interaction). These breakdowns are triggered by unique circumstances and may go unrecognised by trauma team members or hospital administrators; they can be described as latent safety threats (LSTs). Retrospective approaches to identifying LSTs (ie, after they occur) are likely to be incomplete and prone to bias. To date, prospective studies have not used video review as the primary mechanism to identify any and all LSTs in trauma resuscitation. Methods and analysis A series of 12 unannounced in situ simulations (ISS) will be conducted to prospectively identify LSTs at a level 1 Canadian trauma centre (over 800 dedicated trauma team activations annually). 4 scenarios have already been designed as part of this protocol based on 5 recurring themes found in the hospital's mortality and morbidity process. The actual trauma team will be activated to participate in the study. Each simulation will be audio/video recorded from 4 different camera angles and transcribed to conduct a framework analysis. Video reviewers will code the videos deductively based on a priori themes of LSTs identified from the literature, and/or inductively based on the events occurring in the simulation. LSTs will be prioritised to target interventions in future work. Ethics and dissemination Institutional research ethics approval has been acquired (SMH REB #15-046). Results will be published in peer-reviewed journals and presented at relevant conferences. Findings will also be presented to key institutional stakeholders to inform mitigation strategies for improved patient safety. PMID:27821600

  18. Identifying Potential Norovirus Epidemics in China via Internet Surveillance

    PubMed Central

    Chen, Bin; Jiang, Tao; Cai, Gaofeng; Jiang, Zhenggang; Chen, Yongdi; Wang, Zhengting; Gu, Hua; Chai, Chengliang

    2017-01-01

    Background Norovirus is a common virus that causes acute gastroenteritis worldwide, but a monitoring system for norovirus is unavailable in China. Objective We aimed to identify norovirus epidemics through Internet surveillance and construct an appropriate model to predict potential norovirus infections. Methods The norovirus-related data of a selected outbreak in Jiaxing Municipality, Zhejiang Province of China, in 2014 were collected from immediate epidemiological investigation, and the Internet search volume, as indicated by the Baidu Index, was acquired from the Baidu search engine. All correlated search keywords in relation to norovirus were captured, screened, and composited to establish the composite Baidu Index at different time lags by Spearman rank correlation. The optimal model was chosen and possibly predicted maps in Zhejiang Province were presented by ArcGIS software. Results The combination of two vital keywords at a time lag of 1 day was ultimately identified as optimal (ρ=.924, P<.001). The exponential curve model was constructed to fit the trend of this epidemic, suggesting that a one-unit increase in the mean composite Baidu Index contributed to an increase of norovirus infections by 2.15 times during the outbreak. In addition to Jiaxing Municipality, Hangzhou Municipality might have had some potential epidemics in the study time from the predicted model. Conclusions Although there are limitations with early warning and unavoidable biases, Internet surveillance may be still useful for the monitoring of norovirus epidemics when a monitoring system is unavailable. PMID:28790023

  19. Evaluation of "shotgun" proteomics for identification of biological threat agents in complex environmental matrixes: experimental simulations.

    PubMed

    Verberkmoes, Nathan C; Hervey, W Judson; Shah, Manesh; Land, Miriam; Hauser, Loren; Larimer, Frank W; Van Berkel, Gary J; Goeringer, Douglas E

    2005-02-01

    There is currently a great need for rapid detection and positive identification of biological threat agents, as well as microbial species in general, directly from complex environmental samples. This need is most urgent in the area of homeland security, but also extends into medical, environmental, and agricultural sciences. Mass-spectrometry-based analysis is one of the leading technologies in the field with a diversity of different methodologies for biothreat detection. Over the past few years, "shotgun"proteomics has become one method of choice for the rapid analysis of complex protein mixtures by mass spectrometry. Recently, it was demonstrated that this methodology is capable of distinguishing a target species against a large database of background species from a single-component sample or dual-component mixtures with relatively the same concentration. Here, we examine the potential of shotgun proteomics to analyze a target species in a background of four contaminant species. We tested the capability of a common commercial mass-spectrometry-based shotgun proteomics platform for the detection of the target species (Escherichia coli) at four different concentrations and four different time points of analysis. We also tested the effect of database size on positive identification of the four microbes used in this study by testing a small (13-species) database and a large (261-species) database. The results clearly indicated that this technology could easily identify the target species at 20% in the background mixture at a 60, 120, 180, or 240 min analysis time with the small database. The results also indicated that the target species could easily be identified at 20% or 6% but could not be identified at 0.6% or 0.06% in either a 240 min analysis or a 30 h analysis with the small database. The effects of the large database were severe on the target species where detection above the background at any concentration used in this study was impossible, though the three

  20. A standard lexicon for biodiversity conservation: unified classifications of threats and actions.

    PubMed

    Salafsky, Nick; Salzer, Daniel; Stattersfield, Alison J; Hilton-Taylor, Craig; Neugarten, Rachel; Butchart, Stuart H M; Collen, Ben; Cox, Neil; Master, Lawrence L; O'Connor, Sheila; Wilkie, David

    2008-08-01

    An essential foundation of any science is a standard lexicon. Any given conservation project can be described in terms of the biodiversity targets, direct threats, contributing factors at the project site, and the conservation actions that the project team is employing to change the situation. These common elements can be linked in a causal chain, which represents a theory of change about how the conservation actions are intended to bring about desired project outcomes. If project teams want to describe and share their work and learn from one another, they need a standard and precise lexicon to specifically describe each node along this chain. To date, there have been several independent efforts to develop standard classifications for the direct threats that affect biodiversity and the conservation actions required to counteract these threats. Recognizing that it is far more effective to have only one accepted global scheme, we merged these separate efforts into unified classifications of threats and actions, which we present here. Each classification is a hierarchical listing of terms and associated definitions. The classifications are comprehensive and exclusive at the upper levels of the hierarchy, expandable at the lower levels, and simple, consistent, and scalable at all levels. We tested these classifications by applying them post hoc to 1191 threatened bird species and 737 conservation projects. Almost all threats and actions could be assigned to the new classification systems, save for some cases lacking detailed information. Furthermore, the new classification systems provided an improved way of analyzing and comparing information across projects when compared with earlier systems. We believe that widespread adoption of these classifications will help practitioners more systematically identify threats and appropriate actions, managers to more efficiently set priorities and allocate resources, and most important, facilitate cross-project learning and the

  1. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    PubMed Central

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  2. Dry bulk cargo shipping - An overlooked threat to the marine environment?

    PubMed

    Grote, Matthias; Mazurek, Nicole; Gräbsch, Carolin; Zeilinger, Jana; Le Floch, Stéphane; Wahrendorf, Dierk-Steffen; Höfer, Thomas

    2016-09-15

    Approximately 9.5billiontonnes of goods is transported over the world oceans annually with dry bulk representing the largest cargo group. This paper aims to analyse whether the transport and associated inputs of dry bulks into the sea create a risk for the marine environment. For this purpose, we analyse the international regulatory background concerning environmental protection (MARPOL), estimate quantities and identify inputs of such cargoes into the oceans (accidental and operational), and use available information for hazard assessment. Annually, more than 2.15milliontonnes of dry bulk cargoes are likely to enter the oceans, of which 100,000tonnes are potentially harmful to the marine environment according to the definition included in draft maritime regulation. The assessment of the threat to the marine environment is hampered by a lack of available information on chemical composition, bioavailability and toxicity. Perspectives for amendments of the unsatisfying pollution prevention regulations are discussed. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  3. Political conservatism, authoritarianism, and societal threat: voting for Republican representatives in U.S. Congressional elections from 1946 to 1992.

    PubMed

    McCann, Stewart J H

    2009-07-01

    The author found that the degree of national societal threat preceding congressional elections from 1946 to 1992 was positively associated with the mean state percentage of people voting for Republican representatives, supporting a conventional threat-authoritarianism hypothesis. However, threat was positively associated with the mean state percentage of people voting for Republican representatives in conservative states but not in liberal states, and the conventional threat-authoritarianism link was entirely driven by the relation in conservative states. The author classified states with a composite measure (alpha = .92) on the basis of state ideological identification, religious fundamentalism, composite policy liberalism, Republican Party elite ideology, and Democratic Party elite ideology. These results offer support to an interactive threat-authoritarianism hypothesis derived from the authoritarian dynamic theory of K. Stenner (2005), which postulates that only authoritarian persons are activated to manifest authoritarian behavior in times of normative threat. Also, the author discusses potential alternative explanations on the basis of system justification, need for closure, and terror-management theories.

  4. Resilience, Vulnerability and Residual Threat: An Assessment from Indian Sundarban

    NASA Astrophysics Data System (ADS)

    Ghosh, T.

    2016-12-01

    The estuarine islands within Indian Sundarban are extremely vulnerable due to climate change, erosion, flooding and increasing population pressure. Around 4.6 million people are living under constant threat of climatic shocks, affecting their farm based economy and dependency on forest resources for their livelihood. This paper attempts to focus on the dynamics of system's resilience in the backdrop of higher level of vulnerability. Globally the assessment of island vulnerability is generally more focused towards the climate change impacts, rather than taking into account other determining drivers with proper weightage. Three estuarine islands namely Sagar, Ghoramara and Mousani at the western part of Indian Sundarban Delta (ISD) have been chosen for this study to derive the indicator based scoring method using the household survey data from twenty seven (27) sampled `Mouza' (lowest administrative boundary; village) with cluster random sampling. Vulnerability and resilience of these islands have been calculated using the indicators like housing condition, electrification, population density, accretion, adult secondary education level, percentage of people `Below Poverty Line' (BPL) based on per capita income. Residual threats for these islands have been obtained by subtracting the score of resilience and vulnerability of the system. Result suggests that all these islands are in less resilient condition to combat the negative impact of the influencing factors. Sapkhali, Ghoramara, Bankimnagar, Shibpur and Baliara are becoming sensitive from excess residual threats. This study is an initiation for identifying the thrust areas need to address with effective policy adaptation, necessary to minimize the existing vulnerable conditions in these islands. Key words: Vulnerability, Resilience, Residual threat, Indian Sundarban

  5. [Health threats and health system crises. An approach to early warning and response. 2008 SESPAS Report].

    PubMed

    Simón Soria, Fernando; Guillén Enríquez, Francisco Javier

    2008-04-01

    The world is changing more and faster than ever before. New diseases are coming to light each year, controlled diseases are reemerging as potential threats, and natural or man-made disasters are increasingly affecting human health. The "International Health Regulations (2005)" reflect the changes in the response of public health to this new situation. Surveillance of specific diseases and predefined control measures have been replaced by surveillance of public health events of international concern and control measures adapted to each situation. The public health events of international interest are characterized by their seriousness, predictability, the risk of international spread and potential for travel or trade restrictions. The development of the European Early Warning and Response System in 1998 and the creation of the European Center for Disease Prevention and Control in 2005 demonstrate political commitment in Europe, with early detection of and response to public health threats. However, timely risk evaluation and response at a national level requires improved data digitalization and accessibility, automatic notification processes, data analysis and dissemination of information, the combination of information from multiple sources and adaptation of public health services. The autonomous regions in Spain are initiating this adaptation process, but interoperability between systems and the development of guidelines for a coordinated response should be steered by the National Interregional Health Council and coordinated by the Ministry of Health. Efficient early warning systems of health threats that allow for a timely response and reduce uncertainty about information would help to minimize the risk of public health crises. The profile of public health threats is nonspecific. Early detection of threats requires access to information from multiple sources and efficient risk assessment. Key factors for improving the response to public health threats are the

  6. Stereotype threat lowers older adults’ self-reported hearing abilities

    PubMed Central

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  7. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    PubMed

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  8. Analysis of Strengths, Weaknesses, Opportunities, and Threats as a Tool for Translating Evidence into Individualized Medical Strategies (I-SWOT).

    PubMed

    von Kodolitsch, Yskert; Bernhardt, Alexander M; Robinson, Peter N; Kölbel, Tilo; Reichenspurner, Hermann; Debus, Sebastian; Detter, Christian

    2015-06-01

    It is the physicians' task to translate evidence and guidelines into medical strategies for individual patients. Until today, however, there is no formal tool that is instrumental to perform this translation. We introduce the analysis of strengths (S) and weaknesses (W) related to therapy with opportunities (O) and threats (T) related to individual patients as a tool to establish an individualized (I) medical strategy (I-SWOT). The I-SWOT matrix identifies four fundamental types of strategy. These comprise "SO" maximizing strengths and opportunities, "WT" minimizing weaknesses and threats, "WO" minimizing weaknesses and maximizing opportunities, and "ST" maximizing strengths and minimizing threats. Each distinct type of strategy may be considered for individualized medical strategies. We describe four steps of I-SWOT to establish an individualized medical strategy to treat aortic disease. In the first step, we define the goal of therapy and identify all evidence-based therapeutic options. In a second step, we assess strengths and weaknesses of each therapeutic option in a SW matrix form. In a third step, we assess opportunities and threats related to the individual patient, and in a final step, we use the I-SWOT matrix to establish an individualized medical strategy through matching "SW" with "OT". As an example we present two 30-year-old patients with Marfan syndrome with identical medical history and aortic pathology. As a result of I-SWOT analysis of their individual opportunities and threats, we identified two distinct medical strategies in these patients. I-SWOT is a formal but easy to use tool to translate medical evidence into individualized medical strategies.

  9. Childhood maltreatment and threats with weapons.

    PubMed

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  10. An Initial Investigation into the Role of Stereotype Threat in the Test Performance of College Students with Learning Disabilities

    ERIC Educational Resources Information Center

    May, Alison L.; Stone, C. Addison

    2014-01-01

    In a quasi-experimental evaluation of the possible role of stereotype threat in the academic performance of college students with learning disabilities (LD), students with (N = 29) and without (N = 62) identified LD took a simulated Verbal GRE® task in one of two conditions modeled after those used in past stereotype threat (ST) research. The task…

  11. The spatial distribution of threats to plant species with extremely small populations

    NASA Astrophysics Data System (ADS)

    Wang, Chunjing; Zhang, Jing; Wan, Jizhong; Qu, Hong; Mu, Xianyun; Zhang, Zhixiang

    2017-03-01

    Many biological conservationists take actions to conserve plant species with extremely small populations (PSESP) in China; however, there have been few studies on the spatial distribution of threats to PSESP. Hence, we selected distribution data of PSESP and made a map of the spatial distribution of threats to PSESP in China. First, we used the weight assignment method to evaluate the threat risk to PSESP at both country and county scales. Second, we used a geographic information system to map the spatial distribution of threats to PSESP, and explored the threat factors based on linear regression analysis. Finally, we suggested some effective conservation options. We found that the PSESP with high values of protection, such as the plants with high scientific research values and ornamental plants, were threatened by over-exploitation and utilization, habitat fragmentation, and a small sized wild population in broad-leaved forests and bush fallows. We also identified some risk hotspots for PSESP in China. Regions with low elevation should be given priority for ex- and in-situ conservation. Moreover, climate change should be considered for conservation of PSESP. To avoid intensive over-exploitation or utilization and habitat fragmentation, in-situ conservation should be practiced in regions with high temperatures and low temperature seasonality, particularly in the high risk hotspots for PSESP that we proposed. Ex-situ conservation should be applied in these same regions, and over-exploitation and utilization of natural resources should be prevented. It is our goal to apply the concept of PSESP to the global scale in the future.

  12. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  13. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  14. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  15. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  16. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  17. Neurobiological correlates of distinct post-traumatic stress disorder symptom profiles during threat anticipation in combat veterans.

    PubMed

    Grupe, D W; Wielgosz, J; Davidson, R J; Nitschke, J B

    2016-07-01

    Previous research in post-traumatic stress disorder (PTSD) has identified disrupted ventromedial prefrontal cortex (vmPFC) function in those with v. without PTSD. It is unclear whether this brain region is uniformly affected in all individuals with PTSD, or whether vmPFC dysfunction is related to individual differences in discrete features of this heterogeneous disorder. In a sample of 51 male veterans of Operation Enduring Freedom/Operation Iraqi Freedom, we collected functional magnetic resonance imaging data during a novel threat anticipation task with crossed factors of threat condition and temporal unpredictability. Voxelwise regression analyses related anticipatory brain activation to individual differences in overall PTSD symptom severity, as well as individual differences in discrete symptom subscales (re-experiencing, emotional numbing/avoidance, and hyperarousal). The vmPFC showed greater anticipatory responses for safety relative to threat, driven primarily by deactivation during threat anticipation. During unpredictable threat anticipation, increased PTSD symptoms were associated with relatively greater activation for threat v. However, simultaneous regression on individual symptom subscales demonstrated that this effect was driven specifically by individual differences in hyperarousal symptoms. Furthermore, this analysis revealed an additional, anatomically distinct region of the vmPFC in which re-experiencing symptoms were associated with greater activation during threat anticipation. Increased anticipatory responses to unpredictable threat in distinct vmPFC subregions were uniquely associated with elevated hyperarousal and re-experiencing symptoms in combat veterans. These results underscore the disruptive impact of uncertainty for veterans, and suggest that investigating individual differences in discrete aspects of PTSD may advance our understanding of underlying neurobiological mechanisms.

  18. Stereotype Threat in Classroom Settings: The Interactive Effect of Domain Identification, Task Difficulty and Stereotype Threat on Female Students' Maths Performance

    ERIC Educational Resources Information Center

    Keller, Johannes

    2007-01-01

    Background: Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths…

  19. Threat-Detection and Attentional Bias to Threat in Women Recovered from Anorexia Nervosa: Neural Alterations in Extrastriate and Medial Prefrontal Cortices.

    PubMed

    Bang, Lasse; Rø, Øyvind; Endestad, Tor

    2017-03-01

    Behavioral studies have shown that anorexia nervosa (AN) is associated with attentional bias to general threat cues. The neurobiological underpinnings of attentional bias to threat in AN are unknown. This study investigated the neural responses associated with threat-detection and attentional bias to threat in AN. We measured neural responses to a dot-probe task, involving pairs of angry and neutral face stimuli, in 22 adult women recovered from AN and 21 comparison women. Recovered AN women did not exhibit a behavioral attentional bias to threat. In response to angry faces, recovered women showed significant hypoactivation in the extrastriate cortex. During attentional bias to angry faces, recovered women showed significant hyperactivation in the medial prefrontal cortex. This was because of significant deactivation in comparison women, which was absent in recovered AN women. Women recovered from AN are characterized by altered neural responses to threat cues. Copyright © 2016 John Wiley & Sons, Ltd and Eating Disorders Association. Copyright © 2016 John Wiley & Sons, Ltd and Eating Disorders Association.

  20. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    PubMed Central

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  1. Use of High-Resolution WRF Simulations to Forecast Lightning Threat

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.; LaCasse, K.; Goodman, S. J.; Cecil, D. J.

    2008-01-01

    Recent observational studies have confirmed the existence of a robust statistical relationship between lightning flash rates and the amount of large precipitating ice hydrometeors aloft in storms. This relationship is exploited, in conjunction with the capabilities of cloud-resolving forecast models such as WRF, to forecast explicitly the threat of lightning from convective storms using selected output fields from the model forecasts. The simulated vertical flux of graupel at -15C and the shape of the simulated reflectivity profile are tested in this study as proxies for charge separation processes and their associated lightning risk. Our lightning forecast method differs from others in that it is entirely based on high-resolution simulation output, without reliance on any climatological data. short [6-8 h) simulations are conducted for a number of case studies for which three-dmmensional lightning validation data from the North Alabama Lightning Mapping Array are available. Experiments indicate that initialization of the WRF model on a 2 km grid using Eta boundary conditions, Doppler radar radial velocity fields, and METAR and ACARS data y&eld satisfactory simulations. __nalyses of the lightning threat fields suggests that both the graupel flux and reflectivity profile approaches, when properly calibrated, can yield reasonable lightning threat forecasts, although an ensemble approach is probably desirable in order to reduce the tendency for misplacement of modeled storms to hurt the accuracy of the forecasts. Our lightning threat forecasts are also compared to other more traditional means of forecasting thunderstorms, such as those based on inspection of the convective available potential energy field.

  2. Race and imprisonments: vigilante violence, minority threat, and racial politics.

    PubMed

    Jacobs, David; Malone, Chad; Iles, Gale

    2012-01-01

    The effects of lynchings on criminal justice outcomes have seldom been examined. Recent findings also are inconsistent about the effects of race on imprisonments. This study uses a pooled time-series design to assess lynching and racial threat effects on state imprisonments from 1972 to 2000. After controlling for Republican strength, conservatism, and other factors, lynch rates explain the growth in admission rates. The findings also show that increases in black residents produce subsequent expansions in imprisonments that likely are attributable to white reactions to this purported menace. But after the percentage of blacks reaches a substantial threshold—and the potential black vote becomes large enough to begin to reduce these harsh punishments—reductions in prison admissions occur. These results also confirm a political version of racial threat theory by indicating that increased Republican political strength produces additional imprisonments.

  3. Space Weather Impacts on Spacecraft Operations: Identifying and Establishing High-Priority Operational Services

    NASA Astrophysics Data System (ADS)

    Lawrence, G.; Reid, S.; Tranquille, C.; Evans, H.

    2013-12-01

    Space Weather is a multi-disciplinary and cross-domain system defined as, 'The physical and phenomenological state of natural space environments. The associated discipline aims, through observation, monitoring, analysis and modelling, at understanding and predicting the state of the Sun, the interplanetary and planetary environments, and the solar and non-solar driven perturbations that affect them, and also at forecasting and nowcasting the potential impacts on biological and technological systems'. National and Agency-level efforts to provide services addressing the myriad problems, such as ESA's SSA programme are therefore typically complex and ambitious undertakings to introduce a comprehensive suite of services aimed at a large number and broad range of end users. We focus on some of the particular threats and risks that Space Weather events pose to the Spacecraft Operations community, and the resulting implications in terms of User Requirements. We describe some of the highest-priority service elements identified as being needed by the Operations community, and outline some service components that are presently available, or under development. The particular threats and risks often vary according to orbit, so the particular User Needs for Operators at LEO, MEO and GEO are elaborated. The inter-relationship between these needed service elements and existing service components within the broader Space Weather domain is explored. Some high-priority service elements and potential correlation with Space Weather drivers include: solar array degradation and energetic proton storms; single event upsets at GEO and solar proton events and galactic cosmic rays; surface charging and deep dielectric charging at MEO and radiation belt dynamics; SEUs at LEO and the South Atlantic Anomaly and its variability. We examine the current capability to provide operational services addressing such threats and identify some advances that the Operations community can expect to benefit

  4. Keeping Schools Safe through Threat Assessment

    ERIC Educational Resources Information Center

    Barton, Rhonda

    2008-01-01

    This article illustrates how effective a threat assessment program like the Mid-Valley Student Threat Assessment (STAT) program can be in dealing with violent and threatening students. STAT is a a regional system that draws together resources from schools, mental health agencies, law enforcement bureaus, and other youth-serving organizations in…

  5. Impact of the threat of war on children in military families.

    PubMed

    Ryan-Wenger, Nancy A

    2002-01-01

    The potential for war is a pervasive threat to the security and family structure of children in military families. This study compared children of active-duty, reserve, and civilian families with respect to their perceptions of war, origin of fears related to war, levels of manifest anxiety, coping strategies, and projection of emotional problems in human figure drawings.

  6. Multiple social identities and stereotype threat: imbalance, accessibility, and working memory.

    PubMed

    Rydell, Robert J; McConnell, Allen R; Beilock, Sian L

    2009-05-01

    In 4 experiments, the authors showed that concurrently making positive and negative self-relevant stereotypes available about performance in the same ability domain can eliminate stereotype threat effects. Replicating past work, the authors demonstrated that introducing negative stereotypes about women's math performance activated participants' female social identity and hurt their math performance (i.e., stereotype threat) by reducing working memory. Moving beyond past work, it was also demonstrated that concomitantly presenting a positive self-relevant stereotype (e.g., college students are good at math) increased the relative accessibility of females' college student identity and inhibited their gender identity, eliminating attendant working memory deficits and contingent math performance decrements. Furthermore, subtle manipulations in questions presented in the demographic section of a math test eliminated stereotype threat effects that result from women reporting their gender before completing the test. This work identifies the motivated processes through which people's social identities became active in situations in which self-relevant stereotypes about a stigmatized group membership and a nonstigmatized group membership were available. In addition, it demonstrates the downstream consequences of this pattern of activation on working memory and performance. Copyright (c) 2009 APA, all rights reserved.

  7. Using Social Media Data to Identify Potential Candidates for Drug Repurposing: A Feasibility Study.

    PubMed

    Rastegar-Mojarad, Majid; Liu, Hongfang; Nambisan, Priya

    2016-06-16

    Drug repurposing (defined as discovering new indications for existing drugs) could play a significant role in drug development, especially considering the declining success rates of developing novel drugs. Typically, new indications for existing medications are identified by accident. However, new technologies and a large number of available resources enable the development of systematic approaches to identify and validate drug-repurposing candidates. Patients today report their experiences with medications on social media and reveal side effects as well as beneficial effects of those medications. Our aim was to assess the feasibility of using patient reviews from social media to identify potential candidates for drug repurposing. We retrieved patient reviews of 180 medications from an online forum, WebMD. Using dictionary-based and machine learning approaches, we identified disease names in the reviews. Several publicly available resources were used to exclude comments containing known indications and adverse drug effects. After manually reviewing some of the remaining comments, we implemented a rule-based system to identify beneficial effects. The dictionary-based system and machine learning system identified 2178 and 6171 disease names respectively in 64,616 patient comments. We provided a list of 10 common patterns that patients used to report any beneficial effects or uses of medication. After manually reviewing the comments tagged by our rule-based system, we identified five potential drug repurposing candidates. To our knowledge, this is the first study to consider using social media data to identify drug-repurposing candidates. We found that even a rule-based system, with a limited number of rules, could identify beneficial effect mentions in patient comments. Our preliminary study shows that social media has the potential to be used in drug repurposing.

  8. Heat tolerance around flowering in wheat identified as a key trait for increased yield potential in Europe under climate change

    PubMed Central

    Stratonovitch, Pierre; Semenov, Mikhail A.

    2015-01-01

    To deliver food security for the 9 billon population in 2050, a 70% increase in world food supply will be required. Projected climatic and environmental changes emphasize the need for breeding strategies that delivers both a substantial increase in yield potential and resilience to extreme weather events such as heat waves, late frost, and drought. Heat stress around sensitive stages of wheat development has been identified as a possible threat to wheat production in Europe. However, no estimates have been made to assess yield losses due to increased frequency and magnitude of heat stress under climate change. Using existing experimental data, the Sirius wheat model was refined by incorporating the effects of extreme temperature during flowering and grain filling on accelerated leaf senescence, grain number, and grain weight. This allowed us, for the first time, to quantify yield losses resulting from heat stress under climate change. The model was used to optimize wheat ideotypes for CMIP5-based climate scenarios for 2050 at six sites in Europe with diverse climates. The yield potential for heat-tolerant ideotypes can be substantially increased in the future (e.g. by 80% at Seville, 100% at Debrecen) compared with the current cultivars by selecting an optimal combination of wheat traits, e.g. optimal phenology and extended duration of grain filling. However, at two sites, Seville and Debrecen, the grain yields of heat-sensitive ideotypes were substantially lower (by 54% and 16%) and more variable compared with heat-tolerant ideotypes, because the extended grain filling required for the increased yield potential was in conflict with episodes of high temperature during flowering and grain filling. Despite much earlier flowering at these sites, the risk of heat stress affecting yields of heat-sensitive ideotypes remained high. Therefore, heat tolerance in wheat is likely to become a key trait for increased yield potential and yield stability in southern Europe in the

  9. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    PubMed

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  10. "The impact of uncertain threat on affective bias: Individual differences in response to ambiguity": Correction.

    PubMed

    2018-04-01

    Reports an error in "The impact of uncertain threat on affective bias: Individual differences in response to ambiguity" by Maital Neta, Julie Cantelon, Zachary Haga, Caroline R. Mahoney, Holly A. Taylor and F. Caroline Davis ( Emotion , 2017[Dec], Vol 17[8], 1137-1143). In this article, the copyright attribution was incorrectly listed under the Creative Commons CC-BY license due to production-related error. The correct copyright should be "In the public domain." The online version of this article has been corrected. (The following abstract of the original article appeared in record 2017-40275-001.) Individuals who operate under highly stressful conditions (e.g., military personnel and first responders) are often faced with the challenge of quickly interpreting ambiguous information in uncertain and threatening environments. When faced with ambiguity, it is likely adaptive to view potentially dangerous stimuli as threatening until contextual information proves otherwise. One laboratory-based paradigm that can be used to simulate uncertain threat is known as threat of shock (TOS), in which participants are told that they might receive mild but unpredictable electric shocks while performing an unrelated task. The uncertainty associated with this potential threat induces a state of emotional arousal that is not overwhelmingly stressful, but has widespread-both adaptive and maladaptive-effects on cognitive and affective function. For example, TOS is thought to enhance aversive processing and abolish positivity bias. Importantly, in certain situations (e.g., when walking home alone at night), this anxiety can promote an adaptive state of heightened vigilance and defense mobilization. In the present study, we used TOS to examine the effects of uncertain threat on valence bias, or the tendency to interpret ambiguous social cues as positive or negative. As predicted, we found that heightened emotional arousal elicited by TOS was associated with an increased tendency to

  11. Canine distemper virus as a threat to wild tigers in Russia and across their range.

    PubMed

    Gilbert, Martin; Soutyrina, Svetlana V; Seryodkin, Ivan V; Sulikhan, Nadezhda; Uphyrkina, Olga V; Goncharuk, Mikhail; Matthews, Louise; Cleaveland, Sarah; Miquelle, Dale G

    2015-07-01

    Canine distemper virus (CDV) has recently been identified in populations of wild tigers in Russia and India. Tiger populations are generally too small to maintain CDV for long periods, but are at risk of infections arising from more abundant susceptible hosts that constitute a reservoir of infection. Because CDV is an additive mortality factor, it could represent a significant threat to small, isolated tiger populations. In Russia, CDV was associated with the deaths of tigers in 2004 and 2010, and was coincident with a localized decline of tigers in Sikhote-Alin Biosphere Zapovednik (from 25 tigers in 2008 to 9 in 2012). Habitat continuity with surrounding areas likely played an important role in promoting an ongoing recovery. We recommend steps be taken to assess the presence and the impact of CDV in all tiger range states, but should not detract focus away from the primary threats to tigers, which include habitat loss and fragmentation, poaching and retaliatory killing. Research priorities include: (i) recognition and diagnosis of clinical cases of CDV in tigers when they occur; and (ii) collection of baseline data on the health of wild tigers. CDV infection of individual tigers need not imply a conservation threat, and modeling should complement disease surveillance and targeted research to assess the potential impact to tiger populations across the range of ecosystems, population densities and climate extremes occupied by tigers. Describing the role of domestic and wild carnivores as contributors to a local CDV reservoir is an important precursor to considering control measures. © 2015 International Society of Zoological Sciences, Institute of Zoology/Chinese Academy of Sciences and Wiley Publishing Asia Pty Ltd.

  12. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... prevent completion of the threat assessment). (5) Gender. (6) Country of citizenship. (7) If the applicant... subpart remains valid for five years from the date that TSA issues a Determination of No Security Threat...

  13. Strengths weaknesses opportunities and threats of blended learning: students' perceptions.

    PubMed

    Hande, S

    2014-05-01

    Blended learning (BL) in a cell biology course of the premedical program at the Kasturba Medical College International Centre, Manipal, India, commenced in 2006. The program provides training in basic sciences to students, especially from the United States and Canada. The approach to the study was phenomenographic, with a qualitative study design using an open-ended questionnaire, focused interviews and empirical observations. The aim of this study was to identify the strengths, weaknesses, opportunities and threats (SWOT) of BL in a premedical class. It was a cross-sectional study. Ninety six students in a premedical cell biology class participated in the study. SWOT analysis of students' perceptions was conducted manually. Statistical analysis included content analysis of qualitative data to classify data and aligning them into the SWOT analysis matrix. The outcomes of the study revealed student perceptions in terms of SWOT of BL and the potential uses of this strategy. The study provides background for educators and curriculum experts to plan their modules while incorporating a BL approach.

  14. Strengths Weaknesses Opportunities and Threats of Blended Learning: Students’ Perceptions

    PubMed Central

    Hande, S

    2014-01-01

    Background: Blended learning (BL) in a cell biology course of the premedical program at the Kasturba Medical College International Centre, Manipal, India, commenced in 2006. The program provides training in basic sciences to students, especially from the United States and Canada. The approach to the study was phenomenographic, with a qualitative study design using an open-ended questionnaire, focused interviews and empirical observations. Aim: The aim of this study was to identify the strengths, weaknesses, opportunities and threats (SWOT) of BL in a premedical class. Subjects and Methods: It was a cross-sectional study. Ninety six students in a premedical cell biology class participated in the study. SWOT analysis of students’ perceptions was conducted manually. Statistical analysis included content analysis of qualitative data to classify data and aligning them into the SWOT analysis matrix. Results: The outcomes of the study revealed student perceptions in terms of SWOT of BL and the potential uses of this strategy. Conclusions: The study provides background for educators and curriculum experts to plan their modules while incorporating a BL approach. PMID:24971204

  15. Study protocol for a framework analysis using video review to identify latent safety threats: trauma resuscitation using in situ simulation team training (TRUST).

    PubMed

    Fan, Mark; Petrosoniak, Andrew; Pinkney, Sonia; Hicks, Christopher; White, Kari; Almeida, Ana Paula Siquiera Silva; Campbell, Douglas; McGowan, Melissa; Gray, Alice; Trbovich, Patricia

    2016-11-07

    Errors in trauma resuscitation are common and have been attributed to breakdowns in the coordination of system elements (eg, tools/technology, physical environment and layout, individual skills/knowledge, team interaction). These breakdowns are triggered by unique circumstances and may go unrecognised by trauma team members or hospital administrators; they can be described as latent safety threats (LSTs). Retrospective approaches to identifying LSTs (ie, after they occur) are likely to be incomplete and prone to bias. To date, prospective studies have not used video review as the primary mechanism to identify any and all LSTs in trauma resuscitation. A series of 12 unannounced in situ simulations (ISS) will be conducted to prospectively identify LSTs at a level 1 Canadian trauma centre (over 800 dedicated trauma team activations annually). 4 scenarios have already been designed as part of this protocol based on 5 recurring themes found in the hospital's mortality and morbidity process. The actual trauma team will be activated to participate in the study. Each simulation will be audio/video recorded from 4 different camera angles and transcribed to conduct a framework analysis. Video reviewers will code the videos deductively based on a priori themes of LSTs identified from the literature, and/or inductively based on the events occurring in the simulation. LSTs will be prioritised to target interventions in future work. Institutional research ethics approval has been acquired (SMH REB #15-046). Results will be published in peer-reviewed journals and presented at relevant conferences. Findings will also be presented to key institutional stakeholders to inform mitigation strategies for improved patient safety. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  16. Identifying High Academic Potential in Australian Aboriginal Children Using Dynamic Testing

    ERIC Educational Resources Information Center

    Chaffey, Graham W.; Bailey, Stan B.; Vine, Ken W.

    2015-01-01

    The primary purpose of this study was to determine the effectiveness of dynamic testing as a method for identifying high academic potential in Australian Aboriginal children. The 79 participating Aboriginal children were drawn from Years 3-5 in rural schools in northern New South Wales. The dynamic testing method used in this study involved a…

  17. Stereotype Threat Alters the Subjective Experience of Memory.

    PubMed

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  18. Compensating, resisting, and breaking: a meta-analytic examination of reactions to self-esteem threat.

    PubMed

    vanDellen, Michelle R; Campbell, W Keith; Hoyle, Rick H; Bradfield, Erin K

    2011-02-01

    Much research has identified how people react to receiving threatening information about the self. The purpose of this article is to discuss such experiences in the context of a model of state self-esteem regulation. The authors propose that people engage in one of three regulatory responses to threat: compensation, resistance, and breaking. They conduct a meta-analysis aimed to examine when people engage in each of these three responses to threat and how trait self-esteem affects the selection and success of selecting each regulatory response. Furthermore, the authors test six theoretical models that might explain why responses to ego threat vary across level of trait self-esteem. The models for differences between people with low and high trait self-esteem that fit the data best suggest that (a) self-esteem serves as a resource and (b) there is a self-verification motivation.

  19. Neural time course of threat-related attentional bias and interference in panic and obsessive-compulsive disorders.

    PubMed

    Thomas, Susan J; Gonsalvez, Craig J; Johnstone, Stuart J

    2013-09-01

    Attentional biases to threat are considered central to anxiety disorders, however physiological evidence of their nature and time course is lacking. Event-related potentials (ERPs) characterized sensory and cognitive changes while 20 outpatients with panic disorder (PD), 20 with obsessive-compulsive disorder (OCD), and 20 healthy controls (HCs) responded to the color (emotional Stroop task) or meaning of threatening and neutral stimuli. ERPs indicated larger P1 amplitude and longer N1 latency in OCD, and shorter P1 latency in PD, to threatening (versus neutral) stimuli, across instructions to attend to, or ignore, threat content. Emotional Stroop interference correlated with phobic anxiety and was significant in PD. Participants with emotional Stroop interference had augmented P1 and P3 amplitudes to threat (versus neutral) stimuli when color-naming. The results suggest early attentional biases to threat in both disorders, with disorder-specific characteristics. ERPs supported preferential early attentional capture and cognitive elaboration hypotheses of emotional Stroop interference. Copyright © 2013 Elsevier B.V. All rights reserved.

  20. Mechanisms of change in ERP treatment of compulsive hand washing: does primary threat make a difference?

    PubMed

    Cougle, Jesse R; Wolitzky-Taylor, Kate B; Lee, Han-Joo; Telch, Michael J

    2007-07-01

    The present study sought to examine patterns of habituation in exposure and response prevention (ERP) treatment of compulsive hand washing. Sub-clinical compulsive washers (n=27) with illness or non-illness primary threats were compared in order to detect potential differences in response to a single session of ERP. Changes in anxiety, disgust, and urge to wash were analyzed, and significant reductions in both anxiety and disgust were noted. Urge to wash significantly declined among washers primarily concerned with illness; among those concerned with non-illness threats, urge to wash did not significantly decline. Moreover, anxiety was found to decline when controlling for disgust and vice versa. Lastly, when both anxiety and disgust were entered into a model predicting changes in urge to wash, anxiety but not disgust predicted urge to wash for those with illness-related threats; for washers with non-illness threats, the findings were the reverse. Several clinical and theoretical implications are discussed.

  1. Storm in a coffee cup: caffeine modifies brain activation to social signals of threat

    PubMed Central

    Lawrence, Andrew D.; Diukova, Ana; Wise, Richard G.; Rogers, Peter J.

    2012-01-01

    Caffeine, an adenosine A1 and A2A receptor antagonist, is the most popular psychostimulant drug in the world, but it is also anxiogenic. The neural correlates of caffeine-induced anxiety are currently unknown. This study investigated the effects of caffeine on brain regions implicated in social threat processing and anxiety. Participants were 14 healthy male non/infrequent caffeine consumers. In a double-blind placebo-controlled crossover design, they underwent blood oxygenation level-dependent functional magnetic resonance imaging (fMRI) while performing an emotional face processing task 1 h after receiving caffeine (250 mg) or placebo in two fMRI sessions (counterbalanced, 1-week washout). They rated anxiety and mental alertness, and their blood pressure was measured, before and 2 h after treatment. Results showed that caffeine induced threat-related (angry/fearful faces > happy faces) midbrain-periaqueductal gray activation and abolished threat-related medial prefrontal cortex wall activation. Effects of caffeine on extent of threat-related amygdala activation correlated negatively with level of dietary caffeine intake. In concurrence with these changes in threat-related brain activation, caffeine increased self-rated anxiety and diastolic blood pressure. Caffeine did not affect primary visual cortex activation. These results are the first to demonstrate potential neural correlates of the anxiogenic effect of caffeine, and they implicate the amygdala as a key site for caffeine tolerance. PMID:21972425

  2. Neural Bases of Social Anxiety Disorder: Emotional Reactivity and Cognitive Regulation During Social and Physical Threat

    PubMed Central

    Goldin, Philippe R.; Manber, Tali; Hakimi, Shabnam; Canli, Turhan; Gross, James J.

    2014-01-01

    exaggerated negative emotion reactivity and reduced cognitive regulation related neural activation, specifically for social threat stimuli. These findings help to elucidate potential neural mechanisms of emotion regulation that might serve as biomarkers for interventions for social anxiety disorder. PMID:19188539

  3. Face processing in adolescents with positive and negative threat bias.

    PubMed

    Sylvester, C M; Petersen, S E; Luby, J L; Barch, D M

    2017-04-01

    Individuals with anxiety disorders exhibit a 'vigilance-avoidance' pattern of attention to threatening stimuli when threatening and neutral stimuli are presented simultaneously, a phenomenon referred to as 'threat bias'. Modifying threat bias through cognitive retraining during adolescence reduces symptoms of anxiety, and so elucidating neural mechanisms of threat bias during adolescence is of high importance. We explored neural mechanisms by testing whether threat bias in adolescents is associated with generalized or threat-specific differences in the neural processing of faces. Subjects were categorized into those with (n = 25) and without (n = 27) threat avoidance based on a dot-probe task at average age 12.9 years. Threat avoidance in this cohort has previously been shown to index threat bias. Brain response to individually presented angry and neutral faces was assessed in a separate session using functional magnetic resonance imaging. Adolescents with threat avoidance exhibited lower activity for both angry and neutral faces relative to controls in several regions in the occipital, parietal, and temporal lobes involved in early visual and facial processing. Results generalized to happy, sad, and fearful faces. Adolescents with a prior history of depression and/or an anxiety disorder had lower activity for all faces in these same regions. A subset of results replicated in an independent dataset. Threat bias is associated with generalized, rather than threat-specific, differences in the neural processing of faces in adolescents. Findings may aid in the development of novel treatments for anxiety disorders that use attention training to modify threat bias.

  4. Men Respond Too: The Effects of a Social-Evaluative Body Image Threat on Shame and Cortisol in University Men

    PubMed Central

    Lamarche, Larkin; Ozimok, Brianne; Gammage, Kimberley L.; Muir, Cameron

    2017-01-01

    Framed within social self-preservation theory, the present study investigated men’s psychobiological responses to social-evaluative body image threats. University men (n = 66) were randomly assigned to either a high or low social-evaluative body image threat condition. Participants provided saliva samples (to assess cortisol) and completed measures of state body shame prior to and following their condition, during which anthropometric and strength measures were assessed. Baseline corrected values indicated men in the high social-evaluative body image threat condition had higher body shame and cortisol than men in the low social-evaluative body image threat condition. These findings suggest that social evaluation in the context of situations that threaten body image leads to potentially negative psychobiological responses in college men. PMID:28891388

  5. Men Respond Too: The Effects of a Social-Evaluative Body Image Threat on Shame and Cortisol in University Men.

    PubMed

    Lamarche, Larkin; Ozimok, Brianne; Gammage, Kimberley L; Muir, Cameron

    2017-11-01

    Framed within social self-preservation theory, the present study investigated men's psychobiological responses to social-evaluative body image threats. University men ( n = 66) were randomly assigned to either a high or low social-evaluative body image threat condition. Participants provided saliva samples (to assess cortisol) and completed measures of state body shame prior to and following their condition, during which anthropometric and strength measures were assessed. Baseline corrected values indicated men in the high social-evaluative body image threat condition had higher body shame and cortisol than men in the low social-evaluative body image threat condition. These findings suggest that social evaluation in the context of situations that threaten body image leads to potentially negative psychobiological responses in college men.

  6. Explosives (and other threats) detection using pulsed neutron interrogation and optimized detectors

    NASA Astrophysics Data System (ADS)

    Strellis, Dan A.; Elsalim, Mashal; Gozani, Tsahi

    2011-06-01

    We have previously reported results from a human-portable system using neutron interrogation to detect contraband and explosives. We summarized our methodology for distinguishing threat materials such as narcotics, C4, and mustard gas in the myriad of backgrounds present in the maritime environment. We are expanding our mission for the Domestic Nuclear Detection Office (DNDO) to detect Special Nuclear Material (SNM) through the detection of multiple fission signatures without compromising the conventional threat detection performance. This paper covers our initial investigations into using neutrons from compact pulsed neutron generators via the d(D,n)3He or d(T,n)α reactions with energies of ~2.5 and 14 MeV, respectively, for explosives (and other threats) detection along with a variety of gamma-ray detectors. Fast neutrons and thermal neutrons (after successive collisions) can stimulate the emission of various threat detection signatures. For explosives detection, element-specific gamma-ray signatures via the (n,n'γ) inelastic scattering reaction and the (n,'γ) thermal capture reaction are detected. For SNM, delayed gamma-rays following fission can be measured with the same detector. Our initial trade-off investigations of several gamma-ray detectors types (NaI, CsI, LaBr3, HPGe) for measuring gamma-ray signatures in a pulsed neutron environment for potential application in a human-portable active interrogation system are covered in this paper.

  7. Analysis of Strengths, Weaknesses, Opportunities, and Threats as a Tool for Translating Evidence into Individualized Medical Strategies (I-SWOT)

    PubMed Central

    von Kodolitsch, Yskert; Bernhardt, Alexander M.; Robinson, Peter N.; Kölbel, Tilo; Reichenspurner, Hermann; Debus, Sebastian; Detter, Christian

    2015-01-01

    Background It is the physicians’ task to translate evidence and guidelines into medical strategies for individual patients. Until today, however, there is no formal tool that is instrumental to perform this translation. Methods We introduce the analysis of strengths (S) and weaknesses (W) related to therapy with opportunities (O) and threats (T) related to individual patients as a tool to establish an individualized (I) medical strategy (I-SWOT). The I-SWOT matrix identifies four fundamental types of strategy. These comprise “SO” maximizing strengths and opportunities, “WT” minimizing weaknesses and threats, “WO” minimizing weaknesses and maximizing opportunities, and “ST” maximizing strengths and minimizing threats. Each distinct type of strategy may be considered for individualized medical strategies. Results We describe four steps of I-SWOT to establish an individualized medical strategy to treat aortic disease. In the first step, we define the goal of therapy and identify all evidence-based therapeutic options. In a second step, we assess strengths and weaknesses of each therapeutic option in a SW matrix form. In a third step, we assess opportunities and threats related to the individual patient, and in a final step, we use the I-SWOT matrix to establish an individualized medical strategy through matching “SW” with “OT”. As an example we present two 30-year-old patients with Marfan syndrome with identical medical history and aortic pathology. As a result of I-SWOT analysis of their individual opportunities and threats, we identified two distinct medical strategies in these patients. Conclusion I-SWOT is a formal but easy to use tool to translate medical evidence into individualized medical strategies. PMID:27069939

  8. Assessing the potential of genotyping-by-sequencing-derived single nucleotide polymorphisms to identify the geographic origins of intercepted gypsy moth (Lymantria dispar) specimens: A proof-of-concept study

    Treesearch

    Sandrine Picq; Melody Keena; Nathan Havill; Don Stewart; Esther Pouliot; Brian Boyle; Roger C. Levesque; Richard C. Hamelin; Michel Cusson

    2018-01-01

    Forest invasive alien species are a major threat to ecosystem stability and can have enormous economic and social impacts. For this reason, preventing the introduction of Asian gypsy moths (AGM; Lymantria dispar asiatica and L. d. japonica) into North America has been identified as a top priority by North American authorities....

  9. Eastern forest environmental threat assessment center

    Treesearch

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  10. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  11. Working memory regulates trait anxiety-related threat processing biases.

    PubMed

    Booth, Robert W; Mackintosh, Bundy; Sharma, Dinkar

    2017-06-01

    High trait anxious individuals tend to show biased processing of threat. Correlational evidence suggests that executive control could be used to regulate such threat-processing. On this basis, we hypothesized that trait anxiety-related cognitive biases regarding threat should be exaggerated when executive control is experimentally impaired by loading working memory. In Study 1, 68 undergraduates read ambiguous vignettes under high and low working memory load; later, their interpretations of these vignettes were assessed via a recognition test. Trait anxiety predicted biased interpretation of social threat vignettes under high working memory load, but not under low working memory load. In Study 2, 53 undergraduates completed a dot probe task with fear-conditioned Japanese characters serving as threat stimuli. Trait anxiety predicted attentional bias to the threat stimuli but, again, this only occurred under high working memory load. Interestingly however, actual eye movements toward the threat stimuli were only associated with state anxiety, and this was not moderated by working memory load, suggesting that executive control regulates biased threat-processing downstream of initial input processes such as orienting. These results suggest that cognitive loads can exacerbate trait anxiety-related cognitive biases, and therefore represent a useful tool for assessing cognitive biases in future research. More importantly, since biased threat-processing has been implicated in the etiology and maintenance of anxiety, poor executive control may be a risk factor for anxiety disorders. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    PubMed Central

    Zhang, Tianyang; Xi, Sisi; Jin, Yan; Wu, Yanhong

    2017-01-01

    Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1). Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2). The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming. PMID:29081755

  13. Pervasive competition between threat and reward in the brain

    PubMed Central

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip

    2014-01-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the ‘salience hypothesis’, in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the ‘competition hypothesis’, the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. PMID:23547242

  14. Interactions between stereotype threat, subjective aging, and memory in older adults.

    PubMed

    Marquet, Manon; Missotten, Pierre; Dardenne, Benoit; Adam, Stéphane

    2017-12-08

    This study examined whether the effects of stereotype threat on memory and subjective age were moderated by positive age stereotypes and self-perceptions of aging among older adults. Perceived threat as a mechanism underlying these effects was also explored. Results showed that stereotype threat (high vs. low threat) did not affect the dependent variables. Moreover, self-perceptions of aging did not moderate the effect of stereotype threat on the dependent variables. However, for people with more positive age stereotypes, older people under highthreat perceived more threat than people under low threat. This could be explained by an effect of age stereotypes in the high-threat group: the more positive age stereotypes held by participants, the more they perceived threat, which in turn decreased their memory performance and made them feel mentally older. We hypothesized that age group identity is stronger in people with more positive age stereotypes, which increase perceived threat.

  15. Using Click Chemistry to Identify Potential Drug Targets in Plasmodium

    DTIC Science & Technology

    2015-04-01

    step of the Plasmodium mammalian cycle . Inhibiting this step can block malaria at an early step. However, few anti-malarials target liver infection...points in the life cycle of malaria parasites. PLoS Biol 12: e1001806. 2. Falae A, Combe A, Amaladoss A, Carvalho T, Menard R, et al. (2010) Role of...AWARD NUMBER: W81XWH-13-1-0429 TITLE: Using "Click Chemistry" to Identify Potential Drug Targets in Plasmodium PRINCIPAL INVESTIGATOR: Dr. Purnima

  16. A Model for Assessment and Mitigation of Threats on the College Campus

    ERIC Educational Resources Information Center

    Keller, Eileen Weisenbach; Hughes, Stephanie; Hertz, Giles

    2011-01-01

    Purpose: An increase in the number of disruptive and violent events on college and university campuses instigated this review of the methods used to interrupt the trend, with the goal of identifying a preliminary model for systematic management of such threats. The intent is to instigate research, review and discussion in order to decrease the…

  17. Insects and their life cycle: Steps to take to assess threats

    Treesearch

    Alicia M. Bray; Jason B. Oliver

    2013-01-01

    This paper provides a brief overview of the importance of wood-boring insects to the forest nursery industry. Descriptions of the major insect groups are provided with special attention to the life stages that are most problematic within each group. Steps are provided to guide individuals to mitigate potential threats if a new insect is detected causing damage to trees...

  18. Managing facility risk: external threats and health care organizations.

    PubMed

    Reid, Daniel J; Reid, William H

    2014-01-01

    Clinicians and clinical administrators should have a basic understanding of physical and financial risk to mental health facilities related to external physical threat, including actions usually viewed as "terrorism" and much more common sources of violence. This article refers to threats from mentally ill persons and those acting out of bizarre or misguided "revenge," extortionists and other outright criminals, and perpetrators usually identified as domestic or international terrorists. The principles apply both to relatively small and contained acts (such as a patient or ex-patient attacking a staff member) and to much larger events (such as bombings and armed attack), and are relevant to facilities both within and outside the U.S. Patient care and accessibility to mental health services rest not only on clinical skills, but also on a place to practice them and an organized system supported by staff, physical facilities, and funding. Clinicians who have some familiarity with the non-clinical requirements for care are in a position to support non-clinical staff in preventing care from being interrupted by external threats or events such as terrorist activity, and/or to serve at the interface of facility operations and direct clinical care. Readers should note that this article is an introduction to the topic and cannot address all local, state and national standards for hospital safety, or insurance providers' individual facility requirements. Copyright © 2014 John Wiley & Sons, Ltd.

  19. Level of environmental threat posed by horticultural trade in Cactaceae.

    PubMed

    Novoa, Ana; Le Roux, Johannes J; Richardson, David M; Wilson, John R U

    2017-10-01

    Ornamental horticulture has been identified as an important threat to plant biodiversity and is a major pathway for plant invasions worldwide. In this context, the family Cactaceae is particularly challenging because it is considered the fifth most threatened large taxonomic group in the world; several species are among the most widespread and damaging invasive species; and Cactaceae is one of the most popular horticultural plant groups. Based on the Convention on International Trade in Endangered Species of Wild Flora and Fauna and the 11 largest online auction sites selling cacti, we documented the international cactus trade. To provide an in-depth look at the dynamics of the industry, we surveyed the businesses involved in the cactus trade in South Africa (a hotspot of cactus trade and invasions). We purchased seeds of every available species and used DNA barcoding to identify species to the genus level. Although <20% of this trade involved threatened species and <3% involved known invasive species, many species were identified by a common name. However, only 0.02% of the globally traded cacti were collected from wild populations. Despite a large commercial network, all South African imports (of which 15% and 1.5% were of species listed as threatened and invasive, respectively) came from the same source. With DNA barcoding, we identified 24% of the species to genus level. Based on our results, we believe that if trade restrictions are placed on the small proportion of cacti that are invasive and there is no major increase in harvesting of native populations, then the commercial trade in cactus poses a negligible environmental threat. However, there are currently no effective methods for easily identifying which cacti are traded, and both the illicit harvesting of cacti from the wild and the informal trade in invasive taxa pose on-going conservation challenges. © 2017 Society for Conservation Biology.

  20. Identity threat and stigma in cancer patients

    PubMed Central

    Marziliano, Allison; Moyer, Anne

    2014-01-01

    Cancer stigma has undergone an important transformation in recent decades. In general, this disease no longer fits squarely into Goffman’s classic taxonomy of stigmatized conditions. This review will demonstrate that, with important adaptations, an identity-threat model of stigma can be used to organize cancer stigma research post-Goffman. This adapted model postulates that one’s personal attributions, responses to situational threat, and disease/treatment characteristics can be used to predict identity threat and well-being of individuals with cancer. Implications for further research and clinical practice are discussed. PMID:28070343