Sample records for software potential threat

  1. Automating Risk Analysis of Software Design Models

    PubMed Central

    Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P.

    2014-01-01

    The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance. PMID:25136688

  2. Automating risk analysis of software design models.

    PubMed

    Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P

    2014-01-01

    The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.

  3. A code inspection process for security reviews

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garzoglio, Gabriele; /Fermilab

    2009-05-01

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application andmore » their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.« less

  4. A code inspection process for security reviews

    NASA Astrophysics Data System (ADS)

    Garzoglio, Gabriele

    2010-04-01

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application and their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.

  5. Does products liability litigation threaten picture archiving and communication systems and/or telemedicine?

    PubMed

    McMenamin, J P

    1998-02-01

    Numerous writers have commented on barriers to the growth and progress of telemedicine. Among these barriers are reimbursement concerns, professional liability exposure, licensing restrictions, hospital credentialing questions, and other problems. A legal threat not generally described in the literature to date is the possibility that products liability claims could be brought against manufacturers and distributors of hardware, software, and peripherals used in providing telemedicine services. Several of these concerns extend to picture archiving and communication systems (PACS), including, of course, teleradiology. This article considers that possibility in the context of several potential plaintiffs' theories, discusses currently applicable law, and proposes approaches to diminishing the magnitude and severity of this potential threat.

  6. Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security.

    PubMed

    Hahn, Erin; Blazes, David; Lewis, Sheri

    2016-01-01

    Improving global health security will require bold action in all corners of the world, particularly in developing settings, where poverty often contributes to an increase in emerging infectious diseases. In order to mitigate the impact of emerging pandemic threats, enhanced disease surveillance is needed to improve early detection and rapid response to outbreaks. However, the technology to facilitate this surveillance is often unattainable because of high costs, software and hardware maintenance needs, limited technical competence among public health officials, and internet connectivity challenges experienced in the field. One potential solution is to leverage open source software, a concept that is unfortunately often misunderstood. This article describes the principles and characteristics of open source software and how it may be applied to solve global health security challenges.

  7. The Business Case for Automated Software Engineering

    NASA Technical Reports Server (NTRS)

    Menzies, Tim; Elrawas, Oussama; Hihn, Jairus M.; Feather, Martin S.; Madachy, Ray; Boehm, Barry

    2007-01-01

    Adoption of advanced automated SE (ASE) tools would be more favored if a business case could be made that these tools are more valuable than alternate methods. In theory, software prediction models can be used to make that case. In practice, this is complicated by the 'local tuning' problem. Normally. predictors for software effort and defects and threat use local data to tune their predictions. Such local tuning data is often unavailable. This paper shows that assessing the relative merits of different SE methods need not require precise local tunings. STAR 1 is a simulated annealer plus a Bayesian post-processor that explores the space of possible local tunings within software prediction models. STAR 1 ranks project decisions by their effects on effort and defects and threats. In experiments with NASA systems. STARI found one project where ASE were essential for minimizing effort/ defect/ threats; and another project were ASE tools were merely optional.

  8. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  9. A Survey on Security Isolation of Virtualization, Containers, and Unikernels

    DTIC Science & Technology

    2017-05-01

    this report are not to be construed as an official Department of the Army position unless so designated by other authorized documents. Citation of...characteristics is necessary to understand the potential threats. Each of these technologies contains subtle differences in the methodology and...technologies contains subtle differences in the methodology and software architecture to provide secure isolation between guests. All 3 of these

  10. Countering Insider Threats - Handling Insider Threats Using Dynamic, Run-Time Forensics

    DTIC Science & Technology

    2007-10-01

    able to handle the security policy requirements of a large organization containing many decentralized and diverse users, while being easily managed... contained in the TIF folder. Searching for any text string and sorting is supported also. The cache index file of Internet Explorer is not changed... containing thousands of malware software signatures. Separate datasets can be created for various classifications of malware such as encryption software

  11. Hacking medical devices a review - biomed 2013.

    PubMed

    Frenger, Paul

    2013-01-01

    Programmable, implantable and external biomedical devices (such as pacemakers, defibrillators, insulin pumps, pain management pumps, vagus nerve stimulators and others) may be vulnerable to unauthorized access, commonly referred to as “hacking”. This intrusion may lead to compromise of confidential patient data or loss of control of the device itself, which may be deadly. Risks to health from unauthorized access is in addition to hazards from faulty (“buggy”) software or circuitry. Historically, this aspect of medical device design has been underemphasized by both manufacturers and regulatory bodies until recently. However, an insulin pump was employed as a murder weapon in 2001 and successful hacking of an implantable defibrillator was demonstrated in 2008. To remedy these problems, professional groups have announced a variety of design standards and the governmental agencies of several countries have enacted device regulations. In turn, manufacturers have developed new software products and hardware circuits to assist biomedical engineering firms to improve their commercial offerings. In this paper the author discusses these issues, reviewing known problems and zero-day threats, with potential solutions. He outlines his approach to secure software and hardware challenges using the Forth language. A plausible scenario is described in which hacking of an implantable defibrillator by terrorists results in a severe national security threat to the United States.

  12. CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6

    DTIC Science & Technology

    2012-12-01

    Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for

  13. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McDonald, K; Curran, B

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less

  14. Personal privacy, information assurance, and the threat posed by malware techology

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2006-04-01

    In spite of our best efforts to secure the cyber world, the threats posed to personal privacy by attacks upon networks and software continue unabated. While there are many reasons for this state of affairs, clearly one of the reasons for continued vulnerabilities in software is the inability to assess their security properties and test their security systems while they are in development. A second reason for this growing threat to personal privacy is the growing sophistication and maliciousness of malware coupled with the increasing difficulty of detecting malware. The pervasive threat posed by malware coupled with the difficulties faced when trying to detect its presence or an attempted intrusion make addressing the malware threat one of the most pressing issues that must be solved in order to insure personal privacy to users of the internet. In this paper, we will discuss the threat posed by malware, the types of malware found in the wild (outside of computer laboratories), and current techniques that are available for from a successful malware penetration. The paper includes a discussion of anti-malware tools and suggestions for future anti-malware efforts.

  15. Tool development in threat assessment: syntax regularization and correlative analysis. Final report Task I and Task II, November 21, 1977-May 21, 1978. [Linguistic analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miron, M.S.; Christopher, C.; Hirshfield, S.

    1978-05-01

    Psycholinguistics provides crisis managers in nuclear threat incidents with a quantitative methodology which can aid in the determination of threat credibility, authorship identification and perpetrator apprehension. The objective of this contract is to improve and enhance present psycholinguistic software systems by means of newly-developed, computer-automated techniques which significantly extend the technology of automated content and stylistic analysis of nuclear threat. In accordance with this overall objective, the first two contract Tasks have been completed and are reported on in this document. The first Task specifies the development of software support for the purpose of syntax regularization of vocabulary to rootmore » form. The second calls for the exploration and development of alternative approaches to correlative analysis of vocabulary usage.« less

  16. Holographic radar imaging privacy techniques utilizing dual-frequency implementation

    NASA Astrophysics Data System (ADS)

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.

    2008-04-01

    Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhance the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.

  17. Holographic Radar Imaging Privacy Techniques Utilizing Dual-Frequency Implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.

    2008-04-18

    Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhancemore » the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.« less

  18. Front-End Anti-Viral Detection Mechanisms Using Replicating/Self-Replicating Software

    DTIC Science & Technology

    1989-10-19

    Trojan Horse program, these programs were omitted from the proof of concept. Future considerations will address these type of programs directly and...which relocates in memory. 3. Trojan Horse : A program that does other than what it was intended to do. 4. Prevention: Stop the initial and subsequent...then performed a risks analysis of potential threats. Since it is impossible, using existing technologies, to detect a well-written WORM or trojan horse

  19. Software Authority Transition through Multiple Distributors

    PubMed Central

    Han, Kyusunk; Shon, Taeshik

    2014-01-01

    The rapid growth in the use of smartphones and tablets has changed the software distribution ecosystem. The trend today is to purchase software through application stores rather than from traditional offline markets. Smartphone and tablet users can install applications easily by purchasing from the online store deployed in their device. Several systems, such as Android or PC-based OS units, allow users to install software from multiple sources. Such openness, however, can promote serious threats, including malware and illegal usage. In order to prevent such threats, several stores use online authentication techniques. These methods can, however, also present a problem whereby even licensed users cannot use their purchased application. In this paper, we discuss these issues and provide an authentication method that will make purchased applications available to the registered user at all times. PMID:25143971

  20. Software authority transition through multiple distributors.

    PubMed

    Han, Kyusunk; Shon, Taeshik

    2014-01-01

    The rapid growth in the use of smartphones and tablets has changed the software distribution ecosystem. The trend today is to purchase software through application stores rather than from traditional offline markets. Smartphone and tablet users can install applications easily by purchasing from the online store deployed in their device. Several systems, such as Android or PC-based OS units, allow users to install software from multiple sources. Such openness, however, can promote serious threats, including malware and illegal usage. In order to prevent such threats, several stores use online authentication techniques. These methods can, however, also present a problem whereby even licensed users cannot use their purchased application. In this paper, we discuss these issues and provide an authentication method that will make purchased applications available to the registered user at all times.

  1. Software Assurance: Five Essential Considerations for Acquisition Officials

    DTIC Science & Technology

    2007-05-01

    May 2007 www.stsc.hill.af.mil 17 2 • address security concerns in the software development life cycle ( SDLC )? • Are there formal software quality...What threat modeling process, if any, is used when designing the software ? What analysis, design, and construction tools are used by your software design...the-shelf (COTS), government off-the-shelf (GOTS), open- source, embedded, and legacy software . Attackers exploit unintentional vulnerabil- ities or

  2. Software and the Virus Threat: Providing Authenticity in Distribution

    DTIC Science & Technology

    1991-03-01

    Classification) SOFTWARE A" D THE VIRUS THREAT: PROVIDING AUTHENTICITY IN DISTRIBUTION 12. PERSONAL AUTHOR( S ) LAVUNTURE, GEORGE M. 13&. TYPE OF REPORT 1 3b...swapping open the code ampering. Re -authentication would then be required prior to regaining ;ntrol. 30 V . AUTHENTICATION MIRTHODS This section examines...x. n/a v mis 15) .. . ... x x ... .074 I .r ..... x . . x x x.x. 3880 S amno 3) . • ..... .. . I. ... 2000 .d0O (3) x x x x I . . . x x

  3. 48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...

  4. 48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...

  5. 48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...

  6. 48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...

  7. Evaluation and Verification of the Global Rapid Identification of Threats System for Infectious Diseases in Textual Data Sources.

    PubMed

    Huff, Andrew G; Breit, Nathan; Allen, Toph; Whiting, Karissa; Kiley, Christopher

    2016-01-01

    The Global Rapid Identification of Threats System (GRITS) is a biosurveillance application that enables infectious disease analysts to monitor nontraditional information sources (e.g., social media, online news outlets, ProMED-mail reports, and blogs) for infectious disease threats. GRITS analyzes these textual data sources by identifying, extracting, and succinctly visualizing epidemiologic information and suggests potentially associated infectious diseases. This manuscript evaluates and verifies the diagnoses that GRITS performs and discusses novel aspects of the software package. Via GRITS' web interface, infectious disease analysts can examine dynamic visualizations of GRITS' analyses and explore historical infectious disease emergence events. The GRITS API can be used to continuously analyze information feeds, and the API enables GRITS technology to be easily incorporated into other biosurveillance systems. GRITS is a flexible tool that can be modified to conduct sophisticated medical report triaging, expanded to include customized alert systems, and tailored to address other biosurveillance needs.

  8. Evaluation and Verification of the Global Rapid Identification of Threats System for Infectious Diseases in Textual Data Sources

    PubMed Central

    Breit, Nathan

    2016-01-01

    The Global Rapid Identification of Threats System (GRITS) is a biosurveillance application that enables infectious disease analysts to monitor nontraditional information sources (e.g., social media, online news outlets, ProMED-mail reports, and blogs) for infectious disease threats. GRITS analyzes these textual data sources by identifying, extracting, and succinctly visualizing epidemiologic information and suggests potentially associated infectious diseases. This manuscript evaluates and verifies the diagnoses that GRITS performs and discusses novel aspects of the software package. Via GRITS' web interface, infectious disease analysts can examine dynamic visualizations of GRITS' analyses and explore historical infectious disease emergence events. The GRITS API can be used to continuously analyze information feeds, and the API enables GRITS technology to be easily incorporated into other biosurveillance systems. GRITS is a flexible tool that can be modified to conduct sophisticated medical report triaging, expanded to include customized alert systems, and tailored to address other biosurveillance needs. PMID:27698665

  9. Software Tools for In-Situ Documentation of Built Heritage

    NASA Astrophysics Data System (ADS)

    Smars, P.

    2013-07-01

    The paper presents open source software tools developed by the author to facilitate in-situ documentation of architectural and archæological heritage. The design choices are exposed and related to a general issue in conservation and documentation: taking decisions about a valuable object under threat . The questions of level of objectivity is central to the three steps of this process. It is our belief that in-situ documentation has to be favoured in this demanding context, full of potential discoveries. The very powerful surveying techniques in rapid development nowadays enhance our vision but often tend to bring back a critical part of the documentation process to the office. The software presented facilitate a direct treatment of the data on the site. Emphasis is given to flexibility, interoperability and simplicity. Key features of the software are listed and illustrated with examples (3D model of Gothic vaults, analysis of the shape of a column, deformation of a wall, direct interaction with AutoCAD).

  10. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector

    DTIC Science & Technology

    2005-06-01

    as a computer fraud case investigated by the Secret Service. Each case was analyzed from a behavioral and a technical perspective to identify...insider threat and address the issue from an approach that draws on human resources, corporate security, and information security perspectives. The ... Secret Service National Threat Assessment Center and the CERT Coordination Center of Carnegie Mellon University’s Software Engineering Institute joined

  11. SPCC- Software Elements for Security Partition Communication Controller

    NASA Astrophysics Data System (ADS)

    Herpel, H. J.; Willig, G.; Montano, G.; Tverdyshev, S.; Eckstein, K.; Schoen, M.

    2016-08-01

    Future satellite missions like Earth Observation, Telecommunication or any other kind are likely to be exposed to various threats aiming at exploiting vulnerabilities of the involved systems and communications. Moreover, the growing complexity of systems coupled with more ambitious types of operational scenarios imply increased security vulnerabilities in the future. In the paper we will describe an architecture and software elements to ensure high level of security on-board a spacecraft. First the threats to the Security Partition Communication Controller (SPCC) will be addressed including the identification of specific vulnerabilities to the SPCC. Furthermore, appropriate security objectives and security requirements are identified to be counter the identified threats. The security evaluation of the SPCC will be done in accordance to the Common Criteria (CC). The Software Elements for SPCC has been implemented on flight representative hardware which consists of two major elements: the I/O board and the SPCC board. The SPCC board provides the interfaces with ground while the I/O board interfaces with typical spacecraft equipment busses. Both boards are physically interconnected by a high speed spacewire (SpW) link.

  12. Non-developmental item computer systems and the malicious software threat

    NASA Technical Reports Server (NTRS)

    Bown, Rodney L.

    1991-01-01

    The following subject areas are covered: a DOD development system - the Army Secure Operating System; non-development commercial computer systems; security, integrity, and assurance of service (SI and A); post delivery SI and A and malicious software; computer system unique attributes; positive feedback to commercial computer systems vendors; and NDI (Non-Development Item) computers and software safety.

  13. Lightning forecasting studies using LDAR, LLP, field mill, surface mesonet, and Doppler radar data

    NASA Technical Reports Server (NTRS)

    Forbes, Gregory S.; Hoffert, Steven G.

    1995-01-01

    The ultimate goal of this research is to develop rules, algorithms, display software, and training materials that can be used by the operational forecasters who issue weather advisories for daily ground operations and launches by NASA and the United States Air Force to improve real-time forecasts of lightning. Doppler radar, Lightning Detection and Ranging (LDAR), Lightning Location and Protection (LLP), field mill (Launch Pad Lightning Warning System -- LPLWS), wind tower (surface mesonet) and additional data sets have been utilized in 10 case studies of thunderstorms in the vicinity of KSC during the summers of 1994 and 1995. These case studies reveal many intriguing aspects of cloud-to-ground, cloud-to-cloud, in-cloud, and cloud-to-air lightning discharges in relation to radar thunderstorm structure and evolution. They also enable the formulation of some preliminary working rules of potential use in the forecasting of initial and final ground strike threat. In addition, LDAR and LLP data sets from 1993 have been used to quantify the lightning threat relative to the center and edges of LDAR discharge patterns. Software has been written to overlay and display the various data sets as color imagery. However, human intervention is required to configure the data sets for proper intercomparison. Future efforts will involve additional software development to automate the data set intercomparisons, to display multiple overlay combinations in a windows format, and to allow for animation of the imagery. The software package will then be used as a tool to examine more fully the current cases and to explore additional cases in a timely manner. This will enable the formulation of more general and reliable forecasting guidelines and rules.

  14. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  15. Computer Viruses and Related Threats: A Management Guide.

    ERIC Educational Resources Information Center

    Wack, John P.; Carnahan, Lisa J.

    This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…

  16. 48 CFR 50.201 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... requirements or such other requirements as defined and specified by the Secretary of Homeland Security: (1) Is... otherwise cause, for which a SAFETY Act designation has been issued. For purposes of defining a QATT..., engineering services, software development services, software integration services, threat assessments...

  17. 48 CFR 50.201 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... requirements or such other requirements as defined and specified by the Secretary of Homeland Security: (1) Is... otherwise cause, for which a SAFETY Act designation has been issued. For purposes of defining a QATT..., engineering services, software development services, software integration services, threat assessments...

  18. 48 CFR 50.201 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... requirements or such other requirements as defined and specified by the Secretary of Homeland Security: (1) Is... otherwise cause, for which a SAFETY Act designation has been issued. For purposes of defining a QATT..., engineering services, software development services, software integration services, threat assessments...

  19. 48 CFR 50.201 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... requirements or such other requirements as defined and specified by the Secretary of Homeland Security: (1) Is... otherwise cause, for which a SAFETY Act designation has been issued. For purposes of defining a QATT..., engineering services, software development services, software integration services, threat assessments...

  20. 48 CFR 50.201 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... requirements or such other requirements as defined and specified by the Secretary of Homeland Security: (1) Is... otherwise cause, for which a SAFETY Act designation has been issued. For purposes of defining a QATT..., engineering services, software development services, software integration services, threat assessments...

  1. The Strengths, Weaknesses, Opportunities and Threats of Using Social Software in Higher and Further Education Teaching and Learning

    ERIC Educational Resources Information Center

    Schroeder, A.; Minocha, S.; Schneider, C.

    2010-01-01

    Social software is increasingly being used in higher and further education to support teaching and learning processes. These applications provide students with social and cognitive stimulation and also add to the interaction between students and educators. However, in addition to the benefits the introduction of social software into a course…

  2. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risksmore » of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.« less

  3. The adaptive safety analysis and monitoring system

    NASA Astrophysics Data System (ADS)

    Tu, Haiying; Allanach, Jeffrey; Singh, Satnam; Pattipati, Krishna R.; Willett, Peter

    2004-09-01

    The Adaptive Safety Analysis and Monitoring (ASAM) system is a hybrid model-based software tool for assisting intelligence analysts to identify terrorist threats, to predict possible evolution of the terrorist activities, and to suggest strategies for countering terrorism. The ASAM system provides a distributed processing structure for gathering, sharing, understanding, and using information to assess and predict terrorist network states. In combination with counter-terrorist network models, it can also suggest feasible actions to inhibit potential terrorist threats. In this paper, we will introduce the architecture of the ASAM system, and discuss the hybrid modeling approach embedded in it, viz., Hidden Markov Models (HMMs) to detect and provide soft evidence on the states of terrorist network nodes based on partial and imperfect observations, and Bayesian networks (BNs) to integrate soft evidence from multiple HMMs. The functionality of the ASAM system is illustrated by way of application to the Indian Airlines Hijacking, as modeled from open sources.

  4. Anti-malware software and medical devices.

    PubMed

    2010-10-01

    Just as much as healthcare information systems, medical devices need protection against cybersecurity threats. Anti-malware software can help safeguard the devices in your facility-but it has limitations and even risks. Find out what steps you can take to manage anti-malware applications in your devices.

  5. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  6. Software-safety and software quality assurance in real-time applications Part 2: Real-time structures and languages

    NASA Astrophysics Data System (ADS)

    Schoitsch, Erwin

    1988-07-01

    Our society is depending more and more on the reliability of embedded (real-time) computer systems even in every-day life. Considering the complexity of the real world, this might become a severe threat. Real-time programming is a discipline important not only in process control and data acquisition systems, but also in fields like communication, office automation, interactive databases, interactive graphics and operating systems development. General concepts of concurrent programming and constructs for process-synchronization are discussed in detail. Tasking and synchronization concepts, methods of process communication, interrupt- and timeout handling in systems based on semaphores, signals, conditional critical regions or on real-time languages like Concurrent PASCAL, MODULA, CHILL and ADA are explained and compared with each other and with respect to their potential to quality and safety.

  7. Drone Defense System Architecture for U.S. Navy Strategic Facilities

    DTIC Science & Technology

    2017-09-01

    evaluation and weapons assignment (TEWA) to properly address threats. This report follows a systems engineering process to develop a software architecture...C-UAS requires a central system to connect these new and existing systems. The central system uses data fusion and threat evaluation and weapons...30  Table 6.  Decision Type Descriptions .......................................................................40  Table 7

  8. Preliminary development of a GIS-tool to assess threats to shallow groundwater quality from soil pollutants in Glasgow, UK (GRASP).

    NASA Astrophysics Data System (ADS)

    Dochartaigh, B. É. Ó.; Fordyce, F. M.; Ander, E. L.; Bonsor, H. C.

    2009-04-01

    The protection of groundwater and related surface water quality is a key aspect of the European Union Water Framework Directive and environmental legislation in many countries worldwide. Globally, the protection of urban groundwater resources and related ecosystem services is of growing concern as urbanisation increases. Although urban areas are often where groundwater resources are most in need of protection, there is frequently a lack of information about threats to groundwater quality. Most studies of soil and groundwater contamination, although detailed, are site-specific, and city-wide overviews are generally lacking. The British Geological Survey (BGS) is currently undertaking the Clyde Urban Super-Project (CUSP), delivering multi-disciplinary geoscience products for the Glasgow conurbation. Under this project, a GIS-based prioritisation tool known as GRASP (GRoundwater And Soil Pollutants) has been trialled to aid urban planning and sustainable development by providing a broad-scale assessment of threats to groundwater quality across the conurbation. GRASP identifies areas where shallow groundwater quality is at greatest threat from the leaching and downward movement of potentially harmful metals in the soil. Metal contamination is a known problem in many urban centres including Glasgow, which has a long industrial heritage and associated contamination legacy, notably with respect to Cr. GRASP is based primarily upon an existing British Standard - International Standards Organisation methodology to determine the leaching potential of metals from soils, which has been validated for 11 metals: Al, Fe, Cd, Co, Cr, Cu, Hg, Ni, Mn, Pb and Zn (BS-ISO 15175:2004). However, the GRASP tool is innovative as it combines assessments of soil leaching potential with soil metal content data to highlight threats to shallow groundwater quality. The input parameters required for GRASP (soil pH, clay, organic matter, sesquioxide and metal content) are based upon a systematic geochemical dataset of 1600 soils (4 per km2) collected across Glasgow as part of the BGS Geochemical Baseline Survey of the Environment (G-BASE) project. These parameters are combined with assessments of climate, groundwater levels and the leaching potential of unsaturated Quaternary deposits to produce maps that prioritise the likely threats to shallow groundwater quality. Data processing for the GRASP methodology is carried out in five steps in Microsoft Excel®, using Visual Basic® programming language, and ArcGIS® software. The GRASP prioritisation tool is in the process of development; however, the rationale and initial derivation of the methodology for the city of Glasgow will be presented.

  9. Bomb Threat Response: An Interactive Planning Tool for Schools. [CD-ROM

    ERIC Educational Resources Information Center

    US Department of Justice (NJ3), 2002

    2002-01-01

    The content of this CD-ROM was developed by the Bureau of Firearms and Explosives, U.S. Department of Justice and the Office of Safe and Drug Free Schools, U.S. Department of Education. The intended use of this software is for planning by schools and school districts to respond to bomb threats. This interactive tool assists school districts,…

  10. The potential of computer software that supports the diagnosis of workplace ergonomics in shaping health awareness

    NASA Astrophysics Data System (ADS)

    Lubkowska, Wioletta

    2017-11-01

    The growing prevalence of health problems among computer workstation workers has become one of the biggest threats to the overall health of our population. That is why many modern scientists are looking for ways and methods to prevent and reverse these negative trends. The purpose of this article is to present the potential for practical use of computer programs to design an ergonomic workplace and postural loads. These programs help configure the computer workstation correctly and adopt the correct body position during work, which reduces the risk of health problems. Creating visually attractive programs helps encourage and inspire those who work with a computer to introduce ergonomic solutions and reject the sedentary lifestyle.

  11. Characterization of potential security threats in modern automobiles: a composite modeling approach

    DOT National Transportation Integrated Search

    2014-10-01

    The primary objective of the work detailed in this report is to describe a composite modeling approach for potential cybersecurity threats in modern vehicles. Threat models, threat descriptions, and examples of various types of conceivable threats to...

  12. The Secure Distributed Operating System Design Project

    DTIC Science & Technology

    1988-06-01

    a di- verse group of people . Its organization isolates different aspects of the project, such as expected results, preliminary results, and technical...modeled after these procedures. " Automation: computers are commonly used to automate tasks previously performed by people ; many of these tasks are... people commonly con- sidered the threats anticipated to the system and mechanisms that are used to prevent those threats. Both hardware and software

  13. General practitioners' perceptions of pharmacists' new services in New Zealand.

    PubMed

    Hatah, Ernieda; Braund, Rhiannon; Duffull, Stephen; Tordoff, June

    2012-04-01

    In recent years, the pharmacy profession has moved towards more patient-oriented services. Some examples are medication review, screening and monitoring for disease, and prescribing. The new services are intended to be in close collaboration with general practitioners (GPs) yet little is known of how GPs in New Zealand perceive these new services. Objective To examine GPs' perceptions of pharmacists' new services. Study was undertaken at GPs' practices in two localities in New Zealand. Qualitative, face to face, semi-structured interviews were undertaken of 18 GPs. The cohort included GPs with less/more than 20 years of practice, and GPs who had experience of working in localities where some patients had undergone a medication review (Medicines Use Review, MUR) by community pharmacists. GPs were asked to share their perceptions about pharmacists providing some new services. Data were thematically analysed with constant comparison using NVivo 8 software. Using a business strategic planning approach, themes were further analysed and interpreted as the services' potential Strengths, Weaknesses, Opportunities and Threats (SWOTs). GPs' perceptions of pharmacists' new services. GPs were more supportive of pharmacists' playing active roles in medication review and less supportive of pharmacists practising screening-monitoring and prescribing. Discussions Pharmacists' knowledge and skills in medication use and the perceived benefits of the services to patients were considered the potential strengths of the services. Weaknesses centred around potential patient confusion and harm, conflict and irritation to GPs' practice, and the potential to fragment patient-care. Opportunities were the possibilities of improving communication, and having a close collaboration and integration with GPs' practice. Apparent threats were the GPs' perceptions of a related, and not renumerated, increase in their workloads, and the perception of limited benefit to patients. Pharmacists should exploit their own strengths and the potential opportunities for these services, and reduce any weaknesses and threats. A possible strategic plan should include increased effective communication, piloting services, and the integration of some services into medical practices.

  14. NASA Applications for Computational Electromagnetic Analysis

    NASA Technical Reports Server (NTRS)

    Lewis, Catherine C.; Trout, Dawn H.; Krome, Mark E.; Perry, Thomas A.

    2011-01-01

    Computational Electromagnetic Software is used by NASA to analyze the compatibility of systems too large or too complex for testing. Recent advances in software packages and computer capabilities have made it possible to determine the effects of a transmitter inside a launch vehicle fairing, better analyze the environment threats, and perform on-orbit replacements with assured electromagnetic compatibility.

  15. Maintaining Situation Awareness with Autonomous Airborne Observation Platforms

    NASA Technical Reports Server (NTRS)

    Freed, Michael; Fitzgerald, Will

    2005-01-01

    Unmanned Aerial Vehicles (UAVs) offer tremendous potential as intelligence, surveillance and reconnaissance (ISR) platforms for early detection of security threats and for acquisition and maintenance of situation awareness in crisis conditions. However, using their capabilities effectively requires addressing a range of practical and theoretical problems. The paper will describe progress by the "Autonomous Rotorcraft Project," a collaborative effort between NASA and the U.S. Army to develop a practical, flexible capability for UAV-based ISR. Important facets of the project include optimization methods for allocating scarce aircraft resources to observe numerous, distinct sites of interest; intelligent flight automation software than integrates high-level plan generation capabilities with executive control, failure response and flight control functions; a system architecture supporting reconfiguration of onboard sensors to address different kinds of threats; and an advanced prototype vehicle designed to allow large-scale production at low cost. The paper will also address human interaction issues including an empirical method for determining how to allocate roles and responsibilities between flight automation and human operations.

  16. Countering MANPADS: study of new concepts and applications: part two

    NASA Astrophysics Data System (ADS)

    Maltese, Dominique; Vergnolle, Jean-François; Aragones, Julien; Renaudat, Mathieu

    2007-04-01

    The latest events of ground-to-air Man Portable Air Defense (MANPAD) attacks against aircraft have revealed a new threat both for military and civilian aircraft. Consequently, the implementation of protecting systems (i.e. Directed Infra Red Counter Measure - DIRCM) in order to face IR guided missiles turns out to be now inevitable. In a near future, aircraft will have to possess detection, tracking, identification, targeting and jamming capabilities to face MANPAD threats. Besides, Multiple Missiles attacks become more and more current scenarios to deal with. In this paper, a practical example of DIRCM systems under study at SAGEM DEFENSE & SECURITY Company is presented. The article is the continuation of a previous SPIE one. Self-protection solutions include built-in and automatic locking-on, tracking, identification and laser jamming capabilities, including defeat assessment. Target Designations are provided by a Missile Warning System. Targets scenarios including multiple threats are considered to design systems architectures. In a first step, the article reminds the context, current and future threats (IR seekers of different generations...), and scenarios for system definition. Then, it focuses on potential self-protection systems under study at SAGEM DEFENSE & SECURITY Company. Different strategies including target identification, multi band laser and active imagery have been previously studied in order to design DIRCM System solutions. Thus, results of self-protection scenarios are provided for different MANPAD scenarios to highlight key problems to solve. Data have been obtained from simulation software modeling full DIRCM systems architectures on technical and operational scenarios (parametric studies).

  17. The information protection level assessment system implementation

    NASA Astrophysics Data System (ADS)

    Trapeznikov, E. V.

    2018-04-01

    Currently, the threat of various attacks increases significantly as automated systems become more widespread. On the basis of the conducted analysis the information protection level assessment system establishing objective was identified. The paper presents the information protection level assessment software implementation in the information system by applying the programming language C #. In conclusions the software features are identified and experimental results are represented.

  18. Measuring Cyber Operations Effectiveness

    DTIC Science & Technology

    2014-11-01

    are advanced firewalls capable of taking limited action to block malicious traffic or hacking attempts. Their capabilities vary widely and must be...using many automated tools, included in the defense hardware and software itself. These devices include hardware and software firewalls , Network...DoD networks are probed millions of times per day…the Air Force blocks roughly two billion threats and denies two million emails each week

  19. SWIR hyperspectral imaging detector for surface residues

    NASA Astrophysics Data System (ADS)

    Nelson, Matthew P.; Mangold, Paul; Gomer, Nathaniel; Klueva, Oksana; Treado, Patrick

    2013-05-01

    ChemImage has developed a SWIR Hyperspectral Imaging (HSI) sensor which uses hyperspectral imaging for wide area surveillance and standoff detection of surface residues. Existing detection technologies often require close proximity for sensing or detecting, endangering operators and costly equipment. Furthermore, most of the existing sensors do not support autonomous, real-time, mobile platform based detection of threats. The SWIR HSI sensor provides real-time standoff detection of surface residues. The SWIR HSI sensor provides wide area surveillance and HSI capability enabled by liquid crystal tunable filter technology. Easy-to-use detection software with a simple, intuitive user interface produces automated alarms and real-time display of threat and type. The system has potential to be used for the detection of variety of threats including chemicals and illicit drug substances and allows for easy updates in the field for detection of new hazardous materials. SWIR HSI technology could be used by law enforcement for standoff screening of suspicious locations and vehicles in pursuit of illegal labs or combat engineers to support route-clearance applications- ultimately to save the lives of soldiers and civilians. In this paper, results from a SWIR HSI sensor, which include detection of various materials in bulk form, as well as residue amounts on vehicles, people and other surfaces, will be discussed.

  20. Technical Basis for Evaluating Software-Related Common-Cause Failures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Muhlheim, Michael David; Wood, Richard

    2016-04-01

    The instrumentation and control (I&C) system architecture at a nuclear power plant (NPP) incorporates protections against common-cause failures (CCFs) through the use of diversity and defense-in-depth. Even for well-established analog-based I&C system designs, the potential for CCFs of multiple systems (or redundancies within a system) constitutes a credible threat to defeating the defense-in-depth provisions within the I&C system architectures. The integration of digital technologies into the I&C systems provides many advantages compared to the aging analog systems with respect to reliability, maintenance, operability, and cost effectiveness. However, maintaining the diversity and defense-in-depth for both the hardware and software within themore » digital system is challenging. In fact, the introduction of digital technologies may actually increase the potential for CCF vulnerabilities because of the introduction of undetected systematic faults. These systematic faults are defined as a “design fault located in a software component” and at a high level, are predominately the result of (1) errors in the requirement specification, (2) inadequate provisions to account for design limits (e.g., environmental stress), or (3) technical faults incorporated in the internal system (or architectural) design or implementation. Other technology-neutral CCF concerns include hardware design errors, equipment qualification deficiencies, installation or maintenance errors, instrument loop scaling and setpoint mistakes.« less

  1. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    PubMed Central

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of care. An actual shortage of funding of personnel to coordinate the assessment process is the most important threat. Conclusion The BelRAI-software allows standardized transmural information transfer and the centralization of medical, allied health professionals and nursing data. It is strictly secured and follows strict privacy regulations, allowing hospitals to optimize (transmural) communication and interaction. However, weaknesses and threats exist and must be tackled in order to promote large scale implementation. PMID:24007312

  2. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting.

    PubMed

    Devriendt, Els; Wellens, Nathalie I H; Flamaing, Johan; Declercq, Anja; Moons, Philip; Boonen, Steven; Milisen, Koen

    2013-09-05

    The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons' medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients' data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. The primary strengths of the BelRAI-system were a structured overview of the patients' condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of care. An actual shortage of funding of personnel to coordinate the assessment process is the most important threat. The BelRAI-software allows standardized transmural information transfer and the centralization of medical, allied health professionals and nursing data. It is strictly secured and follows strict privacy regulations, allowing hospitals to optimize (transmural) communication and interaction. However, weaknesses and threats exist and must be tackled in order to promote large scale implementation.

  3. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    NASA Technical Reports Server (NTRS)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  4. The Safety Analysis of Shipborne Ammunition in Fire Environment

    NASA Astrophysics Data System (ADS)

    Ren, Junpeng; Wang, Xudong; Yue, Pengfei

    2017-12-01

    The safety of Ammunition has always been the focus of national military science and technology issues. And fire is one of the major safety threats to the ship’s ammunition storage environment, In this paper, Mk-82 shipborne aviation bomb has been taken as the study object, simulated the whole process of fire by using the FDS (Fire Detection System) software. According to the simulation results of FDS, ANSYS software was used to simulate the temperature field of Mk-82 carrier-based aviation bomb under fire environment, and the safety of aviation bomb in fire environment was analyzed. The result shows that the aviation bombs under the fire environment can occur the combustion or explosion after 70s constant cook-off, and it was a huge threat to the ship security.

  5. Force versus fury: Sex differences in the relationships among physical and psychological threat potential, the facial width-to-height ratio, and judgements of aggressiveness.

    PubMed

    MacDonell, Elliott T; Geniole, Shawn N; McCormick, Cheryl M

    2018-06-07

    Individuals with larger facial width-to-height ratios (FWHRs) are judged as more threatening, and engage in more threat-related behavior, than do individuals with smaller FWHRs. Here we identified components of threat potential that are related to the FWHR. In Study 1, the FWHR was correlated positively with physical threat potential (bicep size) in women and with both physical and psychological (anger proneness) threat potential in men. Behavioral aggression was measured in a subset of these participants using the Point Subtraction Aggression Paradigm (costly aggression) and a Money Allocation Task (non-costly aggression). Psychological (but not physical) threat potential predicted non-costly aggression and physical (but not psychological) threat potential predicted costly aggression. In Study 2, a separate set of participants judged the anger proneness, strength, or aggressiveness of male participants photographed in Study 1. Participants' judgements of all three characteristics were associated with the FWHR, and there were sex differences in how aggressiveness was conceptualized (for women, aggressiveness was associated with anger proneness, for men, aggressiveness was associated with strength). These results are consistent with the hypothesis that the FWHR may be an adaptation to cue the threat potential of men. © 2018 Wiley Periodicals, Inc.

  6. Using Honeynets and the Diamond Model for ICS Threat Analysis

    DTIC Science & Technology

    2016-05-11

    TR-006 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY Distribution Statement A: Approved for Public Release; Distribution is...Unlimited Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security under Contract...No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and

  7. A generic open-source software framework supporting scenario simulations in bioterrorist crises.

    PubMed

    Falenski, Alexander; Filter, Matthias; Thöns, Christian; Weiser, Armin A; Wigger, Jan-Frederik; Davis, Matthew; Douglas, Judith V; Edlund, Stefan; Hu, Kun; Kaufman, James H; Appel, Bernd; Käsbohrer, Annemarie

    2013-09-01

    Since the 2001 anthrax attack in the United States, awareness of threats originating from bioterrorism has grown. This led internationally to increased research efforts to improve knowledge of and approaches to protecting human and animal populations against the threat from such attacks. A collaborative effort in this context is the extension of the open-source Spatiotemporal Epidemiological Modeler (STEM) simulation and modeling software for agro- or bioterrorist crisis scenarios. STEM, originally designed to enable community-driven public health disease models and simulations, was extended with new features that enable integration of proprietary data as well as visualization of agent spread along supply and production chains. STEM now provides a fully developed open-source software infrastructure supporting critical modeling tasks such as ad hoc model generation, parameter estimation, simulation of scenario evolution, estimation of effects of mitigation or management measures, and documentation. This open-source software resource can be used free of charge. Additionally, STEM provides critical features like built-in worldwide data on administrative boundaries, transportation networks, or environmental conditions (eg, rainfall, temperature, elevation, vegetation). Users can easily combine their own confidential data with built-in public data to create customized models of desired resolution. STEM also supports collaborative and joint efforts in crisis situations by extended import and export functionalities. In this article we demonstrate specifically those new software features implemented to accomplish STEM application in agro- or bioterrorist crisis scenarios.

  8. The Pedestrian Evacuation Analyst: geographic information systems software for modeling hazard evacuation potential

    USGS Publications Warehouse

    Jones, Jeanne M.; Ng, Peter; Wood, Nathan J.

    2014-01-01

    Recent disasters such as the 2011 Tohoku, Japan, earthquake and tsunami; the 2013 Colorado floods; and the 2014 Oso, Washington, mudslide have raised awareness of catastrophic, sudden-onset hazards that arrive within minutes of the events that trigger them, such as local earthquakes or landslides. Due to the limited amount of time between generation and arrival of sudden-onset hazards, evacuations are typically self-initiated, on foot, and across the landscape (Wood and Schmidtlein, 2012). Although evacuation to naturally occurring high ground may be feasible in some vulnerable communities, evacuation modeling has demonstrated that other communities may require vertical-evacuation structures within a hazard zone, such as berms or buildings, if at-risk individuals are to survive some types of sudden-onset hazards (Wood and Schmidtlein, 2013). Researchers use both static least-cost-distance (LCD) and dynamic agent-based models to assess the pedestrian evacuation potential of vulnerable communities. Although both types of models help to understand the evacuation landscape, LCD models provide a more general overview that is independent of population distributions, which may be difficult to quantify given the dynamic spatial and temporal nature of populations (Wood and Schmidtlein, 2012). Recent LCD efforts related to local tsunami threats have focused on an anisotropic (directionally dependent) path distance modeling approach that incorporates travel directionality, multiple travel speed assumptions, and cost surfaces that reflect variations in slope and land cover (Wood and Schmidtlein, 2012, 2013). The Pedestrian Evacuation Analyst software implements this anisotropic path-distance approach for pedestrian evacuation from sudden-onset hazards, with a particular focus at this time on local tsunami threats. The model estimates evacuation potential based on elevation, direction of movement, land cover, and travel speed and creates a map showing travel times to safety (a time map) throughout a hazard zone. Model results provide a general, static view of the evacuation landscape at different pedestrian travel speeds and can be used to identify areas outside the reach of naturally occurring high ground. In addition, data on the size and location of different populations within the hazard zone can be integrated with travel-time maps to create tables and graphs of at-risk population counts as a function of travel time to safety. As a decision-support tool, the Pedestrian Evacuation Analyst provides the capability to evaluate the effectiveness of various vertical-evacuation structures within a study area, both through time maps of the modeled travel-time landscape with a potential structure in place and through comparisons of population counts within reach of safety. The Pedestrian Evacuation Analyst is designed for use by researchers examining the pedestrian-evacuation potential of an at-risk community. In communities where modeled evacuation times exceed the event (for example, tsunami wave) arrival time, researchers can use the software with emergency managers to assess the area and population served by potential vertical-evacuation options. By automating and managing the modeling process, the software allows researchers to concentrate efforts on providing crucial and timely information on community vulnerability to sudden-onset hazards.

  9. Introduction: Cybersecurity and Software Assurance Minitrack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Burns, Luanne; George, Richard; Linger, Richard C

    Modern society is dependent on software systems of remarkable scope and complexity. Yet methods for assuring their security and functionality have not kept pace. The result is persistent compromises and failures despite best efforts. Cybersecurity methods must work together for situational awareness, attack prevention and detection, threat attribution, minimization of consequences, and attack recovery. Because defective software cannot be secure, assurance technologies must play a central role in cybersecurity approaches. There is increasing recognition of the need for rigorous methods for cybersecurity and software assurance. The goal of this minitrack is to develop science foundations, technologies, and practices that canmore » improve the security and dependability of complex systems.« less

  10. Cloud Service Provider Methods for Managing Insider Threats: Analysis Phase 1

    DTIC Science & Technology

    2013-11-01

    of Standards and Technology (NIST) Special Publication 800-145 (NIST SP 800-145) defines three types of cloud services : Software as a Service ( SaaS ...among these three models. NIST SP 800-145 describes the three service models as follows: SaaS —The capability provided to the consumer is to use the...Cloud Service Provider Methods for Managing Insider Threats: Analysis Phase I Greg Porter November 2013 TECHNICAL NOTE CMU/SEI-2013-TN-020

  11. Near-Earth object intercept trajectory design for planetary defense

    NASA Astrophysics Data System (ADS)

    Vardaxis, George; Wie, Bong

    2014-08-01

    Tracking the orbit of asteroids and planning for asteroid missions have ceased to be a simple exercise, and become more of a necessity, as the number of identified potentially hazardous near-Earth asteroids increases. Several software tools such as Mystic, MALTO, Copernicus, SNAP, OTIS, and GMAT have been developed by NASA for spacecraft trajectory optimization and mission design. However, this paper further expands upon the development and validation of an Asteroid Mission Design Software Tool (AMiDST), through the use of approach and post-encounter orbital variations and analytic keyhole theory. Combining these new capabilities with that of a high-precision orbit propagator, this paper describes fictional mission trajectory design examples of using AMiDST as applied to a fictitious asteroid 2013 PDC-E. During the 2013 IAA Planetary Defense Conference, the asteroid 2013 PDC-E was used for an exercise where participants simulated the decision-making process for developing deflection and civil defense responses to a hypothetical asteroid threat.

  12. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    PubMed

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil biota. Copyright © 2015 The Authors. Published by Elsevier B.V. All rights reserved.

  13. Models for Threat Assessment in Networks

    DTIC Science & Technology

    2006-09-01

    Software International and Command AntiVirus . [Online]. Available: http://www.commandsoftware.com/virus/newlove.html [38] C. Ng and P. Ferrie. (2000...28 2.3 False positive trends across all population sizes for r=0.7 and m=0.1 . . . . 33 2.4 False negative trends across all population...benefits analysis is often performed to determine the list of mitigation procedures. Traditionally, risk assessment has been done in part with software

  14. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardwaremore » and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.« less

  15. Radioactive threat detection using scintillant-based detectors

    NASA Astrophysics Data System (ADS)

    Chalmers, Alex

    2004-09-01

    An update to the performance of AS&E's Radioactive Threat Detection sensor technology. A model is presented detailing the components of the scintillant-based RTD system employed in AS&E products aimed at detecting radiological WMD. An overview of recent improvements in the sensors, electrical subsystems and software algorithms are presented. The resulting improvements in performance are described and sample results shown from existing systems. Advanced and future capabilities are described with an assessment of their feasibility and their application to Homeland Defense.

  16. Chicken barn climate and hazardous volatile compounds control using simple linear regression and PID

    NASA Astrophysics Data System (ADS)

    Abdullah, A. H.; Bakar, M. A. A.; Shukor, S. A. A.; Saad, F. S. A.; Kamis, M. S.; Mustafa, M. H.; Khalid, N. S.

    2016-07-01

    The hazardous volatile compounds from chicken manure in chicken barn are potentially to be a health threat to the farm animals and workers. Ammonia (NH3) and hydrogen sulphide (H2S) produced in chicken barn are influenced by climate changes. The Electronic Nose (e-nose) is used for the barn's air, temperature and humidity data sampling. Simple Linear Regression is used to identify the correlation between temperature-humidity, humidity-ammonia and ammonia-hydrogen sulphide. MATLAB Simulink software was used for the sample data analysis using PID controller. Results shows that the performance of PID controller using the Ziegler-Nichols technique can improve the system controller to control climate in chicken barn.

  17. The wilderness threats matrix: A framework for assessing impacts

    Treesearch

    David N. Cole

    1994-01-01

    A comprehensive framework for assessing threats to wilderness is described. The framework is represented as a matrix of potential threats and attributes of wilderness character. Cells in the matrix represent the impacts of threats on each attribute. Potential applications of the matrix are described. An application of the matrix to the wildernesses in the Forest...

  18. A Home Ignition Assessment Model Applied to Structures in the Wildland-Urban Interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Biswas, Kaushik; Werth, David; Gupta, Narendra

    2013-01-01

    The issue of exterior fire threat to buildings, from either wildfires in the wildland-urban interface or neighboring structure fires, is critically important. To address this, theWildfire Ignition Resistant Home Design (WIRHD) program was initiated. The WIRHD program developed a tool, theWildFIREWizard, that will allow homeowners to estimate the external fire threat to their homes based on specific features and characteristics of the homes and yards. The software then makes recommendations to reduce the threat. The inputs include the structural and material features of the home and information about any ignition sources or flammable objects in its immediate vicinity, known asmore » the home ignition zone. The tool comprises an ignition assessment model that performs explicit calculations of the radiant and convective heating of the building envelope from the potential ignition sources. This article describes a series of material ignition and flammability tests that were performed to calibrate and/or validate the ignition assessment model. The tests involved exposing test walls with different external siding types to radiant heating and/or direct flame contact.The responses of the test walls were used to determine the conditions leading to melting, ignition, or any other mode of failure of the walls. Temperature data were used to verify the model predictions of temperature rises and ignition times of the test walls.« less

  19. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    PubMed

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  20. Unique Approach to Threat Analysis Mapping: A Malware Centric Methodology for Better Understanding the Adversary Landscape

    DTIC Science & Technology

    2016-04-05

    Unlimited http://www.sei.cmu.edu CMU/SEI-2016-TR-004 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY Distribution Statement A...Approved for Public Release; Distribution is Unlimited Copyright 2016 Carnegie Mellon University

 This material is based upon work funded and supported...by Department of Homeland Security under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software

  1. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 9

    DTIC Science & Technology

    2006-09-01

    it does. Several freely down- loadable methodologies have emerged to support the developer in modeling threats to applications and other soft...SECURIS. Model -Driven Develop - ment and Analysis of Secure Information Systems <www.sintef.no/ content/page1_1824.aspx>. 10. The SECURIS Project ...By applying these methods to the SDLC , we can actively reduce the number of known vulnerabilities in software as it is developed . For

  2. Reactivity to uncertain threat as a familial vulnerability factor for alcohol use disorder.

    PubMed

    Gorka, S M; Hee, D; Lieberman, L; Mittal, V A; Phan, K L; Shankman, S A

    2016-12-01

    When sober, problematic drinkers display exaggerated reactivity to threats that are uncertain (U-threat). Since this aversive affective state can be alleviated via acute alcohol intoxication, it has been posited that individuals who exhibit heightened reactivity to U-threat at baseline are motivated to use alcohol as a means of avoidance-based coping, setting the stage for excessive drinking. To date, however, no study has attempted to characterize the dispositional nature of exaggerated reactivity to U-threat and test whether it is a vulnerability factor or exclusively a disease marker of problematic alcohol use. The current investigation utilized a family study design to address these gaps by examining whether (1) reactivity to U-threat is associated with risk for problematic alcohol use, defined by family history of alcohol use disorder (AUD) and (2) reactivity to U-threat is correlated amongst adult biological siblings. A total of 157 families, and 458 individuals, participated in the study and two biological siblings completed a threat-of-shock task designed to probe reactivity to U-threat and predictable threat (P-threat). Startle potentiation was collected as an index of aversive responding. Within biological siblings, startle potentiation to U-threat [intraclass correlation (ICC) = 0.35] and P-threat (ICC = 0.63) was significantly correlated. In addition, independent of an individuals' own AUD status, startle potentiation to U-threat, but not P-threat, was positively associated with risk for AUD (i.e. AUD family history). This suggests that heightened reactivity to U-threat may be a familial vulnerability factor for problematic drinking and a novel prevention target for AUD.

  3. Data and software tools for gamma radiation spectral threat detection and nuclide identification algorithm development and evaluation

    NASA Astrophysics Data System (ADS)

    Portnoy, David; Fisher, Brian; Phifer, Daniel

    2015-06-01

    The detection of radiological and nuclear threats is extremely important to national security. The federal government is spending significant resources developing new detection systems and attempting to increase the performance of existing ones. The detection of illicit radionuclides that may pose a radiological or nuclear threat is a challenging problem complicated by benign radiation sources (e.g., cat litter and medical treatments), shielding, and large variations in background radiation. Although there is a growing acceptance within the community that concentrating efforts on algorithm development (independent of the specifics of fully assembled systems) has the potential for significant overall system performance gains, there are two major hindrances to advancements in gamma spectral analysis algorithms under the current paradigm: access to data and common performance metrics along with baseline performance measures. Because many of the signatures collected during performance measurement campaigns are classified, dissemination to algorithm developers is extremely limited. This leaves developers no choice but to collect their own data if they are lucky enough to have access to material and sensors. This is often combined with their own definition of metrics for measuring performance. These two conditions make it all but impossible for developers and external reviewers to make meaningful comparisons between algorithms. Without meaningful comparisons, performance advancements become very hard to achieve and (more importantly) recognize. The objective of this work is to overcome these obstacles by developing and freely distributing real and synthetically generated gamma-spectra data sets as well as software tools for performance evaluation with associated performance baselines to national labs, academic institutions, government agencies, and industry. At present, datasets for two tracks, or application domains, have been developed: one that includes temporal spectral data at 1 s time intervals, which represents data collected by a mobile system operating in a dynamic radiation background environment; and one that represents static measurements with a foreground spectrum (background plus source) and a background spectrum. These data include controlled variations in both Source Related Factors (nuclide, nuclide combinations, activities, distances, collection times, shielding configurations, and background spectra) and Detector Related Factors (currently only gain shifts, but resolution changes and non-linear energy calibration errors will be added soon). The software tools will allow the developer to evaluate the performance impact of each of these factors. Although this first implementation is somewhat limited in scope, considering only NaI-based detection systems and two application domains, it is hoped that (with community feedback) a wider range of detector types and applications will be included in the future. This article describes the methods used for dataset creation, the software validation/performance measurement tools, the performance metrics used, and examples of baseline performance.

  4. Radiation anomaly detection algorithms for field-acquired gamma energy spectra

    NASA Astrophysics Data System (ADS)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Wolff, Ron; Guss, Paul; Mitchell, Stephen

    2015-08-01

    The Remote Sensing Laboratory (RSL) is developing a tactical, networked radiation detection system that will be agile, reconfigurable, and capable of rapid threat assessment with high degree of fidelity and certainty. Our design is driven by the needs of users such as law enforcement personnel who must make decisions by evaluating threat signatures in urban settings. The most efficient tool available to identify the nature of the threat object is real-time gamma spectroscopic analysis, as it is fast and has a very low probability of producing false positive alarm conditions. Urban radiological searches are inherently challenged by the rapid and large spatial variation of background gamma radiation, the presence of benign radioactive materials in terms of the normally occurring radioactive materials (NORM), and shielded and/or masked threat sources. Multiple spectral anomaly detection algorithms have been developed by national laboratories and commercial vendors. For example, the Gamma Detector Response and Analysis Software (GADRAS) a one-dimensional deterministic radiation transport software capable of calculating gamma ray spectra using physics-based detector response functions was developed at Sandia National Laboratories. The nuisance-rejection spectral comparison ratio anomaly detection algorithm (or NSCRAD), developed at Pacific Northwest National Laboratory, uses spectral comparison ratios to detect deviation from benign medical and NORM radiation source and can work in spite of strong presence of NORM and or medical sources. RSL has developed its own wavelet-based gamma energy spectral anomaly detection algorithm called WAVRAD. Test results and relative merits of these different algorithms will be discussed and demonstrated.

  5. Parallel processing of general and specific threat during early stages of perception

    PubMed Central

    2016-01-01

    Differential processing of threat can consummate as early as 100 ms post-stimulus. Moreover, early perception not only differentiates threat from non-threat stimuli but also distinguishes among discrete threat subtypes (e.g. fear, disgust and anger). Combining spatial-frequency-filtered images of fear, disgust and neutral scenes with high-density event-related potentials and intracranial source estimation, we investigated the neural underpinnings of general and specific threat processing in early stages of perception. Conveyed in low spatial frequencies, fear and disgust images evoked convergent visual responses with similarly enhanced N1 potentials and dorsal visual (middle temporal gyrus) cortical activity (relative to neutral cues; peaking at 156 ms). Nevertheless, conveyed in high spatial frequencies, fear and disgust elicited divergent visual responses, with fear enhancing and disgust suppressing P1 potentials and ventral visual (occipital fusiform) cortical activity (peaking at 121 ms). Therefore, general and specific threat processing operates in parallel in early perception, with the ventral visual pathway engaged in specific processing of discrete threats and the dorsal visual pathway in general threat processing. Furthermore, selectively tuned to distinctive spatial-frequency channels and visual pathways, these parallel processes underpin dimensional and categorical threat characterization, promoting efficient threat response. These findings thus lend support to hybrid models of emotion. PMID:26412811

  6. Assessing the Potential Threat Landscape of a Proposed Reintroduction Site for Carnivores

    PubMed Central

    Page, Samantha K.; Parker, Daniel M.; Peinke, Dean M.; Davies-Mostert, Harriet T.

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent’s first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid. PMID:25822468

  7. Defensive motivation and attention in anticipation of different types of predictable and unpredictable threat: A startle and event-related potential investigation.

    PubMed

    Nelson, Brady D; Hajcak, Greg

    2017-08-01

    Predictability is an important characteristic of threat that impacts defensive motivation and attentional engagement. Supporting research has primarily focused on actual threat (e.g., shocks), and it is unclear whether the predictability of less intense threat (e.g., unpleasant pictures) similarly affects motivation and attention. The present study utilized a within-subject design and examined defensive motivation (startle reflex and self-reported anxiety) and attention (probe N100 and P300) in anticipation of shocks and unpleasant pictures during a no, predictable, and unpredictable threat task. This study also examined the impact of predictability on the P300 to shocks and late positive potential (LPP) to unpleasant pictures. The startle reflex and self-reported anxiety were increased in anticipation of both types of threat relative to no threat. Furthermore, startle potentiation in anticipation of unpredictable threat was greater for shocks compared to unpleasant pictures, but there was no difference for predictable threat. The probe N100 was enhanced in anticipation of unpredictable threat relative to predictable threat and no threat, and the probe P300 was suppressed in anticipation of predictable and unpredictable threat relative to no threat. These effects did not differ between the shock and unpleasant picture trials. Finally, the P300 and early LPP component were increased in response to unpredictable relative to predictable shocks and unpleasant pictures, respectively. The present study suggests that the unpredictability of unpleasant pictures increases defensive motivation, but to a lesser degree relative to actual threat. Moreover, unpredictability enhances attentional engagement in anticipation of, and in reaction to, both types of threat. © 2017 Society for Psychophysiological Research.

  8. Monitoring Space Weather Hazards caused by geomagnetic disturbances with Space Hazard Monitor (SHM) systems

    NASA Astrophysics Data System (ADS)

    Xu, Z.; Gannon, J. L.; Peek, T. A.; Lin, D.

    2017-12-01

    One space weather hazard is the Geomagnetically Induced Currents (GICs) in the electric power transmission systems, which is naturally induced geoelectric field during the geomagnetic disturbances (GMDs). GICs are a potentially catastrophic threat to bulk power systems. For instance, the Blackout in Quebec in March 1989 was caused by GMDs during a significant magnetic storm. To monitor the GMDs, the autonomous Space Hazard Monitor (SHM) system is developed recently. The system includes magnetic field measurement from magnetometers and geomagnetic field measurement from electrodes. In this presentation, we introduce the six sites of SHMs which have been deployed in the US continental regions. The data from the magnetometers are processed with the Multiple Observatory Geomagnetic Data Analysis Software (MOGDAS). And the statistical results are presented here. It reveals not only the impacts of space weather over US continental region but also the potential of improving instrumentation development to provide better space weather monitor.

  9. Open source IPSEC software in manned and unmanned space missions

    NASA Astrophysics Data System (ADS)

    Edwards, Jacob

    Network security is a major topic of research because cyber attackers pose a threat to national security. Securing ground-space communications for NASA missions is important because attackers could endanger mission success and human lives. This thesis describes how an open source IPsec software package was used to create a secure and reliable channel for ground-space communications. A cost efficient, reproducible hardware testbed was also created to simulate ground-space communications. The testbed enables simulation of low-bandwidth and high latency communications links to experiment how the open source IPsec software reacts to these network constraints. Test cases were built that allowed for validation of the testbed and the open source IPsec software. The test cases also simulate using an IPsec connection from mission control ground routers to points of interest in outer space. Tested open source IPsec software did not meet all the requirements. Software changes were suggested to meet requirements.

  10. A systematic conservation planning approach to fire risk management in Natura 2000 sites.

    PubMed

    Foresta, Massimiliano; Carranza, Maria Laura; Garfì, Vittorio; Di Febbraro, Mirko; Marchetti, Marco; Loy, Anna

    2016-10-01

    A primary challenge in conservation biology is to preserve the most representative biodiversity while simultaneously optimizing the efforts associated with conservation. In Europe, the implementation of the Natura 2000 network requires protocols to recognize and map threats to biodiversity and to identify specific mitigation actions. We propose a systematic conservation planning approach to optimize management actions against specific threats based on two fundamental parameters: biodiversity values and threat pressure. We used the conservation planning software Marxan to optimize a fire management plan in a Natura 2000 coastal network in southern Italy. We address three primary questions: i) Which areas are at high fire risk? ii) Which areas are the most valuable for threatened biodiversity? iii) Which areas should receive priority risk-mitigation actions for the optimal effect?, iv) which fire-prevention actions are feasible in the management areas?. The biodiversity values for the Natura 2000 spatial units were derived from the distribution maps of 18 habitats and 89 vertebrate species of concern in Europe (Habitat Directive 92/43/EEC). The threat pressure map, defined as fire probability, was obtained from digital layers of fire risk and of fire frequency. Marxan settings were defined as follows: a) planning units of 40 × 40 m, b) conservation features defined as all habitats and vertebrate species of European concern occurring in the study area, c) conservation targets defined according with fire sensitivity and extinction risk of conservation features, and d) costs determined as the complement of fire probabilities. We identified 23 management areas in which to concentrate efforts for the optimal reduction of fire-induced effects. Because traditional fire prevention is not feasible for most of policy habitats included in the management areas, alternative prevention practices were identified that allows the conservation of the vegetation structure. The proposed approach has potential applications for multiple landscapes, threats and spatial scales and could be extended to other valuable natural areas, including protected areas. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Computing Legacy Software Behavior to Understand Functionality and Security Properties: An IBM/370 Demonstration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Linger, Richard C; Pleszkoch, Mark G; Prowell, Stacy J

    Organizations maintaining mainframe legacy software can benefit from code modernization and incorporation of security capabilities to address the current threat environment. Oak Ridge National Laboratory is developing the Hyperion system to compute the behavior of software as a means to gain understanding of software functionality and security properties. Computation of functionality is critical to revealing security attributes, which are in fact specialized functional behaviors of software. Oak Ridge is collaborating with MITRE Corporation to conduct a demonstration project to compute behavior of legacy IBM Assembly Language code for a federal agency. The ultimate goal is to understand functionality and securitymore » vulnerabilities as a basis for code modernization. This paper reports on the first phase, to define functional semantics for IBM Assembly instructions and conduct behavior computation experiments.« less

  12. Cloud Service Provider Methods for Managing Insider Threats: Analysis Phase 2, Expanded Analysis and Recommendations

    DTIC Science & Technology

    2014-01-01

    and software as a service ( SaaS )) for staff’s abnormal behavior that may indicate an insider incident. As mentioned above, combining SIEM data...Mellon Software Engineering Institute, contacted commercial and government cloud service providers (CSPs) to better understand the administrative and...availability services . We have observed a number of scenarios in which a customer leaves a CSP’s IaaS, PaaS, or SaaS , but its data remains online for some

  13. Anxiety and Depression Symptom Dimensions Demonstrate Unique Relationships with the Startle Reflex in Anticipation of Unpredictable Threat in 8 to 14 Year-Old Girls.

    PubMed

    Nelson, Brady D; Hajcak, Greg

    2017-02-01

    There is growing evidence that heightened sensitivity to unpredictability is a core mechanism of anxiety disorders. In adults, multiple anxiety disorders have been associated with a heightened startle reflex in anticipation of unpredictable threat. Child and adolescent anxiety has been linked to an increased startle reflex across baseline, safety, and threat conditions. However, it is unclear whether anxiety in youth is related to the startle reflex as a function of threat predictability. In a sample of 90 8 to 14 year-old girls, the present study examined the association between anxiety symptom dimensions and startle potentiation during a no, predictable, and unpredictable threat task. Depression symptom dimensions were also examined given their high comorbidity with anxiety and mixed relationship with the startle reflex and sensitivity to unpredictability. To assess current symptoms, participants completed the self-report Screen for Child Anxiety Related Emotional Disorders and Children's Depression Inventory. Results indicated that social phobia symptoms were associated with heightened startle potentiation in anticipation of unpredictable threat and attenuated startle potentiation in anticipation of predictable threat. Negative mood and negative self-esteem symptoms were associated with attenuated and heightened startle potentiation in anticipation of unpredictable threat, respectively. All results remained significant after controlling for the other symptom dimensions. The present study provides initial evidence that anxiety and depression symptom dimensions demonstrate unique associations with the startle reflex in anticipation of unpredictable threat in children and adolescents.

  14. Anxiety and Depression Symptom Dimensions Demonstrate Unique Relationships with the Startle Reflex in Anticipation of Unpredictable Threat in 8 to 14 Year-Old Girls

    PubMed Central

    Nelson, Brady D.; Hajcak, Greg

    2016-01-01

    There is growing evidence that heightened sensitivity to unpredictability is a core mechanism of anxiety disorders. In adults, multiple anxiety disorders have been associated with a heightened startle reflex in anticipation of unpredictable threat. Child and adolescent anxiety has been linked to an increased startle reflex across baseline, safety, and threat conditions. However, it is unclear whether anxiety in youth is related to the startle reflex as a function of threat predictability. In a sample of 90 8 to 14 year-old girls, the present study examined the association between anxiety symptom dimensions and startle potentiation during a no, predictable, and unpredictable threat task. Depression symptom dimensions were also examined given their high comorbidity with anxiety and mixed relationship with the startle reflex and sensitivity to unpredictability. To assess current symptoms, participants completed the self-report Screen for Child Anxiety Related Emotional Disorders and Children’s Depression Inventory. Results indicated that social phobia symptoms were associated with heightened startle potentiation in anticipation of unpredictable threat and attenuated startle potentiation in anticipation of predictable threat. Negative mood and negative self-esteem symptoms were associated with attenuated and heightened startle potentiation in anticipation of unpredictable threat, respectively. All results remained significant after controlling for the other symptom dimensions. The present study provides initial evidence that anxiety and depression symptom dimensions demonstrate unique associations with the startle reflex in anticipation of unpredictable threat in children and adolescents. PMID:27224989

  15. Eye Can See for Miles and Miles.

    ERIC Educational Resources Information Center

    School Planning & Management, 2002

    2002-01-01

    Describes how a New Hampshire school system eliminated internal school vandalism and bomb threats, and reduced the number of false alarms, by using video security software (WebEyeAlert security solution) that is accessible via a variety of methods from remote locations. (Author/EV)

  16. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  17. Electronic Health Record Implementation: A SWOT Analysis.

    PubMed

    Shahmoradi, Leila; Darrudi, Alireza; Arji, Goli; Farzaneh Nejad, Ahmadreza

    2017-10-01

    Electronic Health Record (EHR) is one of the most important achievements of information technology in healthcare domain, and if deployed effectively, it can yield predominant results. The aim of this study was a SWOT (strengths, weaknesses, opportunities, and threats) analysis in electronic health record implementation. This is a descriptive, analytical study conducted with the participation of a 90-member work force from Hospitals affiliated to Tehran University of Medical Sciences (TUMS). The data were collected by using a self-structured questionnaire and analyzed by SPSS software. Based on the results, the highest priority in strength analysis was related to timely and quick access to information. However, lack of hardware and infrastructures was the most important weakness. Having the potential to share information between different sectors and access to a variety of health statistics was the significant opportunity of EHR. Finally, the most substantial threats were the lack of strategic planning in the field of electronic health records together with physicians' and other clinical staff's resistance in the use of electronic health records. To facilitate successful adoption of electronic health record, some organizational, technical and resource elements contribute; moreover, the consideration of these factors is essential for HER implementation.

  18. An examination of stereotype threat effects on girls' mathematics performance.

    PubMed

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias.

  19. Startle Potentiation to Uncertain Threat as a Psychophysiological Indicator of Fear-based Psychopathology: An Examination across Multiple Internalizing Disorders

    PubMed Central

    Gorka, Stephanie M.; Lieberman, Lynne; Shankman, Stewart A.; Phan, K. Luan

    2016-01-01

    Heightened reactivity to uncertain threat (U-threat) is an important individual difference factor that may characterize fear-based internalizing psychopathologies (IPs) and distinguish them from distress/misery IPs. To date, however, the majority of existing research examining reactivity to U-threat has been within individuals with panic disorder and major depressive disorder (MDD) and no prior study has directly tested this hypothesis across multiple IPs. The current study therefore explored whether heightened reactivity to U-threat is a psychophysiological indicator of fear-based psychopathology across five groups: current 1) social anxiety disorder (SAD), 2) specific phobia (SP), 3) generalized anxiety disorder (GAD), 4) MDD, and 5) individuals with no history of psychopathology (controls). All 160 adults completed a well-validated threat-of-shock task designed to probe responses to predictable (P-) and U-threat. Startle eyeblink potentiation was recorded as an index of aversive arousal. Results indicated that individuals with SAD and SP evidenced greater startle potentiation to U-threat, but not P-threat, relative to individuals with GAD, MDD and controls (who did not differ). The current findings, along with the prior panic disorder and MDD literature, suggest that heightened reactivity to U-threat is a psychophysiological indicator of fear-based disorders and could represent a neurobiological organizing principle for internalizing psychopathology. The findings also suggest that individuals with fear disorders generally display a hypersensitivity to uncertain aversive events, which could contribute to their psychopathology. PMID:27868423

  20. At a global scale, do climate change threatened species also face a greater number of non-climatic threats?

    USGS Publications Warehouse

    Fortini, Lucas B.; Dye, Kaipo

    2017-01-01

    found other (but not all) anthropogenic threats are also similarly associated with more threats. Our findings serve as a reminder that ecological research should seriously consider these potential threat interactions, especially for species under elevated conservation concern.

  1. Conserving Earth's Biodiversity. [CD-ROM and] Instructor's Manual.

    ERIC Educational Resources Information Center

    2000

    This CD-ROM is designed as an interactive learning tool to support teaching in highly interdisciplinary fields such as conservation of biodiversity. Topics introduced in the software include the impact of humans on natural landscapes, threats to biodiversity, methods and theories of conservation biology, environmental laws, and relevant economic…

  2. The Computer Virus Threat and What You Can Do about It.

    ERIC Educational Resources Information Center

    Lateulere, John

    1992-01-01

    Discussion of computer viruses describes two types of viruses and how they work; suggests ways to prevent or minimize virus risk; and explains how to recognize a virus and limit damage once a virus attacks. A sidebar lists several antivirus software products. (two references) (NRP)

  3. DECISION-SUPPORT SOFTWARE FOR SOIL VAPOR EXTRACTION TECHNOLOGY APPLICATION: HYPERVENTILATE

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) estimate* that 15% to 20% of the approximately 1.7 million underground storage tank (UST) systems containing petroleum products are either leaking or will leak In the near future. These UST systems could pose a serious threat to p...

  4. Transmitting the sum of all fears: Iranian nuclear threat salience among offspring of Holocaust survivors.

    PubMed

    Shrira, Amit

    2015-07-01

    Many Israelis are preoccupied with the prospect of a nuclear-armed Iran, frequently associating it with the danger of annihilation that existed during the Holocaust. The current article examined whether offspring of Holocaust survivors (OHS) are especially preoccupied and sensitive to the Iranian threat, and whether this susceptibility is a part of their increased general image of actual and potential threats, defined as the hostile world scenario (HWS). Study 1 (N = 106) showed that relative to comparisons, OHS reported more preoccupation with the Iranian nuclear threat. Moreover, the positive relationship between the salience of the Iranian threat and symptoms of anxiety was stronger among OHS. Study 2 (N = 450) replicated these findings, while focusing on the Iranian nuclear threat salience and symptoms of psychological distress. It further showed that OHS reported more negative engagement with the HWS (i.e., feeling that surrounding threats decrease one's sense of competence), which in turn mediated their increased preoccupation with the Iranian threat. The results suggest that intergenerational transmission of the Holocaust trauma includes heightened preoccupation with and sensitivity to potential threats of annihilation, and that the specific preoccupation with threats of annihilation reflects a part of a more general preoccupation with surrounding threats. (c) 2015 APA, all rights reserved).

  5. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    ERIC Educational Resources Information Center

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  6. Association between problematic alcohol use and reactivity to uncertain threat in two independent samples

    PubMed Central

    Gorka, Stephanie M.; Lieberman, Lynne; Phan, K. Luan; Shankman, Stewart A.

    2016-01-01

    Background Recent laboratory studies have shown that acute alcohol intoxication selectively and effectively dampens aversive responding to an uncertain threat. An emerging hypothesis is that individuals who exhibit heightened reactivity to an uncertain threat may be especially motivated to use alcohol to dampen their distress, setting the stage for negative reinforcement processes to drive excessive alcohol use. However, no study to date has directly examined whether current problematic drinkers exhibit heightened reactivity to an uncertain threat as would be expected. Methods The present study was therefore designed to examine the association between current problematic alcohol use and reactivity to an uncertain threat during sobriety in two, independent samples. In Study 1 (n = 221) and Study 2 (n = 74), adult participants completed the same well-validated threat-of-shock task which separately probes responses to temporally predictable and unpredictable threat. Startle potentiation was measured as an index of aversive responding. Problematic alcohol use was defined as number of binge episodes within the past 30 days in Study 1 and total scores on a self-report measure of hazardous drinking in Study 2. Results As hypothesized, across both studies greater levels of problematic drinking were associated with greater startle potentiation to an unpredictable threat. In Study 2, hazardous drinking scores were also positively associated with startle potentiation to predictable threat. Conclusions The findings are notably consistent with the notion that heightened reactivity to an uncertain threat is an important individual difference factor associated with the onset and/or maintenance of problematic drinking behaviors and may therefore be a novel prevention and intervention target. PMID:27173662

  7. Startle potentiation to uncertain threat as a psychophysiological indicator of fear-based psychopathology: An examination across multiple internalizing disorders.

    PubMed

    Gorka, Stephanie M; Lieberman, Lynne; Shankman, Stewart A; Phan, K Luan

    2017-01-01

    Heightened reactivity to uncertain threat (U-threat) is an important individual difference factor that may characterize fear-based internalizing psychopathologies (IPs) and distinguish them from distress/misery IPs. To date, however, the majority of existing research examining reactivity to U-threat has been within individuals with panic disorder and major depressive disorder (MDD) and no prior study has directly tested this hypothesis across multiple IPs. The current study therefore explored whether heightened reactivity to U-threat is a psychophysiological indicator of fear-based psychopathology across 5 groups: current (a) social anxiety disorder (SAD); (b) specific phobia (SP); (c) generalized anxiety disorder (GAD); (d) MDD; and (c) individuals with no history of psychopathology (controls). All 160 adults completed a well-validated threat-of-shock task designed to probe responses to predictable (P-) and U-threat. Startle eyeblink potentiation was recorded as an index of aversive arousal. Results indicated that individuals with SAD and SP evidenced greater startle potentiation to U-threat, but not P-threat, relative to individuals with GAD, MDD, and controls (who did not differ). The current findings, along with the prior panic disorder and MDD literature, suggest that heightened reactivity to U-threat is a psychophysiological indicator of fear-based disorders and could represent a neurobiological organizing principle for internalizing psychopathology. The findings also suggest that individuals with fear disorders generally display a hypersensitivity to uncertain aversive events, which could contribute to their psychopathology. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  8. Software To Secure Distributed Propulsion Simulations

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines

  9. Medical Engagement: Beyond the MEDCAP

    DTIC Science & Technology

    2008-04-16

    threat faced by the possibility of the spread of biological weapons that could potentially impact the US. In response to the threat of biological ...spread and potential use of weaponized biological material improves the capacity to respond to such outbreaks as pandemic influenza,9 and is an...on the greater social order, (5) they may serve as a catalyst for regional instability, and (6) the threat posed by biological weapons use during

  10. Acute Mountain Sickness and Hemoconcentration in Next Generation Spacecraft

    NASA Technical Reports Server (NTRS)

    Conkin, Johnny

    2009-01-01

    This slide presentation reviews the threat astronauts face from acute mountain sickness (AMS). It includes information about the symptoms of AMS, the potential threat to astronauts, and future efforts to mitigate the AMS threat.

  11. Intelligent Software Agents: Sensor Integration and Response

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kulesz, James J; Lee, Ronald W

    2013-01-01

    Abstract In a post Macondo world the buzzwords are Integrity Management and Incident Response Management. The twin processes are not new but the opportunity to link the two is novel. Intelligent software agents can be used with sensor networks in distributed and centralized computing systems to enhance real-time monitoring of system integrity as well as manage the follow-on incident response to changing, and potentially hazardous, environmental conditions. The software components are embedded at the sensor network nodes in surveillance systems used for monitoring unusual events. When an event occurs, the software agents establish a new concept of operation at themore » sensing node, post the event status to a blackboard for software agents at other nodes to see , and then react quickly and efficiently to monitor the scale of the event. The technology addresses a current challenge in sensor networks that prevents a rapid and efficient response when a sensor measurement indicates that an event has occurred. By using intelligent software agents - which can be stationary or mobile, interact socially, and adapt to changing situations - the technology offers features that are particularly important when systems need to adapt to active circumstances. For example, when a release is detected, the local software agent collaborates with other agents at the node to exercise the appropriate operation, such as: targeted detection, increased detection frequency, decreased detection frequency for other non-alarming sensors, and determination of environmental conditions so that adjacent nodes can be informed that an event is occurring and when it will arrive. The software agents at the nodes can also post the data in a targeted manner, so that agents at other nodes and the command center can exercise appropriate operations to recalibrate the overall sensor network and associated intelligence systems. The paper describes the concepts and provides examples of real-world implementations including the Threat Detection and Analysis System (TDAS) at the International Port of Memphis and the Biological Warning and Incident Characterization System (BWIC) Environmental Monitoring (EM) Component. Technologies developed for these 24/7 operational systems have applications for improved real-time system integrity awareness as well as provide incident response (as needed) for production and field applications.« less

  12. If We Don’t, Who Will? The Employment of the United States Army to Combat Potential Pandemic Outbreaks in West Africa

    DTIC Science & Technology

    2015-06-12

    27 viii Threats to Validity and Biases ...draw conclusions and make recommendations for future research. Threats to Validity and Biases There are a several issues that pose a threat to...validity and bias to the research. Threats to validity affect the accuracy of the research and soundness of the conclusion. Threats to external validity

  13. H1N1 was not all that scary: uncertainty and stressor appraisals predict anxiety related to a coming viral threat.

    PubMed

    Taha, Sheena Aislinn; Matheson, Kimberly; Anisman, Hymie

    2014-04-01

    H1N1 reached pandemic proportions in 2009, yet considerable ambivalence was apparent concerning the threat presented and the inclination to be vaccinated. The present investigation assessed several factors, notably appraisals of the threat, intolerance of uncertainty, and familiarity with the virus, that might contribute to reactions to a potential future viral threat. Canadian adults (N = 316) provided with several scenarios regarding viral threats reported moderate feelings of anxiety, irrespective of whether the viral threat was one that was familiar versus one that was entirely unfamiliar to them (H1N1 recurrence, H5N1, a fictitious virus: D3N4). Participants appraised the stressfulness of the threats to be moderate and believed that they would have control in this situation. However, among individuals with high intolerance of uncertainty, the viral threat was accompanied by high levels of anxiety, which was mediated by aspects of appraisals, particularly control and stressfulness. In addition, among those individuals that generally appraised ambiguous life events as being stressful, the viral threat appraisals were accompanied by still greater anxiety. Given the limited response to potential viral threats, these results raise concerns that the public may be hesitant to heed recommendations should another pandemic occur. © 2013 John Wiley & Sons, Ltd.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Geelhood, Bruce D.; Wogman, Ned A.

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or “dirty” bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders ismore » considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.« less

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Geelhood, Bruce D.; Wogman, Ned A.

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. Themore » radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.« less

  16. Gaussian-based routines to impute categorical variables in health surveys.

    PubMed

    Yucel, Recai M; He, Yulei; Zaslavsky, Alan M

    2011-12-20

    The multivariate normal (MVN) distribution is arguably the most popular parametric model used in imputation and is available in most software packages (e.g., SAS PROC MI, R package norm). When it is applied to categorical variables as an approximation, practitioners often either apply simple rounding techniques for ordinal variables or create a distinct 'missing' category and/or disregard the nominal variable from the imputation phase. All of these practices can potentially lead to biased and/or uninterpretable inferences. In this work, we develop a new rounding methodology calibrated to preserve observed distributions to multiply impute missing categorical covariates. The major attractiveness of this method is its flexibility to use any 'working' imputation software, particularly those based on MVN, allowing practitioners to obtain usable imputations with small biases. A simulation study demonstrates the clear advantage of the proposed method in rounding ordinal variables and, in some scenarios, its plausibility in imputing nominal variables. We illustrate our methods on a widely used National Survey of Children with Special Health Care Needs where incomplete values on race posed a valid threat on inferences pertaining to disparities. Copyright © 2011 John Wiley & Sons, Ltd.

  17. Software Supply Chain Risk Management: From Products to Systems of Systems

    DTIC Science & Technology

    2010-12-01

    an n 2009 Graw er the , has linked on, the Maturity e authors l services o agreed icrosoft, gie CMU/SEI-2010-TN-026 | 12 Model...threat modeling is a part of Microsoft’s SDL [Howard 2006, Swiderski 2004]. Stephen Lipner has designated it as the most important part of the

  18. 3 CFR 8427 - Proclamation 8427 of October 1, 2009. National Cybersecurity Awareness Month, 2009

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... solutions at work and at home. Our Nation’s growing dependence on cyber and information-related technologies, coupled with an increasing threat of malicious cyber attacks and loss of privacy, has given rise to the... digital infrastructures. Cyber attacks and their viral ability to infect networks, devices, and software...

  19. Gender Difference in Event Related Potentials to Masked Emotional Stimuli in the Oddball Task

    PubMed Central

    Kim, Eun Young; Park, Gewnhi; Kim, Sangrae; Kim, Imyel; Chae, Jeong-Ho; Kim, Hyun Taek

    2013-01-01

    Objective We investigated gender differences in event-related potential (ERP) responses to subliminally presented threat-related stimuli. Methods Twenty-four participants were presented with threat-related and neutral pictures for a very brief period of time (17 ms). To explore gender differences in ERP responses to subliminally presented stimuli, we examined six ERP components [P1, N170, N250, P300, Early Posterior Negativity (EPN) and Late Positive Potential (LPP)]. Results The result revealed that only female participants showed significant increases in the N170 and the EPN in response to subliminally presented threat-related stimuli compared to neutral stimuli. Conclusion Our results suggest that female participants exhibit greater cortical processing of subliminally presented threat-related stimuli than male participants. PMID:23798965

  20. Considerations for developing technologies for an integrated person-borne IED countermeasure architecture

    NASA Astrophysics Data System (ADS)

    Lombardo, Nicholas J.; Knudson, Christa K.; Rutz, Frederick C.; Pattison, Kerrie J.; Stratton, Rex C.; Wiborg, James C.

    2010-04-01

    Developing an integrated person-borne improvised explosive device (IED) countermeasure to protect unstructured crowds at large public venues is the goal of the Standoff Technology Integration and Demonstration Program (STIDP), sponsored in part by the U.S. Department of Homeland Security (DHS). The architecture being developed includes countermeasure technologies deployed as a layered defense and enabling technologies for operating the countermeasures as an integrated system. In the architecture, early recognition of potentially higher-risk individuals is crucial. Sensors must be able to detect, with high accuracy, explosives' threat signatures in varying environmental conditions, from a variety of approaches and with dense crowds and limited dwell time. Command-and-control technologies are needed to automate sensor operation, reduce staffing requirements, improve situational awareness, and automate/facilitate operator decisions. STIDP is developing technical and operational requirements for standoff and remotely operated sensors and is working with federal agencies and foreign governments to implement these requirements into their research and development programs. STIDP also is developing requirements for a software platform to rapidly integrate and control various sensors; acquire, analyze, and record their data; and present the data in an operationally relevant manner. Requirements also are being developed for spatial analysis, tracking and assessing threats with available screening resources, and data fusion for operator decision-making.

  1. DOE SBIR Phase II Final Technical Report - Assessing Climate Change Effects on Wind Energy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whiteman, Cameron; Capps, Scott

    Specialized Vertum Partners software tools were prototyped, tested and commercialized to allow wind energy stakeholders to assess the uncertainties of climate change on wind power production and distribution. This project resulted in three commercially proven products and a marketing tool. The first was a Weather Research and Forecasting Model (WRF) based resource evaluation system. The second was a web-based service providing global 10m wind data from multiple sources to wind industry subscription customers. The third product addressed the needs of our utility clients looking at climate change effects on electricity distribution. For this we collaborated on the Santa Ana Wildfiremore » Threat Index (SAWTi), which was released publicly last quarter. Finally to promote these products and educate potential users we released “Gust or Bust”, a graphic-novel styled marketing publication.« less

  2. Economic Consequence Analysis of Disasters: The ECAT Software Tool

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rose, Adam; Prager, Fynn; Chen, Zhenhua

    This study develops a methodology for rapidly obtaining approximate estimates of the economic consequences from numerous natural, man-made and technological threats. This software tool is intended for use by various decision makers and analysts to obtain estimates rapidly. It is programmed in Excel and Visual Basic for Applications (VBA) to facilitate its use. This tool is called E-CAT (Economic Consequence Analysis Tool) and accounts for the cumulative direct and indirect impacts (including resilience and behavioral factors that significantly affect base estimates) on the U.S. economy. E-CAT is intended to be a major step toward advancing the current state of economicmore » consequence analysis (ECA) and also contributing to and developing interest in further research into complex but rapid turnaround approaches. The essence of the methodology involves running numerous simulations in a computable general equilibrium (CGE) model for each threat, yielding synthetic data for the estimation of a single regression equation based on the identification of key explanatory variables (threat characteristics and background conditions). This transforms the results of a complex model, which is beyond the reach of most users, into a "reduced form" model that is readily comprehensible. Functionality has been built into E-CAT so that its users can switch various consequence categories on and off in order to create customized profiles of economic consequences of numerous risk events. E-CAT incorporates uncertainty on both the input and output side in the course of the analysis.« less

  3. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglectedmore » or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .« less

  4. Alcohol's effects on emotionally motivated attention, defensive reactivity and subjective anxiety during uncertain threats.

    PubMed

    Bradford, Daniel E; Motschman, Courtney A; Starr, Mark J; Curtin, John J

    2017-11-01

    Developing a better understanding of how and under what circumstances alcohol affects the emotions, cognitions and neural functions that precede and contribute to dangerous behaviors during intoxication may help to reduce their occurrence. Alcohol intoxication has recently been shown to reduce defensive reactivity and anxiety more during uncertain vs certain threat. However, alcohol's effects on emotionally motivated attention to these threats are unknown. Alcohol may disrupt both affective response to and attentional processing of uncertain threats making intoxicated individuals less able to avoid dangerous and costly behaviors. To test this possibility, we examined the effects of a broad range of blood alcohol concentrations on 96 participants' sub-cortically mediated defensive reactivity (startle potentiation), retrospective subjective anxiety (self-report) and cortically assessed emotionally motivated attention (probe P3 event related potential) while they experienced visually cued uncertain and certain location electric shock threat. As predicted, alcohol decreased defensive reactivity and subjective anxiety more during uncertain vs certain threat. In a novel finding, alcohol dampened emotionally motivated attention during uncertain but not certain threat. This effect appeared independent of alcohol's effects on defensive reactivity and subjective anxiety. These results suggest that alcohol intoxication dampens processing of uncertain threats while leaving processing of certain threats intact. © The Author (2017). Published by Oxford University Press.

  5. Electrophysiological responses to threat in youth with and without Posttraumatic Stress Disorder.

    PubMed

    Grasso, Damion J; Simons, Robert F

    2012-04-01

    The current study was designed to examine event-related brain potentials and autonomic responses to pictures indicating threat, relative to non-threat, and acoustic startle reflexes in traumatized youth diagnosed with PTSD, relative to non-exposed children, before and after receiving psychotherapy. Children in the control group were individually yoked and demographically matched to the PTSD group. Both groups displayed enhanced late positive potentials and more prolonged heart rate deceleration to pictures indicating threat, relative to non-threat, and larger skin conductance responses to pictures indicating threat, relative to non-threat, at time one. At time two, controls appeared to habituate, as reflected by an overall attenuated skin conductance response, whereas the PTSD group showed little change. Across time points the PTSD group exhibited greater acoustic startle reflexes than the control group. Psychotherapy and symptom reduction was not associated with electrophysiology. Drawing from the adult literature, this study was an attempt to address the scarcity of research examining electrophysiological irregularities in childhood PTSD. The overall results suggest that children and adolescents allocate more attention to threat-related stimuli regardless of PTSD status, and exaggerated startle and a possible failure to habituate skin conductance responses to threat-related stimuli in youth with versus without PTSD. Copyright © 2012 Elsevier B.V. All rights reserved.

  6. Global threat to agriculture from invasive species.

    PubMed

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-05

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread.

  7. Global threat to agriculture from invasive species

    PubMed Central

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  8. The effect of stereotype threat on performance of a rhythmic motor skill.

    PubMed

    Huber, Meghan E; Seitchik, Allison E; Brown, Adam J; Sternad, Dagmar; Harkins, Stephen G

    2015-04-01

    Many studies using cognitive tasks have found that stereotype threat, or concern about confirming a negative stereotype about one's group, debilitates performance. The few studies that documented similar effects on sensorimotor performance have used only relatively coarse measures to quantify performance. This study tested the effect of stereotype threat on a rhythmic ball bouncing task, where previous analyses of the task dynamics afforded more detailed quantification of the effect of threat on motor control. In this task, novices hit the ball with positive racket acceleration, indicative of unstable performance. With practice, they learn to stabilize error by changing their ball-racket impact from positive to negative acceleration. Results showed that for novices, stereotype threat potentiated hitting the ball with positive racket acceleration, leading to poorer performance of stigmatized females. However, when the threat manipulation was delivered after having acquired some skill, reflected by negative racket acceleration, the stigmatized females performed better. These findings are consistent with the mere effort account that argues that stereotype threat potentiates the most likely response on the given task. The study also demonstrates the value of identifying the control mechanisms through which stereotype threat has its effects on outcome measures. (c) 2015 APA, all rights reserved.

  9. Mental Health Problems in Adolescence and the Interpretation of Unambiguous Threat

    PubMed Central

    Henry, Julie D.; Moses, Ernestina; Castellini, Julieta; Scott, James

    2015-01-01

    Aberrant threat perception has been linked to paranoia, anxiety and other mental health problems, and is widely considered to be a core, transdiagnostic feature of psychopathology. However, to date there has been only limited investigation of whether mental health problems are associated with a biased interpretation of stimuli that have explicit (as opposed to ambiguous) connotations of threat. In the present study, 41 adolescents diagnosed with a mental illness and 45 demographically matched controls were asked to provide danger ratings of stimuli normatively rated as being either low or high in potential threat. All participants were also asked to complete background measures of cognitive function, mental health and wellbeing. The results indicated that the two groups did not differ in their capacity to discriminate between low and high threat stimuli, nor did they differ in the absolute level of threat that they attributed to these stimuli. However, for the control group, the overall level of threat perceived in facial stimuli was correlated with two important indices of mental health (depression and anxiety). No associations emerged in the clinical group. These data are discussed in relation to their potential implications for the role of aberrant threat perception in transdiagnostic models of mental health. PMID:26039081

  10. The Effect of Stereotype Threat on Performance of a Rhythmic Motor Skill

    PubMed Central

    Huber, Meghan E.; Seitchik, Allison E.; Brown, Adam J.; Sternad, Dagmar; Harkins, Stephen G.

    2015-01-01

    Many studies using cognitive tasks have found that stereotype threat, or concern about confirming a negative stereotype about one's group, debilitates performance. The few studies that documented similar effects on sensorimotor performance have used only relatively coarse measures to quantify performance. Three experiments tested the effect of stereotype threat on a rhythmic ball bouncing task, both at the novice and skilled level. Previous analysis of the task dynamics afforded more detailed quantification of the effect of threat on motor control. In this task, novices hit the ball with positive racket acceleration, indicative of unstable performance. With practice, they learn to stabilize error by changing their ball-racket impact from positive to negative acceleration. Results showed that for novices, stereotype threat potentiated hitting the ball with positive racket acceleration, leading to poorer performance of stigmatized females. However, when the threat manipulation was delivered after having acquired some skill, reflected by negative racket acceleration, the stigmatized females performed better. These findings are consistent with the mere effort account that argues that stereotype threat potentiates the most likely response on the given task. The study also demonstrates the value of identifying the control mechanisms through which stereotype threat has its effects on outcome measures. PMID:25706769

  11. 78 FR 34031 - Burned Area Emergency Response, Forest Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-06

    ...) Evaluate potential threats to critical values; (2) determine the risk level for each threat; (3) identify... actions that meet the objectives; (6) evaluate potential response actions on likelihood for timely... stabilization actions. Improved the descriptive guidelines for employing response actions involving...

  12. 76 FR 81516 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... security; and provide information on the threat of an electromagnetic pulse attack and its associated... Operational Update. Electromagnetic Pulse (EMP) Threat--Lessons Learned and Areas of Vulnerability, and... and the potential threat of an electromagnetic pulse attack. Both will include lessons learned and...

  13. Modal Analysis for Grid Operation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MANGO software is to provide a solution for improving small signal stability of power systems through adjusting operator-controllable variables using PMU measurement. System oscillation problems are one of the major threats to the grid stability and reliability in California and the Western Interconnection. These problems result in power fluctuations, lower grid operation efficiency, and may even lead to large-scale grid breakup and outages. This MANGO software aims to solve this problem by automatically generating recommended operation procedures termed Modal Analysis for Grid Operation (MANGO) to improve damping of inter-area oscillation modes. The MANGO procedure includes three steps: recognizing small signalmore » stability problems, implementing operating point adjustment using modal sensitivity, and evaluating the effectiveness of the adjustment. The MANGO software package is designed to help implement the MANGO procedure.« less

  14. Improvement of DHRA-DMDC Physical Access Software DBIDS Using Cloud Computing Technology: A Case Study

    DTIC Science & Technology

    2012-06-01

    technology originally developed on the Java platform. The Hibernate framework supports rapid development of a data access layer without requiring a...31 viii 2. Hibernate ................................................................................ 31 3. Database Design...protect from security threats; o Easy aggregate management operations via file tags; 2. Hibernate We recommend using Hibernate technology for object

  15. Technology as a Threat to Privacy: Ethical Challenges and Guidelines for the Information Professionals.

    ERIC Educational Resources Information Center

    Britz, J. J.

    1996-01-01

    Assesses the impact of technology on privacy. Discusses electronic monitoring of people in the workplace; interception and reading of e-mail messages; merging of databases which contain personal information; rise in the number of hackers; and the development of software that makes the decoding of digital information virtually impossible. Presents…

  16. Top 10 Threats to Computer Systems Include Professors and Students

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2008-01-01

    User awareness is growing in importance when it comes to computer security. Not long ago, keeping college networks safe from cyberattackers mainly involved making sure computers around campus had the latest software patches. New computer worms or viruses would pop up, taking advantage of some digital hole in the Windows operating system or in…

  17. Near-Earth Object Survey Simulation Software

    NASA Astrophysics Data System (ADS)

    Naidu, Shantanu P.; Chesley, Steven R.; Farnocchia, Davide

    2017-10-01

    There is a significant interest in Near-Earth objects (NEOs) because they pose an impact threat to Earth, offer valuable scientific information, and are potential targets for robotic and human exploration. The number of NEO discoveries has been rising rapidly over the last two decades with over 1800 being discovered last year, making the total number of known NEOs >16000. Pan-STARRS and the Catalina Sky Survey are currently the most prolific NEO surveys, having discovered >1600 NEOs between them in 2016. As next generation surveys such as Large Synoptic Survey Telescope (LSST) and the proposed Near-Earth Object Camera (NEOCam) become operational in the next decade, the discovery rate is expected to increase tremendously. Coordination between various survey telescopes will be necessary in order to optimize NEO discoveries and create a unified global NEO discovery network. We are collaborating on a community-based, open-source software project to simulate asteroid surveys to facilitate such coordination and develop strategies for improving discovery efficiency. Our effort so far has focused on development of a fast and efficient tool capable of accepting user-defined asteroid population models and telescope parameters such as a list of pointing angles and camera field-of-view, and generating an output list of detectable asteroids. The software takes advantage of the widely used and tested SPICE library and architecture developed by NASA’s Navigation and Ancillary Information Facility (Acton, 1996) for saving and retrieving asteroid trajectories and camera pointing. Orbit propagation is done using OpenOrb (Granvik et al. 2009) but future versions will allow the user to plug in a propagator of their choice. The software allows the simulation of both ground-based and space-based surveys. Performance is being tested using the Grav et al. (2011) asteroid population model and the LSST simulated survey “enigma_1189”.

  18. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model adaptation (learning). The increasingly complex demands facing analysts evaluating activity threatening to the security of the United States make the family of agent-based data collection (fusion) a promising area. This paper will discuss a system to support the collection and evaluation of potential threat activity as well as an approach fro presentation of the information.

  19. Development of a 3D Model for the Assessment of Vulnerability Due to Sea Level Rise on the Historic Strawbery Banke

    NASA Astrophysics Data System (ADS)

    Jefferson, M.; Curran, B.; Routhier, M.; Mulukutla, G. K.; Hall, C. L.

    2011-12-01

    The study of climate change is now starting to be widely researched around the world. One prominent exception to this fact is within the discipline of Historic Preservation. With the likelihood of climate change causing sea levels to rise over decades to come, historical preservationists are now looking for data and information which can help them mitigate potential threats to our cultural heritage along our sea coasts. Some such information that can be helpful in understanding these threats includes geographic information such as the locations of artifacts, fossils, and historic structures as well as their vertical elevation above mean sea level. In an effort to build a set of protocols to help preservations study these threats, our work is currently focusing on a historic living history museum site known as Strawbery Banke in Portsmouth, New Hampshire. This poster features a subset of this work that was completed through undergraduate student internships funded by the Joan and James Leitzel Center at the University of New Hampshire. This subset of work focused on the creation a 3D model of the study site. Two aspects of the creation of this model involved the completion of a topographic ground survey and the 3D digital mapping of the site itself. The ground survey was completed with the use of standard surveying techniques and tools and the 3D digital mapping was completed with the use of ArcScene, a software which is part of the ArcGIS suite. This work was completed in conjunction with a larger study funded by the National Geographic Society to better understand how sea level rise and the effects of storm surges are putting the historic structures at Strawbery Banke at risk.

  20. Summary of pheromone lures of potentially invasive moths (Lymantriidae: Lepidoptera) and a ranking of their potential threat to certain North American habitats

    Treesearch

    Paul W. Schaefer; Gerhard Gries

    2007-01-01

    Many Asian lymantriid moths in the genera Lymantria and Orgyia pose imminent threats of being accidentally introduced into North America. Based on their (a) extent of polyphagy; (b) potential of transoceanic transportation; (c) likelihood of establishment in North America; and (d) life history traits, we propose a ranked list (...

  1. Mitigation Policy Scenario of Space Debris Threat Related with National Security

    NASA Astrophysics Data System (ADS)

    Herdiansyah, Herdis; Frimawaty, Evy; Munir, Ahmad

    2016-02-01

    The development of air space recently entered a new phase, when the space issues correlated with the future of a country. In past time, the space authorization was related with advancing technology by many space mission and various satellite launchings, or it could be said that who ruled technology will rule the space. Therefore, the numerous satellites in the space could be a threat for the countries which are mainly located in the path of the satellite, especially in the equatorial region including Indonesia. This study aims to create a policy scenario in mitigating the threat of space debris. The results showed that although space debris was not threatened national security for now, but the potential and its impact on the future potentially harmful. The threats of orbit circulation for some experts considered as a threat for national security, because its danger potential which caused by space debris could significantly damage the affected areas. However, until now Indonesia has no comprehensive mitigation strategy for space matters although it has been ratified by the United Nations Convention.

  2. Investigating m-Health Acceptance from a Protection Motivation Theory Perspective: Gender and Age Differences.

    PubMed

    Guo, Xitong; Han, Xiaocui; Zhang, Xiaofei; Dang, Yuanyuan; Chen, Chun

    2015-08-01

    Mobile health (m-health) services are becoming increasingly important and widely accepted. However, empirical studies on potential users' m-health acceptance behavior remain underexplored. Indeed, m-health adoption is not only a technology acceptance behavior, but also a health-related behavior. Based on the Protection Motivation Theory, this article explores users' m-health adoption behavior from the perspectives of threat appraisal and coping appraisal, and also examines the moderating role of gender and age through a survey of potential users. The survey was conducted among 500 potential m-health service participants. Our results show that threat appraisal and coping appraisal factors influence adoption intention through attitude. It is also found that gender and age play different moderating roles with threat appraisal and coping appraisal factors. Gender and age play different roles between threat appraisal and coping appraisal factors in the acceptance of m-health. Implications for research and practice are discussed.

  3. State Anxiety Carried Over From Prior Threat Increases Late Positive Potential Amplitude During an Instructed Emotion Regulation Task

    PubMed Central

    Pedersen, Walker S.; Larson, Christine L.

    2018-01-01

    Emotion regulation has important consequences for emotional and mental health (Saxena, Dubey & Pandey, 2011) and is dependent on executive function (Eisenberg, Smith & Spinrad, 2011). Because state anxiety disrupts executive function (Robinson, Vytal, Cornwell & Grillon, 2013), we tested whether state anxiety disrupts emotion regulation by having participants complete an instructed emotion regulation task, while under threat of unpredictable shock and while safe from shock. We used the late positive potential (LPP) component of the event related potential to measure emotion regulation success. We predicted that LPP responses to negatively valenced images would be modulated by participants’ attempts to increase and decrease their emotions when safe from shock, but not while under threat of shock. Our manipulation check revealed an order effect such that for participants who completed the threat of shock condition first self-reported state anxiety carried over into the subsequent safe condition. Additionally, we found that although instructions to regulate affected participants’ ratings of how unpleasant the images made them feel, instructions to regulate had no effect on LPP amplitude regardless of threat condition. Instead we found that participants who received the threat condition prior to safe had greater LPP responses to all images in the safe condition. We posit that the carryover of anxiety resulted in misattribution of arousal and potentiation of neural responses to the images in the safe condition. Thus, our results imply that physiological arousal and cognition combine to influence the basic neural response to emotional stimuli. PMID:27055095

  4. The effect of panic disorder versus anxiety sensitivity on event-related potentials during anticipation of threat.

    PubMed

    Stevens, Elizabeth S; Weinberg, Anna; Nelson, Brady D; Meissel, Emily E E; Shankman, Stewart A

    2018-03-01

    Attention-related abnormalities are key components of the abnormal defensive responding observed in panic disorder (PD). Although behavioral studies have found aberrant attentional biases towards threat in PD, psychophysiological studies have been mixed. Predictability of threat, an important feature of threat processing, may have contributed to these mixed findings. Additionally, anxiety sensitivity, a dimensional trait associated with PD, may yield stronger associations with cognitive processes than categorical diagnoses of PD. In this study, 171 participants with PD and/or depression and healthy controls completed a task that differentiated anticipation of predictable vs. unpredictable shocks, while startle eyeblink and event-related potentials (ERPs [N100, P300]) were recorded. In all participants, relative to the control condition, probe N100 was enhanced to both predictable and unpredictable threat, whereas P300 suppression was unique to predictable threat. Probe N100, but not P300, was associated with startle eyeblink during both threatening conditions, and was strongest for unpredictable threat. PD was not associated with ERPs, but anxiety sensitivity (physical concerns) was positively associated with probe N100 (indicating reduced responding) in the unpredictable condition independent of PD diagnosis. Vulnerability to panic-related psychopathology may be characterized by aberrant early processing of threat, which may be especially evident during anticipation of unpredictable threats. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. ECDC Round Table Report and ProMed-mail most useful international information sources for the Netherlands Early Warning Committee.

    PubMed

    Bijkerk, Paul; Monnier, Annelie A; Fanoy, Ewout B; Kardamanidis, Katina; Friesema, Ingrid Hm; Knol, Mirjam J

    2017-04-06

    The Netherlands Early Warning Committee (NEWC) aims to identify infectious diseases causing a potential threat to Dutch public health. Threats are assessed and published as (information) alerts for public health experts. To identify threats from abroad, the NEWC screens 10 sources reporting disease outbreaks each week. To identify the sources essential for complete and timely reporting, we retrospectively analysed 178 international alerts published between 31 January 2013 and 30 January 2014. In addition, we asked the four NEWC coordinators about the required time to scan the information sources. We documented the date and source in which the signal was detected. The ECDC Round Table (RT) Report and ProMED-mail were the most complete and timely sources, reporting 140 of 178 (79%) and 121 of 178 (68%) threats respectively. The combination of both sources reported 169 (95%) of all threats in a timely manner. Adding any of the other sources resulted in minor increases in the total threats found, but considerable additional time investment per additional threat. Only three potential relevant threats (2%) would have been missed by only using the ECDC RT Report and ProMed-mail. We concluded that using only the ECDC RT Report and ProMed-mail to identify threats from abroad maintains a sensitive Early Warning System. This article is copyright of The Authors, 2017.

  6. ECDC Round Table Report and ProMed-mail most useful international information sources for the Netherlands Early Warning Committee

    PubMed Central

    Monnier, Annelie A; Fanoy, Ewout B; Kardamanidis, Katina; Friesema, Ingrid HM; Knol, Mirjam J

    2017-01-01

    The Netherlands Early Warning Committee (NEWC) aims to identify infectious diseases causing a potential threat to Dutch public health. Threats are assessed and published as (information) alerts for public health experts. To identify threats from abroad, the NEWC screens 10 sources reporting disease outbreaks each week. To identify the sources essential for complete and timely reporting, we retrospectively analysed 178 international alerts published between 31 January 2013 and 30 January 2014. In addition, we asked the four NEWC coordinators about the required time to scan the information sources. We documented the date and source in which the signal was detected. The ECDC Round Table (RT) Report and ProMED-mail were the most complete and timely sources, reporting 140 of 178 (79%) and 121 of 178 (68%) threats respectively. The combination of both sources reported 169 (95%) of all threats in a timely manner. Adding any of the other sources resulted in minor increases in the total threats found, but considerable additional time investment per additional threat. Only three potential relevant threats (2%) would have been missed by only using the ECDC RT Report and ProMed-mail. We concluded that using only the ECDC RT Report and ProMed-mail to identify threats from abroad maintains a sensitive Early Warning System. PMID:28422006

  7. A strategy for prioritizing threats and recovery actions for at-risk species.

    PubMed

    Darst, Catherine R; Murphy, Philip J; Strout, Nathan W; Campbell, Steven P; Field, Kimberleigh J; Allison, Linda; Averill-Murray, Roy C

    2013-03-01

    Ensuring the persistence of at-risk species depends on implementing conservation actions that ameliorate threats. We developed and implemented a method to quantify the relative importance of threats and to prioritize recovery actions based on their potential to affect risk to Mojave desert tortoises (Gopherus agassizii). We used assessments of threat importance and elasticities of demographic rates from population matrix models to estimate the relative contributions of threats to overall increase in risk to the population. We found that urbanization, human access, military operations, disease, and illegal use of off highway vehicles are the most serious threats to the desert tortoise range-wide. These results suggest that, overall, recovery actions that decrease habitat loss, predation, and crushing will be most effective for recovery; specifically, we found that habitat restoration, topic-specific environmental education, and land acquisition are most likely to result in the greatest decrease in risk to the desert tortoise across its range. In addition, we have developed an application that manages the conceptual model and all supporting information and calculates threat severity and potential effectiveness of recovery actions. Our analytical approach provides an objective process for quantifying threats, prioritizing recovery actions, and developing monitoring metrics for those actions for adaptive management of any at-risk species.

  8. School-Based Decision Making: A Principal-Agent Perspective.

    ERIC Educational Resources Information Center

    Ferris, James M.

    1992-01-01

    A principal-agent framework is used to examine potential gains in educational performance and potential threats to public accountability that school-based decision-making proposals pose. Analysis underscores the need to tailor the design of decentralized decision making to the sources of poor educational performance and threats to school…

  9. The CRH1 antagonist GSK561679 increases human fear but not anxiety as assessed by startle.

    PubMed

    Grillon, Christian; Hale, Elizabeth; Lieberman, Lynne; Davis, Andrew; Pine, Daniel S; Ernst, Monique

    2015-03-13

    Fear to predictable threat and anxiety to unpredictable threat reflect distinct processes mediated by different brain structures, the central nucleus of the amygdala and the bed nucleus of the stria terminalis (BNST), respectively. This study tested the hypothesis that the corticotropin-releasing factor (CRF1) antagonist GSK561679 differentially reduces anxiety but increases fear in humans. A total of 31 healthy females received each of four treatments: placebo, 50 mg GSK561679 (low-GSK), 400 mg GSK561679 (high-GSK), and 1 mg alprazolam in a crossover design. Participants were exposed to three conditions during each of the four treatments. The three conditions included one in which predictable aversive shocks were signaled by a cue, a second during which shocks were administered unpredictably, and a third condition without shock. Fear and anxiety were assessed using the acoustic startle reflex. High-GSK had no effect on startle potentiation during unpredictable threat (anxiety) but increased startle potentiation during the predictable condition (fear). Low-GSK did not affect startle potentiation across conditions. Consistent with previous findings, alprazolam reduced startle potentiation during unpredictable threat but not during predictable threat. The increased fear by high-GSK replicates animal findings and suggests a lift of the inhibitory effect of the BNST on the amygdala by the CRF1 antagonist.

  10. Optimizing the Performance of Radionuclide Identification Software in the Hunt for Nuclear Security Threats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fotion, Katherine A.

    2016-08-18

    The Radionuclide Analysis Kit (RNAK), my team’s most recent nuclide identification software, is entering the testing phase. A question arises: will removing rare nuclides from the software’s library improve its overall performance? An affirmative response indicates fundamental errors in the software’s framework, while a negative response confirms the effectiveness of the software’s key machine learning algorithms. After thorough testing, I found that the performance of RNAK cannot be improved with the library choice effect, thus verifying the effectiveness of RNAK’s algorithms—multiple linear regression, Bayesian network using the Viterbi algorithm, and branch and bound search.

  11. Perturbed threat monitoring following a traumatic event predicts risk for post-traumatic stress disorder.

    PubMed

    Naim, R; Wald, I; Lior, A; Pine, D S; Fox, N A; Sheppes, G; Halpern, P; Bar-Haim, Y

    2014-07-01

    Post-traumatic stress disorder (PTSD) is a chronic and difficult to treat psychiatric disorder. Objective, performance-based diagnostic markers that uniquely index risk for PTSD above and beyond subjective self-report markers could inform attempts to improve prevention and early intervention. We evaluated the predictive value of threat-related attention bias measured immediately after a potentially traumatic event, as a risk marker for PTSD at a 3-month follow-up. We measured the predictive contribution of attentional threat bias above and beyond that of the more established marker of risk for PTSD, self-reported psychological dissociation. Dissociation symptoms and threat-related attention bias were measured in 577 motor vehicle accident (MVA) survivors (mean age = 35.02 years, 356 males) within 24 h of admission to an emergency department (ED) of a large urban hospital. PTSD symptoms were assessed at a 3-month follow-up using the Clinician-Administered PTSD Scale (CAPS). Self-reported dissociation symptoms significantly accounted for 16% of the variance in PTSD at follow-up, and attention bias toward threat significantly accounted for an additional 4% of the variance in PTSD. Threat-related attention bias can be reliably measured in the context of a hospital ED and significantly predicts risk for later PTSD. Possible mechanisms underlying the association between threat bias following a potentially traumatic event and risk for PTSD are discussed. The potential application of an attention bias modification treatment (ABMT) tailored to reduce risk for PTSD is suggested.

  12. Escorting commercial aircraft to reduce the MANPAD threat

    NASA Astrophysics Data System (ADS)

    Hock, Nicholas; Richardson, M. A.; Butters, B.; Walmsley, R.; Ayling, R.; Taylor, B.

    2005-11-01

    This paper studies the Man-Portable Air Defence System (MANPADS) threat against large commercial aircraft using flight profile analysis, engagement modelling and simulation. Non-countermeasure equipped commercial aircraft are at risk during approach and departure due to the large areas around airports that would need to be secured to prevent the use of highly portable and concealable MANPADs. A software model (CounterSim) has been developed and was used to simulate an SA-7b and large commercial aircraft engagement. The results of this simulation have found that the threat was lessened when a escort fighter aircraft is flown in the 'Centreline Low' position, or 25 m rearward from the large aircraft and 15 m lower, similar to the Air-to-Air refuelling position. In the model a large aircraft on approach had a 50% chance of being hit or having a near miss (within 20m) whereas escorted by a countermeasure equipped F-16 in the 'Centerline Low' position, this was reduced to only 14%. Departure is a particularly vulnerable time for large aircraft due to slow climb rates and the inability to fly evasive manoeuvres. The 'Centreline Low' escorted departure greatly reduced the threat to 16% hit or near miss from 62% for an unescorted heavy aircraft. Overall the CounterSim modelling has showed that escorting a civilian aircraft on approach and departure can reduce the MANPAD threat by 3 to 4 times.

  13. Using PHP/MySQL to Manage Potential Mass Impacts

    NASA Technical Reports Server (NTRS)

    Hager, Benjamin I.

    2010-01-01

    This paper presents a new application using commercially available software to manage mass properties for spaceflight vehicles. PHP/MySQL(PHP: Hypertext Preprocessor and My Structured Query Language) are a web scripting language and a database language commonly used in concert with each other. They open up new opportunities to develop cutting edge mass properties tools, and in particular, tools for the management of potential mass impacts (threats and opportunities). The paper begins by providing an overview of the functions and capabilities of PHP/MySQL. The focus of this paper is on how PHP/MySQL are being used to develop an advanced "web accessible" database system for identifying and managing mass impacts on NASA's Ares I Upper Stage program, managed by the Marshall Space Flight Center. To fully describe this application, examples of the data, search functions, and views are provided to promote, not only the function, but the security, ease of use, simplicity, and eye-appeal of this new application. This paper concludes with an overview of the other potential mass properties applications and tools that could be developed using PHP/MySQL. The premise behind this paper is that PHP/MySQL are software tools that are easy to use and readily available for the development of cutting edge mass properties applications. These tools are capable of providing "real-time" searching and status of an active database, automated report generation, and other capabilities to streamline and enhance mass properties management application. By using PHP/MySQL, proven existing methods for managing mass properties can be adapted to present-day information technology to accelerate mass properties data gathering, analysis, and reporting, allowing mass property management to keep pace with today's fast-pace design and development processes.

  14. PNNLs Data Intensive Computing research battles Homeland Security threats

    ScienceCinema

    David Thurman; Joe Kielman; Katherine Wolf; David Atkinson

    2018-05-11

    The Pacific Northwest National Laboratorys (PNNL's) approach to data intensive computing (DIC) is focused on three key research areas: hybrid hardware architecture, software architectures, and analytic algorithms. Advancements in these areas will help to address, and solve, DIC issues associated with capturing, managing, analyzing and understanding, in near real time, data at volumes and rates that push the frontiers of current technologies.

  15. Is the GUI approach to Computer Development (For Example, Mac, and Windows Technology) a Threat to Computer Users Who Are Blind?

    ERIC Educational Resources Information Center

    Melrose, S.; And Others

    1995-01-01

    In this point/counterpoint feature, S. Melrose contends that complex graphical user interfaces (GUIs) threaten the independence and equal employment of individuals with blindness. D. Wakefield then points out that access to the Windows software program for blind computer users is extremely unpredictable, and J. Gill describes a major European…

  16. Performance of High-Reliability Space-Qualified Processors Implementing Software Defined Radios

    DTIC Science & Technology

    2014-03-01

    ADDRESS(ES) AND ADDRESS(ES) Naval Postgraduate School, Department of Electrical and Computer Engineering, 833 Dyer Road, Monterey, CA 93943-5121 8...Chairman Jeffrey D. Paduan Electrical and Computer Engineering Dean of Research iii THIS PAGE...capability. Radiation in space poses a considerable threat to modern microelectronic devices, in particular to the high-performance low-cost computing

  17. A Study of Covert Communications in Space Platforms Hosting Government Payloads

    DTIC Science & Technology

    2015-02-01

    possible adversarial actions (e.g., malicious software co- resident on the commercial host). Threats to the commercial supply chain are just one... supply chain to either create or exploit channel vulnerabilities. For government hosted payload missions, the critical payload data are encrypted...access to space by hosting government- supplied payloads on commercial space platforms. These commercially hosted payloads require stringent

  18. How Intrusion Detection Can Improve Software Decoy Applications

    DTIC Science & Technology

    2003-03-01

    THIS PAGE INTENTIONALLY LEFT BLANK 41 V. DISCUSSION Military history suggests it is best to employ a layered, defense-in...database: alert, postgresql , user=snort dbname=snort # output database: log, unixodbc, user=snort dbname=snort # output database: log, mssql, dbname...Threat Monitoring and Surveillance, James P. Anderson Co., Fort Washington. PA, April 1980. URL http://csrc.nist.gov/publications/ history /ande80

  19. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    DTIC Science & Technology

    2013-08-01

    potential threats present in this scene and explain the meaning and implications of these threats. You have two minutes to write a response...could be due to the nature of the tasks or to fatigue. Requiring Soldiers to write answers on multiple trials, and across similar tasks, might have...tasks will likely be significantly different from those experienced in the trainer. This would remove the writing requirement over multiple trials

  20. The Roles of Standing Genetic Variation and Evolutionary History in Determining the Evolvability of Anti-Predator Strategies

    PubMed Central

    Dworkin, Ian; Wagner, Aaron P.

    2014-01-01

    Standing genetic variation and the historical environment in which that variation arises (evolutionary history) are both potentially significant determinants of a population's capacity for evolutionary response to a changing environment. Using the open-ended digital evolution software Avida, we evaluated the relative importance of these two factors in influencing evolutionary trajectories in the face of sudden environmental change. We examined how historical exposure to predation pressures, different levels of genetic variation, and combinations of the two, affected the evolvability of anti-predator strategies and competitive abilities in the presence or absence of threats from new, invasive predator populations. We show that while standing genetic variation plays some role in determining evolutionary responses, evolutionary history has the greater influence on a population's capacity to evolve anti-predator traits, i.e. traits effective against novel predators. This adaptability likely reflects the relative ease of repurposing existing, relevant genes and traits, and the broader potential value of the generation and maintenance of adaptively flexible traits in evolving populations. PMID:24955847

  1. 77 FR 23209 - Endangered and Threatened Species; Proposed Delisting of Eastern DPS of Steller Sea Lions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-18

    ... five potential sources of threat under this factor: 1. Global Climate Warming and Ocean Acidification... 5. Oil and Gas Development. Global climate warming and ocean acidification pose a potential threat... information suggests it is likely that global warming and ocean acidification may affect eastern North Pacific...

  2. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such... its integrity management program addressing actions it will take to respond to findings from this data...

  3. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such... its integrity management program addressing actions it will take to respond to findings from this data...

  4. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such... its integrity management program addressing actions it will take to respond to findings from this data...

  5. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such... its integrity management program addressing actions it will take to respond to findings from this data...

  6. Superior Detection of Threat-Relevant Stimuli in Infancy

    ERIC Educational Resources Information Center

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  7. Physiological responses associated with cultural attachment.

    PubMed

    Yap, Wei Jie; Christopoulos, George I; Hong, Ying-Yi

    2017-05-15

    Cultural attachment (CA) suggests that cultural symbols can function as attachment figures, in a similar way to prototypical maternal attachment figures. In order to further understand the psychophysiological mechanisms of CA, we examine whether cultural symbols regulate peripheral physiological indicators of arousal in response to symbolic threats. We supraliminally expose participants to neutral or threatening stimuli, followed by the subliminal presentation of CA and control images, while recording their Skin Conductance Responses (SCR). In tandem with previous work, threat increased SCR when the subliminal image was a control. However, the subliminal presence of a cultural symbol reduced this typically high SCR to threat, potentially suggesting that the threat-related arousal was mitigated. Importantly, metrics related to the way an individual is related to the environment, i.e. the need for cognitive closure, affected physiological responses towards threat and cultural images. Overall, the present study sets the basis for potential emotional mechanisms that could explain how cultural symbols can act as extensions of the prototypical attachment figures and confer the sense of security in the face of threat. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. Evaluative threat and ambulatory blood pressure: cardiovascular effects of social stress in daily experience.

    PubMed

    Smith, Timothy W; Birmingham, Wendy; Uchino, Bert N

    2012-11-01

    Physiological effects of social evaluation are central in models of psychosocial influences on physical health. Experimental manipulations of evaluative threat evoke substantial cardiovascular and neuroendocrine responses in laboratory studies, but only preliminary evidence is available regarding naturally occurring evaluative threats in daily life. In such nonexperimental ambulatory studies, it is essential to distinguish effects of evaluative threat from related constructs known to alter stress, such as ability perceptions and concerns about appearance. 94 married, working couples (mean age 29.2 years) completed a 1-day (8 a.m. to 10 p.m.) ambulatory blood pressure protocol with random interval-contingent measurements using a Suntech monitor and Palm Pilot-based measures of control variables and momentary experiences of social-evaluative threat, concerns about appearance, and perceived ability. In hierarchical analyses for couples and multiple measurement occasions (Proc Mixed; SAS) and controlling individual differences (BMI, age, income) and potential confounds (e.g., posture, activity), higher reports of social-evaluative threat were associated with higher concurrent systolic (estimate = .87, SE = .34) and diastolic blood pressure (estimate = 1.06; SE = .26), both p < .02. Effects of social-evaluative threat remained significant when perceived ability and appearance concerns were controlled. Naturally occurring social-evaluative threat during daily activity is associated with increased systolic and diastolic blood pressure. Given associations between ambulatory blood pressure and risk of cardiovascular disease, the findings support conceptual models of threats to the social self as a potentially important influence on physical health.

  9. Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities

    DOE PAGES

    Solodov, Alexander; Williams, Adam; Al Hanaei, Sara; ...

    2017-04-18

    Unmanned aerial vehicles (UAV) are among the major growing technologies that have many beneficial applications, yet they can also pose a significant threat. Recently, several incidents occurred with UAVs violating privacy of the public and security of sensitive facilities, including several nuclear power plants in France. The threat of UAVs to the security of nuclear facilities is of great importance and is the focus of this work. This paper presents an overview of UAV technology and classification, as well as its applications and potential threats. We show several examples of recent security incidents involving UAVs in France, USA, and Unitedmore » Arab Emirates. Further, the potential threats to nuclear facilities and measures to prevent them are evaluated. The importance of measures for detection, delay, and response (neutralization) of UAVs at nuclear facilities are discussed. An overview of existing technologies along with their strength and weaknesses are shown. Finally, the results of a gap analysis in existing approaches and technologies is presented in the form of potential technological and procedural areas for research and development. Furthermore based on this analysis, directions for future work in the field can be devised and prioritized.« less

  10. Toward a Visualization-Supported Workflow for Cyber Alert Management using Threat Models and Human-Centered Design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Franklin, Lyndsey; Pirrung, Megan A.; Blaha, Leslie M.

    Cyber network analysts follow complex processes in their investigations of potential threats to their network. Much research is dedicated to providing automated tool support in the effort to make their tasks more efficient, accurate, and timely. This tool support comes in a variety of implementations from machine learning algorithms that monitor streams of data to visual analytic environments for exploring rich and noisy data sets. Cyber analysts, however, often speak of a need for tools which help them merge the data they already have and help them establish appropriate baselines against which to compare potential anomalies. Furthermore, existing threat modelsmore » that cyber analysts regularly use to structure their investigation are not often leveraged in support tools. We report on our work with cyber analysts to understand they analytic process and how one such model, the MITRE ATT&CK Matrix [32], is used to structure their analytic thinking. We present our efforts to map specific data needed by analysts into the threat model to inform our eventual visualization designs. We examine data mapping for gaps where the threat model is under-supported by either data or tools. We discuss these gaps as potential design spaces for future research efforts. We also discuss the design of a prototype tool that combines machine-learning and visualization components to support cyber analysts working with this threat model.« less

  11. Potential of VIIRS Data for Regional Monitoring of Gypsy Moth Defoliation: Implications for Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.; Ryan, Robert E.; Smoot, James C.; Prados, Donald; McKellip, Rodney; Sader. Steven A.; Gasser, Jerry; May, George; Hargrove, William

    2007-01-01

    A NASA RPC (Rapid Prototyping Capability) experiment was conducted to assess the potential of VIIRS (Visible/Infrared Imager/Radiometer Suite) data for monitoring non-native gypsy moth (Lymantria dispar) defoliation of forests. This experiment compares defoliation detection products computed from simulated VIIRS and from MODIS (Moderate Resolution Imaging Spectroradiometer) time series products as potential inputs to a forest threat EWS (Early Warning System) being developed for the USFS (USDA Forest Service). Gypsy moth causes extensive defoliation of broadleaved forests in the United States and is specifically identified in the Healthy Forest Restoration Act (HFRA) of 2003. The HFRA mandates development of a national forest threat EWS. This system is being built by the USFS and NASA is aiding integration of needed satellite data products into this system, including MODIS products. This RPC experiment enabled the MODIS follow-on, VIIRS, to be evaluated as a data source for EWS forest monitoring products. The experiment included 1) assessment of MODIS-simulated VIIRS NDVI products, and 2) evaluation of gypsy moth defoliation mapping products from MODIS-simulated VIIRS and from MODIS NDVI time series data. This experiment employed MODIS data collected over the approximately 15 million acre mid-Appalachian Highlands during the annual peak defoliation time frame (approximately June 10 through July 27) during 2000-2006. NASA Stennis Application Research Toolbox software was used to produce MODIS-simulated VIIRS data and NASA Stennis Time Series Product Tool software was employed to process MODIS and MODIS-simulated VIIRS time series data scaled to planetary reflectance. MODIS-simulated VIIRS data was assessed through comparison to Hyperion-simulated VIIRS data using data collected during gypsy moth defoliation. Hyperion-simulated MODIS data showed a high correlation with actual MODIS data (NDVI R2 of 0.877 and RMSE of 0.023). MODIS-simulated VIIRS data for the same date showed moderately high correlation with Hyperion-simulated VIIRS data (NDVI R2 of 0.62 and RMSE of 0.035), even though the datasets were collected about a half an hour apart during changing weather conditions. MODIS products (MOD02, MOD09, and MOD13) and MOD02-simulated VIIRS time series data were used to generate defoliation mapping products based on image classification and image differencing change detection techniques. Accuracy of final defoliation mapping products was assessed by image interpreting over 170 randomly sampled locations found on Landsat and ASTER data in conjunction with defoliation map data from the USFS. The MOD02-simulated VIIRS 400-meter NDVI classification produced a similar overall accuracy (87.28 percent with 0.72 Kappa) to the MOD02 250-meter NDVI classification (86.71 percent with 0.71 Kappa). In addition, the VIIRS 400-meter NDVI, MOD02 250-meter NDVI, and MOD02 500-meter NDVI showed good user and producer accuracies for the defoliated forest class (70 percent) and acceptable Kappa values (0.66). MOD02 and MOD02-simulated VIIRS data both showed promise as data sources for regional monitoring of forest disturbance due to insect defoliation.

  12. Asians demonstrate reduced sensitivity to unpredictable threat: a preliminary startle investigation using genetic ancestry in a multiethnic sample.

    PubMed

    Nelson, Brady D; Bishop, Jeffrey R; Sarapas, Casey; Kittles, Rick A; Shankman, Stewart A

    2014-06-01

    Research has indicated that individuals of Asian descent, relative to other racial groups, demonstrate reduced emotional responding and lower prevalence rates of several anxiety disorders. It is unclear though whether these group differences extend to biomarkers of anxiety disorders and whether genetic differences play a role. This study compared self-identified Caucasian, Latino, and Asian persons (total N = 174) on startle response during a baseline period and while anticipating unpredictable threat-a putative biomarker for certain anxiety disorders--as well as predictable threat. In addition, the association between genetic ancestry and startle response was examined within each racial group to determine potential genetic influences on responding. For the baseline period, Asian participants exhibited a smaller startle response relative to Caucasian and Latino participants, who did not differ. Within each racial group, genetic ancestry was associated with baseline startle. Furthermore, genetic ancestry mediated racial group differences in baseline startle. For the threat conditions, a Race × Condition interaction indicated that Asian participants exhibited reduced startle potentiation to unpredictable, but not predicable, threat relative to Caucasian and Latino participants, who did not differ. However, genetic ancestry was not associated with threat-potentiated startle in any racial group. This study adds to the growing literature on racial differences in emotional responding and provides preliminary evidence suggesting that genetic ancestry may play an important role. Moreover, reduced sensitivity to unpredictable threat may reflect a mechanism for why individuals of Asian descent are at less risk for particular anxiety disorders relative to other racial groups.

  13. The CRH1 Antagonist GSK561679 Increases Human Fear But Not Anxiety as Assessed by Startle

    PubMed Central

    Grillon, Christian; Hale, Elizabeth; Lieberman, Lynne; Davis, Andrew; Pine, Daniel S; Ernst, Monique

    2015-01-01

    Fear to predictable threat and anxiety to unpredictable threat reflect distinct processes mediated by different brain structures, the central nucleus of the amygdala and the bed nucleus of the stria terminalis (BNST), respectively. This study tested the hypothesis that the corticotropin-releasing factor (CRF1) antagonist GSK561679 differentially reduces anxiety but increases fear in humans. A total of 31 healthy females received each of four treatments: placebo, 50 mg GSK561679 (low-GSK), 400 mg GSK561679 (high-GSK), and 1 mg alprazolam in a crossover design. Participants were exposed to three conditions during each of the four treatments. The three conditions included one in which predictable aversive shocks were signaled by a cue, a second during which shocks were administered unpredictably, and a third condition without shock. Fear and anxiety were assessed using the acoustic startle reflex. High-GSK had no effect on startle potentiation during unpredictable threat (anxiety) but increased startle potentiation during the predictable condition (fear). Low-GSK did not affect startle potentiation across conditions. Consistent with previous findings, alprazolam reduced startle potentiation during unpredictable threat but not during predictable threat. The increased fear by high-GSK replicates animal findings and suggests a lift of the inhibitory effect of the BNST on the amygdala by the CRF1 antagonist. PMID:25430779

  14. The effect of challenge and threat states on performance: An examination of potential mechanisms

    PubMed Central

    Moore, Lee J; Vine, Samuel J; Wilson, Mark R; Freeman, Paul

    2012-01-01

    Challenge and threat states predict future performance; however, no research has examined their immediate effect on motor task performance. The present study examined the effect of challenge and threat states on golf putting performance and several possible mechanisms. One hundred twenty-seven participants were assigned to a challenge or threat group and performed six putts during which emotions, gaze, putting kinematics, muscle activity, and performance were recorded. Challenge and threat states were successively manipulated via task instructions. The challenge group performed more accurately, reported more favorable emotions, and displayed more effective gaze, putting kinematics, and muscle activity than the threat group. Multiple putting kinematic variables mediated the relationship between group and performance, suggesting that challenge and threat states impact performance at a predominately kinematic level. PMID:22913339

  15. Disarming the Threat to Feminist Identification: An Application of Personal Construct Theory to Measurement and Intervention

    ERIC Educational Resources Information Center

    Moradi, Bonnie; Martin, Annelise; Brewster, Melanie E.

    2012-01-01

    Many individuals endorse feminist values but do not identify as feminist. The present set of studies tests the concept of threat, grounded in G. A. Kelly's personal construct theory of personality, as a potential factor in feminist nonidentification. Study 1 introduces the theoretically grounded "Feminist Threat Index" and evaluates its…

  16. 77 FR 59582 - Endangered and Threatened Wildlife; 90-Day Finding on Petitions To List the Northeastern Pacific...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-28

    ... discussing the species' status and trends, or in information describing impacts and threats to the species... the potential links between these demographic risks and the causative impacts and threats identified in section 4(a)(1). Information presented on impacts or threats should be specific to the species and...

  17. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heineke, J.M.

    1978-12-20

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)

  18. The Role of Health Educators in Dealing with Biological Threats in the United States

    ERIC Educational Resources Information Center

    Perez, Miguel A.; Pinzon-Perez, Helda; Sowby, Sherman

    2002-01-01

    Health educators play a key role in assisting the nation deal with and be prepared for potential biological attacks. This article summarizes information found in the literature about likely bioterrorist threats to the U.S. population and discusses the responsibilities of health educators in regard to these threats. Among the important roles health…

  19. Attentional Modulation of Visual-Evoked Potentials by Threat: Investigating the Effect of Evolutionary Relevance

    ERIC Educational Resources Information Center

    Brown, Christopher; El-Deredy, Wael; Blanchette, Isabelle

    2010-01-01

    In dot-probe tasks, threatening cues facilitate attention to targets and enhance the amplitude of the target P1 peak of the visual-evoked potential. While theories have suggested that evolutionarily relevant threats should obtain preferential neural processing, this has not been examined empirically. In this study we examined the effects of…

  20. Potential threats to the effective communication of genetic risk information: the case of cystic fibrosis.

    PubMed

    Dillard, James Price; Shen, Lijiang; Laxova, Anita; Farrell, Phillip

    2008-01-01

    The dramatic increase in genetic knowledge engendered by the mapping of the human genome brings with it a need for greater understanding of how to effectively communicate genetic risk information. Using a combination of observational and self-report data, this study examined potential threats to effective risk communication in 17 families whose infant received a positive newborn screening test for cystic fibrosis. Five specific problems are identified: (a) copresence of interactants (or the lack thereof), (b) disruptions in the communication environment, (c) variations in parents' initial knowledge, (d) rigidity in counselors' behavioral scripts, and (e) emotional interference with information acquisition. We advance 3 proposals for research aimed at improving our understanding of these potential threats.

  1. Fear-related behaviors in situations of mass threat

    PubMed Central

    Espinola, Maria; Shultz, James M.; Espinel, Zelde; Althouse, Benjamin M.; Cooper, Janice L.; Baingana, Florence; Marcelin, Louis Herns; Cela, Toni; Towers, Sherry; Mazurik, Laurie; Greene, M. Claire; Beck, Alyssa; Fredrickson, Michelle; McLean, Andrew; Rechkemmer, Andreas

    2016-01-01

    ABSTRACT This Disaster Health Briefing focuses on the work of an expanding team of researchers that is exploring the dynamics of fear-related behaviors in situations of mass threat. Fear-related behaviors are individual or collective behaviors and actions initiated in response to fear reactions that are triggered by a perceived threat or actual exposure to a potentially traumatizing event. Importantly, fear-related behaviors modulate the future risk of harm. Disaster case scenarios are presented to illustrate how fear-related behaviors operate when a potentially traumatic event threatens or endangers the physical and/or psychological health, wellbeing, and integrity of a population. Fear-related behaviors may exacerbate harm, leading to severe and sometimes deadly consequences as exemplified by the Ebola pandemic in West Africa. Alternatively, fear-related behaviors may be channeled in a constructive and life-saving manner to motivate protective behaviors that mitigate or prevent harm, depending upon the nature of the threat scenario that is confronting the population. The interaction between fear-related behaviors and a mass threat is related to the type, magnitude, and consequences of the population encounter with the threat or hazard. The expression of FRBs, ranging from risk exacerbation to risk reduction, is also influenced by such properties of the threat as predictability, familiarity, controllability, preventability, and intentionality. PMID:28265486

  2. An Investigation of Network Enterprise Risk Management Techniques to Support Military Net-Centric Operations

    DTIC Science & Technology

    2009-09-01

    this information supports the decison - making process as it is applied to the management of risk. 2. Operational Risk Operational risk is the threat... reasonability . However, to make a software system fault tolerant, the system needs to recognize and fix a system state condition. To detect a fault, a fault...Tracking ..........................................51 C. DECISION- MAKING PROCESS................................................................51 1. Risk

  3. Neural Detection of Malicious Network Activities Using a New Direct Parsing and Feature Extraction Technique

    DTIC Science & Technology

    2015-09-01

    intrusion detection systems , neural networks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF... detection system (IDS) software, which learns to detect and classify network attacks and intrusions through prior training data. With the added criteria of...BACKGROUND The growing threat of malicious network activities and intrusion attempts makes intrusion detection systems (IDS) a

  4. SEI Innovation Center Report: Cyber Intelligence Tradecraft Project: Summary of Key Findings

    DTIC Science & Technology

    2013-01-01

    source news, social media ), and focuses collection on the pertinent threats and strategic needs analysts identify while learning about their...difficult to correlate with other data sources (network data, social media , chat rooms, geopolitical news sites) and complicates trend analysis or...use of commonly exploited software, prohibiting USB storage devices, and impeding access to websites associated with scams and malware make it very

  5. Information Assurance for Network-Centric Naval Forces

    DTIC Science & Technology

    2010-01-01

    of engineers are designing , implementing, and vigorously testing malicious codes prior to releasing them, not unlike well-funded commercial software...the likelihood that threats would partially succeed and partially degrade the system. Individual components of Aegis are designed and tested with a...of operations (CONOPS) set that is designed to work well in a low-bandwidth environment must be extensively tested and exercised within that low

  6. Salient Feature Selection Using Feed-Forward Neural Networks and Signal-to-Noise Ratios with a Focus Toward Network Threat Detection and Classification

    DTIC Science & Technology

    2014-03-27

    0.8.0. The virtual machine’s network adapter was set to internal network only to keep any outside traffic from interfering. A MySQL -based query...primary output of Fullstats is the ARFF file format, intended for use with the WEKA Java -based data mining software developed at the University of Waikato

  7. Improving the Performance of AI Algorithms.

    DTIC Science & Technology

    1987-09-01

    favorably -6 influenced by s uch progranmning practices as the intellige +nt selt,(-rion .%V ’%. ot’ data formats; to) minimize th~e n,,-ed for...GROUP SUB-GROUP Artifcial Intelgence (Al) Algorithms, Improving Software .’ u- 12 05 Performance, Program Behavior, Predicting Performance, % 12 07...tions in communications, threat assessment, res(orce availability, and so forth. This need for intelligent and adaptable behavior indicates that the

  8. Insider Threats in the Software Development Lifecycle

    DTIC Science & Technology

    2014-11-05

    employee, contractor, or other business partner who • has or had authorized access to an organization’s network , system or data and • intentionally...organization’s network , system, or data and who, through • their action/inaction without malicious intent • cause harm or substantially increase...and female Male Target Network , systems, or data PII or Customer Information IP (trade secrets) or Customer Information Access Used

  9. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  10. Susceptibility of SCADA systems and the energy sector

    NASA Astrophysics Data System (ADS)

    Goike, Lindsay

    The research in this paper focused on analyzing SCADA systems in the energy sector for susceptibility to cyber attacks, in furtherance of providing suggestions to mitigate current and future cyber attacks. The research will be addressing the questions: how are SCADA systems susceptible to cyber attacks, and what are the suggested ways to mitigate both current and future cyber attacks. The five main categories of security vulnerabilities facing current SCADA systems were found to be: connectivity to the Internet, failure to plan, interdependency of sectors, numerous different types of threats, and outdated software. Some of the recommendations mentioned to mitigate current and future risks were: virtual private networks, risk assessments, increased physical security, updating of software, and firewalls.

  11. Threat interferes with response inhibition.

    PubMed

    Hartikainen, Kaisa M; Siiskonen, Anna R; Ogawa, Keith H

    2012-05-09

    A potential threat, such as a spider, captures attention and engages executive functions to adjust ongoing behavior and avoid danger. We and many others have reported slowed responses to neutral targets in the context of emotional distractors. This behavioral slowing has been explained in the framework of attentional competition for limited resources with emotional stimuli prioritized. Alternatively, slowed performance could reflect the activation of avoidance/freezing-type motor behaviors associated with threat. Although the interaction of attention and emotion has been widely studied, little is known on the interaction between emotion and executive functions. We studied how threat-related stimuli (spiders) interact with executive performance and whether the interaction profile fits with a resource competition model or avoidance/freezing-type motor behaviors. Twenty-one young healthy individuals performed a Go-NoGo visual discrimination reaction time (RT) task engaging several executive functions with threat-related and emotionally neutral distractors. The threat-related distractors had no effect on the RT or the error rate in the Go trials. The NoGo error rate, reflecting failure in response inhibition, increased significantly because of threat-related distractors in contrast to neutral distractors, P less than 0.05. Thus, threat-related distractors temporarily impaired response inhibition. Threat-related distractors associated with increased commission errors and no effect on RT does not suggest engagement of avoidance/freezing-type motor behaviors. The results fit in the framework of the resource competition model. A potential threat calls for evaluation of affective significance as well as inhibition of undue emotional reactivity. We suggest that these functions tax executive resources and may render other executive functions, such as response inhibition, temporarily compromised when the demands for resources exceed availability.

  12. User interface design for mobile-based sexual health interventions for young people: design recommendations from a qualitative study on an online Chlamydia clinical care pathway.

    PubMed

    Gkatzidou, Voula; Hone, Kate; Sutcliffe, Lorna; Gibbs, Jo; Sadiq, Syed Tariq; Szczepura, Ala; Sonnenberg, Pam; Estcourt, Claudia

    2015-08-26

    The increasing pervasiveness of mobile technologies has given potential to transform healthcare by facilitating clinical management using software applications. These technologies may provide valuable tools in sexual health care and potentially overcome existing practical and cultural barriers to routine testing for sexually transmitted infections. In order to inform the design of a mobile health application for STIs that supports self-testing and self-management by linking diagnosis with online care pathways, we aimed to identify the dimensions and range of preferences for user interface design features among young people. Nine focus group discussions were conducted (n = 49) with two age-stratified samples (16 to 18 and 19 to 24 year olds) of young people from Further Education colleges and Higher Education establishments. Discussions explored young people's views with regard to: the software interface; the presentation of information; and the ordering of interaction steps. Discussions were audio recorded and transcribed verbatim. Interview transcripts were analysed using thematic analysis. Four over-arching themes emerged: privacy and security; credibility; user journey support; and the task-technology-context fit. From these themes, 20 user interface design recommendations for mobile health applications are proposed. For participants, although privacy was a major concern, security was not perceived as a major potential barrier as participants were generally unaware of potential security threats and inherently trusted new technology. Customisation also emerged as a key design preference to increase attractiveness and acceptability. Considerable effort should be focused on designing healthcare applications from the patient's perspective to maximise acceptability. The design recommendations proposed in this paper provide a valuable point of reference for the health design community to inform development of mobile-based health interventions for the diagnosis and treatment of a number of other conditions for this target group, while stimulating conversation across multidisciplinary communities.

  13. Behavior Intervention Teams: Examining Interventions with Community College Students Threatening Self-Harm

    ERIC Educational Resources Information Center

    Kramer-Jefferson, Kathryn R.

    2017-01-01

    Effective in 2011, The Department of Justice implemented a change to the direct threat standard, which is part of Title II of the Americans with Disabilities Act. This change removed the threat of harm to self from the direct threat standard and potentially limits the actions that colleges can take when working with and responding to students who…

  14. Flu, Floods, and Fire: Ethical Public Health Preparedness.

    PubMed

    Phelan, Alexandra L; Gostin, Lawrence O

    2017-05-01

    Even as public health ethics was developing as a field, major incidents such as 9/11 and the SARS epidemic propelled discourse around public health emergency preparedness and response. Policy and practice shifted to a multidisciplinary approach, recognizing the broad range of potential threats to public health, including biological, physical, radiological, and chemical threats. This propelled the development of surveillance systems to detect incidents, laboratory capacities to rapidly test for potential threats, and therapeutic and social countermeasures to prepare for and respond to a range of hazards. In bringing public health ethics and emergency preparedness together, Emergency Ethics: Public Health Preparedness and Response adds depth and complexity to both fields. As global threats continue to emerge, the book, edited by Bruce Jennings, John D. Arras, Drue H. Barrett, and Barbara A. Ellis, will offer a vital compass. © 2017 The Hastings Center.

  15. Pictures cueing threat: brain dynamics in viewing explicitly instructed danger cues

    PubMed Central

    Schupp, Harald T.

    2012-01-01

    Recent event-related brain potential studies revealed the selective processing of emotional and threatening pictures. Integrating the picture viewing and threat-of-shock paradigm, the present study examined the processing of emotional pictures while they were explicitly instructed to cue threat of real world danger (i.e. electric shocks). Toward this end, 60 pleasant, neutral and unpleasant IAPS-pictures were presented (1 s) as a continuous random stream while high-density EEG and self-reported threat were assessed. In three experimental runs, each picture category was used once as a threat-cue, whereas in the other conditions the same category served as safety-cue. An additional passive viewing run served as a no-threat condition, thus, establishing a threat–safety continuum (threat-cue–safety-cue–no-threat) for each picture category. Threat-of-shock modulated P1, P2 and parieto-occipital LPP amplitudes. While the P1 component differentiated among threat- and no-threat conditions, the P2 and LPP effects were specific to pictures signaling threat-of-shock. Thus, stimulus processing progressively gained more accurate information about environmental threat conditions. Interestingly, the finding of increased EPN and centro-parietal LPP amplitudes to emotional pictures was independent from threat-of-shock manipulation. Accordingly, the results indicate distinct effects associated with the intrinsic significance of emotional pictures and explicitly instructed threat contingencies. PMID:21719425

  16. A tool to assess potential for alien plant establishment and expansion under climate change.

    PubMed

    Roger, Erin; Duursma, Daisy Englert; Downey, Paul O; Gallagher, Rachael V; Hughes, Lesley; Steel, Jackie; Johnson, Stephen B; Leishman, Michelle R

    2015-08-15

    Predicting the influence of climate change on the potential distribution of naturalised alien plant species is an important and challenging task. While prioritisation of management actions for alien plants under current climatic conditions has been widely adopted, very few systems explicitly incorporate the potential of future changes in climate conditions to influence the distribution of alien plant species. Here, we develop an Australia-wide screening tool to assess the potential of naturalised alien plants to establish and spread under both current and future climatic conditions. The screening tool developed uses five spatially explicit criteria to establish the likelihood of alien plant population establishment and expansion under baseline climate conditions and future climates for the decades 2035 and 2065. Alien plants are then given a threat rating according to current and future threat to enable natural resource managers to focus on those species that pose the largest potential threat now and in the future. To demonstrate the screening tool, we present results for a representative sample of approximately 10% (n = 292) of Australia's known, naturalised alien plant species. Overall, most alien plant species showed decreases in area of habitat suitability under future conditions compared to current conditions and therefore the threat rating of most alien plant species declined between current and future conditions. Use of the screening tool is intended to assist natural resource managers in assessing the threat of alien plant establishment and spread under current and future conditions and thus prioritise detailed weed risk assessments for those species that pose the greatest threat. The screening tool is associated with a searchable database for all 292 alien plant species across a range of spatial scales, available through an interactive web-based portal at http://weedfutures.net/. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  17. Analyzing Cyber-Physical Threats on Robotic Platforms.

    PubMed

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  18. Analyzing Cyber-Physical Threats on Robotic Platforms †

    PubMed Central

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  19. Threat-Related Information Suggests Competence: A Possible Factor in the Spread of Rumors

    PubMed Central

    Boyer, Pascal; Parren, Nora

    2015-01-01

    Information about potential danger is a central component of many rumors, urban legends, ritual prescriptions, religious prohibitions and witchcraft crazes. We investigate a potential factor in the cultural success of such material, namely that a source of threat-related information may be intuitively judged as more competent than a source that does not convey such information. In five studies, we asked participants to judge which of two sources of information, only one of which conveyed threat-related information, was more knowledgeable. Results suggest that mention of potential danger makes a source appear more competent than others, that the effect is not due to a general negativity bias, and that it concerns competence rather than a more generally positive evaluation of the source. PMID:26061409

  20. Incorporating climate and ocean change into extinction risk assessments for 82 coral species.

    PubMed

    Brainard, Russell E; Weijerman, Mariska; Eakin, C Mark; McElhany, Paul; Miller, Margaret W; Patterson, Matt; Piniak, Gregory A; Dunlap, Matthew J; Birkeland, Charles

    2013-12-01

    Many marine invertebrate species facing potential extinction have uncertain taxonomies and poorly known demographic and ecological traits. Uncertainties are compounded when potential extinction drivers are climate and ocean changes whose effects on even widespread and abundant species are only partially understood. The U.S. Endangered Species Act mandates conservation management decisions founded on the extinction risk to species based on the best available science at the time of consideration-requiring prompt action rather than awaiting better information. We developed an expert-opinion threat-based approach that entails a structured voting system to assess extinction risk from climate and ocean changes and other threats to 82 coral species for which population status and threat response information was limited. Such methods are urgently needed because constrained budgets and manpower will continue to hinder the availability of desired data for many potentially vulnerable marine species. Significant species-specific information gaps and uncertainties precluded quantitative assessments of habitat loss or population declines and necessitated increased reliance on demographic characteristics and threat vulnerabilities at genus or family levels. Adapting some methods (e.g., a structured voting system) used during other assessments and developing some new approaches (e.g., integrated assessment of threats and demographic characteristics), we rated the importance of threats contributing to coral extinction risk and assessed those threats against population status and trend information to evaluate each species' extinction risk over the 21st century. This qualitative assessment resulted in a ranking with an uncertainty range for each species according to their estimated likelihood of extinction. We offer guidance on approaches for future biological extinction risk assessments, especially in cases of data-limited species likely to be affected by global-scale threats. Incorporación del Cambio Climático y Oceánico en Estudios de Riesgo de Extinción para 82 Especies de Coral. © 2013 Society for Conservation Biology.

  1. Threat evaluation for impact assessment in situation analysis systems

    NASA Astrophysics Data System (ADS)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization approaches based on neural networks and other mathematical techniques.

  2. The best of both worlds : integrating textual and visual command interfaces for Mars Rover Operations

    NASA Technical Reports Server (NTRS)

    Maxwell, Scott A.; Cooper, Brian; Hartman, Frank; Wright, John; Yen, Jeng; Leger, Chris

    2005-01-01

    A Mars rover is a complex system, and driving one is a complex endeavor. Rover driver must be intimately familiar with the hardware and software of the mobility system and of the robotic arm. They must rapidly assess threats in the terrain, then creatively combine their knowledge o f the vehicle and its environment to achieve each day's science and engineering objective.

  3. Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead

    DTIC Science & Technology

    2017-03-28

    connectivity is creating new forms of security threats and exploitable instabilities. There is a need to develop secure software to reduce vulnerabilities...implications in the light of global population growth, industrialization and limited fossil fuel supplies. The continued improvement of generation, storage...national strategic concern is when the S&T-security nexus creates opportunities for misunderstanding. These opportunities assume two forms , rooted in

  4. Satellite Data Aid Monitoring of Nation's Forests

    NASA Technical Reports Server (NTRS)

    2014-01-01

    The USDA Forest Service’s Asheville, North Carolina-based Eastern Forest Environmental Threat Assessment Center and Prineville, Oregon-based Western Wildlands Environmental Threat Assessment Center partnered with Stennis Space Center and other agencies to create an early warning system to identify, characterize, and track disturbances from potential forest threats. The result was ForWarn, which is now being used by federal and state forest and natural resource managers.

  5. Raising consciousness about the nuclear threat through music

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field ofmore » peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.« less

  6. Ground Data System Analysis Tools to Track Flight System State Parameters for the Mars Science Laboratory (MSL) and Beyond

    NASA Technical Reports Server (NTRS)

    Allard, Dan; Deforrest, Lloyd

    2014-01-01

    Flight software parameters enable space mission operators fine-tuned control over flight system configurations, enabling rapid and dynamic changes to ongoing science activities in a much more flexible manner than can be accomplished with (otherwise broadly used) configuration file based approaches. The Mars Science Laboratory (MSL), Curiosity, makes extensive use of parameters to support complex, daily activities via commanded changes to said parameters in memory. However, as the loss of Mars Global Surveyor (MGS) in 2006 demonstrated, flight system management by parameters brings with it risks, including the possibility of losing track of the flight system configuration and the threat of invalid command executions. To mitigate this risk a growing number of missions have funded efforts to implement parameter tracking parameter state software tools and services including MSL and the Soil Moisture Active Passive (SMAP) mission. This paper will discuss the engineering challenges and resulting software architecture of MSL's onboard parameter state tracking software and discuss the road forward to make parameter management tools suitable for use on multiple missions.

  7. Predictive Model and Software for Inbreeding-Purging Analysis of Pedigreed Populations

    PubMed Central

    García-Dorado, Aurora; Wang, Jinliang; López-Cortegano, Eugenio

    2016-01-01

    The inbreeding depression of fitness traits can be a major threat to the survival of populations experiencing inbreeding. However, its accurate prediction requires taking into account the genetic purging induced by inbreeding, which can be achieved using a “purged inbreeding coefficient”. We have developed a method to compute purged inbreeding at the individual level in pedigreed populations with overlapping generations. Furthermore, we derive the inbreeding depression slope for individual logarithmic fitness, which is larger than that for the logarithm of the population fitness average. In addition, we provide a new software, PURGd, based on these theoretical results that allows analyzing pedigree data to detect purging, and to estimate the purging coefficient, which is the parameter necessary to predict the joint consequences of inbreeding and purging. The software also calculates the purged inbreeding coefficient for each individual, as well as standard and ancestral inbreeding. Analysis of simulation data show that this software produces reasonably accurate estimates for the inbreeding depression rate and for the purging coefficient that are useful for predictive purposes. PMID:27605515

  8. Threat captures attention but does not affect learning of contextual regularities.

    PubMed

    Yamaguchi, Motonori; Harwood, Sarah L

    2017-04-01

    Some of the stimulus features that guide visual attention are abstract properties of objects such as potential threat to one's survival, whereas others are complex configurations such as visual contexts that are learned through past experiences. The present study investigated the two functions that guide visual attention, threat detection and learning of contextual regularities, in visual search. Search arrays contained images of threat and non-threat objects, and their locations were fixed on some trials but random on other trials. Although they were irrelevant to the visual search task, threat objects facilitated attention capture and impaired attention disengagement. Search time improved for fixed configurations more than for random configurations, reflecting learning of visual contexts. Nevertheless, threat detection had little influence on learning of the contextual regularities. The results suggest that factors guiding visual attention are different from factors that influence learning to guide visual attention.

  9. Threat and defense as goal regulation: from implicit goal conflict to anxious uncertainty, reactive approach motivation, and ideological extremism.

    PubMed

    Nash, Kyle; McGregor, Ian; Prentice, Mike

    2011-12-01

    Four studies investigated a goal regulation view of anxious uncertainty threat (Gray & McNaughton, 2000) and ideological defense. Participants (N = 444) were randomly assigned to have achievement or relationship goals implicitly primed. The implicit goal primes were followed by randomly assigned achievement or relationship threats that have reliably caused generalized, reactive approach motivation and ideological defense in past research. The threats caused anxious uncertainty (Study 1), reactive approach motivation (Studies 2 and 3), and reactive ideological conviction (Study 4) only when threat-relevant goals had first been primed, but not when threat-irrelevant goals had first been primed. Reactive ideological conviction (Study 4) was eliminated if participants were given an opportunity to attribute their anxiety to a mundane source. Results support a goal regulation view of anxious uncertainty, threat, and defense with potential for integrating theories of defensive compensation.

  10. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    PubMed

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  11. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. PMID:23736227

  12. Towards a general framework for predicting threat status of data-deficient species from phylogenetic, spatial and environmental information.

    PubMed

    Jetz, Walter; Freckleton, Robert P

    2015-02-19

    In taxon-wide assessments of threat status many species remain not included owing to lack of data. Here, we present a novel spatial-phylogenetic statistical framework that uses a small set of readily available or derivable characteristics, including phylogenetically imputed body mass and remotely sensed human encroachment, to provide initial baseline predictions of threat status for data-deficient species. Applied to assessed mammal species worldwide, the approach effectively identifies threatened species and predicts the geographical variation in threat. For the 483 data-deficient species, the models predict highly elevated threat, with 69% 'at-risk' species in this set, compared with 22% among assessed species. This results in 331 additional potentially threatened mammals, with elevated conservation importance in rodents, bats and shrews, and countries like Colombia, Sulawesi and the Philippines. These findings demonstrate the future potential for combining phylogenies and remotely sensed data with species distributions to identify species and regions of conservation concern. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  13. Anticipation of interoceptive threat in highly anxiety sensitive persons.

    PubMed

    Melzig, Christiane A; Michalowski, Jaroslaw M; Holtz, Katharina; Hamm, Alfons O

    2008-10-01

    Anticipatory anxiety plays a major role in the etiology of panic disorder. Although anticipatory anxiety elicited by expectation of interoceptive cues is specifically relevant for panic patients, it has rarely been studied. Using a population analogue in high fear of such interoceptive arousal sensations (highly anxiety sensitive persons) we evaluated a new experimental paradigm to assess anticipatory anxiety during anticipation of interoceptive (somatic sensations evoked by hyperventilation) and exteroceptive (electric shock) threat. Symptom reports, autonomic arousal, and defensive response mobilization (startle eyeblink response) were monitored during threat and matched safe conditions in 26 highly anxiety sensitive persons and 22 controls. The anticipation of exteroceptive threat led to a defensive and autonomic mobilization as indexed by a potentiation of the startle response and an increase in skin conductance level in both experimental groups. During interoceptive threat, however, only highly anxiety sensitive persons but not the controls exhibited a startle response potentiation as well as autonomic activation. The anticipation of a hyperventilation procedure thus seems a valid paradigm to investigate anticipatory anxiety elicited by interoceptive cues in the clinical context.

  14. Conceptualizing threats to tobacco control from international economic agreements: the Brazilian experience.

    PubMed

    Drope, Jeffrey; McGrady, Benn; Bialous, Stella Aguinaga; Lencucha, Raphael; Silva, Vera Luiza da Costa E

    2017-10-19

    Using the results of dozens of interviews with key actors involved in tobacco control policymaking, we examine these actors' perceptions of threats to tobacco control policy efforts from international economic policies on trade and investment. We also evaluate, from a legal perspective, the genuine threats that exist or potential challenges that economic policies may pose to the Brazilian government's public health efforts. We find that most actors did not perceive these economic policies as a major threat to tobacco control. Objectively, we found that some threats do exist. For example, Brazil's attempt to ban most tobacco additives and flavorings continues to met resistance at the World Trade Organization.

  15. University Software Ownership and Litigation: A First Examination*

    PubMed Central

    Rai, Arti K.; Allison, John R.; Sampat, Bhaven N.

    2013-01-01

    Software patents and university-owned patents represent two of the most controversial intellectual property developments of the last twenty-five years. Despite this reality, and concerns that universities act as “patent trolls” when they assert software patents in litigation against successful commercializers, no scholar has systematically examined the ownership and litigation of university software patents. In this Article, we present the first such examination. Our empirical research reveals that software patents represent a significant and growing proportion of university patent holdings. Additionally, the most important determinant of the number of software patents a university owns is not its research and development (“R&D”) expenditures (whether computer science-related or otherwise) but, rather, its tendency to seek patents in other areas. In other words, universities appear to take a “one size fits all” approach to patenting their inventions. This one size fits all approach is problematic given the empirical evidence that software is likely to follow a different commercialization path than other types of invention. Thus, it is perhaps not surprising that we see a number of lawsuits in which university software patents have been used not for purposes of fostering commercialization, but instead, to extract rents in apparent holdup litigation. The Article concludes by examining whether this trend is likely to continue in the future, particularly given a 2006 Supreme Court decision that appears to diminish the holdup threat by recognizing the possibility of liability rules in patent suits, as well as recent case law that may call into question certain types of software patents. PMID:23750052

  16. From Threat to Fear: The neural organization of defensive fear systems in humans

    PubMed Central

    Mobbs, Dean; Marchant, Jennifer L; Hassabis, Demis; Seymour, Ben; Tan, Geoffrey; Gray, Marcus; Petrovic, Predrag; Dolan, Raymond J.; Frith, Christopher D.

    2009-01-01

    Post-encounter and circa-strike defensive contexts represent two adaptive responses to potential and imminent danger. In the context of a predator, the post-encounter reflects the initial detection of the potential threat, whilst the circa-strike is associated with direct predatory attack. We used fMRI to investigate the neural organization of anticipation and avoidance of artificial predators with high or low probability of capturing the subject across analogous post-encounter and circa-strike contexts of threat. Consistent with defense systems models, post-encounter threat elicited activity in forebrain areas including subgenual anterior cingulate cortex (sgACC), hippocampus and amygdala. Conversely, active avoidance during circa-strike threat increased activity in mid-dorsal ACC and midbrain areas. During the circa-strike condition, subjects showed increased coupling between the midbrain and mid-dorsal ACC and decreased coupling with the sgACC, amygdala and hippocampus. Greater activity was observed in the right pregenual ACC for high compared to low probability of capture during circa-strike threat. This region showed decreased coupling with the amygdala, insula and ventromedial prefrontal cortex. Finally, we found that locomotor errors correlated with subjective reports of panic for the high compared to low probability of capture during the circa-strike threat and these panic-related locomotor errors were correlated with midbrain activity. These findings support models suggesting that higher forebrain areas are involved in early threat responses, including the assignment and control of fear, whereas as imminent danger results in fast, likely “hard-wired”, defensive reactions mediated by the midbrain. PMID:19793982

  17. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers.

    PubMed

    Carey, Rachel N; Sarma, Kiran M

    2016-07-27

    Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These 'threat appeals' feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62) examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81) investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Findings suggest that threat-based road safety communications that target affective (fear) and cognitive (perceived efficacy) mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.

  18. Asians Demonstrate Reduced Sensitivity to Unpredictable Threat: A Preliminary Startle Investigation using Genetic Ancestry in a Multi-Ethnic Sample

    PubMed Central

    Nelson, Brady D.; Bishop, Jeffrey R.; Sarapas, Casey; Kittles, Rick A.; Shankman, Stewart A.

    2014-01-01

    Research has indicated that individuals of Asian descent, relative to other racial groups, demonstrate reduced emotional responding and lower prevalence rates of several anxiety disorders. It is unclear though whether these group differences extend to biomarkers of anxiety disorders and whether genetic differences play a role. The present study compared self-identified Caucasians, Latinos, and Asians (total N = 174) on startle response during a baseline period and while anticipating unpredictable threat–a putative biomarker for certain anxiety disorders–as well as predictable threat. In addition, the association between genetic ancestry and startle response was examined within each racial group to determine potential genetic influences on responding. For the baseline period, Asian participants exhibited a smaller startle response relative to Caucasian and Latino participants, who did not differ. Within each racial group, genetic ancestry was associated with baseline startle. Furthermore, genetic ancestry mediated racial group differences in baseline startle. For the threat conditions, a Race × Condition interaction indicated that Asian participants exhibited reduced startle potentiation to unpredictable, but not predicable, threat relative to Caucasian and Latino participants, who did not differ. However, genetic ancestry was not associated with threat-potentiated startle in any racial group. The present study adds to the growing literature on racial differences in emotional responding and provides preliminary evidence suggesting that genetic ancestry may play an important role. Moreover, reduced sensitivity to unpredictable threat may reflect a mechanism for why individuals of Asian descent are at less risk for particular anxiety disorders relative to other racial groups. PMID:24708496

  19. EPANET Multi-Species Extension Software and User's Manual ...

    EPA Pesticide Factsheets

    Software and User's Manual EPANET is used in homeland security research to model contamination threats to water systems. Historically, EPANET has been limited to tracking the dynamics of a single chemical transported through a network of pipes and storage tanks, such as a fluoride used in a tracer study or free chlorine used in a disinfection decay study. Recently, the NHSRC released a new extension to EPANET called EPANET-MSX (Multi-Species eXtension) that allows for the consideration of multiple interacting species in the bulk flow and on the pipe walls. This capability has been incorporated into both a stand-alone executable program as well as a toolkit library of functions that programmers can use to build customized applications.

  20. Defining Requirements and Applying Information Modeling for Protecting Enterprise Assets

    NASA Astrophysics Data System (ADS)

    Fortier, Stephen C.; Volk, Jennifer H.

    The advent of terrorist threats has heightened local, regional, and national governments' interest in emergency response and disaster preparedness. The threat of natural disasters also challenges emergency responders to act swiftly and in a coordinated fashion. When a disaster occurs, an ad hoc coalition of pre-planned groups usually forms to respond to the incident. History has shown that these “system of systems” do not interoperate very well. Communications between fire, police and rescue components either do not work or are inefficient. Government agencies, non-governmental organizations (NGOs), and private industry use a wide array of software platforms for managing data about emergency conditions, resources and response activities. Most of these are stand-alone systems with very limited capability for data sharing with other agencies or other levels of government. Information technology advances have facilitated the movement towards an integrated and coordinated approach to emergency management. Other communication mechanisms, such as video teleconferencing, digital television and radio broadcasting, are being utilized to combat the challenges of emergency information exchange. Recent disasters, such as Hurricane Katrina and the tsunami in Indonesia, have illuminated the weaknesses in emergency response. This paper will discuss the need for defining requirements for components of ad hoc coalitions which are formed to respond to disasters. A goal of our effort was to develop a proof of concept that applying information modeling to the business processes used to protect and mitigate potential loss of an enterprise was feasible. These activities would be modeled both pre- and post-incident.

  1. Combating the Insider Cyber Threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  2. Emotion blocks the path to learning under stereotype threat

    PubMed Central

    Good, Catherine; Whiteman, Ronald C.; Maniscalco, Brian; Dweck, Carol S.

    2012-01-01

    Gender-based stereotypes undermine females’ performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback related negativity (FRN), P3a], as well as any subsequent sustained attention/arousal to that information [late positive potential (LPP)]. Learning was defined as success in applying tutorial information to correction of initial test errors on a surprise retest 24-h later. Under non-threat conditions, emotional responses to negative feedback did not curtail exploration of the tutor, and the amount of tutor exploration predicted learning success. In the stereotype threat condition, however, greater initial salience of the failure (FRN) predicted less exploration of the tutor, and sustained attention to the negative feedback (LPP) predicted poor learning from what was explored. Thus, under stereotype threat, emotional responses to negative feedback predicted both disengagement from learning and interference with learning attempts. We discuss the importance of emotion regulation in successful rebound from failure for stigmatized groups in stereotype-salient environments. PMID:21252312

  3. Emotion blocks the path to learning under stereotype threat.

    PubMed

    Mangels, Jennifer A; Good, Catherine; Whiteman, Ronald C; Maniscalco, Brian; Dweck, Carol S

    2012-02-01

    Gender-based stereotypes undermine females' performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback related negativity (FRN), P3a], as well as any subsequent sustained attention/arousal to that information [late positive potential (LPP)]. Learning was defined as success in applying tutorial information to correction of initial test errors on a surprise retest 24-h later. Under non-threat conditions, emotional responses to negative feedback did not curtail exploration of the tutor, and the amount of tutor exploration predicted learning success. In the stereotype threat condition, however, greater initial salience of the failure (FRN) predicted less exploration of the tutor, and sustained attention to the negative feedback (LPP) predicted poor learning from what was explored. Thus, under stereotype threat, emotional responses to negative feedback predicted both disengagement from learning and interference with learning attempts. We discuss the importance of emotion regulation in successful rebound from failure for stigmatized groups in stereotype-salient environments.

  4. Potential future land use threats to California's protected areas

    USGS Publications Warehouse

    Wilson, Tamara Sue; Sleeter, Benjamin Michael; Davis, Adam Wilkinson

    2015-01-01

    Increasing pressures from land use coupled with future changes in climate will present unique challenges for California’s protected areas. We assessed the potential for future land use conversion on land surrounding existing protected areas in California’s twelve ecoregions, utilizing annual, spatially explicit (250 m) scenario projections of land use for 2006–2100 based on the Intergovernmental Panel on Climate Change Special Report on Emission Scenarios to examine future changes in development, agriculture, and logging. We calculated a conversion threat index (CTI) for each unprotected pixel, combining land use conversion potential with proximity to protected area boundaries, in order to identify ecoregions and protected areas at greatest potential risk of proximal land conversion. Our results indicate that California’s Coast Range ecoregion had the highest CTI with competition for extractive logging placing the greatest demand on land in close proximity to existing protected areas. For more permanent land use conversions into agriculture and developed uses, our CTI results indicate that protected areas in the Central California Valley and Oak Woodlands are most vulnerable. Overall, the Eastern Cascades, Central California Valley, and Oak Woodlands ecoregions had the lowest areal percent of protected lands and highest conversion threat values. With limited resources and time, rapid, landscape-level analysis of potential land use threats can help quickly identify areas with higher conversion probability of future land use and potential changes to both habitat and potential ecosystem reserves. Given the broad range of future uncertainties, LULC projections are a useful tool allowing land managers to visualize alternative landscape futures, improve planning, and optimize management practices.

  5. Incorporation of operator knowledge for improved HMDS GPR classification

    NASA Astrophysics Data System (ADS)

    Kennedy, Levi; McClelland, Jessee R.; Walters, Joshua R.

    2012-06-01

    The Husky Mine Detection System (HMDS) detects and alerts operators to potential threats observed in groundpenetrating RADAR (GPR) data. In the current system architecture, the classifiers have been trained using available data from multiple training sites. Changes in target types, clutter types, and operational conditions may result in statistical differences between the training data and the testing data for the underlying features used by the classifier, potentially resulting in an increased false alarm rate or a lower probability of detection for the system. In the current mode of operation, the automated detection system alerts the human operator when a target-like object is detected. The operator then uses data visualization software, contextual information, and human intuition to decide whether the alarm presented is an actual target or a false alarm. When the statistics of the training data and the testing data are mismatched, the automated detection system can overwhelm the analyst with an excessive number of false alarms. This is evident in the performance of and the data collected from deployed systems. This work demonstrates that analyst feedback can be successfully used to re-train a classifier to account for variable testing data statistics not originally captured in the initial training data.

  6. Smartphone and GPS technology for free-roaming dog population surveillance - a methodological study.

    PubMed

    Barnard, Shanis; Ippoliti, Carla; Di Flaviano, Daniele; De Ruvo, Andrea; Messori, Stefano; Giovannini, Armando; Dalla Villa, Paolo

    2015-01-01

    Free-roaming dogs (FRD) represent a potential threat to the quality of life in cities from an ecological, social and public health point of view. One of the most urgent concerns is the role of uncontrolled dogs as reservoirs of infectious diseases transmittable to humans and, above all, rabies. An estimate of the FRD population size and characteristics in a given area is the first step for any relevant intervention programme. Direct count methods are still prominent because of their non-invasive approach, information technologies can support such methods facilitating data collection and allowing for a more efficient data handling. This paper presents a new framework for data collection using a topological algorithm implemented as ArcScript in ESRI® ArcGIS software, which allows for a random selection of the sampling areas. It also supplies a mobile phone application for Android® operating system devices which integrates Global Positioning System (GPS) and Google MapsTM. The potential of such a framework was tested in 2 Italian regions. Coupling technological and innovative solutions associated with common counting methods facilitate data collection and transcription. It also paves the way to future applications, which could support dog population management systems.

  7. Influence of negative stereotypes and beliefs on neuropsychological test performance in a traumatic brain injury population.

    PubMed

    Kit, Karen A; Mateer, Catherine A; Tuokko, Holly A; Spencer-Rodgers, Julie

    2014-02-01

    The impact of stereotype threat and self-efficacy beliefs on neuropsychological test performance in a clinical traumatic brain injury (TBI) population was investigated. A total of 42 individuals with mild-to-moderate TBI and 42 (age-, gender-, educationally matched) healthy adults were recruited. The study consisted of a 2 (Type of injury: control, TBI) × 2 (Threat Condition: reduced threat, heightened threat) between-participants design. The purpose of the reduced threat condition was to reduce negative stereotyped beliefs regarding cognitive effects of TBI and to emphasize personal control over cognition. The heightened threat condition consisted of an opposing view. Main effects included greater anxiety, motivation, and dejection but reduced memory self-efficacy for head-injured-groups, compared to control groups. On neuropsychological testing, the TBI-heightened-threat-group displayed lower scores on Initial Encoding (initial recall) and trended toward displaying lower scores on Attention (working memory) compared to the TBI-reduced-threat-group. No effect was found for Delayed Recall measures. Memory self-efficacy mediated the relation between threat condition and neuropsychological performance, indicating a potential mechanism for the threat effect. The findings highlight the impact of stereotype threat and self-referent beliefs on neuropsychological test performance in a clinical TBI population.

  8. A risk management approach to CAIS development

    NASA Technical Reports Server (NTRS)

    Hart, Hal; Kerner, Judy; Alden, Tony; Belz, Frank; Tadman, Frank

    1986-01-01

    The proposed DoD standard Common APSE Interface Set (CAIS) was developed as a framework set of interfaces that will support the transportability and interoperability of tools in the support environments of the future. While the current CAIS version is a promising start toward fulfilling those goals and current prototypes provide adequate testbeds for investigations in support of completing specifications for a full CAIS, there are many reasons why the proposed CAIS might fail to become a usable product and the foundation of next-generation (1990'S) project support environments such as NASA's Space Station software support environment. The most critical threats to the viability and acceptance of the CAIS include performance issues (especially in piggybacked implementations), transportability, and security requirements. To make the situation worse, the solution to some of these threats appears to be at conflict with the solutions to others.

  9. State of the Practice of Intrusion Detection Technologies

    DTIC Science & Technology

    2000-01-01

    security incident response teams ) - the role of IDS in threat management, such as defining alarm severity, monitoring, alerting, and policy-based...attacks in an effort to sneak under the radar of security specialists and intrusion detection software, a U.S. Navy network security team said today...to get the smoking gun," said Stephen Northcutt, head of the Shadow intrusion detection team at the Naval Surface Warfare Center. "To know what’s

  10. Using Anticipative Malware Analysis to Support Decision Making

    DTIC Science & Technology

    2010-11-01

    specifically, we have designed and implemented a network sandbox, i.e. a sandbox that allows us to study malware behaviour from the network perspective. We...plan to use this sandbox to generate malware-sample profiles that can be used by decision making algorithms to help network administrators and security...also allows the user to specify the network topology to be used. 1 INTRODUCTION Once the presence of a malicious software (malware) threat has been

  11. Reactive Aggregate Model Protecting Against Real-Time Threats

    DTIC Science & Technology

    2014-09-01

    on the underlying functionality of three core components. • MS SQL server 2008 backend database. • Microsoft IIS running on Windows server 2008...services. The capstone tested a Linux-based Apache web server with the following software implementations: • MySQL as a Linux-based backend server for...malicious compromise. 1. Assumptions • GINA could connect to a backend MS SQL database through proper configuration of DotNetNuke. • GINA had access

  12. The Role of Congress in the Strategic Posture of the United States, 1980-1990: Force Modernization and SDI

    DTIC Science & Technology

    2010-02-01

    for the program was a fiction. The senator “salute[ d ] the Commission for shooting down essentially the ‘window of vulnerability’ bugaboo that has...Bill Hostyn (ASCO) 2. TYPE OF MATERIAL: [8) PAPER D PRESENTATION D ABSTRACT D OTHER SUSPENSE: DATE: DATE: DATE: 3. OVERALL CLASSIFICATION: [8...Authority § Proprietary Information Test and Evaluation Software Documentation Critical Technology Defense Threat Reduction Agency D C

  13. Application of Information Technology Solution for Early Warning Systems at Water Utilities

    NASA Astrophysics Data System (ADS)

    Bałut, Alicja

    2018-02-01

    Deployment of IT solutions in water utilities in Poland concerns nowadays lots beyond GIS implementation projects [1]. The scope of modern IT platforms is truly advanced software for complete management of water treatment processes and involved objects, including ranges of various types of equipment. There are multiply factors that disrupt required volumes of supplied water. They are normally classified as natural, accidental and intentional. This paper addresses potential residing in already deployed IT solutions of water utilities in and also in new ones being now developed. Primarily- from the perspective of intentional, terrorist threats. This document depicts operating procedures that are called in case of spotted contamination in a water supply (damage of key elements of the network infrastructure) or in case of an introduction factors. This paper also discusses relevant IT tools with access provided to network operators or water plant owners that are extremely useful in accurate pinpointing the treat and in following relevant operating procedures and related actions.

  14. Techno-economic study of a distributed hybrid renewable energy system supplying electrical power and heat for a rural house in China

    NASA Astrophysics Data System (ADS)

    Yuan, Jindou; Xu, Jinliang; Wang, Yaodong

    2018-03-01

    Energy saving and emission reduction have become targets for modern society due to the potential energy crisis and the threat of climate change. A distributed hybrid renewable energy system (HRES) consists of photovoltaic (PV) arrays, a wood-syngas combined heat and power generator (CHP) and back-up batteries is designed to power a typical semi-detached rural house in China which aims to meet the energy demand of a house and to reduce greenhouse gas emissions from the use of fossil fuels. Based on the annual load information of the house and the local meteorological data including solar radiation, air temperature, etc., a system model is set up using HOMER software and is used to simulate all practical configurations to carry out technical and economic evaluations. The performance of the whole HRES system and each component under different configurations are evaluated. The optimized configuration of the system is found

  15. Risk and Vulnerability Analysis of Satellites Due to MM/SD with PIRAT

    NASA Astrophysics Data System (ADS)

    Kempf, Scott; Schafer, Frank Rudolph, Martin; Welty, Nathan; Donath, Therese; Destefanis, Roberto; Grassi, Lilith; Janovsky, Rolf; Evans, Leanne; Winterboer, Arne

    2013-08-01

    Until recently, the state-of-the-art assessment of the threat posed to spacecraft by micrometeoroids and space debris was limited to the application of ballistic limit equations to the outer hull of a spacecraft. The probability of no penetration (PNP) is acceptable for assessing the risk and vulnerability of manned space mission, however, for unmanned missions, whereby penetrations of the spacecraft exterior do not necessarily constitute satellite or mission failure, these values are overly conservative. The newly developed software tool PIRAT (Particle Impact Risk and Vulnerability Analysis Tool) has been developed based on the Schäfer-Ryan-Lambert (SRL) triple-wall ballistic limit equation (BLE), applicable for various satellite components. As a result, it has become possible to assess the individual failure rates of satellite components. This paper demonstrates the modeling of an example satellite, the performance of a PIRAT analysis and the potential for subsequent design optimizations with respect of micrometeoroid and space debris (MM/SD) impact risk.

  16. Continuous Risk Management: An Overview

    NASA Technical Reports Server (NTRS)

    Rosenberg, Linda; Hammer, Theodore F.

    1999-01-01

    Software risk management is important because it helps avoid disasters, rework, and overkill, but more importantly because it stimulates win-win situations. The objectives of software risk management are to identify, address, and eliminate software risk items before they become threats to success or major sources of rework. In general, good project managers are also good managers of risk. It makes good business sense for all software development projects to incorporate risk management as part of project management. The Software Assurance Technology Center (SATC) at NASA GSFC has been tasked with the responsibility for developing and teaching a systems level course for risk management that provides information on how to implement risk management. The course was developed in conjunction with the Software Engineering Institute at Carnegie Mellon University, then tailored to the NASA systems community. This is an introductory tutorial to continuous risk management based on this course. The rational for continuous risk management and how it is incorporated into project management are discussed. The risk management structure of six functions is discussed in sufficient depth for managers to understand what is involved in risk management and how it is implemented. These functions include: (1) Identify the risks in a specific format; (2) Analyze the risk probability, impact/severity, and timeframe; (3) Plan the approach; (4) Track the risk through data compilation and analysis; (5) Control and monitor the risk; (6) Communicate and document the process and decisions.

  17. Hazard-Specific Vulnerability Mapping for Water Security in a Shale Gas Context

    NASA Astrophysics Data System (ADS)

    Allen, D. M.; Holding, S.; McKoen, Z.

    2015-12-01

    Northeast British Columbia (NEBC) is estimated to hold large reserves of unconventional natural gas and has experienced rapid growth in shale gas development activities over recent decades. Shale gas development has the potential to impact the quality and quantity of surface and ground water. Robust policies and sound water management are required to protect water security in relation to the water-energy nexus surrounding shale gas development. In this study, hazard-specific vulnerability mapping was conducted across NEBC to identify areas most vulnerable to water quality and quantity deterioration due to shale gas development. Vulnerability represents the combination of a specific hazard threat and the susceptibility of the water system to that threat. Hazard threats (i.e. potential contamination sources and water abstraction) were mapped spatially across the region. The shallow aquifer susceptibility to contamination was characterised using the DRASTIC aquifer vulnerability approach, while the aquifer susceptibility to abstraction was mapped according to aquifer productivity. Surface water susceptibility to contamination was characterised on a watershed basis to describe the propensity for overland flow (i.e. contaminant transport), while watershed discharge estimates were used to assess surface water susceptibility to water abstractions. The spatial distribution of hazard threats and susceptibility were combined to form hazard-specific vulnerability maps for groundwater quality, groundwater quantity, surface water quality and surface water quantity. The vulnerability maps identify priority areas for further research, monitoring and policy development. Priority areas regarding water quality occur where hazard threat (contamination potential) coincide with high aquifer susceptibility or high overland flow potential. Priority areas regarding water quantity occur where demand is estimated to represent a significant proportion of estimated supply. The identification of priority areas allows for characterization of the vulnerability of water security in the region. This vulnerability mapping approach, using the hazard threat and susceptibility indicators, can be applied to other shale gas areas to assess vulnerability to shale gas activities and support water security.

  18. The real-world safety potential of connected vehicle technology.

    PubMed

    Doecke, Sam; Grant, Alex; Anderson, Robert W G

    2015-01-01

    This article estimates the safety potential of a current commercially available connected vehicle technology in real-world crashes. Data from the Centre for Automotive Safety Research's at-scene in-depth crash investigations in South Australia were used to simulate the circumstances of real-world crashes. A total of 89 crashes were selected for inclusion in the study. The crashes were selected as representative of the most prevalent crash types for injury or fatal crashes and had potential to be mitigated by connected vehicle technology. The trajectory, speeds, braking, and impact configuration of the selected in-depth cases were replicated in a software package and converted to a file format allowing "replay" of the scenario in real time as input to 2 Cohda Wireless MK2 onboard units. The Cohda Wireless onboard units are a mature connected vehicle technology that has been used in both the German simTD field trial and the U.S. Department of Transport's Safety Pilot project and have been tuned for low false alarm rates when used in the real world. The crash replay was achieved by replacing each of the onboard unit Global Positioning System (GPS) inputs with the simulated data of each of the involved vehicles. The time at which the Cohda Wireless threat detection software issued an elevated warning was used to calculate a new impact speed using 3 different reaction scenarios and 2 levels of braking. It was found that between 37 and 86% of the simulated crashes could be avoided, with highest percentage due a fully autonomous system braking at 0.7 g. The same system also reduced the impact speed relative to the actual crash in all cases. Even when a human reaction time of 1.2 s and moderate braking of 0.4 g was assumed, the impact speed was reduced in 78% of the crashes. Crash types that proved difficult for the threat detection engine were head-on crashes where the approach angle was low and right turn-opposite crashes. These results indicate that connected vehicle technology can be greatly beneficial in real-world crash scenarios and that this benefit would be maximized by having the vehicle intervene autonomously with heavy braking. The crash types that proved difficult for the connected vehicle technology could be better addressed if controller area network (CAN) information is available, such as steering wheel angle, so that driver intent can be inferred sooner. More accurate positioning in the real world (e.g., combining satellite positioning and accelerometer data) would allow the technology to be more effective for near-collinear head-on and rear-end crashes, because the low approach angles that are common in such crashes are currently ignored in order to minimize false alarms due to positioning uncertainty.

  19. Terrorist and Insurgent Unmanned Aerial Vehicles: Use, Potentials, and Military Implications

    DTIC Science & Technology

    2015-08-01

    Strategic. While the drone swarms of normal and micro - sized UAVs projected in this threat scenario may still be a few decades out and possibly...craft for reconnaissance and pro- paganda video purposes. Such groups are still very much in an experimental phase of using these craft and possess...technol- ogy trends influencing their potential uses, three red teaming threat scenarios have been created for early warning purposes: 1) Single UAV

  20. In the face of fear: Anxiety sensitizes defensive responses to fearful faces

    PubMed Central

    Grillon, Christian; Charney, Danielle R.

    2011-01-01

    Fearful faces readily activate the amygdala. Yet, whether fearful faces evoke fear is unclear. Startle studies show no potentiation of startle by fearful faces, suggesting that such stimuli do not activate defense mechanisms. However, the response to biologically relevant stimuli may be sensitized by anxiety. The present study tested the hypothesis that startle would not be potentiated by fearful faces in a safe context, but that startle would be larger during fearful faces compared to neutral faces in a threat-of-shock context. Subjects viewed fearful and neutral faces in alternating periods of safety and threat of shock. Acoustic startle stimuli were presented in the presence and absence of the faces. Startle was transiently potentiated by fearful faces compared to neutral faces in the threat periods. This suggests that although fearful faces do not prompt behavioral mobilization in an innocuous context, they can do so in an anxiogenic one. PMID:21824155

  1. Biological review of 82 species of coral petitioned to be included in the Endangered Species Act

    USGS Publications Warehouse

    Brainard, Russell E.; Birkeland, Charles; Eakin, C. Mark; McElhany, Paul; Miller, Margaret W.; Patterson, Matt; Piniak, G.A.

    2011-01-01

    The BRT considered two major factors in conducting this review. The first factor was the interaction of natural phenomena and anthropogenic stressors that could potentially contribute to coral extinction. After extensive review of available scientific information, the BRT considers ocean warming, disease, and ocean acidification to be the most influential threats in posing extinction risks to the 82 candidate coral species between now and the year 2100. Threats of local origin but having widespread impact, such as sedimentation, nutrient enrichment, and fishing, were considered of medium importance in determining extinction risks. It is acknowledged that many other threats (e.g., physical damage from storms or ship groundings, invasive species or predator outbreaks, collection and trade) also negatively affect corals, often acutely and dramatically, but generally at relatively small local scales. These local threats were considered to be of limited scope and not deemed to contribute appreciably to the risk of species extinction, except in those special cases where species have restricted geographic or habitat ranges or species have already undergone precipitous population declines such that these local threats further contribute to depensatory processes that can magnify extinction risks (e.g., feedback-loops whereby individual survival decreases with smaller population size). The BRT acknowledges that local and global threats operate on different time scales and, though there is high confidence in the general progression of some key global threats, such as ocean warming and ocean acidification, there is much less certainty in the timing and spatial patterns of these threats. There is also substantial uncertainty in the abilities of the 82 candidate coral species to tolerate or adapt to each of the threats examined, as well as uncertainty in the dynamics of multiple simultaneous stresses. The BRT specifically identified increasing human population levels and the intensity of their collective human consumption as the root drivers of almost all global and local threats to coral species. In evaluating future threat impacts, the BRT attempted to project current trends, without assumptions of future policy changes or technological advances that could potentially alter the projections used in this analysis.

  2. Perceptions of Information Relevance and Importance under Truel Stress.

    DTIC Science & Technology

    information relevance and importance was investigated. Control groups exposed to four periods of duel (two nation) conflict did not modify their...perception of information relevance and importance. Experimental groups exposed to four periods of duel conflict, threat of potential truel conflict, threat

  3. The Trier Social Stress Test as a paradigm to study how people respond to threat in social interactions

    PubMed Central

    Frisch, Johanna U.; Häusser, Jan A.; Mojzisch, Andreas

    2015-01-01

    In our lives, we face countless situations in which we are observed and evaluated by our social interaction partners. Social-evaluative threat is frequently associated with strong neurophysiological stress reactions, in particular, an increase in cortisol levels. Yet, social variables do not only cause stress, but they can also buffer the neurophysiological stress response. Furthermore, social variables can themselves be affected by the threat or the threat-induced neurophysiological stress response. In order to study this complex interplay of social-evaluative threat, social processes and neurophysiological stress responses, a paradigm is needed that (a) reliably induces high levels of social-evaluative threat and (b) is extremely adaptable to the needs of the researcher. The Trier Social Stress Test (TSST) is a well-established paradigm in biopsychology that induces social-evaluative threat in the laboratory by subjecting participants to a mock job-interview. In this review, we aim at demonstrating the potential of the TSST for studying the complex interplay of social-evaluative threat, social processes and neurophysiological stress responses. PMID:25698987

  4. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, Shannon

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, andmore » proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.« less

  5. Political conservatism, authoritarianism, and societal threat: voting for Republican representatives in U.S. Congressional elections from 1946 to 1992.

    PubMed

    McCann, Stewart J H

    2009-07-01

    The author found that the degree of national societal threat preceding congressional elections from 1946 to 1992 was positively associated with the mean state percentage of people voting for Republican representatives, supporting a conventional threat-authoritarianism hypothesis. However, threat was positively associated with the mean state percentage of people voting for Republican representatives in conservative states but not in liberal states, and the conventional threat-authoritarianism link was entirely driven by the relation in conservative states. The author classified states with a composite measure (alpha = .92) on the basis of state ideological identification, religious fundamentalism, composite policy liberalism, Republican Party elite ideology, and Democratic Party elite ideology. These results offer support to an interactive threat-authoritarianism hypothesis derived from the authoritarian dynamic theory of K. Stenner (2005), which postulates that only authoritarian persons are activated to manifest authoritarian behavior in times of normative threat. Also, the author discusses potential alternative explanations on the basis of system justification, need for closure, and terror-management theories.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garner, W.V.

    The problem investigated here is how Soviet perceptions of particular military threats, in this case from NATO's new INF missiles, affect their arms control negotiating policy. This study most closely examines Soviet writings in the 1979-83 period and relies on extensive interviewing, sponsored by IREX, at the Soviet Academy of Sciences Institutes. It attempts to distinguish between Soviet portrayals and real perceptions of the military and political threats from the 1983 INF deployments. It explores how such Soviet assessments interrelate with Soviet military doctrine and broader foreign policy strategies, and how perceptions might differ among Soviet analysts and officials. Itmore » is divided into six chapters: (1) Historical Perspectives; (2) Soviet Threat Portrayals; (3) Evaluating Soviet Threat Portrayals; (4) Soviet Military Doctrine and the INF Threat; (5) Soviet Political-Military Interests at the INF Negotiations; (6) The Soviet Net Assessment. The study finds that Soviet threat portrayals are loosely consistent with Soviet perceptions of the potential threat, especially from an extended-range Pershing missile against their National Command Authorities.« less

  7. Interaction of threat and verbal working memory in adolescents.

    PubMed

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  8. Intolerance of uncertainty and startle potentiation in relation to different threat reinforcement rates.

    PubMed

    Chin, Brian; Nelson, Brady D; Jackson, Felicia; Hajcak, Greg

    2016-01-01

    Fear conditioning research on threat predictability has primarily examined the impact of temporal (i.e., timing) predictability on the startle reflex. However, there are other key features of threat that can vary in predictability. For example, the reinforcement rate (i.e., frequency) of threat is a crucial factor underlying fear learning. The present study examined the impact of threat reinforcement rate on the startle reflex and self-reported anxiety during a fear conditioning paradigm. Forty-five participants completed a fear learning task in which the conditioned stimulus was reinforced with an electric shock to the forearm on 50% of trials in one block and 75% of trials in a second block, in counter-balanced order. The present study also examined whether intolerance of uncertainty (IU), the tendency to perceive or experience uncertainty as stressful or unpleasant, was associated with the startle reflex during conditions of low (50%) vs. high (75%) reinforcement. Results indicated that, across all participants, startle was greater during the 75% relative to the 50% reinforcement condition. IU was positively correlated with startle potentiation (i.e., increased startle response to the CS+ relative to the CS-) during the 50%, but not the 75%, reinforcement condition. Thus, despite receiving fewer electric shocks during the 50% reinforcement condition, individuals with high IU uniquely demonstrated greater defense system activation when impending threat was more uncertain. The association between IU and startle was independent of state anxiety. The present study adds to a growing literature on threat predictability and aversive responding, and suggests IU is associated with abnormal responding in the context of uncertain threat. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Application of the AHP method in modeling the trust and reputation of software agents

    NASA Astrophysics Data System (ADS)

    Zytniewski, Mariusz; Klementa, Marek; Skorupka, Dariusz; Stanek, Stanislaw; Duchaczek, Artur

    2016-06-01

    Given the unique characteristics of cyberspace and, in particular, the number of inherent security threats, communication between software agents becomes a highly complex issue and a major challenge that, on the one hand, needs to be continuously monitored and, on the other, awaits new solutions addressing its vulnerabilities. An approach that has recently come into view mimics mechanisms typical of social systems and is based on trust and reputation that assist agents in deciding which other agents to interact with. The paper offers an enhancement to existing trust and reputation models, involving the application of the AHP method that is widely used for decision support in social systems, notably for risks analysis. To this end, it is proposed to expand the underlying conceptual basis by including such notions as self-trust and social trust, and to apply these to software agents. The discussion is concluded with an account of an experiment aimed at testing the effectiveness of the proposed solution.

  10. Assessing the risk of ignition in the Russian far east within a modeling framework of fire threat.

    PubMed

    Loboda, Tatiana V; Csiszar, Ivan A

    2007-04-01

    The forests of high biological importance in the Russian Far East (RFE) have been experiencing increasing pressure from growing demands for natural resources under the changing economy of post-Soviet Russia. This pressure is further amplified by the rising threat of large and catastrophic fire occurrence, which threatens both the resources and the economic potential of the region. In this paper we introduce a conceptual Fire Threat Model (FTM) and use it to provide quantitative assessment of the risk of ignition in the Russian Far East. The remotely sensed data driven FTM is aimed at evaluating potential wildland fire occurrence and its impact and recovery potential for a given resource. This model is intended for use by resource managers to assist in assessing current levels of fire threat to a given resource, projecting the changes in fire threat under changing climate and land use, and evaluating the efficiency of various management approaches aimed at minimizing the fire impact. Risk of ignition (one of the major uncertainties within fire threat modeling) was analyzed using the MODIS active fire product. The risk of ignition in the RFE is shown to be highly variable in spatial and temporal domains. However, the number of ignition points is not directly proportional to the amount of fire occurrence in the area. Fire ignitions in the RFE are strongly linked to anthropogenic activity (transportation routes, settlements, and land use). An increase in the number of fire ignitions during summer months could be attributed to (1) disruption of the summer monsoons and subsequent changes in fire weather and (2) an increase in natural sources of fire ignitions.

  11. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  12. Exploring the function of selective attention and hypervigilance for threat in anxiety.

    PubMed

    Richards, Helen J; Benson, Valerie; Donnelly, Nick; Hadwin, Julie A

    2014-02-01

    Theoretical frameworks of anxiety propose that attentional biases to threat-related stimuli cause or maintain anxious states. The current paper draws on theoretical frameworks and key empirical studies to outline the distinctive attentional processes highlighted as being important in understanding anxiety. We develop a conceptual framework to make a distinction between two attentional biases: selective attention to threat and hypervigilance for threat. We suggest that these biases each have a different purpose and can account for the typical patterns of facilitated and impaired attention evident in anxious individuals. The framework is novel in its specification of the eye movement behavior associated with these attentional biases. We highlight that selective attention involves narrowing overt attention onto threat to ensure that these stimuli receive processing priority, leading to rapid engagement with task-relevant threat and delayed disengagement from task-irrelevant threat. We show that hypervigilance operates in the presence and absence of threat and involves monitoring for potential dangers via attentional broadening or excessive scanning of the environment with numerous eye movements, leading to improved threat detection and increased distraction from task-irrelevant threat. We conclude that future research could usefully employ eye movement measures to more clearly understand the diverse roles of attention in anxiety. Copyright © 2013 Elsevier Ltd. All rights reserved.

  13. Fear-potentiated startle processing in humans: Parallel fMRI and orbicularis EMG assessment during cue conditioning and extinction.

    PubMed

    Lindner, Katja; Neubert, Jörg; Pfannmöller, Jörg; Lotze, Martin; Hamm, Alfons O; Wendt, Julia

    2015-12-01

    Studying neural networks and behavioral indices such as potentiated startle responses during fear conditioning has a long tradition in both animal and human research. However, most of the studies in humans do not link startle potentiation and neural activity during fear acquisition and extinction. Therefore, we examined startle blink responses measured with electromyography (EMG) and brain activity measured with functional MRI simultaneously during differential conditioning. Furthermore, we combined these behavioral fear indices with brain network activity by analyzing the brain activity evoked by the startle probe stimulus presented during conditioned visual threat and safety cues as well as in the absence of visual stimulation. In line with previous research, we found a fear-induced potentiation of the startle blink responses when elicited during a conditioned threat stimulus and a rapid decline of amygdala activity after an initial differentiation of threat and safety cues in early acquisition trials. Increased activation during processing of threat cues was also found in the anterior insula, the anterior cingulate cortex (ACC), and the periaqueductal gray (PAG). More importantly, our results depict an increase of brain activity to probes presented during threatening in comparison to safety cues indicating an involvement of the anterior insula, the ACC, the thalamus, and the PAG in fear-potentiated startle processing during early extinction trials. Our study underlines that parallel assessment of fear-potentiated startle in fMRI paradigms can provide a helpful method to investigate common and distinct processing pathways in humans and animals and, thus, contributes to translational research. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. Heterogeneous Defensive Naval Weapon Assignment To Swarming Threats In Real Time

    DTIC Science & Technology

    2016-03-01

    threat Damage potential of target t if it hits the ship [integer from 0 to 3] _ ttarget phit Probability that target t hits the ship [probability...secondary weapon systems on target t [integer] _ tsec phit Probability that secondary weapon systems launched from target t hit the ship...pairing. These parameters are calculated as follows: 310 _ _t t tpriority target threat target phit = × × (3.1) 3_ 10 _ _t t tsec priority sec

  15. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  16. Stress Potentiates Early and Attenuates Late Stages of Visual Processing

    DTIC Science & Technology

    2011-01-19

    threat (M 6.5, SD 20.0) than during safety (M 19.3, SD 11.6), t(31) 6.7, p 0.001. They also expressed more intense negative emotion on their...threats increase risk assessment (Kava- liers and Choleris, 2001), and fearful facial expressions enhance sensory intake (Susskind et al., 2008). These...visual analog scales to rate the intensity of their emotional experience (anxious, happy, safe, or stressed) during safety and threat blocks. To minimize

  17. For Whom the Bell Tolls: Neurocognitive Individual Differences in the Acute Stress-Reduction Effects of an Attention Bias Modification Game for Anxiety

    PubMed Central

    Dennis-Tiwary, Tracy; Egan, Laura J.; Babkirk, Sarah; Denefrio, Samantha

    2016-01-01

    The efficacy of attention bias modification training (ABMT) for anxiety is debated, in part because individual differences in task engagement and pre-training threat bias impact training efficacy. In the present study, an engaging, gamified ABMT mobile application, or “app,” was utilized in 42 (21 females) trait-anxious adults. EEG was recorded during pre- and post-training threat bias assessment to generate scalp-recorded event-related potentials (ERPs) reflecting neurocognitive responses to threat. Following app play (ABMT versus placebo), subjective anxiety and stress responses (observed and self-reported) were measured. ABMT, versus placebo, resulted in improved behavioral performance during the stress task for females only. No difference was found between training groups in self-reported anxiety. ABMT resulted in improved performance during the stress task among those evidencing specific pre-training ERP responses: decreased P1 amplitudes, suggesting less attention allocation, but potentiated N170 amplitudes, suggesting enhanced attention selection and discrimination. Individual differences in behavioral threat bias did not moderate training effects. Results suggest that efficient initial allocation of attention to threat combined with enhanced recruitment of sensory gain mechanisms may underlie positive ABMT effects on anxiety-related stress. Targeting neurocognitive responses to threat to personalize ABMT and develop more effective methods of treatment delivery, such as gamification, are discussed. PMID:26745621

  18. From avoidance to approach: The influence of threat-of-shock on reward-based decision making.

    PubMed

    Bublatzky, Florian; Alpers, Georg W; Pittig, Andre

    2017-09-01

    Potential threat can prime defensive responding and avoidance behavior, which may result in the loss of rewards. When aversive consequences do not occur, avoidance should, thus, be quickly overcome in healthy individuals. This study examined the impact of threat anticipation on reward-based decisions. Sixty-five participants completed a decision-making task in which they had to choose between high- and low-reward options. To model an approach-avoidance conflict, the high-reward option was contingent with a threat-of-shock cue; the low-reward option was contingent with a safety cue. In control trials, decisions were made without threat/safety instructions. Overall, behavioral data documented a typical preference for the profitable option. Importantly, under threat-of-shock, participants initially avoided the profitable option (i.e., safe, but less profitable choices). However, when they experienced that shocks did actually not occur, participants overcame initial avoidance in favor of larger gains. Furthermore, autonomic arousal (skin conductance and heart rate responses) was elevated during threat cues compared to safety and non-threatening control cues. Taken together, threat-of-shock was associated with behavioral consequences: initially, participants avoided threat-related options but made more profitable decisions as they experienced no aversive consequences. Although socially acquired threat contingencies are typically stable, incentives for approach can help to overcome threat-related avoidance. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Emerging contaminants and their potential effects on amphibians and reptiles

    USDA-ARS?s Scientific Manuscript database

    Serious threats to the health and sustainability of global amphibian populations have been well documented over the last few decades. Encroachment upon and destruction of primary habitat is the most critical threat, but some species have disappeared while their habitat remains. Additional stressor...

  20. Cybersecurity in healthcare: A systematic review of modern threats and trends.

    PubMed

    Kruse, Clemens Scott; Frederick, Benjamin; Jacobson, Taylor; Monticone, D Kyle

    2017-01-01

    The adoption of healthcare technology is arduous, and it requires planning and implementation time. Healthcare organizations are vulnerable to modern trends and threats because it has not kept up with threats. The objective of this systematic review is to identify cybersecurity trends, including ransomware, and identify possible solutions by querying academic literature. The reviewers conducted three separate searches through the CINAHL and PubMed (MEDLINE) and the Nursing and Allied Health Source via ProQuest databases. Using key words with Boolean operators, database filters, and hand screening, we identified 31 articles that met the objective of the review. The analysis of 31 articles showed the healthcare industry lags behind in security. Like other industries, healthcare should clearly define cybersecurity duties, establish clear procedures for upgrading software and handling a data breach, use VLANs and deauthentication and cloud-based computing, and to train their users not to open suspicious code. The healthcare industry is a prime target for medical information theft as it lags behind other leading industries in securing vital data. It is imperative that time and funding is invested in maintaining and ensuring the protection of healthcare technology and the confidentially of patient information from unauthorized access.

  1. TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH, SESSION VIII: TECHNOLOGY FORUM FOCUS GROUPS.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    INDUSI,J.P.

    2003-06-16

    Since the events of 9/11, there have been considerable concerns and associated efforts to prevent or respond to acts of terrorism. Very often we hear calls to reduce the threat from or correct vulnerabilities to various terrorist acts. Others fall victim to anxiety over potential scenarios with the gravest of consequences involving hundreds of thousands of casualties. The problem is complicated by the fact that planners have limited, albeit in some cases significant, resources and less than perfect intelligence on potential terrorist plans. However, valuable resources must be used prudently to reduce the overall risk to the nation. A systematicmore » approach to this process of asset allocation is to reduce the overall risk and not just an individual element of risk such as vulnerabilities. Hence, we define risk as a function of three variables: the threat (the likelihood and scenario of the terrorist act), the vulnerability (the vulnerability of potential targets to the threat), and the consequences (health and safety, economic, etc.) resulting from a successful terrorist scenario. Both the vulnerability and consequences from a postulated adversary scenario can be reasonably well estimated. However, the threat likelihood and scenarios are much more difficult to estimate. A possible path forward is to develop scenarios for each potential target in question using experts from many disciplines. This should yield a finite but large number of target-scenario pairs. The vulnerabilities and consequences for each are estimated and then ranked relative to one another. The resulting relative risk ranking will have targets near the top of the ranking for which the threat is estimated to be more likely, the vulnerability greatest, and the consequences the most grave. In the absence of perfect intelligence, this may be the best we can do.« less

  2. Biosecurity Risk Assessment Methodology (BioRAM) v. 2.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    CASKEY, SUSAN; GAUDIOSO, JENNIFER; SALERNO, REYNOLDS

    Sandia National Laboratories International Biological Threat Reduction Dept (SNL/IBTR) has an ongoing mission to enhance biosecurity assessment methodologies, tools, and guise. These will aid labs seeking to implement biosecurity as advocated in the recently released WHO's Biorisk Management: Lab Biosecurity Guidance. BioRAM 2.0 is the software tool developed initially using the SNL LDRD process and designed to complement the "Laboratory Biosecurity Risk Handbook" written by Ren Salerno and Jennifer Gaudioso defining biosecurity risk assessment methodologies.

  3. Cyber Fighter Associate

    DTIC Science & Technology

    2016-01-01

    accomplish a patch- management mission while securing a critical path. As a first proof of concept a simulation with a network of 10 nodes and 4...software-agility walk of the “PERFORMANCE Each Threat Managed ” tree is slightly more complex than the network -agility walk. The original design of the...CyFiA was tested to accomplish a patch- management mission while securing a critical path. As a first proof of concept a simulation with a network of 10

  4. Employing U.S. Information Operations Against Hybrid Warfare Threats

    DTIC Science & Technology

    2013-03-01

    Article 51.24 Cyber warfare is unique in that vulnerabilities that a network target may have could be discovered by software developers who then... cyber warfare rather than physical combat, a future subject to air strikes or ground-forces raids would likely be a powerful deterrent. Some in the U.S...Manwaring, The Complexity of Modern Asymmetric Warfare, (Norman, OK: Univ. of Oklahoma Press, 2012), 126-129. 23 Arie J. Schaap, “ Cyber Warfare Operations

  5. Men Respond Too: The Effects of a Social-Evaluative Body Image Threat on Shame and Cortisol in University Men

    PubMed Central

    Lamarche, Larkin; Ozimok, Brianne; Gammage, Kimberley L.; Muir, Cameron

    2017-01-01

    Framed within social self-preservation theory, the present study investigated men’s psychobiological responses to social-evaluative body image threats. University men (n = 66) were randomly assigned to either a high or low social-evaluative body image threat condition. Participants provided saliva samples (to assess cortisol) and completed measures of state body shame prior to and following their condition, during which anthropometric and strength measures were assessed. Baseline corrected values indicated men in the high social-evaluative body image threat condition had higher body shame and cortisol than men in the low social-evaluative body image threat condition. These findings suggest that social evaluation in the context of situations that threaten body image leads to potentially negative psychobiological responses in college men. PMID:28891388

  6. Men Respond Too: The Effects of a Social-Evaluative Body Image Threat on Shame and Cortisol in University Men.

    PubMed

    Lamarche, Larkin; Ozimok, Brianne; Gammage, Kimberley L; Muir, Cameron

    2017-11-01

    Framed within social self-preservation theory, the present study investigated men's psychobiological responses to social-evaluative body image threats. University men ( n = 66) were randomly assigned to either a high or low social-evaluative body image threat condition. Participants provided saliva samples (to assess cortisol) and completed measures of state body shame prior to and following their condition, during which anthropometric and strength measures were assessed. Baseline corrected values indicated men in the high social-evaluative body image threat condition had higher body shame and cortisol than men in the low social-evaluative body image threat condition. These findings suggest that social evaluation in the context of situations that threaten body image leads to potentially negative psychobiological responses in college men.

  7. Issues in national missile defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Canavan, G.H.

    1998-12-01

    Strategic missiles and weapons are proliferating rapidly; thus, the US and its Allies are likely to face both capable bilateral threats and multilateral configurations with complex coalitions for which defenses could be essential for stability. Current hit-to-kill interceptor and radar and infrared detection, track, and discrimination technology should suffice for limited threats, but it is necessary to meet those threats in time while maintaining growth potential for the more sophisticated threats likely to follow. National Missile Defense faces a confusing array of threats, programs, and alternatives, but the technologies in development are clearly an appropriate first step towards any ofmore » them. They are likely to succeed in the near term; the challenge is to retain flexibility to provide needed options in the mid and long terms.« less

  8. Short-term serotonergic but not noradrenergic antidepressant administration reduces attentional vigilance to threat in healthy volunteers.

    PubMed

    Murphy, Susannah E; Yiend, Jenny; Lester, Kathryn J; Cowen, Philip J; Harmer, Catherine J

    2009-03-01

    Anxiety is associated with threat-related biases in information processing such as heightened attentional vigilance to potential threat. Such biases are an important focus of psychological treatments for anxiety disorders. Selective serotonin reuptake inhibitors (SSRIs) are effective in the treatment of a range of anxiety disorders. The aim of this study was to assess the effect of an SSRI on the processing of threat in healthy volunteers. A selective noradrenergic reuptake inhibitor (SNRI), which is not generally used in the treatment of anxiety, was used as a contrast to assess the specificity of SSRI effects on threat processing. Forty-two healthy volunteers were randomly assigned to 7 d double-blind intervention with the SSRI citalopram (20 mg/d), the SNRI reboxetine (8 mg/d), or placebo. On the final day, attentional and interpretative bias to threat was assessed using the attentional probe and the homograph primed lexical decision tasks. Citalopram reduced attentional vigilance towards fearful faces but did not affect the interpretation of ambiguous homographs as threatening. Reboxetine had no significant effect on either of these measures. Citalopram reduces attentional orienting to threatening stimuli, which is potentially relevant to its clinical use in the treatment of anxiety disorders. This finding supports a growing literature suggesting that an important mechanism through which pharmacological agents may exert their effects on mood is by reversing the cognitive biases that characterize the disorders that they treat. Future studies are needed to clarify the neural mechanisms through which these effects on threat processing are mediated.

  9. Survey determinant factors of telemedicine strategic planning from the managers and experts perspective in the health department, isfahan university of medical sciences.

    PubMed

    Keshvari, Hamid; Haddadpoor, Asefeh; Taheri, Behjat; Nasri, Mehran; Aghdak, Pezhman

    2014-10-01

    Awareness of Outlook, objectives, benefits and impact of telemedicine technology that can promote services quality, reduce costs, increase access to Specialized and subspecialty services, and immediately guide the health system subconsciously to the introduction greater use of technology. Therefore, the aim of this study was to determine the strengths, weaknesses, opportunities and threats in the telemedicine strategic planning from the managers and experts perspective in the health department, Isfahan University of Medical Sciences, in order to take a step towards facilitating strategic planning and approaching the equity aim in health in the province. This is a descriptive-analytical study, that data collection was done cross-sectional. The study population was composed of all managers and certified experts at the health department in Isfahan university of Medical Sciences. The sample size was 60 patients according to inclusion criteria. Information was collected by interview method. Researcher attempted to use the structured and specific questionnaire Then were investigated the viewpoints of experts and managers about determinative factors (strengths, weaknesses, opportunities and threats) in the strategic planning telemedicine. Data were analyzed using descriptive statistics (frequency, mean) and software SPSS 19. Data analysis showed that change management (100%) and continuity of supply of credit (79/3%) were weakness point within the organization and strengths of the program were, identity and health telemedicine programs (100%), goals and aspirations of the current directors of the organization and its compliance with the goals of telemedicine (100%), human resources interested using computers in daily activities in peripheral levels (93/1%). Also organization in the field of IT professionals, had opportunities, and repayment specialist's rights by insurance organizations is a threat for it. According to the strengths, weaknesses, opportunities and threats points determined by managers and experts, and compare it with success and failure factors, which are defined by different researchers, it seems will be fail to implement of telemedicine in the province at present. But according to the strengths identified by managers and experts, there are a lot of potential for telemedicine in the province, and may be used, in relation to telemedicine projects, with a 3 or 5 year strategic plan, and taking steps to get closer to the equity aim in health.

  10. Spot Rare Occurrences More Frequently by Lessening Inattentional Blindness

    DTIC Science & Technology

    2013-04-29

    with weapon slip through airport security , not hearing a siren when driving conditions are complicated by fog, or not seeing explosives on a truck...awareness of potential actual threats has been implemented in airport security for several years. The effectiveness of this Threat Image Projection

  11. 8 CFR 212.1 - Documentary requirements for nonimmigrants.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... special humanitarian concern; and (iv) Poses no threat to the welfare, safety or security of the United States, its territories, or commonwealths. Any potential threats to the welfare, safety, or security of...) of this section: Australia, Brunei, Indonesia, Japan, Malaysia, Nauru, New Zealand, Papua New Guinea...

  12. Development, Application, and Implementation of RAMCAP to Characterize Nuclear Power Plant Risk From Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gaertner, John P.; Teagarden, Grant A.

    2006-07-01

    In response to increased interest in risk-informed decision making regarding terrorism, EPRI and ERIN Engineering were selected by U.S. DHS and ASME to develop and demonstrate the RAMCAP method for nuclear power plant (NPP) risk assessment. The objective is to characterize plant-specific NPP risk for risk management opportunities and to provide consistent information for DHS decision making. This paper is an update of this project presented at the American Nuclear Society (ANS) International Topical Meeting on Probabilistic Safety Analysis (PSA05) in September, 2005. The method uses a characterization of risk as a function of Consequence, Vulnerability, and Threat. For eachmore » site, worst case scenarios are developed for each of sixteen benchmark threats. Nuclear RAMCAP hypothesizes that the intent of the perpetrator is to cause offsite radiological consequences. Specific targets are the reactor core, the spent fuel pool, and nuclear spent fuel in a dry storage facility (ISFSI). Results for each scenario are presented as conditional risk for financial loss, early fatalities and early injuries. Expected consequences for each scenario are quantified, while vulnerability is estimated on a relative likelihood scale. Insights for other societal risks are provided. Although threat frequencies are not provided, target attractiveness and threat deterrence are estimated. To assure efficiency, completeness, and consistency; results are documented using standard RAMCAP Evaluator software. Trial applications were successfully performed at four plant sites. Implementation at all other U.S. commercial sites is underway, supported by the Nuclear Sector Coordinating Council (NSCC). Insights from RAMCAP results at 23 U.S. plants completed to date have been compiled and presented to the NSCC. Results are site-specific. Physical security barriers, an armed security force, preparedness for design-basis threats, rugged design against natural hazards, multiple barriers between fuel and environment, accident mitigation capability, severe accident management procedures, and offsite emergency plans are risk-beneficial against all threat types. (authors)« less

  13. Statement of Work Third Party Algorithm Development and Evaluation of Detection of Liquid Explosives in Dual-Energy Digital Radiographic/TIP Ready X-ray Images - Public Version

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nekoogar, F; Martz, Jr., H E

    2009-09-23

    The purpose of this statement of work is for third party collaborators to train, validate and have Lawrence Livermore National Security, LLC (LLNS) evaluate algorithms to detect liquid threats in digital radiography (DR)/TIP Ready X-ray (TRX) images that will be provided by LLNS through the Transportation and Security Administration (TSA). LLNS will provide a set of images with threat(s) to determine detection rates and non-threat images from airports to determine false alarm rates. A key including a bounding box showing the locations of the threats and non-threats will be provided for the images. It is expected that the Subcontractor shallmore » use half of the images with their keys for training the algorithms and the other half shall be used for validation (third party evaluation) purposes. The Subcontractor shall not use the key to the second half of the data other than for the validation and reporting of the performance of its algorithm (not for training). The Subcontractor has 45 business days from the receipt of datasets and the Subcontract to: (1) Run their detection/classification algorithms on the data; (2) Deliver a final report describing their performance by generating Receiver Operator Characteristic (ROC) curves using their algorithm; and (3) Deliver a copy of the third party's executable software (already trained and validated by the datasets) to LLNL accompanied by a user manual. LLNS will evaluate the performance of the same algorithm on another separate set of data. LLNS evaluation of the Subcontractor's algorithm will be documented in a final report within 30 days of receiving the executable code. This report will be sent to TSA and the report may be disseminated to the Subcontract at TSA's discretion.« less

  14. Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework

    NASA Astrophysics Data System (ADS)

    Tsigkritis, Theocharis; Spanoudakis, George; Kloukinas, Christos; Lorenzoli, Davide

    The SERENITY monitoring framework offers mechanisms for diagnosing the causes of violations of security and dependability (S&D) properties and detecting potential violations of such properties, called "Cthreats". Diagnostic information and threat detection are often necessary for deciding what an appropriate reaction to a violation is and taking pre-emptive actions against predicted violations, respectively. In this chapter, we describe the mechanisms of the SERENITY monitoring framework which generate diagnostic information for violations of S&D properties and detecting threats.

  15. Cyber secure systems approach for NPP digital control systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCreary, T. J.; Hsu, A.

    2006-07-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less

  16. Developing vaccines to counter bioterrorist threats.

    PubMed

    Altmann, Daniel M

    2005-06-01

    Large and innovative research programs are underway to define the immune parameters for vaccines against a wide array of pathogens considered to represent a potential bioterrorist threat. However, the development and utilization of such vaccines presents a number of predicaments that have not previously been addressed by the field of vaccinology.

  17. 40 CFR 281.35 - Release response and corrective action.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...; (b) Actions are taken to identify, contain and mitigate any immediate health and safety threats that... must be delineated when a potential threat to human health and the environment exists. (d) All releases... necessary to protect human health and the environment; (e) Adequate information is made available to the...

  18. 76 FR 24047 - Palmyra Atoll National Wildlife Refuge, U.S. Pacific Island Territory; Nonnative Rat Eradication...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-29

    ...). The comments we received covered topics such as threats to nontarget species, our proposed selection... eradication, threats to nontarget species, our proposed selection of the rodenticide brodifacoum over... directional manner to all potential rat territories within a short operational period. Special measures to...

  19. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192...

  20. 48 CFR 904.7003 - Disclosure of foreign ownership, control, or influence.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... undue risk to the common defense and security through the possible compromise of that information or material. If the DOE determines that such a threat or potential threat exists, the contracting officer... the DOE to obtain information about FOCI which is sufficient to help the Department determine whether...

  1. Law Enforcement Use of Threat Assessments to Predict Violence

    ERIC Educational Resources Information Center

    Wood, Tracey Michelle

    2016-01-01

    The purpose of this qualitative, descriptive multiple case study was to explore what process, policies and procedures, or set of empirically supported norms governed law enforcement officers in a selected county in the southwest region of the United States when threat assessments were conducted on potentially violent subjects threatening mass…

  2. Regulation in a Brave New World: Safeguarding against Subversive Threats

    ERIC Educational Resources Information Center

    Hornosty, Jason

    2011-01-01

    Biotechnology is a rapidly advancing science that has the potential to revolutionize medicine and transform human abilities. Accompanying these positives are an underdiscussed category of threats to principles of human rights and equality. Although any technology might be used to inegalitarian ends, biotechnology has the capacity to beget…

  3. Attention Training and the Threat Bias: An ERP Study

    PubMed Central

    O’Toole, Laura; Dennis, Tracy A.

    2011-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these changes remain unclear. To address this issue, 49 non-anxious adults were randomly assigned to either attentional training toward or training away from threat using a modified version of the dot probe task. Behavioral measures of attentional biases were also generated pre- and post-training using the dot probe task. Event-related potentials (ERPs) were generated to threat and non-threat face pairs and probes during pre- and post-training assessments. Effects of training on behavioral measures of the threat bias were significant, but only for those participants showing pre-training biases. Attention training also influenced early spatial attention, as measured by post-training P1 amplitudes to cues. Results illustrate the importance of taking pre-training attention biases in non-anxious individuals into account when evaluating the effects of attention training and tracking physiological changes in attention following training. PMID:22083026

  4. Possible Use of Bacteriophages Active against Bacillus anthracis and Other B. cereus Group Members in the Face of a Bioterrorism Threat

    PubMed Central

    Weber-Dąbrowska, Beata; Borysowski, Jan; Górski, Andrzej

    2014-01-01

    Anthrax is an infectious fatal disease with epidemic potential. Nowadays, bioterrorism using Bacillus anthracis is a real possibility, and thus society needs an effective weapon to neutralize this threat. The pathogen may be easily transmitted to human populations. It is easy to store, transport, and disseminate and may survive for many decades. Recent data strongly support the effectiveness of bacteriophage in treating bacterial diseases. Moreover, it is clear that bacteriophages should be considered a potential incapacitative agent against bioterrorism using bacteria belonging to B. cereus group, especially B. anthracis. Therefore, we have reviewed the possibility of using bacteriophages active against Bacillus anthracis and other species of the B. cereus group in the face of a bioterrorism threat. PMID:25247187

  5. Postdeployment threat-related attention bias interacts with combat exposure to account for PTSD and anxiety symptoms in soldiers.

    PubMed

    Sipos, Maurice L; Bar-Haim, Yair; Abend, Rany; Adler, Amy B; Bliese, Paul D

    2014-02-01

    Recent studies suggest that assessment of threat-related attention bias may be useful in identifying soldiers at risk for clinical symptoms. The present study assessed the degree to which soldiers experienced combat events and showed attentional threat avoidance affected their reported levels of post-traumatic stress disorder (PTSD) and anxiety symptoms. Four months after a combat deployment to Iraq, 63 US soldiers completed a survey assessing combat exposures and clinical symptoms as well as a dot-probe task assessing threat-related attention bias. Significant three-way interactions regressing threat reaction times (RTs), neutral RTs, and combat exposure on PTSD and anxiety symptoms were observed. Specifically, soldiers with high levels of combat exposure, who were more likely to demonstrate attentional bias away from threat, were also more symptomatic. These results demonstrate the potential of threat-related attention bias as a behavioral marker of PTSD and anxiety symptoms in a high-risk military occupational context. Published 2013. This article is a U.S. Government work and is in the public domain in the USA.

  6. Method for detecting and avoiding flight hazards

    NASA Astrophysics Data System (ADS)

    von Viebahn, Harro; Schiefele, Jens

    1997-06-01

    Today's aircraft equipment comprise several independent warning and hazard avoidance systems like GPWS, TCAS or weather radar. It is the pilot's task to monitor all these systems and take the appropriate action in case of an emerging hazardous situation. The developed method for detecting and avoiding flight hazards combines all potential external threats for an aircraft into a single system. It is based on an aircraft surrounding airspace model consisting of discrete volume elements. For each element of the volume the threat probability is derived or computed from sensor output, databases, or information provided via datalink. The position of the own aircraft is predicted by utilizing a probability distribution. This approach ensures that all potential positions of the aircraft within the near future are considered while weighting the most likely flight path. A conflict detection algorithm initiates an alarm in case the threat probability exceeds a threshold. An escape manoeuvre is generated taking into account all potential hazards in the vicinity, not only the one which caused the alarm. The pilot gets a visual information about the type, the locating, and severeness o the threat. The algorithm was implemented and tested in a flight simulator environment. The current version comprises traffic, terrain and obstacle hazards avoidance functions. Its general formulation allows an easy integration of e.g. weather information or airspace restrictions.

  7. Security risks associated with radio frequency identification in medical environments.

    PubMed

    Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio

    2012-12-01

    Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.

  8. Mapping Historic Gypsy Moth Defoliation with MODIS Satellite Data: Implications for Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spurce, Joseph P.; Hargrove, William; Ryan, Robert E.; Smooth, James C.; Prados, Don; McKellip, Rodney; Sader, Steven A.; Gasser, Jerry; May, George

    2008-01-01

    This viewgraph presentation reviews a project, the goal of which is to study the potential of MODIS data for monitoring historic gypsy moth defoliation. A NASA/USDA Forest Service (USFS) partnership was formed to perform the study. NASA is helping USFS to implement satellite data products into its emerging Forest Threat Early Warning System. The latter system is being developed by the USFS Eastern and Western Forest Threat Assessment Centers. The USFS Forest Threat Centers want to use MODIS time series data for regional monitoring of forest damage (e.g., defoliation) preferably in near real time. The study's methodology is described, and the results of the study are shown.

  9. Scaling a Human Body Finite Element Model with Radial Basis Function Interpolation

    DTIC Science & Technology

    Human body models are currently used to evaluate the body’s response to a variety of threats to the Soldier. The ability to adjust the size of human...body models is currently limited because of the complex shape changes that are required. Here, a radial basis function interpolation method is used to...morph the shape on an existing finite element mesh. Tools are developed and integrated into the Blender computer graphics software to assist with

  10. ADST Software Design Document for the BDS-D VIDS-equipped M1

    DTIC Science & Technology

    1993-09-10

    system responds to perceived threats in the following ways:I a. by displaying visual icons on the Commander’s Controls Display Panel (CCDP). b. by...also referred to as the Soldier Machine Interface (SMI) and the Commander’s Controls Display Panel (CCDP). 3.2.1. VIDS-GT CSC The VIDS-GT CSC handles...countermeasure will be activated first in Individual_CM_Simul. 4.1.3.4.3. IndividualCMSimul CSU IndividualCM-Simul controls the activation and deactivation of

  11. Seizing the Digital High Ground: Military Operations and Politics in the Social Media Era

    DTIC Science & Technology

    2015-04-13

    divided on the relative threats and opportunities. Through the analysis of social media’s technological evolution, its impact on crowd behaviour , and... Through the analysis of social media’s technological evolution, its impact on crowd behaviour , and using case studies of the Arab Spring and Islamic... arguments and recommendations proposed. Web 2.0 is a term used to describe the way in which software developers and end-users utilize the World Wide Web as

  12. CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 5. Sep/Oct 2012

    DTIC Science & Technology

    2012-10-01

    the threat actors it faces (be they nation states, empowered small agents or cyber-criminals), but also to have an actuarial view of the likelihood...systems thinking, which is full of technical jargon and mathematics . He wanted non-expert educators to be able to teach the concepts to K-12 students...able to conjecture mathematically that decreasing the exposure time window will improve the resilience of a SCIT-based system. To adapt SCIT we

  13. Change of Detection: To Find the Terrorist within the Identification of the U.S. Army’s Insider Threat

    DTIC Science & Technology

    2012-06-08

    Management, usually used in conjunction with the word System TRADOC Training and Doctrine Command UCMJ Uniform Code of Military Justice U.S. United...information system , whether a military member, a DOD civilian employee, or employee of another Federal agency or the private sector. Some...recommendations, however, address the broader scope of “ system components” or “computer software code” inside a system and intended to carry out a malicious

  14. Implementation and Analysis of a Threat Model for IPv6 Host Autoconfiguration

    DTIC Science & Technology

    2006-09-01

    Collision Generator”, two Denial of Service attacks. The software was developed in NetBeans IDE 5.0, and the comments were converted to Javadoc with the...appropriate NetBeans function. A. ICMPV6 SUPPORT FOR JPCAP As the attack uses ICMPv6 messages, a means must be provided to generate these messages...ICMP packet. * * Developed in NetBeans IDE 5.0 * Makes use of Jpcap 0.5.1 library * (http://netresearch.ics.uci.edu/kfujii/jpcap/doc

  15. Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders

    DTIC Science & Technology

    2013-01-01

    under Contract No. FA8721-05- C -0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded...logging capabilities or further modify the control to best suit its needs. 1.1 Audience and Structure of This Report This report is a hands -on guide...the follow- ing directory: C :\\Admin_Tools\\USB_Audit\\ When selecting a deployment path, avoid using spaces in directory names since this will cause

  16. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: a review.

    PubMed

    Upadhyayula, Venkata K K

    2012-02-17

    There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad range of threat agents, including radioactive substances, explosive compounds, chemical warfare agents, biotoxins, and biothreat pathogens through any of the four sensory means mentioned previously. Copyright © 2011 Elsevier B.V. All rights reserved.

  17. The impact of uncertain threat on affective bias: Individual differences in response to ambiguity.

    PubMed

    Neta, Maital; Cantelon, Julie; Haga, Zachary; Mahoney, Caroline R; Taylor, Holly A; Davis, F Caroline

    2017-12-01

    Individuals who operate under highly stressful conditions (e.g., military personnel and first responders) are often faced with the challenge of quickly interpreting ambiguous information in uncertain and threatening environments. When faced with ambiguity, it is likely adaptive to view potentially dangerous stimuli as threatening until contextual information proves otherwise. One laboratory-based paradigm that can be used to simulate uncertain threat is known as threat of shock (TOS), in which participants are told that they might receive mild but unpredictable electric shocks while performing an unrelated task. The uncertainty associated with this potential threat induces a state of emotional arousal that is not overwhelmingly stressful, but has widespread-both adaptive and maladaptive-effects on cognitive and affective function. For example, TOS is thought to enhance aversive processing and abolish positivity bias. Importantly, in certain situations (e.g., when walking home alone at night), this anxiety can promote an adaptive state of heightened vigilance and defense mobilization. In the present study, we used TOS to examine the effects of uncertain threat on valence bias, or the tendency to interpret ambiguous social cues as positive or negative. As predicted, we found that heightened emotional arousal elicited by TOS was associated with an increased tendency to interpret ambiguous cues negatively. Such negative interpretations are likely adaptive in situations in which threat detection is critical for survival and should override an individual's tendency to interpret ambiguity positively in safe contexts. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  18. Threat effects on human oculo-motor function.

    PubMed

    Naranjo, E N; Cleworth, T W; Allum, J H J; Inglis, J T; Lea, J; Westerberg, B D; Carpenter, M G

    2017-09-17

    Neuro-anatomical evidence supports the potential for threat-related factors, such as fear, anxiety and vigilance, to influence brainstem motor nuclei controlling eye movements, as well as the vestibular nuclei. However, little is known about how threat influences human ocular responses, such as eye saccades (ES), smooth pursuit eye tracking (SP), and optokinetic nystagmus (OKN), and whether these responses can be facilitated above normal baseline levels with a natural source of threat. This study was designed to examine the effects of height-induced postural threat on the gain of ES, SP and OKN responses in humans. Twenty participants stood at two different surface heights while performing ES (ranging from 8° to 45° from center), SP (15, 20, 30°/s) and OKN (15, 30, 60°/s) responses in the horizontal plane. Height did not significantly increase the slope of the relationship between ES peak velocity and initial amplitude, or the gain of ES amplitude. In contrast height significantly increased SP and OKN gain. Significant correlations were found between changes in physiological arousal and OKN gain. Observations of changes with height in OKN and SP support neuro-anatomical evidence of threat-related mechanisms influencing both oculo-motor nuclei and vestibular reflex pathways. Although further study is warranted, the findings suggest that potential influences of fear, anxiety and arousal/alertness should be accounted for, or controlled, during clinical vestibular and oculo-motor testing. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.

  19. A horizon scan of future threats and opportunities for pollinators and pollination.

    PubMed

    Brown, Mark J F; Dicks, Lynn V; Paxton, Robert J; Baldock, Katherine C R; Barron, Andrew B; Chauzat, Marie-Pierre; Freitas, Breno M; Goulson, Dave; Jepsen, Sarina; Kremen, Claire; Li, Jilian; Neumann, Peter; Pattemore, David E; Potts, Simon G; Schweiger, Oliver; Seymour, Colleen L; Stout, Jane C

    2016-01-01

    Background. Pollinators, which provide the agriculturally and ecologically essential service of pollination, are under threat at a global scale. Habitat loss and homogenisation, pesticides, parasites and pathogens, invasive species, and climate change have been identified as past and current threats to pollinators. Actions to mitigate these threats, e.g., agri-environment schemes and pesticide-use moratoriums, exist, but have largely been applied post-hoc. However, future sustainability of pollinators and the service they provide requires anticipation of potential threats and opportunities before they occur, enabling timely implementation of policy and practice to prevent, rather than mitigate, further pollinator declines. Methods.Using a horizon scanning approach we identified issues that are likely to impact pollinators, either positively or negatively, over the coming three decades. Results.Our analysis highlights six high priority, and nine secondary issues. High priorities are: (1) corporate control of global agriculture, (2) novel systemic pesticides, (3) novel RNA viruses, (4) the development of new managed pollinators, (5) more frequent heatwaves and drought under climate change, and (6) the potential positive impact of reduced chemical use on pollinators in non-agricultural settings. Discussion. While current pollinator management approaches are largely driven by mitigating past impacts, we present opportunities for pre-emptive practice, legislation, and policy to sustainably manage pollinators for future generations.

  20. A horizon scan of future threats and opportunities for pollinators and pollination

    PubMed Central

    Dicks, Lynn V.; Paxton, Robert J.; Baldock, Katherine C.R.; Barron, Andrew B.; Chauzat, Marie-Pierre; Freitas, Breno M.; Goulson, Dave; Jepsen, Sarina; Kremen, Claire; Li, Jilian; Neumann, Peter; Pattemore, David E.; Potts, Simon G.; Schweiger, Oliver; Seymour, Colleen L.; Stout, Jane C.

    2016-01-01

    Background. Pollinators, which provide the agriculturally and ecologically essential service of pollination, are under threat at a global scale. Habitat loss and homogenisation, pesticides, parasites and pathogens, invasive species, and climate change have been identified as past and current threats to pollinators. Actions to mitigate these threats, e.g., agri-environment schemes and pesticide-use moratoriums, exist, but have largely been applied post-hoc. However, future sustainability of pollinators and the service they provide requires anticipation of potential threats and opportunities before they occur, enabling timely implementation of policy and practice to prevent, rather than mitigate, further pollinator declines. Methods.Using a horizon scanning approach we identified issues that are likely to impact pollinators, either positively or negatively, over the coming three decades. Results.Our analysis highlights six high priority, and nine secondary issues. High priorities are: (1) corporate control of global agriculture, (2) novel systemic pesticides, (3) novel RNA viruses, (4) the development of new managed pollinators, (5) more frequent heatwaves and drought under climate change, and (6) the potential positive impact of reduced chemical use on pollinators in non-agricultural settings. Discussion. While current pollinator management approaches are largely driven by mitigating past impacts, we present opportunities for pre-emptive practice, legislation, and policy to sustainably manage pollinators for future generations. PMID:27602260

  1. Ground-Level Ozone Following Astrophysical Ionizing Radiation Events: An Additional Biological Hazard?

    PubMed

    Thomas, Brian C; Goracke, Byron D

    2016-01-01

    Astrophysical ionizing radiation events such as supernovae, gamma-ray bursts, and solar proton events have been recognized as a potential threat to life on Earth, primarily through depletion of stratospheric ozone and subsequent increase in solar UV radiation at Earth's surface and in the upper levels of the ocean. Other work has also considered the potential impact of nitric acid rainout, concluding that no significant threat is likely. Not yet studied to date is the potential impact of ozone produced in the lower atmosphere following an ionizing radiation event. Ozone is a known irritant to organisms on land and in water and therefore may be a significant additional hazard. Using previously completed atmospheric chemistry modeling, we examined the amount of ozone produced in the lower atmosphere for the case of a gamma-ray burst and found that the values are too small to pose a significant additional threat to the biosphere. These results may be extended to other ionizing radiation events, including supernovae and extreme solar proton events.

  2. In Silico Screening-Level Prioritization of 8468 Chemicals Produced in OECD Countries to Identify Potential Planetary Boundary Threats.

    PubMed

    Reppas-Chrysovitsinos, Efstathios; Sobek, Anna; MacLeod, Matthew

    2018-01-01

    Legislation such as the Stockholm Convention and REACH aim to identify and regulate the production and use of chemicals that qualify as persistent organic pollutants (POPs) and very persistent and very bioaccumulative (vPvB) chemicals, respectively. Recently, a series of studies on planetary boundary threats proposed seven chemical hazard profiles that are distinct from the POP and vPvB profiles. We previously defined two exposure-based hazard profiles; airborne persistent contaminants (APCs) and waterborne persistent contaminants (WPCs) that correspond to two profiles of chemicals that are planetary boundary threats. Here, we extend our method to screen a database of chemicals consisting of 8648 substances produced within the OECD countries. We propose a new scoring scheme to disentangle the POP, vPvB, APC and WPC profiles by focusing on the spatial range of exposure potential, discuss the relationship between high exposure hazard and elemental composition of chemicals, and identify chemicals with high exposure hazard potential.

  3. Empirically based comparisons of the reliability and validity of common quantification approaches for eyeblink startle potentiation in humans

    PubMed Central

    Bradford, Daniel E.; Starr, Mark J.; Shackman, Alexander J.

    2015-01-01

    Abstract Startle potentiation is a well‐validated translational measure of negative affect. Startle potentiation is widely used in clinical and affective science, and there are multiple approaches for its quantification. The three most commonly used approaches quantify startle potentiation as the increase in startle response from a neutral to threat condition based on (1) raw potentiation, (2) standardized potentiation, or (3) percent‐change potentiation. These three quantification approaches may yield qualitatively different conclusions about effects of independent variables (IVs) on affect when within‐ or between‐group differences exist for startle response in the neutral condition. Accordingly, we directly compared these quantification approaches in a shock‐threat task using four IVs known to influence startle response in the no‐threat condition: probe intensity, time (i.e., habituation), alcohol administration, and individual differences in general startle reactivity measured at baseline. We confirmed the expected effects of time, alcohol, and general startle reactivity on affect using self‐reported fear/anxiety as a criterion. The percent‐change approach displayed apparent artifact across all four IVs, which raises substantial concerns about its validity. Both raw and standardized potentiation approaches were stable across probe intensity and time, which supports their validity. However, only raw potentiation displayed effects that were consistent with a priori specifications and/or the self‐report criterion for the effects of alcohol and general startle reactivity. Supplemental analyses of reliability and validity for each approach provided additional evidence in support of raw potentiation. PMID:26372120

  4. Additive Effects of Threat-of-Shock and Picture Valence on Startle Reflex Modulation

    PubMed Central

    Bublatzky, Florian; Guerra, Pedro M.; Pastor, M. Carmen; Schupp, Harald T.; Vila, Jaime

    2013-01-01

    The present study examined the effects of sustained anticipatory anxiety on the affective modulation of the eyeblink startle reflex. Towards this end, pleasant, neutral and unpleasant pictures were presented as a continuous stream during alternating threat-of-shock and safety periods, which were cued by colored picture frames. Orbicularis-EMG to auditory startle probes and electrodermal activity were recorded. Previous findings regarding affective picture valence and threat-of-shock modulation were replicated. Of main interest, anticipating aversive events and viewing affective pictures additively modulated defensive activation. Specifically, despite overall potentiated startle blink magnitude in threat-of-shock conditions, the startle reflex remained sensitive to hedonic picture valence. Finally, skin conductance level revealed sustained sympathetic activation throughout the entire experiment during threat- compared to safety-periods. Overall, defensive activation by physical threat appears to operate independently from reflex modulation by picture media. The present data confirms the importance of simultaneously manipulating phasic-fear and sustained-anxiety in studying both normal and abnormal anxiety. PMID:23342060

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in themore » network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License PyYAML MIT License runpy2 Python Software Foundation License setuptools Python Software Foundation License / Zope Public License six MIT License TinyXML zlib License unittest2 BSD License Utilib Revised BSD License virtualenv MIT License Vol Common Public License vpykit Revised BSD License Additionally, some precompiled WST binary distributions might bundle other third-party executables files: Coliny Revised BSD License (part of Acro project) Dakota GNU Lesser General Public License (LGPL) v.2.1 PICO Revised BSD License (part of Acro project) i Revised BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Sandia National Laboratories nor Sandia Corporation nor the names of its con- tributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IM- PLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SANDIA CORPORATION BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD- ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ii Acknowledgements This work was supported by the U.S. Environmental Protection Agency through its Office of Research and Development (Interagency Agreement # DW8992192801). The material in this document has been subject to technical and policy review by the U.S. EPA, and approved for publication. The views expressed by individual authors, however, are their own, and do not necessarily reflect those of the U.S. Environmental Protection Agency. Mention of trade names, products, or services does not convey official U.S. EPA approval, endorsement, or recommendation. The Water Security Toolkit is an extension of the Threat Ensemble Vulnerability Assessment-Sensor Place- ment Optimization Tool (TEVA-SPOT), which was also developed with funding from the U.S. Environ- mental Protection Agency through its Office of Research and Development (Interagency Agreement # DW8992192801). The authors acknowledge the following individuals for their contributions to the devel- opment of TEVA-SPOT: Jonathan Berry (Sandia National Laboratories), Erik Boman (Sandia National Laboratories), Lee Ann Riesen (Sandia National Laboratories), James Uber (University of Cincinnati), and Jean-Paul Watson (Sandia National Laboratories). iii Acronyms ATUS American Time-Use Survey BLAS Basic linear algebra sub-routines CFU Colony-forming unit CVAR Conditional value at risk CWS Contamination warning system EA Evolutionary algorithm EDS Event detection system EPA U.S. Environmental Protection Agency EC Extent of Contamination ERD EPANET results database file GLPK GNU Linear Programming Kit GRASP Greedy randomized adaptive sampling process HEX Hexadecimal HTML HyperText markup language INP EPANET input file LP Linear program MC Mass consumed MILP Mixed integer linear program MIP Mixed integer program MSX Multi-species extension for EPANET NFD Number of failed detections NS Number of sensors NZD Non-zero demand PD Population dosed PE Population exposed PK Population killed TAI Threat assessment input file TCE Tailed-conditioned expectation TD Time to detection TEC Timed extent of contamination TEVA Threat ensemble vulnerability assessment TSB Tryptic soy broth TSG Threat scenario generation file TSI Threat simulation input file VAR Value at risk VC Volume consumed WST Water Security Toolkit YML YAML configuration file format for WST iv Symbols Notation Definition Example { , } set brackets { 1,2,3 } means a set containing the values 1,2, and 3. [?] is an element of s [?] S means that s is an element of the set S . [?] for all s = 1 [?] s [?] S means that the statement s = 1 is true for all s in set S . P summation P n i =1 s i means s 1 + s 2 + * * * + s n . \\ set minus S \\ T means the set that contains all those elements of S that are not in set T . %7C given %7C is used to define conditional probability. P ( s %7C t ) means the prob- ability of s occurring given that t occurs. %7C ... %7C cardinality Cardinality of a set is the number of elements of the set. If set S = { 2,4,6 } , then %7C S %7C = 3. v« less

  6. Assessment of ICount software, a precise and fast egg counting tool for the mosquito vector Aedes aegypti.

    PubMed

    Gaburro, Julie; Duchemin, Jean-Bernard; Paradkar, Prasad N; Nahavandi, Saeid; Bhatti, Asim

    2016-11-18

    Widespread in the tropics, the mosquito Aedes aegypti is an important vector of many viruses, posing a significant threat to human health. Vector monitoring often requires fecundity estimation by counting eggs laid by female mosquitoes. Traditionally, manual data analyses have been used but this requires a lot of effort and is the methods are prone to errors. An easy tool to assess the number of eggs laid would facilitate experimentation and vector control operations. This study introduces a built-in software called ICount allowing automatic egg counting of the mosquito vector, Aedes aegypti. ICount egg estimation compared to manual counting is statistically equivalent, making the software effective for automatic and semi-automatic data analysis. This technique also allows rapid analysis compared to manual methods. Finally, the software has been used to assess p-cresol oviposition choices under laboratory conditions in order to test the system with different egg densities. ICount is a powerful tool for fast and precise egg count analysis, freeing experimenters from manual data processing. Software access is free and its user-friendly interface allows easy use by non-experts. Its efficiency has been tested in our laboratory with oviposition dual choices of Aedes aegypti females. The next step will be the development of a mobile application, based on the ICount platform, for vector monitoring surveys in the field.

  7. Long-term video surveillance and automated analyses reveal arousal patterns in groups of hibernating bats

    USGS Publications Warehouse

    Hayman, David T.S.; Cryan, Paul; Fricker, Paul D.; Dannemiller, Nicholas G.

    2017-01-01

    Understanding natural behaviours is essential to determining how animals deal with new threats (e.g. emerging diseases). However, natural behaviours of animals with cryptic lifestyles, like hibernating bats, are often poorly characterized. White-nose syndrome (WNS) is an unprecedented disease threatening multiple species of hibernating bats, and pathogen-induced changes to host behaviour may contribute to mortality. To better understand the behaviours of hibernating bats and how they might relate to WNS, we developed new ways of studying hibernation across entire seasons.We used thermal-imaging video surveillance cameras to observe little brown bats (Myotis lucifugus) and Indiana bats (M. sodalis) in two caves over multiple winters. We developed new, sharable software to test for autocorrelation and periodicity of arousal signals in recorded video.We processed 740 days (17,760 hr) of video at a rate of >1,000 hr of video imagery in less than 1 hr using a desktop computer with sufficient resolution to detect increases in arousals during midwinter in both species and clear signals of daily arousal periodicity in infected M. sodalis.Our unexpected finding of periodic synchronous group arousals in hibernating bats demonstrate the potential for video methods and suggest some bats may have innate behavioural strategies for coping with WNS. Surveillance video and accessible analysis software make it now practical to investigate long-term behaviours of hibernating bats and other hard-to-study animals.

  8. Environmental factors in golf course development: a case study

    Treesearch

    Lisa Mason-Fradette; Robert S. Bristow

    1995-01-01

    Environmental constraints become apparent when one considers the maintenance and operation of a golf course. The high demand for water, proximity to surface or ground water supplies and the potential threats by the perpetuation of the grounds. This investigation of a new golf course construction site will identify the threats to the environment.

  9. Crisis in the Philippines: A Threat to U.S. Interests.

    ERIC Educational Resources Information Center

    Gregor, A. James

    The special relationship between the United States and the Philippines is chronicled, and the potential threats to that relationship are exposed and evaluated. Special attention is paid to imposition of martial law by Marcos from 1972-1981. The human rights of the Filipino people during martial law, development programs implemented by Marcos…

  10. 2035 Biodeterrence: Problems and Promises for Biodefense

    DTIC Science & Technology

    2010-02-17

    7 How are Bioweapons Different from other Weapons...the nature of biological threats and how dual-use research, their formidable attributes, and their WMD potential make them a threat the United...its objective to prevent an attack or at least greatly mitigate the effects of an attack. How are Bioweapons Different from other Weapons? The

  11. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  12. Western gall rust -- A threat to Pinus radiata in New Zealand

    Treesearch

    Tod D. Ramsfield; Darren J. Kriticos; Detlev R. Vogler; Brian W. Geils

    2007-01-01

    Western gall rust (Peridermium harknessii J. P. Moore (syn. Endocronartium harknessii (J. P. Moore) Y. Hiratsuka) is potentially a serious threat to exotic Pinus radiata D. Don plantations of New Zealand although the pathogen has not been recorded here. Mechanisms that may have prevented invasion of the pathogen include geographic...

  13. Aversive Startle Potentiation and Fear Pathology: Mediating Role of Threat Sensitivity and Moderating Impact of Depression

    PubMed Central

    Yancey, James R.; Vaidyanathan, Uma; Patrick, Christopher J.

    2015-01-01

    Enhanced startle during exposure to unpleasant cues (aversive startle potentiation; ASP) appears in the RDoC matrix as a physiological index of acute threat response. Increased ASP has been linked to focal fear disorders and to scale measures of dispositional fearfulness (i.e., threat sensitivity; THT+). However, some studies have reported reduced ASP for fear pathology accompanied by major depressive disorder (MDD) or pervasive distress. The current study evaluated whether (a) THT+ as indexed by reported dispositional fearfulness mediates the relationship between fear disorders (when unaccompanied by depression) and ASP, and (b) depression moderates relations of THT+ and fear disorders with ASP. Fear disorder participants without MDD showed enhanced ASP whereas those with MDD (or other distress conditions) showed evidence of reduced ASP. Continuous THT+ scores also predicted ASP, and this association: (a) was likewise moderated by depression/distress, and (b) accounted for the relationship between ASP and fear pathology without MDD. These findings point to a role for the RDoC construct of acute threat, operationalized dispositionally, in enhanced ASP shown by individuals with fear pathology unaccompanied by distress pathology. PMID:25448265

  14. Computational modeling of drug-resistant bacteria. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDougall, Preston

    2015-03-12

    Initial proposal summary: The evolution of antibiotic-resistant mutants among bacteria (superbugs) is a persistent and growing threat to public health. In many ways, we are engaged in a war with these microorganisms, where the corresponding arms race involves chemical weapons and biological targets. Just as advances in microelectronics, imaging technology and feature recognition software have turned conventional munitions into smart bombs, the long-term objectives of this proposal are to develop highly effective antibiotics using next-generation biomolecular modeling capabilities in tandem with novel subatomic feature detection software. Using model compounds and targets, our design methodology will be validated with correspondingly ultra-highmore » resolution structure-determination methods at premier DOE facilities (single-crystal X-ray diffraction at Argonne National Laboratory, and neutron diffraction at Oak Ridge National Laboratory). The objectives and accomplishments are summarized.« less

  15. Health risk perception, optimistic bias, and personal satisfaction.

    PubMed

    Bränström, Richard; Brandberg, Yvonne

    2010-01-01

    To examine change in risk perception and optimistic bias concerning behavior-linked health threats and environmental health threats between adolescence and young adulthood and how these factors related to personal satisfaction. In 1996 and 2002, 1624 adolescents responded to a mailed questionnaire. Adolescents showed strong positive optimistic bias concerning behaviorlinked risks, and this optimistic bias increased with age. Increase in optimistic bias over time predicted increase in personal satisfaction. The capacity to process and perceive potential threats in a positive manner might be a valuable human ability positively influencing personal satisfaction and well-being.

  16. Neural architecture of hunger-dependent multisensory decision making in C. elegans

    PubMed Central

    Ghosh, D. Dipon; Sanders, Tom; Hong, Soonwook; McCurdy, Li Yan; Chase, Daniel L.; Cohen, Netta; Koelle, Michael R.; Nitabach, Michael N.

    2016-01-01

    SUMMARY Little is known about how animals integrate multiple sensory inputs in natural environments to balance avoidance of danger with approach to things of value. Furthermore, the mechanistic link between internal physiological state and threat-reward decision making remains poorly understood. Here we confronted C. elegans worms with the decision whether to cross a hyperosmotic barrier presenting the threat of desiccation to reach a source of food odor. We identified a specific interneuron that controls this decision via top-down extrasynaptic aminergic potentiation of the primary osmosensory neurons to increase their sensitivity to the barrier. We also establish that food deprivation increases the worm’s willingness to cross the dangerous barrier by suppressing this pathway. These studies reveal a potentially general neural circuit architecture for internal state control of threat-reward decision making. PMID:27866800

  17. Risk analysis of technological hazards: Simulation of scenarios and application of a local vulnerability index.

    PubMed

    Sanchez, E Y; Represa, S; Mellado, D; Balbi, K B; Acquesta, A D; Colman Lerner, J E; Porta, A A

    2018-06-15

    The potential impact of a technological accident can be assessed by risk estimation. Taking this into account, the latent or potential condition can be warned and mitigated. In this work we propose a methodology to estimate risk of technological hazards, focused on two components. The first one is the processing of meteorological databases to define the most probably and conservative scenario of study, and the second one, is the application of a local social vulnerability index to classify the population. In this case of study, the risk was estimated for a hypothetical release of liquefied ammonia in a meat-packing industry in the city of La Plata, Argentina. The method consists in integrating the simulated toxic threat zone with ALOHA software, and the layer of sociodemographic classification of the affected population. The results show the areas associated with higher risks of exposure to ammonia, which are worth being addressed for the prevention of disasters in the region. Advantageously, this systemic approach is methodologically flexible as it provides the possibility of being applied in various scenarios based on the available information of both, the exposed population and its meteorology. Furthermore, this methodology optimizes the processing of the input data and its calculation. Copyright © 2018 Elsevier B.V. All rights reserved.

  18. Threats during sex work and association with mental health among young female sex workers in Hong Kong.

    PubMed

    Mo, Phoenix K H; Mak, Winnie W S; Kwok, Yvonne T Y; Xin, Meiqi; Chan, Charlie W L; Yip, Louise W M

    2018-08-01

    Young female sex workers (YFSWs) are confronted with significant threats during sex work. The present cross-sectional study examined different levels of threats (i.e., threats to life and health, threats to humanity, threats to control of work and financial security, and the threats to future) experienced by 87 YFSWs (age 16-25) in Hong Kong, and identified their association with mental health (i.e., psychological well-being) together with other factors, including childhood trauma, self-efficacy, hope, and social support. Results showed that the participants encountered a significant number of threats. More than half reported that they had a condom removed by clients during sex (51.7%); or have been humililated by clients (51.7%). Because of sex work, about a quarter (25.3%) have had sexually transmitted disease, and respectively 10.3% and 12.6% have had abortion and unplanned pregnancy. The majority have had friends found out that they engaged in sex work (72.4%). They also showed a high level of worry about the various threats. Multiple linear regression analysis showed that childhood trauma (β = -.26) and worry about threats during sex work (β = -.22) were significantly negative predictors, while self-efficacy (β = .20) and hope (β = .27) were significantly positive predictors of mental health. Future services should improve YFSWs' skills to minimize potential threats during female sex work, address the structural correlates and relieve their worries, and empower them with more hope and self-efficacy in choosing clients.

  19. More on Inoculating Against Reactance to Persuasive Health Messages: The Paradox of Threat.

    PubMed

    Richards, Adam S; Banas, John A; Magid, Yoav

    2017-07-01

    This research examined the efficacy of inoculation as a strategy to mitigate psychological reactance based on the level of threat communicated in the forewarning and subsequent persuasive health appeal. Two 2 (inoculation) × 2 (freedom-threatening language) experiments were conducted. The first (N = 181) used elaborated inoculation designed to enhance the threat of impending reactance to a message advocating for responsible alcohol consumption. The second (N = 159) used limited inoculation designed to minimize the threat of impending reactance to a message advocating for responsible soft drink consumption. Results showed that elaborated inoculation increased reactance, whereas limited inoculation decreased reactance but only when the subsequent appeal used less freedom-threatening language. These findings suggest that inoculation has the potential to facilitate or buffer reactance depending on the level of threat communicated in inoculation forewarnings and in subsequent persuasive health appeals.

  20. Biological warfare agents as threats to potable water.

    PubMed Central

    Burrows, W D; Renner, S E

    1999-01-01

    Nearly all known biological warfare agents are intended for aerosol application. Although less effective as potable water threats, many are potentially capable of inflicting heavy casualties when ingested. Significant loss of mission capability can be anticipated even when complete recovery is possible. Properly maintained field army water purification equipment can counter this threat, but personnel responsible for the operation and maintenance of the equipment may be most at risk of exposure. Municipal water treatment facilities would be measurably less effective. Some replicating (infectious) agents and a few biotoxins are inactivated by chlorine disinfection; for others chlorine is ineffective or of unknown efficacy. This report assesses the state of our knowledge of agents as potable water threats and contemplates the consequences of intentional or collateral contamination of potable water supplies by 18 replicating agents and 9 biotoxins known or likely to be weaponized or otherwise used as threats. PMID:10585901

  1. Incorporating threat in hotspots and coldspots of biodiversity and ecosystem services.

    PubMed

    Schröter, Matthias; Kraemer, Roland; Ceauşu, Silvia; Rusch, Graciela M

    2017-11-01

    Spatial prioritization could help target conservation actions directed to maintain both biodiversity and ecosystem services. We delineate hotspots and coldspots of two biodiversity conservation features and five regulating and cultural services by incorporating an indicator of 'threat', i.e. timber harvest profitability for forest areas in Telemark (Norway). We found hotspots, where high values of biodiversity, ecosystem services and threat coincide, ranging from 0.1 to 7.1% of the area, depending on varying threshold levels. Targeting of these areas for conservation follows reactive conservation approaches. In coldspots, high biodiversity and ecosystem service values coincide with low levels of threat, and cover 0.1-3.4% of the forest area. These areas might serve proactive conservation approaches at lower opportunity cost (foregone timber harvest profits). We conclude that a combination of indicators of biodiversity, ecosystem services and potential threat is an appropriate approach for spatial prioritization of proactive and reactive conservation strategies.

  2. Content specificity of attention bias to threat in anxiety disorders: a meta-analysis.

    PubMed

    Pergamin-Hight, Lee; Naim, Reut; Bakermans-Kranenburg, Marian J; van IJzendoorn, Marinus H; Bar-Haim, Yair

    2015-02-01

    Despite the established evidence for threat-related attention bias in anxiety, the mechanisms underlying this bias remain unclear. One important unresolved question is whether disorder-congruent threats capture attention to a greater extent than do more general or disorder-incongruent threat stimuli. Evidence for attention bias specificity in anxiety would implicate involvement of previous learning and memory processes in threat-related attention bias, whereas lack of content specificity would point to perturbations in more generic attention processes. Enhanced clarity of mechanism could have clinical implications for the stimuli types used in Attention Bias Modification Treatments (ABMT). Content specificity of threat-related attention bias in anxiety and potential moderators of this effect were investigated. A systematic search identified 37 samples from 29 articles (N=866). Relevant data were extracted based on specific coding rules, and Cohen's d effect size was used to estimate bias specificity effects. The results indicate greater attention bias toward disorder-congruent relative to disorder-incongruent threat stimuli (d=0.28, p<0.0001). This effect was not moderated by age, type of anxiety disorder, visual attention tasks, or type of disorder-incongruent stimuli. No evidence of publication bias was observed. Implications for threat bias in anxiety and ABMT are discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Instrument response measurements of ion mobility spectrometers in situ: maintaining optimal system performance of fielded systems

    NASA Astrophysics Data System (ADS)

    Wallis, Eric; Griffin, Todd M.; Popkie, Norm, Jr.; Eagan, Michael A.; McAtee, Robert F.; Vrazel, Danet; McKinly, Jim

    2005-05-01

    Ion Mobility Spectroscopy (IMS) is the most widespread detection technique in use by the military for the detection of chemical warfare agents, explosives, and other threat agents. Moreover, its role in homeland security and force protection has expanded due, in part, to its good sensitivity, low power, lightweight, and reasonable cost. With the increased use of IMS systems as continuous monitors, it becomes necessary to develop tools and methodologies to ensure optimal performance over a wide range of conditions and extended periods of time. Namely, instrument calibration is needed to ensure proper sensitivity and to correct for matrix or environmental effects. We have developed methodologies to deal with the semi-quantitative nature of IMS and allow us to generate response curves that allow a gauge of instrument performance and maintenance requirements. This instrumentation communicates to the IMS systems via a software interface that was developed in-house. The software measures system response, logs information to a database, and generates the response curves. This paper will discuss the instrumentation, software, data collected, and initial results from fielded systems.

  4. The strategic marketing reaction of conventional nonprofit hospitals to the market entry of alternative care provider organizations.

    PubMed

    Schul, P L; Remington, S J; Planchon, J M

    1994-01-01

    A study was conducted examining the competitive reaction of incumbent firms to the market entry of new form competition in the health care services industry. Specifically, the study addressed the relative impact of both objective and perceptual characteristics of the threat potential posed by the entrance of alternative care facilities (ACF's) into markets previously dominated by nonprofit hospital organizations. The results showed that incumbent hospitals tend to rely most extensively on limited, low-risk market differentiation when responding to the threat posed by ACF entrants. Objective characteristics reflective of the structural complexity of the threat were found to be less important in influencing incumbent reaction than were administrators' perceptions of new entrant threat.

  5. Summary

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Powell, Danny H; Elwood Jr, Robert H

    2011-01-01

    An effective risk assessment system is needed to address the threat posed by an active or passive insider who, acting alone or in collusion, could attempt diversion or theft of nuclear material. The material control and accountability (MC&A) system effectiveness tool (MSET) is a self-assessment or inspection tool utilizing probabilistic risk assessment (PRA) methodology to calculate the system effectiveness of a nuclear facility's material protection, control, and accountability (MPC&A) system. The MSET process is divided into four distinct and separate parts: (1) Completion of the questionnaire that assembles information about the operations of every aspect of the MPC&A system; (2)more » Conversion of questionnaire data into numeric values associated with risk; (3) Analysis of the numeric data utilizing the MPC&A fault tree and the SAPHIRE computer software; and (4) Self-assessment using the MSET reports to perform the effectiveness evaluation of the facility's MPC&A system. The process should lead to confirmation that mitigating features of the system effectively minimize the threat, or it could lead to the conclusion that system improvements or upgrades are necessary to achieve acceptable protection against the threat. If the need for system improvements or upgrades is indicated when the system is analyzed, MSET provides the capability to evaluate potential or actual system improvements or upgrades. A facility's MC&A system can be evaluated at a point in time. The system can be reevaluated after upgrades are implemented or after other system changes occur. The total system or specific subareas within the system can be evaluated. Areas of potential system improvement can be assessed to determine where the most beneficial and cost-effective improvements should be made. Analyses of risk importance factors show that sustainability is essential for optimal performance and reveals where performance degradation has the greatest impact on total system risk. The risk importance factors show the amount of risk reduction achievable with potential upgrades and the amount of risk reduction achieved after upgrades are completed. Applying the risk assessment tool gives support to budget prioritization by showing where budget support levels must be sustained for MC&A functions most important to risk. Results of the risk assessment are also useful in supporting funding justifications for system improvements that significantly reduce system risk. The functional model, the system risk assessment tool, and the facility evaluation questionnaire are valuable educational tools for MPC&A personnel. These educational tools provide a framework for ongoing dialogue between organizations regarding the design, development, implementation, operation, assessment, and sustainability of MPC&A systems. An organization considering the use of MSET as an analytical tool for evaluating the effectiveness of its MPC&A system will benefit from conducting a complete MSET exercise at an existing nuclear facility.« less

  6. Acute Hydrocortisone Treatment Increases Anxiety but Not Fear in Healthy Volunteers: A Fear-Potentiated Startle Study

    PubMed Central

    Grillon, Christian; Heller, Randi; Hirschhorn, Elizabeth; Kling, Mitchel A.; Pine, Daniel S.; Schulkin, Jay; Vythilingam, Meena

    2011-01-01

    Background The debilitating effects of chronic glucocorticoids excess are well-known, but comparatively little is understood about the role of acute cortisol. Indirect evidence in rodents suggests that acute cortisone could selectively increase some forms of long-duration aversive states, such as “anxiety,” but not relatively similar, briefer aversive states, such as “fear.” However, no prior experimental studies in humans consider the unique effects of cortisol on anxiety and fear, using well-validated methods for eliciting these two similar but dissociable aversive states. The current study examines these effects, as instantiated with short- and long-duration threats. Methods Healthy volunteers (n = 18) received placebo or a low (20 mg) or a high (60 mg) dose of hydrocortisone in a double-blind crossover design. Subjects were exposed repeatedly to three 150-sec duration conditions: no shock; predictable shocks, in which shocks were signaled by a short-duration threat cue; and unpredictable shocks. Aversive states were indexed by acoustic startle. Fear was operationally defined as the increase in startle reactivity during the threat cue in the predictable condition (fear-potentiated startle). Anxiety was operationally defined as the increase in baseline startle from the no shock to the two threat conditions (anxiety-potentiated startle). Results Hydrocortisone affected neither baseline nor short-duration, fear-potentiated startle but increased long-duration anxiety-potentiated startle. Conclusions These results suggest that hydrocortisone administration in humans selectively increases anxiety but not fear. Possible mechanisms implicated are discussed in light of prior data in rodents. Specifically, hydrocortisone might increase anxiety via sensitization of corticotrophin-releasing hormones in the bed nucleus of the stria terminalis. PMID:21277566

  7. Episodic foresight and anxiety: Proximate and ultimate perspectives.

    PubMed

    Miloyan, Beyon; Bulley, Adam; Suddendorf, Thomas

    2016-03-01

    In this paper, we examine the relationship between episodic foresight and anxiety from an evolutionary perspective, proposing that together they confer an advantage for modifying present moment decision-making and behaviour in the light of potential future threats to fitness. We review the body of literature on the role of episodic foresight in anxiety, from both proximate and ultimate perspectives. We propose that anxious feelings associated with episodic simulation of possible threat-related future events serve to imbue these simulations with motivational currency. Episodic and semantic details of a future threat may be insufficient for motivating its avoidance, but anxiety associated with a simulation can provoke adaptive threat management. As such, we detail how anxiety triggered by a self-generated, threat-related future simulation prepares the individual to manage that threat (in terms of its likelihood and/or consequences) over greater temporal distances than observed in other animals. We then outline how anxiety subtypes may represent specific mechanisms for predicting and managing particular classes of fitness threats. This approach offers an inroad for understanding the nature of characteristic future thinking patterns in anxiety disorders and serves to illustrate the adaptive function of the mechanism from which clinical anxiety deviates. © 2015 The British Psychological Society.

  8. The effects of disturbance threat on leaf-cutting ant colonies: a laboratory study.

    PubMed

    Norman, V C; Pamminger, T; Hughes, W O H

    2017-01-01

    The flexibility of organisms to respond plastically to their environment is fundamental to their fitness and evolutionary success. Social insects provide some of the most impressive examples of plasticity, with individuals exhibiting behavioral and sometimes morphological adaptations for their specific roles in the colony, such as large soldiers for nest defense. However, with the exception of the honey bee model organism, there has been little investigation of the nature and effects of environmental stimuli thought to instigate alternative phenotypes in social insects. Here, we investigate the effect of repeated threat disturbance over a prolonged (17 month) period on both behavioral and morphological phenotypes, using phenotypically plastic leaf-cutting ants ( Atta colombica ) as a model system. We found a rapid impact of threat disturbance on the behavioral phenotype of individuals within threat-disturbed colonies becoming more aggressive, threat responsive, and phototactic within as little as 2 weeks. We found no effect of threat disturbance on morphological phenotypes, potentially, because constraints such as resource limitation outweighed the benefit for colonies of producing larger individuals. The results suggest that plasticity in behavioral phenotypes can enable insect societies to respond to threats even when constraints prevent alteration of morphological phenotypes.

  9. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    PubMed Central

    Pennington, Charlotte R.; McCann, Joseph J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females’ gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group’s ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females’ gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group’s gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat. PMID:29444126

  10. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    PubMed

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  11. Information and Communication Technologies (ICT) as keys to the enhancement of public awareness about potential earth impacts

    NASA Astrophysics Data System (ADS)

    Usikov, Denis A.

    2013-09-01

    The 2007 Planetary Defense Conference recommends "to provide or enhance Internet sites to show how threats evolve and to illustrate possible action scenarios". Thereby, establishment of informational and communicational AsteroidAware web-site with the exact, authentic data about the past and the present of Earth's impact events will assist in achievement of positive results and progress in different directions on political, international, social and scientific levels. Expanded ICT's capabilities for popularization of planetary defense can help in resolving the problem of low public interest. The project's primary intent lies in popularizing the concept of planetary defenses and attracting attention to the potential dangers that threaten the Earth from outer space. The result of the efforts falling into the boundaries of this project would be an increased amount of social participation in the process of developing solutions for and increasing awareness of potential collisions between various astral bodies and the Earth. The project is also aimed at creating a foundation for the interaction between scientists and executives from around the world to facilitate international efforts of searching for fitting measures towards lowering threat levels and developing strategies revolving around united actions against potential threats.

  12. Amphibians and land use in the Chihuahuan Desert border region

    Treesearch

    Paulette L. Ford; Deborah M. Finch

    1999-01-01

    The pressures of growing borderland populations, increased land use, and Increased water use are threatening amphibians in the Chihuahuan Desert border area. In this paper, we describe potential direct threats such as loss or contamination of aquatic habitats, and indirect threats such as the sublethal effects of pesticides on developing larvae and tadpoles. More...

  13. 76 FR 77467 - Endangered and Threatened Species; Initiation of Status Review for Ribbon Seal

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-13

    ... management on ribbon seals; (2) Information on the effects of climate change and sea ice change on the...) Information on the effects of other potential threat factors, including oil and gas exploration and... concern about threats to this species' habitat from climate warming and loss of sea ice. The Petitioner...

  14. Information Security Trends and Issues in the Moodle E-Learning Platform: An Ethnographic Content Analysis

    ERIC Educational Resources Information Center

    Schultz, Christopher

    2012-01-01

    Empirical research on information security trends and practices in e-learning is scarce. Many articles that have been published apply basic information security concepts to e-learning and list potential threats or propose frameworks for classifying threats. The purpose of this research is to identify, categorize and understand trends and issues in…

  15. Potential Stereotype Threat and Face Validity Effects on Cognitive-Based Test Performance in the Classroom

    ERIC Educational Resources Information Center

    Hollis-Sawyer, Lisa A.; Sawyer, Thomas P., Jr.

    2008-01-01

    Evaluation is an inherent part of education for an increasingly diverse student population. Confidence in one's test-taking skills, and the associated testing environment, needs to be examined from a perspective that combines the concept of Bandurian self-efficacy with the concept of stereotype threat reactions in a diverse student sample. Factors…

  16. From the Weakest Link to the Best Defense: Exploring the Factors That Affect Employee Intention to Comply with Information Security Policies

    ERIC Educational Resources Information Center

    Aurigemma, Salvatore

    2013-01-01

    Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the reliance on information technology has increased, so too have the threats and costs associated with protecting organizational information resources. To combat potential information security threats, organizations rely…

  17. Human hippocampus arbitrates approach-avoidance conflict.

    PubMed

    Bach, Dominik R; Guitart-Masip, Marc; Packard, Pau A; Miró, Júlia; Falip, Mercè; Fuentemilla, Lluís; Dolan, Raymond J

    2014-03-03

    Animal models of human anxiety often invoke a conflict between approach and avoidance. In these, a key behavioral assay comprises passive avoidance of potential threat and inhibition, both thought to be controlled by ventral hippocampus. Efforts to translate these approaches to clinical contexts are hampered by the fact that it is not known whether humans manifest analogous approach-avoidance dispositions and, if so, whether they share a homologous neurobiological substrate. Here, we developed a paradigm to investigate the role of human hippocampus in arbitrating an approach-avoidance conflict under varying levels of potential threat. Across four experiments, subjects showed analogous behavior by adapting both passive avoidance behavior and behavioral inhibition to threat level. Using functional magnetic resonance imaging (fMRI), we observe that threat level engages the anterior hippocampus, the human homolog of rodent ventral hippocampus. Testing patients with selective hippocampal lesions, we demonstrate a causal role for the hippocampus with patients showing reduced passive avoidance behavior and inhibition across all threat levels. Our data provide the first human assay for approach-avoidance conflict akin to that of animal anxiety models. The findings bridge rodent and human research on passive avoidance and behavioral inhibition and furnish a framework for addressing the neuronal underpinnings of human anxiety disorders, where our data indicate a major role for the hippocampus. Copyright © 2014 The Authors. Published by Elsevier Inc. All rights reserved.

  18. Cutting costs in response to predatory threat by Geoffroy's marmosets (Callithrix geoffroyi).

    PubMed

    Caine, N G

    1998-01-01

    Ideally, prey should respond to their predators efficiently, without over- or underreacting to the threat. This may be particularly important for small-bodied species for whom metabolic demands are high and predatory risk is great. In the current study, two family groups of Callithrix geoffroyi living outside in a rural setting at the Center for Reproduction of Endangered Species, San Diego Wild Animal Park, were observed before, during, and after ten presentations of a great horned owl model. The owl was mounted on a post on a nearby hillside, simulating a situation in which a real but nonimminent threat is posed. As controls, a model of a crow and a cloth bag were also presented, each for ten trials. During the 10 min presentations of the owl, rates of play and foraging decreased, and rates of locomotion and vigilant looking increased from baseline rates. Data on occupation of the best viewing area suggest that the marmosets shared the job of monitoring a potential threat. After the owl was removed, behavior quickly returned to baseline rates, with the exception of looking at the place where the owl had been, and play. Neither the bag nor the crow generated significant differences from the baseline condition that preceded it. Marmosets may reduce the costs of antipredator behavior by appropriately assessing the degree of risk and by quickly resuming important activities once a potential threat has passed.

  19. Simulation of Groundwater Contaminant Transport at a Decommissioned Landfill Site—A Case Study, Tainan City, Taiwan

    PubMed Central

    Chen, Chao-Shi; Tu, Chia-Huei; Chen, Shih-Jen; Chen, Cheng-Chung

    2016-01-01

    Contaminant transport in subsurface water is the major pathway for contamination spread from contaminated sites to groundwater supplies, to remediate a contaminated site. The aim of this paper was to set up the groundwater contaminant transport model for the Wang-Tien landfill site, in southwestern Taiwan, which exhibits high contamination of soil and groundwater and therefore represents a potential threat for the adjacent Hsu-Hsian Creek. Groundwater Modeling System software, which is the most sophisticated groundwater modeling tool available today, was used to numerically model groundwater flow and contaminant transport. In the simulation, the total mass of pollutants in the aquifer increased by an average of 72% (65% for ammonium nitrogen and 79% for chloride) after 10 years. The simulation produced a plume of contaminated groundwater that extends 80 m in length and 20 m in depth northeastward from the landfill site. Although the results show that the concentrations of ammonium nitrogen and chlorides in most parts are low, they are 3.84 and 467 mg/L, respectively, in the adjacent Hsu-Hsian Creek. PMID:27153078

  20. Final Technical Report. Project Boeing SGS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bell, Thomas E.

    Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less

  1. Architecture Design for the Space Situational Awareness System in the Preparedness Plan for Space Hazards of Republic of Korea

    NASA Astrophysics Data System (ADS)

    Choi, E.; Cho, S.; Shin, S.; Park, J.; Kim, J.; Kim, D.

    The threat posed by asteroids and comets has become one of the important issues. Jinju meteorite discovered in March 2014 has expanded the interest of the people of the fall of the natural space objects. Furthermore, the growing quantity of space debris is a serious threat to satellites and other spacecraft, which risk being damaged or even destroyed. In May of 2014, Korea established the preparedness plan for space hazards according to the space development promotion act which is amended to take action with respect to hazards from space. This plan is largely composed of 3 items such as system, technology and infrastructure. System is included the establishment and management of national space hazards headquarters at risk situation. Korea Astronomy and Space Science Institute (KASI) was designated as a space environment monitoring agency under the ministry of science, ICT and future planning (MSIP). Technology is supposed to develop the space situational awareness system that can monitor and detect space objects. For infrastructure, research and development of core technology will be promoted for capabilities improvement of space hazards preparedness such as software tools, application and data systems. This paper presents the architectural design for building space situational awareness system. The trade-off study of space situational awareness system for the Korea situation was performed. The results have shown the proposed architectural design. The baseline architecture is composed of Integrated Analysis System and Space Objects Monitoring System. Integrated Analysis System collects the status data from Space Objects Monitoring System and analyzes the space risk information through a data processing. For Space Objects Monitoring System, the all-sky surveillance camera, array radar and meteoroid surveillance sensor networks were considered. This system focuses on not only the threat of a large artificial satellite and natural space objects such as asteroids that crashed to Earth but also the prediction of potential collisions between space objects. Especially, array radar aims to accurately track space objects. By analyzing performance for radar system and sensor networks, several feasible approaches for such a space objects monitoring system will be presented in this paper.

  2. In Your Face: Startle to Emotional Facial Expressions Depends on Face Direction.

    PubMed

    Åsli, Ole; Michalsen, Henriette; Øvervoll, Morten

    2017-01-01

    Although faces are often included in the broad category of emotional visual stimuli, the affective impact of different facial expressions is not well documented. The present experiment investigated startle electromyographic responses to pictures of neutral, happy, angry, and fearful facial expressions, with a frontal face direction (directed) and at a 45° angle to the left (averted). Results showed that emotional facial expressions interact with face direction to produce startle potentiation: Greater responses were found for angry expressions, compared with fear and neutrality, with directed faces. When faces were averted, fear and neutrality produced larger responses compared with anger and happiness. These results are in line with the notion that startle is potentiated to stimuli signaling threat. That is, a forward directed angry face may signal a threat toward the observer, and a fearful face directed to the side may signal a possible threat in the environment.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in amore » critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.« less

  4. STARR: shortwave-targeted agile Raman robot for the detection and identification of emplaced explosives

    NASA Astrophysics Data System (ADS)

    Gomer, Nathaniel R.; Gardner, Charles W.

    2014-05-01

    In order to combat the threat of emplaced explosives (land mines, etc.), ChemImage Sensor Systems (CISS) has developed a multi-sensor, robot mounted sensor capable of identification and confirmation of potential threats. The system, known as STARR (Shortwave-infrared Targeted Agile Raman Robot), utilizes shortwave infrared spectroscopy for the identification of potential threats, combined with a visible short-range standoff Raman hyperspectral imaging (HSI) system for material confirmation. The entire system is mounted onto a Talon UGV (Unmanned Ground Vehicle), giving the sensor an increased area search rate and reducing the risk of injury to the operator. The Raman HSI system utilizes a fiber array spectral translator (FAST) for the acquisition of high quality Raman chemical images, allowing for increased sensitivity and improved specificity. An overview of the design and operation of the system will be presented, along with initial detection results of the fusion sensor.

  5. The ecology of human fear: survival optimization and the nervous system

    PubMed Central

    Mobbs, Dean; Hagan, Cindy C.; Dalgleish, Tim; Silston, Brian; Prévost, Charlotte

    2015-01-01

    We propose a Survival Optimization System (SOS) to account for the strategies that humans and other animals use to defend against recurring and novel threats. The SOS attempts to merge ecological models that define a repertoire of contextually relevant threat induced survival behaviors with contemporary approaches to human affective science. We first propose that the goal of the nervous system is to reduce surprise and optimize actions by (i) predicting the sensory landscape by simulating possible encounters with threat and selecting the appropriate pre-encounter action and (ii) prevention strategies in which the organism manufactures safe environments. When a potential threat is encountered the (iii) threat orienting system is engaged to determine whether the organism ignores the stimulus or switches into a process of (iv) threat assessment, where the organism monitors the stimulus, weighs the threat value, predicts the actions of the threat, searches for safety, and guides behavioral actions crucial to directed escape. When under imminent attack, (v) defensive systems evoke fast reflexive indirect escape behaviors (i.e., fight or flight). This cascade of responses to threat of increasing magnitude are underwritten by an interconnected neural architecture that extends from cortical and hippocampal circuits, to attention, action and threat systems including the amygdala, striatum, and hard-wired defensive systems in the midbrain. The SOS also includes a modulatory feature consisting of cognitive appraisal systems that flexibly guide perception, risk and action. Moreover, personal and vicarious threat encounters fine-tune avoidance behaviors via model-based learning, with higher organisms bridging data to reduce face-to-face encounters with predators. Our model attempts to unify the divergent field of human affective science, proposing a highly integrated nervous system that has evolved to increase the organism's chances of survival. PMID:25852451

  6. Masculine men articulate less clearly.

    PubMed

    Kempe, Vera; Puts, David A; Cárdenas, Rodrigo A

    2013-12-01

    In previous research, acoustic characteristics of the male voice have been shown to signal various aspects of mate quality and threat potential. But the human voice is also a medium of linguistic communication. The present study explores whether physical and vocal indicators of male mate quality and threat potential are linked to effective communicative behaviors such as vowel differentiation and use of more salient phonetic variants of consonants. We show that physical and vocal indicators of male threat potential, height and formant position, are negatively linked to vowel space size, and that height and levels of circulating testosterone are negatively linked to the use of the aspirated variant of the alveolar stop consonant /t/. Thus, taller, more masculine men display less clarity in their speech and prefer phonetic variants that may be associated with masculine attributes such as toughness. These findings suggest that vocal signals of men's mate quality and/or dominance are not confined to the realm of voice acoustics but extend to other aspects of communicative behavior, even if this means a trade-off with speech patterns that are considered communicatively advantageous, such as clarity and indexical cues to higher social class.

  7. Oil market power and United States national security

    PubMed Central

    Stern, Roger

    2006-01-01

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt2004 collections by Persian Gulf states ≈ $132-178 × 109. We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291

  8. Exotic annual Bromus invasions: comparisons among species and ecoregions in the western United States

    USGS Publications Warehouse

    Brooks, Matthew L.; Brown, Cynthia S.; Chambers, Jeanne C.; D'Antonio, Carla M.; Keeley, Jon E.; Belnap, Jayne

    2016-01-01

    Exotic annual Bromus species are widely recognized for their potential to invade, dominate, and alter the structure and function of ecosystems. In this chapter, we summarize the invasion potential, ecosystem threats, and management strategies for different Bromus species within each of five ecoregions of the western United States. We characterize invasion potential and threats in terms of ecosystem resistance to Bromus invasion and ecosystem resilience to disturbance with an emphasis on the importance of fi re regimes. We also explain how soil temperature and moisture regimes can be linked to patterns of resistance and resilience and provide a conceptual framework that can be used to evaluate the relative potential for invasion and ecological impact of the dominant exotic annual Bromus species in the western United States.

  9. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    PubMed

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Defense policy planners and countermeasure developers are often faced with vexing problems involving the prioritization of resources and efforts. This is especially true in the area of Biodefense, where each new emerging infectious disease outbreak brings with it questions regarding the causative agent's potential for weaponization. Recent experience with West Nile Virus, Severe Acute Respiratory Syndrome, Monkeypox, and H1N1 Influenza highlights this problem. Appropriately, in each of these cases, the possibility of bioterrorism was raised, although each outbreak ultimately proved to have a natural origin. In fact, determining whether an outbreak has an unnatural origin can be quite difficult. Thus, the questions remain: could the causative agents of these and other emerging infectious disease outbreaks pose a future weaponization threat? And how great is that threat? Should precious resources be diverted from other defense efforts in order to prepare for possible hostile employment of novel diseases by belligerents? Answering such critical questions requires some form of systematic threat assessment. Through extensive collaborative work conducted within NATO's Biomedical Advisory Council, we developed a scoring matrix for evaluating the weaponization potential of the causative agents of such diseases and attempted to validate our matrix by examining the reproducibility of data using known threat agents. Our matrix included 12 attributes of a potential weapon and was provided, along with detailed scoring instructions, to 12 groups of biodefense experts in 6 NATO nations. Study participants were asked to score each of these 12 attributes on a scale of 0-3: Infectivity, Infection-to-Disease Ratio (Reliability), Predictability (& Incubation Period), Morbidity & Mortality (Virulence), Ease of Large-Scale Production & Storage, Aerosol Stability, Atmospheric Stability, Ease of Dispersal, Communicability, Prophylactic Countermeasure Availability, Therapeutic Countermeasure Availability, and Ease of Detection. Reproducibility of scoring data was assessed by examining the standard deviations (SD) of mean scores. Our results were unexpected. Several familiar biothreat diseases such as anthrax and tularemia were judged, by our experts, to be less threatening than many others owing to a number of factors including ease of detection, lack of communicability, and the ready availability of countermeasures. Conversely, several toxins were judged by experts to have very high potential as threat agents owing, in part, to their reliability, virulence, and a lack of available countermeasures. Agreement among experts, as determined by lower SD about a mean score, was greater for more familiar threats. Our study was designed to provide a concise and east-to-apply set of criteria that could be used by NATO nations to evaluate emerging infectious disease threats with respect to their weaponization potential. Our results were unexpected. We believe that a lack of appropriate weighting factors may explain these results and suggest that future studies weigh each of the 12 proposed criteria based on the intended use of the assessment data and other situational factors. We believe that the greatest value of our study lies in a codification of the attributes of a biological weapon. © Association of Military Surgeons of the United States 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  10. Signaling threat: how situational cues affect women in math, science, and engineering settings.

    PubMed

    Murphy, Mary C; Steele, Claude M; Gross, James J

    2007-10-01

    This study examined the cues hypothesis, which holds that situational cues, such as a setting's features and organization, can make potential targets vulnerable to social identity threat. Objective and subjective measures of identity threat were collected from male and female math, science, and engineering (MSE) majors who watched an MSE conference video depicting either an unbalanced ratio of men to women or a balanced ratio. Women who viewed the unbalanced video exhibited more cognitive and physiological vigilance, and reported a lower sense of belonging and less desire to participate in the conference, than did women who viewed the gender-balanced video. Men were unaffected by this situational cue. The implications for understanding vulnerability to social identity threat, particularly among women in MSE settings, are discussed.

  11. The influence of stereotype threat on immigrants: review and meta-analysis

    PubMed Central

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256

  12. Desertification of rangelands: 4.20

    USGS Publications Warehouse

    Peters, D. P. C.; Bestelmeyer, B. T.; Havstad, K. M.; Rango, A.; Archer, S. R.; Comrie, A. C.; Gimblett, H. R.; López-Hoffman, L.; Sala, O. E.; Vivoni, E. R.; Brooks, M. L.; Brown, J.; Monger, H. C.; Goldstein, J. H.

    2013-01-01

    Desertification, the broad-scale conversion of perennial grasslands to dominance by annuals or xerophytic shrubs, has affected drylands globally over the past several centuries. Desertification is a cumulative threat that includes both climatic (e.g., drought) and land-use drivers (e.g., livestock overgrazing, fire). In this chapter, we determine the vulnerability of different ecosystem services to changes in drivers and ecosystem states, with a focus on the American Southwest. We have four objectives: (1) to describe key services in drylands, (2) to identify consequences of desertification to each service, (3) to explore the vulnerability of each service to future state-changes if existing threats intensify and new threats emerge, and (4) to determine threats expected to have the greatest future impact, and to provide potential actions for mitigation. We conclude with recommendations.

  13. The Risk of Risk Analysis And its Relation to the Economics of Insider Threats

    NASA Astrophysics Data System (ADS)

    Probst, Christian W.; Hunker, Jeffrey

    Insider threats to organizational information security are widely viewed as an important concern, but little is understood as to the pattern of their occurrence. We outline an argument for explaining what originally surprised us: that many practitioners report that their organizations take basic steps to prevent insider attacks, but do not attempt to address more serious attacks. We suggest that an understanding of the true cost of additional policies to control insider threats, and the dynamic nature of potential insider threats together help explain why this observed behavior is economically rational. This conclusion also suggests that further work needs to be done to understand how better to change underlying motivations of insiders, rather than simply focus on controlling and monitoring their behavior.

  14. A global response roadmap to the asteroid impact threat: The NEOShield perspective

    NASA Astrophysics Data System (ADS)

    Perna, D.; Barucci, M. A.; Drube, L.; Falke, A.; Fulchignoni, M.; Harris, A. W.; Harris, A. W.; Kanuchova, Z.

    2015-12-01

    Besides being of great scientific interest, near-Earth objects represent a well-founded threat to life on our planet. Nonetheless, up to now there has been no concerted international plan on how to deal with the impact threat, and how to prepare and implement mitigation measures. The NEOShield project is funded by the European Commission to address such issues, to investigate the feasibility of techniques to prevent a potentially catastrophic impact on Earth by an asteroid or a comet, and to develop detailed designs of appropriate space missions to test deflection techniques. In this work we present and discuss the scientific and strategic aspects of the asteroid impact threat, highlighting the necessary steps so as to be ready to react to future hazardous objects.

  15. Underwater Threat Source Localization: Processing Sensor Network TDOAs with a Terascale Optical Core Device

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barhen, Jacob; Imam, Neena

    2007-01-01

    Revolutionary computing technologies are defined in terms of technological breakthroughs, which leapfrog over near-term projected advances in conventional hardware and software to produce paradigm shifts in computational science. For underwater threat source localization using information provided by a dynamical sensor network, one of the most promising computational advances builds upon the emergence of digital optical-core devices. In this article, we present initial results of sensor network calculations that focus on the concept of signal wavefront time-difference-of-arrival (TDOA). The corresponding algorithms are implemented on the EnLight processing platform recently introduced by Lenslet Laboratories. This tera-scale digital optical core processor is optimizedmore » for array operations, which it performs in a fixed-point-arithmetic architecture. Our results (i) illustrate the ability to reach the required accuracy in the TDOA computation, and (ii) demonstrate that a considerable speed-up can be achieved when using the EnLight 64a prototype processor as compared to a dual Intel XeonTM processor.« less

  16. A design proposal of a certain missile tactical command system based on Beidou satellite communication and GPS positioning techniques

    NASA Astrophysics Data System (ADS)

    Ma, Jian; Hao, Yongsheng; Miao, Jian; Zhang, Jianmao

    2007-11-01

    This paper introduced a design proposal of tactical command system that applied to a kind of anti-tank missile carriers. The tactical command system was made up of embedded computer system based on PC104 bus, Linux operating system, digital military map, Beidou satellite communication equipments and GPS positioning equipments. The geographic coordinates was measured by the GPS receiver, the positioning data, commands and information were transmitted real-time between tactical command systems, tactical command systems and command center, by the Beidou satellite communication systems. The Beidou satellite communication equipments and GPS positioning equipments were integrated to an independent module, exchanging data with embedded computer through RS232 serial ports and USB ports. The decision support system software based on information fusion, calculates positioning data, geography information and battle field information synthetically, shows the position of allies and the position of enemy on the military map, and assesses the various threats of different enemy objects, educes a situation assessment and threat assessment.

  17. Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance.

    PubMed

    Smith, Frank L

    2016-01-01

    Malicious software and infectious diseases are similar is several respects, as are the functional requirements for surveillance and intelligence to defend against these threats. Given these similarities, this article compares and contrasts the actors, relationships, and norms at work in cyber intelligence and disease surveillance. Historical analysis reveals that civilian cyber defense is more decentralized, private, and voluntary than public health in the United States. Most of these differences are due to political choices rather than technical necessities. In particular, political resistance to government institutions has shaped cyber intelligence over the past 30 years, which is a troubling sign for attempts to improve disease surveillance through local, state, and federal health departments. Information sharing about malware is also limited, despite information technology being integral to cyberspace. Such limits suggest that automation through electronic health records will not automatically improve public health surveillance. Still, certain aspects of information sharing and analysis for cyber defense are worth emulating or, at the very least, learning from to help detect and manage health threats.

  18. Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance

    PubMed Central

    Smith, Frank L.

    2016-01-01

    Malicious software and infectious diseases are similar is several respects, as are the functional requirements for surveillance and intelligence to defend against these threats. Given these similarities, this article compares and contrasts the actors, relationships, and norms at work in cyber intelligence and disease surveillance. Historical analysis reveals that civilian cyber defense is more decentralized, private, and voluntary than public health in the United States. Most of these differences are due to political choices rather than technical necessities. In particular, political resistance to government institutions has shaped cyber intelligence over the past 30 years, which is a troubling sign for attempts to improve disease surveillance through local, state, and federal health departments. Information sharing about malware is also limited, despite information technology being integral to cyberspace. Such limits suggest that automation through electronic health records will not automatically improve public health surveillance. Still, certain aspects of information sharing and analysis for cyber defense are worth emulating or, at the very least, learning from to help detect and manage health threats. PMID:27564783

  19. Industrial Control Systems/SCADA systems risk assessment in the energy sector

    NASA Astrophysics Data System (ADS)

    Falodun, Babatunde

    The energy sector is one of the most critical components of our national infrastructure. It not only provides the electrical power and petroleum required to run day-to-day operations and mechanisms in society, it's also an important element that directly impacts the economy with regard to growth and stability. Industrial Control Systems (ICS) /Supervisory Control and Data Acquisition Systems (SCADA) are computerized mechanisms, they are both software and hardware that are used to control real time processes and operations in power plants and oil production facilities. A significant attack on these control systems that leads to widespread disruption of energy could result in catastrophic consequences for any major city and even the nation. This research paper explores cyber threats and vulnerabilities faced by ICS/SCADA systems in the energy sector and also highlights possible outcomes of a successful breach. Furthermore, the research underscores mitigation strategies that could be used to prevent and respond to an attack. Keywords: Cybersecurity, SCADA, Cyber Attacks, Threats, Vulnerabilities, Risk Assessment, Dr. Albert Orbinati.

  20. Experimental Evidence of Threat-Sensitive Collective Avoidance Responses in a Large Wild-Caught Herring School

    PubMed Central

    Rieucau, Guillaume; Boswell, Kevin M.; De Robertis, Alex; Macaulay, Gavin J.; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60 000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the “threat-sensitive hypothesis”. PMID:24489778

  1. Are Older Adults Perceived as A Threat to Society? Exploring Perceived Age-Based Threats in 29 Nations.

    PubMed

    Ayalon, Liat

    2017-08-05

    The present study adds to the current body of literature by simultaneously examining the public perception of young and old people as posing realistic threats (e.g., to the group's power, resources, and welfare) and symbolic threats (e.g., to one's world view, belief system and values). The fourth wave of the European Social Survey was administered to individuals from 29 countries. Analysis is based on 56,170 individuals, who had data on the four relevant indicators. The study relied on a latent profile analysis to develop a typology of perceived realistic and symbolic threats to society by younger and older adults. A three-profile solution indicated that the perception of older and younger adults as threats to society often co-occurs. Sociodemographic characteristics at the individual-level and the Gini coefficient (e.g., an inequality indicator) at the country-level had differential associations with the profiles identified. The study calls for a more balanced approach which evaluates attitudes toward both younger and older adults as potential sources of threat. Attention should be paid to individual- and national-level characteristics associated with age-based threats (e.g., the perception of a group, defined by its chronological age, as threatening). © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  2. "As Good as Your Word": Face-Threat Mitigation and the Use of Instructor Nonverbal Cues on Students' Perceptions of Digital Feedback

    ERIC Educational Resources Information Center

    Clark-Gordon, Cathlin V.; Bowman, Nicholas D.; Watts, Evan R.; Banks, Jaime; Knight, Jennifer M.

    2018-01-01

    Research has established that students often consider the delivery of instructor feedback to be a face-threatening event. To minimize the potential negative effects of feedback, verbal and nonverbal face-threat mitigation (FTM) strategies are utilized by instructors. Advances in digital feedback systems, like online documents and learning…

  3. Insects and their life cycle: Steps to take to assess threats

    Treesearch

    Alicia M. Bray; Jason B. Oliver

    2013-01-01

    This paper provides a brief overview of the importance of wood-boring insects to the forest nursery industry. Descriptions of the major insect groups are provided with special attention to the life stages that are most problematic within each group. Steps are provided to guide individuals to mitigate potential threats if a new insect is detected causing damage to trees...

  4. Impact of the threat of war on children in military families.

    PubMed

    Ryan-Wenger, Nancy A

    2002-01-01

    The potential for war is a pervasive threat to the security and family structure of children in military families. This study compared children of active-duty, reserve, and civilian families with respect to their perceptions of war, origin of fears related to war, levels of manifest anxiety, coping strategies, and projection of emotional problems in human figure drawings.

  5. Climate change poses additional threat to the future of ash resources in the eastern United States

    Treesearch

    Anantha Prasad; Louis Iverson; Stephen Matthews; Matthew Peters

    2010-01-01

    It is becoming increasingly clear that climate change has the potential to alter the distribution of plant species all over the world. In the United States, ash (Fraxinus spp.) is encountering the double threat of short-term emerald ash borer (EAB) infestation, which could decimate ash throughout the country, and longer term perturbations due to...

  6. Geospatiotemporal data mining in an early warning system for forest threats in the United States

    Treesearch

    F.M. Hoffman; R.T. Mills; J. Kumar; S.S. Vulli; W.W. Hargrove

    2010-01-01

    We investigate the potential of geospatiotemporal data mining of multi-year land surface phenology data (250 m Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectroradiometer (MODIS) in this study) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster...

  7. Early responses to H7N9 in southern Mainland China

    PubMed Central

    2014-01-01

    Background H7N9 posed potentially serious health challenges for Chinese society. The previous SARS outbreak in this country was accompanied by contradictory information, while worries about wide-spread influenza led to discrimination worldwide. Early understanding of public threat perceptions is therefore important for effective public health communication and intervention. Methods We interviewed 1011 respondents by phone two weeks after the first case. Questions examined risk awareness and media use, beliefs about the emergence of the threat and those most at risk, anxiety about infection and preventive and avoidant behaviours. Results Results demonstrate moderate levels of anxiety but relatively high levels of trust towards government officials. Threat emergence was associated with hygiene levels, temperature change, floating pigs in the Huangpu River and migration to the city. Anxiety predicted both recommended and non-recommended behavioural changes. Conclusions Comparatively high levels of trust in Chinese government advice about H7N9 contrast positively with previous pandemic communications in China. Anxiety helped drive both recommended and non-recommended behaviours, with potentially important economic and social implications. This included evidence of 'othering’ of those associated with the threat (e.g. migrants). Findings emphasise the need to manage public communications early during new influenza outbreaks. PMID:24397830

  8. Early responses to H7N9 in southern Mainland China.

    PubMed

    Goodwin, Robin; Sun, Shaojing

    2014-01-07

    H7N9 posed potentially serious health challenges for Chinese society. The previous SARS outbreak in this country was accompanied by contradictory information, while worries about wide-spread influenza led to discrimination worldwide. Early understanding of public threat perceptions is therefore important for effective public health communication and intervention. We interviewed 1011 respondents by phone two weeks after the first case. Questions examined risk awareness and media use, beliefs about the emergence of the threat and those most at risk, anxiety about infection and preventive and avoidant behaviours. Results demonstrate moderate levels of anxiety but relatively high levels of trust towards government officials. Threat emergence was associated with hygiene levels, temperature change, floating pigs in the Huangpu River and migration to the city. Anxiety predicted both recommended and non-recommended behavioural changes. Comparatively high levels of trust in Chinese government advice about H7N9 contrast positively with previous pandemic communications in China. Anxiety helped drive both recommended and non-recommended behaviours, with potentially important economic and social implications. This included evidence of 'othering' of those associated with the threat (e.g. migrants). Findings emphasise the need to manage public communications early during new influenza outbreaks.

  9. When fear forms memories: threat of shock and brain potentials during encoding and recognition.

    PubMed

    Weymar, Mathias; Bradley, Margaret M; Hamm, Alfons O; Lang, Peter J

    2013-03-01

    The anticipation of highly aversive events is associated with measurable defensive activation, and both animal and human research suggests that stress-inducing contexts can facilitate memory. Here, we investigated whether encoding stimuli in the context of anticipating an aversive shock affects recognition memory. Event-related potentials (ERPs) were measured during a recognition test for words that were encoded in a font color that signaled threat or safety. At encoding, cues signaling threat of shock, compared to safety, prompted enhanced P2 and P3 components. Correct recognition of words encoded in the context of threat, compared to safety, was associated with an enhanced old-new ERP difference (500-700 msec; centro-parietal), and this difference was most reliable for emotional words. Moreover, larger old-new ERP differences when recognizing emotional words encoded in a threatening context were associated with better recognition, compared to words encoded in safety. Taken together, the data indicate enhanced memory for stimuli encoded in a context in which an aversive event is merely anticipated, which could assist in understanding effects of anxiety and stress on memory processes. Copyright © 2012 Elsevier Ltd. All rights reserved.

  10. Using a Prediction Model to Manage Cyber Security Threats.

    PubMed

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  11. Using a Prediction Model to Manage Cyber Security Threats

    PubMed Central

    Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization. PMID:26065024

  12. Design and Implementation of a Secure Modbus Protocol

    NASA Astrophysics Data System (ADS)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  13. Design, Implementation, and Evaluation of the Adolescents and Surveillance System for the Obesity Prevention Project

    PubMed Central

    Tabacchi, Garden; Bianco, Antonino; Alessi, Nicola; Filippi, Anna Rita; Napoli, Giuseppe; Jemni, Monèm; Censi, Laura; Breda, João; Schumann, Nathali Lehmann; Firenze, Alberto; Vitale, Francesco; Mammina, Caterina

    2016-01-01

    Abstract The Adolescents Surveillance System for Obesity prevention (ASSO) Project aimed at developing standardized and web-based tools for collecting data on adolescents’ obesity and its potential determinants. This has been implemented and piloted in the local area of Palermo city, Italy. The aim of the present study is to provide an overview of the Project's design, implementation, and evaluation, highlighting all the aspects for a potential scale-up of the surveillance system on the whole national territory and abroad, as a sustainable and effective source of data. The overall structure and management, the ASSO-toolkit, the ASSO-NutFit software, and all developed and used procedures for recruiting, training, and data collecting/analyzing are addressed. An interim evaluation has been performed through a feasibility study; a final Project evaluation has been performed reporting the Strengths, Weaknesses, Opportunities, and Threats (SWOT) and the attributes that a surveillance system should have. This article provides a detailed overview of the Project and highlights that ASSO can be considered a valid, logical, coherent, efficient, and sustainable surveillance system that is consistent with countries’ needs and priorities. The system developed by the ASSO Project provides high-quality data and complies with several characteristics typical of a suitable surveillance system. It has a potential of being adopted within the National Health Service and other countries’ Health Services for monitoring adolescents’ obesity and its determinants, such as food intakes, behaviors, physical activity, and fitness profiles. PMID:27015195

  14. Design, Implementation, and Evaluation of the Adolescents and Surveillance System for the Obesity Prevention Project.

    PubMed

    Tabacchi, Garden; Bianco, Antonino; Alessi, Nicola; Filippi, Anna Rita; Napoli, Giuseppe; Jemni, Monèm; Censi, Laura; Breda, João; Schumann, Nathali Lehmann; Firenze, Alberto; Vitale, Francesco; Mammina, Caterina

    2016-03-01

    The Adolescents Surveillance System for Obesity prevention (ASSO) Project aimed at developing standardized and web-based tools for collecting data on adolescents' obesity and its potential determinants. This has been implemented and piloted in the local area of Palermo city, Italy. The aim of the present study is to provide an overview of the Project's design, implementation, and evaluation, highlighting all the aspects for a potential scale-up of the surveillance system on the whole national territory and abroad, as a sustainable and effective source of data.The overall structure and management, the ASSO-toolkit, the ASSO-NutFit software, and all developed and used procedures for recruiting, training, and data collecting/analyzing are addressed. An interim evaluation has been performed through a feasibility study; a final Project evaluation has been performed reporting the Strengths, Weaknesses, Opportunities, and Threats (SWOT) and the attributes that a surveillance system should have.This article provides a detailed overview of the Project and highlights that ASSO can be considered a valid, logical, coherent, efficient, and sustainable surveillance system that is consistent with countries' needs and priorities.The system developed by the ASSO Project provides high-quality data and complies with several characteristics typical of a suitable surveillance system. It has a potential of being adopted within the National Health Service and other countries' Health Services for monitoring adolescents' obesity and its determinants, such as food intakes, behaviors, physical activity, and fitness profiles.

  15. Iranian Azeri women's perceptions of unintended pregnancy: A qualitative study.

    PubMed

    Mohammadi, Easa; Nourizadeh, Roghaiyeh; Simbar, Masoumeh

    2015-01-01

    Many women, throughout their life cycle, experience unintended pregnancy and its subsequent induced abortion. Nonetheless, women's perceptions of this phenomenon - particularly in countries prohibiting elective abortion - are poorly known. The aim of this study was to explore Iranian Azeri women's perceptions of unintended pregnancy. This was a conventional content analysis study conducted in Tabriz, Iran. The data were collected through 31 semi-structured interviews with 23 women who had recently experienced an unintended pregnancy. The study participants were recruited using the purposive sampling method. Sampling started in March 2013 and continued until reaching data saturation, i.e. till August 2013. Data analysis was carried out concurrently with data collection. MAXQDA 10.0 software was employed for managing the study data. The study data analysis process yielded the formation of three main themes including negative effects of unintended pregnancy on daily life, fear of being stigmatized with violating social norms, and abortion panic, which in turn constituted the broader overarching theme of "threat supposition." In other words, following an unintended pregnancy, the study participants had experienced different levels of fear and threat depending on their personal, family, and socio-cultural backgrounds. Women perceive unintended pregnancy as a challenging and threatening situation. An unintended pregnancy can threaten women's lives through social deprivations, growing instability, and putting both mother and baby at risk for physical and psychosocial problems. On the other hand, an unsafe illegal abortion could have potentially life-threatening complications. To cope with such a situation, women need strong social support. Healthcare providers can fulfill such women's need for support by developing pre-abortion counseling services and providing them with professional counseling. Also, strengthening women's support system by policy-makers is recommended.

  16. Iranian Azeri women's perceptions of unintended pregnancy: A qualitative study

    PubMed Central

    Mohammadi, Easa; Nourizadeh, Roghaiyeh; Simbar, Masoumeh

    2015-01-01

    Background: Many women, throughout their life cycle, experience unintended pregnancy and its subsequent induced abortion. Nonetheless, women's perceptions of this phenomenon – particularly in countries prohibiting elective abortion – are poorly known. The aim of this study was to explore Iranian Azeri women's perceptions of unintended pregnancy. Materials and Methods: This was a conventional content analysis study conducted in Tabriz, Iran. The data were collected through 31 semi-structured interviews with 23 women who had recently experienced an unintended pregnancy. The study participants were recruited using the purposive sampling method. Sampling started in March 2013 and continued until reaching data saturation, i.e. till August 2013. Data analysis was carried out concurrently with data collection. MAXQDA 10.0 software was employed for managing the study data. Results: The study data analysis process yielded the formation of three main themes including negative effects of unintended pregnancy on daily life, fear of being stigmatized with violating social norms, and abortion panic, which in turn constituted the broader overarching theme of “threat supposition.” In other words, following an unintended pregnancy, the study participants had experienced different levels of fear and threat depending on their personal, family, and socio-cultural backgrounds. Conclusions: Women perceive unintended pregnancy as a challenging and threatening situation. An unintended pregnancy can threaten women's lives through social deprivations, growing instability, and putting both mother and baby at risk for physical and psychosocial problems. On the other hand, an unsafe illegal abortion could have potentially life-threatening complications. To cope with such a situation, women need strong social support. Healthcare providers can fulfill such women's need for support by developing pre-abortion counseling services and providing them with professional counseling. Also, strengthening women's support system by policy-makers is recommended. PMID:25878705

  17. Strategy as active waiting.

    PubMed

    Sull, Donald N

    2005-09-01

    Successful executives who cut their teeth in stable industries or in developed countries often stumble when they face more volatile markets. They falter, in part, because they assume they can gaze deep into the future and develop a long-term strategy that will confer a sustainable competitive advantage. But visibility into the future of volatile markets is sharply limited because so many different variables are in play. Factors such as technological innovation, customers' evolving needs, government policy, and changes in the capital markets interact with one another to create unexpected outcomes. Over the past six years, Donald Sull, an associate professor at London Business School, has led a research project examining some of the world's most volatile markets, from national markets like China and Brazil to industries like enterprise software, telecommunications, and airlines. One of the most striking findings from this research is the importance of taking action during comparative lulls in the storm. Huge business opportunities are relatively rare; they come along only once or twice in a decade. And, for the most part, companies can't manufacture those opportunities; changes in the external environment converge to make them happen. What managers can do is prepare for these golden opportunities by managing smart during the comparative calm of business as usual. During these periods of active waiting, leaders must probe the future and remain alert to anomalies that signal potential threats or opportunities; exercise restraint to preserve their war chests; and maintain discipline to keep the troops battle ready. When a golden opportunity or"sudden death"threat emerges, managers must have the courage to declare the main effort and concentrate resources to seize the moment.

  18. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T.

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, and analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: 1) to assess the potential terrorist threat to U.S. agricultural crops, 2) to determine whether suitable assays exist to monitor that threat, and 3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  19. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, an d analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: (1) to assess the potential terrorist threat to U.S. agricultural crops, (2) to determine whether suitable assays exist to monitor that threat, and (3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  20. [Health threats and health system crises. An approach to early warning and response. 2008 SESPAS Report].

    PubMed

    Simón Soria, Fernando; Guillén Enríquez, Francisco Javier

    2008-04-01

    The world is changing more and faster than ever before. New diseases are coming to light each year, controlled diseases are reemerging as potential threats, and natural or man-made disasters are increasingly affecting human health. The "International Health Regulations (2005)" reflect the changes in the response of public health to this new situation. Surveillance of specific diseases and predefined control measures have been replaced by surveillance of public health events of international concern and control measures adapted to each situation. The public health events of international interest are characterized by their seriousness, predictability, the risk of international spread and potential for travel or trade restrictions. The development of the European Early Warning and Response System in 1998 and the creation of the European Center for Disease Prevention and Control in 2005 demonstrate political commitment in Europe, with early detection of and response to public health threats. However, timely risk evaluation and response at a national level requires improved data digitalization and accessibility, automatic notification processes, data analysis and dissemination of information, the combination of information from multiple sources and adaptation of public health services. The autonomous regions in Spain are initiating this adaptation process, but interoperability between systems and the development of guidelines for a coordinated response should be steered by the National Interregional Health Council and coordinated by the Ministry of Health. Efficient early warning systems of health threats that allow for a timely response and reduce uncertainty about information would help to minimize the risk of public health crises. The profile of public health threats is nonspecific. Early detection of threats requires access to information from multiple sources and efficient risk assessment. Key factors for improving the response to public health threats are the development of surveillance methods and operational research in public health.

  1. When anger dominates the mind: Increased motor corticospinal excitability in the face of threat

    PubMed Central

    Hortensius, Ruud

    2016-01-01

    Abstract Threat demands fast and adaptive reactions that are manifested at the physiological, behavioral, and phenomenological level and are responsive to the direction of threat and its severity for the individual. Here, we investigated the effects of threat directed toward or away from the observer on motor corticospinal excitability and explicit recognition. Sixteen healthy right‐handed volunteers completed a transcranial magnetic stimulation (TMS) task and a separate three‐alternative forced‐choice emotion recognition task. Single‐pulse TMS to the left primary motor cortex was applied to measure motor evoked potentials from the right abductor pollicis brevis in response to dynamic angry, fearful, and neutral bodily expressions with blurred faces directed toward or away from the observer. Results showed that motor corticospinal excitability increased independent of direction of anger compared with fear and neutral. In contrast, anger was better recognized when directed toward the observer compared with when directed away from the observer, while the opposite pattern was found for fear. The present results provide evidence for the differential effects of threat direction on explicit recognition and motor corticospinal excitability. In the face of threat, motor corticospinal excitability increases independently of the direction of anger, indicative of the importance of more automatic reactions to threat. PMID:27325519

  2. Threat-Related Attention Bias Variability and Posttraumatic Stress.

    PubMed

    Naim, Reut; Abend, Rany; Wald, Ilan; Eldar, Sharon; Levi, Ofir; Fruchter, Eyal; Ginat, Karen; Halpern, Pinchas; Sipos, Maurice L; Adler, Amy B; Bliese, Paul D; Quartana, Phillip J; Pine, Daniel S; Bar-Haim, Yair

    2015-12-01

    Threat monitoring facilitates survival by allowing one to efficiently and accurately detect potential threats. Traumatic events can disrupt healthy threat monitoring, inducing biased and unstable threat-related attention deployment. Recent research suggests that greater attention bias variability, that is, attention fluctuations alternating toward and away from threat, occurs in participants with PTSD relative to healthy comparison subjects who were either exposed or not exposed to traumatic events. The current study extends findings on attention bias variability in PTSD. Previous measurement of attention bias variability was refined by employing a moving average technique. Analyses were conducted across seven independent data sets; in each, data on attention bias variability were collected by using variants of the dot-probe task. Trauma-related and anxiety symptoms were evaluated across samples by using structured psychiatric interviews and widely used self-report questionnaires, as specified for each sample. Analyses revealed consistent evidence of greater attention bias variability in patients with PTSD following various types of traumatic events than in healthy participants, participants with social anxiety disorder, and participants with acute stress disorder. Moreover, threat-related, and not positive, attention bias variability was correlated with PTSD severity. These findings carry possibilities for using attention bias variability as a specific cognitive marker of PTSD and for tailoring protocols for attention bias modification for this disorder.

  3. Hazards and accessibility: combining and visualizing threat and open infrastructure data for disaster management

    NASA Astrophysics Data System (ADS)

    Tost, Jordi; Ehmel, Fabian; Heidmann, Frank; Olen, Stephanie M.; Bookhagen, Bodo

    2018-05-01

    The assessment of natural hazards and risk has traditionally been built upon the estimation of threat maps, which are used to depict potential danger posed by a particular hazard throughout a given area. But when a hazard event strikes, infrastructure is a significant factor that can determine if the situation becomes a disaster. The vulnerability of the population in a region does not only depend on the area's local threat, but also on the geographical accessibility of the area. This makes threat maps by themselves insufficient for supporting real-time decision-making, especially for those tasks that involve the use of the road network, such as management of relief operations, aid distribution, or planning of evacuation routes, among others. To overcome this problem, this paper proposes a multidisciplinary approach divided in two parts. First, data fusion of satellite-based threat data and open infrastructure data from OpenStreetMap, introducing a threat-based routing service. Second, the visualization of this data through cartographic generalization and schematization. This emphasizes critical areas along roads in a simple way and allows users to visually evaluate the impact natural hazards may have on infrastructure. We develop and illustrate this methodology with a case study of landslide threat for an area in Colombia.

  4. Exogenous testosterone affects early threat processing in socially anxious and healthy women.

    PubMed

    van Peer, Jacobien M; Enter, Dorien; van Steenbergen, Henk; Spinhoven, Philip; Roelofs, Karin

    2017-10-01

    Testosterone plays an important role in social threat processing. Recent evidence suggests that testosterone administration has socially anxiolytic effects, but it remains unknown whether this involves early vigilance or later, more sustained, processing-stages. We investigated the acute effects of testosterone administration on social threat processing in 19 female patients with Social Anxiety Disorder (SAD) and 19 healthy controls. Event-related potentials (ERPs) were recorded during an emotional Stroop task with subliminally presented faces. Testosterone induced qualitative changes in early ERPs (<200ms after stimulus onset) in both groups. An initial testosterone-induced spatial shift reflected a change in the basic processing (N170/VPP) of neutral faces, which was followed by a shift for angry faces suggesting a decrease in early threat bias. These findings suggest that testosterone specifically affects early automatic social information processing. The decreased attentional bias for angry faces explains how testosterone can decrease threat avoidance, which is particularly relevant for SAD. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign andmore » threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.« less

  6. The Role of Verbal Threat Information in the Development of Childhood Fear. “Beware the Jabberwock!”

    PubMed Central

    Field, Andy P.

    2010-01-01

    Rachman’s (Behaviour Research and Therapy 15:372–387, 1977; Clinical Psychology Review 11:155–173, 1991) three pathways theory proposed that childhood fears not only arise as a consequence of direct learning experiences, but can also be elicited by means of threat information transmission. This review looks at the scientific evidence for this idea, which has accumulated during the past three decades. We review research on the influences of media exposure on children’s fears, retrospective parent and child reports on the role of threat information in fear acquisition, and experimental studies that explored the causal effects of threat information on childhood fears. We also discuss possible mechanisms by which threat information exerts its influence and the processes relevant to understand the role of this type of learning experience in the origins of fear. Finally, implications for the prevention and intervention of childhood fears are briefly explored, and potential leads for future research will be highlighted. PMID:20198423

  7. Predictive Validity of Explicit and Implicit Threat Overestimation in Contamination Fear

    PubMed Central

    Green, Jennifer S.; Teachman, Bethany A.

    2012-01-01

    We examined the predictive validity of explicit and implicit measures of threat overestimation in relation to contamination-fear outcomes using structural equation modeling. Undergraduate students high in contamination fear (N = 56) completed explicit measures of contamination threat likelihood and severity, as well as looming vulnerability cognitions, in addition to an implicit measure of danger associations with potential contaminants. Participants also completed measures of contamination-fear symptoms, as well as subjective distress and avoidance during a behavioral avoidance task, and state looming vulnerability cognitions during an exposure task. The latent explicit (but not implicit) threat overestimation variable was a significant and unique predictor of contamination fear symptoms and self-reported affective and cognitive facets of contamination fear. On the contrary, the implicit (but not explicit) latent measure predicted behavioral avoidance (at the level of a trend). Results are discussed in terms of differential predictive validity of implicit versus explicit markers of threat processing and multiple fear response systems. PMID:24073390

  8. Neuroscientific evidence for defensive avoidance of fear appeals

    PubMed Central

    Kessels, Loes T E; Ruiter, Robert A C; Wouters, Liesbeth; Jansma, Bernadette M

    2014-01-01

    Previous studies indicate that people respond defensively to threatening health information, especially when the information challenges self-relevant goals. The authors investigated whether reduced acceptance of self-relevant health risk information is already visible in early attention allocation processes. In two experimental studies, participants were watching high- and low-threat health commercials, and at the same time had to pay attention to specific odd auditory stimuli in a sequence of frequent auditory stimuli (odd ball paradigm). The amount of attention allocation was measured by recording event-related brain potentials (i.e., P300 ERPs) and reaction times. Smokers showed larger P300 amplitudes in response to the auditory targets while watching high-threat instead of low-threat anti-smoking commercials. In contrast, non-smokers showed smaller P300 amplitudes during watching high as opposed to low threat anti-smoking commercials. In conclusion, the findings provide further neuroscientific support for the hypothesis that threatening health information causes more avoidance responses among those for whom the health threat is self-relevant. PMID:24811878

  9. Neural time course of threat-related attentional bias and interference in panic and obsessive-compulsive disorders.

    PubMed

    Thomas, Susan J; Gonsalvez, Craig J; Johnstone, Stuart J

    2013-09-01

    Attentional biases to threat are considered central to anxiety disorders, however physiological evidence of their nature and time course is lacking. Event-related potentials (ERPs) characterized sensory and cognitive changes while 20 outpatients with panic disorder (PD), 20 with obsessive-compulsive disorder (OCD), and 20 healthy controls (HCs) responded to the color (emotional Stroop task) or meaning of threatening and neutral stimuli. ERPs indicated larger P1 amplitude and longer N1 latency in OCD, and shorter P1 latency in PD, to threatening (versus neutral) stimuli, across instructions to attend to, or ignore, threat content. Emotional Stroop interference correlated with phobic anxiety and was significant in PD. Participants with emotional Stroop interference had augmented P1 and P3 amplitudes to threat (versus neutral) stimuli when color-naming. The results suggest early attentional biases to threat in both disorders, with disorder-specific characteristics. ERPs supported preferential early attentional capture and cognitive elaboration hypotheses of emotional Stroop interference. Copyright © 2013 Elsevier B.V. All rights reserved.

  10. Mechanisms of change in ERP treatment of compulsive hand washing: does primary threat make a difference?

    PubMed

    Cougle, Jesse R; Wolitzky-Taylor, Kate B; Lee, Han-Joo; Telch, Michael J

    2007-07-01

    The present study sought to examine patterns of habituation in exposure and response prevention (ERP) treatment of compulsive hand washing. Sub-clinical compulsive washers (n=27) with illness or non-illness primary threats were compared in order to detect potential differences in response to a single session of ERP. Changes in anxiety, disgust, and urge to wash were analyzed, and significant reductions in both anxiety and disgust were noted. Urge to wash significantly declined among washers primarily concerned with illness; among those concerned with non-illness threats, urge to wash did not significantly decline. Moreover, anxiety was found to decline when controlling for disgust and vice versa. Lastly, when both anxiety and disgust were entered into a model predicting changes in urge to wash, anxiety but not disgust predicted urge to wash for those with illness-related threats; for washers with non-illness threats, the findings were the reverse. Several clinical and theoretical implications are discussed.

  11. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less

  12. The interaction of BDNF Val66Met, PTSD, and child abuse on psychophysiological reactivity and HPA axis function in a sample of Gulf War Veterans.

    PubMed

    Young, Dmitri A; Neylan, Thomas C; O'Donovan, Aoife; Metzler, Thomas; Richards, Anne; Ross, Jessica A; Inslicht, Sabra S

    2018-08-01

    While the BDNF Val66Met polymorphism has been linked to various psychological disorders, limited focus has been on its relationship to posttraumatic stress disorder (PTSD) and early traumas such as child abuse. Therefore, we assessed whether Val66Met was associated with fear potentiated psychophysiological response and HPA axis dysfunction and whether PTSD status or child abuse history moderated these outcomes in a sample of Veterans. 226 and 173 participants engaged in a fear potentiated acoustic startle paradigm and a dexamethasone suppression test (DST) respectively. Fear conditions included no, ambiguous, and high threat conditions. Psychophysiological response measures included electromyogram (EMG), skin conductance response (SCR), and heart rate. The Clinician Administered PTSD Scale (CAPS) and the Trauma History Questionnaire (THQ) were used to assess PTSD status and child abuse history respectively. Met allele carriers exhibited greater SCR magnitudes in the no and ambiguous threat conditions (p < 0.01 and p < 0.05 respectively). Met carriers with PTSD exhibited greater physiological response magnitudes in the ambiguous (SCR, p < 0.001) and high threat conditions (SCR and heart rate, both p ≤ 0.005). Met carrier survivors of child abuse exhibited blunted heart rate magnitudes in the high threat condition (p < 0.01). Met allele carries with PTSD also exhibited greater percent cortisol suppression (p < 0.005). Limitations included small sample size and the cross-sectional nature of the data. The Val66met may impact PTSD susceptibility differentially via enhanced threat sensitivity and HPA axis dysregulation. Child abuse may moderate Val66Met's impact on threat reactivity. Future research should explore how neuronal mechanisms might mediate this risk. Published by Elsevier B.V.

  13. Calibration and testing of a Raman hyperspectral imaging system to reveal powdered food adulteration

    PubMed Central

    Lohumi, Santosh; Lee, Hoonsoo; Kim, Moon S.; Qin, Jianwei; Kandpal, Lalit Mohan; Bae, Hyungjin; Rahman, Anisur

    2018-01-01

    The potential adulteration of foodstuffs has led to increasing concern regarding food safety and security, in particular for powdered food products where cheap ground materials or hazardous chemicals can be added to increase the quantity of powder or to obtain the desired aesthetic quality. Due to the resulting potential health threat to consumers, the development of a fast, label-free, and non-invasive technique for the detection of adulteration over a wide range of food products is necessary. We therefore report the development of a rapid Raman hyperspectral imaging technique for the detection of food adulteration and for authenticity analysis. The Raman hyperspectral imaging system comprises of a custom designed laser illumination system, sensing module, and a software interface. Laser illumination system generates a 785 nm laser line of high power, and the Gaussian like intensity distribution of laser beam is shaped by incorporating an engineered diffuser. The sensing module utilize Rayleigh filters, imaging spectrometer, and detector for collection of the Raman scattering signals along the laser line. A custom-built software to acquire Raman hyperspectral images which also facilitate the real time visualization of Raman chemical images of scanned samples. The developed system was employed for the simultaneous detection of Sudan dye and Congo red dye adulteration in paprika powder, and benzoyl peroxide and alloxan monohydrate adulteration in wheat flour at six different concentrations (w/w) from 0.05 to 1%. The collected Raman imaging data of the adulterated samples were analyzed to visualize and detect the adulterant concentrations by generating a binary image for each individual adulterant material. The results obtained based on the Raman chemical images of adulterants showed a strong correlation (R>0.98) between added and pixel based calculated concentration of adulterant materials. This developed Raman imaging system thus, can be considered as a powerful analytical technique for the quality and authenticity analysis of food products. PMID:29708973

  14. Calibration and testing of a Raman hyperspectral imaging system to reveal powdered food adulteration.

    PubMed

    Lohumi, Santosh; Lee, Hoonsoo; Kim, Moon S; Qin, Jianwei; Kandpal, Lalit Mohan; Bae, Hyungjin; Rahman, Anisur; Cho, Byoung-Kwan

    2018-01-01

    The potential adulteration of foodstuffs has led to increasing concern regarding food safety and security, in particular for powdered food products where cheap ground materials or hazardous chemicals can be added to increase the quantity of powder or to obtain the desired aesthetic quality. Due to the resulting potential health threat to consumers, the development of a fast, label-free, and non-invasive technique for the detection of adulteration over a wide range of food products is necessary. We therefore report the development of a rapid Raman hyperspectral imaging technique for the detection of food adulteration and for authenticity analysis. The Raman hyperspectral imaging system comprises of a custom designed laser illumination system, sensing module, and a software interface. Laser illumination system generates a 785 nm laser line of high power, and the Gaussian like intensity distribution of laser beam is shaped by incorporating an engineered diffuser. The sensing module utilize Rayleigh filters, imaging spectrometer, and detector for collection of the Raman scattering signals along the laser line. A custom-built software to acquire Raman hyperspectral images which also facilitate the real time visualization of Raman chemical images of scanned samples. The developed system was employed for the simultaneous detection of Sudan dye and Congo red dye adulteration in paprika powder, and benzoyl peroxide and alloxan monohydrate adulteration in wheat flour at six different concentrations (w/w) from 0.05 to 1%. The collected Raman imaging data of the adulterated samples were analyzed to visualize and detect the adulterant concentrations by generating a binary image for each individual adulterant material. The results obtained based on the Raman chemical images of adulterants showed a strong correlation (R>0.98) between added and pixel based calculated concentration of adulterant materials. This developed Raman imaging system thus, can be considered as a powerful analytical technique for the quality and authenticity analysis of food products.

  15. Prefrontal inhibition of threat processing reduces working memory interference

    PubMed Central

    Clarke, Robert; Johnstone, Tom

    2013-01-01

    Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM) task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modeling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesized that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat-related interference. PMID:23750133

  16. Using Cloud-to-Ground Lightning Climatologies to Initialize Gridded Lightning Threat Forecasts for East Central Florida

    NASA Technical Reports Server (NTRS)

    Lambert, Winnie; Sharp, David; Spratt, Scott; Volkmer, Matthew

    2005-01-01

    Each morning, the forecasters at the National Weather Service in Melbourn, FL (NWS MLB) produce an experimental cloud-to-ground (CG) lightning threat index map for their county warning area (CWA) that is posted to their web site (http://www.srh.weather.gov/mlb/ghwo/lightning.shtml) . Given the hazardous nature of lightning in central Florida, especially during the warm season months of May-September, these maps help users factor the threat of lightning, relative to their location, into their daily plans. The maps are color-coded in five levels from Very Low to Extreme, with threat level definitions based on the probability of lightning occurrence and the expected amount of CG activity. On a day in which thunderstorms are expected, there are typically two or more threat levels depicted spatially across the CWA. The locations of relative lightning threat maxima and minima often depend on the position and orientation of the low-level ridge axis, forecast propagation and interaction of sea/lake/outflow boundaries, expected evolution of moisture and stability fields, and other factors that can influence the spatial distribution of thunderstorms over the CWA. The lightning threat index maps are issued for the 24-hour period beginning at 1200 UTC (0700 AM EST) each day with a grid resolution of 5 km x 5 km. Product preparation is performed on the AWIPS Graphical Forecast Editor (GFE), which is the standard NWS platform for graphical editing. Currently, the forecasters create each map manually, starting with a blank map. To improve efficiency of the forecast process, NWS MLB requested that the Applied Meteorology Unit (AMU) create gridded warm season lightning climatologies that could be used as first-guess inputs to initialize lightning threat index maps. The gridded values requested included CG strike densities and frequency of occurrence stratified by synoptic-scale flow regime. The intent is to increase consistency between forecasters while enabling them to focus on the mesoscale detail of the forecast, ultimately benefiting the end-users of the product. Several studies took place at the Florida State University (FSU) and NWS Tallahassee (TAE) for which they created daily flow regimes using Florida 1200 UTC synoptic soundings and CG strike densities from National Lightning Detection Network (NLDN) data. The densities were created on a 2.5 km x 2.5 km grid for every hour of every day during the warm seasons in the years 1989-2004. The grids encompass an area that includes the entire state of Florida and adjacent Atlantic and Gulf of Mexico waters. Personnel at the two organizations provided this data and supporting software for the work performed by the AMU. The densities were first stratified by flow regime, then by time in 1-, 3-, 6-, 12-, and 24-hour increments while maintaining the 2.5 km x 2.5 km grid resolution. A CG frequency of occurrence was calculated for each stratification and grid box by counting the number of days with lightning and dividing by the total number of days in the data set. New CG strike densities were calculated for each stratification and grid box by summing the strike number values over all warm seasons, then normalized by dividing the summed values by the number of lightning days. This makes the densities conditional on whether lightning occurred. The frequency climatology values will be used by forecasters as proxy inputs for lightning prObability, while the density climatology values will be used for CG amount. In addition to the benefits outlined above, these climatologies will provide improved temporal and spatial resolution, expansion of the lightning threat area to include adjacent coastal waters, and potential to extend the forecast to include the day-2 period. This presentation will describe the lightning threat index map, discuss the work done to create the maps initialized with climatological guidance, and show examples of the climatological CG lightning densities and frequencies of occurren based on flow regime.

  17. Moderating factors influencing adoption of a mobile chronic disease management system in China.

    PubMed

    Zhu, Zhangxiang; Liu, Yongmei; Che, Xiaoling; Chen, Xiaohong

    2018-01-01

    Mobile chronic disease management systems (MCDMS) have become increasingly important in recent years, but in China, challenges remain for their adoption. Existing empirical studies have not completely explored the adoption behavior of potential MCDMS users. This article presents a study in which we investigated factors that influence chronically ill patients in China and their families to adopt or decline to use MCDMS. We applied a research model based on the technology acceptance model (TAM) as well as four contextual constructs (perceived disease threat, perceived risk, initial trust, and technology anxiety) to a survey of 279 potential MCDMS service participants in China. Our key findings include: (1) as consistent with current research, both perceived usefulness and perceived ease of use have positive impact on potential users' MCDMS adoption intention; (2) both perceived disease threat and initial trust have positive impact on MCDMS adoption intention; (3) the impact of perceived risk is negative, and technology anxiety has negative impact on perceived ease of use of MCDMS; (4) young people place more importance on their perceptions of usefulness, ease of operation, and disease threat than middle-aged and older users; (5) family members are more influenced by their perception of ease of use and disease threat than chronically ill patients, while chronically ill patients place more importance on perceived usefulness than family members. This article concludes by discussing the implications of our study for research and practice, as well as limitations and future research directions.

  18. Attention training to pleasant stimuli in anxiety.

    PubMed

    Sass, Sarah M; Evans, Travis C; Xiong, Kue; Mirghassemi, Felicia; Tran, Huy

    2017-01-01

    Attentional bias for threatening stimuli in anxiety is a common finding in the literature. The present study addressed whether attention training toward pleasant stimuli can reduce anxiety symptoms and induce a processing bias in favor of pleasant information in nonpatients who were selected to score similarly to individuals with generalized anxiety or panic disorder on a measure of worry or physiological arousal, respectively. Participants were randomly assigned to attention training to pleasant (ATP) stimuli or to a placebo control (PC) condition. All participants completed baseline and post-test dot-probe measures of attentional bias while event-related brain potentials were recorded. As expected, worry symptoms decreased in the ATP and not PC condition. ATP was also associated with early evidence (P100 amplitude) of greater attentional prioritization of probes replacing neutral stimuli within threat-neutral word pairs from pre-to-post intervention and later RT evidence of facilitated processing of probes replacing pleasant stimuli within pleasant-threat word pairs at post compared to PC. PC was associated with later evidence (P300 latency) of less efficient evaluation of probes following pleasant stimuli within pleasant-threat word pairs from pre-to-post and later RT evidence of facilitated processing of probes following threat stimuli within pleasant-threat word pairs at post compared to ATP. Results highlight early and later mechanisms of attention processing changes and underscore the potential of pleasant stimuli in optimizing attention-training interventions for anxiety. Published by Elsevier B.V.

  19. Modification of S-Adenosyl-l-Homocysteine as Inhibitor of Nonstructural Protein 5 Methyltransferase Dengue Virus Through Molecular Docking and Molecular Dynamics Simulation

    PubMed Central

    Tambunan, Usman Sumo Friend; Nasution, Mochammad Arfin Fardiansyah; Azhima, Fauziah; Parikesit, Arli Aditya; Toepak, Erwin Prasetya; Idrus, Syarifuddin; Kerami, Djati

    2017-01-01

    Dengue fever is still a major threat worldwide, approximately threatening two-fifths of the world’s population in tropical and subtropical countries. Nonstructural protein 5 (NS5) methyltransferase enzyme plays a vital role in the process of messenger RNA capping of dengue by transferring methyl groups from S-adenosyl-l-methionine to N7 atom of the guanine bases of RNA and the RNA ribose group of 2′OH, resulting in S-adenosyl-l-homocysteine (SAH). The modification of SAH compound was screened using molecular docking and molecular dynamics simulation, along with computational ADME-Tox (absorption, distribution, metabolism, excretion, and toxicity) test. The 2 simulations were performed using Molecular Operating Environment (MOE) 2008.10 software, whereas the ADME-Tox test was performed using various software. The modification of SAH compound was done using several functional groups that possess different polarities and properties, resulting in 3460 ligands to be docked. After conducting docking simulation, we earned 3 best ligands (SAH-M331, SAH-M2696, and SAH-M1356) based on ΔGbinding and molecular interactions, which show better results than the standard ligands. Moreover, the results of molecular dynamics simulation show that the best ligands are still able to maintain the active site residue interaction with the binding site until the end of the simulation. After a series of molecular docking and molecular dynamics simulation were performed, we concluded that SAH-M1356 ligand is the most potential SAH-based compound to inhibit NS5 methyltransferase enzyme for treating dengue fever. PMID:28469408

  20. An exotic pest threat to eastern hemlock: an initiative for management of hemlock woolly adelgid

    Treesearch

    J. Robert Bridges; Kathleen S. Shields

    2003-01-01

    Hemlock woolly adelgid (HWA) is the greatest threat to the health and sustainability of hemlock in eastern North America. The potential ecological impacts of this exotic insect pest can be compared to those of gypsy moth, Dutch elm disease, and chestnut blight. The USDA Forest Service, with the support and cooperation of the National Association of State Foresters and...

  1. Climate Change and Your National Forest: Assessing the potential effects of climate change on the El Yunque National Forest

    Treesearch

    L.N. Jennings; E.A. Treasure; S.G. McNulty

    2013-01-01

    Forestlands across the world are experiencing increased threats from fire, insect and plant invasions, disease, extreme weather, and drought. Scientists project increases in temperature and changes in rainfall patterns that can make these threats occur more often, with more intensity, and/or for longer durations. Although many of the effects of future changes are...

  2. Hazard rating for gypsy moth on a Macintosh computer: a component of the GypsES system

    Treesearch

    Mark J. Twery; Gregory A. Elmes

    1991-01-01

    As gypsy moth expands into a new region, the threat of damage from its infestation is increasing greatly. The potential economic damage from the pest is extensive, considerably compounding the already substantial aesthetic damage and urban nuisance problems. One way to help forest managers deal with this threat is by providing them with a computer program which can...

  3. Chinese-Latin American Ties: A Convergence of Security Threats to the United States

    DTIC Science & Technology

    2013-06-14

    of action. This technique provides both advantages and disadvantages . It will consider the potential for exploitation of developing countries and...characteristics disadvantageous to China. 3. Opportunities are vulnerabilities that China could exploit to Beijing’s advantage . 4. Threats are elements...trading partner.22 China seems to be actively (and nefariously) pursuing an economic advantage . Chinese investments often resulted in “guarantees

  4. Persistent and novel threats to the biodiversity of Kazakhstan’s steppes and semi-deserts

    USGS Publications Warehouse

    Kamp, Johannes; Koshkin, Maxim A; Bragina, Tatyana M; Katzner, Todd E.; Milner-Gulland, E J; Schreiber, Dagmar; Sheldon, Robert; Shmalenko, Alyona; Smelansky, Ilya; Terraube, Julien; Urazaliev, Ruslan

    2016-01-01

    Temperate grasslands have suffered disproportionally from conversion to cropland, degradation and fragmentation. A large proportion of the world’s remaining near-natural grassland is situated in Kazakhstan. We aimed to assess current and emerging threats to steppe and semi-desert biodiversity in Kazakhstan and evaluate conservation research priorities. We conducted a horizon-scanning exercise among conservationists from academia and practice. We first compiled a list of 45 potential threats. These were then ranked by the survey participants according to their perceived severity, the need for research on them, and their novelty. The highest-ranked threats were related to changes in land use (leading to habitat loss and deterioration), direct persecution of wildlife, and rapid infrastructure development due to economic and population growth. Research needs were identified largely in the same areas, and the mean scores of threat severity and research need were highly correlated. Novel threats comprised habitat loss by photovoltaic and wind power stations, climate change and changes in agriculture such as the introduction of biofuels. However, novelty was not correlated with threat severity or research priority, suggesting that the most severe threats are the established ones. Important goals towards more effective steppe and semi-desert conservation in Kazakhstan include more cross-sector collaboration (e.g. by involving stakeholders in conservation and agriculture), greater allocation of funds to under-staffed areas (e.g. protected area management), better representativeness and complementarity in the protected area system and enhanced data collection for wildlife monitoring and threat assessments (including the use of citizen-science databases).

  5. Pubertal testosterone influences threat-related amygdala–orbitofrontal cortex coupling

    PubMed Central

    Forbes, Erika E.; Ladouceur, Cecile D.; Worthman, Carol M.; Olino, Thomas M.; Ryan, Neal D.; Dahl, Ronald E.

    2015-01-01

    Growing evidence indicates that normative pubertal maturation is associated with increased threat reactivity, and this developmental shift has been implicated in the increased rates of adolescent affective disorders. However, the neural mechanisms involved in this pubertal increase in threat reactivity remain unknown. Research in adults indicates that testosterone transiently decreases amygdala–orbitofrontal cortex (OFC) coupling. Consequently, we hypothesized that increased pubertal testosterone disrupts amygdala–OFC coupling, which may contribute to developmental increases in threat reactivity in some adolescents. Hypotheses were tested in a longitudinal study by examining the impact of testosterone on functional connectivity. Findings were consistent with hypotheses and advance our understanding of normative pubertal changes in neural systems instantiating affect/motivation. Finally, potential novel insights into the neurodevelopmental pathways that may contribute to adolescent vulnerability to behavioral and emotional problems are discussed. PMID:24795438

  6. Helping Parents Cope with Suicide Threats: An Approach Based on Nonviolent Resistance.

    PubMed

    Omer, Haim; Dolberger, Dan Isaac

    2015-09-01

    Parent training in nonviolent resistance was adapted to deal with situations of suicide threat by children, adolescents, and young adults. The approach aims at reducing the risk potential and the mutual distress surrounding the threat-interaction. Parent training in nonviolent resistance has been shown to help parents move from helplessness to presence, from isolation to connectedness, from submission to resistance, from escalation to self-control, and from mutual distancing and hostility to care and support. Those emphases can be crucial for the diminution of suicide risk. Parents show good ability to implement the approach and report gains on various areas over and beyond the reduction in suicide threat. A particular advantage is that the method can be used also in cases where the young person threatening suicide is not willing to cooperate. © 2015 Family Process Institute.

  7. A taxonomy and discussion of software attack technologies

    NASA Astrophysics Data System (ADS)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research and a discussion of the motivation for our work. Section two contains a presents our taxonomy of software attacks and a discussion of the strategies employed and general weaknesses exploited for each attack. Section three contains a summary and suggestions for further research.

  8. Future Infectious Disease Threats to Europe

    PubMed Central

    Suk, Jonathan E.

    2011-01-01

    We examined how different drivers of infectious disease could interact to threaten control efforts in Europe. We considered projected trends through 2020 for 3 broad groups of drivers: globalization and environmental change, social and demographic change, and health system capacity. Eight plausible infectious disease threats with the potential to be significantly more problematic than they are today were identified through an expert consultation: extensively drug-resistant bacteria, vector-borne diseases, sexually transmitted infections, food-borne infections, a resurgence of vaccine-preventable diseases, health care–associated infections, multidrug-resistant tuberculosis, and pandemic influenza. Preemptive measures to be taken by the public health community to counteract these threats were identified. PMID:21940915

  9. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis.

    PubMed

    Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity.

  10. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis

    PubMed Central

    Holgado-Tello, Fco. P.; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A.

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991

  11. If it bleeds, it leads: separating threat from mere negativity

    PubMed Central

    Boshyan, Jasmine; Adams, Reginald B.; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F.

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. PMID:24493851

  12. The key to enabling biosurveillance is cooperative technology development.

    PubMed

    Emanuel, Peter; Jones, Franca; Smith, Michael; Huff, William; Jaffe, Richard; Roos, Jason

    2011-12-01

    The world population will continue to face biological threats, whether they are naturally occurring or intentional events. The speed with which diseases can emerge and spread presents serious challenges, because the impact on public health, the economy, and development can be huge. The U.S. government recognizes that global public health can also have an impact on national security. This global perspective manifests itself in U.S. policy documents that clearly articulate the importance of biosurveillance in providing early warning, detection, and situational awareness of infectious disease threats in order to mount a rapid response and save lives. In this commentary, we suggest that early recognition of infectious disease threats, whether naturally occurring or man-made, requires a globally distributed array of interoperable hardware and software fielded in sufficient numbers to create a network of linked collection nodes. We argue that achievement of this end state will require a degree of cooperation that does not exist at this time-either across the U.S. federal government or among our global partners. Successful fielding of a family of interoperable technologies will require interagency research, development, and purchase ("acquisition") of biosurveillance systems through cooperative ventures that likely will involve our strategic allies and public-private partnerships. To this end, we propose leveraging an existing federal interagency group to integrate the acquisition of technologies to enable global biosurveillance. © Mary Ann Liebert, Inc.

  13. Strengths, weaknesses, opportunities, and threats analysis of integrating the World Health Organization patient safety curriculum into undergraduate medical education in Pakistan: a qualitative case study.

    PubMed

    Misbah, Samreen; Mahboob, Usman

    2017-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of integrating the World Health Organization (WHO) patient safety curriculum into undergraduate medical education in Pakistan. A qualitative interpretive case study was conducted at Riphah International University, Islamabad, from October 2016 to June 2017. The study included 9 faculty members and 1 expert on patient safety. The interviews were audiotaped, and a thematic analysis of the transcripts was performed using NVivo software. Four themes were derived based on the need analysis model. The sub-themes derived from the collected data were arranged under the themes of strengths, weaknesses, opportunities, and threats, in accordance with the principles of SWOT analysis. The strengths identified were the need for a formal patient safety curriculum and its early integration into the undergraduate program. The weaknesses were faculty awareness and participation in development programs. The opportunities were an ongoing effort to develop an appropriate curriculum, to improve the current culture of healthcare, and to use the WHO curricular resource guide. The threats were attitudes towards patient safety in Pakistani culture, resistance to implementation from different levels, and the role of regulatory authorities. The theme of patient safety needs to be incorporated early into the formal medical education curriculum, with the main goals of striving to do no harm and seeing mistakes as opportunities to learn. Faculty development activities need to be organized, and faculty members should to be encouraged to participate in them. The lack of a patient safety culture was identified as the primary reason for resistance to this initiative at many levels. The WHO curriculum, amended according to local institutional culture, can be implemented appropriately with support from the corresponding regulatory bodies.

  14. Capturing security requirements for software systems.

    PubMed

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  15. Dual-surface dielectric depth detector for holographic millimeter-wave security scanners

    NASA Astrophysics Data System (ADS)

    McMakin, Douglas L.; Keller, Paul E.; Sheen, David M.; Hall, Thomas E.

    2009-05-01

    The Transportation Security Administration (TSA) is presently deploying millimeter-wave whole body scanners at over 20 airports in the United States. Threats that may be concealed on a person are displayed to the security operator of this scanner. "Passenger privacy is ensured through the anonymity of the image. The officer attending the passenger cannot view the image, and the officer viewing the image is remotely located and cannot see the passenger. Additionally, the image cannot be stored, transmitted or printed and is deleted immediately after being viewed. Finally, the facial area of the image has been blurred to further ensure privacy." Pacific Northwest National Laboratory (PNNL) originated research into this novel security technology which has been independently commercialized by L-3 Communications, SafeView, Inc. PNNL continues to perform fundamental research into improved software techniques which are applicable to the field of holographic security screening technology. This includes performing significant research to remove human features from the imagery. Both physical and software imaging techniques have been employed. The physical imaging techniques include polarization diversity illumination and reception, dual frequency implementation, and high frequency imaging at 100 GHz. This paper will focus on a software privacy technique using a dual surface dielectric depth detector method.

  16. Capturing security requirements for software systems

    PubMed Central

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  17. Certification Processes for Safety-Critical and Mission-Critical Aerospace Software

    NASA Technical Reports Server (NTRS)

    Nelson, Stacy

    2003-01-01

    This document is a quick reference guide with an overview of the processes required to certify safety-critical and mission-critical flight software at selected NASA centers and the FAA. Researchers and software developers can use this guide to jumpstart their understanding of how to get new or enhanced software onboard an aircraft or spacecraft. The introduction contains aerospace industry definitions of safety and safety-critical software, as well as, the current rationale for certification of safety-critical software. The Standards for Safety-Critical Aerospace Software section lists and describes current standards including NASA standards and RTCA DO-178B. The Mission-Critical versus Safety-Critical software section explains the difference between two important classes of software: safety-critical software involving the potential for loss of life due to software failure and mission-critical software involving the potential for aborting a mission due to software failure. The DO-178B Safety-critical Certification Requirements section describes special processes and methods required to obtain a safety-critical certification for aerospace software flying on vehicles under auspices of the FAA. The final two sections give an overview of the certification process used at Dryden Flight Research Center and the approval process at the Jet Propulsion Lab (JPL).

  18. Salutary effects of an attention bias modification mobile application on biobehavioral measures of stress and anxiety during pregnancy.

    PubMed

    Dennis-Tiwary, Tracy A; Denefrio, Samantha; Gelber, Shari

    2017-07-01

    Stress and anxiety during pregnancy are associated with a range of adverse health outcomes, but there is an unmet need for low-barrier treatments that target stress and anxiety. One such treatment approach, attention bias modification training (ABMT), targets the anxiety-related threat bias, a disruption in attention to and neural processing of threat-related information. It remains unclear, however, whether reducing treatment barriers via mobile delivery of ABMT is effective and whether ABMT efficacy varies depending on individual differences in neural processing of threat. The present study tested whether mobile, gamified ABMT reduced prenatal threat bias, anxiety and stress, and whether ABMT efficacy varied with individual differences in neural responses to threat. Participants were 29 women in their 19th-29th week of pregnancy, randomized to four weeks of an ABMT or placebo training (PT) version of the mobile app using a double-blind design. Self-report of anxiety, depression, and stress were obtained; salivary cortisol was collected at home and in lab in response to stressors to index biological stress reactivity. Threat bias was measured using a computerized attention assay during which EEG was recorded to generate event-related potentials (ERPs) to threat cues. Results showed lower levels of lab cortisol following ABMT versus PT. Although the main effect of ABMT on subjective anxiety was not significant, the magnitude of cortisol reduction was correlated with lower levels of subjective anxiety and threat bias. Those receiving ABMT also reported less anxiety when showing smaller ERPs to threat (P1, P2) prior to training, but, conversely reported more anxiety when showing larger ERPs to threat. Use of gamified, mobile ABMT reduced biobehavioral indices of prenatal stress and anxiety, but effects on anxiety varied with individual differences in cortisol response and neurocognitive indices of early attention to threat. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Threats from urban expansion, agricultural transformation and forest loss on global conservation priority areas.

    PubMed

    Veach, Victoria; Moilanen, Atte; Di Minin, Enrico

    2017-01-01

    Including threats in spatial conservation prioritization helps identify areas for conservation actions where biodiversity is at imminent risk of extinction. At the global level, an important limitation when identifying spatial priorities for conservation actions is the lack of information on the spatial distribution of threats. Here, we identify spatial conservation priorities under three prominent threats to biodiversity (residential and commercial development, agricultural expansion, and forest loss), which are primary drivers of habitat loss and threaten the persistence of the highest number of species in the International Union for the Conservation of Nature (IUCN) Red List, and for which spatial data is available. We first explore how global priority areas for the conservation of vertebrate (mammals, birds, and amphibians) species coded in the Red List as vulnerable to each threat differ spatially. We then identify spatial conservation priorities for all species vulnerable to all threats. Finally, we identify the potentially most threatened areas by overlapping the identified priority areas for conservation with maps for each threat. We repeat the same with four other well-known global conservation priority area schemes, namely Key Biodiversity Areas, Biodiversity Hotspots, the global Protected Area Network, and Wilderness Areas. We find that residential and commercial development directly threatens only about 4% of the global top 17% priority areas for species vulnerable under this threat. However, 50% of the high priority areas for species vulnerable to forest loss overlap with areas that have already experienced some forest loss. Agricultural expansion overlapped with ~20% of high priority areas. Biodiversity Hotspots had the greatest proportion of their total area under direct threat from all threats, while expansion of low intensity agriculture was found to pose an imminent threat to Wilderness Areas under future agricultural expansion. Our results identify areas where limited resources should be allocated to mitigate risks to vertebrate species from habitat loss.

  20. Threats from urban expansion, agricultural transformation and forest loss on global conservation priority areas

    PubMed Central

    Moilanen, Atte; Di Minin, Enrico

    2017-01-01

    Including threats in spatial conservation prioritization helps identify areas for conservation actions where biodiversity is at imminent risk of extinction. At the global level, an important limitation when identifying spatial priorities for conservation actions is the lack of information on the spatial distribution of threats. Here, we identify spatial conservation priorities under three prominent threats to biodiversity (residential and commercial development, agricultural expansion, and forest loss), which are primary drivers of habitat loss and threaten the persistence of the highest number of species in the International Union for the Conservation of Nature (IUCN) Red List, and for which spatial data is available. We first explore how global priority areas for the conservation of vertebrate (mammals, birds, and amphibians) species coded in the Red List as vulnerable to each threat differ spatially. We then identify spatial conservation priorities for all species vulnerable to all threats. Finally, we identify the potentially most threatened areas by overlapping the identified priority areas for conservation with maps for each threat. We repeat the same with four other well-known global conservation priority area schemes, namely Key Biodiversity Areas, Biodiversity Hotspots, the global Protected Area Network, and Wilderness Areas. We find that residential and commercial development directly threatens only about 4% of the global top 17% priority areas for species vulnerable under this threat. However, 50% of the high priority areas for species vulnerable to forest loss overlap with areas that have already experienced some forest loss. Agricultural expansion overlapped with ~20% of high priority areas. Biodiversity Hotspots had the greatest proportion of their total area under direct threat from all threats, while expansion of low intensity agriculture was found to pose an imminent threat to Wilderness Areas under future agricultural expansion. Our results identify areas where limited resources should be allocated to mitigate risks to vertebrate species from habitat loss. PMID:29182662

  1. Biological agents with potential for misuse: a historical perspective and defensive measures.

    PubMed

    Bhalla, Deepak K; Warheit, David B

    2004-08-15

    Biological and chemical agents capable of producing serious illness or mortality have been used in biowarfare from ancient times. Use of these agents has progressed from crude forms in early and middle ages, when snakes and infected cadavers were used as weapons in battles, to sophisticated preparations for use during and after the second World War. Cults and terrorist organizations have attempted the use of biological agents with an aim to immobilize populations or cause serious harm. The reasons for interest in these agents by individuals and organizations include relative ease of acquisition, potential for causing mass casualty or panic, modest financing requirement, availability of technology, and relative ease of delivery. The Centers for Disease Control and Prevention has classified Critical Biological Agents into three major categories. This classification was based on several criteria, which include severity of impact on human health, potential for delivery in a weapon, capacity to cause panic and special needs for development, and stockpiling of medication. Agents that could cause the greatest harm following deliberate use were placed in category A. Category B included agents capable of producing serious harm and significant mortality but of lower magnitude than category A agents. Category C included emerging pathogens that could be developed for mass dispersion in future and their potential as a major health threat. A brief description of the category A bioagents is included and the pathophysiology of two particularly prominent agents, namely anthrax and smallpox, is discussed in detail. The potential danger from biological agents and their ever increasing threat to human populations have created a need for developing technologies for their early detection, for developing treatment strategies, and for refinement of procedures to ensure survival of affected individuals so as to attain the ultimate goal of eliminating the threat from intentional use of these agents. International treaties limiting development and proliferation of weapons and continuing development of defense strategies and safe guards against agents of concern are important elements of plans for eliminating this threat.

  2. Effects of Introduced and Indigenous Viruses on Native Plants: Exploring Their Disease Causing Potential at the Agro-Ecological Interface

    PubMed Central

    Vincent, Stuart J.; Coutts, Brenda A.; Jones, Roger A. C.

    2014-01-01

    The ever increasing movement of viruses around the world poses a major threat to plants growing in cultivated and natural ecosystems. Both generalist and specialist viruses move via trade in plants and plant products. Their potential to damage cultivated plants is well understood, but little attention has been given to the threat such viruses pose to plant biodiversity. To address this, we studied their impact, and that of indigenous viruses, on native plants from a global biodiversity hot spot in an isolated region where agriculture is very recent (<185 years), making it possible to distinguish between introduced and indigenous viruses readily. To establish their potential to cause severe or mild systemic symptoms in different native plant species, we used introduced generalist and specialist viruses, and indigenous viruses, to inoculate plants of 15 native species belonging to eight families. We also measured resulting losses in biomass and reproductive ability for some host–virus combinations. In addition, we sampled native plants growing over a wide area to increase knowledge of natural infection with introduced viruses. The results suggest that generalist introduced viruses and indigenous viruses from other hosts pose a greater potential threat than introduced specialist viruses to populations of native plants encountered for the first time. Some introduced generalist viruses infected plants in more families than others and so pose a greater potential threat to biodiversity. The indigenous viruses tested were often surprisingly virulent when they infected native plant species they were not adapted to. These results are relevant to managing virus disease in new encounter scenarios at the agro-ecological interface between managed and natural vegetation, and within other disturbed natural vegetation situations. They are also relevant for establishing conservation policies for endangered plant species and avoiding spread of damaging viruses to undisturbed natural vegetation beyond the agro-ecological interface. PMID:24621926

  3. Differential effects of psychopathy and antisocial personality disorder symptoms on cognitive and fear processing in female offenders.

    PubMed

    Anton, Marja E; Baskin-Sommers, Arielle R; Vitale, Jennifer E; Curtin, John J; Newman, Joseph P

    2012-12-01

    Psychopathy and antisocial personality disorder (APD) have long been considered important risk factors for criminal behavior and incarceration. However, little is known about the psychobiological underpinnings that give rise to the disinhibited behavior of female offenders. Using an instructed fear-conditioning paradigm and a sample of incarcerated female offenders, we manipulated attentional focus and cognitive load to characterize and differentiate between the dysfunctional cognitive and affective processes associated with these syndromes. We used fear-potentiated startle (FPS) and event-related potentials as measures of affective and cognitive processing, respectively. After controlling for APD symptoms, psychopathic women displayed greater FPS while attending directly to threat-relevant stimuli and displayed less FPS while performing a demanding task that directed attention to threat-irrelevant information. Conversely, controlling for psychopathy, women with high APD symptoms displayed less overall FPS, especially when instructed to focus on threat-relevant stimuli. However, as the demands on cognitive resources increased, they displayed greater FPS. For both psychopathy and APD, analysis of the event-related potentials qualified these findings and further specified the abnormal cognitive processes associated with these two syndromes. Overall, simultaneous analysis of psychopathy and APD revealed distinct patterns of cognitive processing and fear reactivity.

  4. The past, present and future supernova threat to Earth's biosphere

    NASA Astrophysics Data System (ADS)

    Beech, Martin

    2011-12-01

    A brief review of the threat posed to Earth's biosphere via near-by supernova detonations is presented. The expected radiation dosage, cosmic ray flux and expanding blast wave collision effects are considered, and it is argued that a typical supernova must be closer than ˜10-pc before any appreciable and potentially harmful atmosphere/biosphere effects are likely to occur. In contrast, the critical distance for Gamma-ray bursts is of order 1-kpc. In spite of the high energy effects potentially involved, the geological record provides no clear-cut evidence for any historic supernova induced mass extinctions and/or strong climate change episodes. This, however, is mostly a reflection of their being numerous possible (terrestrial and astronomical) forcing mechanisms acting upon the biosphere and the difficulty of distinguishing between competing scenarios. Key to resolving this situation, it is suggested, is the development of supernova specific extinction and climate change linked ecological models. Moving to the future, we estimate that over the remaining lifetime of the biosphere (˜2 Gyr) the Earth might experience 1 GRB and 20 supernova detonations within their respective harmful threat ranges. There are currently at least 12 potential pre-supernova systems within 1-kpc of the Sun. Of these systems IK Pegasi is the closest Type Ia pre-supernova candidate and Betelgeuse is the closest potential Type II supernova candidate. We review in some detail the past, present and future behavior of these two systems. Developing a detailed evolutionary model we find that IK Pegasi will likely not detonate until some 1.9 billion years hence, and that it affords absolutely no threat to Earth's biosphere. Betelgeuse is the closest, reasonably well understood, pre-supernova candidate to the Sun at the present epoch, and may undergo detonation any time within the next several million years. The stand-off distance of Betelgeuse at the time of its detonation is estimated to fall between 150 and 300-pc—again, affording no possible threat to Earth's biosphere. Temporally, the next most likely, close, potential Type Ic supernova to the Sun is the Wolf-Rayet star within the γ 2 Velorum binary system located at least 260-pc away. It is suggested that evidence relating to large-scale astroengineering projects might fruitfully be looked for in those regions located within 10 to 30-pc of any pre-supernova candidate system.

  5. Electrocortical processing of social signals of threat in combat-related post-traumatic stress disorder.

    PubMed

    MacNamara, Annmarie; Post, David; Kennedy, Amy E; Rabinak, Christine A; Phan, K Luan

    2013-10-01

    Post-traumatic stress disorder (PTSD) is characterized by avoidance, emotional numbing, increased arousal and hypervigilance for threat following a trauma. Thirty-three veterans (19 with PTSD, 14 without PTSD) who had experienced combat trauma while on deployment in Iraq and/or Afghanistan completed an emotional faces matching task while electroencephalography was recorded. Vertex positive potentials (VPPs) elicited by happy, angry and fearful faces were smaller in veterans with versus without PTSD. In addition, veterans with PTSD exhibited smaller late positive potentials (LPPs) to angry faces and greater intrusive symptoms predicted smaller LPPs to fearful faces in the PTSD group. Veterans with PTSD were also less accurate at identifying angry faces, and accuracy decreased in the PTSD group as hyperarousal symptoms increased. These findings show reduced early processing of emotional faces, irrespective of valence, and blunted prolonged processing of social signals of threat in conjunction with impaired perception for angry faces in PTSD. Copyright © 2013 Elsevier B.V. All rights reserved.

  6. Potential of VIIRS Time Series Data for Aiding the USDA Forest Service Early Warning System for Forest Health Threats: A Gypsy Moth Defoliation Case Study

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.; Ryan, Robert E.; McKellip, Rodney

    2008-01-01

    The Healthy Forest Restoration Act of 2003 mandated that a national forest threat Early Warning System (EWS) be developed. The USFS (USDA Forest Service) is currently building this EWS. NASA is helping the USFS to integrate remotely sensed data into the EWS, including MODIS data for monitoring forest disturbance at broad regional scales. This RPC experiment assesses the potential of VIIRS (Visible/Infrared Imager/Radiometer Suite) and MODIS (Moderate Resolution Imaging Spectroradiometer) data for contribution to the EWS. In doing so, the RPC project employed multitemporal simulated VIIRS and MODIS data for detecting and monitoring forest defoliation from the non-native Eurasian gypsy moth (Lymantria despar). Gypsy moth is an invasive species threatening eastern U.S. hardwood forests. It is one of eight major forest insect threats listed in the Healthy Forest Restoration Act of 2003. This RPC experiment is relevant to several nationally important mapping applications, including carbon management, ecological forecasting, coastal management, and disaster management

  7. Near Earth Object (NEO) Mitigation Options Using Exploration Technologies

    NASA Technical Reports Server (NTRS)

    Arnold William; Baysinger, Mike; Crane, Tracie; Capizzo, Pete; Sutherlin, Steven; Dankanich, John; Woodcock, Gordon; Edlin, George; Rushing, Johnny; Fabisinski, Leo; hide

    2007-01-01

    This work documents the advancements in MSFC threat modeling and mitigation technology research completed since our last major publication in this field. Most of the work enclosed here are refinements of our work documented in NASA TP-2004-213089. Very long development times from start of funding (10-20 years) can be expected for any mitigation system which suggests that delaying consideration of mitigation technologies could leave the Earth in an unprotected state for a significant period of time. Fortunately there is the potential for strong synergy between architecture requirements for some threat mitigators and crewed deep space exploration. Thus planetary defense has the potential to be integrated into the current U.S. space exploration effort. The number of possible options available for protection against the NEO threat was too numerous for them to all be addressed within the study; instead, a representative selection were modeled and evaluated. A summary of the major lessons learned during this study is presented, as are recommendations for future work.

  8. Hybrid Warfare in the Baltics: Threats and Potential Responses

    DTIC Science & Technology

    2017-02-23

    9 Martin Hurt, Lessons Identified in Crimea: Does Estonia’s National Defence Model Meet Our Needs? Tallinn, Estonia: International...Monuments’ in Estonia,” Nationalities Papers, Vol. 36, No. 3, July 2008, p. 436; Martin Ehala, “The Bronze Soldier: Identity Threat and Maintenance in...Ukraine Petro Poroshenko,” July 1, 2014. As of June 20, 2016: http://www.president.gov.ua/en/news/zvernennya-prezidenta-ukrayini- petra -poroshenka

  9. Fuel Tank Non-Nuclear Vulnerability Test Program

    DTIC Science & Technology

    1975-02-01

    configurations and structures , for all the threat velocities and obli~quities, alid for all the different fuel tank conditions. This is very unrealistic and can...of operational aircraft. It is, ot. course, imtpractical to simiul~ate all the potential conditions, threat variables, structural materials, and...simulate the structural members of the aircraft to which the aircraft skin and fuel tank walls are attached. The effect that paint, on the aircraft

  10. Insider Threat Detection on the Windows Operating System using Virtual Machine Introspection

    DTIC Science & Technology

    2012-06-14

    by a malicious insider. HBSS systems running on a user’s workstation could be disabled either due to misconfiguration, privilege escalation , or by a...potential malicious insider threat, organizations must develop use cases which categorize possible attack techniques, such as data exfiltration via...hardware and contain any type of data an attacker may be looking for. Minimal Resources Since honeypots do not provide any network services, they

  11. Assessing Homeland Chemical Hazards Outside the Military Gates: Industrial Hazard Threat Assessments for Department of Defense Installations

    DTIC Science & Technology

    2002-01-01

    catastrophic health consequences , resulting from potential exposures to industrial chemicals (Armed Forces Medical Intelligence Center, 1998). These...susceptible to damage from a toxic industrial material release. For this second component, the Consequence Assessment Tools Set (CATS) (Defense Threat...accidental toxic industrial material release, the severity of the release, and any associated consequences that might occur. These are based on estimated

  12. Flexible training under threat.

    PubMed

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  13. Small-College Software Survey.

    ERIC Educational Resources Information Center

    Birch, Anthony D.

    1986-01-01

    Computers have a great number of potential uses at the small college. A survey of the role of software in the effective use of computers is described. Hardware characteristics, spreadsheets, purchasing or developing software, and software information are discussed. (Author/MLW)

  14. Threats and opportunities for freshwater conservation under future land use change scenarios in the United States.

    PubMed

    Martinuzzi, Sebastián; Januchowski-Hartley, Stephanie R; Pracheil, Brenda M; McIntyre, Peter B; Plantinga, Andrew J; Lewis, David J; Radeloff, Volker C

    2014-01-01

    Freshwater ecosystems provide vital resources for humans and support high levels of biodiversity, yet are severely threatened throughout the world. The expansion of human land uses, such as urban and crop cover, typically degrades water quality and reduces freshwater biodiversity, thereby jeopardizing both biodiversity and ecosystem services. Identifying and mitigating future threats to freshwater ecosystems requires forecasting where land use changes are most likely. Our goal was to evaluate the potential consequences of future land use on freshwater ecosystems in the coterminous United States by comparing alternative scenarios of land use change (2001-2051) with current patterns of freshwater biodiversity and water quality risk. Using an econometric model, each of our land use scenarios projected greater changes in watersheds of the eastern half of the country, where freshwater ecosystems already experience higher stress from human activities. Future urban expansion emerged as a major threat in regions with high freshwater biodiversity (e.g., the Southeast) or severe water quality problems (e.g., the Midwest). Our scenarios reflecting environmentally oriented policies had some positive effects. Subsidizing afforestation for carbon sequestration reduced crop cover and increased natural vegetation in areas that are currently stressed by low water quality, while discouraging urban sprawl diminished urban expansion in areas of high biodiversity. On the other hand, we found that increases in crop commodity prices could lead to increased agricultural threats in areas of high freshwater biodiversity. Our analyses illustrate the potential for policy changes and market factors to influence future land use trends in certain regions of the country, with important consequences for freshwater ecosystems. Successful conservation of aquatic biodiversity and ecosystem services in the United States into the future will require attending to the potential threats and opportunities arising from policies and market changes affecting land use. © 2013 John Wiley & Sons Ltd.

  15. Matching species traits to projected threats and opportunities from climate change

    PubMed Central

    Garcia, Raquel A; Araújo, Miguel B; Burgess, Neil D; Foden, Wendy B; Gutsche, Alexander; Rahbek, Carsten; Cabeza, Mar

    2014-01-01

    Aim Climate change can lead to decreased climatic suitability within species' distributions, increased fragmentation of climatically suitable space, and/or emergence of newly suitable areas outside present distributions. Each of these extrinsic threats and opportunities potentially interacts with specific intrinsic traits of species, yet this specificity is seldom considered in risk assessments. We present an analytical framework for examining projections of climate change-induced threats and opportunities with reference to traits that are likely to mediate species' responses, and illustrate the applicability of the framework. Location Sub-Saharan Africa. Methods We applied the framework to 195 sub-Saharan African amphibians with both available bioclimatic envelope model projections for the mid-21st century and trait data. Excluded were 500 narrow-ranging species mainly from montane areas. For each of projected losses, increased fragmentation and gains of climate space, we selected potential response-mediating traits and examined the spatial overlap with vulnerability due to these traits. We examined the overlap for all species, and individually for groups of species with different combinations of threats and opportunities. Results In the Congo Basin and arid Southern Africa, projected losses for wide-ranging amphibians were compounded by sensitivity to climatic variation, and expected gains were precluded by poor dispersal ability. The spatial overlap between exposure and vulnerability was more pronounced for species projected to have their climate space contracting in situ or shifting to distant geographical areas. Our results exclude the potential exposure of narrow-ranging species to shrinking climates in the African tropical mountains. Main conclusions We illustrate the application of a framework combining spatial projections of climate change exposure with traits that are likely to mediate species' responses. Although the proposed framework carries several assumptions that require further scrutiny, its application adds a degree of realism to familiar assessments that consider all species to be equally affected by climate change-induced threats and opportunities. PMID:25505356

  16. Evaluating Threats in Multinational Marine Ecosystems: A Coast Salish First Nations and Tribal Perspective.

    PubMed

    Gaydos, Joseph K; Thixton, Sofie; Donatuto, Jamie

    2015-01-01

    Despite the merit of managing natural resources on the scale of ecosystems, evaluating threats and managing risk in ecosystems that span multiple countries or jurisdictions can be challenging. This requires each government involved to consider actions in concert with actions being taken in other countries by co-managing entities. Multiple proposed fossil fuel-related and port development projects in the Salish Sea, a 16,925 km2 inland sea shared by Washington State (USA), British Columbia (Canada), and Indigenous Coast Salish governments, have the potential to increase marine vessel traffic and negatively impact natural resources. There is no legal mandate or management mechanism requiring a comprehensive review of the potential cumulative impacts of these development activities throughout the Salish Sea and across the international border. This project identifies ongoing and proposed energy-related development projects that will increase marine vessel traffic in the Salish Sea and evaluates the threats each project poses to natural resources important to the Coast Salish. While recognizing that Coast Salish traditions identify all species as important and connected, we used expert elicitation to identify 50 species upon which we could evaluate impact. These species were chosen because Coast Salish depend upon them heavily for harvest revenue or as a staple food source, they were particularly culturally or spiritually significant, or they were historically part of Coast Salish lifeways. We identified six development projects, each of which had three potential impacts (pressures) associated with increased marine vessel traffic: oil spill, vessel noise and vessel strike. Projects varied in their potential for localized impacts (pressures) including shoreline development, harbor oil spill, pipeline spill, coal dust accumulation and nearshore LNG explosion. Based on available published data, impact for each pressure/species interaction was rated as likely, possible or unlikely. Impacts are likely to occur in 23 to 28% of the possible pressure/species scenarios and are possible in another 15 to 28% additional pressure/species interactions. While it is not clear which impacts will be additive, synergistic, or potentially antagonistic, studies that manipulate multiple stressors in marine ecosystems suggest that threats associated with these six projects are likely to have an overall additive or even synergistic interaction and therefore impact species of major cultural importance to the Coast Salish, an important concept that would be lost by merely evaluating each project independently. Failure to address multiple impacts will affect the Coast Salish and the 7 million other people that also depend on this ecosystem. These findings show the value of evaluating multiple threats, and ultimately conducting risk assessments at the scale of ecosystems and highlight the serious need for managers of multinational ecosystems to actively collaborate on evaluating threats, assessing risk, and managing resources.

  17. Geodiversity Hotspots: A Proposed Conceptual and Methodological Framework for Defining Geoconservation Priorities

    NASA Astrophysics Data System (ADS)

    Bétard, François

    2016-04-01

    For two decades, geoconservation has been driven by the need to conserve geodiversity considering its values or most valuable elements (i.e. geoheritage) facing the internal or external threats to it, mainly associated with human activities causing damages or irreversible destruction of sites. One main difficulty arises in how geoconservation priorities can objectively be identified at larger scales (e.g., state or region levels). Inspired by experiences in biological conservation, I propose a new conceptual and methodological framework for the identification of geoconservation priorities by theorizing and applying the concept of "geodiversity hotspot". Drawing an obvious parallel with the "biodiversity hotspot" concept first introduced in 1988 by the British ecologist Norman Myers, geodiversity hotspots are here defined as geographic areas that harbour very high levels of geodiversity while being threatened by human activities. From a methodological viewpoint, a basic analytical procedure is proposed to map geodiversity hotspots at a national or regional scale, that can be used as a tool to support decision-making and land-use planning. The method is based on the numerical processing and mapping of two indices: geodiversity index and degree of potential threat. The geodiversity index is calculated using a GIS environment as the sum of four sub-indexes representing the main components of geodiversity, i.e. geological diversity (rocks, minerals, fossils), geomorphodiversity (topography and landforms), pedodiversity (soils and palaeosoils) and hydrodiversity (rivers, lakes, springs…). The degree of potential threat is a graduated scale inversely proportional to the level of protection, from high degree of potential threat in areas without any protection status to low degree of potential threat in areas with high protection level (e.g., national parks, nature reserves). The mapping and delineation of geodiversity hotspots can automatically be obtained from a combination of the two main criteria, i.e. in areas where high geodiversity indexes meet with high degree of potential threat. This area-based approach is discussed along with the risk of neglecting some areas such as "geodiversity coldspots" which may have other types of conservation value. Selected examples from Northeastern Brazil, with a special focus on the Araripe Basin geodiversity hotspot including the eponymous UNESCO Geopark, concretely showcase the conceptual and methodological framework proposed above. Such an example also illustrates the spatial congruence that often exists between geodiversity hotspots and biodiversity hotspots, in a region where very high levels of geodiversity overlap exceptional concentrations of endemic species and present-day biodiversity (Atlantic Forest and savanna-like Cerrado biomes). These observations reinforce the need to assess geodiversity not only for itself, but also to support biodiversity research and actions programs, and should encourage researchers and practitioners to develop more integrated approaches to nature conservation and sustainable land management.

  18. Evaluating Threats in Multinational Marine Ecosystems: A Coast Salish First Nations and Tribal Perspective

    PubMed Central

    Gaydos, Joseph K.; Thixton, Sofie; Donatuto, Jamie

    2015-01-01

    Despite the merit of managing natural resources on the scale of ecosystems, evaluating threats and managing risk in ecosystems that span multiple countries or jurisdictions can be challenging. This requires each government involved to consider actions in concert with actions being taken in other countries by co-managing entities. Multiple proposed fossil fuel-related and port development projects in the Salish Sea, a 16,925 km2 inland sea shared by Washington State (USA), British Columbia (Canada), and Indigenous Coast Salish governments, have the potential to increase marine vessel traffic and negatively impact natural resources. There is no legal mandate or management mechanism requiring a comprehensive review of the potential cumulative impacts of these development activities throughout the Salish Sea and across the international border. This project identifies ongoing and proposed energy-related development projects that will increase marine vessel traffic in the Salish Sea and evaluates the threats each project poses to natural resources important to the Coast Salish. While recognizing that Coast Salish traditions identify all species as important and connected, we used expert elicitation to identify 50 species upon which we could evaluate impact. These species were chosen because Coast Salish depend upon them heavily for harvest revenue or as a staple food source, they were particularly culturally or spiritually significant, or they were historically part of Coast Salish lifeways. We identified six development projects, each of which had three potential impacts (pressures) associated with increased marine vessel traffic: oil spill, vessel noise and vessel strike. Projects varied in their potential for localized impacts (pressures) including shoreline development, harbor oil spill, pipeline spill, coal dust accumulation and nearshore LNG explosion. Based on available published data, impact for each pressure/species interaction was rated as likely, possible or unlikely. Impacts are likely to occur in 23 to 28% of the possible pressure/species scenarios and are possible in another 15 to 28% additional pressure/species interactions. While it is not clear which impacts will be additive, synergistic, or potentially antagonistic, studies that manipulate multiple stressors in marine ecosystems suggest that threats associated with these six projects are likely to have an overall additive or even synergistic interaction and therefore impact species of major cultural importance to the Coast Salish, an important concept that would be lost by merely evaluating each project independently. Failure to address multiple impacts will affect the Coast Salish and the 7 million other people that also depend on this ecosystem. These findings show the value of evaluating multiple threats, and ultimately conducting risk assessments at the scale of ecosystems and highlight the serious need for managers of multinational ecosystems to actively collaborate on evaluating threats, assessing risk, and managing resources. PMID:26691860

  19. Effect of security threats on primary care access in Logar province, Afghanistan.

    PubMed

    Morikawa, Masahiro J

    2008-01-01

    Security threats are a major concern for access to health care in many war-torn communities; however, there is little quantified data on actual access to care in rural communities during war. Kinderberg International e.V. provided primary care in rural Logar province, Afghanistan, for these three years in eight districts until they were integrated into the new health care structure led by the Ministry of Health in early 2005. We examined the number of patients visiting our clinic before and during the security threats related to the parliamentary election and subsequent national assembly in 2004. The number of patients declined in remote clinics while the number increased in central locations. This finding has an important practical implication: the monitoring of access to care should include remote clinics, otherwise it may potentially underestimate compromised access to health care due to security threats.

  20. Information Avoidance Tendencies, Threat Management Resources, and Interest in Genetic Sequencing Feedback.

    PubMed

    Taber, Jennifer M; Klein, William M P; Ferrer, Rebecca A; Lewis, Katie L; Harris, Peter R; Shepperd, James A; Biesecker, Leslie G

    2015-08-01

    Information avoidance is a defensive strategy that undermines receipt of potentially beneficial but threatening health information and may especially occur when threat management resources are unavailable. We examined whether individual differences in information avoidance predicted intentions to receive genetic sequencing results for preventable and unpreventable (i.e., more threatening) disease and, secondarily, whether threat management resources of self-affirmation or optimism mitigated any effects. Participants (N = 493) in an NIH study (ClinSeq®) piloting the use of genome sequencing reported intentions to receive (optional) sequencing results and completed individual difference measures of information avoidance, self-affirmation, and optimism. Information avoidance tendencies corresponded with lower intentions to learn results, particularly for unpreventable diseases. The association was weaker among individuals higher in self-affirmation or optimism, but only for results regarding preventable diseases. Information avoidance tendencies may influence decisions to receive threatening health information; threat management resources hold promise for mitigating this association.

  1. Pubertal testosterone influences threat-related amygdala-orbitofrontal cortex coupling.

    PubMed

    Spielberg, Jeffrey M; Forbes, Erika E; Ladouceur, Cecile D; Worthman, Carol M; Olino, Thomas M; Ryan, Neal D; Dahl, Ronald E

    2015-03-01

    Growing evidence indicates that normative pubertal maturation is associated with increased threat reactivity, and this developmental shift has been implicated in the increased rates of adolescent affective disorders. However, the neural mechanisms involved in this pubertal increase in threat reactivity remain unknown. Research in adults indicates that testosterone transiently decreases amygdala-orbitofrontal cortex (OFC) coupling. Consequently, we hypothesized that increased pubertal testosterone disrupts amygdala-OFC coupling, which may contribute to developmental increases in threat reactivity in some adolescents. Hypotheses were tested in a longitudinal study by examining the impact of testosterone on functional connectivity. Findings were consistent with hypotheses and advance our understanding of normative pubertal changes in neural systems instantiating affect/motivation. Finally, potential novel insights into the neurodevelopmental pathways that may contribute to adolescent vulnerability to behavioral and emotional problems are discussed. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  2. Stereotype Threat and College Academic Performance: A Latent Variables Approach*

    PubMed Central

    Owens, Jayanti; Massey, Douglas S.

    2013-01-01

    Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using summed indicators and predicted relationships modeled using ordinary least squares. Using the National Longitudinal Survey of Freshman, this study overcomes previous methodological shortcomings by developing a latent construct model of stereotype threat. Theoretical constructs and equations are estimated simultaneously from multiple indicators, yielding a more reliable, valid, and parsimonious test of key propositions. Findings additionally support the view that social stigma can indeed have strong negative effects on the academic performance of pejoratively stereotyped racial-minority group members, not only in laboratory settings, but also in the real world. PMID:23950616

  3. Assessing Detecting and Deterring the Threat of Maritime Nuclear and Radiological Smuggling in the Western Indian Ocean Region

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khan, M. Umer

    This paper proposes that current maritime smuggling routes in the western Indian Ocean region are similar to those in the past and that the motivations of terrorist groups and the presence of radioactive sources in the Indian Ocean littoral and other states present a significant security threat. The majority of regional terrorist groups have a hybrid structure, piggybacking on criminal activity to fund their terror activities. Additionally, states have used maritime routes in the Indian Ocean region to transport nuclear materials and missiles. Thus, the maritime dimension of such threats remains, and may be increasing. This paper focuses on issues,more » motivations, pathways, and methods to detect and interdict nuclear and radiological trafficking. It analyzes the potential use of maritime technology applications for radiation detection and presents recommendations for states and multinational nonproliferation advocacy organizations to address the threat in the Indian Ocean region.« less

  4. Not robots: children's perspectives on authenticity, moral agency and stimulant drug treatments

    PubMed Central

    Singh, Ilina

    2013-01-01

    In this article, I examine children's reported experiences with stimulant drug treatments for attention deficit hyperactivity disorder in light of bioethical arguments about the potential threats of psychotropic drugs to authenticity and moral agency. Drawing on a study that involved over 150 families in the USA and the UK, I show that children are able to report threats to authenticity, but that the majority of children are not concerned with such threats. On balance, children report that stimulants improve their capacity for moral agency, and they associate this capacity with an ability to meet normative expectations. I argue that although under certain conditions stimulant drug treatment may increase the risk of a threat to authenticity, there are ways to minimise this risk and to maximise the benefits of stimulant drug treatment. Medical professionals in particular should help children to flourish with stimulant drug treatments, in good and in bad conditions. PMID:22930677

  5. After Globalization Future Security in a Technology Rich World

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency,more » and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and important variations of both the reviewers and the participants.« less

  6. Nothing is safe: Intolerance of uncertainty is associated with compromised fear extinction learning.

    PubMed

    Morriss, Jayne; Christakou, Anastasia; van Reekum, Carien M

    2016-12-01

    Extinction-resistant fear is considered to be a central feature of pathological anxiety. Here we sought to determine if individual differences in Intolerance of Uncertainty (IU), a potential risk factor for anxiety disorders, underlies compromised fear extinction. We tested this hypothesis by recording electrodermal activity in 38 healthy participants during fear acquisition and extinction. We assessed the temporality of fear extinction, by examining early and late extinction learning. During early extinction, low IU was associated with larger skin conductance responses to learned threat vs. safety cues, whereas high IU was associated with skin conductance responding to both threat and safety cues, but no cue discrimination. During late extinction, low IU showed no difference in skin conductance between learned threat and safety cues, whilst high IU predicted continued fear expression to learned threat, indexed by larger skin conductance to threat vs. safety cues. These findings suggest a critical role of uncertainty-based mechanisms in the maintenance of learned fear. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights reserved.

  7. A trauma-like model of political extremism: psycho-political fault lines in Israel.

    PubMed

    Laor, Nathaniel; Yanay-Shani, Alma; Wolmer, Leo; Khoury, Oula

    2010-10-01

    This study examines a trauma-like model of potentially violent political extremism among Jewish Israelis. We study the psychosocial characteristics of political extremists that may lie at the root of sociopolitical instability and assess personal (gender, stressful life events, Holocaust family background, and political activism) and psychological parameters (self- and political transcendence, perceived political threats, in/out-group identification ratio) that may predict readiness to engage in destructive political behavior. We examine the ideological zeal of various political groups, the relationship between the latter and perceived political threats, and the predictors of extreme political activism. Results showed that the extreme political poles displayed high level of ideological and morbid transcendence. Right extremists displayed higher perceived threats to physical existence and national identity. Left extremists scored highest on perceived moral integrity threat. Higher perceived threats to national identity and moral integrity, risk, and self-transcendence statistically explain morbid transcendence. When fear conjures up extremely skewed sociopolitical identifications across political boundaries, morbid transcendence may manifest itself in destructive political activity. © 2010 Association for Research in Nervous and Mental Disease.

  8. Development and assessment of a landscape-scale ecological threat index for the Lower Colorado River Basin

    USGS Publications Warehouse

    Paukert, Craig P.; Pitts, K.L.; Whittier, Joanna B.; Olden, Julian D.

    2011-01-01

    Anthropogenic disturbances impact freshwater biota but are rarely incorporated into conservation planning due to the difficulties in quantifying threats. There is currently no widely accepted method to quantify disturbances, and determining how to measure threats to upstream catchments using disturbance metrics can be time consuming and subjective. We compared four watershed-scale ecological threat indices for the Lower Colorado River Basin (LCRB) using landscape-level threats of land use (e.g., agricultural and urban lands), waterway development and diversions (e.g., number of canals, dams), and human development (e.g., road and railroads density, pollution sites). The LCRB is an ideal region to assess ecological threat indices because of the increasing need for conservation to ensure the persistence of native fishes in highly altered habitat. Each threat was measured for severity (i.e., level of influence on the upstream watershed) and frequency throughout each watershed; both severity and frequency were measured using two different methods. Severity values were based either on peer-reviewed literature and weighted in accordance to their published ecological impact, or assumed equal severity across stressors. Threat frequency was calculated according to either the presence/absence of each stressor, or on the relative density of each stressor in the watershed. Each measure of severity was combined with a measure of frequency, creating four ecological threat indices, and transformed to a 0–100 scale. Threat indices were highly correlated (slopes of 0.94–1.63; R2 of 0.82–0.98), and were highest for watersheds close to urban centers, including Phoenix, Tucson, and Flagstaff, Arizona, and Las Vegas, Nevada. Road crossings and density appeared to be the most influential stressors in the index, but the removal of any individual stressor only changed the index by <5.1 units. Our results indicate that a simpler index with less subjectivity (i.e., presence/absence of a stressor in a watershed) provides similar results to the more subjective measure of threats (i.e., peer-reviewed threat severity). Because these threats have been linked to ecological health, the development of the index should be a useful tool to identify regions of greatest potential threat to aquatic biota and can aid in conservation planning for the Lower Colorado River Basin.

  9. Software Reuse Within the Earth Science Community

    NASA Technical Reports Server (NTRS)

    Marshall, James J.; Olding, Steve; Wolfe, Robert E.; Delnore, Victor E.

    2006-01-01

    Scientific missions in the Earth sciences frequently require cost-effective, highly reliable, and easy-to-use software, which can be a challenge for software developers to provide. The NASA Earth Science Enterprise (ESE) spends a significant amount of resources developing software components and other software development artifacts that may also be of value if reused in other projects requiring similar functionality. In general, software reuse is often defined as utilizing existing software artifacts. Software reuse can improve productivity and quality while decreasing the cost of software development, as documented by case studies in the literature. Since large software systems are often the results of the integration of many smaller and sometimes reusable components, ensuring reusability of such software components becomes a necessity. Indeed, designing software components with reusability as a requirement can increase the software reuse potential within a community such as the NASA ESE community. The NASA Earth Science Data Systems (ESDS) Software Reuse Working Group is chartered to oversee the development of a process that will maximize the reuse potential of existing software components while recommending strategies for maximizing the reusability potential of yet-to-be-designed components. As part of this work, two surveys of the Earth science community were conducted. The first was performed in 2004 and distributed among government employees and contractors. A follow-up survey was performed in 2005 and distributed among a wider community, to include members of industry and academia. The surveys were designed to collect information on subjects such as the current software reuse practices of Earth science software developers, why they choose to reuse software, and what perceived barriers prevent them from reusing software. In this paper, we compare the results of these surveys, summarize the observed trends, and discuss the findings. The results are very similar, with the second, larger survey confirming the basic results of the first, smaller survey. The results suggest that reuse of ESE software can drive down the cost and time of system development, increase flexibility and responsiveness of these systems to new technologies and requirements, and increase effective and accountable community participation.

  10. The new threat of digital marketing.

    PubMed

    Montgomery, Kathryn C; Chester, Jeff; Grier, Sonya A; Dorfman, Lori

    2012-06-01

    Because of their avid use of new media and their increased spending power, children and teens have become primary targets of a new "media and marketing ecosystem." The digital marketplace is undergoing rapid innovation as new technologies and software applications continue to reshape the media landscape and user behaviors. The advertising industry, in many instances led by food and beverage marketers, is purposefully exploiting the special relationship that youth have with new media, as online marketing campaigns create unprecedented intimacies between adolescents and the brands and products that now literally surround them. Copyright © 2012 Elsevier Inc. All rights reserved.

  11. Orbital Debris Research in the United States

    NASA Technical Reports Server (NTRS)

    Stansbery, Gene

    2009-01-01

    The presentation includes information about growth of the satellite population, the U.S. Space Surveillance Network, tracking and catalog maintenance, Haystack and HAX radar observation, Goldstone radar, the Michigan Orbital Debris Survey Telescope (MODEST), spacecraft surface examinations and sample of space shuttle impacts. GEO/LEO observations from Kwajalein Atoll, NASA s Orbital Debris Engineering Model (ORDEM2008), a LEO-to-GEO Environment Debris Model (LEGEND), Debris Assessment Software (DAS) 2.0, the NASA/JSC BUMPER-II meteoroid/debris threat assessment code, satellite reentry risk assessment, optical size and shape determination, work on more complicated fragments, and spectral studies.

  12. A mobile app for military operational entomology pesticide applications.

    PubMed

    Britch, Seth C; Linthicum, Kenneth J; Aldridge, Robert L; Yans, Matthew W; Hill, David W; Obenauer, Peter J; Hoffman, Eric R

    2014-09-01

    Multiple field studies conducted for the Deployed War-Fighter Protection (DWFP) research program have generated more than 80 specific guidance points for innovative combinations of pesticide application equipment, pesticide formulations, and application techniques for aerosol and residual pesticide treatments in 6 ecological regions against a range of mosquito, sand fly, and filth fly nuisance and disease-vector threats. To synthesize and operationalize these DWFP field and laboratory efficacy data we developed an interactive iOS and Android mobile software application, the Pesticide App, consisting of specific pesticide application guidance organized by environment and target insect vector species.

  13. Potentials for Spatial Geometry Curriculum Development with Three-Dimensional Dynamic Geometry Software in Lower Secondary Mathematics

    ERIC Educational Resources Information Center

    Miyazaki, Mikio; Kimiho, Chino; Katoh, Ryuhei; Arai, Hitoshi; Ogihara, Fumihiro; Oguchi, Yuichi; Morozumi, Tatsuo; Kon, Mayuko; Komatsu, Kotaro

    2012-01-01

    Three-dimensional dynamic geometry software has the power to enhance students' learning of spatial geometry. The purpose of this research is to clarify what potential using three-dimensional dynamic geometry software can offer us in terms of how to develop the spatial geometry curriculum in lower secondary schools. By focusing on the impacts the…

  14. Prey use by dingoes in a contested landscape: Ecosystem service provider or biodiversity threat?

    PubMed

    Morrant, Damian S; Wurster, Christopher M; Johnson, Christopher N; Butler, James R A; Congdon, Bradley C

    2017-11-01

    In Australia, dingoes ( Canis lupus dingo ) have been implicated in the decline and extinction of a number of vertebrate species. The lowland Wet Tropics of Queensland, Australia is a biologically rich area with many species of rainforest-restricted vertebrates that could be threatened by dingoes; however, the ecological impacts of dingoes in this region are poorly understood. We determined the potential threat posed by dingoes to native vertebrates in the lowland Wet Tropics using dingo scat/stomach content and stable isotope analyses of hair from dingoes and potential prey species. Common mammals dominated dingo diets. We found no evidence of predation on threatened taxa or rainforest specialists within our study areas. The most significant prey species were northern brown bandicoots ( Isoodon macrourus ), canefield rats ( Rattus sordidus ), and agile wallabies ( Macropus agilis ). All are common species associated with relatively open grass/woodland habitats. Stable isotope analysis suggested that prey species sourced their nutrients primarily from open habitats and that prey choice, as identified by scat/stomach analysis alone, was a poor indicator of primary foraging habitats. In general, we find that prey use by dingoes in the lowland Wet Tropics does not pose a major threat to native and/or threatened fauna, including rainforest specialists. In fact, our results suggest that dingo predation on "pest" species may represent an important ecological service that outweighs potential biodiversity threats. A more targeted approach to managing wild canids is needed if the ecosystem services they provide in these contested landscapes are to be maintained, while simultaneously avoiding negative conservation or economic impacts.

  15. Impact: an Integrated Approach (Space and Ground) for Monitoring the Threat of Earth Orbit Corssing Celestial Bodies

    NASA Astrophysics Data System (ADS)

    Bussolino, L.; Somma, R.

    The threat of possible collision of asteroids and comets with our planet has reached an international stage since 1990 when U.S.A. Congress set up a dedicated committee for the analysis and the assessment of this problem.The U.N. organized a congress later on to summarize the current knowledge on this subject as well as the Europea Council recommended its member states to conduct studies to further deepen the understanding in terms of tackling and solving this kind of problem interesting the entire world. IMPACT is the acronym for " International Monitoring Program for Asteroids and Comets Threats " coming out as proposal from a study funded by the italian region PIEMONTE throughout the Civil Protection Bureau and performed by the Planetology Group of the Astronomical Observatory of Torino ( Italy ) and Alenia Spazio for the engineering part. They have carried out a series of analyses aimed at contributing in subsequent steps to the solution of the two fundamental problems associated to the potential impact threat : the assessment of the numbers of killers/terminators and the impact rates from one side and the development of the idea of considering space segments for supporting activities of discovery as well as the physical and mineralogical characterization using satellites in orbit around the Earth. other additional studies also funded by the European Space Agency where the space technology appears to offer a great contribution if conveniently integrated with the Earth networks for Potentially Hazardous Asteroids ( PHA ) detection. An international approach for monitoring this threat for the Earth is then proposed.

  16. Brain drain? An examination of stereotype threat effects during training on knowledge acquisition and organizational effectiveness.

    PubMed

    Grand, James A

    2017-02-01

    Stereotype threat describes a situation in which individuals are faced with the risk of upholding a negative stereotype about their subgroup based on their actions. Empirical work in this area has primarily examined the impact of negative stereotypes on performance for threatened individuals. However, this body of research seldom acknowledges that performance is a function of learning-which may also be impaired by pervasive group stereotypes. This study presents evidence from a 3-day self-guided training program demonstrating that stereotype threat impairs acquisition of cognitive learning outcomes for females facing a negative group stereotype. Using hierarchical Bayesian modeling, results revealed that stereotyped females demonstrated poorer declarative knowledge acquisition, spent less time reflecting on learning activities, and developed less efficiently organized knowledge structures compared with females in a control condition. Findings from a Bayesian mediation model also suggested that despite stereotyped individuals "working harder" to perform well, their underachievement was largely attributable to failures in learning to "work smarter." Building upon these empirical results, a computational model and computer simulation is also presented to demonstrate the practical significance of stereotype-induced impairments to learning on the development of an organization's human capital resources and capabilities. The simulation results show that even the presence of small effects of stereotype threat during learning/training have the potential to exert a significant negative impact on an organization's performance potential. Implications for future research and practice examining stereotype threat during learning are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  17. Layoffs and tradeoffs: production, quality, and safety demands under the threat of job loss.

    PubMed

    Probst, Tahira M

    2002-07-01

    Employees often face a conflict between production targets, quality assurance, and adherence to safety policies. In a time when layoffs are on the rise, it is important to understand the effects of employee job insecurity on these potentially competing demands. A laboratory experiment manipulated the threat of layoffs in a simulated organization and assessed its effect on employee productivity, product quality, and adherence to safety policies. Results suggest that student participants faced with the threat of layoffs were more productive, yet violated more safety rules and produced lower quality outputs, than participants in the control condition. Implications for organizations contemplating layoffs and directions for future research are discussed.

  18. Existential Threat or Dissociative Response? Examining Defensive Avoidance of Point-of-Care Testing Devices Through a Terror Management Theory Framework.

    PubMed

    Dunne, Simon; Gallagher, Pamela; Matthews, Anne

    2015-01-01

    Using a terror management theory framework, this study investigated if providing mortality reminders or self-esteem threats would lead participants to exhibit avoidant responses toward a point-of-care testing device for cardiovascular disease risk and if the nature of the device served to diminish the existential threat of cardiovascular disease. One hundred and twelve participants aged 40-55 years completed an experimental questionnaire. Findings indicated that participants were not existentially threatened by established terror management methodologies, potentially because of cross-cultural variability toward such methodologies. Highly positive appraisals of the device also suggest that similar technologies may beneficially affect the uptake of screening behaviors.

  19. Stress appraisals and cellular aging: A key role for anticipatory threat in the relationship between psychological stress and telomere length

    PubMed Central

    O’Donovan, Aoife; Tomiyama, A. Janet; Lin, Jue; Puterman, Eli; Adler, Nancy E.; Kemeny, Margaret; Wolkowitz, Owen M.; Blackburn, Elizabeth H.; Epel, Elissa S.

    2012-01-01

    Chronic psychological stressis a risk factor formultiple diseases of aging. Accelerated cellular aging as indexed by short telomere length has emerged as a potential common biological mechanism linking various forms of psychological stress and diseases of aging. Stress appraisals determine the degree and type of biological stress responses and altered stress appraisals may be a common psychological mechanism linking psychological stress and diseases of aging. However, no previous studies have examined the relationship between stress appraisals and telomere length. We exposed chronically stressed female caregivers and non-caregiving controls (N= 50; M age = 62.14±6.10) to a standardized acute laboratory stressor and measured their anticipatory and retrospective threat and challenge appraisals of the stressor. We hypothesized that threat and challenge appraisals would be associated with shorter and longer telomere length respectively, and that chronic care giving stress would influence telomere length through altered stress appraisals. Higher anticipatory threat appraisals were associated with shorter age-adjusted telomere length (β = −.32, p = .03), but challenge appraisals and retrospective threat appraisals showed no independent association with telomere length. Caregivers reported significantly higher anticipatory (β = −.36, p = .006)and retrospective (β = −.29, p = .03) threat appraisals than controls, but similar challenge appraisals. Although there was no significant main effect of caregiver status on telomere length, care giving had a significant indirect effect on telomere length through anticipatory threat appraisals. Exaggerated anticipatory threat appraisals may be a common and modifiable psychological mechanism of psychological stress effects on cellular aging. PMID:22293459

  20. Threat Perception and Attitudes of Adolescents Towards Re-Introduced Wild Animals: A qualitative study of young learners from affected regions in Germany

    NASA Astrophysics Data System (ADS)

    Hermann, Nadin; Menzel, Susanne

    2013-12-01

    Conservation efforts such as the restoration of European bison or the support of wolf immigration into Germany are often socio-scientifically controversial. In many cases, disputes are based on individuals' threat perception and attitudes towards the animal involved. The herewith reported study provides qualitative insights into German adolescents' (n = 31, Mage = 16.6 years) attitudes towards animal reintroduction, their threat and coping appraisal about wildlife and their knowledge of local endangered species. We found that students had rather limited knowledge of local endangered species. After Kellert's categories of animal attitudes, the adolescents showed a strong moralistic view on wildlife return. Naturalistic, ecologistic and utilitarian views were also strongly apparent. According to the Protection Motivation Theory, perceived threats could be identified as threats to animals on the one hand and threats to human interests on the other. Such threat perceptions often lead to a dilemma, which made it difficult to decide upon the priorities of wildlife protection versus protection of human interests. Coping mechanism to reduce threats to human interests as mentioned by the participants included restrictions of the animal as well as strategies that focused on responsibility by humans. Regarding coping mechanism to prevent the species' extinction, participants showed a relatively superficial understanding. Furthermore, we found that participants from regions where wolves are currently immigrating or European bison are being reintroduced showed a more positive understanding of the respective animal. Our findings are discussed in the light of this topic's potential as an example of a real-life socio-scientific issue in classroom discussions.

  1. Aligning HIV/AIDS communication with the oral tradition of Africans: a theory-based content analysis of songs' potential in prevention efforts.

    PubMed

    Bekalu, Mesfin Awoke; Eggermont, Steven

    2015-01-01

    Despite a growing recognition of songs as a useful HIV/AIDS campaign strategy, little research has investigated their potential and/or actual impact. In this study, through a theory-based content analysis, we have assessed the prevention domains covered and the health-relevant constructs promoted by 23 AIDS songs widely used to aid prevention efforts in Ethiopia. To identify the health-relevant constructs and reveal their potential to facilitate or inhibit positive changes, the Extended Parallel Process Model (EPPM) has been used. The findings revealed that the songs cover most of the prevention domains that constitute the current agenda of behavior change communication in Sub-Saharan Africa. However, although all the EPPM variables have been found in almost every song, there were significantly more efficacy messages than threat messages. This suggests that although the songs may lead to positive changes in HIV/AIDS-related outcomes among audiences who have already perceived the threat posed by HIV/AIDS, they are less likely to motivate and thereby generate responses from audiences who have less or no threat perceptions. It is argued that given their potential as a culturally appropriate strategy in Sub-Saharan Africa where oral channels of communication play significant roles, songs could be harnessed for better outcomes through a theory-based design.

  2. A Principal Component Analysis/Fuzzy Comprehensive Evaluation for Rockburst Potential in Kimberlite

    NASA Astrophysics Data System (ADS)

    Pu, Yuanyuan; Apel, Derek; Xu, Huawei

    2018-02-01

    Kimberlite is an igneous rock which sometimes bears diamonds. Most of the diamonds mined in the world today are found in kimberlite ores. Burst potential in kimberlite has not been investigated, because kimberlite is mostly mined using open-pit mining, which poses very little threat of rock bursting. However, as the mining depth keeps increasing, the mines convert to underground mining methods, which can pose a threat of rock bursting in kimberlite. This paper focuses on the burst potential of kimberlite at a diamond mine in northern Canada. A combined model with the methods of principal component analysis (PCA) and fuzzy comprehensive evaluation (FCE) is developed to process data from 12 different locations in kimberlite pipes. Based on calculated 12 fuzzy evaluation vectors, 8 locations show a moderate burst potential, 2 locations show no burst potential, and 2 locations show strong and violent burst potential, respectively. Using statistical principles, a Mahalanobis distance is adopted to build a comprehensive fuzzy evaluation vector for the whole mine and the final evaluation for burst potential is moderate, which is verified by a practical rockbursting situation at mine site.

  3. Gene × environment interaction on intergroup bias: the role of 5-HTTLPR and perceived outgroup threat

    PubMed Central

    Livingston, Robert W.; Hong, Ying-Yi; Chiao, Joan Y.

    2014-01-01

    Perceived threat from outgroups is a consistent social-environmental antecedent of intergroup bias (i.e. prejudice, ingroup favoritism). The serotonin transporter gene polymorphism (5-HTTLPR) has been associated with individual variations in sensitivity to context, particularly stressful and threatening situations. Here, we examined how 5-HTTLPR and environmental factors signaling potential outgroup threat dynamically interact to shape intergroup bias. Across two studies, we provide novel evidence for a gene–environment interaction on the acquisition of intergroup bias and prejudice. Greater exposure to signals of outgroup threat, such as negative prior contact with outgroups and perceived danger from the social environment, were more predictive of intergroup bias among participants possessing at least one short allele (vs two long alleles) of 5-HTTLPR. Furthermore, this gene x environment interaction was observed for biases directed at diverse ethnic and arbitrarily-defined outgroups across measures reflecting intergroup biases in evaluation and discriminatory behavior. These findings reveal a candidate genetic mechanism for the acquisition of intergroup bias, and suggest that intergroup bias is dually inherited and transmitted through the interplay of social (i.e. contextual cues of outgroup threat) and biological mechanisms (i.e. genetic sensitivity toward threatening contexts) that regulate perceived intergroup threats. PMID:23887814

  4. If it bleeds, it leads: separating threat from mere negativity.

    PubMed

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  5. "The impact of uncertain threat on affective bias: Individual differences in response to ambiguity": Correction.

    PubMed

    2018-04-01

    Reports an error in "The impact of uncertain threat on affective bias: Individual differences in response to ambiguity" by Maital Neta, Julie Cantelon, Zachary Haga, Caroline R. Mahoney, Holly A. Taylor and F. Caroline Davis ( Emotion , 2017[Dec], Vol 17[8], 1137-1143). In this article, the copyright attribution was incorrectly listed under the Creative Commons CC-BY license due to production-related error. The correct copyright should be "In the public domain." The online version of this article has been corrected. (The following abstract of the original article appeared in record 2017-40275-001.) Individuals who operate under highly stressful conditions (e.g., military personnel and first responders) are often faced with the challenge of quickly interpreting ambiguous information in uncertain and threatening environments. When faced with ambiguity, it is likely adaptive to view potentially dangerous stimuli as threatening until contextual information proves otherwise. One laboratory-based paradigm that can be used to simulate uncertain threat is known as threat of shock (TOS), in which participants are told that they might receive mild but unpredictable electric shocks while performing an unrelated task. The uncertainty associated with this potential threat induces a state of emotional arousal that is not overwhelmingly stressful, but has widespread-both adaptive and maladaptive-effects on cognitive and affective function. For example, TOS is thought to enhance aversive processing and abolish positivity bias. Importantly, in certain situations (e.g., when walking home alone at night), this anxiety can promote an adaptive state of heightened vigilance and defense mobilization. In the present study, we used TOS to examine the effects of uncertain threat on valence bias, or the tendency to interpret ambiguous social cues as positive or negative. As predicted, we found that heightened emotional arousal elicited by TOS was associated with an increased tendency to interpret ambiguous cues negatively. Such negative interpretations are likely adaptive in situations in which threat detection is critical for survival and should override an individual's tendency to interpret ambiguity positively in safe contexts. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  6. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glenn, Colleen; Sterbentz, Dane; Wright, Aaron

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best practices for prevention and response to cyber threats, and utility suggestions about how the federal government can aid utilities in combating and mitigating risks.« less

  7. Sustaining Software-Intensive Systems

    DTIC Science & Technology

    2006-05-01

    2.2 Multi- Service Operational Test and Evaluation .......................................4 2.3 Stable Software Baseline...or equivalent document • completed Multi- Service Operational Test and Evaluation (MOT&E) for the potential production software package (or OT&E if...not multi- service ) • stable software production baseline • complete and current software documentation • Authority to Operate (ATO) for an

  8. Maintaining the Health of Software Monitors

    NASA Technical Reports Server (NTRS)

    Person, Suzette; Rungta, Neha

    2013-01-01

    Software health management (SWHM) techniques complement the rigorous verification and validation processes that are applied to safety-critical systems prior to their deployment. These techniques are used to monitor deployed software in its execution environment, serving as the last line of defense against the effects of a critical fault. SWHM monitors use information from the specification and implementation of the monitored software to detect violations, predict possible failures, and help the system recover from faults. Changes to the monitored software, such as adding new functionality or fixing defects, therefore, have the potential to impact the correctness of both the monitored software and the SWHM monitor. In this work, we describe how the results of a software change impact analysis technique, Directed Incremental Symbolic Execution (DiSE), can be applied to monitored software to identify the potential impact of the changes on the SWHM monitor software. The results of DiSE can then be used by other analysis techniques, e.g., testing, debugging, to help preserve and improve the integrity of the SWHM monitor as the monitored software evolves.

  9. D-Optimal mixture experimental design for stealth biodegradable crosslinked docetaxel-loaded poly-ε-caprolactone nanoparticles manufactured by dispersion polymerization.

    PubMed

    Ogunwuyi, O; Adesina, S; Akala, E O

    2015-03-01

    We report here our efforts on the development of stealth biodegradable crosslinked poly-ε-caprolactone nanoparticles by free radical dispersion polymerization suitable for the delivery of bioactive agents. The uniqueness of the dispersion polymerization technique is that it is surfactant free, thereby obviating the problems known to be associated with the use of surfactants in the fabrication of nanoparticles for biomedical applications. Aided by a statistical software for experimental design and analysis, we used D-optimal mixture statistical experimental design to generate thirty batches of nanoparticles prepared by varying the proportion of the components (poly-ε-caprolactone macromonomer, crosslinker, initiators and stabilizer) in acetone/water system. Morphology of the nanoparticles was examined using scanning electron microscopy (SEM). Particle size and zeta potential were measured by dynamic light scattering (DLS). Scheffe polynomial models were generated to predict particle size (nm) and particle surface zeta potential (mV) as functions of the proportion of the components. Solutions were returned from simultaneous optimization of the response variables for component combinations to (a) minimize nanoparticle size (small nanoparticles are internalized into disease organs easily, avoid reticuloendothelial clearance and lung filtration) and (b) maximization of the negative zeta potential values, as it is known that, following injection into the blood stream, nanoparticles with a positive zeta potential pose a threat of causing transient embolism and rapid clearance compared to negatively charged particles. In vitro availability isotherms show that the nanoparticles sustained the release of docetaxel for 72 to 120 hours depending on the formulation. The data show that nanotechnology platforms for controlled delivery of bioactive agents can be developed based on the nanoparticles.

  10. The reporting of theoretical health risks by the media: Canadian newspaper reporting of potential blood transmission of Creutzfeldt-Jakob disease

    PubMed Central

    Wilson, Kumanan; Code, Catherine; Dornan, Christopher; Ahmad, Nadya; Hébert, Paul; Graham, Ian

    2004-01-01

    Background The media play an important role at the interface of science and policy by communicating scientific information to the public and policy makers. In issues of theoretical risk, in which there is scientific uncertainty, the media's role as disseminators of information is particularly important due to the potential to influence public perception of the severity of the risk. In this article we describe how the Canadian print media reported the theoretical risk of blood transmission of Creutzfeldt-Jakob disease (CJD). Methods We searched 3 newspaper databases for articles published by 6 major Canadian daily newspapers between January 1990 and December 1999. We identified all articles relating to blood transmission of CJD. In duplicate we extracted information from the articles and entered the information into a qualitative software program. We compared the observations obtained from this content analysis with information obtained from a previous policy analysis examining the Canadian blood system's decision-making concerning the potential transfusion transmission of CJD. Results Our search identified 245 relevant articles. We observed that newspapers in one instance accelerated a policy decision, which had important resource and health implication, by communicating information on risk to the public. We also observed that newspapers primarily relied upon expert opinion (47 articles) as opposed to published medical evidence (28 articles) when communicating risk information. Journalists we interviewed described the challenges of balancing their responsibility to raise awareness of potential health threats with not unnecessarily arousing fear amongst the public. Conclusions Based on our findings we recommend that journalists report information from both expert opinion sources and from published studies when communicating information on risk. We also recommend researchers work more closely with journalists to assist them in identifying and appraising relevant scientific information on risk. PMID:14706119

  11. An Environmental Sentinel Biomonitor System for Drinking Water Protection

    DTIC Science & Technology

    2008-12-01

    threat chemicals. Potential interferences include chemicals commonly used for drinking water disinfection (chlorine and chloramine ), byproducts of...range. Of the potential interferences tested, the ECIS test was affected only by the disinfectants chlorine and chloramine ; chlorine is typically...Industrial and Potential Interfering Chemicals Used to Evaluate ESB System Toxicity Sensors TICs Potential Interferences Acrylonitrile Chloramine

  12. The ontogeny of expression of communicative genes in coyote-beagle hybrids.

    PubMed

    Moon-Fanelli, Alice

    2011-11-01

    Although there are minimal genetic differences between the coyote (Canis latrans), the gray wolf (Canis lupus), and the domestic dog (Canis familiaris), these three species are extremely different in numerous aspects of their physiology, morphology, and behavior. In particular, the threat display of coyotes differs markedly from dogs and wolves. Coyotes display a wide open mouth gape-threat with attendant arched back defensive posture, and hiss vocalization. In our experience, this threat display is absent from the repertoire of the domestic dog and the gray wolf. We hypothesized that the foundation of these differences in species-typical threat displays is genetic. The threat displays of coyote-beagle crosses (F1's, F2's, F3's, F1F2's and beagle backcrosses), included the following phenotypes: that of each parental species, that of the domestic dog during pre-pubertal development switching spontaneously to the coyote gape-threat following sexual maturation; and a comparable phenotype requiring exposure to post-pubertal social stress-priming to bring the encoded genetic potential for the gape-threat to expression. The changeover from the dog snarl-threat to the coyote gape-threat was accompanied by a precipitous rise in endogenous cortisol levels over baseline. We hypothesized that where alternative genetic systems are physically available, their selective expression in development may depend on environmental events, such as social stress, to affect internal mechanisms that ultimately control the phenotype. Exogenously elevated cortisol levels, in the absence of the subjective experience of social stress, were associated with the onset of the expression of the coyote threat pattern in an F1 hybrid possessing a full haploid complement of coyote genes and his backcross offspring resulting from a breeding to his F2 daughter. With oral doses of hydrocortisone, the cortisol levels were substantially elevated over basal levels. With endogenous cortisol priming, an increase up to five-fold over those levels obtained with social stress was associated with the expression of the coyote phenotype.

  13. Neural Bases of Social Anxiety Disorder: Emotional Reactivity and Cognitive Regulation During Social and Physical Threat

    PubMed Central

    Goldin, Philippe R.; Manber, Tali; Hakimi, Shabnam; Canli, Turhan; Gross, James J.

    2014-01-01

    Context Social anxiety disorder is thought to involve emotional hyper-reactivity, cognitive distortions, and ineffective emotion regulation. While the neural bases of emotional reactivity to social stimuli have been described, the neural bases of emotional reactivity and cognitive regulation during social and physical threat, and their relationship to social anxiety symptom severity, have yet to be investigated. Objective This study investigated behavioral and neural correlates of emotional reactivity and cognitive regulation in patients and controls during processing of social and physical threat stimuli. Design Participants were trained to implement cognitive-linguistic regulation of emotional reactivity induced by social (harsh facial expressions) and physical (violent scenes) threat while undergoing functional magnetic resonance imaging and providing behavioral ratings of negative emotion experience. Setting Academic psychology department. Participants 15 adults with social anxiety disorder and 17 demographically-matched healthy controls. Main Outcome Measures Blood oxygen level dependent signal and negative emotion ratings. Results Behaviorally, patients reported greater negative emotion than controls during social and physical threat, but showed equivalent reduction in negative emotion following cognitive regulation. Neurally, viewing social threat resulted in greater emotion-related neural responses in patients than controls, with social anxiety symptom severity related to activity in a network of emotion and attention processing regions in patients only. Viewing physical threat produced no between-group differences. Regulation during social threat resulted in greater cognitive and attention regulation-related brain activation in controls compared to patients. Regulation during physical threat produced greater cognitive control-related response (i.e., right DLPFC) in patients compared to controls. Conclusions Compared to controls, patients demonstrated exaggerated negative emotion reactivity and reduced cognitive regulation related neural activation, specifically for social threat stimuli. These findings help to elucidate potential neural mechanisms of emotion regulation that might serve as biomarkers for interventions for social anxiety disorder. PMID:19188539

  14. Assessment of groundwater exploitation in an aquifer using the random walk on grid method: a case study at Ordos, China

    NASA Astrophysics Data System (ADS)

    Nan, Tongchao; Li, Kaixuan; Wu, Jichun; Yin, Lihe

    2018-04-01

    Sustainability has been one of the key criteria of effective water exploitation. Groundwater exploitation and water-table decline at Haolebaoji water source site in the Ordos basin in NW China has drawn public attention due to concerns about potential threats to ecosystems and grazing land in the area. To better investigate the impact of production wells at Haolebaoji on the water table, an adapted algorithm called the random walk on grid method (WOG) is applied to simulate the hydraulic head in the unconfined and confined aquifers. This is the first attempt to apply WOG to a real groundwater problem. The method can not only evaluate the head values but also the contributions made by each source/sink term. One is allowed to analyze the impact of source/sink terms just as if one had an analytical solution. The head values evaluated by WOG match the values derived from the software Groundwater Modeling System (GMS). It suggests that WOG is effective and applicable in a heterogeneous aquifer with respect to practical problems, and the resultant information is useful for groundwater management.

  15. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy

    NASA Astrophysics Data System (ADS)

    Pleban, Johann-Sebastian; Band, Ricardo; Creutzburg, Reiner

    2014-02-01

    In this article we describe the security problems of the Parrot AR.Drone 2.0 quadcopter. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which makes it a target for harmful attacks. In addition, the videostream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we will perform a security threat analysis on this particular drone. We will set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We will show how the drone can be hacked in order to hijack the AR.Drone 2.0. Our aim is to sensitize the end-user of AR.Drones by describing the security vulnerabilities and to show how the AR.Drone 2.0 could be secured from unauthorized access. We will provide instructions to secure the drones Wi-Fi connection and its operation with the official Smartphone App and third party PC software.

  16. Modelling a man-portable air-defence (MANPAD) system with a rosette scan two-colour infrared (IR) and ultraviolet (UV) seeker

    NASA Astrophysics Data System (ADS)

    Kumar, Devinder; Smith, Leon; Richardson, Mark A.; Ayling, Richard; Barlow, Nick

    2014-10-01

    The Ultraviolet (UV) band of the electromagnetic (EM) spectrum has the potential to be used as the host medium for the operation of guided weapons. Unlike in the Infrared (IR), a target propelled by an air breathing jet engine produces no detectable radiation in the UV band, and is opaque to the background UV produced by the Sun. Successful engineering of spectral airborne IR countermeasures (CM) against existing two colour IR seekers has encouraged missile counter-countermeasure (CCM) designers to utilise the silhouette signature of an aircraft in the UV as a means of distinguishing between a true target and a flare CM. In this paper we describe the modelling process of a dual band IR and UV rosette scan seeker using CounterSim, a missile engagement and countermeasure simulation software package developed by Chemring Countermeasures Ltd. Results are shown from various simulated engagements of the dual band MANPAD with a C-130 Hercules modelled by Chemring Countermeasures. These results have been used to estimate the aircrafts' vulnerability to this MANPAD threat. A discussion on possible future optical countermeasures against dual band IR-UV seekers is given in conclusion to the simulation results.

  17. Space Radiation Environment Prediction for VLSI microelectronics devices onboard a LEO Satellite using OMERE-Trad Software

    NASA Astrophysics Data System (ADS)

    Sajid, Muhammad

    This tutorial/survey paper presents the assessment/determination of level of hazard/threat to emerging microelectronics devices in Low Earth Orbit (LEO) space radiation environment with perigee at 300 Km, apogee at 600Km altitude having different orbital inclinations to predict the reliability of onboard Bulk Built-In Current Sensor (BBICS) fabricated in 350nm technology node at OptMA Lab. UFMG Brazil. In this context, the various parameters for space radiation environment have been analyzed to characterize the ionizing radiation environment effects on proposed BBICS. The Space radiation environment has been modeled in the form of particles trapped in Van-Allen radiation belts(RBs), Energetic Solar Particles Events (ESPE) and Galactic Cosmic Rays (GCR) where as its potential effects on Device- Under-Test (DUT) has been predicted in terms of Total Ionizing Dose (TID), Single-Event Effects (SEE) and Displacement Damage Dose (DDD). Finally, the required mitigation techniques including necessary shielding requirements to avoid undesirable effects of radiation environment at device level has been estimated /determined with assumed standard thickness of Aluminum shielding. In order to evaluate space radiation environment and analyze energetic particles effects on BBICS, OMERE toolkit developed by TRAD was utilized.

  18. Explosives detection and identification using surface plasmon-coupled emission

    NASA Astrophysics Data System (ADS)

    Ja, Shiou-Jyh

    2012-06-01

    To fight against the explosives-related threats in defense and homeland security applications, a smarter sensing device that not only detects but differentiates multiple true threats from false positives caused by environmental interferents is essential. A new optical detection system is proposed to address these issues by using the temporal and spectroscopic information generated by the surface plasmon coupling emission (SPCE) effect. Innovative SPCE optics have been designed using Zemax software to project the fluorescence signal into clear "rainbow rings" on a CCD with subnanometer wavelength resolution. The spectroscopic change of the fluorescence signal and the time history of such changes due to the presence of a certain explosive analyte are unique and can be used to identify explosives. Thanks to high optical efficiency, reporter depositions as small as 160-μm in diameter can generate a sufficient signal, allowing a dense array of different reporters to be interrogated with wavelength multiplexing and detect a wide range of explosives. We have demonstrated detection and classification of explosives, such as TNT, NT, NM, RDX, PETN, and AN, with two sensing materials in a prototype.

  19. Perceived coping & concern predict terrorism preparedness in Australia.

    PubMed

    Stevens, Garry; Agho, Kingsley; Taylor, Melanie; Jones, Alison L; Barr, Margo; Raphael, Beverley

    2012-12-27

    In the aftermath of major terrorist incidents research shows population shifts towards protective behaviours, including specific preparedness and avoidance responses. Less is known about individual preparedness in populations with high assumed threat but limited direct exposure, such as Australia. In this study we aimed to determine whether individuals with high perceived coping and higher concern would show greater preparedness to respond to terrorism threats. Adults in New South Wales (NSW) completed terrorism perception and response questions as part of computer assisted telephone interviews (CATI) in 2010 (N=2038). Responses were weighted against the NSW population. Multiple logistic regression analyses were conducted to evaluate the relationship between personal coping/concern factors and terrorism-related preparedness and avoidance behaviours, and to control for potential confounders such as socio-demographic and threat perception factors. Increased vigilance for suspicious behaviours was the most commonly reported behavioural response to perceived terrorism threat. Multivariate analyses showed that the factor combination of high perceived coping and higher concern was the most consistent predictor of terrorism preparedness behaviours and evacuation intentions, including increased vigilance (Adjusted Odd Ratios (AOR)=2.07, p=0.001) learning evacuation plans (AOR=1.61, p=0.05), establishing emergency contact plans (AOR=2.73, p<0.001), willingness to evacuate homes (AOR=2.20, p=0.039), and willingness to evacuate workplaces or public facilities (AOR=6.19, p=0.015) during potential future incidents. The findings of this study suggest that terrorism preparedness behaviours are strongly associated with perceived high coping but that this relationship is also mediated by personal concerns relating to this threat. Cognitive variables such as coping self-efficacy are increasingly targeted as part of natural hazard preparedness and are a viable intervention target for terrorism preparedness initiatives. Raising individual coping perceptions may promote greater general and incident-specific preparedness and could form an integral element of community resilience strategies regarding this threat.

  20. Perceived coping & concern predict terrorism preparedness in Australia

    PubMed Central

    2012-01-01

    Background In the aftermath of major terrorist incidents research shows population shifts towards protective behaviours, including specific preparedness and avoidance responses. Less is known about individual preparedness in populations with high assumed threat but limited direct exposure, such as Australia. In this study we aimed to determine whether individuals with high perceived coping and higher concern would show greater preparedness to respond to terrorism threats. Methods Adults in New South Wales (NSW) completed terrorism perception and response questions as part of computer assisted telephone interviews (CATI) in 2010 (N=2038). Responses were weighted against the NSW population. Multiple logistic regression analyses were conducted to evaluate the relationship between personal coping/concern factors and terrorism-related preparedness and avoidance behaviours, and to control for potential confounders such as socio-demographic and threat perception factors. Results Increased vigilance for suspicious behaviours was the most commonly reported behavioural response to perceived terrorism threat. Multivariate analyses showed that the factor combination of high perceived coping and higher concern was the most consistent predictor of terrorism preparedness behaviours and evacuation intentions, including increased vigilance (Adjusted Odd Ratios (AOR)=2.07, p=0.001) learning evacuation plans (AOR=1.61, p=0.05), establishing emergency contact plans (AOR=2.73, p<0.001), willingness to evacuate homes (AOR=2.20, p=0.039), and willingness to evacuate workplaces or public facilities (AOR=6.19, p=0.015) during potential future incidents. Conclusion The findings of this study suggest that terrorism preparedness behaviours are strongly associated with perceived high coping but that this relationship is also mediated by personal concerns relating to this threat. Cognitive variables such as coping self-efficacy are increasingly targeted as part of natural hazard preparedness and are a viable intervention target for terrorism preparedness initiatives. Raising individual coping perceptions may promote greater general and incident-specific preparedness and could form an integral element of community resilience strategies regarding this threat. PMID:23270424

  1. Why Don't We Ask? A Complementary Method for Assessing the Status of Great Apes

    PubMed Central

    Meijaard, Erik; Mengersen, Kerrie; Buchori, Damayanti; Nurcahyo, Anton; Ancrenaz, Marc; Wich, Serge; Atmoko, Sri Suci Utami; Tjiu, Albertus; Prasetyo, Didik; Nardiyono; Hadiprakarsa, Yokyok; Christy, Lenny; Wells, Jessie; Albar, Guillaume; Marshall, Andrew J.

    2011-01-01

    Species conservation is difficult. Threats to species are typically high and immediate. Effective solutions for counteracting these threats, however, require synthesis of high quality evidence, appropriately targeted activities, typically costly implementation, and rapid re-evaluation and adaptation. Conservation management can be ineffective if there is insufficient understanding of the complex ecological, political, socio-cultural, and economic factors that underlie conservation threats. When information about these factors is incomplete, conservation managers may be unaware of the most urgent threats or unable to envision all consequences of potential management strategies. Conservation research aims to address the gap between what is known and what knowledge is needed for effective conservation. Such research, however, generally addresses a subset of the factors that underlie conservation threats, producing a limited, simplistic, and often biased view of complex, real world situations. A combination of approaches is required to provide the complete picture necessary to engage in effective conservation. Orangutan conservation (Pongo spp.) offers an example: standard conservation assessments employ survey methods that focus on ecological variables, but do not usually address the socio-cultural factors that underlie threats. Here, we evaluate a complementary survey method based on interviews of nearly 7,000 people in 687 villages in Kalimantan, Indonesia. We address areas of potential methodological weakness in such surveys, including sampling and questionnaire design, respondent biases, statistical analyses, and sensitivity of resultant inferences. We show that interview-based surveys can provide cost-effective and statistically robust methods to better understand poorly known populations of species that are relatively easily identified by local people. Such surveys provide reasonably reliable estimates of relative presence and relative encounter rates of such species, as well as quantifying the main factors that threaten them. We recommend more extensive use of carefully designed and implemented interview surveys, in conjunction with more traditional field methods. PMID:21483859

  2. An Investigation of EME as a Potential Cause of Fuel Tank Ignition

    NASA Technical Reports Server (NTRS)

    Ely, Jay J.; Nguyen, Truong X.; Dudley, Kenneth L.; Scearce, Stephen A.; Beck, Fred B.; Deshpande, Manohar D.; Cockrell, C. R.

    2000-01-01

    NASA researchers were tasked to study the potential for radio signals to excite an aircraft fuel quantity indication system (FQIS) enough to cause arcing, sparking or excessive heating within a fuel tank. Computational techniques were used to determine the threat from external high intensity radiated field (HIRF) transmitters nearby, like shipboard and airborne RADAR systems. Experimental methods were used to determine the threat from Portable Electronic Devices (PEDs) carried aboard by passengers. To support this work, unique electromagnetic coupling measurements were performed on a retired Boeing 747 aircraft, and new test and analysis methods were developed that may be applied to other FQIS designs as well as other aircraft electronic systems.

  3. Are ranger patrols effective in reducing poaching-related threats within protected areas?

    USGS Publications Warehouse

    Moore, Jennnifer F.; Mulindahabi, Felix; Masozera, Michel K.; Nichols, James; Hines, James; Turikunkiko, Ezechiel; Oli, Madan K.

    2018-01-01

    Poaching is one of the greatest threats to wildlife conservation world-wide. However, the spatial and temporal patterns of poaching activities within protected areas, and the effectiveness of ranger patrols and ranger posts in mitigating these threats, are relatively unknown.We used 10 years (2006–2015) of ranger-based monitoring data and dynamic multi-season occupancy models to quantify poaching-related threats, to examine factors influencing the spatio-temporal dynamics of these threats and to test the efficiency of management actions to combat poaching in Nyungwe National Park (NNP), Rwanda.The probability of occurrence of poaching-related threats was highest at lower elevations (1,801–2,200 m), especially in areas that were close to roads and tourist trails; conversely, occurrence probability was lowest at high elevation sites (2,601–3,000 m), and near the park boundary and ranger posts. The number of ranger patrols substantially increased the probability that poaching-related threats disappear at a site if threats were originally present (i.e. probability of extinction of threats). Without ranger visits, the annual probability of extinction of poaching-related threats was an estimated 7%; this probability would increase to 20% and 57% with 20 and 50 ranger visits per year, respectively.Our results suggest that poaching-related threats can be effectively reduced in NNP by adding ranger posts in areas where they do not currently exist, and by increasing the number of patrols to sites where the probability of poaching activities is high.Synthesis and applications. Our application of dynamic occupancy models to predict the probability of presence of poaching-related threats is novel, and explicitly considers imperfect detection of illegal activities. Based on the modelled relationships, we identify areas that are most vulnerable to poaching, and offer insights regarding how ranger patrols can be optimally deployed to reduce poaching-related threats and other illegal activites, while taking into account potential sampling biases. We show that poaching can be effectively reduced by increasing ranger patrols to areas under high risk of poaching activities, and by adding ranger patrols near these sites. These findings are broadly applicable to national parks and protected areas experiencing a high degree of poaching and other illegal activities.

  4. Application distribution model and related security attacks in VANET

    NASA Astrophysics Data System (ADS)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  5. Anti-islanding Protection of Distributed Generation Using Rate of Change of Impedance

    NASA Astrophysics Data System (ADS)

    Shah, Pragnesh; Bhalja, Bhavesh

    2013-08-01

    Distributed Generation (DG), which is interlinked with distribution system, has inevitable effect on distribution system. Integrating DG with the utility network demands an anti-islanding scheme to protect the system. Failure to trip islanded generators can lead to problems such as threats to personnel safety, out-of-phase reclosing, and degradation of power quality. In this article, a new method for anti-islanding protection based on impedance monitoring of distribution network is carried out in presence of DG. The impedance measured between two phases is used to derive the rate of change of impedance (dz/dt), and its peak values are used for final trip decision. Test data are generated using PSCAD/EMTDC software package and the performance of the proposed method is evaluated in MatLab software. The simulation results show the effectiveness of the proposed scheme as it is capable to detect islanding condition accurately. Subsequently, it is also observed that the proposed scheme does not mal-operate during other disturbances such as short circuit and switching event.

  6. Specific identification of Bacillus anthracis strains

    NASA Astrophysics Data System (ADS)

    Krishnamurthy, Thaiya; Deshpande, Samir; Hewel, Johannes; Liu, Hongbin; Wick, Charles H.; Yates, John R., III

    2007-01-01

    Accurate identification of human pathogens is the initial vital step in treating the civilian terrorism victims and military personnel afflicted in biological threat situations. We have applied a powerful multi-dimensional protein identification technology (MudPIT) along with newly generated software termed Profiler to identify the sequences of specific proteins observed for few strains of Bacillus anthracis, a human pathogen. Software termed Profiler was created to initially screen the MudPIT data of B. anthracis strains and establish the observed proteins specific for its strains. A database was also generated using Profiler containing marker proteins of B. anthracis and its strains, which in turn could be used for detecting the organism and its corresponding strains in samples. Analysis of the unknowns by our methodology, combining MudPIT and Profiler, led to the accurate identification of the anthracis strains present in samples. Thus, a new approach for the identification of B. anthracis strains in unknown samples, based on the molecular mass and sequences of marker proteins, has been ascertained.

  7. ARX - A Comprehensive Tool for Anonymizing Biomedical Data

    PubMed Central

    Prasser, Fabian; Kohlmayer, Florian; Lautenschläger, Ronald; Kuhn, Klaus A.

    2014-01-01

    Collaboration and data sharing have become core elements of biomedical research. Especially when sensitive data from distributed sources are linked, privacy threats have to be considered. Statistical disclosure control allows the protection of sensitive data by introducing fuzziness. Reduction of data quality, however, needs to be balanced against gains in protection. Therefore, tools are needed which provide a good overview of the anonymization process to those responsible for data sharing. These tools require graphical interfaces and the use of intuitive and replicable methods. In addition, extensive testing, documentation and openness to reviews by the community are important. Existing publicly available software is limited in functionality, and often active support is lacking. We present ARX, an anonymization tool that i) implements a wide variety of privacy methods in a highly efficient manner, ii) provides an intuitive cross-platform graphical interface, iii) offers a programming interface for integration into other software systems, and iv) is well documented and actively supported. PMID:25954407

  8. Development of x-ray imaging technique for liquid screening at airport

    NASA Astrophysics Data System (ADS)

    Sulaiman, Nurhani binti; Srisatit, Somyot

    2016-01-01

    X-ray imaging technology is a viable option to recognize flammable liquids for the purposes of aviation security. In this study, an X-ray imaging technology was developed whereby, the image viewing system was built with the use of a digital camera coupled with a gadolinium oxysulfide (GOS) fluorescent screen. The camera was equipped with a software for remote control setting of the camera via a USB cable which allows the images to be captured. The image was analysed to determine the average grey level using a software designed by Microsoft Visual Basic 6.0. The data was obtained for various densities of liquid thickness of 4.5 cm, 6.0 cm and 7.5 cm respectively for X-ray energies ranging from 70 to 200 kVp. In order to verify the reliability of the constructed calibration data, the system was tested with a few types of unknown liquids. The developed system could be conveniently employed for security screening in order to discriminate between a threat and an innocuous liquid.

  9. Does stereotype threat affect women in academic medicine?

    PubMed

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  10. Does Stereotype Threat Affect Women in Academic Medicine?

    PubMed Central

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  11. Assessing Potential of VIIRS Data for Contribution to a Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.

    2007-01-01

    This viewgraph presentation reviews the contributions by the Rapid Prototyping Capability (RPC) towards using Visible Infrared Imager / Radiometer Suite (VIIRS) data in assessing the damage to forests. The Healthy Forest Restoration Act of 2003 mandates development of national Early Warning System (EWS) for forest threat monitoring and mitigation. NASA Stennis is working with the US Forest Service to develop needed components of this EWS. The use of MODIS data for monitoring forest disturbance at broad regional scales is a componet of this program. This RPC experiment was initiated to assess potential of the MODIS follow-on, VIIRS, for monitoring forest disturbance at broad scales and thereby contributing to the EWS. This presentation reviews the potential use of the VIIRS to examine the damage to forests caused by gyspy moths in the West Virginia and Virginia area.

  12. Planetary Defense: Are we currently looking for our keys under the lamp post?

    NASA Astrophysics Data System (ADS)

    Nuth, J. A., III; Barbee, B.; Leung, R. Y.

    2016-12-01

    Planetary Defense is a serious and important endeavor and the approach taken to date is a sensible beginning. Finding and cataloging all potentially hazardous asteroids and supporting research into relevant topics required to divert such a threat to our home planet is a necessary, but far from sufficient set of activities required to ensure the survival of our species. Concentrating our efforts on the asteroid threat is relatively easy. Most asteroids move in near-circular orbits, are relatively close to the ecliptic plane and are likely to be detected as hazards many decades in advance of a potential impact. The single most likely problem that will be encountered in deflecting such a threat will be developing the political will to fund the project while there is still ample time for multiple deflection techniques to be applied successfully. While asteroid threats can be mitigated, comets are the invisible danger lurking in the vast, dark parking lot that is the outer solar system. Very few comets falling into the inner solar system will be detected more than two years before their arrival: refinement of a new comet's trajectory requires months of observation before its hazard potential can be realistically assessed and knowledge of the composition, mass and shape of the body cannot be refined sufficiently to design a deflection campaign without much more observational effort. To make matters worse, because of the highly elliptical orbits of most new comets, some of which can be far out of the ecliptic plane while a few can even be in retrograde orbits, the impact velocity of a typical comet will be significantly higher than that of an asteroid. If this increase is only a factor of two, then a typical comet carries four times the impact energy of an asteroid of similar size, though much higher multipliers are possible. The distribution of meteor stream velocities can be examined to place bounds on this threat. Finally, the time required to assemble and launch an asteroid deflection mission starting from scratch and with a high probability of success could exceed three years from mission approval. Based on the recent passage of Comet Siding Spring one must therefore conclude that a successful comet deflection mission must begin well before a hazardous comet is even detected, much less characterized as a significant threat.

  13. Population viability analysis of the Endangered shortnose sturgeon

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jager, Yetta; Bevelhimer, Mark S; Peterson, Douglas L.

    2011-07-01

    This study used population viability analysis (PVA) to partition the influences of potential threats to the endangered shortnose sturgeon (Acipenser brevirostrum). A workshop brought together experts to help identify potential threats including groundwater withdrawal, poor water quality, saltwater intrusion, mercury effects, harvest as by-catch, and sedimentation of spawning habitat. During the course of the project, we eliminated some threats and added new ones. Groundwater withdrawal was dismissed after a study failed to identify connection with groundwater and the majority of pumping is from a confined aquifer. We also eliminated activities on Fort Stewart as influences on spawning habitat because anymore » successful spawning must occur upstream of Fort Stewart. We added climate change to the list of threats based on our assessment of temperature effects and expectations of sea-level rise. Our study highlighted the role of populations in nearby rivers in providing metapopulation support, raising the concern that the population in the Ogeechee River acts as a demographic sink. As part of this study, we carried out a field sampling study to analyze effects of training activities on headwater streams. We developed a new methodology for sampling design as part of this effort and used a mixed-modeling approach to identify relationships between land cover-land use, including those associated with military training activity and water quality. We found that tank training was associated with higher suspended sediment and equipment training was associated with higher organic carbon) and water quality. We detected effects of training on suspended sediment and organic carbon. We also carried out a field sampling effort in the Canoochee and Ogeechee Rivers. In the Ogeechee River, we found that dissolved oxygen in 40% of measurements during summer were below 4 mg L-1. To evaluate mercury as a potential threat, we developed a mercury uptake model and analyzed mercury levels in amphipod prey and sturgeon eggs. These did not exceed EPA guidelines. Finally, we developed a PVA model that including linkages between shortnose sturgeon growth, reproduction, and survival and each remaining threat; All three had significant influences. Preliminary simulations suggest that elevated temperatures under future climate will extirpate this population and add support to the hypothesis that this species requires access to spawning habitat far upstream to persist.« less

  14. Bioboxes: standardised containers for interchangeable bioinformatics software.

    PubMed

    Belmann, Peter; Dröge, Johannes; Bremges, Andreas; McHardy, Alice C; Sczyrba, Alexander; Barton, Michael D

    2015-01-01

    Software is now both central and essential to modern biology, yet lack of availability, difficult installations, and complex user interfaces make software hard to obtain and use. Containerisation, as exemplified by the Docker platform, has the potential to solve the problems associated with sharing software. We propose bioboxes: containers with standardised interfaces to make bioinformatics software interchangeable.

  15. Biggest Threats

    MedlinePlus

    ... Resistant Salmonella Serotype Typhi Salmonella serotype Typhi causes typhoid fever, a potentially life-threatening disease. People with typhoid fever usually have a high fever, abdominal pain, and ...

  16. Tricerascope: The Triple Threat Robotic Telescope of the Community College of Southern Nevada

    NASA Astrophysics Data System (ADS)

    Nations, H. L.; Erwin, T. D.

    2005-12-01

    With over 34000 students and three primary campuses, the Community College of Southern Nevada is the largest college or university in the state. It is also the largest provider of astronomy education, with a total of forty sections of introductory astronomy classes and labs in the Fall of 2005, six full time astronomy faculty, and a busy planetarium which has just been upgraded to a digital projector. Unfortunately, it is also located in the light pollution capital of the observable universe, Las Vegas, Nevada. But to counterbalance that somewhat, we do have over 300 clear, sunny days per year. This has led us to develop Tricerascope, our triple threat robotic telescope. Given the busy teaching schedules of our faculty, Tricerascope was designed to use, as much as possible, commercial, off-the-shelf technology. The primary hardware consists of a Coronado Solarmax 60 Halpha telescope with a bandpass of < 0.7 Angstroms, and a TeleVue-60 APO refractor equipped with a white-light Baader AstroSolar filter. The detectors for these telescopes are identical Phillips ToUcam Pro II webcams and the telescopes are focused using dual Technical Innovations Robo-Focus devices. The telescopes themselves are piggy-backed on an eight inch Meade LX200GPS which has an SBIG ST7 XME camera and CFW filter wheel. All of these reside in a Technical Innovations RoboDome . The overall software controlling the observatory is Astronomy Control Panel 4.1. We show details of the hardware (including an unique shutter for the LX200) and software and how they work together as well as daytime and nighttime images. We will also discuss how the observatory is being integrated into the astronomy curriculum at the college and in local secondary schools.

  17. Internetting tactical security sensor systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.

  18. Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences

    DTIC Science & Technology

    2004-09-02

    Consequences 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7...OSLGCP now administers the grants programs. 30According to the guidance, threat assessment determines the relative likelihood of a known potential...information on critical infrastructure assets. The Office of State and Local Government Coordination and Preparedness (OSLGCP) administers two grant

  19. Is the Current US Navy Pacific Basing Structure Adequate for the Twenty-First Century?

    DTIC Science & Technology

    2006-12-15

    events. The Threat (To Deter, To Defeat, To Maintain the Peace) Chinese Grand Strategy and Maritime Power by Thomas M. Kane ; “China’s Quest for...Congress” by Ronald O’Rourke provide the initial basis for assessment of the potential threat posed by China’s naval buildup. Kane discussed that...cooperation among the ANZUS allies will continue for the foreseeable future. Conclusion There is a significant body of literature covering the history of

  20. Development of a Threat Assessment Framework Applicable to Dual Use Biotechnology: Results of a Study to Determine the Feasibility, Applicability and Potential Design of a Threat Assessment Framework Concept

    DTIC Science & Technology

    2007-04-01

    Guanarito virus, Lassa fever • Bunyaviruses. Hantaviruses, Rift Valley fever • Flaviviruses. Dengue • Filoviruses. Ebola, Marburg Category B...Viruses V1. Chikungunya virus V2. Congo-Crimean haemorrhagic fever virus V3. Dengue fever virus...current context and an extensive set of interviews with subject matter experts (SME). After preliminary conversations with experts and scanning initial

Top