Sample records for support based threat

  1. DoD Force & Infrastructure Categories: A FYDP-Based Conceptual Model of Department of Defense Programs and Resources

    DTIC Science & Technology

    2002-09-01

    Support 0605160D Counterproliferation Support (H) 0901502A Service Support to DTSA 0901502F Service Support to DTSA 0901502N Service Support to DTSA ...Base Operations Support 0901502A Service Support to DTSA (1F2C) Int’l Engagement & Threat Reduction 0901502F Service Support to DTSA (1F2C...Int’l Engagement & Threat Reduction 0901502N Service Support to DTSA (1F2C) Int’l Engagement & Threat Reduction 0901503A Service Support to OSD

  2. Are needs to manage uncertainty and threat associated with political conservatism or ideological extremity?

    PubMed

    Jost, John T; Napier, Jaime L; Thorisdottir, Hulda; Gosling, Samuel D; Palfai, Tibor P; Ostafin, Brian

    2007-07-01

    Three studies are conducted to assess the uncertainty- threat model of political conservatism, which posits that psychological needs to manage uncertainty and threat are associated with political orientation. Results from structural equation models provide consistent support for the hypothesis that uncertainty avoidance (e.g., need for order, intolerance of ambiguity, and lack of openness to experience) and threat management (e.g., death anxiety, system threat, and perceptions of a dangerous world) each contributes independently to conservatism (vs. liberalism). No support is obtained for alternative models, which predict that uncertainty and threat management are associated with ideological extremism or extreme forms of conservatism only. Study 3 also reveals that resistance to change fully mediates the association between uncertainty avoidance and conservatism, whereas opposition to equality partially mediates the association between threat and conservatism. Implications for understanding the epistemic and existential bases of political orientation are discussed.

  3. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model adaptation (learning). The increasingly complex demands facing analysts evaluating activity threatening to the security of the United States make the family of agent-based data collection (fusion) a promising area. This paper will discuss a system to support the collection and evaluation of potential threat activity as well as an approach fro presentation of the information.

  4. Maintaining Space Superiority

    DTIC Science & Technology

    2014-02-01

    object that may present a threat to his or h er satellites must still provide direction that responds to that threat This article discusses a dilemma...space-based threats .ŕ The Air Force achieves space superiority by conducting operations that support the war fighter (space force enhancement); by...the space era, threats and issues have arisen to chal- lenge US operations in these areas. Indeed, as declared in the National Security Space Strategy

  5. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.

    PubMed

    Dutt, Varun; Ahn, Young-Suk; Gonzalez, Cleotilde

    2013-06-01

    To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors. Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early). For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy. Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.

  6. Stereotype Threat and College Academic Performance: A Latent Variables Approach*

    PubMed Central

    Owens, Jayanti; Massey, Douglas S.

    2013-01-01

    Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using summed indicators and predicted relationships modeled using ordinary least squares. Using the National Longitudinal Survey of Freshman, this study overcomes previous methodological shortcomings by developing a latent construct model of stereotype threat. Theoretical constructs and equations are estimated simultaneously from multiple indicators, yielding a more reliable, valid, and parsimonious test of key propositions. Findings additionally support the view that social stigma can indeed have strong negative effects on the academic performance of pejoratively stereotyped racial-minority group members, not only in laboratory settings, but also in the real world. PMID:23950616

  7. Common IED exploitation target set ontology

    NASA Astrophysics Data System (ADS)

    Russomanno, David J.; Qualls, Joseph; Wowczuk, Zenovy; Franken, Paul; Robinson, William

    2010-04-01

    The Common IED Exploitation Target Set (CIEDETS) ontology provides a comprehensive semantic data model for capturing knowledge about sensors, platforms, missions, environments, and other aspects of systems under test. The ontology also includes representative IEDs; modeled as explosives, camouflage, concealment objects, and other background objects, which comprise an overall threat scene. The ontology is represented using the Web Ontology Language and the SPARQL Protocol and RDF Query Language, which ensures portability of the acquired knowledge base across applications. The resulting knowledge base is a component of the CIEDETS application, which is intended to support the end user sensor test and evaluation community. CIEDETS associates a system under test to a subset of cataloged threats based on the probability that the system will detect the threat. The associations between systems under test, threats, and the detection probabilities are established based on a hybrid reasoning strategy, which applies a combination of heuristics and simplified modeling techniques. Besides supporting the CIEDETS application, which is focused on efficient and consistent system testing, the ontology can be leveraged in a myriad of other applications, including serving as a knowledge source for mission planning tools.

  8. Motivated emotion and the rally around the flag effect: liberals are motivated to feel collective angst (like conservatives) when faced with existential threat.

    PubMed

    Porat, Roni; Tamir, Maya; Wohl, Michael J A; Gur, Tamar; Halperin, Eran

    2018-04-18

    A careful look at societies facing threat reveals a unique phenomenon in which liberals and conservatives react emotionally and attitudinally in a similar manner, rallying around the conservative flag. Previous research suggests that this rally effect is the result of liberals shifting in their attitudes and emotional responses toward the conservative end. Whereas theories of motivated social cognition provide a motivation-based account of cognitive processes (i.e. attitude shift), it remains unclear whether emotional shifts are, in fact, also a motivation-based process. Herein, we propose that under threat, liberals are motivated to feel existential concern about their group's future vitality (i.e. collective angst) to the same extent as conservatives, because this group-based emotion elicits support for ingroup protective action. Within the context of the Palestinian-Israeli conflict, we tested and found support for this hypothesis both inside (Study 1) and outside (Study 2) the laboratory. We did so using a behavioural index of motivation to experience collective angst. We discuss the implications of our findings for understanding motivated emotion regulation in the context of intergroup threat.

  9. Fourth Generation Warfare in Chile: Illicit Drug Trafficking Threats

    DTIC Science & Technology

    2011-03-21

    observable fact in the world-wide scenario which affects diplomatic, cultural, economic , and military connections among countries. Cooperative and... economic and technological resources because they are supported by international organizations and even some states, based on radical inclinations of...concept and approach must be expanded to encompass new and nontraditional threats, which include political, economic , social, health, and

  10. Language Ideologies and Literacy Achievement: Six Multilingual Countries and Two International Assessments

    ERIC Educational Resources Information Center

    Arya, Diana J.; McClung, Nicola A.; Katznelson, Noah; Scott, Lyn

    2016-01-01

    Social psychologists have suggested that language-based ideologies related to "stereotype threat" (i.e. variations in performance-based on ability perceptions of language groups) may affect students' academic achievement regardless of school language support. However, it is unclear whether efforts to support students' first language…

  11. Navy Enhanced Sierra Mechanics (NESM): Toolbox for predicting Navy shock and damage

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moyer, Thomas; Stergiou, Jonathan; Reese, Garth

    Here, the US Navy is developing a new suite of computational mechanics tools (Navy Enhanced Sierra Mechanics) for the prediction of ship response, damage, and shock environments transmitted to vital systems during threat weapon encounters. NESM includes fully coupled Euler-Lagrange solvers tailored to ship shock/damage predictions. NESM is optimized to support high-performance computing architectures, providing the physics-based ship response/threat weapon damage predictions needed to support the design and assessment of highly survivable ships. NESM is being employed to support current Navy ship design and acquisition programs while being further developed for future Navy fleet needs.

  12. Navy Enhanced Sierra Mechanics (NESM): Toolbox for predicting Navy shock and damage

    DOE PAGES

    Moyer, Thomas; Stergiou, Jonathan; Reese, Garth; ...

    2016-05-25

    Here, the US Navy is developing a new suite of computational mechanics tools (Navy Enhanced Sierra Mechanics) for the prediction of ship response, damage, and shock environments transmitted to vital systems during threat weapon encounters. NESM includes fully coupled Euler-Lagrange solvers tailored to ship shock/damage predictions. NESM is optimized to support high-performance computing architectures, providing the physics-based ship response/threat weapon damage predictions needed to support the design and assessment of highly survivable ships. NESM is being employed to support current Navy ship design and acquisition programs while being further developed for future Navy fleet needs.

  13. Technosocial Modeling of IED Threat Scenarios and Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less

  14. Threat Perception and Attitudes of Adolescents towards Re-Introduced Wild Animals: A Qualitative Study of Young Learners from Affected Regions in Germany

    ERIC Educational Resources Information Center

    Hermann, Nadin; Menzel, Susanne

    2013-01-01

    Conservation efforts such as the restoration of European bison or the support of wolf immigration into Germany are often socio-scientifically controversial. In many cases, disputes are based on individuals' threat perception and attitudes towards the animal involved. The herewith reported study provides qualitative insights into German…

  15. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers.

    PubMed

    Carey, Rachel N; Sarma, Kiran M

    2016-07-27

    Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These 'threat appeals' feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62) examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81) investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Findings suggest that threat-based road safety communications that target affective (fear) and cognitive (perceived efficacy) mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.

  16. Extending the explanatory utility of the EPPM beyond fear-based persuasion.

    PubMed

    Lewis, Ioni; Watson, Barry; White, Katherine M

    2013-01-01

    In the 20 years since its inception, the Extended Parallel Process Model (EPPM) has attracted much empirical support. Currently, and unsurprisingly, given that is a model of fear-based persuasion, the EPPM's explanatory utility has been based only upon fear-based messages. However, an argument is put forth herein that draws upon existing evidence that the EPPM may be an efficacious framework for explaining the persuasive process and outcomes of emotion-based messages more broadly when such messages are addressing serious health topics. For the current study, four different types of emotional appeals were purposefully devised and included a fear-, an annoyance/agitation-, a pride-, and a humor-based message. All messages addressed the serious health issue of road safety, and in particular the risky behavior of speeding. Participants (n = 551) were exposed to only one of the four messages and subsequently provided responses within a survey. A series of 2 (threat: low, high) × 2 (efficacy: low, high) analysis of variance was conducted for each of the appeals based on the EPPM's message outcomes of acceptance and rejection. Support was found for the EPPM with a number of main effects of threat and efficacy emerging, reflecting that, irrespective of emotional appeal type, high levels of threat and efficacy enhanced message outcomes via maximizing acceptance and minimizing rejection. Theoretically, the findings provide support for the explanatory utility of the EPPM for emotion-based health messages more broadly. In an applied sense, the findings highlight the value of adopting the EPPM as a framework when devising and evaluating emotion-based health messages for serious health topics.

  17. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  18. Perceived Threat Associated with Police Officers and Black Men Predicts Support for Policing Policy Reform

    PubMed Central

    Skinner, Allison L.; Haas, Ingrid J.

    2016-01-01

    Racial disparities in policing and recent high-profile incidents resulting in the deaths of Black men have ignited a national debate on policing policies. Given evidence that both police officers and Black men may be associated with threat, we examined the impact of perceived threat on support for reformed policing policies. Across three studies we found correlational evidence that perceiving police officers as threatening predicts increased support for reformed policing practices (e.g., limiting the use of lethal force and matching police force demographics to those of the community). In contrast, perceiving Black men as threatening predicted reduced support for policing policy reform. Perceived threat also predicted willingness to sign a petition calling for police reform. Experimental evidence indicated that priming participants to associate Black men with threat could also reduce support for policing policy reform, and this effect was moderated by internal motivation to respond without prejudice. Priming participants to associate police officers with threat did not increase support for policing policy reform. Results indicate that resistance to policing policy reform is associated with perceiving Black men as threatening. Moreover, findings suggest that publicizing racially charged police encounters, which may conjure associations between Black men and threat, could reduce support for policing policy reform. PMID:27462294

  19. Analyzing the development of Indonesia shrimp industry

    NASA Astrophysics Data System (ADS)

    Wati, L. A.

    2018-04-01

    This research aimed to analyze the development of shrimp industry in Indonesia. Porter’s Diamond Theory was used for analysis. The Porter’s Diamond theory is one of framework for industry analysis and business strategy development. The Porter’s Diamond theory has five forces that determine the competitive intensity in an industry, namely (1) the threat of substitute products, (2) the threat of competition, (3) the threat of new entrants, (4) bargaining power of suppliers, and (5) bargaining power of consumers. The development of Indonesian shrimp industry pretty good, explained by Porter Diamond Theory analysis. Analysis of Porter Diamond Theory through four main components namely factor conditions; demand condition; related and supporting industries; and firm strategy, structure and rivalry coupled with a two-component supporting (regulatory the government and the factor of chance). Based on the result of this research show that two-component supporting (regulatory the government and the factor of chance) have positive. Related and supporting industries have negative, firm and structure strategy have negative, rivalry has positive, factor condition have positive (except science and technology resources).

  20. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    PubMed

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  1. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. PMID:23736227

  2. A Man-in-the-Loop Support Concept for Military Ambush Threat-Assessment Based on Reconnaissance Reports

    DTIC Science & Technology

    2004-03-01

    On all levels of the military command hierarchy there is a strong demand for support through the automated processing of reconnaissance reports. This...preconditions for the improvement of computer support and then illustrates the automated processing of report information using a military ambush situation in

  3. Hazards and accessibility: combining and visualizing threat and open infrastructure data for disaster management

    NASA Astrophysics Data System (ADS)

    Tost, Jordi; Ehmel, Fabian; Heidmann, Frank; Olen, Stephanie M.; Bookhagen, Bodo

    2018-05-01

    The assessment of natural hazards and risk has traditionally been built upon the estimation of threat maps, which are used to depict potential danger posed by a particular hazard throughout a given area. But when a hazard event strikes, infrastructure is a significant factor that can determine if the situation becomes a disaster. The vulnerability of the population in a region does not only depend on the area's local threat, but also on the geographical accessibility of the area. This makes threat maps by themselves insufficient for supporting real-time decision-making, especially for those tasks that involve the use of the road network, such as management of relief operations, aid distribution, or planning of evacuation routes, among others. To overcome this problem, this paper proposes a multidisciplinary approach divided in two parts. First, data fusion of satellite-based threat data and open infrastructure data from OpenStreetMap, introducing a threat-based routing service. Second, the visualization of this data through cartographic generalization and schematization. This emphasizes critical areas along roads in a simple way and allows users to visually evaluate the impact natural hazards may have on infrastructure. We develop and illustrate this methodology with a case study of landslide threat for an area in Colombia.

  4. Postural threat influences vestibular-evoked muscular responses.

    PubMed

    Lim, Shannon B; Cleworth, Taylor W; Horslen, Brian C; Blouin, Jean-Sébastien; Inglis, J Timothy; Carpenter, Mark G

    2017-02-01

    Standing balance is significantly influenced by postural threat. While this effect has been well established, the underlying mechanisms of the effect are less understood. The involvement of the vestibular system is under current debate, and recent studies that investigated the effects of height-induced postural threat on vestibular-evoked responses provide conflicting results based on kinetic (Horslen BC, Dakin CJ, Inglis JT, Blouin JS, Carpenter MG. J Physiol 592: 3671-3685, 2014) and kinematic (Osler CJ, Tersteeg MC, Reynolds RF, Loram ID. Eur J Neurosci 38: 3239-3247, 2013) data. We examined the effect of threat of perturbation, a different form of postural threat, on coupling (cross-correlation, coherence, and gain) of the vestibulo-muscular relationship in 25 participants who maintained standing balance. In the "No-Threat" conditions, participants stood quietly on a stable surface. In the "Threat" condition, participants' balance was threatened with unpredictable mediolateral support surface tilts. Quiet standing immediately before the surface tilts was compared to an equivalent time from the No-Threat conditions. Surface EMG was recorded from bilateral trunk, hip, and leg muscles. Hip and leg muscles exhibited significant increases in peak cross-correlation amplitudes, coherence, and gain (1.23-2.66×) in the Threat condition compared with No-Threat conditions, and significant correlations were observed between threat-related changes in physiological arousal and medium-latency peak cross-correlation amplitude in medial gastrocnemius (r = 0.408) muscles. These findings show a clear threat effect on vestibular-evoked responses in muscles in the lower body, with less robust effects of threat on trunk muscles. Combined with previous work, the present results can provide insight into observed changes during balance control in threatening situations. This is the first study to show increases in vestibular-evoked responses of the lower body muscles under conditions of increased threat of postural perturbation. While robust findings were observed in hip and leg muscles, less consistent results were found in muscles of the trunk. The present findings provide further support in the ongoing debate for arguments that vestibular-evoked balance responses are influenced by fear and anxiety and explain previous threat-related changes in balance. Copyright © 2017 the American Physiological Society.

  5. DOD Space Systems: Additional Knowledge Would Better Support Decisions about Disaggregating Large Satellites

    DTIC Science & Technology

    2014-10-01

    considering new approaches. According to Air Force Space Command, U.S. space systems face intentional and unintentional threats , which have increased...life cycle costs • Demand for more satellites may stimulate new entrants and competition to lower acquisition costs. • Smaller, less complex...Fiscal constraints and growing threats to space systems have led DOD to consider alternatives for acquiring space-based capabilities, including

  6. Prioritizing Land and Sea Conservation Investments to Protect Coral Reefs

    PubMed Central

    Klein, Carissa J.; Ban, Natalie C.; Halpern, Benjamin S.; Beger, Maria; Game, Edward T.; Grantham, Hedley S.; Green, Alison; Klein, Travis J.; Kininmonth, Stuart; Treml, Eric; Wilson, Kerrie; Possingham, Hugh P.

    2010-01-01

    Background Coral reefs have exceptional biodiversity, support the livelihoods of millions of people, and are threatened by multiple human activities on land (e.g. farming) and in the sea (e.g. overfishing). Most conservation efforts occur at local scales and, when effective, can increase the resilience of coral reefs to global threats such as climate change (e.g. warming water and ocean acidification). Limited resources for conservation require that we efficiently prioritize where and how to best sustain coral reef ecosystems. Methodology/Principal Findings Here we develop the first prioritization approach that can guide regional-scale conservation investments in land- and sea-based conservation actions that cost-effectively mitigate threats to coral reefs, and apply it to the Coral Triangle, an area of significant global attention and funding. Using information on threats to marine ecosystems, effectiveness of management actions at abating threats, and the management and opportunity costs of actions, we calculate the rate of return on investment in two conservation actions in sixteen ecoregions. We discover that marine conservation almost always trumps terrestrial conservation within any ecoregion, but terrestrial conservation in one ecoregion can be a better investment than marine conservation in another. We show how these results could be used to allocate a limited budget for conservation and compare them to priorities based on individual criteria. Conclusions/Significance Previous prioritization approaches do not consider both land and sea-based threats or the socioeconomic costs of conserving coral reefs. A simple and transparent approach like ours is essential to support effective coral reef conservation decisions in a large and diverse region like the Coral Triangle, but can be applied at any scale and to other marine ecosystems. PMID:20814570

  7. Prioritizing land and sea conservation investments to protect coral reefs.

    PubMed

    Klein, Carissa J; Ban, Natalie C; Halpern, Benjamin S; Beger, Maria; Game, Edward T; Grantham, Hedley S; Green, Alison; Klein, Travis J; Kininmonth, Stuart; Treml, Eric; Wilson, Kerrie; Possingham, Hugh P

    2010-08-30

    Coral reefs have exceptional biodiversity, support the livelihoods of millions of people, and are threatened by multiple human activities on land (e.g. farming) and in the sea (e.g. overfishing). Most conservation efforts occur at local scales and, when effective, can increase the resilience of coral reefs to global threats such as climate change (e.g. warming water and ocean acidification). Limited resources for conservation require that we efficiently prioritize where and how to best sustain coral reef ecosystems. Here we develop the first prioritization approach that can guide regional-scale conservation investments in land- and sea-based conservation actions that cost-effectively mitigate threats to coral reefs, and apply it to the Coral Triangle, an area of significant global attention and funding. Using information on threats to marine ecosystems, effectiveness of management actions at abating threats, and the management and opportunity costs of actions, we calculate the rate of return on investment in two conservation actions in sixteen ecoregions. We discover that marine conservation almost always trumps terrestrial conservation within any ecoregion, but terrestrial conservation in one ecoregion can be a better investment than marine conservation in another. We show how these results could be used to allocate a limited budget for conservation and compare them to priorities based on individual criteria. Previous prioritization approaches do not consider both land and sea-based threats or the socioeconomic costs of conserving coral reefs. A simple and transparent approach like ours is essential to support effective coral reef conservation decisions in a large and diverse region like the Coral Triangle, but can be applied at any scale and to other marine ecosystems.

  8. Optimization-based decision support to assist in logistics planning for hospital evacuations.

    PubMed

    Glick, Roger; Bish, Douglas R; Agca, Esra

    2013-01-01

    The evacuation of the hospital is a very complex process and evacuation planning is an important part of a hospital's emergency management plan. There are numerous factors that affect the evacuation plan including the nature of threat, availability of resources and staff the characteristics of the evacuee population, and risk to patients and staff. The safety and health of patients is of fundamental importance, but safely moving patients to alternative care facilities while under threat is a very challenging task. This article describes the logistical issues and complexities involved in planning and execution of hospital evacuations. Furthermore, this article provides examples of how optimization-based decision support tools can help evacuation planners to better plan for complex evacuations by providing real-world solutions to various evacuation scenarios.

  9. Foundation for the Future. 2013-2015 Strategic Plan. FY13 Organizational Performance Plan

    DTIC Science & Technology

    2013-01-01

    Strengths, Weaknesses, Opportunities, and Threats ( SWOT ) Analysis 192013–2015 Strategic Plan tr t ic l The Planning, Policy, and Leadership Support (PPLS...participation of faculty and staff from across the University in this review. The review process begins with an analysis of organizational strengths...weaknesses, opportunities, and threats ( SWOT ). (The results of the SWOT are shown on page 18.) This is based on an environmental scan which identifi

  10. Community Activities

    EPA Pesticide Factsheets

    EPA supports community-based problem solving through grants and assistance to address health threats posed by a range of environmental hazards in San Joaquin Valley, including drinking water contamination and revitalization plans for downtown Fresno.

  11. EPA Community Activities

    EPA Pesticide Factsheets

    EPA supports community-based problem solving through grants and assistance to address health threats posed by a range of environmental hazards in San Joaquin Valley, including drinking water contamination and revitalization plans for downtown Fresno.

  12. Data Mining for Web-Based Support Systems: A Case Study in e-Custom Systems

    NASA Astrophysics Data System (ADS)

    Razmerita, Liana; Kirchner, Kathrin

    This chapter provides an example of a Web-based support system (WSS) used to streamline trade procedures, prevent potential security threats, and reduce tax-related fraud in cross-border trade. The architecture is based on a service-oriented architecture that includes smart seals and Web services. We discuss the implications and suggest further enhancements to demonstrate how such systems can move toward a Web-based decision support system with the support of data mining methods. We provide a concrete example of how data mining can help to analyze the vast amount of data collected while monitoring the container movements along its supply chain.

  13. Sexual and Emotional Infidelity: Evolved Gender Differences in Jealousy Prove Robust and Replicable.

    PubMed

    Buss, David M

    2018-03-01

    Infidelity poses threats to high-investment mating relationships. Because of gender differences in some aspects of reproductive biology, such as internal female fertilization, the nature of these threats differs for men and women. Men, but not women, for example, have recurrently faced the problem of uncertainty in their genetic parenthood. Jealousy is an emotion hypothesized to have evolved to combat these threats. The 1992 article Sex Differences in Jealousy: Evolution, Physiology, and Psychology reported three empirical studies using two different methods, forced-choice and physiological experiments. Results supported the evolution-based hypotheses. The article became highly cited for several reasons. It elevated the status of jealousy as an important emotion to be explained by any comprehensive theory of human emotions. Subsequent meta-analyses robustly supported the evolutionary hypotheses. Moreover, the work supported the evolutionary meta-theory of gender differences, which posits differences only in domains in which the sexes have recurrently faced distinct adaptive problems. It also heralded the newly emerging field of evolutionary psychology as a useful perspective that possesses the scientific virtues of testability, falsifiability, and heuristic value in discovering previously unknown psychological phenomena.

  14. Bridging the Gap: Developing a Tool to Support Local Civilian and Military Disaster Preparedness

    DTIC Science & Technology

    2010-01-01

    HSC, 2005), the National Strategy for Physical Protection of Critical Infrastructures and Key Assets (DHS, 2003b), the National Strategy for Mari- time...10-2501 (p. 46), The installation CEMP 10-2 provides comprehensive guidance for emergency response to physical threats resulting from major accidents...installations must develop a CEMP 10-2 using the AF [Air Force] template to address the physical threats to their base. . . . The CEMP 10-2 should be

  15. Linking terrestrial and marine conservation planning and threats analysis.

    PubMed

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  16. Rapid response tools and datasets for post-fire modeling: Linking Earth Observations and process-based hydrological models to support post-fire remediation

    Treesearch

    M. E. Miller; M. Billmire; W. J. Elliot; K. A. Endsley; P. R. Robichaud

    2015-01-01

    Preparation is key to utilizing Earth Observations and process-based models to support post-wildfire mitigation. Post-fire flooding and erosion can pose a serious threat to life, property and municipal water supplies. Increased runoff and sediment delivery due to the loss of surface cover and fire-induced changes in soil properties are of great concern. Remediation...

  17. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: a review.

    PubMed

    Upadhyayula, Venkata K K

    2012-02-17

    There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad range of threat agents, including radioactive substances, explosive compounds, chemical warfare agents, biotoxins, and biothreat pathogens through any of the four sensory means mentioned previously. Copyright © 2011 Elsevier B.V. All rights reserved.

  18. Helping Parents Cope with Suicide Threats: An Approach Based on Nonviolent Resistance.

    PubMed

    Omer, Haim; Dolberger, Dan Isaac

    2015-09-01

    Parent training in nonviolent resistance was adapted to deal with situations of suicide threat by children, adolescents, and young adults. The approach aims at reducing the risk potential and the mutual distress surrounding the threat-interaction. Parent training in nonviolent resistance has been shown to help parents move from helplessness to presence, from isolation to connectedness, from submission to resistance, from escalation to self-control, and from mutual distancing and hostility to care and support. Those emphases can be crucial for the diminution of suicide risk. Parents show good ability to implement the approach and report gains on various areas over and beyond the reduction in suicide threat. A particular advantage is that the method can be used also in cases where the young person threatening suicide is not willing to cooperate. © 2015 Family Process Institute.

  19. Social domain based modulation of neural responses to threat: The different roles of romantic partners versus friends.

    PubMed

    Morriss, Jayne; Bell, Tiffany; Johnstone, Tom; van Reekum, Carien M; Hill, Jonathan

    2018-06-21

    The neural circuitry associated with threat regulation in the absence of other people is well established. An examination of threat regulatory processes with people from different domains of an individual's social world is key to understanding social emotion regulation and personality functioning conceptualised as social domain organisation. In this study, 42 healthy female participants completed functional magnetic imaging sessions in which they underwent a scan in the presence of a romantic partner or friend, whilst completing a threat of shock task. In the presence of a romantic partner vs. friend, we found a reduction in amygdala activation to threat vs. safe trials over time. Furthermore, in the presence of a romantic partner vs. friend we observed greater subgenual anterior cingulate cortex and ventromedial prefrontal cortex activation to threat vs. safe trials overall. The results support the hypothesis that recruitment of threat regulation circuitry is modulated by romantic partner relative to another person well-known to the individual. Future work needs to examine neural responses to a wider range of stimuli across more social domains, and implications of failures of this neural organisation for psychopathology.

  20. Toward a Visualization-Supported Workflow for Cyber Alert Management using Threat Models and Human-Centered Design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Franklin, Lyndsey; Pirrung, Megan A.; Blaha, Leslie M.

    Cyber network analysts follow complex processes in their investigations of potential threats to their network. Much research is dedicated to providing automated tool support in the effort to make their tasks more efficient, accurate, and timely. This tool support comes in a variety of implementations from machine learning algorithms that monitor streams of data to visual analytic environments for exploring rich and noisy data sets. Cyber analysts, however, often speak of a need for tools which help them merge the data they already have and help them establish appropriate baselines against which to compare potential anomalies. Furthermore, existing threat modelsmore » that cyber analysts regularly use to structure their investigation are not often leveraged in support tools. We report on our work with cyber analysts to understand they analytic process and how one such model, the MITRE ATT&CK Matrix [32], is used to structure their analytic thinking. We present our efforts to map specific data needed by analysts into the threat model to inform our eventual visualization designs. We examine data mapping for gaps where the threat model is under-supported by either data or tools. We discuss these gaps as potential design spaces for future research efforts. We also discuss the design of a prototype tool that combines machine-learning and visualization components to support cyber analysts working with this threat model.« less

  1. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  2. A strategy for prioritizing threats and recovery actions for at-risk species.

    PubMed

    Darst, Catherine R; Murphy, Philip J; Strout, Nathan W; Campbell, Steven P; Field, Kimberleigh J; Allison, Linda; Averill-Murray, Roy C

    2013-03-01

    Ensuring the persistence of at-risk species depends on implementing conservation actions that ameliorate threats. We developed and implemented a method to quantify the relative importance of threats and to prioritize recovery actions based on their potential to affect risk to Mojave desert tortoises (Gopherus agassizii). We used assessments of threat importance and elasticities of demographic rates from population matrix models to estimate the relative contributions of threats to overall increase in risk to the population. We found that urbanization, human access, military operations, disease, and illegal use of off highway vehicles are the most serious threats to the desert tortoise range-wide. These results suggest that, overall, recovery actions that decrease habitat loss, predation, and crushing will be most effective for recovery; specifically, we found that habitat restoration, topic-specific environmental education, and land acquisition are most likely to result in the greatest decrease in risk to the desert tortoise across its range. In addition, we have developed an application that manages the conceptual model and all supporting information and calculates threat severity and potential effectiveness of recovery actions. Our analytical approach provides an objective process for quantifying threats, prioritizing recovery actions, and developing monitoring metrics for those actions for adaptive management of any at-risk species.

  3. The impact of Stereotype Threat on the simulated driving performance of older drivers.

    PubMed

    Joanisse, Mélanie; Gagnon, Sylvain; Voloaca, Mihnea

    2013-01-01

    Older drivers are perceived as being dangerous and overly cautious by other drivers. We tested the hypothesis that this negative stereotype has a direct influence on the performance of older drivers. Based on the Stereotype Threat literature, we predicted that older driving performance would be altered after exposure to a Stereotype Threat. Sixty-one older drivers aged 65 and above completed a simulated driving assessment course. Prior to testing, half of the participants were told that the objective of the study was to investigate why older adults aged 65 and above were more implicated in on-road accidents (Stereotype Threat condition) and half were showed a neutral statement. Results confirmed that exposure to the threat significantly altered driving performance. Older adults in the Stereotype Threat condition made more driving mistakes than those in the control group. Interestingly, under a Stereotype Threat condition, older adults tended to commit more speeding infractions. We also observed that domain identification (whether driving is deemed important or not) moderated the impact of the threat. Taken together, these results support recent older drivers' performance models suggesting that the interaction between individual and social factors need to be considered when examining older drivers' performance. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. Threat evaluation for impact assessment in situation analysis systems

    NASA Astrophysics Data System (ADS)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization approaches based on neural networks and other mathematical techniques.

  5. Relationships between right-wing authoritarianism, terrorism threat, and attitudes towards restrictions of civil rights: a comparison among four European countries.

    PubMed

    Kossowska, Małgorzata; Trejtowicz, Mariusz; de Lemus, Soledad; Bukowski, Marcin; Van Hiel, Alain; Goodwin, Robin

    2011-05-01

    The present study tested the role of right-wing authoritarianism (RWA), terrorist threat, and sociopolitical 'climate' as predictors of support for governmental anti-terrorism policies and actions. Two dimensions of analysis were defined: the presence versus absence of al-Qaeda attacks, and adherence to surveillance versus anti-surveillance mainstream politics. In order to study the influence of these two contextual dimensions on the expression of attitudes, we selected four European countries that fall into these two dimensions--Poland, Belgium, Spain, and the UK. Results from our study provide support for the contention that attitudes towards restrictions of civil rights are related to RWA independently of the cultural context. Moreover, in the UK sample, we found that the threat of terrorism increases acceptance of limitations of civil liberties, but only among people who hold authoritarian beliefs. However, in Spain, the other country that experienced terrorist attacks, this moderation effect was not found which is interpreted in terms of differences in the sociopolitical climate in both countries. As predicted, we did not find such moderation effect in countries in which threat is relatively low (Poland and Belgium). The results are discussed with reference to the conceptual framework based on the importance of fear experiences, security-focused policies, as well as the specific cultural context in the study of reaction to terrorist threat. ©2010 The British Psychological Society.

  6. Informed actions: where to cost effectively manage multiple threats to species to maximize return on investment.

    PubMed

    Auerbach, Nancy A; Tulloch, Ayesha I T; Possingham, Hugh P

    Conservation practitioners, faced with managing multiple threats to biodiversity and limited funding, must prioritize investment in different management actions. From an economic perspective, it is routine practice to invest where the highest rate of return is expected. This return-on-investment (ROI) thinking can also benefit species conservation, and researchers are developing sophisticated approaches to support decision-making for cost-effective conservation. However, applied use of these approaches is limited. Managers may be wary of “black-box” algorithms or complex methods that are difficult to explain to funding agencies. As an alternative, we demonstrate the use of a basic ROI analysis for determining where to invest in cost-effective management to address threats to species. This method can be applied using basic geographic information system and spreadsheet calculations. We illustrate the approach in a management action prioritization for a biodiverse region of eastern Australia. We use ROI to prioritize management actions for two threats to a suite of threatened species: habitat degradation by cattle grazing, and predation by invasive red foxes (Vulpes vulpes). We show how decisions based on cost-effective threat management depend upon how expected benefits to species are defined and how benefits and costs co-vary. By considering a combination of species richness, restricted habitats, species vulnerability, and costs of management actions, small investments can result in greater expected benefit compared with management decisions that consider only species richness. Furthermore, a landscape management strategy that implements multiple actions is more efficient than managing only for one threat, or more traditional approaches that don't consider ROI. Our approach provides transparent and logical decision support for prioritizing different actions intended to abate threats associated with multiple species; it is of use when managers need a justifiable and repeatable approach to investment.

  7. Cooperative measures to mitigate Asia-Pacific maritime conflicts.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chai, Wen-Chung

    2003-05-01

    The economies of East Asia are predominantly export based and, therefore, place special emphasis on the security of the sea lines of communication (SLOCs). Due to economic globalization, the United States shares these concerns. Cooperative measures by the concerned parties could reduce the potential for disruption by maritime conflicts. Primary threats against the SLOCs are disputes over the resources under the seas, disputes over some small island groups, disputes between particular parties (China-Taiwan and North-South Korea), or illegal activities like smuggling, piracy, or terrorism. This paper provides an overview on these threats, issue by issue, to identify common elements andmore » needed cooperation. Cooperation on other topics such as search and rescue, fisheries protection, and oil spill response may help support improved relations to prevent maritime conflicts. Many technologies can help support maritime cooperation, including improved communications links, tracking and emergency beacon devices, and satellite imaging. Appropriate technical and political means are suggested for each threat to the SLOCs.« less

  8. Ignition of Nanocomposite Thermites by Electric Spark and Shock Wave

    DTIC Science & Technology

    2014-04-30

    Acknowledgments The research described here was based on work supported by the US Army Research Office under awards W911NG-13-0217 ( DDD ) and W911NF-12-1...0161 (ELD), and the US Defense Threat Reduc- tion Agency (DTRA) under award HDTRA1-12-1-0011 ( DDD ). William L. Shaw acknowledges support from the

  9. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    NASA Astrophysics Data System (ADS)

    Greitzer, Frank L.; Frincke, Deborah A.

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, to support a move from an insider threat detection stance to one that enables prediction of potential insider presence. Twodistinctiveaspects of the approach are the objectiveof predicting or anticipating potential risksandthe useoforganizational datain additiontocyber datato support the analysis. The chapter describes the challenges of this endeavor and reports on progressin definingausablesetof predictiveindicators,developingaframeworkfor integratingthe analysisoforganizationalandcyber securitydatatoyield predictions about possible insider exploits, and developing the knowledge base and reasoning capabilityof the system.We also outline the typesof errors that oneexpectsina predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  10. Genetic Influences on the Neural and Physiological Bases of Acute Threat: A Research Domain Criteria (RDoC) Perspective

    PubMed Central

    Sumner, Jennifer A.; Powers, Abigail; Jovanovic, Tanja; Koenen, Karestan C.

    2015-01-01

    The NIMH Research Domain Criteria (RDoC) initiative aims to describe key dimensional constructs underlying mental function across multiple units of analysis—from genes to observable behaviors—in order to better understand psychopathology. The acute threat (“fear”) construct of the RDoC Negative Valence System has been studied extensively from a translational perspective, and is highly pertinent to numerous psychiatric conditions, including anxiety and trauma-related disorders. We examined genetic contributions to the construct of acute threat at two units of analysis within the RDoC framework: 1) neural circuits and 2) physiology. Specifically, we focused on genetic influences on activation patterns of frontolimbic neural circuitry and on startle, skin conductance, and heart rate responses. Research on the heritability of activation in threat-related frontolimbic neural circuitry is lacking, but physiological indicators of acute threat have been found to be moderately heritable (35-50%). Genetic studies of the neural circuitry and physiology of acute threat have almost exclusively relied on the candidate gene method and, as in the broader psychiatric genetics literature, most findings have failed to replicate. The most robust support has been demonstrated for associations between variation in the serotonin transporter (SLC6A4) and catechol-O-methyltransferase (COMT) genes with threat-related neural activation and physiological responses. However, unbiased genome-wide approaches using very large samples are needed for gene discovery, and these can be accomplished with collaborative consortium-based research efforts, such as those of the Psychiatric Genomics Consortium (PGC) and Enhancing Neuro Imaging Genetics through Meta-Analysis (ENIGMA) Consortium. PMID:26377804

  11. Lightening Body Armor: Arroyo Support to the Army Response to Section 125 of the National Defense Authorization Act for Fiscal Year 2011

    DTIC Science & Technology

    2012-01-01

    nel from fragmenting munitions, and the addition of SAPI will successfully defend against AK-47 ball ammunition. The ESAPI and XSAPI plates were...d ) Frequency of incidents of firefights 7.62 x 39mm ball Fragmenting munitions Threat X Threat Y Threat E Threat F Threat A Threat C Threat D...the threat in Afghani- stan today is primarily fragmenting munitions, 7.62mm x 39 ball bullets, and 7.62mm x 54R ball bullets. Current body armor

  12. Repetition of educational AIDS advertising affects attitudes.

    PubMed

    Schindler, Simon; Reinhard, Marc-André; Stahlberg, Dagmar

    2011-06-01

    In educational AIDS campaigns, initiators often use advertisements to warn about the threat of AIDS. The present Internet study (N = 283) tested the assumption of an inverted U-shaped relationship between the number of educational AIDS advertisements in a magazine and the perceived threat of AIDS among different groups (i.e., homosexual men and heterosexual men and women). This expectation was primarily based on signaling theory, which assumes that recipients use repetition frequency as a cue for judgments about the message. Results provided support for the expected inverted U-curve.

  13. Counter-regulating on the Internet: Threat elicits preferential processing of positive information.

    PubMed

    Greving, Hannah; Sassenberg, Kai; Fetterman, Adam

    2015-09-01

    The Internet is a central source of information. It is increasingly used for information search in self-relevant domains (e.g., health). Self-relevant topics are also associated with specific emotions and motivational states. For example, individuals may fear serious illness and feel threatened. Thus far, the impact of threat has received little attention in Internet-based research. The current studies investigated how threat influences Internet search. Threat is known to elicit the preferential processing of positive information. The self-directed nature of Internet search should particularly provide opportunities for such processing behavior. We predicted that during Internet search, more positive information would be processed (i.e., allocated more attention to) and more positive knowledge would be acquired under threat than in a control condition. Three experiments supported this prediction: Under threat, attention is directed more to positive web pages (Study 1) and positive links (Study 2), and more positive information is acquired (Studies 1 and 3) than in a control condition. Notably, the effect on knowledge acquisition was mediated by the effect on attention allocation during an actual Internet search (Study 1). Thus, Internet search under threat leads to selective processing of positive information and dampens threatened individuals' negative affect. (c) 2015 APA, all rights reserved).

  14. Children and Terrorism-Related News: Training Parents in Coping and Media Literacy

    PubMed Central

    Comer, Jonathan S.; Furr, Jami M.; Beidas, Rinad S.; Weiner, Courtney L.; Kendall, Philip C.

    2009-01-01

    This study examined associations between televised news regarding risk for future terrorism and youth outcomes and investigated the effects of training mothers in an empirically based approach to addressing such news with children. This approach—Coping and Media Literacy (CML)—emphasized modeling, media literacy, and contingent reinforcement and was compared via randomized design to Discussion as Usual (DAU). Ninety community youth (aged 7−13 years) and their mothers viewed a televised news clip about the risk of future terrorism, and threat perceptions and state anxiety were assessed preclip, postclip, and postdiscussion. Children responded to the clip with elevated threat perceptions and anxiety. Children of CML-trained mothers exhibited lower threat perceptions than DAU youth at postclip and at postdiscussion. Additionally, CML-trained mothers exhibited lower threat perceptions and state anxiety at postclip and postdiscussion than did DAU mothers. Moreover, older youth responded to the clip with greater societal threat perception than did younger youth. Findings document associations between terrorism-related news, threat perceptions, and anxiety and support the utility of providing parents with strategies for addressing news with children. Implications and research suggestions are discussed. PMID:18665686

  15. Children and terrorism-related news: training parents in Coping and Media Literacy.

    PubMed

    Comer, Jonathan S; Furr, Jami M; Beidas, Rinad S; Weiner, Courtney L; Kendall, Philip C

    2008-08-01

    This study examined associations between televised news regarding risk for future terrorism and youth outcomes and investigated the effects of training mothers in an empirically based approach to addressing such news with children. This approach--Coping and Media Literacy (CML)--emphasized modeling, media literacy, and contingent reinforcement and was compared via randomized design to Discussion as Usual (DAU). Ninety community youth (aged 7-13 years) and their mothers viewed a televised news clip about the risk of future terrorism, and threat perceptions and state anxiety were assessed preclip, postclip, and postdiscussion. Children responded to the clip with elevated threat perceptions and anxiety. Children of CML-trained mothers exhibited lower threat perceptions than DAU youth at postclip and at postdiscussion. Additionally, CML-trained mothers exhibited lower threat perceptions and state anxiety at postclip and postdiscussion than did DAU mothers. Moreover, older youth responded to the clip with greater societal threat perception than did younger youth. Findings document associations between terrorism-related news, threat perceptions, and anxiety and support the utility of providing parents with strategies for addressing news with children. Implications and research suggestions are discussed. Copyright 2008 APA, all rights reserved.

  16. The Ecuadorean Army, Security and Development in the 90s.

    DTIC Science & Technology

    1992-03-26

    Ecuador through its support for education, agriculture, health care and its participation in industry. It analyzes both internal and external threats to... Ecuador through its support for education, agriculture, health care and its participation in industry. It analyzes both internal and external threats...and internal threats. BACKGROUND Ecuador is situated in the northwest sector of South America and despite being one of the smaller countries in the

  17. Countering Threat Networks

    DTIC Science & Technology

    2016-12-21

    PLANNING TO COUNTER THREAT NETWORKS  Joint Intelligence Preparation of the Operational Environment and Threat Networks...Army Expeditionary Forensic Facility in Afghanistan ........ E-9 E-4 Exploitation Support to Intelligence Fusion and Decision Making ......... E-10...Approach The groundwork for successful countering threat networks activities starts with information and intelligence to develop an understanding

  18. Iranian threat: Key concerns for the combatant commander in response. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jasper, S.

    1996-03-05

    In the aftermath of the Gulf War with Iraq, the Islamic Republic of Iran has emerged as the greatest long-term threat to peace and stability in the Central Region. Through purchase of a wide range of high-tech weapons, Iran now has a formidable military force capable of influencing Gulf economic policy. However, in the event of Iranian aggression, the United States Central Command stands ready to defend vital U.S. interests in the Middle East. The national strategy of Iran is bound by the religious tenets of Islam and an oil based economy struggling to support a population which has explodedmore » over the past sixteen years. Iran seeks to build global alliances for export of oil and liquid petroleum gas while continuing support for Islamic communities under attack. Iran perceives the U.S. and the emerging regional order to be the greatest threat to the republic`s existence and, in response, has bought fast attack missile patrol boats, diesel electric submarines, ballistic missiles and long range strike aircraft. Iran is now capable of conducting terrorist activities, denying international access to the Gulf and threatening the region with chemical/biological weapons. The Combatant Commander`s theater strategy must be tailored to respond rapidly and decisively to the growing Iranian threat.« less

  19. Evaluative threat and ambulatory blood pressure: cardiovascular effects of social stress in daily experience.

    PubMed

    Smith, Timothy W; Birmingham, Wendy; Uchino, Bert N

    2012-11-01

    Physiological effects of social evaluation are central in models of psychosocial influences on physical health. Experimental manipulations of evaluative threat evoke substantial cardiovascular and neuroendocrine responses in laboratory studies, but only preliminary evidence is available regarding naturally occurring evaluative threats in daily life. In such nonexperimental ambulatory studies, it is essential to distinguish effects of evaluative threat from related constructs known to alter stress, such as ability perceptions and concerns about appearance. 94 married, working couples (mean age 29.2 years) completed a 1-day (8 a.m. to 10 p.m.) ambulatory blood pressure protocol with random interval-contingent measurements using a Suntech monitor and Palm Pilot-based measures of control variables and momentary experiences of social-evaluative threat, concerns about appearance, and perceived ability. In hierarchical analyses for couples and multiple measurement occasions (Proc Mixed; SAS) and controlling individual differences (BMI, age, income) and potential confounds (e.g., posture, activity), higher reports of social-evaluative threat were associated with higher concurrent systolic (estimate = .87, SE = .34) and diastolic blood pressure (estimate = 1.06; SE = .26), both p < .02. Effects of social-evaluative threat remained significant when perceived ability and appearance concerns were controlled. Naturally occurring social-evaluative threat during daily activity is associated with increased systolic and diastolic blood pressure. Given associations between ambulatory blood pressure and risk of cardiovascular disease, the findings support conceptual models of threats to the social self as a potentially important influence on physical health.

  20. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model.

    PubMed

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 ( N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 ( N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 ( N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 ( N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict.

  1. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    PubMed Central

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  2. 78 FR 53736 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-30

    ...: Title, Associated Form and OMB Number: Defense Industrial Base Cyber Security/Information Assurance (DIB CS/IA) Cyber Incident Reporting; OMB Control Number 0704-0489. Type of Request: Reinstatement without.... The requested information supports the collaborative cyber threat information sharing and incident...

  3. Active-passive bistatic surveillance for long range air defense

    NASA Astrophysics Data System (ADS)

    Wardrop, B.; Molyneux-Berry, M. R. B.

    1992-06-01

    A hypothetical mobile support receiver capable of working within existing and future air defense networks as a means to maintain essential surveillance functions is considered. It is shown how multibeam receiver architecture supported by digital signal processing can substantially improve surveillance performance against chaff and jamming threats. A dual-mode support receiver concept is proposed which is based on the state-of-the-art phased-array technology, modular processing in industry standard hardware and existing networks.

  4. Strategy to increase Barangan Banana production in Kabupaten Deli Serdang

    NASA Astrophysics Data System (ADS)

    Adhany, I.; Chalil, D.; Ginting, R.

    2018-02-01

    This study was conducted to analyze internal and external factors in increasing Barangan Banana production in Kabupaten Deli Serdang. Samples were determined by snowball sampling technique and purposive sampling method. Using SWOT analysis method, this study found that there were 6 internal strategic factors and 9 external strategic factors. Among that strategic factors, support for production facilities appears as the most important internal strategic factor, while the demand for Barangan Banana. as the most important external strategic factor. Based on the importance and existing condition of these strategic factors, using support for production facilities and realization of supporting facilities with farming experience are the strategies covering strength-opportunity (SO), organizing mentoring to meet the demand for Barangan Banana are the strategies covering weakness-opportunity (WO), making use of funding support and subsidies to widen the land, using tissue culture seeds and facilities and infrastructures are the strategies covering strength-threat (ST), increas the funding support to widen the land, the use of tissue culture seeds and facilities and infrastructures are the strategies covering weakness-threat (WT) are discussed and proposed to increase Barangan Banana productivity in Kabupaten Deli Serdang.

  5. Political conservatism, authoritarianism, and societal threat: voting for Republican representatives in U.S. Congressional elections from 1946 to 1992.

    PubMed

    McCann, Stewart J H

    2009-07-01

    The author found that the degree of national societal threat preceding congressional elections from 1946 to 1992 was positively associated with the mean state percentage of people voting for Republican representatives, supporting a conventional threat-authoritarianism hypothesis. However, threat was positively associated with the mean state percentage of people voting for Republican representatives in conservative states but not in liberal states, and the conventional threat-authoritarianism link was entirely driven by the relation in conservative states. The author classified states with a composite measure (alpha = .92) on the basis of state ideological identification, religious fundamentalism, composite policy liberalism, Republican Party elite ideology, and Democratic Party elite ideology. These results offer support to an interactive threat-authoritarianism hypothesis derived from the authoritarian dynamic theory of K. Stenner (2005), which postulates that only authoritarian persons are activated to manifest authoritarian behavior in times of normative threat. Also, the author discusses potential alternative explanations on the basis of system justification, need for closure, and terror-management theories.

  6. Societal threat, authoritarianism, conservatism, and U.S. state death penalty sentencing (1977-2004).

    PubMed

    McCann, Stewart J H

    2008-05-01

    On the basis of K. Stenner's (2005) authoritarian dynamic theory, it was hypothesized that the number of death sentences and executions would be higher in more threatened conservative states than in less threatened conservative states, and would be lower in more threatened liberal states than in less threatened liberal states. Threat was based on state homicide rate, violent crime rate, and non-White percentage of population. Conservatism was based on state voter ideological identification, Democratic and Republican Party elite liberalism-conservatism, policy liberalism-conservatism, religious fundamentalism, degree of economic freedom, and 2004 presidential election results. For 1977-2004, with controls for state population and years with a death penalty provision, the interactive hypothesis received consistent support using the state conservatism composite and voter ideological identification alone. As well, state conservatism was related to death penalties and executions, but state threat was not. The temporal stability of the findings was demonstrated with a split-half internal replication using the periods 1977-1990 and 1991-2004. The interactive hypothesis and the results also are discussed in the context of other threat-authoritarianism theories and terror management theory. (c) 2008 APA, all rights reserved

  7. Cascading effects of interparental conflict in adolescence: Linking threat appraisals, self-efficacy, and adjustment.

    PubMed

    Fosco, Gregory M; Feinberg, Mark E

    2015-02-01

    This study examined the longitudinal implications of adolescents' exposure to interparental conflict for their developmental success. In the proposed developmental cascade model, adolescents' perceptions of parental conflict as threatening is a risk factor for diminished self-efficacy, which would account for diminished adjustment. This study presents longitudinal data for 768 sixth-grade students and their families over four time points, ending in eighth grade. Analyses were conducted in three steps. First, replication of longitudinal support for threat as a mediator of the link between interparental conflict and emotional distress was found; however, findings did not support threat as a mediator of behavior problems or subjective well-being. Second, threat was found to mediate the longitudinal association between interparental conflict and self-efficacy. Third, a developmental cascade model supported a risk process in which interparental conflict was related to adolescents' threat appraisals, which undermined self-efficacy beliefs, and was then linked with emotional distress, behavior problems, and subjective well-being.

  8. Cascading Effects of Interparental Conflict in Adolescence: Linking Threat Appraisals, Self-Efficacy, and Adjustment

    PubMed Central

    Fosco, Gregory M.; Feinberg, Mark E.

    2015-01-01

    This study examined the longitudinal implications of adolescents’ exposure to interparental conflict for their developmental success. In the proposed developmental cascade model, adolescents’ perceptions of parental conflict as threatening is a risk factor for diminished self-efficacy, which would account for diminished adjustment. This study presents longitudinal data for 768 6th-grade students and their families over four time points, ending in 8th grade. Analyses were conducted in three steps. First, replication of longitudinal support for threat as a mediator of the link between interparental conflict and emotional distress was found; however, findings did not support threat as a mediator of behavior problems or subjective well-being. Second, threat was found to mediate the longitudinal association between interparental conflict and self-efficacy. Finally, a developmental cascade model supported a risk process in which interparental conflict was related to adolescents’ threat appraisals, which undermined self-efficacy beliefs, and was then linked with emotional distress, behavior problems, and subjective well-being. PMID:25017469

  9. Twenty Years of Stereotype Threat Research: A Review of Psychological Mediators.

    PubMed

    Pennington, Charlotte R; Heim, Derek; Levy, Andrew R; Larkin, Derek T

    2016-01-01

    This systematic literature review appraises critically the mediating variables of stereotype threat. A bibliographic search was conducted across electronic databases between 1995 and 2015. The search identified 45 experiments from 38 articles and 17 unique proposed mediators that were categorized into affective/subjective (n = 6), cognitive (n = 7) and motivational mechanisms (n = 4). Empirical support was accrued for mediators such as anxiety, negative thinking, and mind-wandering, which are suggested to co-opt working memory resources under stereotype threat. Other research points to the assertion that stereotype threatened individuals may be motivated to disconfirm negative stereotypes, which can have a paradoxical effect of hampering performance. However, stereotype threat appears to affect diverse social groups in different ways, with no one mediator providing unequivocal empirical support. Underpinned by the multi-threat framework, the discussion postulates that different forms of stereotype threat may be mediated by distinct mechanisms.

  10. Twenty Years of Stereotype Threat Research: A Review of Psychological Mediators

    PubMed Central

    Pennington, Charlotte R.; Heim, Derek; Levy, Andrew R.; Larkin, Derek T.

    2016-01-01

    This systematic literature review appraises critically the mediating variables of stereotype threat. A bibliographic search was conducted across electronic databases between 1995 and 2015. The search identified 45 experiments from 38 articles and 17 unique proposed mediators that were categorized into affective/subjective (n = 6), cognitive (n = 7) and motivational mechanisms (n = 4). Empirical support was accrued for mediators such as anxiety, negative thinking, and mind-wandering, which are suggested to co-opt working memory resources under stereotype threat. Other research points to the assertion that stereotype threatened individuals may be motivated to disconfirm negative stereotypes, which can have a paradoxical effect of hampering performance. However, stereotype threat appears to affect diverse social groups in different ways, with no one mediator providing unequivocal empirical support. Underpinned by the multi-threat framework, the discussion postulates that different forms of stereotype threat may be mediated by distinct mechanisms. PMID:26752551

  11. Strategic Planning for School Success.

    ERIC Educational Resources Information Center

    Herman, Jerry J.

    1993-01-01

    Strategic planners concerned with such matters as high-achieving students, high-performing teachers, broad-based community support, and a two-way involvement with the community must analyze the strengths, weaknesses, opportunities, and threats existing in the school's internal and external environment. A sample SWOT analysis is included. (MLH)

  12. An integrated process and management tools for ranking multiple emerging threats to animal health.

    PubMed

    Del Rio Vilas, Victor J; Voller, Fay; Montibeller, Gilberto; Franco, L Alberto; Sribhashyam, Sumitra; Watson, Eamon; Hartley, Matt; Gibbens, Jane C

    2013-02-01

    The UK's Department for Environment, Food and Rural Affairs supports the use of systematic tools for the prioritisation of known and well defined animal diseases to facilitate long and medium term planning of surveillance and disease control activities. The recognition that emerging events were not covered by the existing disease-specific approaches led to the establishment of the Veterinary Risk Group (VRG), constituted of government officials, and supporting structures such as the Risk Management Cycle and the Emerging Threat Highlight Report (ETHiR), to facilitate the identification, reporting and assessment of emerging threats to UK's animal health. Since its inception in November 2009 to the end of February 2011, the VRG reviewed 111 threats and vulnerabilities (T&V) reported through ETHiR. In July 2010 a decision support system (DSS) based on multi-criteria-decision-analysis (MCDA) improved ETHiR to allow the systematic prioritisation of emerging T&V. The DSS allows the regular ranking of emerging T&V by calculating a set of measurement indices related to the actual impact, possible impact on public perception and level of available capabilities associated with every T&V. The systematic characterisation of the processes leading to the assessment of T&V by the VRG has led to a consistent, auditable and transparent approach to the identification and assessment of emerging risks. The regular use of MCDA to manage a portfolio of emerging risks represents a different and novel application of MCDA in a health related context. Crown Copyright © 2012. Published by Elsevier B.V. All rights reserved.

  13. Policy guidance on threats to legislative interventions in public health: a realist synthesis.

    PubMed

    Wong, Geoff; Pawson, Ray; Owen, Lesley

    2011-04-10

    Legislation is one of the most powerful weapons for improving population health and is often used by policy and decision makers. Little research exists to guide them as to whether legislation is feasible and/or will succeed. We aimed to produce a coherent and transferable evidence based framework of threats to legislative interventions to assist the decision making process and to test this through the 'case study' of legislation to ban smoking in cars carrying children. We conceptualised legislative interventions as a complex social interventions and so used the realist synthesis method to systematically review the literature for evidence. 99 articles were found through searches on five electronic databases (MEDLINE, HMIC, EMBASE, PsychINFO, Social Policy and Practice) and iterative purposive searching. Our initial searches sought any studies that contained information on smoking in vehicles carrying children. Throughout the review we continued where needed to search for additional studies of any type that would conceptually contribute to helping build and/or test our framework. Our framework identified a series of transferable threats to public health legislation. When applied to smoking bans in vehicles; problem misidentification; public support; opposition; and enforcement issues were particularly prominent threats. Our framework enabled us to understand and explain the nature of each threat and to infer the most likely outcome if such legislation were to be proposed in a jurisdiction where no such ban existed. Specifically, the micro-environment of a vehicle can contain highly hazardous levels of second hand smoke. Public support for such legislation is high amongst smokers and non-smokers and their underlying motivations were very similar - wanting to practice the Millian principle of protecting children from harm. Evidence indicated that the tobacco industry was not likely to oppose legislation and arguments that such a law would be 'unenforceable' were unfounded. It is possible to develop a coherent and transferable evidence based framework of the ideas and assumptions behind the threats to legislative intervention that may assist policy and decision makers to analyse and judge if legislation is feasible and/or likely to succeed.

  14. Policy guidance on threats to legislative interventions in public health: a realist synthesis

    PubMed Central

    2011-01-01

    Background Legislation is one of the most powerful weapons for improving population health and is often used by policy and decision makers. Little research exists to guide them as to whether legislation is feasible and/or will succeed. We aimed to produce a coherent and transferable evidence based framework of threats to legislative interventions to assist the decision making process and to test this through the 'case study' of legislation to ban smoking in cars carrying children. Methods We conceptualised legislative interventions as a complex social interventions and so used the realist synthesis method to systematically review the literature for evidence. 99 articles were found through searches on five electronic databases (MEDLINE, HMIC, EMBASE, PsychINFO, Social Policy and Practice) and iterative purposive searching. Our initial searches sought any studies that contained information on smoking in vehicles carrying children. Throughout the review we continued where needed to search for additional studies of any type that would conceptually contribute to helping build and/or test our framework. Results Our framework identified a series of transferable threats to public health legislation. When applied to smoking bans in vehicles; problem misidentification; public support; opposition; and enforcement issues were particularly prominent threats. Our framework enabled us to understand and explain the nature of each threat and to infer the most likely outcome if such legislation were to be proposed in a jurisdiction where no such ban existed. Specifically, the micro-environment of a vehicle can contain highly hazardous levels of second hand smoke. Public support for such legislation is high amongst smokers and non-smokers and their underlying motivations were very similar - wanting to practice the Millian principle of protecting children from harm. Evidence indicated that the tobacco industry was not likely to oppose legislation and arguments that such a law would be 'unenforceable' were unfounded. Conclusion It is possible to develop a coherent and transferable evidence based framework of the ideas and assumptions behind the threats to legislative intervention that may assist policy and decision makers to analyse and judge if legislation is feasible and/or likely to succeed. PMID:21477347

  15. The North American model and captive cervid facilities—What is the threat?

    USGS Publications Warehouse

    Organ, John F.; Decker, Thomas A.; Lama, Tanya M.

    2016-01-01

    The North American Model of Wildlife Conservation represents the key principles that in combination resulted in a distinct form of wildlife conservation in the United States and Canada. How and to what extent captive cervid facilities comport with or conflict with these principles has implications for wildlife conservation. Greatest threats appear to be toward principles of public ownership of wildlife, allocation of wildlife by law, and in policy decisions based on science. Captive cervid facilities have potential to contribute to erosion of the underlying principles of the Model and could undermine public support for conservation initiatives.

  16. Risk analysis of information security in a mobile instant messaging and presence system for healthcare.

    PubMed

    Bønes, Erlend; Hasvold, Per; Henriksen, Eva; Strandenaes, Thomas

    2007-09-01

    Instant messaging (IM) is suited for immediate communication because messages are delivered almost in real time. Results from studies of IM use in enterprise work settings make us believe that IM based services may prove useful also within the healthcare sector. However, today's public instant messaging services do not have the level of information security required for adoption of IM in healthcare. We proposed MedIMob, our own architecture for a secure enterprise IM service for use in healthcare. MedIMob supports IM clients on mobile devices in addition to desktop based clients. Security threats were identified in a risk analysis of the MedIMob architecture. The risk analysis process consists of context identification, threat identification, analysis of consequences and likelihood, risk evaluation, and proposals for risk treatment. The risk analysis revealed a number of potential threats to the information security of a service like this. Many of the identified threats are general when dealing with mobile devices and sensitive data; others are threats which are more specific to our service and architecture. Individual threats identified in the risks analysis are discussed and possible counter measures presented. The risk analysis showed that most of the proposed risk treatment measures must be implemented to obtain an acceptable risk level; among others blocking much of the additional functionality of the smartphone. To conclude on the usefulness of this IM service, it will be evaluated in a trial study of the human-computer interaction. Further work also includes an improved design of the proposed MedIMob architecture. 2006 Elsevier Ireland Ltd

  17. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  18. National Labs and Nuclear Emergency Response

    NASA Astrophysics Data System (ADS)

    Budil, Kimberly

    2015-04-01

    The DOE national laboratories, and in particular the three NNSA national security laboratories, have long supported a broad suite of national nuclear security missions for the U.S. government. The capabilities, infrastructure and base of expertise developed to support the U.S. nuclear weapons stockpile have been applied to such challenges as stemming nuclear proliferation, understanding the nuclear capabilities of adversaries, and assessing and countering nuclear threats including essential support to nuclear emergency response. This talk will discuss the programs that are underway at the laboratories and the essential role that science and technology plays therein. Nuclear scientists provide expertise, fundamental understanding of nuclear materials, processes and signatures, and tools and technologies to aid in the identification and mitigation of nuclear threats as well as consequence management. This talk will also discuss the importance of direct engagement with the response community, which helps to shape research priorities and to enable development of useful tools and techniques for responders working in the field. National Labs and Nuclear Emergency Response.

  19. Towards public health decision support: a systematic review of bidirectional communication approaches.

    PubMed

    Dixon, Brian E; Gamache, Roland E; Grannis, Shaun J

    2013-05-01

    To summarize the literature describing computer-based interventions aimed at improving bidirectional communication between clinical and public health. A systematic review of English articles using MEDLINE and Google Scholar. Search terms included public health, epidemiology, electronic health records, decision support, expert systems, and decision-making. Only articles that described the communication of information regarding emerging health threats from public health agencies to clinicians or provider organizations were included. Each article was independently reviewed by two authors. Ten peer-reviewed articles highlight a nascent but promising area of research and practice related to alerting clinicians about emerging threats. Current literature suggests that additional research and development in bidirectional communication infrastructure should focus on defining a coherent architecture, improving interoperability, establishing clear governance, and creating usable systems that will effectively deliver targeted, specific information to clinicians in support of patient and population decision-making. Increasingly available clinical information systems make it possible to deliver timely, relevant knowledge to frontline clinicians in support of population health. Future work should focus on developing a flexible, interoperable infrastructure for bidirectional communications capable of integrating public health knowledge into clinical systems and workflows.

  20. Strategic Analysis of Family Support in EHDI Systems

    ERIC Educational Resources Information Center

    Bradham, Tamala S.; Houston, K. Todd; Guignard, Gayla Hutsell; Hoffman, Jeff

    2011-01-01

    State coordinators of early hearing detection and intervention (EHDI) programs completed a strengths, weaknesses, opportunities, and threats, or SWOT, analysis that examined 12 areas within state EHDI programs. For the family support area, 47 EHDI coordinators listed 255 items, and themes were identified within each category. A threats,…

  1. 75 FR 53705 - Science and Technology (S&T) Directorate; Agency Information Collection Activities: Submission...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-01

    ... Defense of Infrastructure Against Cyber Threats (PREDICT) Program AGENCY: Science and Technology... Defense of Infrastructure Against Cyber Threats (PREDICT) initiative. PREDICT is an initiative to... new models, technologies and products that support effective threat assessment and increase cyber...

  2. Virtual sea border

    NASA Astrophysics Data System (ADS)

    Ferriere, D.; Rucinski, A.; Jankowski, T.

    2007-04-01

    Establishing a Virtual Sea Border by performing a real-time, satellite-accessible Internet-based bio-metric supported threat assessment of arriving foreign-flagged cargo ships, their management and ownership, their arrival terminal operator and owner, and rewarding proven legitimate operators with an economic incentive for their transparency will simultaneously improve port security and maritime transportation efficiencies.

  3. 75 FR 62837 - Cooperative Agreement To Support Building Global Capacity for the Surveillance and Monitoring of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-13

    ... solutions through global collaboration and evidence-based approaches. C. Eligibility Information The.../Falsified Medicines and Supply Chain Threats AGENCY: Food and Drug Administration, HHS. ACTION: Notice... medicines and risks and breaches in the supply. FOR FURTHER INFORMATION AND ADDITIONAL REQUIREMENTS CONTACT...

  4. Predicting Marital and Career Success among Dual-worker Couples.

    ERIC Educational Resources Information Center

    Journal of Marriage and the Family, 1982

    1982-01-01

    Reviews research both supportive and skeptical of theories (based upon status competition processes, status incompatibility, complementary needs, and threat to gender identity) which posit that stress is created in marriages where the wife's occupational achievements exceed the husband's. Posits a theory explaining which couples will succeed in…

  5. Stereotype threat's effect on women's achievement in chemistry: The interaction of achievement goal orientation for women in science majors

    NASA Astrophysics Data System (ADS)

    Conway-Klaassen, Janice Marjorie

    "Stereotype threat is being at risk of confirming, as a self-characteristic, a negative stereotype about one's group" (C. M. Steele & Aronson, 1995, p. 797). A stereotype threat effect then is described as the detrimental impact on a person's performance or achievement measurements when they are placed in a stereotype threat environment. For women, the negative stereotype that exists in our culture states that women are typically not as capable as men in mathematics or science subjects. This study specifically explored the potential impact of stereotype threat on women who have chosen a science-based college major. They were tested in the domain of chemistry, which is related to mathematics and often involves high level of mathematics skills. I attempted to generate a stereotype threat in the participants through describing a chemistry challenge exam as either one that had consistently shown a gender bias against women and to create a nullification effect by describing the exam as one that had shown no gender bias in the past. In the third experimental condition acting as a control, participants received only generic instructions related to taking the test itself. The second part of this study investigated whether stereotype threat effects could impact women's achievement goal orientations. In previous studies performance avoidance goal orientations have been associated with individuals placed in a stereotype threat environment. The findings on the stereotype threat effect were not significant for the chemistry challenge test achievement scores. This may be due to several factors. One factor may be the design of the chemistry challenge test and the instructions for the test. The other factor may be the women in this study. As individuals who have chosen a science based major, they may have developed coping skills and strategies that reduced the impact of a stereotype threat. It is also possible that the testing environment itself generated an implicit stereotype type threat effect which reduced the differences among the experimental conditions. However, there were significant findings related to the participants' achievement goal orientations. Individuals in the stereotype threat condition displayed higher levels of performance avoidance, overall performance, and overall avoidance goal orientations consistent with the existing literature. Post-hoc open-ended questionnaires revealed that most participants believed that men and women were equally capable in mathematics and sciences but that they also had an awareness of the negative stereotype against women in mathematics and sciences among the public. This study supports the demonstration of stereotype threat effects on women who are enrolled in science based college majors. Although I was not able to create a stereotype threat effect on their chemistry challenge test scores, I was able to demonstrate an effect on their achievement goal orientations, which has implications for instructional design and standardized testing.

  6. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education.

    PubMed

    Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K

    2013-08-09

    Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.

  7. Striving for group agency: threat to personal control increases the attractiveness of agentic groups.

    PubMed

    Stollberg, Janine; Fritsche, Immo; Bäcker, Anna

    2015-01-01

    When their sense of personal control is threatened people try to restore perceived control through the social self. We propose that it is the perceived agency of ingroups that provides the self with a sense of control. In three experiments, we for the first time tested the hypothesis that threat to personal control increases the attractiveness of being part or joining those groups that are perceived as coherent entities engaging in coordinated group goal pursuit (agentic groups) but not of those groups whose agency is perceived to be low. Consistent with this hypothesis we found in Study 1 (N = 93) that threat to personal control increased ingroup identification only with task groups, but not with less agentic types of ingroups that were made salient simultaneously. Furthermore, personal control threat increased a sense of collective control and support within the task group, mediated through task-group identification (indirect effects). Turning to groups people are not (yet) part of, Study 2 (N = 47) showed that personal control threat increased relative attractiveness ratings of small groups as possible future ingroups only when the relative agency of small groups was perceived to be high. Perceived group homogeneity or social power did not moderate the effect. Study 3 (N = 78) replicated the moderating role of perceived group agency for attractiveness ratings of entitative groups, whereas perceived group status did not moderate the effect. These findings extend previous research on group-based control, showing that perceived agency accounts for group-based responses to threatened control.

  8. Threat Perception and Attitudes of Adolescents Towards Re-Introduced Wild Animals: A qualitative study of young learners from affected regions in Germany

    NASA Astrophysics Data System (ADS)

    Hermann, Nadin; Menzel, Susanne

    2013-12-01

    Conservation efforts such as the restoration of European bison or the support of wolf immigration into Germany are often socio-scientifically controversial. In many cases, disputes are based on individuals' threat perception and attitudes towards the animal involved. The herewith reported study provides qualitative insights into German adolescents' (n = 31, Mage = 16.6 years) attitudes towards animal reintroduction, their threat and coping appraisal about wildlife and their knowledge of local endangered species. We found that students had rather limited knowledge of local endangered species. After Kellert's categories of animal attitudes, the adolescents showed a strong moralistic view on wildlife return. Naturalistic, ecologistic and utilitarian views were also strongly apparent. According to the Protection Motivation Theory, perceived threats could be identified as threats to animals on the one hand and threats to human interests on the other. Such threat perceptions often lead to a dilemma, which made it difficult to decide upon the priorities of wildlife protection versus protection of human interests. Coping mechanism to reduce threats to human interests as mentioned by the participants included restrictions of the animal as well as strategies that focused on responsibility by humans. Regarding coping mechanism to prevent the species' extinction, participants showed a relatively superficial understanding. Furthermore, we found that participants from regions where wolves are currently immigrating or European bison are being reintroduced showed a more positive understanding of the respective animal. Our findings are discussed in the light of this topic's potential as an example of a real-life socio-scientific issue in classroom discussions.

  9. Asymmetric peer selections among Blacks, Asians, and Whites in a virtual environment: Preliminary evidence for triangulated threat theory.

    PubMed

    Tawa, John

    2017-01-01

    Black, Asian, and White participants (N = 210) created self-resembling avatars and engaged in peer-selection tasks during social events in the virtual world, Second Life, that were designed to simulate various types of resource competition. Participants in merit-based resource competition settings had less diversity in their peer groups compared to participants in settings where no resource competition was present, and Asian participants had lower preference for Black peers. Furthermore, these relationships were mediated by out-group discomfort. Results are discussed in relation to partial support for triangulated threat theory of group relations among Blacks, Asians, and Whites.

  10. The importance of coping, threat appraisal, and beliefs in understanding and responding to fear of victimization: applications to a male prisoner sample.

    PubMed

    Ireland, Jane L

    2011-08-01

    The current study explores conceptualizations of victimization by men, focusing on threat appraisal, coping appraisal, and beliefs, and seeking to apply protection motivation theory, the applied fear response model, and social cognition. Five hundred and sixty-six male prisoners, comprising adults and adolescents, completed a measure of victimization and perpetration (DIPC-SCALED) and of fear, appraisal, and beliefs (TAB). It was predicted that increased threat appraisal and ineffective coping appraisal would predict increased fear of victimization, particularly among the mutual perpetrator/victim group. This group was expected to select strategies for managing the threat of victimization, which carried more risk to them (e.g., such as an aggressive reaction) and to present with beliefs supporting the use of aggression as a response to victimization. Fear of victimization was predicted by threat and coping appraisal although the deficit for victims appeared in coping appraisal only. Mutual perpetrator/victims presented with a specific difficulty in appraising their ability to cope with threat. Differences in beliefs supporting an aggressive response to threat were also noted across perpetrator and/or victimization groups. The article concludes by outlining the implications for theory and clinical practice.

  11. Consistent approach to describing aircraft HIRF protection

    NASA Technical Reports Server (NTRS)

    Rimbey, P. R.; Walen, D. B.

    1995-01-01

    The high intensity radiated fields (HIRF) certification process as currently implemented is comprised of an inconsistent combination of factors that tend to emphasize worst case scenarios in assessing commercial airplane certification requirements. By examining these factors which include the process definition, the external HIRF environment, the aircraft coupling and corresponding internal fields, and methods of measuring equipment susceptibilities, activities leading to an approach to appraising airplane vulnerability to HIRF are proposed. This approach utilizes technically based criteria to evaluate the nature of the threat, including the probability of encountering the external HIRF environment. No single test or analytic method comprehensively addresses the full HIRF threat frequency spectrum. Additional tools such as statistical methods must be adopted to arrive at more realistic requirements to reflect commercial aircraft vulnerability to the HIRF threat. Test and analytic data are provided to support the conclusions of this report. This work was performed under NASA contract NAS1-19360, Task 52.

  12. When sexual threat cues shape attitudes toward immigrants: the role of insecurity and benevolent sexism

    PubMed Central

    Sarrasin, Oriane; Fasel, Nicole; Green, Eva G. T.; Helbling, Marc

    2015-01-01

    Drawing on psychological and political science research on individuals’ sensitivity to threat cues, the present study examines reactions to political posters that depict male immigrants as a sexual danger. We expect anti-immigrant attitudes to be more strongly predicted by feelings of insecurity or representations of men and women as strong and fragile when individuals are exposed to sexual threat cues than when they are not. Results from two online experiments conducted in Switzerland and Germany largely confirmed these assumptions. Comparing two anti-immigrant posters (general and non-sexual threat vs. sexual threat), Experiment 1 (n = 142) showed that feelings of insecurity were related to an increased support for expelling immigrants from the host country in both cases. However, only in the sexual threat cues condition and among female participants, were perceptions of women as fragile—as measured with benevolent sexism items—related to support for expelling immigrants. Further distinguishing between different forms of violence threat cues, Experiment 2 (n = 181) showed that collective feelings of insecurity were most strongly related to support for expelling immigrants when a male immigrant was presented as a violent criminal. In contrast, benevolent sexist beliefs were related to anti-immigrant stances only when participants were exposed to a depiction of a male immigrant as a rapist. In both cases attitudes were polarized: on the one hand, representations of immigrants as criminals provoked reactance reactions—that is, more positive attitudes—among participants scoring low in insecurity feelings or benevolent sexism. On the other hand, those scoring high in these dimensions expressed slightly more negative attitudes. Overall, by applying social psychological concepts to the study of anti-immigrant political campaigning, the present study demonstrated that individuals are sensitive to specific threat cues in posters. PMID:26283985

  13. When sexual threat cues shape attitudes toward immigrants: the role of insecurity and benevolent sexism.

    PubMed

    Sarrasin, Oriane; Fasel, Nicole; Green, Eva G T; Helbling, Marc

    2015-01-01

    Drawing on psychological and political science research on individuals' sensitivity to threat cues, the present study examines reactions to political posters that depict male immigrants as a sexual danger. We expect anti-immigrant attitudes to be more strongly predicted by feelings of insecurity or representations of men and women as strong and fragile when individuals are exposed to sexual threat cues than when they are not. Results from two online experiments conducted in Switzerland and Germany largely confirmed these assumptions. Comparing two anti-immigrant posters (general and non-sexual threat vs. sexual threat), Experiment 1 (n = 142) showed that feelings of insecurity were related to an increased support for expelling immigrants from the host country in both cases. However, only in the sexual threat cues condition and among female participants, were perceptions of women as fragile-as measured with benevolent sexism items-related to support for expelling immigrants. Further distinguishing between different forms of violence threat cues, Experiment 2 (n = 181) showed that collective feelings of insecurity were most strongly related to support for expelling immigrants when a male immigrant was presented as a violent criminal. In contrast, benevolent sexist beliefs were related to anti-immigrant stances only when participants were exposed to a depiction of a male immigrant as a rapist. In both cases attitudes were polarized: on the one hand, representations of immigrants as criminals provoked reactance reactions-that is, more positive attitudes-among participants scoring low in insecurity feelings or benevolent sexism. On the other hand, those scoring high in these dimensions expressed slightly more negative attitudes. Overall, by applying social psychological concepts to the study of anti-immigrant political campaigning, the present study demonstrated that individuals are sensitive to specific threat cues in posters.

  14. Development of vaccines for poultry against H5 avian influenza based on turkey herpesvirus vector

    USDA-ARS?s Scientific Manuscript database

    Avian influenza (AI) remains a major threat to public health as well as to the poultry industry. AI vaccines are considered a suitable tool to support AI control programs in combination with other control measures such as good biosecurity and monitoring programs. We constructed recombinant turkey he...

  15. Fort Valley studies: A natural laboratory for research and education

    Treesearch

    Brian W. Geils

    2008-01-01

    Drought, wildfire, extinction, and invasive species are considered serious threats to the health of our forests. Although these issues have global connections, we most readily see their consequences locally and attempt to respond with management based on science. For 100 years, the Fort Valley Experimental Forest (FVEF) has provided educational and experimental support...

  16. An Analysis of Modeling Success in Explosive Ordnance Disposal Training

    DTIC Science & Technology

    2010-03-01

    Iraq due to makeshift roadside bombs (Hagey, 2007). EOD units are the primary assets to respond to IED threats. In 2006 alone, the total number of...increase from 2007. One year later, IED attacks increased a further 146 percent (Brook, 2009). As the primary asset to respond to an IED threat, EOD...threats and help protect his units. EOD technicians support the battlefield commander by addressing the primary threats to the coalition forces

  17. It's like being in another world--patients' lived experience of magnetic resonance imaging.

    PubMed

    Törnqvist, Erna; Månsson, Asa; Larsson, Elna-Marie; Hallström, Inger

    2006-08-01

    The aim of this study was to illuminate patients' lived experience during magnetic resonance imaging. Magnetic resonance imaging has increased in importance since the early 1980s and is today a common useful diagnostic tool. Although magnetic resonance imaging are non-invasive and considered painless, many patients experience anxiety, sometimes so strong that the scan has to be terminated. The study had an inductive design and a hermeneutic phenomenological methodology was used. The essential theme of going through magnetic resonance imaging was a feeling of being in another world. The strange environment and isolation inside the scanner made the participants' experiences unusual, with varying degrees of difficulty dealing with it. Being in the other world caused a threat to the participants' self-control. There was a relation between threat to self-control, effort and need for support in the sense that the magnitude of threat to self-control had an impact on the effort it took to handle the situation and on the need for support, and conversely that the support received could affect the effort and threat to self-control. The study shows that the information received and the interaction between patients and staff have a significant influence on patients' lived experiences. The individual experience of threat to self-control requires the need for support to be individualized and care need to be adjusted for each patient.

  18. Scaring the Snus Out of Smokers: Testing Effects of Fear, Threat, and Efficacy on Smokers' Acceptance of Novel Smokeless Tobacco Products

    PubMed Central

    Popova, Lucy

    2014-01-01

    Novel smokeless tobacco products (such as snus) are aggressively promoted to smokers by the tobacco companies. The Extended Parallel Process Model (EPPM; Witte, 1992) was used to evaluate the current perceptions of threat, efficacy, attitudes, and behavioral intentions regarding snus in a nationally representative sample of 1,836 smokers. Participants were then exposed to messages designed to discourage smokers from trying snus. On average, smokers perceived health threats of snus as somewhat serious, but believed they can effectively avert this threat. Support was found for the EPPM's proposition that when efficacy is high, greater perceived threat is associated with greater desired outcomes (less favorable attitudes towards snus and lower behavioral intentions to try snus in the future). No support was found for the proposition that when perceived efficacy is low, greater threat is associated with greater message rejection. Instead, message rejection was explained by fear felt while exposed to the anti-smokeless ads. This finding indicates the need to more clearly distinguish between cognitive (danger control) and affective (fear control) responses posited by the EPPM. PMID:24359298

  19. Scrutinizing Homophobia: A Model of Perception of Homosexuals in Russia.

    PubMed

    Gulevich, Olga A; Osin, Evgeny N; Isaenko, Nadezhda A; Brainis, Lilia M

    2017-10-10

    We aimed to develop and validate a model of associations of perceived threat of homosexuals with lay beliefs about causes of homosexuality, group entitativity of homosexuals, approval of social action strategies targeting homosexuals, and support for their rights using original Russian-language measures. We tested the model in two samples of social network users (n = 1,007) and student respondents (n = 292) using structural equation modeling and path analysis. Attribution of homosexuality to social causes was a positive predictor of perceived threat of homosexuals, whereas biological causes showed an inverse effect. Perceived threat predicted approval of discriminatory strategies targeting homosexuals and lack of support for their rights and fully mediated the effects of causal beliefs on these variables. Group entitativity of homosexuals was a positive predictor of perceived threat and a significant moderator of its effects on support for punishment and medical treatment of homosexuals. We discuss the findings with reference to the Russian social context.

  20. Forthcoming Challenges in Mycotoxins Toxicology Research for Safer Food-A Need for Multi-Omics Approach.

    PubMed

    Dellafiora, Luca; Dall'Asta, Chiara

    2017-01-04

    The presence of mycotoxins in food represents a severe threat for public health and welfare, and poses relevant research challenges in the food toxicology field. Nowadays, food toxicologists have to provide answers to food-related toxicological issues, but at the same time they should provide the appropriate knowledge in background to effectively support the evidence-based decision-making in food safety. Therefore, keeping in mind that regulatory actions should be based on sound scientific findings, the present opinion addresses the main challenges in providing reliable data for supporting the risk assessment of foodborne mycotoxins.

  1. Forthcoming Challenges in Mycotoxins Toxicology Research for Safer Food—A Need for Multi-Omics Approach

    PubMed Central

    Dellafiora, Luca; Dall’Asta, Chiara

    2017-01-01

    The presence of mycotoxins in food represents a severe threat for public health and welfare, and poses relevant research challenges in the food toxicology field. Nowadays, food toxicologists have to provide answers to food-related toxicological issues, but at the same time they should provide the appropriate knowledge in background to effectively support the evidence-based decision-making in food safety. Therefore, keeping in mind that regulatory actions should be based on sound scientific findings, the present opinion addresses the main challenges in providing reliable data for supporting the risk assessment of foodborne mycotoxins. PMID:28054977

  2. Empirically based comparisons of the reliability and validity of common quantification approaches for eyeblink startle potentiation in humans

    PubMed Central

    Bradford, Daniel E.; Starr, Mark J.; Shackman, Alexander J.

    2015-01-01

    Abstract Startle potentiation is a well‐validated translational measure of negative affect. Startle potentiation is widely used in clinical and affective science, and there are multiple approaches for its quantification. The three most commonly used approaches quantify startle potentiation as the increase in startle response from a neutral to threat condition based on (1) raw potentiation, (2) standardized potentiation, or (3) percent‐change potentiation. These three quantification approaches may yield qualitatively different conclusions about effects of independent variables (IVs) on affect when within‐ or between‐group differences exist for startle response in the neutral condition. Accordingly, we directly compared these quantification approaches in a shock‐threat task using four IVs known to influence startle response in the no‐threat condition: probe intensity, time (i.e., habituation), alcohol administration, and individual differences in general startle reactivity measured at baseline. We confirmed the expected effects of time, alcohol, and general startle reactivity on affect using self‐reported fear/anxiety as a criterion. The percent‐change approach displayed apparent artifact across all four IVs, which raises substantial concerns about its validity. Both raw and standardized potentiation approaches were stable across probe intensity and time, which supports their validity. However, only raw potentiation displayed effects that were consistent with a priori specifications and/or the self‐report criterion for the effects of alcohol and general startle reactivity. Supplemental analyses of reliability and validity for each approach provided additional evidence in support of raw potentiation. PMID:26372120

  3. Scientifically defensible fish conservation and recovery plans: Addressing diffuse threats and developing rigorous adaptive management plans

    USGS Publications Warehouse

    Maas-Hebner, Kathleen G.; Schreck, Carl B.; Hughes, Robert M.; Yeakley, Alan; Molina, Nancy

    2016-01-01

    We discuss the importance of addressing diffuse threats to long-term species and habitat viability in fish conservation and recovery planning. In the Pacific Northwest, USA, salmonid management plans have typically focused on degraded freshwater habitat, dams, fish passage, harvest rates, and hatchery releases. However, such plans inadequately address threats related to human population and economic growth, intra- and interspecific competition, and changes in climate, ocean, and estuarine conditions. Based on reviews conducted on eight conservation and/or recovery plans, we found that though threats resulting from such changes are difficult to model and/or predict, they are especially important for wide-ranging diadromous species. Adaptive management is also a critical but often inadequately constructed component of those plans. Adaptive management should be designed to respond to evolving knowledge about the fish and their supporting ecosystems; if done properly, it should help improve conservation efforts by decreasing uncertainty regarding known and diffuse threats. We conclude with a general call for environmental managers and planners to reinvigorate the adaptive management process in future management plans, including more explicitly identifying critical uncertainties, implementing monitoring programs to reduce those uncertainties, and explicitly stating what management actions will occur when pre-identified trigger points are reached.

  4. Stress and eating: the effects of ego-threat and cognitive demand on food intake in restrained and emotional eaters.

    PubMed

    Wallis, D J; Hetherington, M M

    2004-08-01

    Restrained and emotional eaters overeat in response to stress. To compare differential effects of cognitive demand and ego-threatening stressors on subsequent chocolate intake, 38 females completed a neutral (control), an ego threatening and an incongruent Stroop colour-naming task on three separate occasions. Participants were assigned to four groups based on median-split scores on the restrained and emotional eating scales of the Dutch Eating Behaviour Questionnaire-high restraint/high emotional, high restraint/low emotional, low restraint/high emotional and low restraint/low emotional. Higher response latencies were observed in the incongruent task, confirming its greater cognitive (attentional) demand. Overall intake was enhanced by 23% after ego-threat and 15% after the incongruent Stroop task relative to control. Restraint was associated with greater intake after both ego-threat and the incongruent task than in the control condition. In contrast, emotional eating was associated with greater intake after only the ego-threat, relative to control. A positive association between reaction time and subsequent intake in all conditions for high restraint/low emotional eaters provided support for the limited capacity hypothesis. Enhanced intake in emotional eaters is proposed to relate to escape from self-awareness. These findings demonstrate differential effects of threat and demand on stress-related eating in restrained and emotional eaters.

  5. Fisk-based criteria to support validation of detection methods for drinking water and air.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonell, M.; Bhattacharyya, M.; Finster, M.

    2009-02-18

    This report was prepared to support the validation of analytical methods for threat contaminants under the U.S. Environmental Protection Agency (EPA) National Homeland Security Research Center (NHSRC) program. It is designed to serve as a resource for certain applications of benchmark and fate information for homeland security threat contaminants. The report identifies risk-based criteria from existing health benchmarks for drinking water and air for potential use as validation targets. The focus is on benchmarks for chronic public exposures. The priority sources are standard EPA concentration limits for drinking water and air, along with oral and inhalation toxicity values. Many contaminantsmore » identified as homeland security threats to drinking water or air would convert to other chemicals within minutes to hours of being released. For this reason, a fate analysis has been performed to identify potential transformation products and removal half-lives in air and water so appropriate forms can be targeted for detection over time. The risk-based criteria presented in this report to frame method validation are expected to be lower than actual operational targets based on realistic exposures following a release. Note that many target criteria provided in this report are taken from available benchmarks without assessing the underlying toxicological details. That is, although the relevance of the chemical form and analogues are evaluated, the toxicological interpretations and extrapolations conducted by the authoring organizations are not. It is also important to emphasize that such targets in the current analysis are not health-based advisory levels to guide homeland security responses. This integrated evaluation of chronic public benchmarks and contaminant fate has identified more than 200 risk-based criteria as method validation targets across numerous contaminants and fate products in drinking water and air combined. The gap in directly applicable values is considerable across the full set of threat contaminants, so preliminary indicators were developed from other well-documented benchmarks to serve as a starting point for validation efforts. By this approach, at least preliminary context is available for water or air, and sometimes both, for all chemicals on the NHSRC list that was provided for this evaluation. This means that a number of concentrations presented in this report represent indirect measures derived from related benchmarks or surrogate chemicals, as described within the many results tables provided in this report.« less

  6. Design project: LONGBOW supersonic interceptor

    NASA Technical Reports Server (NTRS)

    Stoney, Robert; Baker, Matt; Capstaff, Joseph G.; Dishman, Robert; Fick, Gregory; Frick, Stephen N.; Kelly, Mark

    1993-01-01

    A recent white paper entitled 'From the Sea' has spotlighted the need for Naval Aviation to provide overland support to joint operations. The base for this support, the Aircraft Carrier (CVN), will frequently be unable to operate within close range of the battleground because of littoral land-based air and subsurface threats. A high speed, long range, carrier capable aircraft would allow the CVN to provide timely support to distant battleground operations. Such an aircraft, operating as a Deck-Launched Interceptor (DLI), would also be an excellent counter to Next Generation Russian Naval Aviation (NGRNA) threats consisting of supersonic bombers, such as the Backfire, equipped with the next generation of high-speed, long-range missiles. Additionally, it would serve as an excellent high speed Reconnaissance airplane, capable of providing Battle Force commanders with timely, accurate pre-mission targeting information and post-mission Bomb Damage Assessment (BDA). Recent advances in computational hypersonic airflow modeling has produced a method of defining aircraft shapes that fit a conical shock flow model to maximize the efficiency of the vehicle. This 'Waverider' concept provides one means of achieving long ranges at high speeds. A Request for Proposal (RFP) was issued by Professor Conrad Newberry that contained design requirements for an aircraft to accomplish the above stated missions, utilizing Waverider technology.

  7. Striving for group agency: threat to personal control increases the attractiveness of agentic groups

    PubMed Central

    Stollberg, Janine; Fritsche, Immo; Bäcker, Anna

    2015-01-01

    When their sense of personal control is threatened people try to restore perceived control through the social self. We propose that it is the perceived agency of ingroups that provides the self with a sense of control. In three experiments, we for the first time tested the hypothesis that threat to personal control increases the attractiveness of being part or joining those groups that are perceived as coherent entities engaging in coordinated group goal pursuit (agentic groups) but not of those groups whose agency is perceived to be low. Consistent with this hypothesis we found in Study 1 (N = 93) that threat to personal control increased ingroup identification only with task groups, but not with less agentic types of ingroups that were made salient simultaneously. Furthermore, personal control threat increased a sense of collective control and support within the task group, mediated through task-group identification (indirect effects). Turning to groups people are not (yet) part of, Study 2 (N = 47) showed that personal control threat increased relative attractiveness ratings of small groups as possible future ingroups only when the relative agency of small groups was perceived to be high. Perceived group homogeneity or social power did not moderate the effect. Study 3 (N = 78) replicated the moderating role of perceived group agency for attractiveness ratings of entitative groups, whereas perceived group status did not moderate the effect. These findings extend previous research on group-based control, showing that perceived agency accounts for group-based responses to threatened control. PMID:26074832

  8. Towards public health decision support: a systematic review of bidirectional communication approaches

    PubMed Central

    Dixon, Brian E; Gamache, Roland E; Grannis, Shaun J

    2013-01-01

    Objective To summarize the literature describing computer-based interventions aimed at improving bidirectional communication between clinical and public health. Materials and Methods A systematic review of English articles using MEDLINE and Google Scholar. Search terms included public health, epidemiology, electronic health records, decision support, expert systems, and decision-making. Only articles that described the communication of information regarding emerging health threats from public health agencies to clinicians or provider organizations were included. Each article was independently reviewed by two authors. Results Ten peer-reviewed articles highlight a nascent but promising area of research and practice related to alerting clinicians about emerging threats. Current literature suggests that additional research and development in bidirectional communication infrastructure should focus on defining a coherent architecture, improving interoperability, establishing clear governance, and creating usable systems that will effectively deliver targeted, specific information to clinicians in support of patient and population decision-making. Conclusions Increasingly available clinical information systems make it possible to deliver timely, relevant knowledge to frontline clinicians in support of population health. Future work should focus on developing a flexible, interoperable infrastructure for bidirectional communications capable of integrating public health knowledge into clinical systems and workflows. PMID:23467470

  9. Negating Stereotype Threat: Autonomy Support and Academic Identification Boost Performance of African American College Students

    ERIC Educational Resources Information Center

    Nadler, Dustin R.; Komarraju, Meera

    2016-01-01

    Using a 2 × 2 factorial design, we examined the effects of stereotype threat and autonomy support on the test performance of 190 African American college students. Participants completed a set of 7 easy and 7 difficult problems from Raven's Progressive Matrices and a survey including measures of Academic Self-Concept, Learning Climate, and…

  10. Schools, Sex Education, and Support for Sexual Minorities: Exploring Historic Marginalization and Future Potential

    ERIC Educational Resources Information Center

    McCarty-Caplan, David Milo

    2013-01-01

    School-based adolescent sexual health education in the United States has long served as a means of combating emotional and physical threats to the well-being of youth. However, this sex education has since its inception marginalized the experiences and health concerns of lesbian, gay, and bisexual (LGB) students and contributed to school…

  11. 77 FR 1900 - Endangered and Threatened Wildlife and Plants; 90-Day Finding on a Petition To List the Humboldt...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-12

    ... action may be warranted. We are to base this finding on information provided in the petition, supporting..., population isolation, and habitat fragmentation from logging and fire (CBD and EPIC 2010, p. 25). In... threats such as small population size, population isolation, and habitat fragmentation from logging and...

  12. Satellite Survivability Module

    NASA Astrophysics Data System (ADS)

    Buehler, P.; Smith, J.

    The Satellite Survivability Module (SSM) is an end-to-end, physics-based, performance prediction model for directed energy engagement of orbiting spacecraft. SSM was created as an add-on module for the Satellite Tool Kit (STK). Two engagement types are currently supported: laser engagement of the focal plane array of an imaging spacecraft; and Radio Frequency (RF) engagement of spacecraft components. This paper will focus on the laser engagement scenario, the process by which it is defined, and how we use this tool to support a future laser threat detection system experiment. For a laser engagement, the user creates a spacecraft, defines its optical system, adds any protection techniques used by the optical system, introduces a laser threat, and then defines the atmosphere through which the laser will pass. SSM models the laser engagement and its impact on the spacecraft's optical system using four impact levels: degradation, saturation, damage, and destruction. Protection techniques, if employed, will mitigate engagement effects. SSM currently supports two laser protection techniques. SSM allows the user to create and implement a variety of "what if" scenarios. Satellites can be placed in a variety of orbits. Threats can be placed anywhere on the Earth or, for version 2.0, on other satellites. Satellites and threats can be mixed and matched to examine possibilities. Protection techniques for a particular spacecraft can be turned on or off individually; and can be arranged in any order to simulate more complicated protection schemes. Results can be displayed as 2-D or 3-D visualizations, or as textual reports. A new report feature available in version 2.0 will allow laser effects data to be displayed dynamically during scenario execution. In order to test SSM capabilities, the Ball team used SSM to model several engagement scenarios for our future laser threat detection system experiment. Actual test sites, along with actual laser, optics, and detector characteristics were entered into SSM to determine what effects we can expect to see, and to what extent. We concluded that SSM results are accurate when compared to actual field test results. The work is currently funded by the Air Force Research Laboratory, Space Vehicles directorate at Kirtland AFB, New Mexico, under contract number FA9453-06-C-0371.

  13. SWIR hyperspectral imaging detector for surface residues

    NASA Astrophysics Data System (ADS)

    Nelson, Matthew P.; Mangold, Paul; Gomer, Nathaniel; Klueva, Oksana; Treado, Patrick

    2013-05-01

    ChemImage has developed a SWIR Hyperspectral Imaging (HSI) sensor which uses hyperspectral imaging for wide area surveillance and standoff detection of surface residues. Existing detection technologies often require close proximity for sensing or detecting, endangering operators and costly equipment. Furthermore, most of the existing sensors do not support autonomous, real-time, mobile platform based detection of threats. The SWIR HSI sensor provides real-time standoff detection of surface residues. The SWIR HSI sensor provides wide area surveillance and HSI capability enabled by liquid crystal tunable filter technology. Easy-to-use detection software with a simple, intuitive user interface produces automated alarms and real-time display of threat and type. The system has potential to be used for the detection of variety of threats including chemicals and illicit drug substances and allows for easy updates in the field for detection of new hazardous materials. SWIR HSI technology could be used by law enforcement for standoff screening of suspicious locations and vehicles in pursuit of illegal labs or combat engineers to support route-clearance applications- ultimately to save the lives of soldiers and civilians. In this paper, results from a SWIR HSI sensor, which include detection of various materials in bulk form, as well as residue amounts on vehicles, people and other surfaces, will be discussed.

  14. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education

    PubMed Central

    2013-01-01

    Background Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient’s TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Methods Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO’s standard for information security risk management. Results A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Conclusions Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy. PMID:23937965

  15. Cyclone: A close air support aircraft for tomorrow

    NASA Technical Reports Server (NTRS)

    Cox, George; Croulet, Donald; Dunn, James; Graham, Michael; Ip, Phillip; Low, Scott; Vance, Gregg; Volckaert, Eric

    1991-01-01

    To meet the threat of the battlefield of the future, the U.S. ground forces will require reliable air support. To provide this support, future aircrews demand a versatile close air support aircraft capable of delivering ordinance during the day, night, or in adverse weather with pin-point accuracy. The Cyclone aircraft meets these requirements, packing the 'punch' necessary to clear the way for effective ground operations. Possessing anti-armor, missile, and precision bombing capability, the Cyclone will counter the threat into the 21st Century. Here, it is shown that the Cyclone is a realistic, economical answer to the demand for a capable close air support aircraft.

  16. The Development and Deployment of a Maintenance Operations Safety Survey.

    PubMed

    Langer, Marie; Braithwaite, Graham R

    2016-11-01

    Based on the line operations safety audit (LOSA), two studies were conducted to develop and deploy an equivalent tool for aircraft maintenance: the maintenance operations safety survey (MOSS). Safety in aircraft maintenance is currently measured reactively, based on the number of audit findings, reportable events, incidents, or accidents. Proactive safety tools designed for monitoring routine operations, such as flight data monitoring and LOSA, have been developed predominantly for flight operations. In Study 1, development of MOSS, 12 test peer-to-peer observations were collected to investigate the practicalities of this approach. In Study 2, deployment of MOSS, seven expert observers collected 56 peer-to-peer observations of line maintenance checks at four stations. Narrative data were coded and analyzed according to the threat and error management (TEM) framework. In Study 1, a line check was identified as a suitable unit of observation. Communication and third-party data management were the key factors in gaining maintainer trust. Study 2 identified that on average, maintainers experienced 7.8 threats (operational complexities) and committed 2.5 errors per observation. The majority of threats and errors were inconsequential. Links between specific threats and errors leading to 36 undesired states were established. This research demonstrates that observations of routine maintenance operations are feasible. TEM-based results highlight successful management strategies that maintainers employ on a day-to-day basis. MOSS is a novel approach for safety data collection and analysis. It helps practitioners understand the nature of maintenance errors, promote an informed culture, and support safety management systems in the maintenance domain. © 2016, Human Factors and Ergonomics Society.

  17. The Development and Deployment of a Maintenance Operations Safety Survey

    PubMed Central

    Langer, Marie; Braithwaite, Graham R.

    2016-01-01

    Objective: Based on the line operations safety audit (LOSA), two studies were conducted to develop and deploy an equivalent tool for aircraft maintenance: the maintenance operations safety survey (MOSS). Background: Safety in aircraft maintenance is currently measured reactively, based on the number of audit findings, reportable events, incidents, or accidents. Proactive safety tools designed for monitoring routine operations, such as flight data monitoring and LOSA, have been developed predominantly for flight operations. Method: In Study 1, development of MOSS, 12 test peer-to-peer observations were collected to investigate the practicalities of this approach. In Study 2, deployment of MOSS, seven expert observers collected 56 peer-to-peer observations of line maintenance checks at four stations. Narrative data were coded and analyzed according to the threat and error management (TEM) framework. Results: In Study 1, a line check was identified as a suitable unit of observation. Communication and third-party data management were the key factors in gaining maintainer trust. Study 2 identified that on average, maintainers experienced 7.8 threats (operational complexities) and committed 2.5 errors per observation. The majority of threats and errors were inconsequential. Links between specific threats and errors leading to 36 undesired states were established. Conclusion: This research demonstrates that observations of routine maintenance operations are feasible. TEM-based results highlight successful management strategies that maintainers employ on a day-to-day basis. Application: MOSS is a novel approach for safety data collection and analysis. It helps practitioners understand the nature of maintenance errors, promote an informed culture, and support safety management systems in the maintenance domain. PMID:27411354

  18. Beyond consumer-driven health care: purchasers' expectations of all plans.

    PubMed

    Lee, Peter V; Hoo, Emma

    2006-01-01

    Skyrocketing health care costs and quality deficits can only be addressed through a broad approach of quality-based benefit design. Consumer-directed health plans that are built around better consumer information tools and support hold the promise of consumer engagement, but purchasers expect these features in all types of health plans. Regardless of plan type, simply shifting costs to consumers is a threat to access and adherence to evidence-based medicine. Comparative and interactive consumer information tools, coupled with provider performance transparency and payment reform, are needed to advance accountability and support consumers in getting the right care at the right time.

  19. The difficulties of conducting maternal death reviews in Malawi.

    PubMed

    Kongnyuy, Eugene J; van den Broek, Nynke

    2008-09-11

    Maternal death reviews is a tool widely recommended to improve the quality of obstetric care and reduce maternal mortality. Our aim was to explore the challenges encountered in the process of facility-based maternal death review in Malawi, and to suggest sustainable and logically sound solutions to these challenges. SWOT (strengths, weaknesses, opportunities and threats) analysis of the process of maternal death review during a workshop in Malawi. Strengths: Availability of data from case notes, support from hospital management, and having maternal death review forms. Weaknesses: fear of blame, lack of knowledge and skills to properly conduct death reviews, inadequate resources and missing documentation. Opportunities: technical assistance from expatriates, support from the Ministry of Health, national protocols and high maternal mortality which serves as motivation factor. Threats: Cultural practices, potential lawsuit, demotivation due to the high maternal mortality and poor planning at the district level. Solutions: proper documentation, conducting maternal death review in a blame-free manner, good leadership, motivation of staff, using guidelines, proper stock inventory and community involvement. Challenges encountered during facility-based maternal death review are provider-related, administrative, client related and community related. Countries with similar socioeconomic profiles to Malawi will have similar 'pull-and-push' factors on the process of facility-based maternal death reviews, and therefore we will expect these countries to have similar potential solutions.

  20. Discovery, utilisation and analysis of credible threats for 2×2 incomplete information games in the Theory of Moves framework

    NASA Astrophysics Data System (ADS)

    Olsen, Jolie; Sen, Sandip

    2014-04-01

    Steven Brams's [(1994). Theory of moves. Cambridge University Press] Theory of Moves (TOM) is an alternative to traditional game theoretic treatment of real-life interactions, in which players choose strategies based on analysis of future moves and counter-moves that arise if game play commences at a specified start state and either player can choose to move first. In repeated play, players using TOM rationality arrive at nonmyopic equilibria. One advantage of TOM is its ability to model scenarios in which power asymmetries exist between players. In particular, threat power, i.e. the ability of one player to threaten and sustain immediate, globally disadvantageous outcomes to force a desirable result long term, can be utilised to induce Pareto optimal states in games such as Prisoner's Dilemma which result in Pareto-dominated outcomes using traditional methods. Unfortunately, prior work on TOM is limited by an assumption of complete information. This paper presents a mechanism that can be used by a player to utilise threat power when playing a strict, ordinal 2×2 game under incomplete information. We also analyse the benefits of threat power and support in this analysis with empirical evidence.

  1. A combined emitter threat assessment method based on ICW-RCM

    NASA Astrophysics Data System (ADS)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  2. Text-based Analytics for Biosurveillance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Charles, Lauren E.; Smith, William P.; Rounds, Jeremiah

    The ability to prevent, mitigate, or control a biological threat depends on how quickly the threat is identified and characterized. Ensuring the timely delivery of data and analytics is an essential aspect of providing adequate situational awareness in the face of a disease outbreak. This chapter outlines an analytic pipeline for supporting an advanced early warning system that can integrate multiple data sources and provide situational awareness of potential and occurring disease situations. The pipeline, includes real-time automated data analysis founded on natural language processing (NLP), semantic concept matching, and machine learning techniques, to enrich content with metadata related tomore » biosurveillance. Online news articles are presented as an example use case for the pipeline, but the processes can be generalized to any textual data. In this chapter, the mechanics of a streaming pipeline are briefly discussed as well as the major steps required to provide targeted situational awareness. The text-based analytic pipeline includes various processing steps as well as identifying article relevance to biosurveillance (e.g., relevance algorithm) and article feature extraction (who, what, where, why, how, and when). The ability to prevent, mitigate, or control a biological threat depends on how quickly the threat is identified and characterized. Ensuring the timely delivery of data and analytics is an essential aspect of providing adequate situational awareness in the face of a disease outbreak. This chapter outlines an analytic pipeline for supporting an advanced early warning system that can integrate multiple data sources and provide situational awareness of potential and occurring disease situations. The pipeline, includes real-time automated data analysis founded on natural language processing (NLP), semantic concept matching, and machine learning techniques, to enrich content with metadata related to biosurveillance. Online news articles are presented as an example use case for the pipeline, but the processes can be generalized to any textual data. In this chapter, the mechanics of a streaming pipeline are briefly discussed as well as the major steps required to provide targeted situational awareness. The text-based analytic pipeline includes various processing steps as well as identifying article relevance to biosurveillance (e.g., relevance algorithm) and article feature extraction (who, what, where, why, how, and when).« less

  3. Mediators of Stereotype Threat Induced by Diagnostic Testing by Stereotype Relevant Out-Group Evaluators: The Roles of Evaluator's Racial Fairness and Support on Performance Outcome

    ERIC Educational Resources Information Center

    Wilburn, Grady Akile

    2010-01-01

    There is an abundance of research that examines the social-psychological phenomenon called stereotype threat. There is not, however, a conclusive understanding of the processes and mechanisms that operate within stereotype threat that produce reduced performance in a negative stereotype relevant area. This dissertation proposes that there are…

  4. Reactivity to unpredictable threat as a treatment target for fear-based anxiety disorders.

    PubMed

    Gorka, S M; Lieberman, L; Klumpp, H; Kinney, K L; Kennedy, A E; Ajilore, O; Francis, J; Duffecy, J; Craske, M G; Nathan, J; Langenecker, S; Shankman, S A; Phan, K L

    2017-10-01

    Heightened reactivity to unpredictable threat (U-threat) is a core individual difference factor underlying fear-based psychopathology. Little is known, however, about whether reactivity to U-threat is a stable marker of fear-based psychopathology or if it is malleable to treatment. The aim of the current study was to address this question by examining differences in reactivity to U-threat within patients before and after 12-weeks of selective serotonin reuptake inhibitors (SSRIs) or cognitive-behavioral therapy (CBT). Participants included patients with principal fear (n = 22) and distress/misery disorders (n = 29), and a group of healthy controls (n = 21) assessed 12-weeks apart. A well-validated threat-of-shock task was used to probe reactivity to predictable (P-) and U-threat and startle eyeblink magnitude was recorded as an index of defensive responding. Across both assessments, individuals with fear-based disorders displayed greater startle magnitude to U-threat relative to healthy controls and distress/misery patients (who did not differ). From pre- to post-treatment, startle magnitude during U-threat decreased only within the fear patients who received CBT. Moreover, within fear patients, the magnitude of decline in startle to U-threat correlated with the magnitude of decline in fear symptoms. For the healthy controls, startle to U-threat across the two time points was highly reliable and stable. Together, these results indicate that startle to U-threat characterizes fear disorder patients and is malleable to treatment with CBT but not SSRIs within fear patients. Startle to U-threat may therefore reflect an objective, psychophysiological indicator of fear disorder status and CBT treatment response.

  5. Modelling threats to water quality from fire suppression chemicals and post-fire erosion

    NASA Astrophysics Data System (ADS)

    Hyde, Kevin; Ziemniak, Chris; Elliot, William; Samuels, William

    2014-05-01

    Misapplication of fire retardant chemicals into streams and rivers may threaten aquatic life. The possible threat depends on the contaminant concentration that, in part, is controlled by dispersion within flowing water. In the event of a misapplication, methods are needed to rapidly estimate the chemical mass entering the waterway and the dispersion and transport within the system. Here we demonstrate a new tool that calculates the chemical mass based on aircraft delivery system, fire chemical type, and stream and intersect geometry. The estimated mass is intended to be transferred into a GIS module that uses real-time stream data to map and simulate the dispersion and transport downstream. This system currently accounts only for aqueous transport. We envision that the GIS module can be modified to incorporate sediment transport, specifically to model movement of sediments from post-fire erosion. This modification could support assessment of threats of post-fire erosion to water quality and water supply systems.

  6. Buffers or Boosters? The Role of HRM Practices in Older Workers' Experience of Stereotype Threat.

    PubMed

    Oliveira, Eduardo André da Silva; Cabral-Cardoso, Carlos José

    2018-01-02

    Building on the social identity approach and the HRM literature, this two-wave cross-sectional study examined the effects of negative age-based metastereotypes on the age-based stereotype threat experience of older workers and on organizational disidentification. The moderator role of HRM practices in the relationship between negative age-based metastereotypes and age-based stereotype threat was also investigated. Older workers survey results (n = 469) from 14 manufacturing companies indicated that negative age-based metastereotypes correlate positively with stereotype threat. Moderation results showed that age-awareness HRM practices (training for older workers) reinforced age-based stereotype threat, whereas general HRM practices (recognition and respect) impaired it. The article suggests that the combination of age-based metastereotypes with a stereotype threat framework contributes to further understand older workers' beliefs and attitudes. It also indicates that to be effective, HRM practices should emphasize positive social identities older workers share with their colleagues, rather than giving older workers special treatment that may, after all, reinforce stigmatization.

  7. Combating Terrorism Technical Support Office. 2008 Review

    DTIC Science & Technology

    2009-01-15

    threat object displayed at the operator control unit of the robotic platform. Remote Utility Conversion Kit The Remote Utility Conversion Kit (RUCK) is a...three- dimensional and isometric simulations and games. Develop crowd models, adversarial behavior models, network-based simulations, mini-simulations...Craft-Littoral The modular unmanned surface craft-littoral ( MUSCL ) is a spin- off of EOD/LIC’s Unmanned Reconnaissance Observation Craft, developed

  8. NATO Allied Joint Medical Publication 7: Allied Joint Medical Doctrine for Support to Chemical, Biological, Radiological, and Nuclear (CBRN) Defensive Operations, Final Draft

    DTIC Science & Technology

    2014-07-31

    A-1 ANNEX B REFERENCES .................................................................................... B-1 ANNEX C GLOSSARY ... Occupational and environmental health surveillance consists of the assessment and accounting of physical, chemical, biological, and radiological...assessment is based on environmental health hazard and threat assessment, as well on environmental, occupational and disease surveillance information

  9. Now that the Baby Boomers Are Middle-Aged...Threats, Challenges and Opportunities of the 21st Century. Perspectives.

    ERIC Educational Resources Information Center

    Glossop, Robert

    Canadian baby-boomers will reach old age around 2020. Until then, they represent a large, well-educated generation whose economic productivity provides a strong base on which to build the necessary systems of income support, health and social service delivery, and economic adjustment that will be required to age gracefully. Canadians can expect…

  10. When contact counts: Intergroup contact on business and intermarriage resistance in the Caucasus region.

    PubMed

    Gurrentz, Benjamin T; Finke, Roger

    2017-03-01

    Intergroup contact theory has been empirically supported in a variety of social contexts, but few samples have been drawn from rapidly developing nations undergoing severe political and sociocultural conflict. Using 2012 Caucasus Barometer data from the three nations of the South Caucasus - Armenia, Azerbaijan and Georgia - we test the effect of interreligious contact on various forms of out-group resistance in a region of the world that is both historically and presently marked with severe religious and ethnic conflict. Additionally, we take into account self-selection effects using propensity score matching. Results overwhelmingly support intergroup contact theory in all three countries, but objections toward intermarriage still remain high for treated groups. In addition, there exist significant differences based on the out-group studied, with the contact effects being the strongest for groups posing little religio-cultural or organized threat. Weaker contact effects, though, appear less related to threat and more contextual/out-group specific. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    NASA Astrophysics Data System (ADS)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  12. Integrated development of light armored vehicles based on wargaming simulators

    NASA Astrophysics Data System (ADS)

    Palmarini, Marc; Rapanotti, John

    2004-08-01

    Vehicles are evolving into vehicle networks through improved sensors, computers and communications. Unless carefully planned, these complex systems can result in excessive crew workload and difficulty in optimizing the use of the vehicle. To overcome these problems, a war-gaming simulator is being developed as a common platform to integrate contributions from three different groups. The simulator, OneSAF, is used to integrate simplified models of technology and natural phenomena from scientists and engineers with tactics and doctrine from the military and analyzed in detail by operations analysts. This approach ensures the modelling of processes known to be important regardless of the level of information available about the system. Vehicle survivability can be improved as well with better sensors, computers and countermeasures to detect and avoid or destroy threats. To improve threat detection and reliability, Defensive Aids Suite (DAS) designs are based on three complementary sensor technologies including: acoustics, visible and infrared optics and radar. Both active armour and softkill countermeasures are considered. In a typical scenario, a search radar, providing continuous hemispherical coverage, detects and classifies the threat and cues a tracking radar. Data from the tracking radar is processed and an explosive grenade is launched to destroy or deflect the threat. The angle of attack and velocity from the search radar can be used by the soft-kill system to carry out an infrared search and track or an illuminated range-gated scan for the threat platform. Upon detection, obscuration, countermanoeuvres and counterfire can be used against the threat. The sensor suite is completed by acoustic detection of muzzle blast and shock waves. Automation and networking at the platoon level contribute to improved vehicle survivability. Sensor data fusion is essential in avoiding catastrophic failure of the DAS. The modular DAS components can be used with Light Armoured Vehicle (LAV) variants including: armoured personnel carriers and direct-fire support vehicles. OneSAF will be used to assess the performance of these DAS-equipped vehicles on a virtual battlefield.

  13. Unmanned and Unattended Response Capability for Homeland Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    BENNETT, PHIL C.

    2002-11-01

    An analysis was conducted of the potential for unmanned and unattended robotic technologies for forward-based, immediate response capabilities that enables access and controlled task performance. The authors analyze high-impact response scenarios in conjunction with homeland security organizations, such as the NNSA Office of Emergency Response, the FBI, the National Guard, and the Army Technical Escort Unit, to cover a range of radiological, chemical and biological threats. They conducted an analysis of the potential of forward-based, unmanned and unattended robotic technologies to accelerate and enhance emergency and crisis response by Homeland Defense organizations. Response systems concepts were developed utilizing new technologiesmore » supported by existing emerging threats base technologies to meet the defined response scenarios. These systems will pre-position robotic and remote sensing capabilities stationed close to multiple sites for immediate action. Analysis of assembled systems included experimental activities to determine potential efficacy in the response scenarios, and iteration on systems concepts and remote sensing and robotic technologies, creating new immediate response capabilities for Homeland Defense.« less

  14. A design proposal of a certain missile tactical command system based on Beidou satellite communication and GPS positioning techniques

    NASA Astrophysics Data System (ADS)

    Ma, Jian; Hao, Yongsheng; Miao, Jian; Zhang, Jianmao

    2007-11-01

    This paper introduced a design proposal of tactical command system that applied to a kind of anti-tank missile carriers. The tactical command system was made up of embedded computer system based on PC104 bus, Linux operating system, digital military map, Beidou satellite communication equipments and GPS positioning equipments. The geographic coordinates was measured by the GPS receiver, the positioning data, commands and information were transmitted real-time between tactical command systems, tactical command systems and command center, by the Beidou satellite communication systems. The Beidou satellite communication equipments and GPS positioning equipments were integrated to an independent module, exchanging data with embedded computer through RS232 serial ports and USB ports. The decision support system software based on information fusion, calculates positioning data, geography information and battle field information synthetically, shows the position of allies and the position of enemy on the military map, and assesses the various threats of different enemy objects, educes a situation assessment and threat assessment.

  15. Human dignity and professional reputation under threat: Iranian Nurses' experiences of workplace violence.

    PubMed

    Najafi, Fereshteh; Fallahi-Khoshknab, Masoud; Ahmadi, Fazlollah; Dalvandi, Asghar; Rahgozar, Mehdi

    2017-03-01

    Workplace violence against nurses is a challenging problem in both developed and developing countries. Because the concept of violence bears some cultural load, nurses' understanding is region-specific. This study explores Iranian nurses' perceptions of workplace violence. Using qualitative content analysis, 22 registered nurses underwent unstructured, in-depth interviews. The main themes of threats to human dignity and professional reputation emerged, plus four categories: physical violence, psychological violence, honor insults, and ethnic-religious insults. The term "honor insults," as a unique finding, was used instead of "sexual harassment." These findings may help to redefine workplace violence based on cultural background, design strategies for supporting nurses, and prevent and manage such violence. © 2016 John Wiley & Sons Australia, Ltd.

  16. The measurement of threat orientations.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Bovin, Michelle J

    2006-01-01

    To develop measures of 3 threat orientations that affect responses to health behavior messages. In Study 1, college students (N = 47) completed items assessing threat orientations and health behaviors. In Study 2, college students and community adults (N = 110) completed the threat orientation items and measures of convergent and discriminant validity. In Study 1, the control-based, denial-based, and heightened-sensitivity-based threat orientation scales demonstrated good internal consistency and correlated with engagement in health behaviors. In Study 2, the convergent and discriminant validity of the 3 measures was established. The 3 scales have good internal reliability and construct validity.

  17. When scientific paradigms lead to tunnel vision: lessons from the study of fear

    NASA Astrophysics Data System (ADS)

    Paré, Denis; Quirk, Gregory J.

    2017-03-01

    For the past 30 years, research on the amygdala has largely focused on the genesis of defensive behaviors as its main function. This focus originated from early lesion studies and was supported by extensive anatomical, physiological, and pharmacological data. Here we argue that while much data is consistent with the fear model of amygdala function, it has never been directly tested, in part due to overreliance on the fear conditioning task. In support of the fear model, amygdala neurons appear to signal threats and/or stimuli predictive of threats. However, recent studies in a natural threat setting show that amygdala activity does not correlate with threats, but simply with the movement of the rat, independent of valence. This was true for both natural threats as well as conditioned stimuli; indeed there was no evidence of threat signaling in amygdala neurons. Similar findings are emerging for prefrontal neurons that modulate the amygdala. These recent developments lead us to propose a new conceptualization of amygdala function whereby the amygdala inhibits behavioral engagement. Moreover, we propose that the goal of understanding the amygdala will be best served by shifting away from fear conditioning toward naturalistic approach and avoidance paradigms that involve decision-making and a larger repertoire of spontaneous and learned behaviors, all the while keeping an open mind.

  18. Delay and death-thought accessibility: a meta-analysis.

    PubMed

    Steinman, Christopher T; Updegraff, John A

    2015-12-01

    The dual-process component of Terror Management Theory (TMT) proposes that different types of threats lead to increases in death-thought accessibility (DTA) after different delay intervals. Experimental studies of terror management threats' effect on DTA were collected and coded for their use of explicitly death-related (vs. not explicitly death-related) threats, and for their use of delay and task-switching during the delay. Results reveal that studies using death-related threats achieved larger DTA effect-sizes when they included more task-switching or a longer delay between the threat and the DTA measurement. In contrast, studies using threats that were not explicitly death-related achieved smaller DTA effect-sizes when they included more task-switching between the threat and the DTA measurement. These findings provide partial support for the dual-process component's predictions regarding delay and DTA. Limitations and future directions are discussed. © 2015 by the Society for Personality and Social Psychology, Inc.

  19. Threat and defense as goal regulation: from implicit goal conflict to anxious uncertainty, reactive approach motivation, and ideological extremism.

    PubMed

    Nash, Kyle; McGregor, Ian; Prentice, Mike

    2011-12-01

    Four studies investigated a goal regulation view of anxious uncertainty threat (Gray & McNaughton, 2000) and ideological defense. Participants (N = 444) were randomly assigned to have achievement or relationship goals implicitly primed. The implicit goal primes were followed by randomly assigned achievement or relationship threats that have reliably caused generalized, reactive approach motivation and ideological defense in past research. The threats caused anxious uncertainty (Study 1), reactive approach motivation (Studies 2 and 3), and reactive ideological conviction (Study 4) only when threat-relevant goals had first been primed, but not when threat-irrelevant goals had first been primed. Reactive ideological conviction (Study 4) was eliminated if participants were given an opportunity to attribute their anxiety to a mundane source. Results support a goal regulation view of anxious uncertainty, threat, and defense with potential for integrating theories of defensive compensation.

  20. Status threat, not economic hardship, explains the 2016 presidential vote

    PubMed Central

    2018-01-01

    This study evaluates evidence pertaining to popular narratives explaining the American public’s support for Donald J. Trump in the 2016 presidential election. First, using unique representative probability samples of the American public, tracking the same individuals from 2012 to 2016, I examine the “left behind” thesis (that is, the theory that those who lost jobs or experienced stagnant wages due to the loss of manufacturing jobs punished the incumbent party for their economic misfortunes). Second, I consider the possibility that status threat felt by the dwindling proportion of traditionally high-status Americans (i.e., whites, Christians, and men) as well as by those who perceive America’s global dominance as threatened combined to increase support for the candidate who emphasized reestablishing status hierarchies of the past. Results do not support an interpretation of the election based on pocketbook economic concerns. Instead, the shorter relative distance of people’s own views from the Republican candidate on trade and China corresponded to greater mass support for Trump in 2016 relative to Mitt Romney in 2012. Candidate preferences in 2016 reflected increasing anxiety among high-status groups rather than complaints about past treatment among low-status groups. Both growing domestic racial diversity and globalization contributed to a sense that white Americans are under siege by these engines of change. PMID:29686081

  1. Expressing the sense of the House of Representatives with respect to supporting the goals and ideals of the seventh annual National Cybersecurity Awareness Month and supporting the efforts of the Department of Homeland Security to raise awareness of cyber threats and enhance cybersecurity in the United States.

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2010-09-29

    House - 11/01/2010 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. EPA Leadership on Science, Innovation, and Decision Support Tools for Addressing Current and Future Challenges.

    PubMed

    Hecht, Alan D; Ferster, Aaron; Summers, Kevin

    2017-10-16

    When the U.S. Environmental Protection Agency (EPA) was established nearly 50 years ago, the nation faced serious threats to its air, land, and water, which in turn impacted human health. These threats were effectively addressed by the creation of EPA (in 1970) and many subsequent landmark environmental legislations which in turn significantly reduced threats to the Nation's environment and public health. A key element of historic legislation is research aimed at dealing with current and future problems. Today we face national and global challenges that go beyond classic media-specific (air, land, water) environmental legislation and require an integrated paradigm of action and engagement based on (1) innovation based on science and technology, (2) stakeholder engagement and collaboration, and (3) public education and support. This three-pronged approach recognizes that current environmental problems, include social as well as physical and environmental factors, are best addressed through collaborative problem solving, the application of innovation in science and technology, and multiple stakeholder engagement. To achieve that goal, EPA's Office of Research and Development (ORD) is working directly with states and local communities to develop and apply a suite of accessible decision support tools (DST) that aim to improve environmental conditions, protect human health, enhance economic opportunity, and advance a resilient and sustainability society. This paper showcases joint EPA and state actions to develop tools and approaches that not only meet current environmental and public health challenges, but do so in a way that advances sustainable, healthy, and resilient communities well into the future. EPA's future plans should build on current work but aim to effectively respond to growing external pressures. Growing pressures from megatrends are a major challenge for the new Administration and for cities and states across the country. The recent hurricanes hitting Texas and the Gulf Coast, part of the increase in extreme weather events, make it clear that building resilient infrastructure is a crucial step to sustainability.

  3. Worker training for new threats: a proposed framework.

    PubMed

    Mitchell, Clifford S; Doyle, Mary L; Moran, John B; Lippy, Bruce; Hughes, Joseph T; Lum, Max; Agnew, Jacqueline

    2004-11-01

    In an effort to identify health and safety training needs for various groups of workers related to weapons of mass destruction, including chemical, biological, radiological, and nuclear weapons and high yield explosives (CBRNE), a conference, "Worker Training in a New Era: Responding to New Threats," was held at the Johns Hopkins Bloomberg School of Public Health in October 2002. Two questions were addressed: Which general skills and knowledge are common to all workers who might be exposed to terrorist threats from CBRNE weapons? What are the particular skills and knowledge relevant to these threats that are specific to workers in different sectors? Thirteen core components for pre- and post-event training were identified. Pre-event training applies to all workers. Post-event training applies to selected personnel including first responders, skilled support personnel, and other workers involved in these operations. Recommendations to improve worker safety training related to preparedness include: identify specific competencies for worker pre- and post-event training; coordinate Federal policy on worker training for CBRNE hazards; adopt federal guidelines or standards on worker training for new CBRNE threats, based on the competencies and coordinated Federal policy; conduct an inventory of training programs and other resources that could be used or adapted for use for new threats; and develop new training content and methods for pre- and post-event training to address specific competencies. Given the possibility for the introduction of CBRNE threats into the workplace, all workers need some training in the potential hazards involved: the individual worker's specific role in an emergency; incident command; activation of the emergency notification system; use of personal protective equipment (PPE); and safe evacuation of the workplace. While some occupational sectors have developed effective training related to these new threats, there is a need to develop, implement, and evaluate training programs across many different sectors of the workforce. Copyright 2004 Wiley-Liss, Inc.

  4. Use of LOGIC to support lidar operations

    NASA Astrophysics Data System (ADS)

    Davis-Lunde, Kimberley; Jugan, Laurie A.; Shoemaker, J. Todd

    1999-10-01

    The Naval Oceanographic Office (NAVOCEANO) and Planning Systems INcorporated are developing the Littoral Optics Geospatial Integrated Capability (LOGIC). LOGIC supports NAVOCEANO's directive to assess the impact of the environment on Fleet systems in areas of operational interest. LOGIC is based in the Geographic Information System (GIS) ARC/INFO and offers a method to view and manipulate optics and ancillary data to support emerging Fleet lidar systems. LOGIC serves as a processing (as required) and quality-checking mechanism for data entering NAVOCEANO's Data Warehouse and handles both remotely sensed and in-water data. LOGIC provides a link between these data and the GIS-based Graphical User Interface, allowing the user to select data manipulation routines and/or system support products. The results of individual modules are displayed via the GIS to provide such products as lidar system performance, laser penetration depth, and asset vulnerability from a lidar threat. LOGIC is being developed for integration into other NAVOCEANO programs, most notably for Comprehensive Environmental Assessment System, an established tool supporting sonar-based systems. The prototype for LOGIC was developed for the Yellow Sea, focusing on a diver visibility support product.

  5. Safety first: Instrumentality for reaching safety determines attention allocation under threat.

    PubMed

    Vogt, Julia; Koster, Ernst H W; De Houwer, Jan

    2017-04-01

    Theories of attention to emotional information suggest that attentional processes prioritize threatening information. In this article, we suggest that attention will prioritize the events that are most instrumental to a goal in any given context, which in threatening situations is typically reaching safety. To test our hypotheses, we used an attentional cueing paradigm that contained cues signaling imminent threat (i.e., aversive noises) as well as cues that allowed participants to avoid threat (instrumental safety signals). Correct reactions to instrumental safety signals seemingly allowed participants to lower the presentation rate of the threat. Experiment 1 demonstrates that attention prioritizes instrumental safety signals over threat signals. Experiment 2 replicates this finding and additionally compares instrumental safety signals to other action-relevant signals controlling for action relevance as cause of the effects. Experiment 3 demonstrates that when actions toward threat signals permit to avoid threat, attention prioritizes threat signals. Taken together, these results support the view that instrumentality for reaching safety determines the allocation of attention under threat. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    PubMed

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  7. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    PubMed Central

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  8. Using Honeynets and the Diamond Model for ICS Threat Analysis

    DTIC Science & Technology

    2016-05-11

    TR-006 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY Distribution Statement A: Approved for Public Release; Distribution is...Unlimited Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security under Contract...No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and

  9. Perspective: The Stealth of Implicit Bias in Chemical Engineering Education, Its Threat to Diversity, and What Professors Can Do to Promote an Inclusive Future

    ERIC Educational Resources Information Center

    Farrell, Stephanie; Minerick, Adrienne R.

    2018-01-01

    Many educators hold fairness and egalitarianism as core values that they strive to uphold in their professional work and personal lives, and they hope that they evaluate and support students based strictly on student potential and achievement. However, everyone holds unconscious beliefs about social and identity groups. This implicit (unconscious)…

  10. Modular robotic system for forensic investigation support

    NASA Astrophysics Data System (ADS)

    Kowalski, Grzegorz; Główka, Jakub; Maciaś, Mateusz; Puchalski, Sławomir

    2017-10-01

    Forensic investigation on the crime scene is an activity that requires not only knowledge about the ways of searching for evidence, collecting and processing them. In some cases the area of operation might not be properly secured and poses threat to human health or life. Some devices or materials may be left intentionally or not to injure potential investigators. Besides conventional explosives, threats can be in form of CBRN materials, which have not only immediate effect on the exposed personnel, but can contaminate further people, when being transferred for example on clothes or unsecured equipment. In this case a risk evaluation should be performed, that can lead to conclusions that it is too dangerous for investigators to work. In that kind of situation remote devices, which are able to examine the crime scene and secure samples, can be used. In the course of R&D activities PIAP developed a system, which is based on small UGV capable of carrying out inspection of suspicious places and securing evidence, when needed. The system consists of remotely controlled mobile robot, its control console and a set of various inspection and support tools, that enable detection of CBRN threats as well as revelation, documentation and securing of the evidence. This paper will present main features of the system, like mission adjustment possibilities and communication aspects, and also examples of the forensic accessories.

  11. Case study comparison of functional vs. organic stability approaches for assessing threat potential at closed landfills in the USA.

    PubMed

    O'Donnell, Sean T; Caldwell, Michael D; Barlaz, Morton A; Morris, Jeremy W F

    2018-05-01

    Municipal solid waste (MSW) landfills in the USA are regulated under Subtitle D of the Resource Conservation and Recovery Act (RCRA), which includes the requirement to protect human health and the environment (HHE) during the post-closure care (PCC) period. Several approaches have been published for assessment of potential threats to HHE. These approaches can be broadly divided into organic stabilization, which establishes an inert waste mass as the ultimate objective, and functional stability, which considers long-term emissions in the context of minimizing threats to HHE in the absence of active controls. The objective of this research was to conduct a case study evaluation of a closed MSW landfill using long-term data on landfill gas (LFG) production, leachate quality, site geology, and solids decomposition. Evaluations based on both functional and organic stability criteria were compared. The results showed that longer periods of LFG and leachate management would be required using organic stability criteria relative to an approach based on functional stability. These findings highlight the somewhat arbitrary and overly stringent nature of assigning universal stability criteria without due consideration of the landfill's hydrogeologic setting and potential environmental receptors. This supports previous studies that advocated for transition to a passive or inactive control stage based on a performance-based functional stability framework as a defensible mechanism for optimizing and ending regulatory PCC. Copyright © 2018 Elsevier Ltd. All rights reserved.

  12. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could providemore » a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.« less

  13. Startle Potentiation to Uncertain Threat as a Psychophysiological Indicator of Fear-based Psychopathology: An Examination across Multiple Internalizing Disorders

    PubMed Central

    Gorka, Stephanie M.; Lieberman, Lynne; Shankman, Stewart A.; Phan, K. Luan

    2016-01-01

    Heightened reactivity to uncertain threat (U-threat) is an important individual difference factor that may characterize fear-based internalizing psychopathologies (IPs) and distinguish them from distress/misery IPs. To date, however, the majority of existing research examining reactivity to U-threat has been within individuals with panic disorder and major depressive disorder (MDD) and no prior study has directly tested this hypothesis across multiple IPs. The current study therefore explored whether heightened reactivity to U-threat is a psychophysiological indicator of fear-based psychopathology across five groups: current 1) social anxiety disorder (SAD), 2) specific phobia (SP), 3) generalized anxiety disorder (GAD), 4) MDD, and 5) individuals with no history of psychopathology (controls). All 160 adults completed a well-validated threat-of-shock task designed to probe responses to predictable (P-) and U-threat. Startle eyeblink potentiation was recorded as an index of aversive arousal. Results indicated that individuals with SAD and SP evidenced greater startle potentiation to U-threat, but not P-threat, relative to individuals with GAD, MDD and controls (who did not differ). The current findings, along with the prior panic disorder and MDD literature, suggest that heightened reactivity to U-threat is a psychophysiological indicator of fear-based disorders and could represent a neurobiological organizing principle for internalizing psychopathology. The findings also suggest that individuals with fear disorders generally display a hypersensitivity to uncertain aversive events, which could contribute to their psychopathology. PMID:27868423

  14. Categorizing threat : building and using a generic threat matrix.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and ismore » not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.« less

  15. Attentional bias towards health-threat information in chronic fatigue syndrome.

    PubMed

    Hou, Ruihua; Moss-Morris, Rona; Bradley, Brendan P; Peveler, Robert; Mogg, Karin

    2008-07-01

    To investigate whether individuals with chronic fatigue syndrome (CFS) show an attentional bias towards health-threat information. Attentional bias (AB) was assessed in individuals with CFS and healthy controls using a visual probe task which presented health-threat and neutral words and pictures for 500 ms. Self-report questionnaires were used to assess CFS symptoms, depression, anxiety, and social desirability. Compared to a healthy control group, the CFS group showed an enhanced AB towards heath-threat stimuli relative to neutral stimuli. The AB was not influenced by the type of stimulus (pictures vs. words). The finding of an AB towards health-threat information in individuals with CFS is supportive of models of CFS which underlie cognitive behavior therapy.

  16. Threats to Feminist Identity and Reactions to Gender Discrimination.

    PubMed

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists ( M age  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed.

  17. The robust nature of the biopsychosocial model challenge and threat: a reply to Wright and Kirby.

    PubMed

    Blascovich, Jim; Mendes, Wendy Berry; Tomaka, Joe; Salomon, Kristen; Seery, Mark

    2003-01-01

    This article responds to Wright and Kirby's (this issue) critique of our biopsychosocial (BPS) analysis of challenge and threat motivation. We counter their arguments by reviewing the current state of our theory as well as supporting data, then turn to their specific criticisms. We believe that Wright and Kirby failed to accurately represent the corpus of our work, including both our theoretical model and its supporting data. They critiqued our model from a contextual, rational-economic perspective that ignores the complexity and subjectivity of person-person and person-environmental interactions as well as nonconscious influences. Finally, they provided criticisms regarding possible underspecificity of antecedent components of our model that do not so much indicate theoretical flaws as provide important and interesting questions for future research. We conclude by affirming that our BPS model of challenge and threat is an evolving, generative theory directed toward understanding the complexity of personality and social psychological factors underlying challenge and threat states.

  18. Explaining opposition to refugee resettlement: The role of NIMBYism and perceived threats

    PubMed Central

    Ferwerda, Jeremy; Flynn, D.J.; Horiuchi, Yusaku

    2017-01-01

    One week after President Donald Trump signed a controversial executive order to reduce the influx of refugees to the United States, we conducted a survey experiment to understand American citizens’ attitudes toward refugee resettlement. Specifically, we evaluated whether citizens consider the geographic context of the resettlement program (that is, local versus national) and the degree to which they are swayed by media frames that increasingly associate refugees with terrorist threats. Our findings highlight a collective action problem: Participants are consistently less supportive of resettlement within their own communities than resettlement elsewhere in the country. This pattern holds across all measured demographic, political, and geographic subsamples within our data. Furthermore, our results demonstrate that threatening media frames significantly reduce support for both national and local resettlement. Conversely, media frames rebutting the threat posed by refugees have no significant effect. Finally, the results indicate that participants in refugee-dense counties are less responsive to threatening frames, suggesting that proximity to previously settled refugees may reduce the impact of perceived security threats. PMID:28913425

  19. Explaining opposition to refugee resettlement: The role of NIMBYism and perceived threats.

    PubMed

    Ferwerda, Jeremy; Flynn, D J; Horiuchi, Yusaku

    2017-09-01

    One week after President Donald Trump signed a controversial executive order to reduce the influx of refugees to the United States, we conducted a survey experiment to understand American citizens' attitudes toward refugee resettlement. Specifically, we evaluated whether citizens consider the geographic context of the resettlement program (that is, local versus national) and the degree to which they are swayed by media frames that increasingly associate refugees with terrorist threats. Our findings highlight a collective action problem: Participants are consistently less supportive of resettlement within their own communities than resettlement elsewhere in the country. This pattern holds across all measured demographic, political, and geographic subsamples within our data. Furthermore, our results demonstrate that threatening media frames significantly reduce support for both national and local resettlement. Conversely, media frames rebutting the threat posed by refugees have no significant effect. Finally, the results indicate that participants in refugee-dense counties are less responsive to threatening frames, suggesting that proximity to previously settled refugees may reduce the impact of perceived security threats.

  20. Using efficacy cues in persuasive health communication is more effective than employing threats - An experimental study of a vaccination intervention against Ebola.

    PubMed

    Ort, Alexander; Fahr, Andreas

    2018-04-10

    Although much effort has been made to study fear appeals in persuasive health communication, there is still mixed support for the effectiveness of this approach. Therefore, this research investigated the effect of invoked fear via health communication messages on crucial components of the Extended Parallel Process Model (EPPM) by focusing on the rarely examined interaction between perceptions of threat and efficacy and their effects on fear control and danger control processes as well as health-relevant outcomes. We recruited 447 participants (M age  = 32.00 years; 64% female) for a 2 × 2 between-subjects experimental study via quota sampling. While completing an online questionnaire, subjects were randomly assigned to view one of four versions of a mock website containing information about vaccinations against Ebola virus disease (EVD), which varied in threat and efficacy. After seeing the stimulus, participants completed assessments of their perceptions of threat and efficacy, evoked fear, adaptive and defensive responses to the presented message, attitudes, and intentions. Structure equation modelling (SEM) was used to analyse the relationships within the model (EPPM). Promoting efficacy with respect to EVD was more effective than emphasizing threat, resulting in danger control rather than fear control processes. Although threat may be effective in attracting peoples' attention, there is a comparatively small effect of evoked fear on attitudes and intentions. The data support the assumption that there is an important association between threat and coping appraisals facilitating behaviour change. Moreover, the widely held notion that people have to be scared or threatened to encourage attitude and behaviour changes should be treated with caution. Communication should instead focus on efficacy to foster adaptive responses. Statement of contribution What is already known on this subject? There is mixed support for the effectiveness of fear appeals in persuasive health communication, especially regarding the interaction of threat perceptions and coping appraisals for fear and danger control processes. The Extended Parallel Process Model - being a current and often applied model to investigate the effects of fear appeals - suggests a multiplicative relationship between threat perceptions and coping perceptions Most studies applying conventional analysis strategies (e.g., [M] ANOVAs) indicate that perceptions and appraisals of threat and efficacy are not directly related to each other. What does this study add? It demonstrates the parallelism and interaction between threat appraisal and coping appraisal processes and demonstrates the usefulness of SEM in testing associations within the EPPM. It confirms the assumption of an important multiplicative association between threat and coping appraisals within the EPPM, while related cognitive processes still seem to operate independently. Adaptive responses to persuasive messages are mainly triggered using efficacy cues, not threat, which could also be triggered by promoting positive emotional experiences (e.g., gain-framing or entertainment education). © 2018 The British Psychological Society.

  1. Parallel processing of general and specific threat during early stages of perception

    PubMed Central

    2016-01-01

    Differential processing of threat can consummate as early as 100 ms post-stimulus. Moreover, early perception not only differentiates threat from non-threat stimuli but also distinguishes among discrete threat subtypes (e.g. fear, disgust and anger). Combining spatial-frequency-filtered images of fear, disgust and neutral scenes with high-density event-related potentials and intracranial source estimation, we investigated the neural underpinnings of general and specific threat processing in early stages of perception. Conveyed in low spatial frequencies, fear and disgust images evoked convergent visual responses with similarly enhanced N1 potentials and dorsal visual (middle temporal gyrus) cortical activity (relative to neutral cues; peaking at 156 ms). Nevertheless, conveyed in high spatial frequencies, fear and disgust elicited divergent visual responses, with fear enhancing and disgust suppressing P1 potentials and ventral visual (occipital fusiform) cortical activity (peaking at 121 ms). Therefore, general and specific threat processing operates in parallel in early perception, with the ventral visual pathway engaged in specific processing of discrete threats and the dorsal visual pathway in general threat processing. Furthermore, selectively tuned to distinctive spatial-frequency channels and visual pathways, these parallel processes underpin dimensional and categorical threat characterization, promoting efficient threat response. These findings thus lend support to hybrid models of emotion. PMID:26412811

  2. Monitoring Style of Coping with Cancer Related Threats: A Review of the Literature

    PubMed Central

    Miller, Suzanne M.

    2014-01-01

    Building on the Cognitive-Social Health Information-Processing model, this paper provides a theoretically guided review of monitoring (i.e., attend to and amplify) cancer-related threats. Specifically, the goals of the review are to examine whether individuals high on monitoring are characterized by specific cognitive, affective, and behavioral responses to cancer-related health threats than individuals low on monitoring and the implications of these cognitive-affective responses for patient-centered outcomes, including patient-physician communication, decision-making and the development of interventions to promote adherence and adjustment. A total of 74 reports were found, based on 63 studies, 13 of which were intervention studies. The results suggest that although individuals high on monitoring are more knowledgeable about health threats, they are less satisfied with the information provided. Further, they tend to be characterized by greater perceived risk, more negative beliefs, and greater value of health-related information and experience more negative affective outcomes. Finally, individuals high on monitoring tend to be more demanding of the health providers in terms of desire for more information and emotional support, are more assertive during decision-making discussions, and subsequently experience more decisional regret. Psychoeducational interventions improve outcomes when the level and type of information provided is consistent with the individual's monitoring style and the demands of the specific health threat. Implications for patient-centered outcomes, in terms of tailoring of interventions, patient-provider communication, and decision-making, are discussed. PMID:24488543

  3. Monitoring style of coping with cancer related threats: a review of the literature.

    PubMed

    Roussi, Pagona; Miller, Suzanne M

    2014-10-01

    Building on the Cognitive-Social Health Information-Processing model, this paper provides a theoretically guided review of monitoring (i.e., attend to and amplify) cancer-related threats. Specifically, the goals of the review are to examine whether individuals high on monitoring are characterized by specific cognitive, affective, and behavioral responses to cancer-related health threats than individuals low on monitoring and the implications of these cognitive-affective responses for patient-centered outcomes, including patient-physician communication, decision-making and the development of interventions to promote adherence and adjustment. A total of 74 reports were found, based on 63 studies, 13 of which were intervention studies. The results suggest that although individuals high on monitoring are more knowledgeable about health threats, they are less satisfied with the information provided. Further, they tend to be characterized by greater perceived risk, more negative beliefs, and greater value of health-related information and experience more negative affective outcomes. Finally, individuals high on monitoring tend to be more demanding of the health providers in terms of desire for more information and emotional support, are more assertive during decision-making discussions, and subsequently experience more decisional regret. Psychoeducational interventions improve outcomes when the level and type of information provided is consistent with the individual's monitoring style and the demands of the specific health threat. Implications for patient-centered outcomes, in terms of tailoring of interventions, patient-provider communication, and decision-making, are discussed.

  4. Adaptation of a multi-resolution adversarial model for asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Rosenberg, Brad; Gonsalves, Paul G.

    2006-05-01

    Recent military operations have demonstrated the use by adversaries of non-traditional or asymmetric military tactics to offset US military might. Rogue nations with links to trans-national terrorists have created a highly unpredictable and potential dangerous environment for US military operations. Several characteristics of these threats include extremism in beliefs, global in nature, non-state oriented, and highly networked and adaptive, thus making these adversaries less vulnerable to conventional military approaches. Additionally, US forces must also contend with more traditional state-based threats that are further evolving their military fighting strategies and capabilities. What are needed are solutions to assist our forces in the prosecution of operations against these diverse threat types and their atypical strategies and tactics. To address this issue, we present a system that allows for the adaptation of a multi-resolution adversarial model. The developed model can then be used to support both training and simulation based acquisition requirements to effectively respond to such an adversary. The described system produces a combined adversarial model by merging behavior modeling at the individual level with aspects at the group and organizational level via network analysis. Adaptation of this adversarial model is performed by means of an evolutionary algorithm to build a suitable model for the chosen adversary.

  5. Using resilience and resistance concepts to manage persistent threats to sagebrush ecosystems and greater sage-grouse

    USGS Publications Warehouse

    Chambers, Jeanne C.; Maestas, Jeremy D.; Pyke, David A.; Boyd, Chad S.; Pellant, Mike; Wuenschel, Amarina

    2017-01-01

    Conservation of imperiled species often demands addressing a complex suite of threats that undermine species viability. Regulatory approaches, such as the US Endangered Species Act (1973), tend to focus on anthropogenic threats through adoption of policies and regulatory mechanisms. However, persistent ecosystem-based threats, such as invasive species and altered disturbance regimes, remain critical issues for most at-risk species considered to be conservation-reliant. We describe an approach for addressing persistent ecosystem threats to at-risk species based on ecological resilience and resistance concepts that is currently being used to conserve greater sage-grouse (Centrocercus urophasianus)and sagebrush ecosystems. The approach links biophysical indicators of ecosystem resilience and resistance with species-specific population and habitat requisites in a risk-based framework to identify priority areas for management and guide allocation of resources to manage persistent ecosystem-based threats. US federal land management and natural resource agencies have adopted this framework as a foundation for prioritizing sage-grouse conservation resources and determining effective restoration and management strategies. Because threats and strategies to address them cross-cut program areas, an integrated approach that includes wildland fire operations, postfire rehabilitation, fuels management, and habitat restoration is being used. We believe this approach is applicable to species conservation in other largely intact ecosystems with persistent, ecosystem-based threats.

  6. Direction of attention bias to threat relates to differences in fear acquisition and extinction in anxious children.

    PubMed

    Waters, Allison M; Kershaw, Rachel

    2015-01-01

    Anxious children show attention biases towards and away from threat stimuli. Moreover, threat avoidance compared to vigilance predicts a poorer outcome from exposure-based treatments, such as cognitive-behavioural therapy (CBT), yet the mechanisms underlying this differential response are unclear. Pavlovian fear conditioning is a widely accepted theory to explain the acquisition and extinction of fear, including exposure-based treatments, such as CBT. In typical fear conditioning experiments, anxious children have shown larger physiological responses to an aversive unconditional stimulus (i.e., US on CS+ trials) and to non-reinforced stimuli (CS-) during fear acquisition and to both CSs during fear extinction compared to non-anxious peers. This study examined whether threat avoidance compared to threat vigilance was related to differences in fear acquisition and extinction in anxious children. Thirty-four clinically-anxious children completed a visual probe task including angry-neutral face pairs to determine the direction of threat attention bias as well as a discriminant conditioning and extinction task in which a geometric shape CS+ was paired with an aversive tone US, while the CS- geometric shape was always presented alone during acquisition trials. Both CSs were presented alone during extinction trials. Fear acquisition and extinction were indexed by skin conductance responses (SCR) and subjective measures. Children were classified as threat vigilant (N = 18) and threat avoidant (n = 16) based on the direction of threat attention bias on the visual probe task. During acquisition, threat avoidant relative to threat vigilant anxious children displayed larger orienting SCRs to both CSs during the first block of trials and larger third interval SCRs to the US on CS+ trials as well as on CS- trials. During extinction, threat avoidant anxious children showed delayed extinction of SCRs to both the CS+ and CS- and reported higher subjective anxiety ratings after extinction compared to threat vigilant anxious children. Threat avoidant anxious children may be more reactive physiologically to novel cues and to stimuli that become associated with threat and this may interfere with extinction learning. These findings could help explain previous evidence that threat avoidant anxious children do not respond as well as threat vigilant anxious children to exposure-based CBT. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Threat Assessment & Remediation Analysis (TARA): Methodology Description Version 1.0

    DTIC Science & Technology

    2011-10-01

    collectively support this practice. v Table of Contents 1 Introduction...4 1.3.2.3 Common Vulnerability Scoring System (CVSS) ........................................ 4 1.3.2.4 Microsoft Threat Modeling ...6 2.1.1.3 Eliminate Implausible TTPs ........................................................................ 6 2.1.1.4 Apply Scoring Model

  8. Analyzing Cyber-Physical Threats on Robotic Platforms.

    PubMed

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  9. Analyzing Cyber-Physical Threats on Robotic Platforms †

    PubMed Central

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  10. Familiarity promotes the blurring of self and other in the neural representation of threat

    PubMed Central

    Beckes, Lane; Hasselmo, Karen

    2013-01-01

    Neurobiological investigations of empathy often support an embodied simulation account. Using functional magnetic resonance imaging (fMRI), we monitored statistical associations between brain activations indicating self-focused threat to those indicating threats to a familiar friend or an unfamiliar stranger. Results in regions such as the anterior insula, putamen and supramarginal gyrus indicate that self-focused threat activations are robustly correlated with friend-focused threat activations but not stranger-focused threat activations. These results suggest that one of the defining features of human social bonding may be increasing levels of overlap between neural representations of self and other. This article presents a novel and important methodological approach to fMRI empathy studies, which informs how differences in brain activation can be detected in such studies and how covariate approaches can provide novel and important information regarding the brain and empathy. PMID:22563005

  11. Supporting Research and Development of Security Technologies through Network and Security Data Collection

    DTIC Science & Technology

    Research and development targeted at identifying and mitigating Internet security threats require current network data. To fulfill this need... researchers working for the Center for Applied Internet Data Analysis (CAIDA), a program at the San Diego Supercomputer Center (SDSC) which is based at the...vetted network and security researchers using the PREDICT/IMPACT portal and legal framework. We have also contributed to community building efforts that

  12. Developing a Corrective Action Simulator to Support Decision Making Research and Training

    DTIC Science & Technology

    2008-05-01

    positions, and any time-based simulation injects (e.g., JSTARS reporting tracks, the Engineer reporting a new aircraft bingo time, a threat being active...future instantiations would benefit from migrating to the IMPRINT Pro version. During the course of this development effort the Army Research...initiating corrective action when a subordinate is observed to make an error (of omission or commission) 58 • Benefits of a Corrective

  13. A framework for the study of coping, illness behaviour and outcomes.

    PubMed

    Shaw, C

    1999-05-01

    This paper presents a theoretical framework for the study of coping, illness attribution, health behaviour and outcomes. It is based upon models developed within health psychology and aims to provide a theoretical basis for nurse researchers to utilize psychosocial variables. It is an interactionist model which views outcomes as dependent upon both situation and person variables. The situation is viewed as the health threat or illness symptoms as well as the psychosocial context within which the person is operating. This context includes socio-economic factors, social support, social norms, and external factors such as the mass media. The experience of health threat is dependent upon individual appraisal, and the framework incorporates Folkman and Lazarus' transactional model of stress, as well as Leventhal's illness representation model. Behaviour and the perception of threat are also dependent upon outcome expectancies and the appraisal of one's own coping resources, and so the concepts of locus of control and self-efficacy are also incorporated. This framework allows one to identify determinants of behaviour and outcome, and will aid nurses in identifying areas for psycho-social intervention.

  14. Electrophysiological spatiotemporal dynamics during implicit visual threat processing.

    PubMed

    DeLaRosa, Bambi L; Spence, Jeffrey S; Shakal, Scott K M; Motes, Michael A; Calley, Clifford S; Calley, Virginia I; Hart, John; Kraut, Michael A

    2014-11-01

    Numerous studies have found evidence for corticolimbic theta band electroencephalographic (EEG) oscillations in the neural processing of visual stimuli perceived as threatening. However, varying temporal and topographical patterns have emerged, possibly due to varying arousal levels of the stimuli. In addition, recent studies suggest neural oscillations in delta, theta, alpha, and beta-band frequencies play a functional role in information processing in the brain. This study implemented a data-driven PCA based analysis investigating the spatiotemporal dynamics of electroencephalographic delta, theta, alpha, and beta-band frequencies during an implicit visual threat processing task. While controlling for the arousal dimension (the intensity of emotional activation), we found several spatial and temporal differences for threatening compared to nonthreatening visual images. We detected an early posterior increase in theta power followed by a later frontal increase in theta power, greatest for the threatening condition. There was also a consistent left lateralized beta desynchronization for the threatening condition. Our results provide support for a dynamic corticolimbic network, with theta and beta band activity indexing processes pivotal in visual threat processing. Published by Elsevier Inc.

  15. Startle potentiation to uncertain threat as a psychophysiological indicator of fear-based psychopathology: An examination across multiple internalizing disorders.

    PubMed

    Gorka, Stephanie M; Lieberman, Lynne; Shankman, Stewart A; Phan, K Luan

    2017-01-01

    Heightened reactivity to uncertain threat (U-threat) is an important individual difference factor that may characterize fear-based internalizing psychopathologies (IPs) and distinguish them from distress/misery IPs. To date, however, the majority of existing research examining reactivity to U-threat has been within individuals with panic disorder and major depressive disorder (MDD) and no prior study has directly tested this hypothesis across multiple IPs. The current study therefore explored whether heightened reactivity to U-threat is a psychophysiological indicator of fear-based psychopathology across 5 groups: current (a) social anxiety disorder (SAD); (b) specific phobia (SP); (c) generalized anxiety disorder (GAD); (d) MDD; and (c) individuals with no history of psychopathology (controls). All 160 adults completed a well-validated threat-of-shock task designed to probe responses to predictable (P-) and U-threat. Startle eyeblink potentiation was recorded as an index of aversive arousal. Results indicated that individuals with SAD and SP evidenced greater startle potentiation to U-threat, but not P-threat, relative to individuals with GAD, MDD, and controls (who did not differ). The current findings, along with the prior panic disorder and MDD literature, suggest that heightened reactivity to U-threat is a psychophysiological indicator of fear-based disorders and could represent a neurobiological organizing principle for internalizing psychopathology. The findings also suggest that individuals with fear disorders generally display a hypersensitivity to uncertain aversive events, which could contribute to their psychopathology. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  16. How Stereotype Threat Affects Healthy Older Adults' Performance on Clinical Assessments of Cognitive Decline: The Key Role of Regulatory Fit.

    PubMed

    Barber, Sarah J; Mather, Mara; Gatz, Margaret

    2015-11-01

    Stereotype threat can impair older adults' performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments' reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat's negative effects. By using a loss-avoidance frame, stereotype threat's negative effects can be attenuated or even eliminated. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  17. Emotional first aid for a suicide crisis: comparison between Telephonic hotline and internet.

    PubMed

    Gilat, Itzhak; Shahar, Golan

    2007-01-01

    The telephone and the internet have become popular sources of psychological help in various types of distress, including a suicide crisis. To gain more insight into the unique features of these media, we compared characteristics of calls to three technologically mediated sources of help that are part of the volunteer-based Israeli Association for Emotional First Aid (ERAN): Telephonic hotline (n = 4426), personal chat (n = 373) and an asynchronous online support group (n = 954). Threats of suicide were much more frequent among participants in the asynchronous support group than the telephone and personal chat. These findings encourage further research into suicide-related interpersonal exchanges in asynchronous online support groups.

  18. Examining Recruitment and Retention Factors for Minority STEM Majors through a Stereotype Threat Lens

    ERIC Educational Resources Information Center

    Meador, Audrey

    2018-01-01

    Prior research regarding minorities in the science, technology, engineering, and mathematics (STEM) fields indicated that the factors of peer support and participation in STEM-related activities contributed positively to minority students' recruitment and retention in these fields. Utilizing stereotype threat as a conceptual framework, this…

  19. Survey of Threats and Assaults by Patients on Psychiatry Residents

    ERIC Educational Resources Information Center

    Dvir, Yael; Moniwa, Emiko; Crisp-Han, Holly; Levy, Dana; Coverdale, John H.

    2012-01-01

    Objective: The authors sought to determine the prevalence of threats and assaults by patients on psychiatry residents, their consequences, and the perceived adequacy of supports and institutional responses. Method: Authors conducted an anonymous survey of 519 psychiatry residents in 13 psychiatry programs across the United States. The survey…

  20. Law Enforcement Use of Threat Assessments to Predict Violence

    ERIC Educational Resources Information Center

    Wood, Tracey Michelle

    2016-01-01

    The purpose of this qualitative, descriptive multiple case study was to explore what process, policies and procedures, or set of empirically supported norms governed law enforcement officers in a selected county in the southwest region of the United States when threat assessments were conducted on potentially violent subjects threatening mass…

  1. Defensive motivation and attention in anticipation of different types of predictable and unpredictable threat: A startle and event-related potential investigation.

    PubMed

    Nelson, Brady D; Hajcak, Greg

    2017-08-01

    Predictability is an important characteristic of threat that impacts defensive motivation and attentional engagement. Supporting research has primarily focused on actual threat (e.g., shocks), and it is unclear whether the predictability of less intense threat (e.g., unpleasant pictures) similarly affects motivation and attention. The present study utilized a within-subject design and examined defensive motivation (startle reflex and self-reported anxiety) and attention (probe N100 and P300) in anticipation of shocks and unpleasant pictures during a no, predictable, and unpredictable threat task. This study also examined the impact of predictability on the P300 to shocks and late positive potential (LPP) to unpleasant pictures. The startle reflex and self-reported anxiety were increased in anticipation of both types of threat relative to no threat. Furthermore, startle potentiation in anticipation of unpredictable threat was greater for shocks compared to unpleasant pictures, but there was no difference for predictable threat. The probe N100 was enhanced in anticipation of unpredictable threat relative to predictable threat and no threat, and the probe P300 was suppressed in anticipation of predictable and unpredictable threat relative to no threat. These effects did not differ between the shock and unpleasant picture trials. Finally, the P300 and early LPP component were increased in response to unpredictable relative to predictable shocks and unpleasant pictures, respectively. The present study suggests that the unpredictability of unpleasant pictures increases defensive motivation, but to a lesser degree relative to actual threat. Moreover, unpredictability enhances attentional engagement in anticipation of, and in reaction to, both types of threat. © 2017 Society for Psychophysiological Research.

  2. A reproductive threat-based model of evolved sex differences in jealousy.

    PubMed

    Sagarin, Brad J; Becker, D Vaughn; Guadagno, Rosanna E; Wilkinson, Wayne W; Nicastle, Lionel D

    2012-08-10

    Although heterosexual women and men consistently demonstrate sex differences in jealousy, these differences disappear among lesbians and gay men as well as among heterosexual women and men contemplating same-sex infidelities (infidelities in which the partner and rival are the same sex). Synthesizing these past findings, the present paper offers a reproductive threat-based model of evolved sex differences in jealousy that predicts that the sexes will differ only when the jealous perceivers' reproductive outcomes are differentially at risk. This model is supported by data from a web-based study in which lesbians, gay men, bisexual women and men, and heterosexual women and men responded to a hypothetical infidelity scenario with the sex of the rival randomly determined. After reading the scenario, participants indicated which type of infidelity (sexual versus emotional) would cause greater distress. Consistent with predictions, heterosexual women and men showed a sex difference when contemplating opposite-sex infidelities but not when contemplating same-sex infidelities, whereas lesbians and gay men showed no sex difference regardless of whether the infidelity was opposite-sex or same-sex.

  3. Status threat, not economic hardship, explains the 2016 presidential vote.

    PubMed

    Mutz, Diana C

    2018-05-08

    This study evaluates evidence pertaining to popular narratives explaining the American public's support for Donald J. Trump in the 2016 presidential election. First, using unique representative probability samples of the American public, tracking the same individuals from 2012 to 2016, I examine the "left behind" thesis (that is, the theory that those who lost jobs or experienced stagnant wages due to the loss of manufacturing jobs punished the incumbent party for their economic misfortunes). Second, I consider the possibility that status threat felt by the dwindling proportion of traditionally high-status Americans (i.e., whites, Christians, and men) as well as by those who perceive America's global dominance as threatened combined to increase support for the candidate who emphasized reestablishing status hierarchies of the past. Results do not support an interpretation of the election based on pocketbook economic concerns. Instead, the shorter relative distance of people's own views from the Republican candidate on trade and China corresponded to greater mass support for Trump in 2016 relative to Mitt Romney in 2012. Candidate preferences in 2016 reflected increasing anxiety among high-status groups rather than complaints about past treatment among low-status groups. Both growing domestic racial diversity and globalization contributed to a sense that white Americans are under siege by these engines of change. Copyright © 2018 the Author(s). Published by PNAS.

  4. Population viability analysis of the Endangered shortnose sturgeon

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jager, Yetta; Bevelhimer, Mark S; Peterson, Douglas L.

    2011-07-01

    This study used population viability analysis (PVA) to partition the influences of potential threats to the endangered shortnose sturgeon (Acipenser brevirostrum). A workshop brought together experts to help identify potential threats including groundwater withdrawal, poor water quality, saltwater intrusion, mercury effects, harvest as by-catch, and sedimentation of spawning habitat. During the course of the project, we eliminated some threats and added new ones. Groundwater withdrawal was dismissed after a study failed to identify connection with groundwater and the majority of pumping is from a confined aquifer. We also eliminated activities on Fort Stewart as influences on spawning habitat because anymore » successful spawning must occur upstream of Fort Stewart. We added climate change to the list of threats based on our assessment of temperature effects and expectations of sea-level rise. Our study highlighted the role of populations in nearby rivers in providing metapopulation support, raising the concern that the population in the Ogeechee River acts as a demographic sink. As part of this study, we carried out a field sampling study to analyze effects of training activities on headwater streams. We developed a new methodology for sampling design as part of this effort and used a mixed-modeling approach to identify relationships between land cover-land use, including those associated with military training activity and water quality. We found that tank training was associated with higher suspended sediment and equipment training was associated with higher organic carbon) and water quality. We detected effects of training on suspended sediment and organic carbon. We also carried out a field sampling effort in the Canoochee and Ogeechee Rivers. In the Ogeechee River, we found that dissolved oxygen in 40% of measurements during summer were below 4 mg L-1. To evaluate mercury as a potential threat, we developed a mercury uptake model and analyzed mercury levels in amphipod prey and sturgeon eggs. These did not exceed EPA guidelines. Finally, we developed a PVA model that including linkages between shortnose sturgeon growth, reproduction, and survival and each remaining threat; All three had significant influences. Preliminary simulations suggest that elevated temperatures under future climate will extirpate this population and add support to the hypothesis that this species requires access to spawning habitat far upstream to persist.« less

  5. Geodiversity Hotspots: A Proposed Conceptual and Methodological Framework for Defining Geoconservation Priorities

    NASA Astrophysics Data System (ADS)

    Bétard, François

    2016-04-01

    For two decades, geoconservation has been driven by the need to conserve geodiversity considering its values or most valuable elements (i.e. geoheritage) facing the internal or external threats to it, mainly associated with human activities causing damages or irreversible destruction of sites. One main difficulty arises in how geoconservation priorities can objectively be identified at larger scales (e.g., state or region levels). Inspired by experiences in biological conservation, I propose a new conceptual and methodological framework for the identification of geoconservation priorities by theorizing and applying the concept of "geodiversity hotspot". Drawing an obvious parallel with the "biodiversity hotspot" concept first introduced in 1988 by the British ecologist Norman Myers, geodiversity hotspots are here defined as geographic areas that harbour very high levels of geodiversity while being threatened by human activities. From a methodological viewpoint, a basic analytical procedure is proposed to map geodiversity hotspots at a national or regional scale, that can be used as a tool to support decision-making and land-use planning. The method is based on the numerical processing and mapping of two indices: geodiversity index and degree of potential threat. The geodiversity index is calculated using a GIS environment as the sum of four sub-indexes representing the main components of geodiversity, i.e. geological diversity (rocks, minerals, fossils), geomorphodiversity (topography and landforms), pedodiversity (soils and palaeosoils) and hydrodiversity (rivers, lakes, springs…). The degree of potential threat is a graduated scale inversely proportional to the level of protection, from high degree of potential threat in areas without any protection status to low degree of potential threat in areas with high protection level (e.g., national parks, nature reserves). The mapping and delineation of geodiversity hotspots can automatically be obtained from a combination of the two main criteria, i.e. in areas where high geodiversity indexes meet with high degree of potential threat. This area-based approach is discussed along with the risk of neglecting some areas such as "geodiversity coldspots" which may have other types of conservation value. Selected examples from Northeastern Brazil, with a special focus on the Araripe Basin geodiversity hotspot including the eponymous UNESCO Geopark, concretely showcase the conceptual and methodological framework proposed above. Such an example also illustrates the spatial congruence that often exists between geodiversity hotspots and biodiversity hotspots, in a region where very high levels of geodiversity overlap exceptional concentrations of endemic species and present-day biodiversity (Atlantic Forest and savanna-like Cerrado biomes). These observations reinforce the need to assess geodiversity not only for itself, but also to support biodiversity research and actions programs, and should encourage researchers and practitioners to develop more integrated approaches to nature conservation and sustainable land management.

  6. Actionable knowledge and strategic decision making for bio- and agroterrorism threats: building a collaborative early warning culture.

    PubMed

    Mårtensson, Per-Åke; Hedström, Lars; Sundelius, Bengt; Skiby, Jeffrey E; Elbers, Armin; Knutsson, Rickard

    2013-09-01

    Current trends in biosecurity and cybersecurity include (1) the wide availability of technology and specialized knowledge that previously were available only to governments; (2) the global economic recession, which may increase the spread of radical non-state actors; and (3) recent US and EU commission reports that reflect concerns about non-state actors in asymmetric threats. The intersectoral and international nature of bioterrorism and agroterrorism threats requires collaboration across several sectors including intelligence, police, forensics, customs, and other law enforcement organizations who must work together with public and animal health organizations as well as environmental and social science organizations. This requires coordinated decision making among these organizations, based on actionable knowledge and information sharing. The risk of not sharing information among organizations compared to the benefit of sharing information can be considered in an "information sharing risk-benefit analysis" to prevent a terrorism incident from occurring and to build a rapid response capability. In the EU project AniBioThreat, early warning is the main topic in work package 3 (WP 3). A strategy has been generated based on an iterative approach to bring law enforcement agencies and human and animal health institutes together. Workshops and exercises have taken place during the first half of the project, and spin-off activities include new preparedness plans for institutes and the formation of a legal adviser network for decision making. In addition, a seminar on actionable knowledge was held in Stockholm, Sweden, in 2012, which identified the need to bring various agency cultures together to work on developing a resilient capability to identify early signs of bio- and agroterrorism threats. The seminar concluded that there are a number of challenges in building a collaborative culture, including developing an education program that supports collaboration and shared situational awareness.

  7. Threat effects on human oculo-motor function.

    PubMed

    Naranjo, E N; Cleworth, T W; Allum, J H J; Inglis, J T; Lea, J; Westerberg, B D; Carpenter, M G

    2017-09-17

    Neuro-anatomical evidence supports the potential for threat-related factors, such as fear, anxiety and vigilance, to influence brainstem motor nuclei controlling eye movements, as well as the vestibular nuclei. However, little is known about how threat influences human ocular responses, such as eye saccades (ES), smooth pursuit eye tracking (SP), and optokinetic nystagmus (OKN), and whether these responses can be facilitated above normal baseline levels with a natural source of threat. This study was designed to examine the effects of height-induced postural threat on the gain of ES, SP and OKN responses in humans. Twenty participants stood at two different surface heights while performing ES (ranging from 8° to 45° from center), SP (15, 20, 30°/s) and OKN (15, 30, 60°/s) responses in the horizontal plane. Height did not significantly increase the slope of the relationship between ES peak velocity and initial amplitude, or the gain of ES amplitude. In contrast height significantly increased SP and OKN gain. Significant correlations were found between changes in physiological arousal and OKN gain. Observations of changes with height in OKN and SP support neuro-anatomical evidence of threat-related mechanisms influencing both oculo-motor nuclei and vestibular reflex pathways. Although further study is warranted, the findings suggest that potential influences of fear, anxiety and arousal/alertness should be accounted for, or controlled, during clinical vestibular and oculo-motor testing. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.

  8. Relationship status and perceived support in the social regulation of neural responses to threat

    PubMed Central

    Beckes, Lane; Gonzalez, Marlen Z; Maresh, Erin L; Brown, Casey L; Hasselmo, Karen

    2017-01-01

    Abstract Strong social ties correspond with better health and well being, but the neural mechanisms linking social contact to health remain speculative. This study extends work on the social regulation of brain activity by supportive handholding in 110 participants (51 female) of diverse racial and socioeconomic origins. In addition to main effects of social regulation by handholding, we assessed the moderating effects of both perceived social support and relationship status (married, cohabiting, dating or platonic friends). Results suggest that, under threat of shock, handholding by familiar relational partners attenuates both subjective distress and activity in a network associated with salience, vigilance and regulatory self-control. Moreover, greater perceived social support corresponded with less brain activity in an extended network associated with similar processes, but only during partner handholding. In contrast, we did not observe any regulatory effects of handholding by strangers, and relationship status did not moderate the regulatory effects of partner handholding. These findings suggest that contact with a familiar relational partner is likely to attenuate subjective distress and a variety of neural responses associated with the presence of threat. This effect is likely enhanced by an individual’s expectation of the availability of support from their wider social network. PMID:28985422

  9. EPA leadership on Science, Innovation, and Decision Support Tools for Addressing Current and Future Challenges

    EPA Science Inventory

    When the U.S. Environmental Protection Agency (EPA) was established nearly 50 years ago, the nation faced serious threats to its air, land, and water, which in turn impacted human health. These threats were effectively addressed by the creation of EPA (in 1970) and many subsequen...

  10. The Rising Terrorist Threat in Tanzania: Domestic Islamist Militancy and Regional Threats (Strategic Forum, No. 288, September 2014)

    DTIC Science & Technology

    2014-09-01

    and oil exploration sectors. In ad- dition, tourism opportunities abound—including safaris in the Serengeti, climbing on Mount Kilimanjaro, and the...personnel, and attacks on churches and sporting events. The group is also accused of financing al Shabab, supporting its for- eign fighter recruitment

  11. A Description and Comparative Analysis of Two Competing Automated SHORAD-C2 Systems.

    DTIC Science & Technology

    1983-03-01

    class_ificat ion. The weapon systers that are cvrrently in the HIMAD categcry are IHAWK, Patrict and Nixe Hercules . HIMAD weapon systems are either corps or...increasing threat to the division. 1. Close Air Support The threat envistoned twc air battles occurring within divisionel airspace. The forward air bettle

  12. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    PubMed

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior.

  13. A risk management approach to CAIS development

    NASA Technical Reports Server (NTRS)

    Hart, Hal; Kerner, Judy; Alden, Tony; Belz, Frank; Tadman, Frank

    1986-01-01

    The proposed DoD standard Common APSE Interface Set (CAIS) was developed as a framework set of interfaces that will support the transportability and interoperability of tools in the support environments of the future. While the current CAIS version is a promising start toward fulfilling those goals and current prototypes provide adequate testbeds for investigations in support of completing specifications for a full CAIS, there are many reasons why the proposed CAIS might fail to become a usable product and the foundation of next-generation (1990'S) project support environments such as NASA's Space Station software support environment. The most critical threats to the viability and acceptance of the CAIS include performance issues (especially in piggybacked implementations), transportability, and security requirements. To make the situation worse, the solution to some of these threats appears to be at conflict with the solutions to others.

  14. Unique Approach to Threat Analysis Mapping: A Malware Centric Methodology for Better Understanding the Adversary Landscape

    DTIC Science & Technology

    2016-04-05

    Unlimited http://www.sei.cmu.edu CMU/SEI-2016-TR-004 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY Distribution Statement A...Approved for Public Release; Distribution is Unlimited Copyright 2016 Carnegie Mellon University

 This material is based upon work funded and supported...by Department of Homeland Security under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software

  15. A Pattern for Increased Monitoring for Intellectual Property Theft by Departing Insiders

    DTIC Science & Technology

    2012-04-01

    2012 TECHNICAL REPORT CMU/SEI-2012-TR-008 ESC-TR-2012-008 CERT® Program http://www.sei.cmu.edu SEI markings v3.2 / 30 August 2011... Programs Conference (PLoP) 2011 (http://www.hillside.net/plop/2011/). This material is based upon work funded and supported by the United States...research project at the CERT® Program is identifying enterprise architectural patterns to protect against the insider threat to organizations. This

  16. Countering Air and Missile Threats

    DTIC Science & Technology

    2007-02-05

    ground-based radars will not be obstructed by the curvature of the earth and airborne radars can discriminate them from ground clutter. As a result...Iraqi fighters. Around Baghdad, “The whole ground was red with Triple-A fire as far as you could see,” recalled one pilot. The four F-15s were...Element NORAD) is the supported commander in accordance with the NORAD Agreement, NORAD Terms of Reference, etc. CDRNORAD is currently allocated

  17. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    ERIC Educational Resources Information Center

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  18. A Developmental Perspective on the Virginia Student Threat Assessment Guidelines

    ERIC Educational Resources Information Center

    Cornell, Dewey G.

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed to help multidisciplinary school-based teams use a decision tree to evaluate student threats and take appropriate preventive action. A main goal of this approach is to allow school-based teams to recognize and respond to the developmental complexities of children and adolescents…

  19. Interdisciplinary modeling and analysis to reduce loss of life from tsunamis

    NASA Astrophysics Data System (ADS)

    Wood, N. J.

    2016-12-01

    Recent disasters have demonstrated the significant loss of life and community impacts that can occur from tsunamis. Minimizing future losses requires an integrated understanding of the range of potential tsunami threats, how individuals are specifically vulnerable to these threats, what is currently in place to improve their chances of survival, and what risk-reduction efforts could be implemented. This presentation will provide a holistic perspective of USGS research enabled by recent advances in geospatial modeling to assess and communicate population vulnerability to tsunamis and the range of possible interventions to reduce it. Integrated research includes efforts to characterize the magnitude and demography of at-risk individuals in tsunami-hazard zones, their evacuation potential based on landscape conditions, nature-based mitigation to improve evacuation potential, evacuation pathways and population demand at assembly areas, siting considerations for vertical-evacuation refuges, community implications of multiple evacuation zones, car-based evacuation modeling for distant tsunamis, and projected changes in population exposure to tsunamis over time. Collectively, this interdisciplinary research supports emergency managers in their efforts to implement targeted risk-reduction efforts based on local conditions and needs, instead of generic regional strategies that only focus on hazard attributes.

  20. Celestial data routing network

    NASA Astrophysics Data System (ADS)

    Bordetsky, Alex

    2000-11-01

    Imagine that information processing human-machine network is threatened in a particular part of the world. Suppose that an anticipated threat of physical attacks could lead to disruption of telecommunications network management infrastructure and access capabilities for small geographically distributed groups engaged in collaborative operations. Suppose that small group of astronauts are exploring the solar planet and need to quickly configure orbital information network to support their collaborative work and local communications. The critical need in both scenarios would be a set of low-cost means of small team celestial networking. To the geographically distributed mobile collaborating groups such means would allow to maintain collaborative multipoint work, set up orbital local area network, and provide orbital intranet communications. This would be accomplished by dynamically assembling the network enabling infrastructure of the small satellite based router, satellite based Codec, and set of satellite based intelligent management agents. Cooperating single function pico satellites, acting as agents and personal switching devices together would represent self-organizing intelligent orbital network of cooperating mobile management nodes. Cooperative behavior of the pico satellite based agents would be achieved by comprising a small orbital artificial neural network capable of learning and restructing the networking resources in response to the anticipated threat.

  1. The pedagogical ebb and flow of human patient simulation: empowering through a process of fading support.

    PubMed

    Parker, Brian Corey; Myrick, Florence

    2012-07-01

    The use of the high-fidelity human patient simulator (HPS)-based clinical scenario in undergraduate nursing education is a powerful learning tool, well suited to modern nursing students' preference for immersive construction of knowledge through the provision of contextually rich reality-based practice and social discourse. The purpose of this study was to explore the social-psychological processes that occur within HPS-based clinical scenarios. Grounded theory method was used to study students and faculty sampled from a Western Canadian baccalaureate nursing program. The process of leveled coding generated a substantive theory that has the potential to enable educators to empower students through the use of fading support, a twofold process composed of adaptive scaffolding and dynamic assessment that challenges students to realistically self-regulate and transform their frame of reference for nursing practice, while limiting the threats that traditional HPS-based curriculum can impose. Copyright 2012, SLACK Incorporated.

  2. The Longitudinal Effects of Chronic Mediated Exposure to Political Violence on Ideological Beliefs About Political Conflicts Among Youths.

    PubMed

    Gvirsman, Shira Dvir; Huesmann, L Rowell; Dubow, Eric F; Landau, Simha F; Boxer, Paul; Shikaki, Khalil

    This study examines the effects of chronic (i.e., repeated and cumulative) mediated exposure to political violence on ideological beliefs regarding political conflict. It centers on these effects on young viewers, from preadolescents to adolescents. Ideological beliefs refers here to support of war, perception of threat to one's nation, and normative beliefs concerning aggression toward the out-group. A longitudinal study was conducted on a sample of Israeli and Palestinian youths who experience the Israeli-Palestinian conflict firsthand ( N = 1,207). Two alternative hypotheses were tested: that chronic exposure via the media increases support for war and aggression and elevates feeling of threat, or that chronic exposure via the media strengthens preexisting beliefs. Results demonstrated that higher levels of exposure were longitudinally related to stronger support for war. Regarding normative beliefs about aggression and threat to one's nation, mediated exposure reinforced initial beliefs, rendering the youths more extreme in their attitudes. These results mostly support the conceptualization of the relation between media violence and behaviors as "reciprocally determined" or "reinforcing spirals." The results are also discussed in light of the differences found between the effect of exposure to political violence firsthand and exposure via the media.

  3. Small threat and contraband detection with TNA-based systems.

    PubMed

    Shaw, T J; Brown, D; D'Arcy, J; Liu, F; Shea, P; Sivakumar, M; Gozani, T

    2005-01-01

    The detection of small threats, such as explosives, drugs, and chemical weapons, concealed or encased in surrounding material, is a major concern in areas from security checkpoints to UneXploded Ordnance (UXO) clearance. Techniques such as X-ray and trace detection are often ineffectual in these applications. Thermal neutron analysis (TNA) provides an effective method for detecting concealed threats. This paper shows the effectiveness of Ancore's SPEDS, based on TNA, in detecting concealed liquid threats and differentiating live from inert mortar shells.

  4. Age Differences in the Underlying Mechanisms of Stereotype Threat Effects

    PubMed Central

    Hess, Thomas M.

    2015-01-01

    Objectives. The goals of the present study were to (a) examine whether age differences exist in the mechanisms underlying stereotype threat effects on cognitive performance and (b) examine whether emotion regulation abilities may buffer against threat effects on performance. Method. Older and younger adults were exposed to positive or negative age-relevant stereotypes, allowing us to examine the impact of threat on regulatory focus and working memory. Self-reported emotion regulation measures were completed prior to the session. Results. Older adults’ performance under threat suggested a prevention-focused approach to the task, indexed by increased accuracy and reduced speed. The same pattern was observed in younger adults, but the effects were not as strong. Age differences emerged when examining the availability of working memory resources under threat, with young adults showing decrements, whereas older adults did not. Emotion regulation abilities moderated threat effects in young adults but not in older adults. Conclusions. The results provide support for the notion that stereotype threat may lead to underperformance through somewhat different pathways in older and younger adults. Future research should further examine whether the underlying reason for this age difference is rooted in age-related improvements in emotion regulation. PMID:24077743

  5. A Strengths-Weaknesses-Opportunities-Threats (SWOT) analysis on the clinical utility of sperm DNA fragmentation testing in specific male infertility scenarios.

    PubMed

    Esteves, Sandro C; Agarwal, Ashok; Cho, Chak-Lam; Majzoub, Ahmad

    2017-09-01

    Sperm DNA fragmentation (SDF) is recognized as a leading cause of male infertility because it can impair the paternal genome through distinct pathophysiological mechanisms. Current evidence supports SDF as a major factor in the pathophysiology of several conditions, including varicocele, unexplained infertility, assisted reproductive technology failure, and environmental lifestyle factors, although the mechanisms involved have not been fully described yet. Measurement of the levels of DNA fragmentation in semen provides valuable information on the integrity of paternal chromatin and may guide therapeutic strategies. A recently published clinical practice guideline (CPG) highlighted how to use the information provided by SDF testing in daily practice, which triggered a series of commentaries by leading infertility experts. These commentaries contained an abundance of information and conflicting views about the clinical utility of SDF testing, which underline the complex nature of SDF. A search of papers published in response to the CPG entitled "Clinical utility of sperm DNA fragmentation testing: practice recommendations based on clinical scenarios" was performed within the Translational Andrology and Urology ( TAU ) website (http://tau.amegroups.com/). The start and end dates for the search were May 2017 and August 2017, respectively. Each commentary meeting our inclusion criteria was rated as "supportive without reservation", "supportive with reservation", "not supportive" or "neutral". We recorded whether articles discussed either SDF characteristics as a laboratory test method or clinical scenarios, or both. Subsequently, we extracted the particulars from each commentary and utilized the 'Strengths-Weaknesses-Opportunities-Threats' (SWOT) analysis to understand the perceived advantages and drawbacks of SDF as a specialized sperm function method in clinical practice. Fifty-eight fertility experts from six continents and twenty-two countries contributed commentaries. Overall, participants (87.9%; n=51) were supportive of the recommendations provided by the CPG on the utility of SDF testing based on clinical scenarios. The majority of participants made explicit remarks about both the clinical scenarios and SDF assays' characteristics. Among 'not supportive' and 'supportive with reservation' participants, 75% (n=30/40) and 77.5% (n=31/40) expressed concerns related to technical limitations of SDF testing methods and clinical utility of the test in one or more clinical scenarios discussed in the CPG, respectively. The SWOT analysis revealed that the CPG provides a reasonable evidence-based proposal for integration of SDF testing in the routine daily practice. It also uncovered gaps of knowledge and threats limiting the widespread application of SDF in everyday practice, thus allowing the identification of opportunities to further refine SDF testing and its clinical utility. The understanding of the role of SDF in male infertility requires an in-depth analysis of the multifactorial pathophysiological processes and the theories involved. The SWOT analysis allowed an objective evaluation of CPG on the clinical utility of SDF testing based on clinical scenarios and its accompanying commentaries written by global experts in all possible angles. Implementation of SDF testing in the clinic may not only increase the outcome of ART but more importantly improve the health of both fathers to be and resulting offspring.

  6. Predictors of health behaviours in college students.

    PubMed

    Von Ah, Diane; Ebert, Sheryl; Ngamvitroj, Anchalee; Park, Najin; Kang, Duck-Hee

    2004-12-01

    This paper reports a study examining the direct effects of perceived stress, perceived availability of and satisfaction with social support, and self-efficacy, and examines the intermediary roles of perceived threat (perceived susceptibility x perceived severity), benefits, and barriers on alcohol behaviour, smoking behaviour, physical activity and nutrition behaviour, general safety behaviour and sun-protective behaviour in college students. Health behaviours formed during young adulthood may have a sustaining impact on health across later life. Entering college can be an exciting, yet stressful event for many adolescents and young adults as they face trying to adapt to changes in academic workloads, support networks, and their new environment. Coupled with these changes and new-found responsibilities, they have greater freedom and control over their lifestyles than ever before. However, researchers have shown globally that many college students engage in various risky health behaviours. A cross-sectional sample of 161 college students enrolled in an introductory psychology course completed self-report questionnaires regarding stress; social support; self-efficacy; and components of the Health Belief Model including perceived threat, perceived benefits, perceived barriers; and common health behaviours. Step-wise multiple regression analysis was conducted and significant predictors were retained as modifiers in the path analysis. Self-efficacy significantly predicted alcohol and smoking behaviour, physical activity and nutrition protective behaviour, general safety protective behaviour and sun-protective behaviour. Under high-perceived threat, self-efficacy was mediated by perceived barriers for binge drinking and moderated by perceived barriers for physical activity and nutrition behaviours. In addition, under high-perceived threat, self-efficacy was moderated by perceived threat for alcohol use at 30 days and 6 months. Under low threat, self-efficacy was mediated by perceived barriers for smoking behaviour and general safety protective behaviours. Future health promotion programmes with college students must use interventions that maximize self-efficacy and ultimately reduce barriers to adopting a healthy lifestyle.

  7. The threat simulation theory of the evolutionary function of dreaming: Evidence from dreams of traumatized children.

    PubMed

    Valli, Katja; Revonsuo, Antti; Pälkäs, Outi; Ismail, Kamaran Hassan; Ali, Karzan Jalal; Punamäki, Raija-Leena

    2005-03-01

    The threat simulation theory of dreaming (TST) () states that dream consciousness is essentially an ancient biological defence mechanism, evolutionarily selected for its capacity to repeatedly simulate threatening events. Threat simulation during dreaming rehearses the cognitive mechanisms required for efficient threat perception and threat avoidance, leading to increased probability of reproductive success during human evolution. One hypothesis drawn from TST is that real threatening events encountered by the individual during wakefulness should lead to an increased activation of the system, a threat simulation response, and therefore, to an increased frequency and severity of threatening events in dreams. Consequently, children who live in an environment in which their physical and psychological well-being is constantly threatened should have a highly activated dream production and threat simulation system, whereas children living in a safe environment that is relatively free of such threat cues should have a weakly activated system. We tested this hypothesis by analysing the content of dream reports from severely traumatized and less traumatized Kurdish children and ordinary, non-traumatized Finnish children. Our results give support for most of the predictions drawn from TST. The severely traumatized children reported a significantly greater number of dreams and their dreams included a higher number of threatening dream events. The dream threats of traumatized children were also more severe in nature than the threats of less traumatized or non-traumatized children.

  8. Local Public Health System Response to the Tsunami Threat in Coastal California following the Tōhoku Earthquake

    PubMed Central

    Hunter, Jennifer C.; Crawley, Adam W.; Petrie, Michael; Yang, Jane E.; Aragón, Tomás J.

    2012-01-01

    Background On Friday March 11, 2011 a 9.0 magnitude earthquake triggered a tsunami off the eastern coast of Japan, resulting in thousands of lives lost and billions of dollars in damage around the Pacific Rim. The tsunami first reached the California coast on Friday, March 11th, causing more than $70 million in damage and at least one death. While the tsunami’s impact on California pales in comparison to the destruction caused in Japan and other areas of the Pacific, the event tested emergency responders’ ability to rapidly communicate and coordinate a response to a potential threat. Methods To evaluate the local public health system emergency response to the tsunami threat in California, we surveyed all local public health, emergency medical services (EMS), and emergency management agencies in coastal or floodplain counties about several domains related to the tsunami threat in California, including: (1) the extent to which their community was affected by the tsunami, (2) when and how they received notification of the event, (3) which public health response activities were carried out to address the tsunami threat in their community, and (4) which organizations contributed to the response. Public health activities were characterized using the Centers for Disease Control and Prevention (CDC) Public Health Preparedness Capabilities (PHEP) framework. Findings The tsunami's impact on coastal communities in California ranged widely, both in terms of the economic consequences and the response activities. Based on estimates from the National Oceanic and Atmospheric Administration (NOAA), ten jurisdictions in California reported tsunami-related damage, which ranged from $15,000 to $35 million. Respondents first became aware of the tsunami threat in California between the hours of 10:00pm Pacific Standard Time (PST) on Thursday March 10th and 2:00pm PST on Friday March 11th, a range of 16 hours, with notification occurring through both formal and informal channels. In response to this threat, the activities most commonly reported by the local government agencies included in this study were: emergency public information and warning, emergency operations coordination, and inter-organizational information sharing, which were reported by 86%, 75%, and 65% of all respondents, respectively. When looking at the distribution of responsibility, emergency management agencies were the most likely to report assuming a lead role in these common activities as well as those related to evacuation and community recovery. While activated less frequently, public health agencies carried out emergency response functions related to surveillance and epidemiology, environmental health, and mental health/psychological support. Both local public health and EMS agencies took part in mass care and medical material management activities. A large network of organizations contributed to response activities, with emergency management, law enforcement, fire, public health, public works, EMS, and media cited by more than half of respondents. Conclusions In response to the tsunami threat in California, we found that emergency management agencies assumed a lead role in the local response efforts. While public health and medical agencies played a supporting role in the response, they uniquely contributed to a number of specific activities. If the response to the recent tsunami is any indication, these support activities can be anticipated in planning for future events with similar characteristics to the tsunami threat. Additionally, we found that many respondents first learned of the tsunami through the media, rather than through rapid notification systems, which suggests that government agencies must continue to develop and maintain the ability to rapidly aggregate and analyze information in order to provide accurate assessments and guidance to a potentially well-informed public. Citation: Hunter JC, Crawley AW, Petrie M, Yang JE, Aragón TJ. Local Public Health System Response to the Tsunami Threat in Coastal California following the Tōhoku Earthquake. PLoS Currents Disasters. 2012 Jul 16 PMID:22953236

  9. Local Public Health System Response to the Tsunami Threat in Coastal California following the Tōhoku Earthquake.

    PubMed

    Hunter, Jennifer C; Crawley, Adam W; Petrie, Michael; Yang, Jane E; Aragón, Tomás J

    2012-07-16

    Background On Friday March 11, 2011 a 9.0 magnitude earthquake triggered a tsunami off the eastern coast of Japan, resulting in thousands of lives lost and billions of dollars in damage around the Pacific Rim. The tsunami first reached the California coast on Friday, March 11th, causing more than $70 million in damage and at least one death. While the tsunami's impact on California pales in comparison to the destruction caused in Japan and other areas of the Pacific, the event tested emergency responders' ability to rapidly communicate and coordinate a response to a potential threat. Methods To evaluate the local public health system emergency response to the tsunami threat in California, we surveyed all local public health, emergency medical services (EMS), and emergency management agencies in coastal or floodplain counties about several domains related to the tsunami threat in California, including: (1) the extent to which their community was affected by the tsunami, (2) when and how they received notification of the event, (3) which public health response activities were carried out to address the tsunami threat in their community, and (4) which organizations contributed to the response. Public health activities were characterized using the Centers for Disease Control and Prevention (CDC) Public Health Preparedness Capabilities (PHEP) framework. Findings The tsunami's impact on coastal communities in California ranged widely, both in terms of the economic consequences and the response activities. Based on estimates from the National Oceanic and Atmospheric Administration (NOAA), ten jurisdictions in California reported tsunami-related damage, which ranged from $15,000 to $35 million. Respondents first became aware of the tsunami threat in California between the hours of 10:00pm Pacific Standard Time (PST) on Thursday March 10th and 2:00pm PST on Friday March 11th, a range of 16 hours, with notification occurring through both formal and informal channels. In response to this threat, the activities most commonly reported by the local government agencies included in this study were: emergency public information and warning, emergency operations coordination, and inter-organizational information sharing, which were reported by 86%, 75%, and 65% of all respondents, respectively. When looking at the distribution of responsibility, emergency management agencies were the most likely to report assuming a lead role in these common activities as well as those related to evacuation and community recovery. While activated less frequently, public health agencies carried out emergency response functions related to surveillance and epidemiology, environmental health, and mental health/psychological support. Both local public health and EMS agencies took part in mass care and medical material management activities. A large network of organizations contributed to response activities, with emergency management, law enforcement, fire, public health, public works, EMS, and media cited by more than half of respondents. Conclusions In response to the tsunami threat in California, we found that emergency management agencies assumed a lead role in the local response efforts. While public health and medical agencies played a supporting role in the response, they uniquely contributed to a number of specific activities. If the response to the recent tsunami is any indication, these support activities can be anticipated in planning for future events with similar characteristics to the tsunami threat. Additionally, we found that many respondents first learned of the tsunami through the media, rather than through rapid notification systems, which suggests that government agencies must continue to develop and maintain the ability to rapidly aggregate and analyze information in order to provide accurate assessments and guidance to a potentially well-informed public. Hunter JC, Crawley AW, Petrie M, Yang JE, Aragón TJ. Local Public Health System Response to the Tsunami Threat in Coastal California following the Tōhoku Earthquake. PLoS Currents Disasters. 2012 Jul 16.

  10. Dark clouds or silver linings? A stigma threat perspective on the implications of an autism diagnosis for workplace well-being.

    PubMed

    Johnson, Tiffany D; Joshi, Aparna

    2016-03-01

    This article unpacks the stigma associated with a developmental disability at work, specifically autism spectrum disorders (ASD), by presenting findings from 2 studies-one interview-based and the other survey-based. Drawing on in-depth interviews with individuals on the autism spectrum, the first study showed that a clinical diagnosis of autism is a milestone event that triggered both positive (silver linings) and negative (dark clouds) responses to work. These positive and negative responses were shaped by the age at which the diagnosis occurred as well as specific work-related contingencies-identity management (disclosing or not disclosing), the importance of the social demands imposed by the job, and organizational support policies for autism. The second study developed and tested propositions derived from the qualitative data by using survey data gathered from working adults with ASD. Results showed that, compared with individuals diagnosed later in life, individuals who were diagnosed at an earlier age experienced greater organization-based self-esteem and lower perceived discrimination when they disclosed their disability, worked in jobs that placed lower social demands on them, or were employed in organizations that offered policies to support workers with ASD. We conclude that, depending on the age of diagnosis, attributes of the employment context can trigger stigma-related threat in different ways and we outline important practical implications of these findings. (c) 2016 APA, all rights reserved).

  11. How Stereotype Threat Affects Healthy Older Adults’ Performance on Clinical Assessments of Cognitive Decline: The Key Role of Regulatory Fit

    PubMed Central

    Mather, Mara; Gatz, Margaret

    2015-01-01

    Objectives. Stereotype threat can impair older adults’ performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments’ reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Method. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Results. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Discussion. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat’s negative effects. By using a loss-avoidance frame, stereotype threat’s negative effects can be attenuated or even eliminated. PMID:25752896

  12. Confucian Values as a Buffer Against Age-Based Stereotype Threat for Chinese Older Adults.

    PubMed

    Tan, Shyuan Ching; Barber, Sarah J

    2018-05-16

    Research has shown that stereotype threat can impair older adults' memory in Western cultures. We tested whether this also occurs for older adults from the East Asian Chinese culture. We also tested whether an intervention that highlighted Confucian principles would protect Chinese older adults from stereotype threat's detrimental effects. Culturally-Chinese older adults residing in the United States completed a memory test either under age-based stereotype threat about cognitive decline or not. Prior to this, some participants were also reminded of Confucian traditions of filial piety and were assured these values had been transmitted to the younger generation. Stereotype threat impaired Chinese older adults' memory performance. However, our intervention was effective in eliminating this deficit. When the Chinese participants were reminded of the Confucian principle of filial piety they did not exhibit stereotype threat effects. Confirming that younger adults have an obligation to respect their elders can eliminate the social-evaluative pressure of stereotype threat for Chinese older adults. These findings are noteworthy since population aging is happening at an unprecedented pace in East Asia. Although our results suggest that stereotype threat can adversely affect older adults' cognitive performance in these societies, we also identify a culturally-based intervention to alleviate this impairment.

  13. You may worry, but can you recognize threats when you see them?; Neuroticism, threat identifications, and negative affect.

    PubMed

    Tamir, Maya; Robinson, Michael D; Solberg, Emily Crawford

    2006-10-01

    The present studies sought to investigate the hedonic consequences of threat-identification skills at low and high levels of neuroticism. Such skills were assessed in terms of both speed (Study 1) and accuracy (Study 2) of identifying threatening objects in cognitive tasks. As predicted, threat-identification skills interacted with trait neuroticism in predicting subjective experiences. Specifically, individuals high in neuroticism experienced lower levels of negative affect during their everyday lives if they were also skilled in identifying threats in the cognitive tasks (Studies 1-2). Such skills did not matter at low levels of neuroticism. This interactive pattern was also replicated in the context of life domain satisfaction (Study 2). The results support the view that avoidance motivation encompasses multiple component processes, including some that are cognitive in nature, and specifically extends self-regulatory views of neuroticism. Of most importance, our data indicate that threat-identification skills can be hedonically beneficial, rather than costly, at high levels of neuroticism.

  14. Acute effects of caffeine on threat-selective attention: moderation by anxiety and EEG theta/beta ratio.

    PubMed

    van Son, Dana; Schalbroeck, Rik; Angelidis, Angelos; van der Wee, Nic J A; van der Does, Willem; Putman, Peter

    2018-05-21

    Spontaneous EEG theta/beta ratio (TBR) probably marks prefrontal cortical (PFC) executive control, and its regulation of attentional threat-bias. Caffeine at moderate doses may strengthen executive control through increased PFC catecholamine action, dependent on basal PFC function. To test if caffeine affects threat-bias, moderated by baseline frontal TBR and trait-anxiety. A pictorial emotional Stroop task was used to assess threat-bias in forty female participants in a cross-over, double-blind study after placebo and 200 mg caffeine. At baseline and after placebo, comparable relations were observed for negative pictures: high TBR was related to low threat-bias in low trait-anxious people. Caffeine had opposite effects on threat-bias in low trait-anxious people with low and high TBR. This further supports TBR as a marker of executive control and highlights the importance of taking baseline executive function into consideration when studying effects of caffeine on executive functions. Copyright © 2018 Elsevier B.V. All rights reserved.

  15. Group Threat and Policy Change: The Spatial Dynamics of Prohibition Politics, 1890-1919.

    PubMed

    Andrews, Kenneth T; Seguin, Charles

    2015-09-01

    The authors argue that group threat is a key driver of the adoption of new and controversial policies. Conceptualizing threat in spatial terms, they argue that group threat is activated through the joint occurrence of (1) proximity to threatening groups and (2) the population density of threatened groups. By analyzing the adoption of county and state "dry laws" banning alcohol from 1890 to 1919, they first show that prohibition victories were driven by the relative strength of supportive constituencies such as native whites and rural residents, vis-à-vis opponents such as Irish, Italian, or German immigrants or Catholics. Second, they show that threat contributed to prohibition victories: counties bordering large immigrant or urban populations, which did not themselves contain similar populations, were more likely to adopt dry laws. Threat arises primarily from interactions between spatially proximate units at the local level, and therefore higher-level policy change is not reducible to the variables driving local policy.

  16. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    PubMed

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  17. Autonomic Nervous System Responses to Hearing-Related Demand and Evaluative Threat.

    PubMed

    Mackersie, Carol L; Kearney, Lucia

    2017-10-12

    This paper consists of 2 parts. The purpose of Part 1 was to review the potential influence of internal (person-related) factors on listening effort. The purpose of Part 2 was to present, in support of Part 1, preliminary data illustrating the interactive effects of an external factor (task demand) and an internal factor (evaluative threat) on autonomic nervous system measures. For Part 1, we provided a brief narrative review of motivation and stress as modulators of listening effort. For Part 2, we described preliminary data from a study using a repeated-measures (2 × 2) design involving manipulations of task demand (high, low) and evaluative threat (high, low). The low-demand task consisted of repetition of sentences from a narrative. The high-demand task consisted of answering questions about the narrative, requiring both comprehension and recall. During the high evaluative threat condition, participants were filmed and told that their video recordings would be evaluated by a panel of experts. During the low evaluative threat condition, no filming occurred; participants were instructed to "do your best." Skin conductance (sympathetic nervous system activity) and heart rate variability (HRV, parasympathetic activity) were measured during the listening tasks. The HRV measure was the root mean square of successive differences of adjacent interbeat intervals. Twelve adults with hearing loss participated. Skin conductance increased and HRV decreased relative to baseline (no task) for all listening conditions. Skin conductance increased significantly with an increase in evaluative threat, but only for the more demanding task. There was no significant change in HRV in response to increasing evaluative threat or task demand. Listening effort may be influenced by factors other than task difficulty, as reviewed in Part 1. This idea is supported by the preliminary data indicating that the sympathetic nervous system response to task demand is modulated by social evaluative threat. More work is needed to determine the relative contributions of motivation and emotional stress on physiological responses during listening tasks.

  18. [Social support to women in situation of domestic violence].

    PubMed

    Pereira-Gomes, Nadirlene; Lorenzini Erdmann, Alacoque; Rebouças-Gomes, Nadjane; da Silva-Monteiro, Deise; Moreira Dos Santos, Raiane; Menezes-Couto, Telmara

    2015-12-01

    Objective To understand the meanings attributed by health professionals to the social support of women in domestic violence situations. Methods We interviewed 52 professionals from five local health units of the municipality of Santa Catarina, Brazil. Data were processed based on the Grounded Theory. Results It was shown that the demands are related to the threats of companions and economic dependence, which justifies intersectorial referrals and women's inclusion in the income and employment generation program. Discussion Given the high demand and the health promotion prerogative of Primary Health Care, a greater availability of social workers within the Health Strategy is needed. Social support to women requires political interest in combining the health care sector with other resources available to combat violence.

  19. Relationships with Adults as Predictors of Substance Use, Gang Involvement, and Threats to Safety among Disadvantaged Urban High-School Adolescents

    ERIC Educational Resources Information Center

    Ryan, Linda G.; Miller-Loessi, Karen; Nieri, Tanya

    2007-01-01

    Using a resilience framework, the authors examined the protective effects of parental support, self-disclosure to parents, parent-initiated monitoring of adolescent behavior, and relationships with school personnel on three critical problems of adolescents: substance use, gang involvement, and perceived threats to safety at school. The sample…

  20. Black and Hispanic Immigrants' Resilience against Negative-Ability Racial Stereotypes at Selective Colleges and Universities in the United States

    ERIC Educational Resources Information Center

    Owens, Jayanti; Lynch, Scott M.

    2012-01-01

    Stereotype threat is a widely supported theory for understanding the racial achievement gap in college grade performance. However, today's minority college students are increasingly of immigrant origins, and it is unclear whether two dispositional mechanisms that may increase susceptibility to stereotype threat are applicable to immigrants. We use…

  1. A watershed decision support tool for managing invasive species on Hawai‘i Island, USA

    Treesearch

    Nicholas A. Povak; Paul F. Hessburg; Christian P. Giardina; Keith M. Reynolds; Chris Heider; Ed Salminen; R. Brion Salter; Richard A. MacKenzie

    2017-01-01

    Non-native species invasions, growing human populations, and climate change are central ecological concerns in tropical island communities. The combination of these threats have led to losses of native biota, altered hydrological and ecosystem processes, and reduced ecosystem services. These threats pose complex problems to often underfunded management entities. We...

  2. Using a Learning Progression Framework to Assess and Evaluate Student Growth

    ERIC Educational Resources Information Center

    Briggs, Derek C.; Diaz-Bilello, Elena; Peck, Fred; Alzen, Jessica; Chattergoon, Rajendra; Johnson, Raymond

    2015-01-01

    This report describes the use of a Learning Progression Framework (LPF) to support the Student Learning Objectives (SLO) process. The report highlights a few common threats we currently see in the SLO process implemented at various states and districts, and offers the LPF as a possible solution for addressing these threats. This report was…

  3. Reducing Future International Chemical and Biological Dangers.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Haddal, Chad; Bull, Diana L.; Hernandez, Patricia Marie

    The International Biological and Chemical Threat Reduction Program at Sandia National Laboratories is developing a 15 - year technology road map in support the United States Government efforts to reduce international chemical and biological dangers . In 2017, the program leadership chartered an analysis team to explore dangers in the future international chemical and biological landscape through engagements with national security experts within and beyond Sandia to gain a multidisciplinary perspective on the future . This report offers a hi gh level landscape of future chemical and biological dangers based upon analysis of those engagements and provides support for furthermore » technology road map development.« less

  4. From avoidance to approach: The influence of threat-of-shock on reward-based decision making.

    PubMed

    Bublatzky, Florian; Alpers, Georg W; Pittig, Andre

    2017-09-01

    Potential threat can prime defensive responding and avoidance behavior, which may result in the loss of rewards. When aversive consequences do not occur, avoidance should, thus, be quickly overcome in healthy individuals. This study examined the impact of threat anticipation on reward-based decisions. Sixty-five participants completed a decision-making task in which they had to choose between high- and low-reward options. To model an approach-avoidance conflict, the high-reward option was contingent with a threat-of-shock cue; the low-reward option was contingent with a safety cue. In control trials, decisions were made without threat/safety instructions. Overall, behavioral data documented a typical preference for the profitable option. Importantly, under threat-of-shock, participants initially avoided the profitable option (i.e., safe, but less profitable choices). However, when they experienced that shocks did actually not occur, participants overcame initial avoidance in favor of larger gains. Furthermore, autonomic arousal (skin conductance and heart rate responses) was elevated during threat cues compared to safety and non-threatening control cues. Taken together, threat-of-shock was associated with behavioral consequences: initially, participants avoided threat-related options but made more profitable decisions as they experienced no aversive consequences. Although socially acquired threat contingencies are typically stable, incentives for approach can help to overcome threat-related avoidance. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. 40 CFR 300.610 - Indian tribes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... behalf of the Indian tribes as trustees for the natural resources, including their supporting ecosystems..., destruction of, loss of, or threat to natural resources, including their supporting ecosystems as a result of...

  6. 40 CFR 300.610 - Indian tribes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... behalf of the Indian tribes as trustees for the natural resources, including their supporting ecosystems..., destruction of, loss of, or threat to natural resources, including their supporting ecosystems as a result of...

  7. 40 CFR 300.610 - Indian tribes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... behalf of the Indian tribes as trustees for the natural resources, including their supporting ecosystems..., destruction of, loss of, or threat to natural resources, including their supporting ecosystems as a result of...

  8. 40 CFR 300.610 - Indian tribes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... behalf of the Indian tribes as trustees for the natural resources, including their supporting ecosystems..., destruction of, loss of, or threat to natural resources, including their supporting ecosystems as a result of...

  9. 40 CFR 300.610 - Indian tribes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... behalf of the Indian tribes as trustees for the natural resources, including their supporting ecosystems..., destruction of, loss of, or threat to natural resources, including their supporting ecosystems as a result of...

  10. The association between the perception of threat in a dating situation and sexual victimization.

    PubMed

    Breitenbecher, K H

    1999-01-01

    The purpose of the present investigation was to assess the relation between threat perception in a dating situation and sexual victimization. During an initial session, participants in the experimental condition (n = 116) viewed a video that depicts a heterosexual couple interacting on a date and reflects risk factors for sexual assault. Participants in the control condition (n = 108) viewed a video that does not contain such risk factors. Participants in each condition also responded to survey instruments assessing demographic variables, history of child sexual abuse, history of adolescent sexual assault, and perception of threat cues in the stimulus videos. A subset of participants (n = 66) returned for a 5-month follow-up session and was assessed for experience of sexual assault during the follow-up period. Results fail to support an association between threat perception and sexual victimization history or an association between threat perception and sexual victimization during the follow-up period.

  11. BLACK AND HISPANIC IMMIGRANTS' RESILIENCE AGAINST NEGATIVE ABILITY RACIAL STEREOTYPES AT SELECTIVE COLLEGES AND UNIVERSITIES IN THE UNITED STATES*

    PubMed

    Owens, Jayanti; Lynch, Scott M

    2012-10-01

    Stereotype threat is a widely supported theory for understanding the racial achievement gap in college grade performance. However, today's minority college students are increasingly of immigrant origins, and it is unclear whether two dispositional mechanisms that may increase susceptibility to stereotype threat are applicable to immigrants. We use survey data to examine whether and how negative ability stereotypes affect the grades of 1,865 first, second, and third generation or higher (domestic) minority students at 28 selective American colleges. Structural equation model results indicate that first generation immigrants are highly-resistant to both dispositional identity threat mechanisms we consider. Second generation immigrants experience only certain dispositional elements of identity threat. Drawing on research in social psychology, we suggest immigrants tend to resist stereotype threat in part due to the primacy of their immigrant identities and their connectedness to the opportunity structure of mainstream society.

  12. Prototype integration of the joint munitions assessment and planning model with the OSD threat methodology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lynn, R.Y.S.; Bolmarcich, J.J.

    The purpose of this Memorandum is to propose a prototype procedure which the Office of Munitions might employ to exercise, in a supportive joint fashion, two of its High Level Conventional Munitions Models, namely, the OSD Threat Methodology and the Joint Munitions Assessment and Planning (JMAP) model. The joint application of JMAP and the OSD Threat Methodology provides a tool to optimize munitions stockpiles. The remainder of this Memorandum comprises five parts. The first is a description of the structure and use of the OSD Threat Methodology. The second is a description of JMAP and its use. The third discussesmore » the concept of the joint application of JMAP and OSD Threat Methodology. The fourth displays sample output of the joint application. The fifth is a summary and epilogue. Finally, three appendices contain details of the formulation, data, and computer code.« less

  13. BLACK AND HISPANIC IMMIGRANTS’ RESILIENCE AGAINST NEGATIVE ABILITY RACIAL STEREOTYPES AT SELECTIVE COLLEGES AND UNIVERSITIES IN THE UNITED STATES*

    PubMed Central

    Owens, Jayanti; Lynch, Scott M.

    2013-01-01

    Stereotype threat is a widely supported theory for understanding the racial achievement gap in college grade performance. However, today’s minority college students are increasingly of immigrant origins, and it is unclear whether two dispositional mechanisms that may increase susceptibility to stereotype threat are applicable to immigrants. We use survey data to examine whether and how negative ability stereotypes affect the grades of 1,865 first, second, and third generation or higher (domestic) minority students at 28 selective American colleges. Structural equation model results indicate that first generation immigrants are highly-resistant to both dispositional identity threat mechanisms we consider. Second generation immigrants experience only certain dispositional elements of identity threat. Drawing on research in social psychology, we suggest immigrants tend to resist stereotype threat in part due to the primacy of their immigrant identities and their connectedness to the opportunity structure of mainstream society. PMID:24077577

  14. Authoritarianism, conservatism, racial diversity threat, and the state distribution of hate groups.

    PubMed

    McCann, Stewart J H

    2010-01-01

    On the basis of K. Stenner's (2005) authoritarian dynamic theory, the author hypothesized that there is an interaction between U.S. state conservatism-liberalism and state racial heterogeneity threat, such that greater diversity threat tends to be associated with more hate groups in more conservative states and fewer hate groups in more liberal states. State aggregates of the conservative-liberal ideological preferences of 141,798 participants from 122 CBS News/New York Times national telephone polls conducted between 1976 and 1988 (R. S. Erikson, G. C. Wright, & J. P. McIver, 1993) served as proxies for authoritarian-nonauthoritarian dispositions. For the 47 states with complete data, the hypothesized interaction was tested for 2000, 2005, and 2006 with hierarchical multiple regression strategies and supported. The author's hypothesis was also affirmed with SES and the interaction of SES and diversity threat controlled for. In contrast, SES entirely accounted for simple relationships between threat and hate group frequency.

  15. Psychological distress and the role of significant others in a population of gay/bisexual men in the era of HIV.

    PubMed

    Britton, P J; Zarski, J J; Hobfoll, S E

    1993-01-01

    This study, based on The Conservation of Resources Theory (COR), explores the relationship between social resources and psychological distress, as reported by gay/bisexual men who are at varying degrees of risk for HIV. This study involves theory-based stress research, and adds to the body of literature that addresses social support and gay men. Specific emphasis was placed on the process of social support by significant others in relationship to the devastating impact HIV has on the gay/bisexual community. The investigators employed an ex-post facto design that was guided by past and present theoretical and empirical data, and by specific research hypotheses. The findings suggest that facets of social support appear to be interactively related to the perceived threat of HIV in predicting distress. In general, this study supports COR theory in that resources were related to the experience of psychological distress, yet it emphasizes that the relationship between support and gay men is complex, and thus generalizations from findings based on research with the majority culture may not apply to a population of gay/bisexual men. Implications for future research are also provided.

  16. Fire patterns in the range of the greater sage-grouse, 1984-2013 — Implications for conservation and management

    USGS Publications Warehouse

    Brooks, Matthew L.; Matchett, John R.; Shinneman, Douglas J.; Coates, Peter S.

    2015-09-10

    The results indicate that fire threats are higher in the four western than in the three eastern management zones. Among the four western management zones, the Snake River Plain and the Columbia Basin ranked somewhat higher than the Southern Great Basin and Northern Great Basin in terms of fire effects on sage-grouse habitat. These results support the previous high ranking of fire as a threat to the greater sage-grouse in the western region. In contrast, considering the low rankings for fire threats in the eastern region, it may be useful to reconsider the relative importance of wildfire as a threat to greater sage-grouse in those three management zones.

  17. Performance-Based Design for Arson Threats: Policy Analysis of the Physical Security for Federal Facilities Standard

    DTIC Science & Technology

    2013-09-01

    2012.0002- IR -EP7-A 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 12b. DISTRIBUTION CODE A...extremist web forums is directed at Western audiences and supports Homeland attacks. (U.S. Department of Homeland Security Office of Intelligence and...23 In this context, “before the event.” 24 Yung and Benichou’s paper originally was presented at the 5th Fire

  18. The hack attack - Increasing computer system awareness of vulnerability threats

    NASA Technical Reports Server (NTRS)

    Quann, John; Belford, Peter

    1987-01-01

    The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).

  19. Fluctuations in [11C]SB207145 PET Binding Associated with Change in Threat-Related Amygdala Reactivity in Humans

    PubMed Central

    Fisher, Patrick MacDonald; Haahr, Mette Ewers; Jensen, Christian Gaden; Frokjaer, Vibe Gedsoe; Siebner, Hartwig Roman; Knudsen, Gitte Moos

    2015-01-01

    Serotonin critically affects the neural processing of emotionally salient stimuli, including indices of threat; however, how alterations in serotonin signaling contribute to changes in brain function is not well understood. Recently, we showed in a placebo-controlled study of 32 healthy males that brain serotonin 4 receptor (5-HT4) binding, assessed with [11C]SB207145 PET, was sensitive to a 3-week intervention with the selective serotonin reuptake inhibitor fluoxetine, supporting it as an in vivo model for fluctuations in central serotonin levels. Participants also underwent functional magnetic resonance imaging while performing a gender discrimination task of fearful, angry, and neutral faces. This offered a unique opportunity to evaluate whether individual fluctuations in central serotonin levels, indexed by change in [11C]SB207145 binding, predicted changes in threat-related reactivity (ie, fear and angry vs neutral faces) within a corticolimbic circuit including the amygdala and medial prefrontal and anterior cingulate cortex. We observed a significant association such that decreased brain-wide [11C]SB207145 binding (ie, increased brain serotonin levels) was associated with lower threat-related amygdala reactivity, whereas intervention group status did not predict change in corticolimbic reactivity. This suggests that in the healthy brain, interindividual responses to pharmacologically induced and spontaneously occurring fluctuations in [11C]SB207145 binding, a putative marker of brain serotonin levels, affect amygdala reactivity to threat. Our finding also supports that change in brain [11C]SB207145 binding may be a relevant marker for evaluating neurobiological mechanisms underlying sensitivity to threat and serotonin signaling. PMID:25560201

  20. Within-subject neural reactivity to reward and threat is inverted in young adolescents.

    PubMed

    Thomason, M E; Marusak, H A

    2017-07-01

    As children mature, they become increasingly independent and less reliant on caregiver support. Changes in brain systems are likely to stimulate and guide this process. One mechanistic hypothesis suggests that changes in neural systems that process reward and threat support the increase in exploratory behavior observed in the transition to adolescence. This study examines the basic tenets of this hypothesis by performing functional magnetic resonance imaging (fMRI) during well-established reward and threat processing tasks in 40 children and adolescents, aged 9-15 years. fMRI responses in the striatum and amygdala are fit to a model predicting that striatal reward and amygdala threat-responses will be unrelated in younger participants (aged 9-12 years), while older participants (aged 13-15 years) will differentially engage these structures. Our data are consistent with this model. Activity in the striatum and amygdala are comparable in younger children, but in older children, they are inversely related; those more responsive to reward show a reduced threat-response. Analyses testing age as a continuous variable yield consistent results. In addition, the proportion of threat to reward-response relates to self-reported approach behavior in older but not younger youth, exposing behavioral relevance in the relative level of activity in these structures. Results are consistent with the notion that both individual and developmental differences drive reward-seeking behavior in adolescence. While these response patterns may serve adaptive functions in the shift to independence, skew in these systems may relate to increased rates of emotional psychopathology and risk-taking observed in adolescence.

  1. FADS: A demonstrator for MilComSat AOCS

    NASA Astrophysics Data System (ADS)

    Huddleston, Martin; Cope, Paul

    1995-03-01

    This project covers the attitude and orbit control systems (AOCS) research program being carried out as part of the MOD applied research program for AD CIS(OR)1. The project program is to evaluate the candidate sensor technologies and control algorithms, such as Kalman filters, which may be applied to future UK military ComSats. The specific needs of military satellites for robust and threat-resistant control are not offered by current civil technologies which normally use vulnerable earth sensors or RF pointing which is vulnerable to deception. The program is also to investigate ways of reducing control system complexity and improvements in attitude control precision by enabling structural modes to be controlled. The project examines the most promising attitude control system technologies required to support such future communications payloads. User requirements indicate a need for improved threat resistance and for narrower spot beams, and the program supports this perceived need by the use of improved sensors and control algorithms. Improved pointing on civil ComSats is normally by means of ground RF measurements to form a closed loop control system with the spacecraft. For threat reasons this method is unsuitable for military ComSats, and on-board sensors are therefore used. The use of Silicon array star or earth sensors are the most promising, and the sensor program is to concentrate on these. Limited development and available civil sensors will be considered. Experimental work is based on demonstrating and evaluating real hardware in-the-loop on an existing air bearing experimental rig. This offers the closest simulation of real flight performance that can be obtained. The program will develop the Filtered Attitude Determination System (FADS)rig to be fully representative of a MilSatCom satellite, threat-resistant AOCS solution, employing Silicon array star and earth sensors. Both the BAe Mosaic Earth Sensor (MES) nad Marconi Versatile Star Sensor (VSS) technologies show considerable potential as attitude sensors. The VSS and MES capabilities will be evalutated on the FADS rig.

  2. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  3. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    PubMed

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil biota. Copyright © 2015 The Authors. Published by Elsevier B.V. All rights reserved.

  4. Are Older Adults Perceived as A Threat to Society? Exploring Perceived Age-Based Threats in 29 Nations.

    PubMed

    Ayalon, Liat

    2017-08-05

    The present study adds to the current body of literature by simultaneously examining the public perception of young and old people as posing realistic threats (e.g., to the group's power, resources, and welfare) and symbolic threats (e.g., to one's world view, belief system and values). The fourth wave of the European Social Survey was administered to individuals from 29 countries. Analysis is based on 56,170 individuals, who had data on the four relevant indicators. The study relied on a latent profile analysis to develop a typology of perceived realistic and symbolic threats to society by younger and older adults. A three-profile solution indicated that the perception of older and younger adults as threats to society often co-occurs. Sociodemographic characteristics at the individual-level and the Gini coefficient (e.g., an inequality indicator) at the country-level had differential associations with the profiles identified. The study calls for a more balanced approach which evaluates attitudes toward both younger and older adults as potential sources of threat. Attention should be paid to individual- and national-level characteristics associated with age-based threats (e.g., the perception of a group, defined by its chronological age, as threatening). © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. Small Change Makes a Big Splash: The Role of Working Self-Concept in the Effects of Stereotype Threat on Memory.

    PubMed

    Liu, Pei; Zhao, Fengqing; Zhang, Baoshan; Dang, Qingxiu

    2017-10-03

    Assuming that the principle of an active-self account holds true in real life, priming certain constructs could selectively activate a working self-concept, which in turn guides behavior. The current study involved two experiments that examined the relationships between stereotypic identity, working self-concept, and memory performance in older adults. Specifically, Study 1 tested whether a stereotype threat can affect older adults' working self-concept and memory performance. A modified Stroop color naming task and a separate recognition task showed that a stereotype threat prime altered the activation of the working self-concept and deteriorated the older adults' memory performance. Additionally, the working self-concept mediated the effect of stereotype threat on memory performance. Accordingly, we designed Study 2 to assess whether priming different identities can alter the working self-concept of the elderly and buffer the stereotype threat effect on memory performance. The results not only were the same as Study 1 but also revealed that activating multiple identities could mitigate the stereotype threat. These results support an active-self account and the efficacy of stereotype threat intervention. This intervention strategy may be able to be used in real situations to help the elderly alleviate stereotype threats and memory impairment.

  6. Generalized Anxiety Disorder, worry and attention to threat: A systematic review.

    PubMed

    Goodwin, Huw; Yiend, Jenny; Hirsch, Colette R

    2017-06-01

    Among anxious populations, attention has been demonstrated to be preferentially biased to threatening material compared to neutral or other valenced material. Individuals who have high levels of trait worry, such as those with Generalized Anxiety Disorder (GAD), may be biased to threat but research has produced equivocal findings. This review aimed to systematically review the extant experimental literature to establish the current evidence of attentional bias to threat among trait worriers compared to healthy controls and other clinical populations. Twenty-nine published articles were included in the final review. There was strong evidence of a bias to threat among GAD patients compared to other groups and this was found across most experimental paradigms. Few studies had investigated this bias in non-clinical trait worriers. Among GAD patients this bias to threat was most strongly evidenced when visual threat material was in a verbal-linguistic format (i.e., words) rather than when in pictorial form (i.e., images or faces). The bias was also found across several domains of negative material, supporting the general nature of worry. Further research should look to examine the specific components of the threat bias in GAD, as well as investigating the bias to threat in trait worriers. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Very first impressions.

    PubMed

    Bar, Moshe; Neta, Maital; Linz, Heather

    2006-05-01

    First impressions of people's personalities are often formed by using the visual appearance of their faces. Defining how quickly these impressions can be formed has critical implications for understanding social interactions and for determining the visual properties used to shape them. To study impression formation independent of emotional cues, threat judgments were made on faces with a neutral expression. Consequently, participants' judgments pertained to the personality rather than to a certain temporary emotional state (e.g., anger). The results demonstrate that consistent first impressions can be formed very quickly, based on whatever information is available within the first 39 ms. First impressions were less consistent under these conditions when the judgments were about intelligence, suggesting that survival-related traits are judged more quickly. The authors propose that low spatial frequencies mediate this swift formation of threat judgments and provide evidence that supports this hypothesis. 2006 APA, all rights reserved

  8. Threats during sex work and association with mental health among young female sex workers in Hong Kong.

    PubMed

    Mo, Phoenix K H; Mak, Winnie W S; Kwok, Yvonne T Y; Xin, Meiqi; Chan, Charlie W L; Yip, Louise W M

    2018-08-01

    Young female sex workers (YFSWs) are confronted with significant threats during sex work. The present cross-sectional study examined different levels of threats (i.e., threats to life and health, threats to humanity, threats to control of work and financial security, and the threats to future) experienced by 87 YFSWs (age 16-25) in Hong Kong, and identified their association with mental health (i.e., psychological well-being) together with other factors, including childhood trauma, self-efficacy, hope, and social support. Results showed that the participants encountered a significant number of threats. More than half reported that they had a condom removed by clients during sex (51.7%); or have been humililated by clients (51.7%). Because of sex work, about a quarter (25.3%) have had sexually transmitted disease, and respectively 10.3% and 12.6% have had abortion and unplanned pregnancy. The majority have had friends found out that they engaged in sex work (72.4%). They also showed a high level of worry about the various threats. Multiple linear regression analysis showed that childhood trauma (β = -.26) and worry about threats during sex work (β = -.22) were significantly negative predictors, while self-efficacy (β = .20) and hope (β = .27) were significantly positive predictors of mental health. Future services should improve YFSWs' skills to minimize potential threats during female sex work, address the structural correlates and relieve their worries, and empower them with more hope and self-efficacy in choosing clients.

  9. Using resilience and resistance concepts to manage persistent threats to sagebrush ecosystems and greater sage-grouse

    Treesearch

    Jeanne C. Chambers; Jeremy D. Maestas; David A. Pyke; Chad S. Boyd; Mike Pellant; Amarina Wuenschel

    2017-01-01

    Conservation of imperiled species often demands addressing a complex suite of threats that undermine species viability. Regulatory approaches, such as the US Endangered Species Act (1973), tend to focus on anthropogenic threats through adoption of policies and regulatory mechanisms. However, persistent ecosystem-based threats, such as invasive species and altered...

  10. Adaptation of a paradigm for examining the development of fear beliefs through the verbal information pathway in preschool-age children.

    PubMed

    Rifkin, Lara S; Schofield, Casey A; Beard, Courtney; Armstrong, Thomas

    2016-12-01

    Verbal threat information has been shown to induce fear beliefs in school-age children (i.e. 6-12 years; for a review see Muris & Field, 2010). The current study adapted an existing paradigm (Field & Lawson, 2003) to examine the impact of verbal threat information on self-report and behavioral measures of fear in preschool-age children. Thirty children (aged 3-5) were provided with threat, positive, or no information about three novel Australian marsupials. There was a significant increase in fear belief for the animal associated with threat information compared to the animal associated with positive or no information. Verbal threat information did not impact behavioral avoidance in the complete sample; however, findings from an exploratory subgroup analysis excluding three-year-olds indicated that children demonstrated significant behavioral avoidance for the threat condition compared to the positive condition. These findings provide additional support for Rachman's theory of fear acquisition (1977, 1991) and suggest this paradigm may be used to examine the age at which verbal threat information becomes a relevant mode of fear acquisition for young children. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. How to test the threat-simulation theory.

    PubMed

    Revonsuo, Antti; Valli, Katja

    2008-12-01

    Malcolm-Smith, Solms, Turnbull and Tredoux [Malcolm-Smith, S., Solms, M.,Turnbull, O., & Tredoux, C. (2008). Threat in dreams: An adaptation? Consciousness and Cognition, 17, 1281-1291.] have made an attempt to test the Threat-Simulation Theory (TST), a theory offering an evolutionary psychological explanation for the function of dreaming [Revonsuo, A. (2000a). The reinterpretation of dreams: An evolutionary hypothesis of the function of dreaming. Behavioral and Brain Sciences, 23(6), 877-901]. Malcolm-Smith et al. argue that empirical evidence from their own study as well as from some other studies in the literature does not support the main predictions of the TST: that threatening events are frequent and overrepresented in dreams, that exposure to real threats activates the threat-simulation system, and that dream threats contain realistic rehearsals of threat avoidance responses. Other studies, including our own, have come up with results and conclusions that are in conflict with those of Malcolm-Smith et al. In this commentary, we provide an analysis of the sources of these disagreements, and their implications to the TST. Much of the disagreement seems to stem from differing interpretations of the theory and, consequently, of differing methods to test it.

  12. Medical radiation countermeasures for nuclear and radiological emergencies: Current status and future perspectives

    PubMed Central

    Arora, Rajesh; Chawla, Raman; Marwah, Rohit; Kumar, Vinod; Goel, Rajeev; Arora, Preeti; Jaiswal, Sarita; Sharma, Rakesh Kumar

    2010-01-01

    Nuclear and radiological emergencies (NREs) occurred globally and recent incidences in India are indicating toward the need for comprehensive medical preparedness required both at incident site and hospitals. The enhanced threat attributed toward insurgency is another causative factor of worry. The response capabilities and operational readiness of responders (both health and non-health service providers) in contaminated environment need to be supported by advancement in R & D and technological efforts to develop prophylactics and radiation mitigators. It is essential to develop phase 1 alternatives of such drugs for unseen threats as a part of initial preparedness. At the incident site and hospital level, external decontamination procedures need to be standardized and supported by protective clothing and Shudika kits developed by INMAS. The medical management of exposure requires systematic approach to perform triage, resuscitation and curative care. The internal contamination requires decorporation agents to be administered based on procedural diagnostics. Various key issues pertaining to policy decisions, R & D promotion, community awareness, specialized infrastructure for NREs preparedness has been discussed. The present review is an attempt to provide vital information about the current status of various radiation countermeasures and future perspective(s) ahead. PMID:21829316

  13. The Threat of Convergence of Terror Groups with Transnational Criminal Organizations in Order to Utilize Existing Smuggling Routes and Techniques to Aid in the Covert Entry of Operatives into the United States

    DTIC Science & Technology

    2015-06-12

    money laundering operations that support criminal and terrorist organizations. Transnational organizations transcend the borders and operate globally...Modlin Thesis Title: The Threat of Convergence of Terror Groups with Transnational Criminal Organizations in Order to Utilize Existing Smuggling

  14. Anxiety and the Processing of Emotionally Threatening Stimuli: Distinctive Patterns of Selective Attention among High- and Low-Test-Anxious Children.

    ERIC Educational Resources Information Center

    Vasey, Michael W.; And Others

    1996-01-01

    Tested for bias toward shifting attention toward threatening stimuli among high-anxious children and away from such stimuli among low-anxious children, ages 11-14. Results supported the predicted attentional bias toward threat cues among high-test-anxious children. Unexpectedly, the predicted attentional bias away from threat cues among…

  15. Thinking About the Unthinkable: The Relationship Between Death Anxiety and Cognitive/Emotional Response to the Threat of Nuclear War.

    ERIC Educational Resources Information Center

    Hamilton, Scott B.; And Others

    1988-01-01

    Examined relationship betwen death anxiety and cognitive/emotional responses to the threat of nuclear war in 345 college students. Results from Templer Death Anxiety Scale and questionnaire about nuclear war found death anxiety positively related to nuclear anxiety, and negligibly associated with perceptions of political efficacy and support for…

  16. A review of the impacts of degradation threats on soil properties in the UK.

    PubMed

    Gregory, A S; Ritz, K; McGrath, S P; Quinton, J N; Goulding, K W T; Jones, R J A; Harris, J A; Bol, R; Wallace, P; Pilgrim, E S; Whitmore, A P

    2015-10-01

    National governments are becoming increasingly aware of the importance of their soil resources and are shaping strategies accordingly. Implicit in any such strategy is that degradation threats and their potential effect on important soil properties and functions are defined and understood. In this paper, we aimed to review the principal degradation threats on important soil properties in the UK, seeking quantitative data where possible. Soil erosion results in the removal of important topsoil and, with it, nutrients, C and porosity. A decline in soil organic matter principally affects soil biological and microbiological properties, but also impacts on soil physical properties because of the link with soil structure. Soil contamination affects soil chemical properties, affecting nutrient availability and degrading microbial properties, whilst soil compaction degrades the soil pore network. Soil sealing removes the link between the soil and most of the 'spheres', significantly affecting hydrological and microbial functions, and soils on re-developed brownfield sites are typically degraded in most soil properties. Having synthesized the literature on the impact on soil properties, we discuss potential subsequent impacts on the important soil functions, including food and fibre production, storage of water and C, support for biodiversity, and protection of cultural and archaeological heritage. Looking forward, we suggest a twin approach of field-based monitoring supported by controlled laboratory experimentation to improve our mechanistic understanding of soils. This would enable us to better predict future impacts of degradation processes, including climate change, on soil properties and functions so that we may manage soil resources sustainably.

  17. Extraction and classification of 3D objects from volumetric CT data

    NASA Astrophysics Data System (ADS)

    Song, Samuel M.; Kwon, Junghyun; Ely, Austin; Enyeart, John; Johnson, Chad; Lee, Jongkyu; Kim, Namho; Boyd, Douglas P.

    2016-05-01

    We propose an Automatic Threat Detection (ATD) algorithm for Explosive Detection System (EDS) using our multistage Segmentation Carving (SC) followed by Support Vector Machine (SVM) classifier. The multi-stage Segmentation and Carving (SC) step extracts all suspect 3-D objects. The feature vector is then constructed for all extracted objects and the feature vector is classified by the Support Vector Machine (SVM) previously learned using a set of ground truth threat and benign objects. The learned SVM classifier has shown to be effective in classification of different types of threat materials. The proposed ATD algorithm robustly deals with CT data that are prone to artifacts due to scatter, beam hardening as well as other systematic idiosyncrasies of the CT data. Furthermore, the proposed ATD algorithm is amenable for including newly emerging threat materials as well as for accommodating data from newly developing sensor technologies. Efficacy of the proposed ATD algorithm with the SVM classifier is demonstrated by the Receiver Operating Characteristics (ROC) curve that relates Probability of Detection (PD) as a function of Probability of False Alarm (PFA). The tests performed using CT data of passenger bags shows excellent performance characteristics.

  18. Gender-, Race-, and Income-Based Stereotype Threat: The Effects of Multiple Stigmatized Aspects of Identity on Math Performance and Working Memory Function

    ERIC Educational Resources Information Center

    Tine, Michele; Gotlieb, Rebecca

    2013-01-01

    This study compared the relative impact of gender-, race-, and income-based stereotype threat and examined if individuals with multiple stigmatized aspects of identity experience a larger stereotype threat effect on math performance and working memory function than people with one stigmatized aspect of identity. Seventy-one college students of the…

  19. Satellite Data Aid Monitoring of Nation's Forests

    NASA Technical Reports Server (NTRS)

    2014-01-01

    The USDA Forest Service’s Asheville, North Carolina-based Eastern Forest Environmental Threat Assessment Center and Prineville, Oregon-based Western Wildlands Environmental Threat Assessment Center partnered with Stennis Space Center and other agencies to create an early warning system to identify, characterize, and track disturbances from potential forest threats. The result was ForWarn, which is now being used by federal and state forest and natural resource managers.

  20. Ecosystem Risk Assessment Using the Comprehensive Assessment of Risk to Ecosystems (CARE) Tool

    NASA Astrophysics Data System (ADS)

    Battista, W.; Fujita, R.; Karr, K.

    2016-12-01

    Effective Ecosystem Based Management requires a localized understanding of the health and functioning of a given system as well as of the various factors that may threaten the ongoing ability of the system to support the provision of valued services. Several risk assessment models are available that can provide a scientific basis for understanding these factors and for guiding management action, but these models focus mainly on single species and evaluate only the impacts of fishing in detail. We have developed a new ecosystem risk assessment model - the Comprehensive Assessment of Risk to Ecosystems (CARE) - that allows analysts to consider the cumulative impact of multiple threats, interactions among multiple threats that may result in synergistic or antagonistic impacts, and the impacts of a suite of threats on whole-ecosystem productivity and functioning, as well as on specific ecosystem services. The CARE model was designed to be completed in as little as two hours, and uses local and expert knowledge where data are lacking. The CARE tool can be used to evaluate risks facing a single site; to compare multiple sites for the suitability or necessity of different management options; or to evaluate the effects of a proposed management action aimed at reducing one or more risks. This analysis can help users identify which threats are the most important at a given site, and therefore where limited management resources should be targeted. CARE can be applied to virtually any system, and can be modified as knowledge is gained or to better match different site characteristics. CARE builds on previous ecosystem risk assessment tools to provide a comprehensive assessment of fishing and non-fishing threats that can be used to inform environmental management decisions across a broad range of systems.

  1. Ecosystem Risk Assessment Using the Comprehensive Assessment of Risk to Ecosystems (CARE) Tool

    NASA Astrophysics Data System (ADS)

    Battista, W.; Fujita, R.; Karr, K.

    2016-02-01

    Effective Ecosystem Based Management requires a localized understanding of the health and functioning of a given system as well as of the various factors that may threaten the ongoing ability of the system to support the provision of valued services. Several risk assessment models are available that can provide a scientific basis for understanding these factors and for guiding management action, but these models focus mainly on single species and evaluate only the impacts of fishing in detail. We have developed a new ecosystem risk assessment model - the Comprehensive Assessment of Risk to Ecosystems (CARE) - that allows analysts to consider the cumulative impact of multiple threats, interactions among multiple threats that may result in synergistic or antagonistic impacts, and the impacts of a suite of threats on whole-ecosystem productivity and functioning, as well as on specific ecosystem services. The CARE model was designed to be completed in as little as two hours, and uses local and expert knowledge where data are lacking. The CARE tool can be used to evaluate risks facing a single site; to compare multiple sites for the suitability or necessity of different management options; or to evaluate the effects of a proposed management action aimed at reducing one or more risks. This analysis can help users identify which threats are the most important at a given site, and therefore where limited management resources should be targeted. CARE can be applied to virtually any system, and can be modified as knowledge is gained or to better match different site characteristics. CARE builds on previous ecosystem risk assessment tools to provide a comprehensive assessment of fishing and non-fishing threats that can be used to inform environmental management decisions across a broad range of systems.

  2. The Longitudinal Effects of Chronic Mediated Exposure to Political Violence on Ideological Beliefs About Political Conflicts Among Youths

    PubMed Central

    Gvirsman, Shira Dvir; Huesmann, L. Rowell; Dubow, Eric F.; Landau, Simha F.; Boxer, Paul; Shikaki, Khalil

    2015-01-01

    This study examines the effects of chronic (i.e., repeated and cumulative) mediated exposure to political violence on ideological beliefs regarding political conflict. It centers on these effects on young viewers, from preadolescents to adolescents. Ideological beliefs refers here to support of war, perception of threat to one's nation, and normative beliefs concerning aggression toward the out-group. A longitudinal study was conducted on a sample of Israeli and Palestinian youths who experience the Israeli-Palestinian conflict firsthand (N = 1,207). Two alternative hypotheses were tested: that chronic exposure via the media increases support for war and aggression and elevates feeling of threat, or that chronic exposure via the media strengthens preexisting beliefs. Results demonstrated that higher levels of exposure were longitudinally related to stronger support for war. Regarding normative beliefs about aggression and threat to one's nation, mediated exposure reinforced initial beliefs, rendering the youths more extreme in their attitudes. These results mostly support the conceptualization of the relation between media violence and behaviors as “reciprocally determined” or “reinforcing spirals.” The results are also discussed in light of the differences found between the effect of exposure to political violence firsthand and exposure via the media. PMID:26997852

  3. 40 CFR 300.600 - Designation of federal trustees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... resources, including their supporting ecosystems. They are authorized to act pursuant to section 107(f) of..., loss of, or threat to natural resources, including their supporting ecosystems, as a result of a... following natural resources and their supporting ecosystems: marine fishery resources; anadromous fish...

  4. 40 CFR 300.600 - Designation of federal trustees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... resources, including their supporting ecosystems. They are authorized to act pursuant to section 107(f) of..., loss of, or threat to natural resources, including their supporting ecosystems, as a result of a... following natural resources and their supporting ecosystems: marine fishery resources; anadromous fish...

  5. 40 CFR 300.600 - Designation of federal trustees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... resources, including their supporting ecosystems. They are authorized to act pursuant to section 107(f) of..., loss of, or threat to natural resources, including their supporting ecosystems, as a result of a... following natural resources and their supporting ecosystems: marine fishery resources; anadromous fish...

  6. 40 CFR 300.600 - Designation of federal trustees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... resources, including their supporting ecosystems. They are authorized to act pursuant to section 107(f) of..., loss of, or threat to natural resources, including their supporting ecosystems, as a result of a... following natural resources and their supporting ecosystems: marine fishery resources; anadromous fish...

  7. Eight habitats, 38 threats and 55 experts: Assessing ecological risk in a multi-use marine region

    PubMed Central

    Jones, Alice R.; Deveney, Marty R.; Ward, Tim M.; Gillanders, Bronwyn M.

    2017-01-01

    Identifying the relative risk human activities pose to a habitat, and the ecosystem services they provide, can guide management prioritisation and resource allocation. Using a combination of expert elicitation to assess the probable effect of a threat and existing data to assess the level of threat exposure, we conducted a risk assessment for 38 human-mediated threats to eight marine habitats (totalling 304 threat-habitat combinations) in Spencer Gulf, Australia. We developed a score-based survey to collate expert opinion and assess the relative effect of each threat to each habitat, as well as a novel and independent measure of knowledge-based uncertainty. Fifty-five experts representing multiple sectors and institutions participated in the study, with 6 to 15 survey responses per habitat (n = 81 surveys). We identified key threats specific to each habitat; overall, climate change threats received the highest risk rankings, with nutrient discharge identified as a key local-scale stressor. Invasive species and most fishing-related threats, which are commonly identified as major threats to the marine environment, were ranked as low-tier threats to Spencer Gulf, emphasising the importance of regionally-relevant assessments. Further, we identified critical knowledge gaps and quantified uncertainty scores for each risk. Our approach will facilitate prioritisation of resource allocation in a region of increasing social, economic and environmental importance, and can be applied to marine regions where empirical data are lacking. PMID:28489912

  8. Exploring the Structure of Human Defensive Responses from Judgments of Threat Scenarios

    PubMed Central

    Harrison, Laura A.; Ahn, Curie; Adolphs, Ralph

    2015-01-01

    How humans react to threats is a topic of broad theoretical importance, and also relevant for understanding anxiety disorders. Many animal threat reactions exhibit a common structure, a finding supported by human evaluations of written threat scenarios that parallel patterns of rodent defensive behavior to actual threats. Yet the factors that underlie these shared behavioral patterns remain unclear. Dimensional accounts rooted in Darwin’s conception of antithesis explain many defensive behaviors. Across species, it is also clear that defensive reactions depend on specific situational factors, a feature long emphasized by psychological appraisal theories. Our study sought to extend prior investigations of human judgments of threat to a broader set of threats, including natural disasters, threats from animals, and psychological (as opposed to physical) threats. Our goal was to test whether dimensional and specific patterns of threat evaluation replicate across different threat classes. 85 healthy adult subjects selected descriptions of defensive behaviors that indicated how they would react to 29 threatening scenarios. Scenarios differed with respect to ten factors, e.g., perceived dangerousness or escapability. Across scenarios, we correlated these factor ratings with the pattern of defensive behaviors subjects endorsed. A decision tree hierarchically organized these correlation patterns to successfully predict each scenario’s most common reaction, both for the original sample of subjects and a separate replication group (n = 22). At the top of the decision tree, degree of dangerousness interacted with threat type (physical or psychological) to predict dimensional approach/avoidance behavior. Subordinate nodes represented specific defensive responses evoked by particular contexts. Our ecological approach emphasizes the interplay of situational factors in evoking a broad range of threat reactions. Future studies could test predictions made by our results to help understand pathological threat processing, such as seen in anxiety disorders, and could begin to test underlying neural mechanisms. PMID:26296201

  9. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    NASA Astrophysics Data System (ADS)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  10. The malleability of emotional perception: Short-term plasticity in retinotopic neurons accompanies the formation of perceptual biases to threat.

    PubMed

    Thigpen, Nina N; Bartsch, Felix; Keil, Andreas

    2017-04-01

    Emotional experience changes visual perception, leading to the prioritization of sensory information associated with threats and opportunities. These emotional biases have been extensively studied by basic and clinical scientists, but their underlying mechanism is not known. The present study combined measures of brain-electric activity and autonomic physiology to establish how threat biases emerge in human observers. Participants viewed stimuli designed to differentially challenge known properties of different neuronal populations along the visual pathway: location, eye, and orientation specificity. Biases were induced using aversive conditioning with only 1 combination of eye, orientation, and location predicting a noxious loud noise and replicated in a separate group of participants. Selective heart rate-orienting responses for the conditioned threat stimulus indicated bias formation. Retinotopic visual brain responses were persistently and selectively enhanced after massive aversive learning for only the threat stimulus and dissipated after extinction training. These changes were location-, eye-, and orientation-specific, supporting the hypothesis that short-term plasticity in primary visual neurons mediates the formation of perceptual biases to threat. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  11. Examining the relationships between challenge and threat cognitive appraisals and coaching behaviours in football coaches.

    PubMed

    Dixon, Martin; Turner, Martin J; Gillman, Jamie

    2017-12-01

    Previous research demonstrates that sports coaching is a stressful activity. This article investigates coaches' challenge and threat cognitive appraisals of stressful situations and their impact on coaching behaviour, using Blascovich and Mendes' (2000) biopsychosocial model as a theoretical framework. A cross-sectional correlational design was utilised to examine the relationships between irrational beliefs (Shortened general attitude and belief scale), challenge and threat appraisals (Appraisal of life events scale), and coaching behaviours (Leadership scale for sports) of 105 professional football academy coaches. Findings reveal significant positive associations between challenge appraisals and social support, and between threat appraisals and autocratic behaviour, and a significant negative association between threat appraisals and positive feedback. Results also show that higher irrational beliefs are associated with greater threat, and lesser challenge cognitive appraisals. However, no associations were revealed between irrational beliefs and challenge cognitive appraisals. Additionally, findings demonstrate a positive relationship between age and training and instruction. Results suggest that practitioners should help coaches to appraise stressful situations as a challenge to promote positive coaching behaviours.

  12. The influence of stereotype threat on immigrants: review and meta-analysis

    PubMed Central

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256

  13. Unravelling the structure of species extinction risk for predictive conservation science.

    PubMed

    Lee, Tien Ming; Jetz, Walter

    2011-05-07

    Extinction risk varies across species and space owing to the combined and interactive effects of ecology/life history and geography. For predictive conservation science to be effective, large datasets and integrative models that quantify the relative importance of potential factors and separate rapidly changing from relatively static threat drivers are urgently required. Here, we integrate and map in space the relative and joint effects of key correlates of The International Union for Conservation of Nature-assessed extinction risk for 8700 living birds. Extinction risk varies significantly with species' broad-scale environmental niche, geographical range size, and life-history and ecological traits such as body size, developmental mode, primary diet and foraging height. Even at this broad scale, simple quantifications of past human encroachment across species' ranges emerge as key in predicting extinction risk, supporting the use of land-cover change projections for estimating future threat in an integrative setting. A final joint model explains much of the interspecific variation in extinction risk and provides a remarkably strong prediction of its observed global geography. Our approach unravels the species-level structure underlying geographical gradients in extinction risk and offers a means of disentangling static from changing components of current and future threat. This reconciliation of intrinsic and extrinsic, and of past and future extinction risk factors may offer a critical step towards a more continuous, forward-looking assessment of species' threat status based on geographically explicit environmental change projections, potentially advancing global predictive conservation science.

  14. Dimensions of trauma associated with posttraumatic stress disorder (PTSD) caseness, severity and functional impairment: a study of Bosnian refugees resettled in Australia.

    PubMed

    Momartin, S; Silove, D; Manicavasagar, V; Steel, Z

    2003-09-01

    Refugee survivors of inter-ethnic warfare vary greatly in the extent and range of their trauma experiences. Discerning which experiences are most salient to generating and perpetuating disorders such as posttraumatic stress disorder (PTSD) is critical to the mounting rational strategies for targeted psychosocial interventions. In a sample of Bosnian Muslim refugees (n=126) drawn from a community centre and supplemented by a snowball sampling method, PTSD status and associated disability were measured using the clinician-administered PTSD Scale (CAPS) for DSM-IV. A principal components analysis (PCA) based on a pool of trauma items yielded four coherent trauma dimensions: Human Rights Violations, Threat to Life, Traumatic Loss and Dispossession and Eviction. A cluster analysis identified three subgroupings according to extent of trauma exposure. There were no differences in PTSD risk for the group most exposed to human rights violations (internment in concentration camps, torture) compared to the general war-exposed group. Logistic regression analysis using the dimensions derived from the PCA indicated that Threat to Life alone of the four trauma factors predicted PTSD status, a finding that supports the DSM-IV definition of a trauma. Both Threat to Life and Traumatic Loss contributed to symptom severity and disability associated with PTSD. It may be that human rights violations pose a more general threat to the survivor's future psychosocial adaptation in areas of functioning that extend beyond the confines of PTSD.

  15. The Perceived Threat of Affirmative Action Policy

    DTIC Science & Technology

    1975-06-06

    as- sumption was made that affirmative action threat was a phenomenon which was separate and distinct from general racial feelings. The...the respond- ents. However, affirmative action threat was found to be differentially related to general racial feelings at the .001 confidence...level. Thus, affirmative action threat feelings were not independent from general racial feelings. Based on the findings of this study, it was

  16. Not an Idea We Have to Shun’: Chinese Overseas Basing Requirements in the 21st Century

    DTIC Science & Technology

    2014-10-01

    Inter Services Public Relations /HO) “Not an Idea We Have to Shun” Center for the Study of Chinese Military Affairs Institute for National Strategic... relations . Chinese operations in support of regional stability and to address nontraditional security threats would not necessarily conflict with U.S...cate U.S. relations with China and with the countries of the region, compel U.S. naval and military forces to operate in closer proximity with PLA

  17. A Framework for Architecture-Based Planning and Assessment to Support Modeling and Simulation of Network-Centric Command and Control

    DTIC Science & Technology

    2006-02-17

    included system-unique specifications derived to counter these threats. But the international security environment has changed --- and it will continue... Netowrk -Centric Command and Control 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 20 19a. NAME

  18. 77 FR 271 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-04

    ... Threat Reduction Agency, 1680 Texas Street SE., Kirtland Air Force Base, Albuquerque, NM 87117-5669... Threat Reduction Agency, 1680 Texas Street SE., Kirtland Air Force Base, Albuquerque, NM 87117-5669...

  19. Behavior-based network management: a unique model-based approach to implementing cyber superiority

    NASA Astrophysics Data System (ADS)

    Seng, Jocelyn M.

    2016-05-01

    Behavior-Based Network Management (BBNM) is a technological and strategic approach to mastering the identification and assessment of network behavior, whether human-driven or machine-generated. Recognizing that all five U.S. Air Force (USAF) mission areas rely on the cyber domain to support, enhance and execute their tasks, BBNM is designed to elevate awareness and improve the ability to better understand the degree of reliance placed upon a digital capability and the operational risk.2 Thus, the objective of BBNM is to provide a holistic view of the digital battle space to better assess the effects of security, monitoring, provisioning, utilization management, allocation to support mission sustainment and change control. Leveraging advances in conceptual modeling made possible by a novel advancement in software design and implementation known as Vector Relational Data Modeling (VRDM™), the BBNM approach entails creating a network simulation in which meaning can be inferred and used to manage network behavior according to policy, such as quickly detecting and countering malicious behavior. Initial research configurations have yielded executable BBNM models as combinations of conceptualized behavior within a network management simulation that includes only concepts of threats and definitions of "good" behavior. A proof of concept assessment called "Lab Rat," was designed to demonstrate the simplicity of network modeling and the ability to perform adaptation. The model was tested on real world threat data and demonstrated adaptive and inferential learning behavior. Preliminary results indicate this is a viable approach towards achieving cyber superiority in today's volatile, uncertain, complex and ambiguous (VUCA) environment.

  20. Colour-induced relationship between affect and reaching kinematics during a goal-directed aiming task.

    PubMed

    Williams, Camille K; Grierson, Lawrence E M; Carnahan, Heather

    2011-08-01

    A link between affect and action has been supported by the discovery that threat information is prioritized through an action-centred pathway--the dorsal visual stream. Magnocellular afferents, which originate from the retina and project to dorsal stream structures, are suppressed by exposure to diffuse red light, which diminishes humans' perception of threat-based images. In order to explore the role of colour in the relationship between affect and action, participants donned different pairs of coloured glasses (red, yellow, green, blue and clear) and completed Positive and Negative Affect Scale questionnaires as well as a series of target-directed aiming movements. Analyses of affect scores revealed a significant main effect for affect valence and a significant interaction between colour and valence: perceived positive affect was significantly smaller for the red condition. Kinematic analyses of variable error in the primary movement direction and Pearson correlation analyses between the displacements travelled prior to and following peak velocity indicated reduced accuracy and application of online control processes while wearing red glasses. Variable error of aiming was also positively and significantly correlated with negative affect scores under the red condition. These results suggest that only red light modulates the affect-action link by suppressing magnocellular activity, which disrupts visual processing for movement control. Furthermore, previous research examining the effect of the colour red on psychomotor tasks and perceptual acceleration of threat-based imagery suggest that stimulus-driven motor performance tasks requiring online control may be particularly susceptible to this effect.

  1. Combatting the Terrorist Threat.

    DTIC Science & Technology

    1985-05-22

    tomorrow. Today terrorist actions carried out against US interests occur primarily in Guatemala, Honduras, El Salvador, Nicaragua, Colombia, Peru , and Chile...provided arms, financial support, and safehavens for revolutionary groups from El Salvador and Honduras. 9 In Peru the Maoist guerrilla group Sendero...I DTIC TAB U --anoinced El Justificatio By Distributi-,n/ WtI3ATIN THE TERRORIST THREAT Availability CodesAvail and/or A GRUP SIJDY PPOEC Dist Special

  2. An exotic pest threat to eastern hemlock: an initiative for management of hemlock woolly adelgid

    Treesearch

    J. Robert Bridges; Kathleen S. Shields

    2003-01-01

    Hemlock woolly adelgid (HWA) is the greatest threat to the health and sustainability of hemlock in eastern North America. The potential ecological impacts of this exotic insect pest can be compared to those of gypsy moth, Dutch elm disease, and chestnut blight. The USDA Forest Service, with the support and cooperation of the National Association of State Foresters and...

  3. Place-classification analysis of community vulnerability to near-field tsunami threats in the U.S. Pacific Northwest (Invited)

    NASA Astrophysics Data System (ADS)

    Wood, N. J.; Jones, J.; Spielman, S.

    2013-12-01

    Near-field tsunami hazards are credible threats to many coastal communities throughout the world. Along the U.S. Pacific Northwest coast, low-lying areas could be inundated by a series of catastrophic tsunami waves that begin to arrive in a matter of minutes following a Cascadia subduction zone (CSZ) earthquake. This presentation summarizes analytical efforts to classify communities with similar characteristics of community vulnerability to tsunami hazards. This work builds on past State-focused inventories of community exposure to CSZ-related tsunami hazards in northern California, Oregon, and Washington. Attributes used in the classification, or cluster analysis, include demography of residents, spatial extent of the developed footprint based on mid-resolution land cover data, distribution of the local workforce, and the number and type of public venues, dependent-care facilities, and community-support businesses. Population distributions also are characterized by a function of travel time to safety, based on anisotropic, path-distance, geospatial modeling. We used an unsupervised-model-based clustering algorithm and a v-fold, cross-validation procedure (v=50) to identify the appropriate number of community types. We selected class solutions that provided the appropriate balance between parsimony and model fit. The goal of the vulnerability classification is to provide emergency managers with a general sense of the types of communities in tsunami hazard zones based on similar characteristics instead of only providing an exhaustive list of attributes for individual communities. This classification scheme can be then used to target and prioritize risk-reduction efforts that address common issues across multiple communities. The presentation will include a discussion of the utility of proposed place classifications to support regional preparedness and outreach efforts.

  4. Internetting tactical security sensor systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.

  5. A Novel Fiber Optic Based Surveillance System for Prevention of Pipeline Integrity Threats.

    PubMed

    Tejedor, Javier; Macias-Guarasa, Javier; Martins, Hugo F; Piote, Daniel; Pastor-Graells, Juan; Martin-Lopez, Sonia; Corredera, Pedro; Gonzalez-Herraez, Miguel

    2017-02-12

    This paper presents a novel surveillance system aimed at the detection and classification of threats in the vicinity of a long gas pipeline. The sensing system is based on phase-sensitive optical time domain reflectometry ( ϕ -OTDR) technology for signal acquisition and pattern recognition strategies for threat identification. The proposal incorporates contextual information at the feature level and applies a system combination strategy for pattern classification. The contextual information at the feature level is based on the tandem approach (using feature representations produced by discriminatively-trained multi-layer perceptrons) by employing feature vectors that spread different temporal contexts. The system combination strategy is based on a posterior combination of likelihoods computed from different pattern classification processes. The system operates in two different modes: (1) machine + activity identification, which recognizes the activity being carried out by a certain machine, and (2) threat detection, aimed at detecting threats no matter what the real activity being conducted is. In comparison with a previous system based on the same rigorous experimental setup, the results show that the system combination from the contextual feature information improves the results for each individual class in both operational modes, as well as the overall classification accuracy, with statistically-significant improvements.

  6. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  7. On the need and use of models to explore the role of economic confidence:a survey.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sprigg, James A.; Paez, Paul J.; Hand, Michael S.

    2005-04-01

    Empirical studies suggest that consumption is more sensitive to current income than suggested under the permanent income hypothesis, which raises questions regarding expectations for future income, risk aversion, and the role of economic confidence measures. This report surveys a body of fundamental economic literature as well as burgeoning computational modeling methods to support efforts to better anticipate cascading economic responses to terrorist threats and attacks. This is a three part survey to support the incorporation of models of economic confidence into agent-based microeconomic simulations. We first review broad underlying economic principles related to this topic. We then review the economicmore » principle of confidence and related empirical studies. Finally, we provide a brief survey of efforts and publications related to agent-based economic simulation.« less

  8. The neurobiology of safety and threat learning in infancy.

    PubMed

    Debiec, Jacek; Sullivan, Regina M

    2017-09-01

    What an animal needs to learn to survive is altered dramatically as they change from dependence on the parent for protection to independence and reliance on self-defense. This transition occurs in most altricial animals, but our understanding of the behavioral neurobiology has mostly relied on the infant rat. The transformation from dependence to independence occurs over three weeks in pups and is accompanied by complex changes in responses to both natural and learned threats and the supporting neural circuitry. Overall, in early life, the threat system is quiescent and learning is biased towards acquiring attachment related behaviors to support attachment to the caregiver and proximity seeking. Caregiver-associated cues learned in infancy have the ability to provide a sense of safety throughout lifetime. This attachment/safety system is activated by learning involving presumably pleasurable stimuli (food, warmth) but also painful stimuli (tailpinch, moderate shock). At about the midway point to independence, pups begin to have access to the adult-like amygdala-dependent threat system and amygdala-dependent responses to natural dangers such as predator odors. However, pups have the ability to switch between the infant and adult-like system, which is controlled by maternal presence and modification of stress hormones. Specifically, if the pup is alone, it will learn fear but if with the mother it will learn attachment (10-15days of age). As pups begin to approach weaning, pups lose access to the attachment system and rely only on the amygdala-dependent threat system. However, pups learning system is complex and exhibits flexibility that enables the mother to override the control of the attachment circuit, since newborn pups may acquire threat responses from the mother expressing fear in their presence. Together, these data suggest that the development of pups' threat learning system is not only dependent upon maturation of the amygdala, but it is also exquisitely controlled by the environment. Most notably the mother can switch pup learning between attachment to threat learning in a moment's notice. This enables the mother to navigate pup's learning about the world and what is threatening and what is safe. Copyright © 2016 Elsevier Inc. All rights reserved.

  9. Investigating the ways in which health information technology can promote antimicrobial stewardship: a conceptual overview.

    PubMed

    King, Abby; Cresswell, Kathrin M; Coleman, Jamie J; Pontefract, Sarah K; Slee, Ann; Williams, Robin; Sheikh, Aziz

    2017-08-01

    Antimicrobial resistance is now recognised as a threat to health worldwide. Antimicrobial stewardship aims to promote the responsible use of antibiotics and is high on international and national policy agendas. Health information technology has the potential to support antimicrobial stewardship in a number of ways, but this field is still poorly characterised and understood. Building on a recent systematic review and expert roundtable discussions, we take a lifecycle perspective of antibiotic use in hospitals and identify potential targets for health information technology-based interventions to support antimicrobial stewardship. We aim for this work to help chart a future research agenda in this critically important area.

  10. CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6

    DTIC Science & Technology

    2012-12-01

    Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for

  11. Identifying key conservation threats to Alpine birds through expert knowledge

    PubMed Central

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  12. Age differences in the underlying mechanisms of stereotype threat effects.

    PubMed

    Popham, Lauren E; Hess, Thomas M

    2015-03-01

    The goals of the present study were to (a) examine whether age differences exist in the mechanisms underlying stereotype threat effects on cognitive performance and (b) examine whether emotion regulation abilities may buffer against threat effects on performance. Older and younger adults were exposed to positive or negative age-relevant stereotypes, allowing us to examine the impact of threat on regulatory focus and working memory. Self-reported emotion regulation measures were completed prior to the session. Older adults' performance under threat suggested a prevention-focused approach to the task, indexed by increased accuracy and reduced speed. The same pattern was observed in younger adults, but the effects were not as strong. Age differences emerged when examining the availability of working memory resources under threat, with young adults showing decrements, whereas older adults did not. Emotion regulation abilities moderated threat effects in young adults but not in older adults. The results provide support for the notion that stereotype threat may lead to underperformance through somewhat different pathways in older and younger adults. Future research should further examine whether the underlying reason for this age difference is rooted in age-related improvements in emotion regulation. © The Author 2013. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  13. Psychosocial outcomes related to subjective threat from armed conflict events (STACE): Findings from the Israeli-Palestinian cross-cultural HBSC study.

    PubMed

    Harel-Fisch, Yossi; Radwan, Qasrowi; Walsh, Sophie D; Laufer, Avital; Amitai, Gabriel; Fogel-Grinvald, Haya; Abdeen, Ziad

    2010-09-01

    This study investigates the relationship between exposure to armed conflict and terror events, and an array of mental and behavioral outcomes within a large cross-cultural scientifically representative sample of 24,935 Palestinian (7,430 West Bank and 7,217 Gaza) and Israeli (5,255 Jewish and 6,033 Arab) 11-, 13-, and 15-year-old school children. The children of the Middle East have been subjected to exposure from armed conflict and terrorism repeatedly with no adequate research or interventions aimed at shielding them from the hazards of such exposure to their mental and social well-being. This paper studies the relationship between a newly developed scale (STACE) measuring levels of subjective perceptions of threat/fear due to exposure to armed conflict events and its predicting association with six psychosocial and behavioral outcomes covering (1) poor mental health, (2) positive well-being, and (3) risk behaviors. It also examines the role of parental support in "buffering" the effects of exposure to armed conflict events within the four target populations. Results showed that STACE has significant and strong effects on all six dependent variables representing (1) mental post trauma, (2) diminished well-being, and (3) elevated risk behaviors. STACE strongly affects all four populations with the greatest impact among the Jewish Israeli population and the least impact shown for the Arab Israeli youth. Parental support ("significant adult") has both a direct main effect on the outcomes of all six variables as well as a significant "buffering" effect on the impact of STACE on certain outcome variables (posttraumatic symptoms, life satisfaction, positive life perceptions, and tobacco use). Regardless of the type of armed conflict events, the perception of threat and fear that a child experiences has a universal significant negative impact on mental, social, and behavioral well-being. The importance of the existence of a supporting significant adult in exposed children's lives is also emphasized. The findings show major implications for the development of community-based interventions focusing on enhancing parental, and other adult support in the lives of children living in armed conflict regions of the world. Copyright © 2010 Elsevier Ltd. All rights reserved.

  14. Interparental Relationship Sensitivity Leads to Adolescent Internalizing Problems: Different Genotypes, Different Pathways

    PubMed Central

    Schlomer, Gabriel L.; Fosco, Gregory M.; Cleveland, H. H.; Vandenbergh, David J.; Feinberg, Mark E.

    2015-01-01

    Several studies have established that child interparental conflict evaluations link parent relationship functioning and adolescent adjustment. Using differential susceptibility theory and its vantage sensitivity complement as their framework, the authors examined differences between adolescents who vary in the DRD4 7 repeat genotype (i.e. 7+ vs. 7−) in how both interparental conflict and positivity affect adolescents’ evaluations of interparental conflict (i.e., threat appraisals) and how these evaluations affect internalizing problems. Results from longitudinal multiple-group path models using PROSPER data (N = 452) supported the hypothesis that threat appraisals for 7+ adolescents would be more affected by perceptions of interparental positivity compared to 7− adolescents; however, threat appraisals for 7+ adolescents were also less affected by interparental conflict. Among 7− adolescents, interparental conflict perceptions were associated with higher threat appraisals, and no association was found for perceptions of positivity. For adolescents of both genotypes, higher threat was associated with greater internalizing problems. PMID:25843974

  15. Spousal Coping Strategies in the Shadow of Terrorism.

    PubMed

    Shechory-Bitton, Mally; Cohen-Louck, Keren

    2017-11-01

    The present study focuses on spousal differences in reaction to ongoing exposure to terror and security threats. Sixty-eight married couples with children living in a region exposed to ongoing security threats were evaluated. All participants completed questionnaires on objective exposure (number of incidents) and subjective exposure (sense of fear) to terrorism and security threats, posttraumatic stress disorder (PTSD) symptoms, and their coping strategies with this ongoing exposure. Mothers reported higher levels of fear and PTSD symptoms, although their objective levels of exposure did not differ from those of their husbands. Similarities were found in coping strategies adopted by mothers and fathers to cope with life in the shadow of terrorism. Both mothers and fathers integrated emotion- and problem-focused coping strategies, with greater use of the latter. These similarities partially contradict research findings suggesting gender differences in coping with exposure to security threats. The results support the need for further research into investigating the role of dyadic coping in the context of prolonged exposure to security threats.

  16. Neuroscientific evidence for defensive avoidance of fear appeals

    PubMed Central

    Kessels, Loes T E; Ruiter, Robert A C; Wouters, Liesbeth; Jansma, Bernadette M

    2014-01-01

    Previous studies indicate that people respond defensively to threatening health information, especially when the information challenges self-relevant goals. The authors investigated whether reduced acceptance of self-relevant health risk information is already visible in early attention allocation processes. In two experimental studies, participants were watching high- and low-threat health commercials, and at the same time had to pay attention to specific odd auditory stimuli in a sequence of frequent auditory stimuli (odd ball paradigm). The amount of attention allocation was measured by recording event-related brain potentials (i.e., P300 ERPs) and reaction times. Smokers showed larger P300 amplitudes in response to the auditory targets while watching high-threat instead of low-threat anti-smoking commercials. In contrast, non-smokers showed smaller P300 amplitudes during watching high as opposed to low threat anti-smoking commercials. In conclusion, the findings provide further neuroscientific support for the hypothesis that threatening health information causes more avoidance responses among those for whom the health threat is self-relevant. PMID:24811878

  17. The Burden of Power: Construing Power as Responsibility (Rather Than as Opportunity) Alters Threat-Challenge Responses.

    PubMed

    Scholl, Annika; de Wit, Frank; Ellemers, Naomi; Fetterman, Adam K; Sassenberg, Kai; Scheepers, Daan

    2018-07-01

    Power usually lowers stress responses. In stressful situations, having high (vs. low) power heightens challenge and lowers threat. Yet, even power-holders may experience threat when becoming aware of the responsibility that accompanies their power. Power-holders can construe (i.e., understand) a high-power position primarily as opportunity to "make things happen" or as responsibility to "take care of things." Power-holders construing power as responsibility (rather than opportunity) may be more likely to experience demands-such as taking care of important decisions under their control-as outweighing their resources, resulting in less challenge and more threat. Four experiments with subjective and cardiovascular threat-challenge indicators support this. Going beyond prior work on structural aspects (e.g., power instability) that induce stress, we show that merely the way how power-holders construe their power can evoke stress. Specifically, we find that power construed as responsibility (vs. opportunity) is more likely to imply a "burden" for the power-holder.

  18. Neural time course of threat-related attentional bias and interference in panic and obsessive-compulsive disorders.

    PubMed

    Thomas, Susan J; Gonsalvez, Craig J; Johnstone, Stuart J

    2013-09-01

    Attentional biases to threat are considered central to anxiety disorders, however physiological evidence of their nature and time course is lacking. Event-related potentials (ERPs) characterized sensory and cognitive changes while 20 outpatients with panic disorder (PD), 20 with obsessive-compulsive disorder (OCD), and 20 healthy controls (HCs) responded to the color (emotional Stroop task) or meaning of threatening and neutral stimuli. ERPs indicated larger P1 amplitude and longer N1 latency in OCD, and shorter P1 latency in PD, to threatening (versus neutral) stimuli, across instructions to attend to, or ignore, threat content. Emotional Stroop interference correlated with phobic anxiety and was significant in PD. Participants with emotional Stroop interference had augmented P1 and P3 amplitudes to threat (versus neutral) stimuli when color-naming. The results suggest early attentional biases to threat in both disorders, with disorder-specific characteristics. ERPs supported preferential early attentional capture and cognitive elaboration hypotheses of emotional Stroop interference. Copyright © 2013 Elsevier B.V. All rights reserved.

  19. Pattern-Based Design of Insider Threat Programs

    DTIC Science & Technology

    2014-12-01

    also applied these models to develop best practices and technical controls for mitigating insider threat. In some cases of in- sider threat...departing insiders might take valuable IP with them. One set of practices and controls designed to reduce the risk of insider IP theft is based on case data...describing this set of practices and controls helps to balance the costs of monitoring employee behavior for suspicious actions against the risk of

  20. An Overview of Internet biosurveillance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hartley, David M.; Nelson, Noele P.; Arthur, Ray

    Internet biosurveillance utilizes unstructured data from diverse Web-based sources to provide early warning and situational awareness of public health threats. The scope of source coverage ranges from local based media in the vernacular to international media in widely read languages. Internet biosurveillance is a timely modality available to government and public health officials, health care workers, and the public and private sector, serving as a real-time complementary approach to traditional indicator-based public health disease surveillance methods. Internet biosurveillance also supports the broader activity of epidemic intelligence. This review covers the current state of the field of Internet biosurveillance and providesmore » a perspective on the future of the field.« less

  1. [Terrorism and mental health (problem's scale, population tolerance, management of care)].

    PubMed

    Iastrebov, V S

    2004-01-01

    The consequences of terrorist threat and terrorist acts for mental health of the individual, groups of individuals and community in general are analyzed. Mental disorders emerging in the victims of terrorism is described. The problem of terrorist threats use as a psychic weapon is discussed. Tolerance of population to terrorism can be divided into two types--psychophysiological and socio-psychological. The ways for elevating tolerability to terrorist threat and terrorist acts are suggested. Help in the centers of terrorist act must be of the complex character, being provided by different specialists including psychologists and psychiatrists. The importance of state structures and community support in this work is emphasized.

  2. The Impact of Threat Appeals on Fear Arousal and Driver Behavior: A Meta-Analysis of Experimental Research 1990–2011

    PubMed Central

    Carey, Rachel N.; McDermott, Daragh T.; Sarma, Kiran M.

    2013-01-01

    The existing empirical research exploring the impact of threat appeals on driver behavior has reported inconsistent findings. In an effort to provide an up-to-date synthesis of the experimental findings, meta-analytic techniques were employed to examine the impact of threat-based messages on fear arousal and on lab-based indices of driving behavior. Experimental studies (k = 13, N = 3044), conducted between 1990 and 2011, were included in the analyses. The aims of the current analysis were (a) to examine whether or not the experimental manipulations had a significant impact on evoked fear, (b) to examine the impact of threat appeals on three distinct indices of driving, and (c) to identify moderators and mediators of the relationship between fear and driving outcomes. Large effects emerged for the level of fear evoked, with experimental groups reporting increased fear arousal in comparison to control groups (r = .64, n = 619, p<.01). The effect of threat appeals on driving outcomes, however, was not significant (r = .03, p = .17). This analysis of the experimental literature indicates that threat appeals can lead to increased fear arousal, but do not appear to have the desired impact on driving behavior. We discuss these findings in the context of threat-based road safety campaigns and future directions for experimental research in this area. PMID:23690955

  3. The impact of threat appeals on fear arousal and driver behavior: a meta-analysis of experimental research 1990-2011.

    PubMed

    Carey, Rachel N; McDermott, Daragh T; Sarma, Kiran M

    2013-01-01

    The existing empirical research exploring the impact of threat appeals on driver behavior has reported inconsistent findings. In an effort to provide an up-to-date synthesis of the experimental findings, meta-analytic techniques were employed to examine the impact of threat-based messages on fear arousal and on lab-based indices of driving behavior. Experimental studies (k = 13, N = 3044), conducted between 1990 and 2011, were included in the analyses. The aims of the current analysis were (a) to examine whether or not the experimental manipulations had a significant impact on evoked fear, (b) to examine the impact of threat appeals on three distinct indices of driving, and (c) to identify moderators and mediators of the relationship between fear and driving outcomes. Large effects emerged for the level of fear evoked, with experimental groups reporting increased fear arousal in comparison to control groups (r = .64, n = 619, p<.01). The effect of threat appeals on driving outcomes, however, was not significant (r = .03, p = .17). This analysis of the experimental literature indicates that threat appeals can lead to increased fear arousal, but do not appear to have the desired impact on driving behavior. We discuss these findings in the context of threat-based road safety campaigns and future directions for experimental research in this area.

  4. Tool development in threat assessment: syntax regularization and correlative analysis. Final report Task I and Task II, November 21, 1977-May 21, 1978. [Linguistic analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miron, M.S.; Christopher, C.; Hirshfield, S.

    1978-05-01

    Psycholinguistics provides crisis managers in nuclear threat incidents with a quantitative methodology which can aid in the determination of threat credibility, authorship identification and perpetrator apprehension. The objective of this contract is to improve and enhance present psycholinguistic software systems by means of newly-developed, computer-automated techniques which significantly extend the technology of automated content and stylistic analysis of nuclear threat. In accordance with this overall objective, the first two contract Tasks have been completed and are reported on in this document. The first Task specifies the development of software support for the purpose of syntax regularization of vocabulary to rootmore » form. The second calls for the exploration and development of alternative approaches to correlative analysis of vocabulary usage.« less

  5. Camera formation and more, but what comes next? an analysis of volcanic threat of Nisyros island, Greece

    NASA Astrophysics Data System (ADS)

    Winson, A.; Kinvig, H.; Gottsmann, J.; Partington, E.; Geyer, A.

    2008-10-01

    We present an analysis of volcanic threat of Nisyros island (Greece) based on a catalogue of questions compiled for the USGS National Volcano Early Warning System (NVEWS). We find that the score puts Nisyros in the league of volcanoes posing a very high threat. US volcanoes with a comparable threat level include Mt. St. Helens, Augustine and the Long Valley caldera.

  6. Neural Bases of Social Anxiety Disorder: Emotional Reactivity and Cognitive Regulation During Social and Physical Threat

    PubMed Central

    Goldin, Philippe R.; Manber, Tali; Hakimi, Shabnam; Canli, Turhan; Gross, James J.

    2014-01-01

    Context Social anxiety disorder is thought to involve emotional hyper-reactivity, cognitive distortions, and ineffective emotion regulation. While the neural bases of emotional reactivity to social stimuli have been described, the neural bases of emotional reactivity and cognitive regulation during social and physical threat, and their relationship to social anxiety symptom severity, have yet to be investigated. Objective This study investigated behavioral and neural correlates of emotional reactivity and cognitive regulation in patients and controls during processing of social and physical threat stimuli. Design Participants were trained to implement cognitive-linguistic regulation of emotional reactivity induced by social (harsh facial expressions) and physical (violent scenes) threat while undergoing functional magnetic resonance imaging and providing behavioral ratings of negative emotion experience. Setting Academic psychology department. Participants 15 adults with social anxiety disorder and 17 demographically-matched healthy controls. Main Outcome Measures Blood oxygen level dependent signal and negative emotion ratings. Results Behaviorally, patients reported greater negative emotion than controls during social and physical threat, but showed equivalent reduction in negative emotion following cognitive regulation. Neurally, viewing social threat resulted in greater emotion-related neural responses in patients than controls, with social anxiety symptom severity related to activity in a network of emotion and attention processing regions in patients only. Viewing physical threat produced no between-group differences. Regulation during social threat resulted in greater cognitive and attention regulation-related brain activation in controls compared to patients. Regulation during physical threat produced greater cognitive control-related response (i.e., right DLPFC) in patients compared to controls. Conclusions Compared to controls, patients demonstrated exaggerated negative emotion reactivity and reduced cognitive regulation related neural activation, specifically for social threat stimuli. These findings help to elucidate potential neural mechanisms of emotion regulation that might serve as biomarkers for interventions for social anxiety disorder. PMID:19188539

  7. Countering Insider Threats - Handling Insider Threats Using Dynamic, Run-Time Forensics

    DTIC Science & Technology

    2007-10-01

    able to handle the security policy requirements of a large organization containing many decentralized and diverse users, while being easily managed... contained in the TIF folder. Searching for any text string and sorting is supported also. The cache index file of Internet Explorer is not changed... containing thousands of malware software signatures. Separate datasets can be created for various classifications of malware such as encryption software

  8. The Emerging Threat of Domestic Terrorism: A Systematic Review of Evolving Needs, Threats, and Opportunities

    DTIC Science & Technology

    2014-12-01

    activities, and events that would appeal to the general public. The media campaign should also invite feedback and ideas from social media users so that...PAGE INTENTIONALLY LEFT BLANK vi TABLE OF CONTENTS I. INTRODUCTION...want to thank Dan McElhinney, Grants Management Division director, FEMA Region I, who was so supportive and generous in allowing me to take the time I

  9. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less

  10. Increased attention but more efficient disengagement: neuroscientific evidence for defensive processing of threatening health information.

    PubMed

    Kessels, Loes T E; Ruiter, Robert A C; Jansma, Bernadette M

    2010-07-01

    Previous studies indicate that people respond defensively to threatening health information, especially when the information challenges self-relevant goals. The authors investigated whether reduced acceptance of self-relevant health risk information is already visible in early attention processes, that is, attention disengagement processes. In a randomized, controlled trial with 29 smoking and nonsmoking students, a variant of Posner's cueing task was used in combination with the high-temporal resolution method of event-related brain potentials (ERPs). Reaction times and P300 ERP. Smokers showed lower P300 amplitudes in response to high- as opposed to low-threat invalid trials when moving their attention to a target in the opposite visual field, indicating more efficient attention disengagement processes. Furthermore, both smokers and nonsmokers showed increased P300 amplitudes in response to the presentation of high- as opposed to low-threat valid trials, indicating threat-induced attention-capturing processes. Reaction time measures did not support the ERP data, indicating that the ERP measure can be extremely informative to measure low-level attention biases in health communication. The findings provide the first neuroscientific support for the hypothesis that threatening health information causes more efficient disengagement among those for whom the health threat is self-relevant. PsycINFO Database Record (c) 2010 APA, all rights reserved.

  11. Nowhere to Hide: The Growing Threat to Air Bases

    DTIC Science & Technology

    2013-06-01

    May–June 2013 Air & Space Power Journal | 30 Feature Nowhere to Hide The Growing Threat to Air Bases Col Shannon W. Caudill, USAF Maj Benjamin R...May–June 2013 Air & Space Power Journal | 33 Caudill & Jacobson Nowhere to Hide Feature The Growing Precision of Indirect Fire IDF has become the...personnel.22 More troubling still is the growing threat from within the ranks of American personnel. On 11 May 2009, five American military mem- bers

  12. Context and explicit threat cue modulation of the startle reflex: Preliminary evidence of distinctions between adolescents with principal fear disorders versus distress disorders

    PubMed Central

    Waters, Allison M.; Nazarian, Maria; Mineka, Susan; Zinbarg, Richard E.; Griffith, James W.; Naliboff, Bruce; Ornitz, Edward M.; Craske, Michelle G.

    2014-01-01

    Anxiety and depression are prevalent, impairing disorders. High comorbidity has raised questions about how to define and classify them. Structural models emphasise distinctions between “fear” and “distress” disorders while other initiatives propose they be defined by neurobiological indicators that cut across disorders. This study examined startle reflex (SR) modulation in adolescents with principal fear disorders (specific phobia; social phobia) (n = 20), distress disorders (unipolar depressive disorders, dysthymia, generalized anxiety disorder; post-traumatic stress disorder) (n = 9), and controls (n = 29) during (a) baseline conditions, (b) threat context conditions (presence of contraction pads over the biceps muscle), and (c) an explicit threat cue paradigm involving phases that signalled safety from aversive stimuli (early and late stages of safe phases; early stages of danger phases) and phases that signalled immediate danger of an aversive stimulus (late stages of danger phases). Adolescents with principal fear disorders showed larger SRs than other groups throughout safe phases and early stages of danger phases. SRs did not differ between groups during late danger phases. Adolescents with principal distress disorders showed attenuated SRs during baseline and context conditions compared to other groups. Preliminary findings support initiatives to redefine emotional disorders based on neurobiological functioning. PMID:24679992

  13. Early detection of testicular cancer: revisiting the role of self-efficacy in testicular self-examination among young asymptomatic males.

    PubMed

    Umeh, Kanayo; Chadwick, Rebecca

    2016-02-01

    Research suggests that self-efficacy is an important factor in behaviors that facilitate the early-detection of various cancers. In general people with high self-efficacy are more likely to attend cancer screening sessions or perform bodily self-exams. However, there is a paucity of research focusing on testicular cancer and testicular self-examination (TSE). The effect of self-efficacy on TSE remains unclear especially given the relative obscurity of the testicular cancer threat, and appropriate clinical- and self-detection procedures, in the young asymptomatic male population. Thus, the present study tested the interaction of self-efficacy with young men's appraisals of the threat of testicular cancer. The study was based on 2 × 2 × 2 mixed factorial experimental design. Over 100 young asymptomatic men were exposed to a health warning about testicular cancer and randomly assigned to high/low self-efficacy, vulnerability, and severity conditions. High self-efficacy increased motivation to perform TSE given high vulnerability, but damaged attitudes to self-exams given low vulnerability and severity estimates. High self-efficacy also facilitated subsequent TSE. Overall, these findings support preexisting notions of self-efficacy but raise new questions about the moderating effects of threat appraisals.

  14. Role of Law Enforcement Response and Microbial Forensics in Investigation of Bioterrorism

    PubMed Central

    Budowle, Bruce; Beaudry, Jodi A.; Barnaby, Neel G.; Giusti, Alan M.; Bannan, Jason D.; Keim, Paul

    2007-01-01

    The risk and threat of bioterrorism and biocrime have become a large concern and challenge for governments and society to enhance biosecurity. Law enforcement plays an important role in assessing and investigating activities involved in an event of bioterrorism or biocrime. Key to a successful biosecurity program is increased awareness and early detection of threats facilitated by an integrated network of responsibilities and capabilities from government, academic, private, and public assets. To support an investigation, microbial forensic sciences are employed to analyze and characterize forensic evidence with the goal of attribution or crime scene reconstruction. Two different molecular biology-based assays – real time polymerase chain reaction (PCR) and repetitive element PCR – are described and demonstrate how molecular biology tools may be utilized to aid in the investigative process. Technologies relied on by microbial forensic scientists need to be properly validated so that the methods used are understood and so that interpretation of results is carried out within the limitations of the assays. The three types of validation are preliminary, developmental, and internal. The first is necessary for rapid response when a threat is imminent or an attack has recently occurred. The latter two apply to implementation of routinely used procedures. PMID:17696298

  15. Anomaly Detection in Gamma-Ray Vehicle Spectra with Principal Components Analysis and Mahalanobis Distances

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tardiff, Mark F.; Runkle, Robert C.; Anderson, K. K.

    2006-01-23

    The goal of primary radiation monitoring in support of routine screening and emergency response is to detect characteristics in vehicle radiation signatures that indicate the presence of potential threats. Two conceptual approaches to analyzing gamma-ray spectra for threat detection are isotope identification and anomaly detection. While isotope identification is the time-honored method, an emerging technique is anomaly detection that uses benign vehicle gamma ray signatures to define an expectation of the radiation signature for vehicles that do not pose a threat. Newly acquired spectra are then compared to this expectation using statistical criteria that reflect acceptable false alarm rates andmore » probabilities of detection. The gamma-ray spectra analyzed here were collected at a U.S. land Port of Entry (POE) using a NaI-based radiation portal monitor (RPM). The raw data were analyzed to develop a benign vehicle expectation by decimating the original pulse-height channels to 35 energy bins, extracting composite variables via principal components analysis (PCA), and estimating statistically weighted distances from the mean vehicle spectrum with the mahalanobis distance (MD) metric. This paper reviews the methods used to establish the anomaly identification criteria and presents a systematic analysis of the response of the combined PCA and MD algorithm to modeled mono-energetic gamma-ray sources.« less

  16. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically andmore » religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.« less

  17. 40 CFR 300.430 - Remedial investigation/feasibility study and selection of remedy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., to provide additional data for the detailed analysis and to support engineering design of remedial... threat to human health or the environment or to support the analysis and design of potential response... timely manner and no later than the early stages of the comparative analysis. The lead and support...

  18. 40 CFR 300.430 - Remedial investigation/feasibility study and selection of remedy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., to provide additional data for the detailed analysis and to support engineering design of remedial... threat to human health or the environment or to support the analysis and design of potential response... timely manner and no later than the early stages of the comparative analysis. The lead and support...

  19. 40 CFR 300.430 - Remedial investigation/feasibility study and selection of remedy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., to provide additional data for the detailed analysis and to support engineering design of remedial... threat to human health or the environment or to support the analysis and design of potential response... timely manner and no later than the early stages of the comparative analysis. The lead and support...

  20. 40 CFR 300.430 - Remedial investigation/feasibility study and selection of remedy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., to provide additional data for the detailed analysis and to support engineering design of remedial... threat to human health or the environment or to support the analysis and design of potential response... timely manner and no later than the early stages of the comparative analysis. The lead and support...

  1. 40 CFR 300.430 - Remedial investigation/feasibility study and selection of remedy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., to provide additional data for the detailed analysis and to support engineering design of remedial... threat to human health or the environment or to support the analysis and design of potential response... timely manner and no later than the early stages of the comparative analysis. The lead and support...

  2. 77 FR 56519 - Continuation of the National Emergency With Persons Who Commit, Threaten To Commit, or Support...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-12

    ... of the National Emergency With Persons Who Commit, Threaten To Commit, or Support Terrorism On... persons who commit, threaten to commit, or support terrorism, pursuant to the International Emergency... the grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the...

  3. Reactions to a health threat: dispositional threat orientations and message characteristics.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Gonzalez, Amelia; Denison, Elizabeth

    2011-05-01

    This study explored the interactive effects of dispositional threat orientation, type of message, and having children on reactions to a message about exposure to bisphenol A (BPA) in plastics. The study used a 2 (message: Fear Arousal or Plain)×2 (parenting status: child or no child)×2 (threat orientation: high or low) mixed factorial design. Adults (N= 200) recruited via the Internet completed measures of threat orientations, reported whether they were a parent, and read either a low or high fear-arousal message about the risks of BPA exposure. They then completed measures of reactions to the message (perceived susceptibility to BPA effects, negative emotions, and behavioural intentions to engage in protection). Depending on threat orientations, the fear arousal version of the message and parenthood had strikingly different effects, ranging from no effect (for those high in a control-based approach) to prompting change (for those low in a control-based approach) to counterproductive (for those high in an optimistic denial approach). These findings suggest that considering individual differences and their interactions with situational factors could improve both the predictive ability of threat protection theories and the delivery of messages intended to change behaviour. ©2010 The British Psychological Society.

  4. The Cybercitizen Dimension: A Quantitative Study Using a Threat Avoidance Perspective

    ERIC Educational Resources Information Center

    Manzano, Debbie L.

    2012-01-01

    The importance of information security is understated and theory-based empirical research that explains computer users voluntary IT threat avoidance behavior is lacking. Most existing information security research on individual behaviors has been focused in organizational settings where the threat avoidance behavior is mandatory and dictated by…

  5. The Ingenuity Imperative

    ERIC Educational Resources Information Center

    Hansen, John W.

    2005-01-01

    The author discusses three threats to the American way of life: the first threat is related to human and technological growth; the second is a new division of labor; and the third threat is security and safety. The author suggests two solutions to address these challenges: (1) better technological planning and decisions based on technological…

  6. On the experience of feeling powerful: perceived power moderates the effect of stereotype threat on women's math performance.

    PubMed

    Van Loo, Katie J; Rydell, Robert J

    2013-03-01

    This research examined whether feeling powerful can eliminate the deleterious effect of stereotype threat (i.e., concerns about confirming a negative self-relevant stereotype) on women's math performance. In Experiments 1 and 2, priming women with high power buffered them from reduced math performance in response to stereotype threat instructions, whereas women in the low and control power conditions showed poorer math performance in response to threat. Experiment 3 found that working memory capacity is one mechanism through which power moderates the effect of threat on women's math performance. In the low and control power conditions, women showed reduced working memory capacity in response to stereotype threat, accounting for threat's effect on performance. In contrast, women in the high power condition did not show reductions in working memory capacity or math performance in response to threat. This work demonstrates that perceived power moderates stereotype threat-based performance effects and explains why this occurs.

  7. Northern bobwhite predator avoidance behavior in response to varying types of threat

    USGS Publications Warehouse

    Perkins, R.A.; Boal, Clint W.; Rollins, Dale; Perez, R.

    2014-01-01

    The flight behavior and cover use of northern bobwhite (Colinus virginianus) have been examined in several studies, but the current data lack quantitative measures of how bobwhites respond to natural threats. We examined aspects of bobwhite behavior in response to 4 threat categories: researcher, hunter, raptor, and mammal. We found that bobwhite flight distance is best predicted by threat type and covey size, and bobwhite flight speed is best predicted by threat type. Bobwhites flushed by the hunter threat and the raptor threat selected for significantly taller obstruction at landing sites than was randomly available, with average heights of 6.2cm taller (P=0.034), and 38.1cm taller (P<0.001), respectively. Raptor-flushed bobwhites also selected for significantly denser shrub cover (42.2%, P<0.001) and a lower angle of obstruction (70.4 degrees, P<0.001) at landing points than was randomly available. In the process of data collection, we also observed bobwhite roost locations have lower visual height obstruction (7.3cm, P=0.03), lower shrub intercept (10.1%, P=0.02), and greater angles of obstruction (18.5 degrees, P=0.005) than bobwhite diurnal locations; this may facilitate escape from nocturnal mammalian predators. Our results suggest that bobwhite escape strategies and cover use vary among threat types. These results support current management recommendations of creating a patchwork of vegetation covers for bobwhites but also suggest how a more complete understanding of bobwhite behavior would improve management and conservation efforts.

  8. Perspectives for Distributed Observations of Near-Earth Space Using a Russian-Cuban Observatory

    NASA Astrophysics Data System (ADS)

    Bisikalo, D. V.; Savanov, I. S.; Naroenkov, S. A.; Nalivkin, M. A.; Shugarov, A. S.; Bakhtigaraev, N. S.; Levkina, P. A.; Ibragimov, M. A.; Kil'pio, E. Yu.; Sachkov, M. E.; Kartashova, A. P.; Fateeva, A. M.; Uratsuka, Marta R. Rodriguez; Estrada, Ramses Zaldivar; Diaz, Antonio Alonsa; Rodríguez, Omar Pons; Figuera, Fidel Hernandes; Garcia, Maritza Garcia

    2018-06-01

    The creation of a specialized network of large, wide-angle telescopes for distributed observations of near-Earth space using a Russian-Cuban Observatory is considered. An extremely important goal of routine monitoring of near-Earth and near-Sun space is warding off threats with both natural and technogenic origins. Natural threats are associated with asteroids or comets, and technogenic threats with man-made debris in near-Earth space. A modern network of ground-based optical instruments designed to ward off such threats must: (a) have a global and, if possible, uniform geographic distribution, (b) be suitable for wide-angle, high-accuracy precision survey observations, and (c) be created and operated within a single network-oriented framework. Experience at the Institute of Astronomy on the development of one-meter-class wide-angle telescopes and elements of a super-wide-angle telescope cluster is applied to determine preferences for the composition of each node of such a network. The efficiency of distributed observations in attaining maximally accurate predictions of the motions of potentially dangerous celestial bodies as they approach the Earth and in observations of space debris and man-made satellites is estimated. The first estimates of astroclimatic conditions at the proposed site of the future Russian-Cuban Observatory in the mountains of the Sierra del Rosario Biosphere Reserve are obtained. Special attention is given to the possible use of the network to carry out a wide range of astrophysical studies, including optical support for the localization of gravitational waves and other transient events.

  9. A comparative approach to assess drivers of success in mammalian conservation recovery programs.

    PubMed

    Crees, Jennifer J; Collins, Amy C; Stephenson, P J; Meredith, Helen M R; Young, Richard P; Howe, Caroline; Price, Mark R Stanley; Turvey, Samuel T

    2016-08-01

    The outcomes of species recovery programs have been mixed; high-profile population recoveries contrast with species-level extinctions. Each conservation intervention has its own challenges, but to inform more effective management it is imperative to assess whether correlates of wider recovery program success or failure can be identified. To contribute to evidence-based improvement of future conservation strategies, we conducted a global quantitative analysis of 48 mammalian recovery programs. We reviewed available scientific literature and conducted semistructured interviews with conservation professionals involved in different recovery programs to investigate ecological, management, and political factors associated with population recoveries or declines. Identifying and removing threats was significantly associated with increasing population trend and decreasing conservation dependence, emphasizing that populations are likely to continue to be compromised in the absence of effective threat mitigation and supporting the need for threat monitoring and adaptive management in response to new and potential threats. Lack of habitat and small population size were cited as limiting factors in 56% and 42% of recovery programs, respectively, and both were statistically associated with increased longer term dependence on conservation intervention, demonstrating the importance of increasing population numbers quickly and restoring and protecting habitat. Poor stakeholder coordination and management were also regularly cited by respondents as key weaknesses in recovery programs, indicating the importance of effective leadership and shared goals and management plans. Project outcomes were not influenced by biological or ecological variables such as body mass or habitat, which suggests that these insights into correlates of conservation success and failure are likely to be generalizable across mammals. © 2016 Society for Conservation Biology.

  10. The role of information technology in the development of community pharmacy services: visions and strategic views of international experts.

    PubMed

    Westerling, Anna M; Haikala, Veikko; Airaksinen, Marja

    2011-12-01

    Community pharmacy's strategic vision has been to extend practice responsibilities beyond dispensing and provide patient care services. Few studies have evaluated the strategic and long-term development of information technology (IT) systems to support this vision. The objective of this study was to explore international experts' visions and strategic views on IT development needs in relation to service provision in community pharmacies. Semistructured interviews were conducted with a purposive sample of 14 experts from 8 countries in 2007-2008. These experts had expertise in the development of community pharmacy services and IT. The interviews were content analyzed using a constant comparison approach and a SWOT (strengths, weaknesses, opportunities, threats) analysis was undertaken. Most of the experts shared the vision for community pharmacy adopting a patient care orientation; supported by IT-based documentation, new technological solutions, access to information, and shared patient data. Opportunities to achieve this vision included IT solutions, professional skills, and interprofessional collaboration. Threats included costs, pharmacists' attitude, and the absence of IT solutions. Those responsible for IT development in community pharmacy sector should create long-term IT development strategies that are in line with community pharmacy service development strategies. Copyright © 2011 Elsevier Inc. All rights reserved.

  11. Resilience for family carers of advanced cancer patients-how can health care providers contribute? A qualitative interview study with carers.

    PubMed

    Røen, Ingebrigt; Stifoss-Hanssen, Hans; Grande, Gunn; Brenne, Anne-Tove; Kaasa, Stein; Sand, Kari; Knudsen, Anne Kari

    2018-05-01

    Caring for advanced cancer patients affects carers' psychological and physical health. Resilience has been defined as "the process of adapting well in the face of adversity, trauma, tragedy, threats or even significant sources of threat." The aim of this study was to explore factors promoting carer resilience, based on carers' experiences with and preferences for health care provider support. Qualitative, semi-structured, individual interviews with family carers of advanced cancer patients were performed until data saturation. The interviews were recorded, transcribed, and analyzed using systematic text condensation. Carers ( n = 14) of advanced cancer patients, not receiving curative treatment, admitted to an integrated curative and palliative care cancer outpatient clinic or to a university hospital cancer clinic, were included. 14 carers of advanced cancer patients were included; 7 men, 7 women, and mean age of 59 years; 3 were bereaved; 12 were partners; 5 had young and teenage children. Four main resilience factors were identified: (1) being seen and known by health care providers-a personal relation; (2) availability of palliative care; (3) information and communication about illness, prognosis, and death; and (4) facilitating a good carer-patient relation. Health care providers may enhance carers' resilience by a series of simple interventions. Education should address carers' support needs and resilience. Systematic assessment of carers' support needs is recommended. Further investigation is needed into how health care providers can help carers and patients communicate about death.

  12. Electoral democracy, revolutionary politics and political violence: the emergence of Fascism in Italy, 1920-21.

    PubMed

    Elazar, D S

    2000-09-01

    This study examines the determination of the Italian Fascists' extra-parliamentary, para-military, violent strategy. What were the effects of the socialists' political strategy, relying on electoral democracy, on the creation and strategy of the Fascist Action Squads? A comparison among Italy's 69 provinces, based on quantitative and qualitative historical evidence reveals a distinct pattern in the Fascists' violence. They attacked mainly provinces where the Socialists enjoyed the greatest electoral support. This pattern was a product of two historical processes: (a) the threat of the Socialist party to the landlords' economic and political hegemony, and (b) the landlords' tradition of militant anti-worker organization which culminated in their alliance with the Fascists. The Fascists' struggle for, and takeover of, political power was not an immanent historical necessity. It was first and foremost an anti-socialist reaction. It was shaped both 'from below', by the political power and radicalism of the PSI and the para-military capacity of the Fascist Squads; and 'from above', by the active support the Fascists received from the landlords and the state. Supported by organized landlords and blessed with the authorities' benevolence, the Squads were able to destroy - physically and politically - the legitimately constituted provincial governments of the Socialists. The alliance with the landlords determined the Squads' almost exclusive attacks on Socialist provincial strongholds that constituted the greatest threat to the landlords' interests, while provinces dominated by the ruling Liberal party were excluded from the Squads' path of 'punitive expeditions'.

  13. Amygdala lesions in rhesus macaques decrease attention to threat

    PubMed Central

    Dal Monte, Olga; Costa, Vincent D.; Noble, Pamela L.; Murray, Elisabeth A.; Averbeck, Bruno B.

    2015-01-01

    Evidence from animal and human studies has suggested that the amygdala plays a role in detecting threat and in directing attention to the eyes. Nevertheless, there has been no systematic investigation of whether the amygdala specifically facilitates attention to the eyes or whether other features can also drive attention via amygdala processing. The goal of the present study was to examine the effects of amygdala lesions in rhesus monkeys on attentional capture by specific facial features, as well as gaze patterns and changes in pupil dilation during free viewing. Here we show reduced attentional capture by threat stimuli, specifically the mouth, and reduced exploration of the eyes in free viewing in monkeys with amygdala lesions. Our findings support a role for the amygdala in detecting threat signals and in directing attention to the eye region of faces when freely viewing different expressions. PMID:26658670

  14. Ideological and personal zeal reactions to threat among people with high self-esteem: motivated promotion focus.

    PubMed

    McGregor, Ian; Gailliot, Matthew T; Vasquez, Noelia A; Nash, Kyle A

    2007-11-01

    After a mortality salience manipulation, participants completed measures of either ideological zeal (Study 1) or personal project zeal (Study 3). Mortality salience increased both kinds of zeal but only among participants with high self-esteem. High self-esteem was positively correlated with dispositional tendencies toward promotion focus, action orientation, and behavioral activation; it was negatively correlated with behavioral inhibition and rumination (Study 2). These findings clarify the role of dispositional self-esteem in mortality salience research and confirm that, as has been found with various other threats, zealous reactions to mortality salience are most pronounced among participants with high self-esteem. Results support a regulatory focus perspective on zealous reactions to threat. Ideological and personal zeal reflect motivated promotion focus reactions that are rewarding because they decrease the motivational relevance, regulatory fit, and subjective salience of threats.

  15. Intergroup Leadership Across Distinct Subgroups and Identities.

    PubMed

    Rast, David E; Hogg, Michael A; van Knippenberg, Daan

    2018-03-01

    Resolving intergroup conflict is a significant and often arduous leadership challenge, yet existing theory and research rarely, if ever, discuss or examine this situation. Leaders confront a significant challenge when they provide leadership across deep divisions between distinct subgroups defined by self-contained identities-The challenge is to avoid provoking subgroup identity distinctiveness threat. Drawing on intergroup leadership theory, three studies were conducted to test the core hypothesis that, where identity threat exists, leaders promoting an intergroup relational identity will be better evaluated and are more effective than leaders promoting a collective identity; in the absence of threat, leaders promoting a collective identity will prevail. Studies 1 and 2 ( N = 170; N = 120) supported this general proposition. Study 3 ( N = 136) extended these findings, showing that leaders promoting an intergroup relational identity, but not a collective identity, improved intergroup attitudes when participants experienced an identity distinctiveness threat.

  16. Understanding the Threat Ecosystem: A Concept for Intelligence Support to Special Warfare

    DTIC Science & Technology

    2016-05-10

    international law, national law, behavioral norms and ethical principles have no restraining effects on them.5 This emerging complexity paradigm is one...similar to a biome: a major ecological community of organisms adapted to a particular climatic or environmental condition on a large geographic area in...Awareness through tracking agents and agency in the threat environment is paramount to building an accurate ecological frame of the operational environment

  17. Self-esteem, authoritarianism, and democratic values in the face of threat.

    PubMed

    Shaffer, Barbara A; Hastings, Brad M

    2004-08-01

    This study investigated the associations among terrorist threat, right-wing authoritarianism, self-esteem, and their relations in support for democratic values. Students (n = 140) completed Altemeyer's Right-Wing Authoritarianism Scale, Rosenberg's Self-esteem Scale, and the Democratic Values Scale. The participants also read an editorial regarding the events of 9/11/01 and completed two mortality-salience questions to induce a sense of threat. Results showed that self-esteem was a significant contributor to the prediction of scores on the Democratic Values Scale. Furthermore, the interaction between self-esteem and right-wing authoritarianism explained significant variance in the Democratic Values Scale scores. The results are interpreted in light of theories addressing authoritarianism and self-esteem.

  18. The Practice of Campus-Based Threat Assessment: An Overview

    ERIC Educational Resources Information Center

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  19. Achievement goals, competition appraisals, and the psychological and emotional welfare of sport participants.

    PubMed

    Adie, James W; Duda, Joan L; Ntoumanis, Nikos

    2008-06-01

    Grounded in the 2x2 achievement goal framework (Elliot & McGregor, 2001), a model was tested examining the hypothesized relationships between approach and avoidance (mastery and performance) goals, challenge and threat appraisals of sport competition, and positive and negative indices of well-being (i.e., self-esteem, positive, and negative affect). A further aim was to determine the degree to which the cognitive appraisals mediated the relationship between the four achievement goals and the indicators of athletes' welfare. Finally, measurement and structural invariance was tested with respect to gender in the hypothesized model. An alternative model was also estimated specifying self-esteem as an antecedent of the four goals and cognitive appraisals. Four hundred and twenty-four team sport participants (Mage=24.25) responded to a multisection questionnaire. Structural equation modeling analyses provided support for the hypothesized model only. Challenge and threat appraisals partially mediated the relationships observed between mastery-based goals and the well-being indicators. Lastly, the hypothesized model was found to be invariant across gender.

  20. Maintaining Situation Awareness with Autonomous Airborne Observation Platforms

    NASA Technical Reports Server (NTRS)

    Freed, Michael; Fitzgerald, Will

    2005-01-01

    Unmanned Aerial Vehicles (UAVs) offer tremendous potential as intelligence, surveillance and reconnaissance (ISR) platforms for early detection of security threats and for acquisition and maintenance of situation awareness in crisis conditions. However, using their capabilities effectively requires addressing a range of practical and theoretical problems. The paper will describe progress by the "Autonomous Rotorcraft Project," a collaborative effort between NASA and the U.S. Army to develop a practical, flexible capability for UAV-based ISR. Important facets of the project include optimization methods for allocating scarce aircraft resources to observe numerous, distinct sites of interest; intelligent flight automation software than integrates high-level plan generation capabilities with executive control, failure response and flight control functions; a system architecture supporting reconfiguration of onboard sensors to address different kinds of threats; and an advanced prototype vehicle designed to allow large-scale production at low cost. The paper will also address human interaction issues including an empirical method for determining how to allocate roles and responsibilities between flight automation and human operations.

  1. Effects of offshore platforms on soft-bottom macro-benthic assemblages: a case study in a Mediterranean gas field.

    PubMed

    Terlizzi, Antonio; Bevilacqua, Stanislao; Scuderi, Danilo; Fiorentino, Dario; Guarnieri, Giuseppe; Giangrande, Adriana; Licciano, Margherita; Felline, Serena; Fraschetti, Simonetta

    2008-07-01

    The exploitation of fossil fuels in the Mediterranean Sea will likely lead to an increase in the number of offshore platforms, a recognized threat for marine biodiversity. To date, in this basin, few attempts have been made to assess the impact of offshore gas and oil platforms on the biodiversity of benthic assemblages. Here, we adopted a structured experimental design coupled with high taxonomic resolution to outline putative effects of gas platforms on soft-bottom macrofauna assemblages in the North Ionian Sea. The analysis was based on a total of 20,295 specimens of 405 taxa, almost entirely identified at species level. Multivariate and univariate analyses showed idiosyncratic patterns of assemblage change with increasing distance from the platforms. Potential reasons underlying such inconsistency are analyzed and the view that structured experimental monitoring is a crucial tool to quantify the extent and magnitude of potential threats and to provide sound baseline information on biodiversity patterns is supported.

  2. Beauty at the ballot box: disease threats predict preferences for physically attractive leaders.

    PubMed

    White, Andrew Edward; Kenrick, Douglas T; Neuberg, Steven L

    2013-12-01

    Why does beauty win out at the ballot box? Some researchers have posited that it occurs because people ascribe generally positive characteristics to physically attractive candidates. We propose an alternative explanation-that leadership preferences are related to functional disease-avoidance mechanisms. Because physical attractiveness is a cue to health, people concerned with disease should especially prefer physically attractive leaders. Using real-world voting data and laboratory-based experiments, we found support for this relationship. In congressional districts with elevated disease threats, physically attractive candidates are more likely to be elected (Study 1). Experimentally activating disease concerns leads people to especially value physical attractiveness in leaders (Study 2) and prefer more physically attractive political candidates (Study 3). In a final study, we demonstrated that these findings are related to leadership preferences, specifically, rather than preferences for physically attractive group members more generally (Study 4). Together, these findings highlight the nuanced and functional nature of leadership preferences.

  3. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Frincke, Deborah A.

    2010-09-01

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, so as to move from an insider threat detection stance to one that enables prediction of potential insider presence. Two distinctive aspects of the approach are the objective of predicting or anticipating potential risks and the use of organizational data in addition to cyber data to support the analysis. The chapter describes the challenges of this endeavor and progress in defining a usable set of predictive indicators, developing a framework for integrating the analysis of organizational and cyber security data tomore » yield predictions about possible insider exploits, and developing the knowledge base and reasoning capability of the system. We also outline the types of errors that one expects in a predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.« less

  4. When Is Humiliation More Intense? The Role of Audience Laughter and Threats to the Self

    PubMed Central

    Mann, Liesbeth; Feddes, Allard R.; Leiser, Anne; Doosje, Bertjan; Fischer, Agneta H.

    2017-01-01

    In personal accounts, humiliation is often reported as a very intense, painful, negative emotion. We report two scenario studies in which we explored two factors that may contribute to the intense character of humiliation: (1) unwanted, negative public exposure, and (2) a threat to central aspects of one's identity. Study 1 (N = 115) assessed emotional reactions to a public insult when an audience responded with either laughter or not and when someone from the audience offered support after the insult or no support was offered. Results showed that the intensity of humiliation increased when people laughed after the insult. However, support offered after the insult had no effect on reported humiliation. Study 2 (N = 99) focused on threats to different self-related values and showed stronger reports of humiliation when central self-related values were threatened than when less central self-related values were threatened. Study 2 also replicated the audience-effect from Study 1, but only when central self-related values were threatened and not when less central self-related values were threatened. Limitations of these studies (e.g., the use of scenarios) and potential avenues for future research, such as the (long-term) consequences of humiliation and humiliation in the context of social media, are discussed. PMID:28473779

  5. International Health Regulations (2005) and the U.S. Department of Defense: building core capacities on a foundation of partnership and trust.

    PubMed

    Johns, Matthew C; Blazes, David L

    2010-12-03

    A cornerstone of effective global health surveillance programs is the ability to build systems that identify, track and respond to public health threats in a timely manner. These functions are often difficult and require international cooperation given the rapidity with which diseases cross national borders and spread throughout the global community as a result of travel and migration by both humans and animals. As part of the U.S. Armed Forces Health Surveillance Center (AFHSC), the Department of Defense's (DoD) Global Emerging Infections Surveillance and Response System (AFHSC-GEIS) has developed a global network of surveillance sites over the past decade that engages in a wide spectrum of support activities in collaboration with host country partners. Many of these activities are in direct support of International Health Regulations (IHR[2005]). The network also supports host country military forces around the world, which are equally affected by these threats and are often in a unique position to respond in areas of conflict or during complex emergencies. With IHR(2005) as the guiding framework for action, the AFHSC-GEIS network of international partners and overseas research laboratories continues to develop into a far-reaching system for identifying, analyzing and responding to emerging disease threats.

  6. A growing global network’s role in outbreak response: AFHSC-GEIS 2008-2009

    PubMed Central

    2011-01-01

    A cornerstone of effective disease surveillance programs comprises the early identification of infectious threats and the subsequent rapid response to prevent further spread. Effectively identifying, tracking and responding to these threats is often difficult and requires international cooperation due to the rapidity with which diseases cross national borders and spread throughout the global community as a result of travel and migration by humans and animals. From Oct.1, 2008 to Sept. 30, 2009, the United States Department of Defense’s (DoD) Armed Forces Health Surveillance Center Global Emerging Infections Surveillance and Response System (AFHSC-GEIS) identified 76 outbreaks in 53 countries. Emerging infectious disease outbreaks were identified by the global network and included a wide spectrum of support activities in collaboration with host country partners, several of which were in direct support of the World Health Organization’s (WHO) International Health Regulations (IHR) (2005). The network also supported military forces around the world affected by the novel influenza A/H1N1 pandemic of 2009. With IHR (2005) as the guiding framework for action, the AFHSC-GEIS network of international partners and overseas research laboratories continues to develop into a far-reaching system for identifying, analyzing and responding to emerging disease threats. PMID:21388563

  7. Sensitivity to Uncertainty in Asteroid Impact Risk Assessment

    NASA Astrophysics Data System (ADS)

    Mathias, D.; Wheeler, L.; Prabhu, D. K.; Aftosmis, M.; Dotson, J.; Robertson, D. K.

    2015-12-01

    The Engineering Risk Assessment (ERA) team at NASA Ames Research Center is developing a physics-based impact risk model for probabilistically assessing threats from potential asteroid impacts on Earth. The model integrates probabilistic sampling of asteroid parameter ranges with physics-based analyses of entry, breakup, and impact to estimate damage areas and casualties from various impact scenarios. Assessing these threats is a highly coupled, dynamic problem involving significant uncertainties in the range of expected asteroid characteristics, how those characteristics may affect the level of damage, and the fidelity of various modeling approaches and assumptions. The presented model is used to explore the sensitivity of impact risk estimates to these uncertainties in order to gain insight into what additional data or modeling refinements are most important for producing effective, meaningful risk assessments. In the extreme cases of very small or very large impacts, the results are generally insensitive to many of the characterization and modeling assumptions. However, the nature of the sensitivity can change across moderate-sized impacts. Results will focus on the value of additional information in this critical, mid-size range, and how this additional data can support more robust mitigation decisions.

  8. An Integrated 0-1 Hour First-Flash Lightning Nowcasting, Lightning Amount and Lightning Jump Warning Capability

    NASA Technical Reports Server (NTRS)

    Mecikalski, John; Jewett, Chris; Carey, Larry; Zavodsky, Brad; Stano, Geoffrey; Chronis, Themis

    2015-01-01

    Using satellite-based methods that provide accurate 0-1 hour convective initiation (CI) nowcasts, and rely on proven success coupling satellite and radar fields in the Corridor Integrated Weather System (CIWS; operated and developed at MIT-Lincoln Laboratory), to subsequently monitor for first-flash lightning initiation (LI) and later period lightning trends as storms evolve. Enhance IR-based methods within the GOES-R CI Algorithm (that must meet specific thresholds for a given cumulus cloud before the cloud is considered to have an increased likelihood of producing lightning next 90 min) that forecast LI. Integrate GOES-R CI and LI fields with radar thresholds (e.g., first greater than or equal to 40 dBZ echo at the -10 C altitude) and NWP model data within the WDSS-II system for LI-events from new convective storms. Track ongoing lightning using Lightning Mapping Array (LMA) and pseudo-Geostationary Lightning Mapper (GLM) data to assess per-storm lightning trends (e.g., as tied to lightning jumps) and outline threat regions. Evaluate the ability to produce LI nowcasts through a "lightning threat" product, and obtain feedback from National Weather Service forecasters on its value as a decision support tool.

  9. Evaluation of coping resources and self-esteem as moderators of the relationship between threat appraisals and avoidance of activities after traumatic brain injury.

    PubMed

    Riley, Gerard A; Dennis, Rebecca K; Powell, Theresa

    2010-12-01

    It is not uncommon for people after a traumatic brain injury (TBI) to develop anxieties about possible negative outcomes (i.e., threat appraisals) in relation to participating in valued activities. Some respond to this anxiety by avoiding the activities, but others maintain their participation. The present study investigated two factors that may help explain this variation across individuals in their response to threat appraisals - self-esteem and the evaluation of coping resources. Forty-one individuals with a TBI completed the Avoidance and Threat Appraisals Questionnaire, the Rosenberg Self-Esteem Scale and the Coping Resources Questionnaire. The study's hypotheses were supported: Those low in self-esteem, and those with a negative evaluation of their ability to cope with the TBI, were significantly more likely to respond to threat appraisals with avoidance. Those whose injury was more recent and those whose injury was the result of an assault were also more likely to respond with avoidance. The theoretical and therapeutic implications of these results are discussed.

  10. Research on the method of information system risk state estimation based on clustering particle filter

    NASA Astrophysics Data System (ADS)

    Cui, Jia; Hong, Bei; Jiang, Xuepeng; Chen, Qinghua

    2017-05-01

    With the purpose of reinforcing correlation analysis of risk assessment threat factors, a dynamic assessment method of safety risks based on particle filtering is proposed, which takes threat analysis as the core. Based on the risk assessment standards, the method selects threat indicates, applies a particle filtering algorithm to calculate influencing weight of threat indications, and confirms information system risk levels by combining with state estimation theory. In order to improve the calculating efficiency of the particle filtering algorithm, the k-means cluster algorithm is introduced to the particle filtering algorithm. By clustering all particles, the author regards centroid as the representative to operate, so as to reduce calculated amount. The empirical experience indicates that the method can embody the relation of mutual dependence and influence in risk elements reasonably. Under the circumstance of limited information, it provides the scientific basis on fabricating a risk management control strategy.

  11. The new social marketing challenge to promote radon testing.

    PubMed

    DiPofi, J A; LaTour, M S; Henthorne, T L

    2001-01-01

    As part of a project funded by the Environmental Protection Agency, exploratory qualitative analysis was conducted to gain insight into perceptions of the threat of radon in the Karst geological region (i.e., Northern Alabama, Central Tennessee, Central Kentucky). Based on health practitioner input, it was clear that the tenets of Protection Motivation Theory (PMT) and the probing afforded by focus group research would provide greatly needed theory-based insight into the public reactions (or lack thereof) to the threat posed by radon. Qualitative research findings of this project are discussed as well as preliminary recommendations are provided to advance the protection motivation theory research agenda for promoting awareness of the threat of radon and to influence appropriate response to that threat.

  12. Threat driven modeling framework using petri nets for e-learning system.

    PubMed

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  13. Reactivity to uncertain threat as a familial vulnerability factor for alcohol use disorder.

    PubMed

    Gorka, S M; Hee, D; Lieberman, L; Mittal, V A; Phan, K L; Shankman, S A

    2016-12-01

    When sober, problematic drinkers display exaggerated reactivity to threats that are uncertain (U-threat). Since this aversive affective state can be alleviated via acute alcohol intoxication, it has been posited that individuals who exhibit heightened reactivity to U-threat at baseline are motivated to use alcohol as a means of avoidance-based coping, setting the stage for excessive drinking. To date, however, no study has attempted to characterize the dispositional nature of exaggerated reactivity to U-threat and test whether it is a vulnerability factor or exclusively a disease marker of problematic alcohol use. The current investigation utilized a family study design to address these gaps by examining whether (1) reactivity to U-threat is associated with risk for problematic alcohol use, defined by family history of alcohol use disorder (AUD) and (2) reactivity to U-threat is correlated amongst adult biological siblings. A total of 157 families, and 458 individuals, participated in the study and two biological siblings completed a threat-of-shock task designed to probe reactivity to U-threat and predictable threat (P-threat). Startle potentiation was collected as an index of aversive responding. Within biological siblings, startle potentiation to U-threat [intraclass correlation (ICC) = 0.35] and P-threat (ICC = 0.63) was significantly correlated. In addition, independent of an individuals' own AUD status, startle potentiation to U-threat, but not P-threat, was positively associated with risk for AUD (i.e. AUD family history). This suggests that heightened reactivity to U-threat may be a familial vulnerability factor for problematic drinking and a novel prevention target for AUD.

  14. Group affiliation in self-management: support or threat to identity?

    PubMed

    Bossy, Dagmara; Knutsen, Ingrid Ruud; Rogers, Anne; Foss, Christina

    2017-02-01

    Self-management is considered important in chronic illness, and contemporary health policy recommends participation in support groups for individuals with chronic conditions. Although withdrawal from or non-participation in support groups is an important problem, there is limited knowledge about individuals' own motivation for participation in or withdrawal from self-management support groups. To investigate how individuals with type 2 diabetes perceive participation in group-based self-management support. This is a qualitative focus group study using a semi-structured interview guide. Sixteen participants diagnosed with type 2 diabetes were included in the study. Individuals with and without group affiliations were mixed in three focus groups to trigger discussions. In the analysis, reoccurring themes of engagement and discussions between participants were focused within a theoretical frame of institutional logic. The focus groups are seen as social spaces where participants construct identity. Both participation and non-participation in group-based self-management support are associated with dealing with the stigma of having type 2 diabetes. Negotiations contribute to constructing an illness dignity as a response to the logic of moral responsibility for the disease. Contemporary policy contributes to societal understandings of individuals with type 2 diabetes as morally inadequate. Our study shows that group-based self-management support may counteract blame and contribute in negotiations of identity for individuals with type 2 diabetes. This mechanism makes participation in groups beneficial for some but stigma inducing for others. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  15. Habitat preferences and conservation threats to Black-necked Cranes wintering in Bhutan.

    PubMed

    Namgay, Rinchen; Wangchuk, Sangay

    2016-01-01

    Black-necked Crane (Grus nigricollis) is a vulnerable Red list species whose populations are declining. However, little is known about Black-necked Cranes' habitat requirements or the causes of their population decline. We identified Black-necked Cranes' winter roost and foraging preferences of Black-necked Cranes in Bhutan during the winter of 2013-2014. Black-necked Cranes' roosts were recorded using Garmin GPSmap 60CSx, while foraging preferences and threats to the birds were identified based on a survey of household heads (n = 107) residing within a 3 km radius of roost sites. We grouped the threats identified by the communities into four major categories, viz. biological, social, political and natural threats based on the relevance. Of the four major threats, communities residing within the roosting and foraging habitat of the Black-necked Crane reported biological threat as major. Biological threats as reported by communities include loss of habitat, food shortage and competition from other animals. We recommend the present roosting areas be designated as part of the conservation areas for Black-necked Crane wintering in Bumthang district. In addition to preserving these areas, government should also encourage farming in foraging habitats of Black-necked Crane, because they mainly feed on barley, wheat, paddy, potatoes and buckwheat, besides roots, tubers and insects in the wetlands.

  16. With God on our side: Religious primes reduce the envisioned physical formidability of a menacing adversary.

    PubMed

    Holbrook, Colin; Fessler, Daniel M T; Pollack, Jeremy

    2016-01-01

    The imagined support of benevolent supernatural agents attenuates anxiety and risk perception. Here, we extend these findings to judgments of the threat posed by a potentially violent adversary. Conceptual representations of bodily size and strength summarize factors that determine the relative threat posed by foes. The proximity of allies moderates the envisioned physical formidability of adversaries, suggesting that cues of access to supernatural allies will reduce the envisioned physical formidability of a threatening target. Across two studies, subtle cues of both supernatural and earthly social support reduced the envisioned physical formidability of a violent criminal. These manipulations had no effect on the perceived likelihood of encountering non-conflictual physical danger, raising the possibility that imagined supernatural support leads participants to view themselves not as shielded from encountering perilous situations, but as protected should perils arise. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. Managing facility risk: external threats and health care organizations.

    PubMed

    Reid, Daniel J; Reid, William H

    2014-01-01

    Clinicians and clinical administrators should have a basic understanding of physical and financial risk to mental health facilities related to external physical threat, including actions usually viewed as "terrorism" and much more common sources of violence. This article refers to threats from mentally ill persons and those acting out of bizarre or misguided "revenge," extortionists and other outright criminals, and perpetrators usually identified as domestic or international terrorists. The principles apply both to relatively small and contained acts (such as a patient or ex-patient attacking a staff member) and to much larger events (such as bombings and armed attack), and are relevant to facilities both within and outside the U.S. Patient care and accessibility to mental health services rest not only on clinical skills, but also on a place to practice them and an organized system supported by staff, physical facilities, and funding. Clinicians who have some familiarity with the non-clinical requirements for care are in a position to support non-clinical staff in preventing care from being interrupted by external threats or events such as terrorist activity, and/or to serve at the interface of facility operations and direct clinical care. Readers should note that this article is an introduction to the topic and cannot address all local, state and national standards for hospital safety, or insurance providers' individual facility requirements. Copyright © 2014 John Wiley & Sons, Ltd.

  18. Adolescents and the threat of nuclear war: the evolution of a perspective.

    PubMed Central

    Beardslee, W. R.; Mack, J. E.

    1983-01-01

    The authors briefly review recent work in the area of the impact of the threat of nuclear war on children and adolescents. They explore some of the difficulties inherent in understanding the possible effects of the threat of nuclear war on children based on their research experience in the area. PMID:6636837

  19. Accountable care organizations and radiology: threat or opportunity?

    PubMed

    Abramson, Richard G; Berger, Paul E; Brant-Zawadzki, Michael N

    2012-12-01

    Although the anticipated rise of accountable care organizations brings certain potential threats to radiologists, including direct threats to revenue and indirect systemic changes jeopardizing the bargaining leverage of radiology groups, accountable care organizations, and other integrated health care delivery models may provide radiology with an important opportunity to reassert its leadership and assume a more central role within health care systems. Capitalizing on this potential opportunity, however, will require radiology groups to abandon the traditional "film reader" mentality and engage actively in the design and implementation of nontraditional systems service lines aimed at adding differentiated value to larger health care organizations. Important interlinked and mutually reinforcing components of systems service lines, derived from radiology's core competencies, may include utilization management and decision support, IT leadership, quality and safety assurance, and operational enhancements to meet organizational goals. Such systems-oriented service products, tailored to the needs of individual integrated care entities and supported by objective performance metrics, may provide market differentiation to shield radiology from commoditization and could become an important source of new nonclinical revenue. Copyright © 2012 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  20. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  1. Religious magnanimity: reminding people of their religious belief system reduces hostility after threat.

    PubMed

    Schumann, Karina; McGregor, Ian; Nash, Kyle A; Ross, Michael

    2014-09-01

    The present research tested the hypothesis that many people's ambient religious beliefs are non-hostile and magnanimous by assessing whether reminding people of their religious belief systems would reduce hostility after threat. Across religious affiliations, participants reported that their religious belief systems encourage magnanimous behavior. In addition, priming their religious belief systems caused them to act more magnanimously, but only when motivated to adhere to salient ideals (i.e., after threats; see Gailliot, Stillman, Schmeichel, Maner, & Plant, 2008; Jonas et al., 2008). Specifically, in Studies 1-5, we found that a general religious belief system prime ("Which religious belief system do you identify with?") reduced the hostility of people's thoughts, behaviors, and judgments following threat. In Studies 6 and 7, we found that the religious belief system prime only reduced hostile reactions to threat among participants who held religious beliefs that oriented them toward magnanimous ideals (Study 6) and who were dispositionally inclined to adhere to their ideals (Study 7). In Study 8, we found support for the role of magnanimous ideals by demonstrating that directly priming these ideals yielded effects similar to those produced by a religious belief system prime. These studies provide consistent evidence that, by invoking magnanimous ideals, a religious belief system prime promotes less hostile responses to threat. 2014 APA, all rights reserved

  2. Motivational Basis of Personality Traits: A Meta-Analysis of Value-Personality Correlations.

    PubMed

    Fischer, Ronald; Boer, Diana

    2015-10-01

    We investigated the relationships between personality traits and basic value dimensions. Furthermore, we developed novel country-level hypotheses predicting that contextual threat moderates value-personality trait relationships. We conducted a three-level v-known meta-analysis of correlations between Big Five traits and Schwartz's (1992) 10 values involving 9,935 participants from 14 countries. Variations in contextual threat (measured as resource threat, ecological threat, and restrictive social institutions) were used as country-level moderator variables. We found systematic relationships between Big Five traits and human values that varied across contexts. Overall, correlations between Openness traits and the Conservation value dimension and Agreeableness traits and the Transcendence value dimension were strongest across all samples. Correlations between values and all personality traits (except Extraversion) were weaker in contexts with greater financial, ecological, and social threats. In contrast, stronger personality-value links are typically found in contexts with low financial and ecological threats and more democratic institutions and permissive social context. These effects explained on average more than 10% of the variability in value-personality correlations. Our results provide strong support for systematic linkages between personality and broad value dimensions, but they also point out that these relations are shaped by contextual factors. © 2014 Wiley Periodicals, Inc.

  3. The persistence of attachment: complicated grief, threat, and reaction times to the deceased's name.

    PubMed

    Mancini, Anthony D; Bonanno, George A

    2012-08-01

    Complicated grief is increasingly recognized as a debilitating disorder with significant mental and health consequences. The underlying mechanisms of complicated grief remain unclear, however. In the present study, we investigated a specific mechanism of complicated grief (CG) derived from attachment theory: the accessibility of the deceased's mental representation under threat. In a matched comparison of complicated (n=26) and asymptomatic grievers (n=30), we used an emotional Stroop task following subliminal threat or neutral primes to examine the accessibility of mental representations of the deceased, current attachment figures, and close others. Complicated grievers did not evidence differential accessibility to the deceased's mental representation across priming conditions, whereas asymptomatic grievers showed reduced accessibility (deactivation) of the deceased's mental representation specifically in the threat prime condition. These effects were independent of depressive symptoms. Across grievers, attachment anxiety and avoidance uniquely predicted accessibility of the deceased's name in the threat condition. The limitations of this study are its small sample size and reliance on analog attachment threats. These data support that accessibility of the deceased's mental representation in threatening contexts is an important component of complicated and asymptomatic grieving and that attachment insecurity contributes to a maladaptive reliance on the deceased as an attachment figure. Copyright © 2012 Elsevier B.V. All rights reserved.

  4. Detection of dim targets in multiple environments

    NASA Astrophysics Data System (ADS)

    Mirsky, Grace M.; Woods, Matthew; Grasso, Robert J.

    2013-10-01

    The proliferation of a wide variety of weapons including Anti-Aircraft Artillery (AAA), rockets, and small arms presents a substantial threat to both military and civilian aircraft. To address this ever-present threat, Northrop Grumman has assessed unguided threat phenomenology to understand the underlying physical principles for detection. These principles, based upon threat transit through the atmosphere, exploit a simple phenomenon universal to all objects moving through an atmosphere comprised of gaseous media to detect and track the threat in the presence of background and clutter. Threat detection has rapidly become a crucial component of aircraft survivability systems that provide situational awareness to the crew. It is particularly important to platforms which may spend a majority of their time at low altitudes and within the effective range of a large variety of weapons. Detection of these threats presents a unique challenge as this class of threat typically has a dim signature coupled with a short duration. Correct identification of each of the threat components (muzzle flash and projectile) is important to determine trajectory and intent while minimizing false alarms and maintaining a high detection probability in all environments.

  5. Identifying changing aviation threat environments within an adaptive Homeland Security Advisory System.

    PubMed

    Lee, Adrian J; Jacobson, Sheldon H

    2012-02-01

    A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.

  6. 76 FR 19434 - Roni Dreszer, M.D.; Decision and Order

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-07

    ... evidence under the [experience] * * * factor[] support[s]'' the revocation of his registration, is consistent with Agency precedent. Id. With respect to factor five, ``[s]uch other conduct which may threaten... factor requires some showing that the relevant conduct actually constituted a threat to public safety...

  7. From Threat to Fear: The neural organization of defensive fear systems in humans

    PubMed Central

    Mobbs, Dean; Marchant, Jennifer L; Hassabis, Demis; Seymour, Ben; Tan, Geoffrey; Gray, Marcus; Petrovic, Predrag; Dolan, Raymond J.; Frith, Christopher D.

    2009-01-01

    Post-encounter and circa-strike defensive contexts represent two adaptive responses to potential and imminent danger. In the context of a predator, the post-encounter reflects the initial detection of the potential threat, whilst the circa-strike is associated with direct predatory attack. We used fMRI to investigate the neural organization of anticipation and avoidance of artificial predators with high or low probability of capturing the subject across analogous post-encounter and circa-strike contexts of threat. Consistent with defense systems models, post-encounter threat elicited activity in forebrain areas including subgenual anterior cingulate cortex (sgACC), hippocampus and amygdala. Conversely, active avoidance during circa-strike threat increased activity in mid-dorsal ACC and midbrain areas. During the circa-strike condition, subjects showed increased coupling between the midbrain and mid-dorsal ACC and decreased coupling with the sgACC, amygdala and hippocampus. Greater activity was observed in the right pregenual ACC for high compared to low probability of capture during circa-strike threat. This region showed decreased coupling with the amygdala, insula and ventromedial prefrontal cortex. Finally, we found that locomotor errors correlated with subjective reports of panic for the high compared to low probability of capture during the circa-strike threat and these panic-related locomotor errors were correlated with midbrain activity. These findings support models suggesting that higher forebrain areas are involved in early threat responses, including the assignment and control of fear, whereas as imminent danger results in fast, likely “hard-wired”, defensive reactions mediated by the midbrain. PMID:19793982

  8. School-Based Decision Making: A Principal-Agent Perspective.

    ERIC Educational Resources Information Center

    Ferris, James M.

    1992-01-01

    A principal-agent framework is used to examine potential gains in educational performance and potential threats to public accountability that school-based decision-making proposals pose. Analysis underscores the need to tailor the design of decentralized decision making to the sources of poor educational performance and threats to school…

  9. Stereotype threat and lift effects in motor task performance: the mediating role of somatic and cognitive anxiety.

    PubMed

    Laurin, Raphael

    2013-01-01

    The aim of this investigation was to replicate the stereotype threat and lift effects in a motor task in a neutral sex-typed activity, using somatic and cognitive anxiety as key mediators of these phenomena. It was hypothesized that an ingroup/outgroup social categorization based on gender would have distinctive effects for female and male participants. A total of 161 French physical education students were randomly assigned to three threat conditions--no threat, female threat, and male threat--thus leading to a 3 x 2 (threat by gender) design. The analyses revealed a stereotype lift effect on the performances for both male and female participants, as well as a stereotype threat effect only for female participants. They also indicated that somatic anxiety had a mediating effect on the performance of female participants targeted by a negative stereotype, but that it had a facilitating effect on their performance. The stereotype threat and lift effects on motor tasks were replicated in a neutral sex-typed activity and somatic anxiety seems to have a facilitating mediating effect of the relationships between the gender-conditions (control or female threat) interaction and free-throw performance. The model used to distinguish somatic and cognitive anxiety appeared to be a relevant means of explaining the stereotype threat and lift mechanisms.

  10. 'I'm Black and I'm Proud': A Majority Ecological Context Protects Affective Aspects of Black Identity Under Stereotype Threat.

    PubMed

    Oliver, Andre'; Andemeskel, Ghilamichael; King, Carlise R; Wallace, Lyndsey; McDougal, Serie; Monteiro, Kenneth P; Ben-Zeev, Avi

    2017-12-01

    We provide evidence that stereotype threat, a phenomenon that causes stigmatized individuals to experience group-based evaluative concerns (Steele in Am Psychol 52:613-629, 1997; Whistling Vivaldi and other clues to how stereotypes affect us, W.W. Norton, New York, 2010), impacts affective aspects of Black identity as a function of majority versus minority ecological contexts. Black/African-American students, enrolled in either Africana Studies (Black ecological majority) or Psychology (Black ecological minority), completed private and public regard subscales from the Multidimensional Inventory of Black Identity (Sellers et al. in Pers Soc Psychol Rev 2:18-39, 1998) at baseline (Time 1) and after being randomly assigned to a stereotype threat or no-threat/control condition (Time 2). In threat, participants were introduced to a 'puzzle' task as diagnostic of intellectual abilities, whereas in no-threat the same task was introduced as culture fair, such that people from different racial/ethnic groups had performed similarly on this task in the past. In Psychology, students under threat exhibited a simultaneous decrease and increase in private and public regard, respectively, a pattern shown in the literature to be associated with discrimination-based distress and lesser well-being in Black ecological minority environments. In contrast, Africana Studies students' racial identity under threat remained intact. We discuss the protective effects of Africana Studies on racial identity and implications for educational reform.

  11. ‘I’m Black and I’m Proud’: A Majority Ecological Context Protects Affective Aspects of Black Identity Under Stereotype Threat

    PubMed Central

    Oliver, Andre’; Andemeskel, Ghilamichael; King, Carlise R.; Wallace, Lyndsey; McDougal, Serie; Monteiro, Kenneth P.

    2018-01-01

    We provide evidence that stereotype threat, a phenomenon that causes stigmatized individuals to experience group-based evaluative concerns (Steele in Am Psychol 52:613–629, 1997; Whistling Vivaldi and other clues to how stereotypes affect us, W.W. Norton, New York, 2010), impacts affective aspects of Black identity as a function of majority versus minority ecological contexts. Black/African-American students, enrolled in either Africana Studies (Black ecological majority) or Psychology (Black ecological minority), completed private and public regard subscales from the Multidimensional Inventory of Black Identity (Sellers et al. in Pers Soc Psychol Rev 2:18–39, 1998) at baseline (Time 1) and after being randomly assigned to a stereotype threat or no-threat/control condition (Time 2). In threat, participants were introduced to a ‘puzzle’ task as diagnostic of intellectual abilities, whereas in no-threat the same task was introduced as culture fair, such that people from different racial/ethnic groups had performed similarly on this task in the past. In Psychology, students under threat exhibited a simultaneous decrease and increase in private and public regard, respectively, a pattern shown in the literature to be associated with discrimination-based distress and lesser well-being in Black ecological minority environments. In contrast, Africana Studies students’ racial identity under threat remained intact. We discuss the protective effects of Africana Studies on racial identity and implications for educational reform. PMID:29657583

  12. Mental health care use by soldiers conducting counterinsurgency operations.

    PubMed

    Applewhite, Larry; Keller, Nathan; Borah, Adam

    2012-05-01

    Counterinsurgency (COIN) has become the cornerstone of the military's strategy to combat terrorist threats. COIN operations are complex and often expose soldiers to unfamiliar stressors as they fight the enemy while developing and maintaining rapport with the local populace. Utilizing a retrospective record review protocol, we examined 282 mental health files of soldiers assigned to a brigade combat team that operated from a large forward operating base in Iraq during the counterinsurgency campaign. Most reported sleep disturbance, depression, anxiety, irritability, and conflict with supervisors related to either operational stress, exposure to direct combat, or home front concerns. Most received brief individual supportive therapy or attended solution-focused group counseling emphasizing life skills training, post-traumatic stress treatment, women's support, or relationship skills. Psychopharmacologic treatment was an essential adjunct to the counseling program. Results indicate that supporting a COIN deployment requires a comprehensive mental health program that can respond to a wide range of mental health problems.

  13. A state-based national network for effective wildlife conservation

    USGS Publications Warehouse

    Meretsky, Vicky J.; Maguire, Lynn A.; Davis, Frank W.; Stoms, David M.; Scott, J. Michael; Figg, Dennis; Goble, Dale D.; Griffith, Brad; Henke, Scott E.; Vaughn, Jacqueline; Yaffee, Steven L.

    2012-01-01

    State wildlife conservation programs provide a strong foundation for biodiversity conservation in the United States, building on state wildlife action plans. However, states may miss the species that are at the most risk at rangewide scales, and threats such as novel diseases and climate change increasingly act at regional and national levels. Regional collaborations among states and their partners have had impressive successes, and several federal programs now incorporate state priorities. However, regional collaborations are uneven across the country, and no national counterpart exists to support efforts at that scale. A national conservation-support program could fill this gap and could work across the conservation community to identify large-scale conservation needs and support efforts to meet them. By providing important information-sharing and capacity-building services, such a program would advance collaborative conservation among the states and their partners, thus increasing both the effectiveness and the efficiency of conservation in the United States.

  14. Social information use in threat perception: Social buffering, contagion and facilitation of alarm responses

    PubMed Central

    Oliveira, Rui F.; Faustino, Ana I.

    2017-01-01

    ABSTRACT Group living animals can use the behavior of others as cues for the presence of threat in the environment and adjust their behavior accordingly. Therefore, different social phenomena that modulate the response to threat, such as social buffering, social transmission (contagion), and facilitation of alarm responses can be seen as different manifestations of social information use in threat detection. Thus, social phenomena that are functionally antagonistic, such as social buffering and social transmission of fear, may rely on shared neurobehavioral mechanisms related to the use of social information in decision-making about the presence of threat in the environment. Here, we propose a unifying conceptual framework for the study of social information use in threat perception based on signal detection theory.

  15. Friendship, sexual intimacy and young people's negotiations of sexual health.

    PubMed

    Byron, Paul

    2017-04-01

    This paper examines how young people's friendships influence safer sexual practices. Through a thematic discourse analysis, interviews with Sydney-based young people (aged 18-25 years) and Australian-based sexual health websites for young people are considered. Interview data illustrate how friendships can support young people's sexual experiences, concerns and safeties beyond the practice of 'safe sex' (condom use). This is evident in friends' practices of sex and relationship advice, open dialogue, trust and sharing experiential knowledge, as well as friend-based sex. Meanwhile, friendship discourse from selected Australian sexual health websites fails to engage with the support offered by friendship, or its value to a sexual health agenda. Foucault's account of friendship as a space of self-invention is considered in light of these data, along with his argument that friendship poses a threat to formal systems of knowing and regulating sex. Whether sexual or not, many close friendships are sexually intimate given the knowledge, support and influence these offer to one's sexual practices and relations. This paper argues that greater attention to friendship among sexual health promoters and researchers would improve professional engagements with young people's contemporary sexual cultures, and better inform their attempts to engage young people through social media.

  16. Attributional biases about the origins of attitudes: externality, emotionality, and rationality.

    PubMed

    Kenworthy, Jared B; Miller, Norman

    2002-05-01

    Pilot work and 3 studies investigated the ways people explain the origins of attitudes. Study I examined the use of 3 dimensions (externality, rationality, emotionality) to explain the origin of people's own, in-group, and out-group attitudes. Attributions for own attitudes were the least externally and emotionally based and the most rationally based. By comparison with the out-group, less externality, less emotionality, and more rationality also were attributed to in-group attitudes. Studies 2 and 3 examined the effects of intergroup threat on attributions for in- and out-group attitude positions. Under high threat, more externality and emotionality but less rationality were attributed to out-group attitudes than under low threat. Intergroup differentiation mediated the difference between out-group attributions under high and low threat.

  17. Moderators and mediators of the effects of interparental conflict on children's adjustment.

    PubMed

    Kerig, P K

    1998-06-01

    Moderational and mediational models of the relationships among appraisals, interparental conflict, and children's adjustment were tested in a sample of 174 families with a school-age child. Parents rated children's exposure to interparental conflict and internalizing, externalizing, and total behavior problems. Children completed questionnaires regarding their appraisals of their parents' conflicts, including frequency and intensity, perceived threat, control, and self-blame, as well as measures of anxiety and depression. Results overall demonstrated more consistent support for the moderational than mediational hypotheses. Appraisals of conflict properties, threat, self-blame, and perceived control moderated the effects of interparental conflict on externalizing, total problems, and anxiety in boys. Conflict properties, threat, self-blame, perceived control, and self-calming acted as moderators of internalizing in girls.

  18. No More Fighting and Biting During Mouth Care: Applying the Theoretical Constructs of Threat Perception to Clinical Practice

    PubMed Central

    Jablonski, Rita A.; Therrien, Barbara; Kolanowski, Ann

    2012-01-01

    The purpose of this article is to describe how the neurobiological principles of threat perception and fear response can support clinical approaches to prevent and reduce care-resistant behaviors during mouth care. Nursing home residents who exhibit care-resistant behavior are at risk for poor oral health because daily oral hygiene may not be consistently provided. Poor oral health predisposes these older people to systemic problems such as pneumonia, cerebral vascular accidents, and hyperglycemia. Care-resistant behavior is a fear-evoked response to nurses’ unintentionally threatening behavior during mouth care. Nurses can safely and effectively provide mouth care to persons with dementia who resist care by using personalized combinations of 15 threat reduction strategies. PMID:22216691

  19. Face processing in adolescents with positive and negative threat bias.

    PubMed

    Sylvester, C M; Petersen, S E; Luby, J L; Barch, D M

    2017-04-01

    Individuals with anxiety disorders exhibit a 'vigilance-avoidance' pattern of attention to threatening stimuli when threatening and neutral stimuli are presented simultaneously, a phenomenon referred to as 'threat bias'. Modifying threat bias through cognitive retraining during adolescence reduces symptoms of anxiety, and so elucidating neural mechanisms of threat bias during adolescence is of high importance. We explored neural mechanisms by testing whether threat bias in adolescents is associated with generalized or threat-specific differences in the neural processing of faces. Subjects were categorized into those with (n = 25) and without (n = 27) threat avoidance based on a dot-probe task at average age 12.9 years. Threat avoidance in this cohort has previously been shown to index threat bias. Brain response to individually presented angry and neutral faces was assessed in a separate session using functional magnetic resonance imaging. Adolescents with threat avoidance exhibited lower activity for both angry and neutral faces relative to controls in several regions in the occipital, parietal, and temporal lobes involved in early visual and facial processing. Results generalized to happy, sad, and fearful faces. Adolescents with a prior history of depression and/or an anxiety disorder had lower activity for all faces in these same regions. A subset of results replicated in an independent dataset. Threat bias is associated with generalized, rather than threat-specific, differences in the neural processing of faces in adolescents. Findings may aid in the development of novel treatments for anxiety disorders that use attention training to modify threat bias.

  20. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis.

    PubMed

    Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity.

  1. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis

    PubMed Central

    Holgado-Tello, Fco. P.; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A.

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991

  2. 78 FR 79077 - Supplemental Identification Information for Four Individuals Designated Pursuant to Executive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-27

    ... Property and Prohibiting Transactions With Persons Who Commit, Threaten To Commit, or Support Terrorism... emergency to address grave acts of terrorism and threats of terrorism committed by foreign terrorists... support acts of terrorism. The President identified in the Annex to the Order, as amended by Executive...

  3. Applying spectral unmixing and support vector machine to airborne hyperspectral imagery for detecting giant reed

    USDA-ARS?s Scientific Manuscript database

    This study evaluated linear spectral unmixing (LSU), mixture tuned matched filtering (MTMF) and support vector machine (SVM) techniques for detecting and mapping giant reed (Arundo donax L.), an invasive weed that presents a severe threat to agroecosystems and riparian areas throughout the southern ...

  4. Anti-Democratic Beliefs: A Survey and Some Explanations

    ERIC Educational Resources Information Center

    Zellman, Gail L.

    1975-01-01

    Presents descriptive and analytic data about tolerance for civil liberties and dissent among the American public, asserting that support for free speech and dissent in concrete situations is more limited than support for abstract principles--a gap explained in terms of dynamics of threat, value conflict, cognitive dissociation, and socialization…

  5. Does stereotype threat affect women in academic medicine?

    PubMed

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  6. Does Stereotype Threat Affect Women in Academic Medicine?

    PubMed Central

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  7. Detection and classification of concealed weapons using a magnetometer-based portal

    NASA Astrophysics Data System (ADS)

    Kotter, Dale K.; Roybal, Lyle G.; Polk, Robert E.

    2002-08-01

    A concealed weapons detection technology was developed through the support of the National Institute of Justice (NIJ) to provide a non intrusive means for rapid detection, location, and archiving of data (including visual) of potential suspects and weapon threats. This technology, developed by the Idaho National Engineering and Environmental Laboratory (INEEL), has been applied in a portal style weapons detection system using passive magnetic sensors as its basis. This paper will report on enhancements to the weapon detection system to enable weapon classification and to discriminate threats from non-threats. Advanced signal processing algorithms were used to analyze the magnetic spectrum generated when a person passes through a portal. These algorithms analyzed multiple variables including variance in the magnetic signature from random weapon placement and/or orientation. They perform pattern recognition and calculate the probability that the collected magnetic signature correlates to a known database of weapon versus non-weapon responses. Neural networks were used to further discriminate weapon type and identify controlled electronic items such as cell phones and pagers. False alarms were further reduced by analyzing the magnetic detector response by using a Joint Time Frequency Analysis digital signal processing technique. The frequency components and power spectrum for a given sensor response were derived. This unique fingerprint provided additional information to aid in signal analysis. This technology has the potential to produce major improvements in weapon detection and classification.

  8. MF/HF Multistatic Mid-Ocean Radar Experiments in Support of SWOTHR (surface-Wave Over-the-Horizon Radar)

    DTIC Science & Technology

    1989-09-16

    SWOTHR was conceived to be an organic asset capable of providing early detection and tracking of fast , surface-skimming threats, such as cruise missiles...distributed real-time processing and threat tracking system. Spe- cific project goals were to verify detection performance pree ctions for small, fast targets...means that enlarging the ground plane would have been a fruitless excercise in any event. B-6 5 i I U Table B-1 summarizes the calculated parameters of

  9. From the Line in the Sand: Accounts of USAF Company Grade Officers in Support of Desert Shield/Desert Storm

    DTIC Science & Technology

    1994-03-01

    and target annotated. The threat rings . . . lots of them . . . the wing commander . . . the chaplain reading from the Bible... this was real...Meanwhile, the OPT was already working the next mission. We updated the threat rings , chose a minimum risk route, coordinated defense suppression and...Prove it, Intel! You can’t prove it because you have no imagery backup for electronic intelligence. Okay then, let’s penetrate that ring to mini

  10. Intention Modulates the Effect of Punishment Threat in Norm Enforcement via the Lateral Orbitofrontal Cortex.

    PubMed

    Zhang, Yuan; Yu, Hongbo; Yin, Yunlu; Zhou, Xiaolin

    2016-08-31

    Although economic theories suggest that punishment threat is crucial for maintaining social norms, counterexamples are noted in which punishment threat hinders norm compliance. Such discrepancy may arise from the intention behind the threat: unintentionally introduced punishment threat facilitates, whereas intentionally introduced punishment threat hinders, norm compliance. Here, we combined a dictator game and fMRI to investigate how intention modulates the effect of punishment threat on norm compliance and the neural substrates of this modulation. We also investigated whether this modulation can be influenced by brain stimulation. Human participants divided an amount of money between themselves and a partner. The partner (intentionally) or a computer program (unintentionally) decided to retain or waive the right to punish the participant upon selfish distribution. Compared with the unintentional condition, participants allocated more when the partner intentionally waived the power of punishment, but less when the partner retained such power. The right lateral orbitofrontal cortex (rLOFC) showed higher activation when the partner waived compared with when the computer waived or when the partner retained the power. The functional connectivity between the rLOFC and the brain network associated with intention/mentalizing processing was predictive of the allocation difference induced by intention. Moreover, inhibition or activation of the rLOFC by brain stimulation decreased or increased, respectively, the participants' reliance on the partner's intention during monetary allocation. These findings demonstrate that the perceived intention of punishment threat plays a crucial role in norm compliance and that the LOFC is casually involved in the implementation of intention-based cooperative decisions. Does punishment threat facilitate or hinder norm enforcement? So far, cognitive neuroscience research offers equivocal evidence. By directly manipulating the intention behind punishment threat, we demonstrate that intention modulates the effectiveness of punishment threat. Moreover, we show that inhibition or activation of the right lateral orbitofrontal cortex (rLOFC) decreased or increased the effect of punishment threat in the intentional context, but not in the unintentional context, suggesting the casual involvement of the rLOFC in intention-based cooperative decisions. Copyright © 2016 the authors 0270-6474/16/369217-10$15.00/0.

  11. Object detection in MOUT: evaluation of a hybrid approach for confirmation and rejection of object detection hypotheses

    NASA Astrophysics Data System (ADS)

    Manger, Daniel; Metzler, Jürgen

    2014-03-01

    Military Operations in Urban Terrain (MOUT) require the capability to perceive and to analyze the situation around a patrol in order to recognize potential threats. A permanent monitoring of the surrounding area is essential in order to appropriately react to the given situation, where one relevant task is the detection of objects that can pose a threat. Especially the robust detection of persons is important, as in MOUT scenarios threats usually arise from persons. This task can be supported by image processing systems. However, depending on the scenario, person detection in MOUT can be challenging, e.g. persons are often occluded in complex outdoor scenes and the person detection also suffers from low image resolution. Furthermore, there are several requirements on person detection systems for MOUT such as the detection of non-moving persons, as they can be a part of an ambush. Existing detectors therefore have to operate on single images with low thresholds for detection in order to not miss any person. This, in turn, leads to a comparatively high number of false positive detections which renders an automatic vision-based threat detection system ineffective. In this paper, a hybrid detection approach is presented. A combination of a discriminative and a generative model is examined. The objective is to increase the accuracy of existing detectors by integrating a separate hypotheses confirmation and rejection step which is built by a discriminative and generative model. This enables the overall detection system to make use of both the discriminative power and the capability to detect partly hidden objects with the models. The approach is evaluated on benchmark data sets generated from real-world image sequences captured during MOUT exercises. The extension shows a significant improvement of the false positive detection rate.

  12. Strengths, weaknesses, opportunities, and threats analysis of integrating the World Health Organization patient safety curriculum into undergraduate medical education in Pakistan: a qualitative case study.

    PubMed

    Misbah, Samreen; Mahboob, Usman

    2017-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of integrating the World Health Organization (WHO) patient safety curriculum into undergraduate medical education in Pakistan. A qualitative interpretive case study was conducted at Riphah International University, Islamabad, from October 2016 to June 2017. The study included 9 faculty members and 1 expert on patient safety. The interviews were audiotaped, and a thematic analysis of the transcripts was performed using NVivo software. Four themes were derived based on the need analysis model. The sub-themes derived from the collected data were arranged under the themes of strengths, weaknesses, opportunities, and threats, in accordance with the principles of SWOT analysis. The strengths identified were the need for a formal patient safety curriculum and its early integration into the undergraduate program. The weaknesses were faculty awareness and participation in development programs. The opportunities were an ongoing effort to develop an appropriate curriculum, to improve the current culture of healthcare, and to use the WHO curricular resource guide. The threats were attitudes towards patient safety in Pakistani culture, resistance to implementation from different levels, and the role of regulatory authorities. The theme of patient safety needs to be incorporated early into the formal medical education curriculum, with the main goals of striving to do no harm and seeing mistakes as opportunities to learn. Faculty development activities need to be organized, and faculty members should to be encouraged to participate in them. The lack of a patient safety culture was identified as the primary reason for resistance to this initiative at many levels. The WHO curriculum, amended according to local institutional culture, can be implemented appropriately with support from the corresponding regulatory bodies.

  13. THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E

    Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.

  14. Overview of Threats and Failure Models for Safety-Relevant Computer-Based Systems

    NASA Technical Reports Server (NTRS)

    Torres-Pomales, Wilfredo

    2015-01-01

    This document presents a high-level overview of the threats to safety-relevant computer-based systems, including (1) a description of the introduction and activation of physical and logical faults; (2) the propagation of their effects; and (3) function-level and component-level error and failure mode models. These models can be used in the definition of fault hypotheses (i.e., assumptions) for threat-risk mitigation strategies. This document is a contribution to a guide currently under development that is intended to provide a general technical foundation for designers and evaluators of safety-relevant systems.

  15. Methodology of automated ionosphere front velocity estimation for ground-based augmentation of GNSS

    NASA Astrophysics Data System (ADS)

    Bang, Eugene; Lee, Jiyun

    2013-11-01

    ionospheric anomalies occurring during severe ionospheric storms can pose integrity threats to Global Navigation Satellite System (GNSS) Ground-Based Augmentation Systems (GBAS). Ionospheric anomaly threat models for each region of operation need to be developed to analyze the potential impact of these anomalies on GBAS users and develop mitigation strategies. Along with the magnitude of ionospheric gradients, the speed of the ionosphere "fronts" in which these gradients are embedded is an important parameter for simulation-based GBAS integrity analysis. This paper presents a methodology for automated ionosphere front velocity estimation which will be used to analyze a vast amount of ionospheric data, build ionospheric anomaly threat models for different regions, and monitor ionospheric anomalies continuously going forward. This procedure automatically selects stations that show a similar trend of ionospheric delays, computes the orientation of detected fronts using a three-station-based trigonometric method, and estimates speeds for the front using a two-station-based method. It also includes fine-tuning methods to improve the estimation to be robust against faulty measurements and modeling errors. It demonstrates the performance of the algorithm by comparing the results of automated speed estimation to those manually computed previously. All speed estimates from the automated algorithm fall within error bars of ± 30% of the manually computed speeds. In addition, this algorithm is used to populate the current threat space with newly generated threat points. A larger number of velocity estimates helps us to better understand the behavior of ionospheric gradients under geomagnetic storm conditions.

  16. The dark side of the sublime: Distinguishing a threat-based variant of awe.

    PubMed

    Gordon, Amie M; Stellar, Jennifer E; Anderson, Craig L; McNeil, Galen D; Loew, Daniel; Keltner, Dacher

    2017-08-01

    Theoretical conceptualizations of awe suggest this emotion can be more positive or negative depending on specific appraisal processes. However, the emergent scientific study of awe rarely emphasizes its negative side, classifying it instead as a positive emotion. In the present research we tested whether there is a more negative variant of awe that arises in response to vast, complex stimuli that are threatening (e.g., tornadoes, terrorist attack, wrathful god). We discovered people do experience this type of awe with regularity (Studies 1 & 4) and that it differs from other variants of awe in terms of its underlying appraisals, subjective experience, physiological correlates, and consequences for well-being. Specifically, threat-based awe experiences were appraised as lower in self-control and certainty and higher in situational control than other awe experiences, and were characterized by greater feelings of fear (Studies 2a & 2b). Threat-based awe was associated with physiological indicators of increased sympathetic autonomic arousal, whereas positive awe was associated with indicators of increased parasympathetic arousal (Study 3). Positive awe experiences in daily life (Study 4) and in the lab (Study 5) led to greater momentary well-being (compared with no awe experience), whereas threat-based awe experiences did not. This effect was partially mediated by increased feelings of powerlessness during threat-based awe experiences. Together, these findings highlight a darker side of awe. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  17. The Ego-Defensive Role of Legitimacy: How Threat-Based Justifications Protect the Self-Esteem of Discriminators.

    PubMed

    Pereira, Cicero Roberto; Álvaro, José Luis; Vala, Jorge

    2018-05-01

    This article analyzes the ego-defensive role played by legitimation, by examining the hypothesis that threat-based justifications attenuate the negative effect on an individual's self-esteem caused by his or her becoming aware of his or her own discriminatory behavior. Across three studies (including a pilot experiment), participants who were led to believe that they had acted in a discriminatory way experienced a decrease in their self-esteem. In Study 1 ( N = 116), this effect was nullified when discrimination was justified by either symbolic or realistic threat perceptions. Study 2 ( N = 250) replicated this pattern of results and went further by showing that discrimination affects self-esteem only in more egalitarian individuals, whereas for those less egalitarian, it affects their social image. According to the ego-defensive role of legitimation, a meta-analytical integration of the results confirmed that the influence of discrimination in depressing self-esteem is moderated by threat-based justifications.

  18. Enteric disease surveillance under the AFHSC-GEIS: Current efforts, landscape analysis and vision forward

    PubMed Central

    2011-01-01

    The mission of the Armed Forces Health Surveillance Center, Division of Global Emerging Infections Surveillance and Response System (AFHSC-GEIS) is to support global public health and to counter infectious disease threats to the United States Armed Forces, including newly identified agents or those increasing in incidence. Enteric diseases are a growing threat to U.S. forces, which must be ready to deploy to austere environments where the risk of exposure to enteropathogens may be significant and where routine prevention efforts may be impractical. In this report, the authors review the recent activities of AFHSC-GEIS partner laboratories in regards to enteric disease surveillance, prevention and response. Each partner identified recent accomplishments, including support for regional networks. AFHSC/GEIS partners also completed a Strengths, Weaknesses, Opportunities and Threats (SWOT) survey as part of a landscape analysis of global enteric surveillance efforts. The current strengths of this network include excellent laboratory infrastructure, equipment and personnel that provide the opportunity for high-quality epidemiological studies and test platforms for point-of-care diagnostics. Weaknesses include inconsistent guidance and a splintered reporting system that hampers the comparison of data across regions or longitudinally. The newly chartered Enterics Surveillance Steering Committee (ESSC) is intended to provide clear mission guidance, a structured project review process, and central data management and analysis in support of rationally directed enteric disease surveillance efforts. PMID:21388567

  19. Threatened or Threatening? How Ideology Shapes Asylum Seekers’ Immigration Policy Attitudes in Israel and Australia

    PubMed Central

    Canetti, Daphna; Snider, Keren L. G.; Pedersen, Anne

    2016-01-01

    Can different political ideologies explain policy preferences regarding asylum seekers? We focus on attitudes regarding governmental policy towards out-group members and suggest that perceptions of threat help to shape these policy attitudes. Study 1 compared public opinion regarding asylum policy in Israel (N = 137) and Australia (N = 138), two countries with restrictive asylum policies and who host a large number of asylum seekers; Study 2, a longitudinal study, was conducted during two different time periods in Israel—before and during the Gaza conflict. Results of both studies showed that threat perceptions of out-group members drive the relationship between conservative political ideologies and support for exclusionary asylum policies among citizens. Perceptions of threat held by members of the host country (the in-group) towards asylum seekers (the out-group) may influence policy formation. The effect of these out-groups threats needs to be critically weighed when considering Israeli and Australian policies towards asylum seekers. PMID:28190933

  20. A dual-motive model of scapegoating: displacing blame to reduce guilt or increase control.

    PubMed

    Rothschild, Zachary K; Landau, Mark J; Sullivan, Daniel; Keefer, Lucas A

    2012-06-01

    The authors present a model that specifies 2 psychological motives underlying scapegoating, defined as attributing inordinate blame for a negative outcome to a target individual or group, (a) maintaining perceived personal moral value by minimizing feelings of guilt over one's responsibility for a negative outcome and (b) maintaining perceived personal control by obtaining a clear explanation for a negative outcome that otherwise seems inexplicable. Three studies supported hypotheses derived from this dual-motive model. Framing a negative outcome (environmental destruction or climate change) as caused by one's own harmful actions (value threat) or unknown sources (control threat) both increased scapegoating, and these effects occurred indirectly through feelings of guilt and perceived personal control, respectively (Study 1), and were differentially moderated by affirmations of moral value and personal control (Study 2). Also, scapegoating in response to value threat versus control threat produced divergent, theoretically specified effects on self-perceptions and behavioral intentions (Study 3). 2012 APA, all rights reserved

  1. When a threat to the brand is a threat to the self: the importance of brand identification and implicit self-esteem in predicting defensiveness.

    PubMed

    Lisjak, Monika; Lee, Angela Y; Gardner, Wendi L

    2012-09-01

    This research examines how people respond when a commercial brand they identify with is threatened. Across four studies, the authors found that among participants who identified with a brand, a threat to the brand elicited the same responses as a threat to the self. Specifically, participants with low implicit self-esteem defended the brand when the self was activated, unlike their high implicit self-esteem counterparts. In addition, brand defense was reduced when individuals had the opportunity to affirm a valued aspect of their self-concept. These findings suggest that when a brand that people identify with is threatened, they may defend the brand to preserve the integrity of the self. More broadly, these findings are consistent with the notion that brands may be included into the extended self-concept, which supports William James's original ideas concerning the breadth and heterogeneity of the self.

  2. Regulatory Underpinnings of Global Health Security: FDA's Roles in Preventing, Detecting, and Responding to Global Health Threats

    PubMed Central

    Bond, Katherine C.; Maher, Carmen

    2014-01-01

    In February 2014, health officials from around the world announced the Global Health Security Agenda, a critical effort to strengthen national and global systems to prevent, detect, and respond to infectious disease threats and to foster stronger collaboration across borders. With its increasing global roles and broad range of regulatory responsibilities in ensuring the availability, safety, and security of medical and food products, the US Food and Drug Administration (FDA) is engaged in a range of efforts in support of global health security. This article provides an overview of FDA's global health security roles, focusing on its responsibilities related to the development and use of medical countermeasures (MCMs) for preventing, detecting, and responding to global infectious disease and other public health emergency threats. The article also discusses several areas—antimicrobial resistance, food safety, and supply chain integrity—in which FDA's global health security roles continue to evolve and extend beyond MCMs and, in some cases, beyond traditional infectious disease threats. PMID:25254912

  3. Regulatory underpinnings of Global Health security: FDA's roles in preventing, detecting, and responding to global health threats.

    PubMed

    Courtney, Brooke; Bond, Katherine C; Maher, Carmen

    2014-01-01

    In February 2014, health officials from around the world announced the Global Health Security Agenda, a critical effort to strengthen national and global systems to prevent, detect, and respond to infectious disease threats and to foster stronger collaboration across borders. With its increasing global roles and broad range of regulatory responsibilities in ensuring the availability, safety, and security of medical and food products, the US Food and Drug Administration (FDA) is engaged in a range of efforts in support of global health security. This article provides an overview of FDA's global health security roles, focusing on its responsibilities related to the development and use of medical countermeasures (MCMs) for preventing, detecting, and responding to global infectious disease and other public health emergency threats. The article also discusses several areas-antimicrobial resistance, food safety, and supply chain integrity-in which FDA's global health security roles continue to evolve and extend beyond MCMs and, in some cases, beyond traditional infectious disease threats.

  4. Threatened or Threatening? How Ideology Shapes Asylum Seekers' Immigration Policy Attitudes in Israel and Australia.

    PubMed

    Canetti, Daphna; Snider, Keren L G; Pedersen, Anne; Hall, Brian J

    2016-12-01

    Can different political ideologies explain policy preferences regarding asylum seekers? We focus on attitudes regarding governmental policy towards out-group members and suggest that perceptions of threat help to shape these policy attitudes. Study 1 compared public opinion regarding asylum policy in Israel ( N = 137) and Australia ( N = 138), two countries with restrictive asylum policies and who host a large number of asylum seekers; Study 2, a longitudinal study, was conducted during two different time periods in Israel-before and during the Gaza conflict. Results of both studies showed that threat perceptions of out-group members drive the relationship between conservative political ideologies and support for exclusionary asylum policies among citizens. Perceptions of threat held by members of the host country (the in-group) towards asylum seekers (the out-group) may influence policy formation. The effect of these out-groups threats needs to be critically weighed when considering Israeli and Australian policies towards asylum seekers.

  5. Attachment, self-esteem, worldviews, and terror management: evidence for a tripartite security system.

    PubMed

    Hart, Joshua; Shaver, Phillip R; Goldenberg, Jamie L

    2005-06-01

    On the basis of prior work integrating attachment theory and terror management theory, the authors propose a model of a tripartite security system consisting of dynamically interrelated attachment, self-esteem, and worldview processes. Four studies are presented that, combined with existing evidence, support the prediction derived from the model that threats to one component of the security system result in compensatory defensive activation of other components. Further, the authors predicted and found that individual differences in attachment style moderate the defenses. In Studies 1 and 2, attachment threats motivated worldview defense among anxiously attached participants and motivated self-enhancement (especially among avoidant participants), effects similar to those caused by mortality salience. In Studies 3 and 4, a worldview threat and a self-esteem threat caused attachment-related proximity seeking among fearful participants and avoidance of proximity among dismissing participants. The authors' model provides an overarching framework within which to study attachment, self-esteem, and worldviews.

  6. Laser Remediation of Threats Posed by Small Orbital Debris

    NASA Technical Reports Server (NTRS)

    Fork, Richard L.; Rogers, Jan R.; Hovater, Mary A.

    2012-01-01

    The continually increasing amount of orbital debris in near Earth space poses an increasing challenge to space situational awareness. Recent collisions of spacecraft caused abrupt increases in the density of both large and small debris in near Earth space. An especially challenging class of threats is that due to the increasing density of small (1 mm to 10 cm dimension) orbital debris. This small debris poses a serious threat since: (1) The high velocity enables even millimeter dimension debris to cause serious damage to vulnerable areas of space assets, e.g., detector windows; (2) The small size and large number of debris elements prevent adequate detection and cataloguing. We have identified solutions to this threat in the form of novel laser systems and novel ways of using these laser systems. While implementation of the solutions we identify is challenging we find approaches offering threat mitigation within time frames and at costs of practical interest. We base our analysis on the unique combination of coherent light specifically structured in both space and time and applied in novel ways entirely within the vacuum of space to deorbiting small debris. We compare and contrast laser based small debris removal strategies using ground based laser systems with strategies using space based laser systems. We find laser systems located and used entirely within space offer essential and decisive advantages over groundbased laser systems.

  7. A map of human impacts to a ``pristine'' coral reef ecosystem, the Papahānaumokuākea Marine National Monument

    NASA Astrophysics Data System (ADS)

    Selkoe, K. A.; Halpern, B. S.; Ebert, C. M.; Franklin, E. C.; Selig, E. R.; Casey, K. S.; Bruno, J.; Toonen, R. J.

    2009-09-01

    Effective and comprehensive regional-scale marine conservation requires fine-grained data on the spatial patterns of threats and their overlap. To address this need for the Papahānaumokuākea Marine National Monument (Monument) in Hawaii, USA, spatial data on 14 recent anthropogenic threats specific to this region were gathered or created, including alien species, bottom fishing, lobster trap fishing, ship-based pollution, ship strike risks, marine debris, research diving, research equipment installation, research wildlife sacrifice, and several anthropogenic climate change threats i.e., increase in ultraviolet (UV) radiation, seawater acidification, the number of warm ocean temperature anomalies relevant to disease outbreaks and coral bleaching, and sea level rise. These data were combined with habitat maps and expert judgment on the vulnerability of different habitat types in the Monument to estimate spatial patterns of current cumulative impact at 1 ha (0.01 km2) resolution. Cumulative impact was greatest for shallow reef areas and peaked at Maro Reef, where 13 of the 14 threats overlapped in places. Ocean temperature variation associated with disease outbreaks was found to have the highest predicted impact overall, followed closely by other climate-related threats, none of which have easily tractable management solutions at the regional scale. High impact threats most tractable to regional management relate to ship traffic. Sensitivity analyses show that the results are robust to both data availability and quality. Managers can use these maps to (1) inform management and surveillance priorities based on the ranking of threats and their distributions, (2) guide permitting decisions based on cumulative impacts, and (3) choose areas to monitor for climate change effects. Furthermore, this regional analysis can serve as a case study for managers elsewhere interested in assessing and mapping region-specific cumulative human impacts.

  8. If training data appears to be mislabeled, should we relabel it? Improving supervised learning algorithms for threat detection in ground penetrating radar data

    NASA Astrophysics Data System (ADS)

    Reichman, Daniël.; Collins, Leslie M.; Malof, Jordan M.

    2018-04-01

    This work focuses on the development of automatic buried threat detection (BTD) algorithms using ground penetrating radar (GPR) data. Buried threats tend to exhibit unique characteristics in GPR imagery, such as high energy hyperbolic shapes, which can be leveraged for detection. Many recent BTD algorithms are supervised, and therefore they require training with exemplars of GPR data collected over non-threat locations and threat locations, respectively. Frequently, data from non-threat GPR examples will exhibit high energy hyperbolic patterns, similar to those observed from a buried threat. Is it still useful therefore, to include such examples during algorithm training, and encourage an algorithm to label such data as a non-threat? Similarly, some true buried threat examples exhibit very little distinctive threat-like patterns. We investigate whether it is beneficial to treat such GPR data examples as mislabeled, and either (i) relabel them, or (ii) remove them from training. We study this problem using two algorithms to automatically identify mislabeled examples, if they are present, and examine the impact of removing or relabeling them for training. We conduct these experiments on a large collection of GPR data with several state-of-the-art GPR-based BTD algorithms.

  9. Neuroscientific evidence for defensive avoidance of fear appeals.

    PubMed

    Kessels, Loes T E; Ruiter, Robert A C; Wouters, Liesbeth; Jansma, Bernadette M

    2014-04-01

    Previous studies indicate that people respond defensively to threatening health information, especially when the information challenges self-relevant goals. The authors investigated whether reduced acceptance of self-relevant health risk information is already visible in early attention allocation processes. In two experimental studies, participants were watching high- and low-threat health commercials, and at the same time had to pay attention to specific odd auditory stimuli in a sequence of frequent auditory stimuli (odd ball paradigm). The amount of attention allocation was measured by recording event-related brain potentials (i.e., P300 ERPs) and reaction times. Smokers showed larger P300 amplitudes in response to the auditory targets while watching high-threat instead of low-threat anti-smoking commercials. In contrast, non-smokers showed smaller P300 amplitudes during watching high as opposed to low threat anti-smoking commercials. In conclusion, the findings provide further neuroscientific support for the hypothesis that threatening health information causes more avoidance responses among those for whom the health threat is self-relevant. © 2014 The Authors. International Journal of Psychology published by John Wiley © Sons Ltd on behalf of International Union of Psychological Science.

  10. Neural circuitry governing anxious individuals' mis-allocation of working memory to threat.

    PubMed

    Stout, Daniel M; Shackman, Alexander J; Pedersen, Walker S; Miskovich, Tara A; Larson, Christine L

    2017-08-18

    Dispositional anxiety is a trait-like phenotype that confers increased risk for a range of debilitating neuropsychiatric disorders. Like many patients with anxiety disorders, individuals with elevated levels of dispositional anxiety are prone to intrusive and distressing thoughts in the absence of immediate threat. Recent electrophysiological research suggests that these symptoms are rooted in the mis-allocation of working memory (WM) resources to threat-related information. Here, functional MRI was used to identify the network of brain regions that support WM for faces and to quantify the allocation of neural resources to threat-related distracters in 81 young adults. Results revealed widespread evidence of mis-allocation. This was evident in both face-selective regions of the fusiform cortex and domain-general regions of the prefrontal and parietal cortices. This bias was exaggerated among individuals with a more anxious disposition. Mediation analyses provided compelling evidence that anxious individuals' tendency to mis-allocate WM resources to threat-related distracters is statistically explained by heightened amygdala reactivity. Collectively, these results provide a neurocognitive framework for understanding the pathways linking anxious phenotypes to the development of internalizing psychopathology and set the stage for developing improved intervention strategies.

  11. Sex differences in neural efficiency: Are they due to the stereotype threat effect?☆

    PubMed Central

    Dunst, Beate; Benedek, Mathias; Bergner, Sabine; Athenstaedt, Ursula; Neubauer, Aljoscha C.

    2013-01-01

    The neural efficiency hypothesis postulates a more efficient use of brain resources in more intelligent people as compared to less intelligent ones. However, this relationship was found to be moderated by sex and task content. While the phenomenon of neural efficiency was previously supported for men when performing visuo-spatial tasks it occurred for women only when performing verbal tasks. One possible explanation for this finding could be provided by the well-studied phenomenon called stereotype threat. Stereotype threat arises when a negative stereotype of one’s own group is made salient and can result in behavior that confirms the stereotype. Overall, 32 boys and 31 girls of varying intellectual ability were tested with a mental rotation task, either under a stereotype exposure or a no-stereotype exposure condition while measuring their EEG. The behavioral results show that an activated negative stereotype not necessarily hampers the performance of girls. Physiologically, a confirmation of the neural efficiency phenomenon was only obtained for boys working under a no-stereotype exposure condition. This result pattern replicates previous findings without threat and thus suggests that sex differences in neural efficiency during visuo-spatial tasks may not be due to the stereotype threat effect. PMID:24092950

  12. When does risk perception predict protection motivation for health threats? A person-by-situation analysis.

    PubMed

    Ferrer, Rebecca A; Klein, William M P; Avishai, Aya; Jones, Katelyn; Villegas, Megan; Sheeran, Paschal

    2018-01-01

    Although risk perception is a key concept in many health behavior theories, little research has explicitly tested when risk perception predicts motivation to take protective action against a health threat (protection motivation). The present study tackled this question by (a) adopting a multidimensional model of risk perception that comprises deliberative, affective, and experiential components (the TRIRISK model), and (b) taking a person-by-situation approach. We leveraged a highly intensive within-subjects paradigm to test features of the health threat (i.e., perceived severity) and individual differences (e.g., emotion reappraisal) as moderators of the relationship between the three types of risk perception and protection motivation in a within-subjects design. Multi-level modeling of 2968 observations (32 health threats across 94 participants) showed interactions among the TRIRISK components and moderation both by person-level and situational factors. For instance, affective risk perception better predicted protection motivation when deliberative risk perception was high, when the threat was less severe, and among participants who engage less in emotional reappraisal. These findings support the TRIRISK model and offer new insights into when risk perceptions predict protection motivation.

  13. Predicting wellbeing among people with epilepsy using illness cognitions.

    PubMed

    Salter, Kirstie A; Prior, Kirsty N; Bond, Malcolm J

    2017-06-01

    This study sought to examine the synergistic contribution of illness-related perceptions (stigma, severity, and threat) and illness behavior to wellbeing among people with epilepsy. Poorer wellbeing was expected among those who perceived greater stigma, illness severity, and threat and had more extreme illness behavior. Individuals with a diagnosis of epilepsy (N=210), recruited through local and online support groups, completed a questionnaire comprising demographic and epilepsy-specific information, and validated measures of illness perceptions and behavior, epilepsy-related quality of life, and general psychological health. Bivariate associations among illness cognition, illness behavior, and wellbeing were all as expected. Structural equation modeling highlighted the strong, direct effect of illness threat on quality of life, with other contributions from perceived stigma and an abnormal illness behavior syndrome (i.e., maladaptive illness responses). Significant variance was accounted for in both quality of life (64%) and psychological health (34%). Preliminary evidence of the contributions of illness threat and maladaptive illness responses to wellbeing highlights the need for longitudinal research to examine the dynamic nature of such findings. Clinicians are encouraged to consider the potential value of screening for both illness threat and abnormal illness behavior to facilitate interventions. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. When does risk perception predict protection motivation for health threats? A person-by-situation analysis

    PubMed Central

    Klein, William M. P.; Avishai, Aya; Jones, Katelyn; Villegas, Megan; Sheeran, Paschal

    2018-01-01

    Although risk perception is a key concept in many health behavior theories, little research has explicitly tested when risk perception predicts motivation to take protective action against a health threat (protection motivation). The present study tackled this question by (a) adopting a multidimensional model of risk perception that comprises deliberative, affective, and experiential components (the TRIRISK model), and (b) taking a person-by-situation approach. We leveraged a highly intensive within-subjects paradigm to test features of the health threat (i.e., perceived severity) and individual differences (e.g., emotion reappraisal) as moderators of the relationship between the three types of risk perception and protection motivation in a within-subjects design. Multi-level modeling of 2968 observations (32 health threats across 94 participants) showed interactions among the TRIRISK components and moderation both by person-level and situational factors. For instance, affective risk perception better predicted protection motivation when deliberative risk perception was high, when the threat was less severe, and among participants who engage less in emotional reappraisal. These findings support the TRIRISK model and offer new insights into when risk perceptions predict protection motivation. PMID:29494705

  15. [Professional burnout among university and high school teachers--comparative study].

    PubMed

    Swietochowski, Waldemar

    2011-01-01

    Professional burnout is a set of negative emotional and behavioral symptoms, observed in workers of widely understood human service occupations, including teachers. In spite of the considerable number of studies of burnout in teachers, a few of them concern university teachers. The aim of the article was to estimate the degree of burning threat in this professional group and to analyze individual determinants and dynamics of burning out in academic teachers. Gender, age, personality traits and temperament traits were given the status of main factors in the study. The role of the perceived social support was also analyzed. 97 academic workers of three state universities (University, Medical University and Technical University) in Łódź took part in the study; 100 teachers of high schools formed a comparative group. MBI General Survey was applied to measure dependent variables (burnout and its three components: Emotional Exhaustion, Cinicism and Professional Efficacy). The level of factors was measured with standard psychological tests: NEO-FFI and FCZ-KT. The Scale of Perceived Social Support was also applied. The results show considerably lower threat of the burning out syndrome in university than in high school teachers. Among individual factors only two temperament traits (emotional reactivity and perseveration) and one personality trait (extroversion) seem to be important determinants of professional burnout. The perceived social support does not prevent the progress of burnout syndrome. Based on the obtained results several practical conclusions were formulated. They refer mainly to preventive training for beginners in teaching and changes in the organization of academic teachers' work.

  16. The Effect of the Threat of Legal Sanction on Program Retention and Completion: Is that Why They Stay in Drug Court?

    ERIC Educational Resources Information Center

    Hepburn, John R.; Harvey, Angela N.

    2007-01-01

    Drug courts routinely rely on the threat of legal sanction to motivate drug-using criminal offenders to enter and complete community-based treatment programs. In light of the high failure rates among drug court participants, what is the effect of the threat of legal sanction on program retention and completion? A quasiexperimental research design…

  17. Reducing Stereotype Threat in Classrooms: A Review of Social-Psychological Intervention Studies on Improving the Achievement of Black Students. Issues & Answers. REL 2009-076

    ERIC Educational Resources Information Center

    Aronson, Joshua; Cohen, Geoffrey; McColskey, Wendy

    2009-01-01

    Stereotype threat arises from a fear among members of a group of reinforcing negative stereotypes about the intellectual ability of the group. This report identifies three randomized controlled trial studies that use classroom-based strategies to reduce stereotype threat and improve the academic performance of Black students, narrowing their…

  18. Reducing Stereotype Threat in Classrooms: A Review of Social-Psychological Intervention Studies on Improving the Achievement of Black Students. Summary. Issues & Answers. REL 2009-076

    ERIC Educational Resources Information Center

    Aronson, Joshua; Cohen, Geoffrey; McColskey, Wendy

    2009-01-01

    Stereotype threat arises from a fear among members of a group of reinforcing negative stereotypes about the intellectual ability of the group. This report identifies three randomized controlled trial studies that use classroom-based strategies to reduce stereotype threat and improve the academic performance of Black students, narrowing their…

  19. Determining the Requisite Components of Visual Threat Detection to Improve Operational Performance

    DTIC Science & Technology

    2014-04-01

    cognitive processes, and may be enhanced by focusing training development on the principle components such as causal reasoning. The second report will...discuss the development and evaluation of a research-based training exemplar. Visual threat detection pervades many military contexts, but is also... developing computer-controlled exercises to study the primary components of visual threat detection. Similarly, civilian law enforcement officers were

  20. Are ranger patrols effective in reducing poaching-related threats within protected areas?

    USGS Publications Warehouse

    Moore, Jennnifer F.; Mulindahabi, Felix; Masozera, Michel K.; Nichols, James; Hines, James; Turikunkiko, Ezechiel; Oli, Madan K.

    2018-01-01

    Poaching is one of the greatest threats to wildlife conservation world-wide. However, the spatial and temporal patterns of poaching activities within protected areas, and the effectiveness of ranger patrols and ranger posts in mitigating these threats, are relatively unknown.We used 10 years (2006–2015) of ranger-based monitoring data and dynamic multi-season occupancy models to quantify poaching-related threats, to examine factors influencing the spatio-temporal dynamics of these threats and to test the efficiency of management actions to combat poaching in Nyungwe National Park (NNP), Rwanda.The probability of occurrence of poaching-related threats was highest at lower elevations (1,801–2,200 m), especially in areas that were close to roads and tourist trails; conversely, occurrence probability was lowest at high elevation sites (2,601–3,000 m), and near the park boundary and ranger posts. The number of ranger patrols substantially increased the probability that poaching-related threats disappear at a site if threats were originally present (i.e. probability of extinction of threats). Without ranger visits, the annual probability of extinction of poaching-related threats was an estimated 7%; this probability would increase to 20% and 57% with 20 and 50 ranger visits per year, respectively.Our results suggest that poaching-related threats can be effectively reduced in NNP by adding ranger posts in areas where they do not currently exist, and by increasing the number of patrols to sites where the probability of poaching activities is high.Synthesis and applications. Our application of dynamic occupancy models to predict the probability of presence of poaching-related threats is novel, and explicitly considers imperfect detection of illegal activities. Based on the modelled relationships, we identify areas that are most vulnerable to poaching, and offer insights regarding how ranger patrols can be optimally deployed to reduce poaching-related threats and other illegal activites, while taking into account potential sampling biases. We show that poaching can be effectively reduced by increasing ranger patrols to areas under high risk of poaching activities, and by adding ranger patrols near these sites. These findings are broadly applicable to national parks and protected areas experiencing a high degree of poaching and other illegal activities.

  1. The effects of perceived phenotypic racial stereotypicality and social identity threat on racial minorities' attitudes about police.

    PubMed

    Kahn, Kimberly Barsamian; Lee, J Katherine; Renauer, Brian; Henning, Kris R; Stewart, Greg

    2017-01-01

    This study examines the role of perceived phenotypic racial stereotypicality and race-based social identity threat on racial minorities' trust and cooperation with police. We hypothesize that in police interactions, racial minorities' phenotypic racial stereotypicality may increase race-based social identity threat, which will lead to distrust and decreased participation with police. Racial minorities (Blacks, Latinos, Native Americans, and multi-racials) and Whites from a representative random sample of city residents were surveyed about policing attitudes. A serial multiple mediation model confirmed that racial minorities' self-rated phenotypic racial stereotypicality indirectly affected future cooperation through social identity threat and trust. Due to the lack of negative group stereotypes in policing, the model did not hold for Whites. This study provides evidence that phenotypic stereotypicality influences racial minorities' psychological experiences interacting with police.

  2. Violent Extremism, Community-Based Violence Prevention, and Mental Health Professionals.

    PubMed

    Weine, Stevan M; Stone, Andrew; Saeed, Aliya; Shanfield, Stephen; Beahrs, John; Gutman, Alisa; Mihajlovic, Aida

    2017-01-01

    New community-based initiatives being developed to address violent extremism in the United States are utilizing mental health services and leadership. This article reviews current approaches to preventing violent extremism, the contribution that mental illness and psychosocial problems can make to violent extremism, and the rationale for integrating mental health strategies into preventing violent extremism. The authors describe a community-based targeted violence prevention model and the potential roles of mental health professionals. This model consists of a multidisciplinary team that assesses at-risk individuals with comprehensive threat and behavioral evaluations, arranges for ongoing support and treatment, conducts follow-up evaluations, and offers outreach, education, and resources for communities. This model would enable mental health professionals in local communities to play key roles in preventing violent extremism through their practice and leadership.

  3. Perceived Social Support and Markers of Heart Failure Severity

    DTIC Science & Technology

    2011-09-09

    necessary for altering threat evaluation and enhancing self - esteem . Informational support, also referred to as appraisal support, describes the availability...1994). Social connections have been shown to enhance mood, reinforce self - esteem , and introduce adaptive coping resources for stress (Spiegel, Bloom...6MWT), self -reported symptoms as indicated by the Kansas City Cardiomyopathy Questionnaire (KCCQ), and levels of the biomarker BNP). Methods. Ninety

  4. Attracted to power: challenge/threat and promotion/prevention focus differentially predict the attractiveness of group power

    PubMed Central

    Scholl, Annika; Sassenrath, Claudia; Sassenberg, Kai

    2015-01-01

    Depending on their motivation, individuals prefer different group contexts for social interactions. The present research sought to provide more insight into this relationship. More specifically, we tested how challenge/threat and a promotion/prevention focus predict attraction to groups with high- or low-power. As such, we examined differential outcomes of threat and prevention focus as well as challenge and promotion focus that have often been regarded as closely related. According to regulatory focus, individuals should prefer groups that they expect to “feel right” for them to join: Low-power groups should be more attractive in a prevention (than a promotion) focus, as these groups suggest security-oriented strategies, which fit a prevention focus. High-power groups should be more attractive in a promotion (rather than a prevention) focus, as these groups are associated with promotion strategies fitting a promotion focus (Sassenberg et al., 2007). In contrast, under threat (vs. challenge), groups that allow individuals to restore their (perceived) lack of control should be preferred: Low-power groups should be less attractive under threat (than challenge) because they provide low resources which threatened individuals already perceive as insufficient and high-power groups might be more attractive under threat (than under challenge), because their high resources allow individuals to restore control. Two experiments (N = 140) supported these predictions. The attractiveness of a group often depends on the motivation to engage in what fits (i.e., prefer a group that feels right in the light of one’s regulatory focus). However, under threat the striving to restore control (i.e., prefer a group allowing them to change the status quo under threat vs. challenge) overrides the fit effect, which may in turn guide individuals’ behavior in social interactions. PMID:25904887

  5. Empirical links between natural mortality and recovery in marine fishes.

    PubMed

    Hutchings, Jeffrey A; Kuparinen, Anna

    2017-06-14

    Probability of species recovery is thought to be correlated with specific aspects of organismal life history, such as age at maturity and longevity, and how these affect rates of natural mortality ( M ) and maximum per capita population growth ( r max ). Despite strong theoretical underpinnings, these correlates have been based on predicted rather than realized population trajectories following threat mitigation. Here, we examine the level of empirical support for postulated links between a suite of life-history traits (related to maturity, age, size and growth) and recovery in marine fishes. Following threat mitigation (medium time since cessation of overfishing = 20 years), 71% of 55 temperate populations had fully recovered, the remainder exhibiting, on average, negligible change (impaired recovery). Singly, life-history traits did not influence recovery status. In combination, however, those that jointly reflect length-based mortality at maturity, M α , revealed that recovered populations have higher M α , which we hypothesize to reflect local adaptations associated with greater r max But, within populations, the smaller sizes at maturity generated by overfishing are predicted to increase M α , slowing recovery and increasing its uncertainty. We conclude that recovery potential is greater for populations adapted to high M but that temporal increases in M concomitant with smaller size at maturity will have the opposite effect. The recovery metric documented here ( M α ) has a sound theoretical basis, is significantly correlated with direct estimates of M that directly reflect r max , is not reliant on data-intensive time series, can be readily estimated, and offers an empirically defensible correlate of recovery, given its clear links to the positive and impaired responses to threat mitigation that have been observed in fish populations over the past three decades. © 2017 The Author(s).

  6. Migrants and emerging public health issues in a globalized world: threats, risks and challenges, an evidence-based framework

    PubMed Central

    Gushulak, BD; Weekers, J; MacPherson, DW

    2010-01-01

    International population mobility is an underlying factor in the emergence of public health threats and risks that must be managed globally. These risks are often related, but not limited, to transmissible pathogens. Mobile populations can link zones of disease emergence to lowprevalence or nonendemic areas through rapid or high-volume international movements, or both. Against this background of human movement, other global processes such as economics, trade, transportation, environment and climate change, as well as civil security influence the health impacts of disease emergence. Concurrently, global information systems, together with regulatory frameworks for disease surveillance and reporting, affect organizational and public awareness of events of potential public health significance. International regulations directed at disease mitigation and control have not kept pace with the growing challenges associated with the volume, speed, diversity, and disparity of modern patterns of human movement. The thesis that human population mobility is itself a major determinant of global public health is supported in this article by review of the published literature from the perspective of determinants of health (such as genetics/biology, behavior, environment, and socioeconomics), population-based disease prevalence differences, existing national and international health policies and regulations, as well as inter-regional shifts in population demographics and health outcomes. This paper highlights some of the emerging threats and risks to public health, identifies gaps in existing frameworks to manage health issues associated with migration, and suggests changes in approach to population mobility, globalization, and public health. The proposed integrated approach includes a broad spectrum of stakeholders ranging from individual health-care providers to policy makers and international organizations that are primarily involved in global health management, or are influenced by global health events. PMID:22460280

  7. Migrants and emerging public health issues in a globalized world: threats, risks and challenges, an evidence-based framework.

    PubMed

    Gushulak, Bd; Weekers, J; Macpherson, Dw

    2009-01-01

    International population mobility is an underlying factor in the emergence of public health threats and risks that must be managed globally. These risks are often related, but not limited, to transmissible pathogens. Mobile populations can link zones of disease emergence to lowprevalence or nonendemic areas through rapid or high-volume international movements, or both. Against this background of human movement, other global processes such as economics, trade, transportation, environment and climate change, as well as civil security influence the health impacts of disease emergence. Concurrently, global information systems, together with regulatory frameworks for disease surveillance and reporting, affect organizational and public awareness of events of potential public health significance. International regulations directed at disease mitigation and control have not kept pace with the growing challenges associated with the volume, speed, diversity, and disparity of modern patterns of human movement. The thesis that human population mobility is itself a major determinant of global public health is supported in this article by review of the published literature from the perspective of determinants of health (such as genetics/biology, behavior, environment, and socioeconomics), population-based disease prevalence differences, existing national and international health policies and regulations, as well as inter-regional shifts in population demographics and health outcomes. This paper highlights some of the emerging threats and risks to public health, identifies gaps in existing frameworks to manage health issues associated with migration, and suggests changes in approach to population mobility, globalization, and public health. The proposed integrated approach includes a broad spectrum of stakeholders ranging from individual health-care providers to policy makers and international organizations that are primarily involved in global health management, or are influenced by global health events.

  8. Modelling multiple threats to water security in the Peruvian Amazon using the WaterWorld Policy Support System

    NASA Astrophysics Data System (ADS)

    van Soesbergen, A. J. J.; Mulligan, M.

    2013-06-01

    This paper explores a multitude of threats to water security in the Peruvian Amazon using the WaterWorld policy support system. WaterWorld is a spatially explicit, physically-based globally-applicable model for baseline and scenario water balance that is particularly well suited to heterogeneous environments with little locally available data (e.g. ungauged basins) and which is delivered through a simple web interface, requiring little local capacity for use. The model is capable of producing a hydrological baseline representing the mean water balance for 1950-2000 and allows for examining impacts of population, climate and land use change as well as land and water management interventions on hydrology. This paper describes the application of WaterWorld to the Peruvian Amazon, an area that is increasingly under pressure from deforestation and water pollution as a result of population growth, rural to urban migration and oil and gas extraction, potentially impacting both water quantity and water quality. By applying single and combined scenarios of: climate change, deforestation around existing and planned roads, population growth and rural-urban migration, mining and oil and gas exploitation, we explore the potential combined impacts of these multiple changes on water resources in the Peruvian Amazon and discuss the likely pathways for adaptation to and mitigation against their worst effects. See Mulligan et al. (2013) for a similar analysis for the entire Amazon Basin.

  9. Longitudinal data analysis in support of functional stability concepts for leachate management at closed municipal landfills.

    PubMed

    Gibbons, Robert D; Morris, Jeremy W F; Prucha, Christopher P; Caldwell, Michael D; Staley, Bryan F

    2014-09-01

    Landfill functional stability provides a target that supports no environmental threat at the relevant point of exposure in the absence of active control systems. With respect to leachate management, this study investigates "gateway" indicators for functional stability in terms of the predictability of leachate characteristics, and thus potential threat to water quality posed by leachate emissions. Historical studies conducted on changes in municipal solid waste (MSW) leachate concentrations over time (longitudinal analysis) have concentrated on indicator compounds, primarily chemical oxygen demand (COD) and biochemical oxygen demand (BOD). However, validation of these studies using an expanded database and larger constituent sets has not been performed. This study evaluated leachate data using a mixed-effects regression model to determine the extent to which leachate constituent degradation can be predicted based on waste age or operational practices. The final dataset analyzed consisted of a total of 1402 samples from 101 MSW landfills. Results from the study indicated that all leachate constituents exhibit a decreasing trend with time in the post-closure period, with 16 of the 25 target analytes and aggregate classes exhibiting a statistically significant trend consistent with well-studied indicators such as BOD. Decreasing trends in BOD concentration after landfill closure can thus be considered representative of trends for many leachate constituents of concern. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Ecologically relevant neurobehavioral assessment of the development of threat learning

    PubMed Central

    Mouly, Anne-Marie

    2016-01-01

    As altricial infants gradually transition to adults, their proximate environment changes. In three short weeks, pups transition from a small world with the caregiver and siblings to a complex milieu rich in dangers as their environment expands. Such contrasting environments require different learning abilities and lead to distinct responses throughout development. Here, we will review some of the learned fear conditioned responses to threats in rats during their ontogeny, including behavioral and physiological measures that permit the assessment of learning and its supporting neurobiology from infancy through adulthood. In adulthood, odor–shock conditioning produces robust fear learning to the odor that depends upon the amygdala and related circuitry. Paradoxically, this conditioning in young pups fails to support fear learning and supports approach learning to the odor previously paired with shock. This approach learning is mediated by the infant attachment network that does not include the amygdala. During the age range when pups transition from the infant to the adult circuit (10–15 d old), pups have access to both networks: odor–shock conditioning in maternal presence uses the attachment circuit but the adult amygdala-dependent circuit when alone. However, throughout development (as young as 5 d old) the attachment associated learning can be overridden and amygdala-dependent fear learning supported, if the mother expresses fear in the presence of the pup. This social modulation of the fear permits the expression of defense reactions in life threatening situations informed by the caregiver but prevents the learning of the caregiver itself as a threat. PMID:27634146

  11. Ecologically relevant neurobehavioral assessment of the development of threat learning.

    PubMed

    Boulanger Bertolus, Julie; Mouly, Anne-Marie; Sullivan, Regina M

    2016-10-01

    As altricial infants gradually transition to adults, their proximate environment changes. In three short weeks, pups transition from a small world with the caregiver and siblings to a complex milieu rich in dangers as their environment expands. Such contrasting environments require different learning abilities and lead to distinct responses throughout development. Here, we will review some of the learned fear conditioned responses to threats in rats during their ontogeny, including behavioral and physiological measures that permit the assessment of learning and its supporting neurobiology from infancy through adulthood. In adulthood, odor-shock conditioning produces robust fear learning to the odor that depends upon the amygdala and related circuitry. Paradoxically, this conditioning in young pups fails to support fear learning and supports approach learning to the odor previously paired with shock. This approach learning is mediated by the infant attachment network that does not include the amygdala. During the age range when pups transition from the infant to the adult circuit (10-15 d old), pups have access to both networks: odor-shock conditioning in maternal presence uses the attachment circuit but the adult amygdala-dependent circuit when alone. However, throughout development (as young as 5 d old) the attachment associated learning can be overridden and amygdala-dependent fear learning supported, if the mother expresses fear in the presence of the pup. This social modulation of the fear permits the expression of defense reactions in life threatening situations informed by the caregiver but prevents the learning of the caregiver itself as a threat. © 2016 Boulanger Bertolus et al.; Published by Cold Spring Harbor Laboratory Press.

  12. Organisational design for an integrated oncological department

    PubMed Central

    Meiss-de Haas, Ch.L.; Falkmann, H.; Douma, J.; van Gassel, J.G.; Peters, W.G.; van Mierlo, R.; van Turnhout, J.M.; Verhagen, C.A.H.H.V.M.; Schrijvers, A.J.P.

    2001-01-01

    Abstract Objective The outcomes of a Strength, Weakness, Opportunities and Threat (SWOT) analysis of three Integrated Oncological Departments were compared with their present situation three years later to define factors that can influence a successful implementation and development of an Integrated Oncological Department in- and outside (i.e. home care) the hospital. Research design Comparative Qualitative Case Study. Methods Auditing based on care-as-usual norms by an external, experienced auditing committee. Research setting Integrated Oncological Departments of three hospitals. Results Successful multidisciplinary care in an integrated, oncological department needs broad support inside the hospital and a well-defined organisational plan. PMID:16896411

  13. Department of the Navy Supporting Data for Fiscal Year 1983 Budget Estimates Descriptive Summaries Submitted to Congress February 1982. Research, Development, Test & Evaluation, Navy. Book 1 of 3. Technology Base, Advanced Technology Development, Strategic Programs.

    DTIC Science & Technology

    1982-02-01

    optimization methods have been developed for problems in production and distribution modeling including design and evaluation of storage alternatives under...and winds using high frequency , X-band doppler, pulse -limited, and Delta-K radars. Development of millimeter-wave radiometric imaging systems and...generic system design concept for a system capable of defending the Fleet from the high angle threat 1.4 The first model of the drive system for a

  14. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single simulations can be in error. Although these model shortcomings presently limit the precision of lightning threat forecasts from individual runs of current generation models,the techniques proposed herein should continue to be applicable as newer and more accurate physically-based model versions, physical parameterizations, initialization techniques and ensembles of forecasts become available.

  15. Men's Health: Prevent the Top Threats

    MedlinePlus

    ... of Privacy Practices Notice of Nondiscrimination Manage Cookies Advertising Mayo Clinic is a not-for-profit organization and proceeds from Web advertising help support our mission. Mayo Clinic does not ...

  16. Student threat assessment as a standard school safety practice: Results from a statewide implementation study.

    PubMed

    Cornell, Dewey; Maeng, Jennifer L; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick

    2018-06-01

    Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat assessment teams distinguish serious from nonserious threats. The sample consisted of 1,865 threat assessment cases reported by 785 elementary, middle, and high schools. Students ranged from pre-K to Grade 12, including 74.4% male, 34.6% receiving special education services, 51.2% White, 30.2% Black, 6.8% Hispanic, and 2.7% Asian. Survey data were collected from school-based teams to measure student demographics, threat characteristics, and assessment results. Logistic regression indicated that threat assessment teams were more likely to identify a threat as serious if it was made by a student above the elementary grades (odds ratio 0.57; 95% lower and upper bound 0.42-0.78), a student receiving special education services (1.27; 1.00-1.60), involved battery (1.61; 1.20-2.15), homicide (1.40; 1.07-1.82), or weapon possession (4.41; 2.80-6.96), or targeted an administrator (3.55; 1.73-7.30). Student race and gender were not significantly associated with a serious threat determination. The odds ratio that a student would attempt to carry out a threat classified as serious was 12.48 (5.15-30.22). These results provide new information on the nature and prevalence of threats in schools using threat assessment that can guide further work to develop this emerging school safety practice. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  17. Threat Based Risk Assessment for Enterprise Networks

    DTIC Science & Technology

    2016-02-15

    served as the program chair of the Research in Attacks, Intrusions , and Defenses workshop; the Neural Information Processing Systems (NIPS) annual...Threat- Based Risk Assessment for Enterprise Networks Richard P. Lippmann and James F. Riordan Protecting enterprise networks requires...include aids for the hearing impaired, speech recognition, pattern classification, neural networks , and cybersecurity. He has taught three courses

  18. Reasons For Physicians Not Adopting Clinical Decision Support Systems: Critical Analysis.

    PubMed

    Khairat, Saif; Marc, David; Crosby, William; Al Sanousi, Ali

    2018-04-18

    Clinical decision support systems (CDSSs) are an integral component of today's health information technologies. They assist with interpretation, diagnosis, and treatment. A CDSS can be embedded throughout the patient safety continuum providing reminders, recommendations, and alerts to health care providers. Although CDSSs have been shown to reduce medical errors and improve patient outcomes, they have fallen short of their full potential. User acceptance has been identified as one of the potential reasons for this shortfall. The purpose of this paper was to conduct a critical review and task analysis of CDSS research and to develop a new framework for CDSS design in order to achieve user acceptance. A critical review of CDSS papers was conducted with a focus on user acceptance. To gain a greater understanding of the problems associated with CDSS acceptance, we conducted a task analysis to identify and describe the goals, user input, system output, knowledge requirements, and constraints from two different perspectives: the machine (ie, the CDSS engine) and the user (ie, the physician). Favorability of CDSSs was based on user acceptance of clinical guidelines, reminders, alerts, and diagnostic suggestions. We propose two models: (1) the user acceptance and system adaptation design model, which includes optimizing CDSS design based on user needs/expectations, and (2) the input-process-output-engagemodel, which reveals to users the processes that govern CDSS outputs. This research demonstrates that the incorporation of the proposed models will improve user acceptance to support the beneficial effects of CDSSs adoption. Ultimately, if a user does not accept technology, this not only poses a threat to the use of the technology but can also pose a threat to the health and well-being of patients. ©Saif Khairat, David Marc, William Crosby, Ali Al Sanousi. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 18.04.2018.

  19. 78 FR 53193 - Designation of 4 Individuals Pursuant to Executive Order 13224 of September 23, 2001, “Blocking...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ... Persons Who Commit, Threaten To Commit, or Support Terrorism'' AGENCY: Office of Foreign Assets Control... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designations by the Director of... President declared a national emergency to address grave acts of terrorism and threats of terrorism...

  20. 77 FR 31067 - Designation of 2 Individuals Pursuant to Executive Order 13224 of September 23, 2001: Blocking...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-24

    ... Persons Who Commit, Threaten To Commit, or Support Terrorism AGENCY: Office of Foreign Assets Control... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designations by the Director of..., the President declared a national emergency to address grave acts of terrorism and threats of...

  1. 75 FR 16909 - Designation of One Individual Pursuant to Executive Order 13224

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ... Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the Director of OFAC of the... President declared a national emergency to address grave acts of terrorism and threats of terrorism... significant risk of committing, or support acts of terrorism. The President identified in the Annex to the...

  2. 78 FR 15124 - Designation of One (1) Individual Pursuant to Executive Order 13224 of September 23, 2001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-08

    ... With Persons Who Commit, Threaten To Commit, or Support Terrorism'' AGENCY: Office of Foreign Assets... With Persons Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the..., the President declared a national emergency to address grave acts of terrorism and threats of...

  3. 78 FR 34705 - Designation of 3 Individuals and 10 Entities Pursuant to Executive Order 13224 of September 23...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-10

    ... Transactions With Persons Who Commit, Threaten To Commit, or Support Terrorism'' AGENCY: Office of Foreign... and Prohibiting Transactions With Persons Who Commit, Threaten To Commit, or Support Terrorism... grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the...

  4. 77 FR 65055 - Designation of 1 individual Pursuant To Executive Order 13224 of September 23, 2001, Blocking...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-24

    ... Persons Who Commit, Threaten To Commit, or Support Terrorism AGENCY: Office of Foreign Assets Control... Transactions With Persons Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the..., the President declared a national emergency to address grave acts of terrorism and threats of...

  5. 77 FR 58910 - Designation of Two (2) Individuals Pursuant to Executive Order 13224 of September 23, 2001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-24

    ... With Persons Who Commit, Threaten To Commit, or Support Terrorism'' AGENCY: Office of Foreign Assets... Transactions With Persons Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designations by... Order, the President declared a national emergency to address grave acts of terrorism and threats of...

  6. 75 FR 53377 - Designation of One Individual Pursuant to Executive Order 13224

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-31

    ... Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the Director of OFAC of the... President declared a national emergency to address grave acts of terrorism and threats of terrorism... significant risk of committing, or support acts of terrorism. The President identified in the Annex to the...

  7. 76 FR 64183 - Designation of Five Individuals Pursuant to Executive Order 13224 of September 23, 2001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... With Persons Who Commit, Threaten To Commit, or Support Terrorism.'' AGENCY: Office of Foreign Assets... Transactions With Persons Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designations by... Order, the President declared a national emergency to address grave acts of terrorism and threats of...

  8. 77 FR 74916 - Designation of Two (2) Individuals Pursuant to Executive Order 13224 of September 23, 2001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-18

    ... With Persons Who Commit, Threaten To Commit, or Support Terrorism'' AGENCY: Office of Foreign Assets... Transactions With Persons Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designations by..., the President declared a national emergency to address grave acts of terrorism and threats of...

  9. 76 FR 38279 - Designation of One Individual and One Entity Pursuant to Executive Order 13224

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-29

    ... Prohibiting Transactions With Persons Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The... of terrorism and threats of terrorism committed by foreign terrorists, including the September 11... sanctions on persons who have committed, pose a significant risk of committing, or support acts of terrorism...

  10. 77 FR 68207 - Designations of 4 Individuals Pursuant to Executive Order 13224 of September 23, 2001, “Blocking...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-15

    ... Persons Who Commit, Threaten To Commit, or Support Terrorism'' AGENCY: Office of Foreign Assets Control... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designations by the Director of... President declared a national emergency to address grave acts of terrorism and threats of terrorism...

  11. The Role of Foundations and Philanthropy in Supporting School Libraries.

    ERIC Educational Resources Information Center

    DeVita, M. Christine

    2002-01-01

    Addresses the Wallace-Reader's Digest Funds' experiences working with school libraries and the lessons learned from the Library Power initiative, including: how school libraries can support national education goals, particularly in meeting the challenges outlined in the No Child Left Behind Act of 2001; current threats to library reform; and how…

  12. The Costs and Benefits of High Speed Vessels Relative to Traditional C-17 Military Airlift

    DTIC Science & Technology

    2003-12-01

    37 APPENDIX D SWOT Analysis...Port Action Officers Group IBCT Interim Brigade Combat Team LCS Littoral Combat Ship LST Landing ship tank LSV Logistics Support Vessel... SWOT Strength Weakness Opportunity Threat TACOM Tank and Automotive Command TSV Theater Support Vessel USS United States Ship USTRANSCOM

  13. Participation Apprehensive Students: The Influence of Face Support and Instructor-Student Rapport on Classroom Participation

    ERIC Educational Resources Information Center

    Frisby, Brandi N.; Berger, Erin; Burchett, Molly; Herovic, Emina; Strawser, Michael G.

    2014-01-01

    Participation is considered a positive student classroom behavior that can also create a face-threatening classroom climate that may be alleviated through interpersonal relationships with the instructor. Participants (N?=?189) categorized as low apprehensives perceived less face threat and more face support when participating; moderate…

  14. Alveolar echinococcosis in Europe and Poland. Threats to humans

    PubMed

    Gawor, Jakub

    The increasing number of detected cases of alveolar echinococcosis (AE) in recent years in Central-Eastern Europe strongly support the need of accurate diagnosis of the disease in patients and its differentiation from cystic echinococcosis. Accordingly to the EU notification requirements both parasitoses are reported jointly as echinococcosis, which makes it impossible to assess epidemiological situation of each disease. AE threat to humans is due to the environmental contamination with eggs of the tapeworm Echinococcus multilocularis excreted by infected foxes. Also contribution of dogs to the parasite transmission should be taken into account in endemic areas. The article presents current data on human cases of AE registered in humans in Europe and Poland, threats of this parasitosis to humans and results of studies on E. multilocularis infection in animals, the definitive hosts.

  15. Possible Use of Bacteriophages Active against Bacillus anthracis and Other B. cereus Group Members in the Face of a Bioterrorism Threat

    PubMed Central

    Weber-Dąbrowska, Beata; Borysowski, Jan; Górski, Andrzej

    2014-01-01

    Anthrax is an infectious fatal disease with epidemic potential. Nowadays, bioterrorism using Bacillus anthracis is a real possibility, and thus society needs an effective weapon to neutralize this threat. The pathogen may be easily transmitted to human populations. It is easy to store, transport, and disseminate and may survive for many decades. Recent data strongly support the effectiveness of bacteriophage in treating bacterial diseases. Moreover, it is clear that bacteriophages should be considered a potential incapacitative agent against bioterrorism using bacteria belonging to B. cereus group, especially B. anthracis. Therefore, we have reviewed the possibility of using bacteriophages active against Bacillus anthracis and other species of the B. cereus group in the face of a bioterrorism threat. PMID:25247187

  16. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2015-03-01

    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends andmore » describes NNSA’s integrated threat reduction strategy.« less

  17. Does self-threat promote social connection? The role of self-esteem and contingencies of self-worth.

    PubMed

    Park, Lora E; Maner, Jon K

    2009-01-01

    Six studies examined the social motivations of people with high self-esteem (HSE) and low self-esteem (LSE) following a threat to a domain of contingent self-worth. Whether people desired social contact following self-threat depended on an interaction between an individual's trait self-esteem and contingencies of self-worth. HSE participants who strongly based self-worth on appearance sought to connect with close others following a threat to their physical attractiveness. LSE participants who staked self-worth on appearance wanted to avoid social contact and, instead, preferred a less interpersonally risky way of coping with self-threat (wanting to enhance their physical attractiveness). Implications for theories of self-esteem, motivation, and interpersonal processes are discussed.

  18. An Agent-Based Intervention to Assist Drivers Under Stereotype Threat: Effects of In-Vehicle Agents' Attributional Error Feedback.

    PubMed

    Joo, Yeon Kyoung; Lee-Won, Roselyn J

    2016-10-01

    For members of a group negatively stereotyped in a domain, making mistakes can aggravate the influence of stereotype threat because negative stereotypes often blame target individuals and attribute the outcome to their lack of ability. Virtual agents offering real-time error feedback may influence performance under stereotype threat by shaping the performers' attributional perception of errors they commit. We explored this possibility with female drivers, considering the prevalence of the "women-are-bad-drivers" stereotype. Specifically, we investigated how in-vehicle voice agents offering error feedback based on responsibility attribution (internal vs. external) and outcome attribution (ability vs. effort) influence female drivers' performance under stereotype threat. In addressing this question, we conducted an experiment in a virtual driving simulation environment that provided moment-to-moment error feedback messages. Participants performed a challenging driving task and made mistakes preprogrammed to occur. Results showed that the agent's error feedback with outcome attribution moderated the stereotype threat effect on driving performance. Participants under stereotype threat had a smaller number of collisions when the errors were attributed to effort than to ability. In addition, outcome attribution feedback moderated the effect of responsibility attribution on driving performance. Implications of these findings are discussed.

  19. A novel two-stage evaluation system based on a Group-G1 approach to identify appropriate emergency treatment technology schemes in sudden water source pollution accidents.

    PubMed

    Qu, Jianhua; Meng, Xianlin; Hu, Qi; You, Hong

    2016-02-01

    Sudden water source pollution resulting from hazardous materials has gradually become a major threat to the safety of the urban water supply. Over the past years, various treatment techniques have been proposed for the removal of the pollutants to minimize the threat of such pollutions. Given the diversity of techniques available, the current challenge is how to scientifically select the most desirable alternative for different threat degrees. Therefore, a novel two-stage evaluation system was developed based on a circulation-correction improved Group-G1 method to determine the optimal emergency treatment technology scheme, considering the areas of contaminant elimination in both drinking water sources and water treatment plants. In stage 1, the threat degree caused by the pollution was predicted using a threat evaluation index system and was subdivided into four levels. Then, a technique evaluation index system containing four sets of criteria weights was constructed in stage 2 to obtain the optimum treatment schemes corresponding to the different threat levels. The applicability of the established evaluation system was tested by a practical cadmium-contaminated accident that occurred in 2012. The results show this system capable of facilitating scientific analysis in the evaluation and selection of emergency treatment technologies for drinking water source security.

  20. Classification of buildings mold threat using electronic nose

    NASA Astrophysics Data System (ADS)

    Łagód, Grzegorz; Suchorab, Zbigniew; Guz, Łukasz; Sobczuk, Henryk

    2017-07-01

    Mold is considered to be one of the most important features of Sick Building Syndrome and is an important problem in current building industry. In many cases it is caused by the rising moisture of building envelopes surface and exaggerated humidity of indoor air. Concerning historical buildings it is mostly caused by outdated raising techniques among that is absence of horizontal isolation against moisture and hygroscopic materials applied for construction. Recent buildings also suffer problem of mold risk which is caused in many cases by hermetization leading to improper performance of gravitational ventilation systems that make suitable conditions for mold development. Basing on our research there is proposed a method of buildings mold threat classification using electronic nose, based on a gas sensors array which consists of MOS sensors (metal oxide semiconductor). Used device is frequently applied for air quality assessment in environmental engineering branches. Presented results show the interpretation of e-nose readouts of indoor air sampled in rooms threatened with mold development in comparison with clean reference rooms and synthetic air. Obtained multivariate data were processed, visualized and classified using a PCA (Principal Component Analysis) and ANN (Artificial Neural Network) methods. Described investigation confirmed that electronic nose - gas sensors array supported with data processing enables to classify air samples taken from different rooms affected with mold.

  1. Flower power: the armoured expert in the CanMEDS competency framework?

    PubMed

    Whitehead, Cynthia R; Austin, Zubin; Hodges, Brian D

    2011-12-01

    Competency frameworks based on roles definitions are currently being used extensively in health professions education internationally. One of the most successful and widely used models is the CanMEDS Roles Framework. The medical literature has raised questions about both the theoretical underpinnings and the practical application of outcomes-based frameworks, however little empirical research has yet been done examining specific roles frameworks. This study examines the historical development of an important early roles framework, the Educating Future Physicians of Ontario (EFPO) roles, which were instrumental in the development of the CanMEDS roles. Prominent discourses related to roles development are examined using critical discourse analysis methodology. Exploration of discourses that emerged in the development of this particular set of roles definitions highlights the contextual and negotiated nature of roles construction. The discourses of threat and protection prevalent in the EFPO roles development offer insight into the visual construction of a centre of medical expertise surrounded by supporting roles (such as collaborator and manager). Non-medical expert roles may perhaps play the part of 'armour' for the authority of medical expertise under threat. This research suggests that it may not be accurate to consider roles as objective ideals. Effective training models may require explicit acknowledgement of the socially negotiated and contextual nature of roles definitions.

  2. Short-term serotonergic but not noradrenergic antidepressant administration reduces attentional vigilance to threat in healthy volunteers.

    PubMed

    Murphy, Susannah E; Yiend, Jenny; Lester, Kathryn J; Cowen, Philip J; Harmer, Catherine J

    2009-03-01

    Anxiety is associated with threat-related biases in information processing such as heightened attentional vigilance to potential threat. Such biases are an important focus of psychological treatments for anxiety disorders. Selective serotonin reuptake inhibitors (SSRIs) are effective in the treatment of a range of anxiety disorders. The aim of this study was to assess the effect of an SSRI on the processing of threat in healthy volunteers. A selective noradrenergic reuptake inhibitor (SNRI), which is not generally used in the treatment of anxiety, was used as a contrast to assess the specificity of SSRI effects on threat processing. Forty-two healthy volunteers were randomly assigned to 7 d double-blind intervention with the SSRI citalopram (20 mg/d), the SNRI reboxetine (8 mg/d), or placebo. On the final day, attentional and interpretative bias to threat was assessed using the attentional probe and the homograph primed lexical decision tasks. Citalopram reduced attentional vigilance towards fearful faces but did not affect the interpretation of ambiguous homographs as threatening. Reboxetine had no significant effect on either of these measures. Citalopram reduces attentional orienting to threatening stimuli, which is potentially relevant to its clinical use in the treatment of anxiety disorders. This finding supports a growing literature suggesting that an important mechanism through which pharmacological agents may exert their effects on mood is by reversing the cognitive biases that characterize the disorders that they treat. Future studies are needed to clarify the neural mechanisms through which these effects on threat processing are mediated.

  3. Work-related threats and violence in human service sectors: The importance of the psycho-social work environment examined in a multilevel prospective study.

    PubMed

    Andersen, Lars Peter; Hogh, Annie; Biering, Karin; Gadegaard, Charlotte Ann

    2018-01-01

    Threats and violence at work are major concerns for employees in many human service sectors. The prevention of work-related violence is a major challenge for employees and management. The purpose of this study was to identify prospective associations between psycho-social work environment and work-related threats and violence in four high risk human service sectors. Questionnaire data was collected from 3011 employees working at psychiatric wards, in the elder sector, in the Prison and Probation Service and at Special Schools. Associations between psycho-social work environment and work-related violence and threats were then studied using a one-year follow-up design and multilevel logistic regression analyses. The analyses showed that quantitative demands, high emotional demands, low level of influence over own work-situation, low predictability, low rewards at work, low role clarity, many role conflicts, many work-family conflicts and low organizational justice had statistically significant associations with high levels of work-related threats. Furthermore, high emotional demands, low predictability, low role clarity, many role conflicts, many work-family conflicts, low supervisor quality and low support from nearest supervisor had statistically significant associations with high levels of work-related violence. Finally, across the four sectors both similar and different associations between psycho-social work environment and work-related violence and threats were found. The results of the study underline the importance of including the psycho-social work environment as a supplement to existing violence prevention methods and interventions aimed at reducing work-related violence and threats.

  4. From self-construal to threat appraisal: Understanding cultural differences in social anxiety between Asian Americans and European Americans.

    PubMed

    Krieg, Alexander; Xu, Yiyuan

    2018-05-21

    Abundant research has shown that Asian Americans tend to score higher on standardized social anxiety measures than do European Americans. The current study explored how this cultural difference in social anxiety may be explained by cultural differences in self-construals and threat appraisal between Asian Americans and European Americans. Participants were 310 Asian Americans and 249 European Americans recruited from a large university in Hawaii who completed questionnaires online in exchange for course credit. Using structural equation modeling, we compared a series of competing models in which cultural differences in social anxiety were specified to be mediated by cultural differences in self-construals and threat appraisal. Compared with European Americans, Asian Americans scored higher on measures of social anxiety, threat appraisal, and interdependent self-construal, and lower on independent self-construal. We found support for the mediating roles of both self-construals and threat appraisal. Specifically, higher interdependent and lower independent self-construal reported by Asian Americans were related to higher threat appraisal, which were, in turn, associated with higher social anxiety. Higher interdependent and lower independent self-construal were also directly related to higher social anxiety over and above the influence of threat appraisal. These findings provide initial evidence on how cultural group differences in beliefs about the self in relation to others may shape what is attended to in a social situation, and contribute to cultural differences in subsequent affective response between Asian Americans and European Americans. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  5. NA22 Model Cities Project - LL244T An Intelligent Transportation System-Based Radiation Alert and Detection System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peglow, S

    2004-02-24

    The purpose of this project was twofold: first, provide an understanding of the technical foundation and planning required for deployment of Intelligent Transportation System (ITS)-based system architectures for the protection of New York City from a terrorist attack using a vehicle-deployed nuclear device; second, work with stakeholders to develop mutual understanding of the technologies and tactics required for threat detection/identification and establish guidelines for designing operational systems and procedures. During the course of this project we interviewed and coordinated analysis with people from the New Jersey State Attorney General's office, the New Jersey State Police, the Port Authority of Newmore » York/New Jersey, the Counterterrorism Division of the New York City Police Department, the New Jersey Transit Authority, the State of New Jersey Department of Transportation, TRANSCOM and a number of contractors involved with state and federal intelligent transportation development and implementation. The basic system architecture is shown in the figure below. In an actual system deployment, radiation sensors would be co-located with existing ITS elements and the data will be sent to the Traffic Operations Center. A key element of successful system operation is the integration of vehicle data, such as license plate, EZ pass ID, vehicle type/color and radiation signature. A threat data base can also be implemented and utilized in cases where there is a suspect vehicle identified from other intelligence sources or a mobile detector system. Another key aspect of an operational architecture is the procedures used to verify the threat and plan interdiction. This was a major focus of our work and discussed later in detail. In support of the operational analysis, we developed a detailed traffic simulation model that is described extensively in the body of the report.« less

  6. Long-term mental wellbeing of adolescents and young adults diagnosed with venous thromboembolism: results from a multistage mixed methods study.

    PubMed

    Højen, A A; Sørensen, E E; Dreyer, P S; Søgaard, M; Larsen, T B

    2017-12-01

    Essentials Long-term mental wellbeing of adolescents and young adults with venous thromboembolism is unclear. This multistage mixed methods study was based on Danish nationwide registry data and interviews. Mental wellbeing is negatively impacted in the long-term and uncertainty of recurrence is pivotal. The perceived health threat is more important than disease severity for long-term mental wellbeing. Background Critical and chronic illness in youth can lead to impaired mental wellbeing. Venous thromboembolism (VTE) is a potentially traumatic and life-threatening condition. Nonetheless, the long-term mental wellbeing of adolescents and young adults (AYAS) with VTE is unclear. Objectives To investigate the long-term mental wellbeing of AYAS (aged 13-33 years) diagnosed with VTE. Methods We performed a multistage mixed method study based on data from the Danish nationwide health registries, and semistructured interviews with 12 AYAS diagnosed with VTE. An integrated mixed methods interpretation of the findings was conducted through narrative weaving and joint displays. Results The integrated mixed methods interpretation showed that the mental wellbeing of AYAS with VTE had a chronic perspective, with a persistently higher risk of psychotropic drug purchase among AYAS with a first-time diagnosis of VTE than among sex-matched and age-matched population controls and AYAS with a first-time diagnosis of insulin-dependent diabetes mellitus. Impaired mental wellbeing was largely connected to a fear of recurrence and concomitant uncertainty. Therefore, it was important for the long-term mental wellbeing to navigate uncertainty. The perceived health threat played a more profound role in long-term mental wellbeing than disease severity, as the potential life threat was the pivot which pointed back to the initial VTE and forward to the perception of future health threat and the potential risk of dying of a recurrent event. Conclusion Our findings show that the long-term mental wellbeing of AYAS diagnosed with VTE is negatively affected, and highlights these patients' need for adequate support. © 2017 International Society on Thrombosis and Haemostasis.

  7. Advanced nanoelectronic architectures for THz-based biological agent detection

    NASA Astrophysics Data System (ADS)

    Woolard, Dwight L.; Jensen, James O.

    2009-02-01

    The U.S. Army Research Office (ARO) and the U.S. Army Edgewood Chemical Biological Center (ECBC) jointly lead and support novel research programs that are advancing the state-of-the-art in nanoelectronic engineering in application areas that have relevance to national defense and security. One fundamental research area that is presently being emphasized by ARO and ECBC is the exploratory investigation of new bio-molecular architectural concepts that can be used to achieve rapid, reagent-less detection and discrimination of biological warfare (BW) agents, through the control of multi-photon and multi-wavelength processes at the nanoscale. This paper will overview an ARO/ECBC led multidisciplinary research program presently under the support of the U.S. Defense Threat Reduction Agency (DTRA) that seeks to develop new devices and nanoelectronic architectures that are effective for extracting THz signatures from target bio-molecules. Here, emphasis will be placed on the new nanosensor concepts and THz/Optical measurement methodologies for spectral-based sequencing/identification of genetic molecules.

  8. A Real-Time Decision Support System for Voltage Collapse Avoidance in Power Supply Networks

    NASA Astrophysics Data System (ADS)

    Chang, Chen-Sung

    This paper presents a real-time decision support system (RDSS) based on artificial intelligence (AI) for voltage collapse avoidance (VCA) in power supply networks. The RDSS scheme employs a fuzzy hyperrectangular composite neural network (FHRCNN) to carry out voltage risk identification (VRI). In the event that a threat to the security of the power supply network is detected, an evolutionary programming (EP)-based algorithm is triggered to determine the operational settings required to restore the power supply network to a secure condition. The effectiveness of the RDSS methodology is demonstrated through its application to the American Electric Power Provider System (AEP, 30-bus system) under various heavy load conditions and contingency scenarios. In general, the numerical results confirm the ability of the RDSS scheme to minimize the risk of voltage collapse in power supply networks. In other words, RDSS provides Power Provider Enterprises (PPEs) with a viable tool for performing on-line voltage risk assessment and power system security enhancement functions.

  9. Riverine threat indices to assess watershed condition and identify primary management capacity of agriculture natural resource management agencies.

    PubMed

    Fore, Jeffrey D; Sowa, Scott P; Galat, David L; Annis, Gust M; Diamond, David D; Rewa, Charles

    2014-03-01

    Managers can improve conservation of lotic systems over large geographies if they have tools to assess total watershed conditions for individual stream segments and can identify segments where conservation practices are most likely to be successful (i.e., primary management capacity). The goal of this research was to develop a suite of threat indices to help agriculture resource management agencies select and prioritize watersheds across Missouri River basin in which to implement agriculture conservation practices. We quantified watershed percentages or densities of 17 threat metrics that represent major sources of ecological stress to stream communities into five threat indices: agriculture, urban, point-source pollution, infrastructure, and all non-agriculture threats. We identified stream segments where agriculture management agencies had primary management capacity. Agriculture watershed condition differed by ecoregion and considerable local variation was observed among stream segments in ecoregions of high agriculture threats. Stream segments with high non-agriculture threats were most concentrated near urban areas, but showed high local variability. 60 % of stream segments in the basin were classified as under U.S. Department of Agriculture's Natural Resources Conservation Service (NRCS) primary management capacity and most segments were in regions of high agricultural threats. NRCS primary management capacity was locally variable which highlights the importance of assessing total watershed condition for multiple threats. Our threat indices can be used by agriculture resource management agencies to prioritize conservation actions and investments based on: (a) relative severity of all threats, (b) relative severity of agricultural threats, and (c) and degree of primary management capacity.

  10. The Roles of Financial Threat, Social Support, Work Stress, and Mental Distress in Dairy Farmers' Expectations of Injury.

    PubMed

    Furey, Emilia M; O'Hora, Denis; McNamara, John; Kinsella, Stephen; Noone, Chris

    2016-01-01

    Farming is dangerous, with fatalities among the highest in any occupation. Farmers often work alone, for long hours, with unreliable equipment and in difficult weather conditions with hazardous chemicals and livestock. In addition, farmers make large financial commitments exposing them to high levels of financial risk. Exposure to such financial risk can give rise to subjective experiences of financial threat (FT) that are psychologically challenging. The current study attempted to characterize the role that FT plays in farm injuries. One hundred and twenty one dairy farmers completed a battery of questionnaires assessing FT, social support (SS), depression, anxiety, farm job stress, and health and safety beliefs. Mental distress directly predicted farmers' expectations of injury and a direct effect of non-financial farm stress (FS) approached significance. Mental distress mediated these relationships as evidenced by significant indirect effects of FS and FT, and SS served to reduce distress. These findings support calls for interventions designed to reduce FS and FT and increase SS for farmers.

  11. Towards a framework for assessment and management of cumulative human impacts on marine food webs.

    PubMed

    Giakoumi, Sylvaine; Halpern, Benjamin S; Michel, Loïc N; Gobert, Sylvie; Sini, Maria; Boudouresque, Charles-François; Gambi, Maria-Cristina; Katsanevakis, Stelios; Lejeune, Pierre; Montefalcone, Monica; Pergent, Gerard; Pergent-Martini, Christine; Sanchez-Jerez, Pablo; Velimirov, Branko; Vizzini, Salvatrice; Abadie, Arnaud; Coll, Marta; Guidetti, Paolo; Micheli, Fiorenza; Possingham, Hugh P

    2015-08-01

    Effective ecosystem-based management requires understanding ecosystem responses to multiple human threats, rather than focusing on single threats. To understand ecosystem responses to anthropogenic threats holistically, it is necessary to know how threats affect different components within ecosystems and ultimately alter ecosystem functioning. We used a case study of a Mediterranean seagrass (Posidonia oceanica) food web and expert knowledge elicitation in an application of the initial steps of a framework for assessment of cumulative human impacts on food webs. We produced a conceptual seagrass food web model, determined the main trophic relationships, identified the main threats to the food web components, and assessed the components' vulnerability to those threats. Some threats had high (e.g., coastal infrastructure) or low impacts (e.g., agricultural runoff) on all food web components, whereas others (e.g., introduced carnivores) had very different impacts on each component. Partitioning the ecosystem into its components enabled us to identify threats previously overlooked and to reevaluate the importance of threats commonly perceived as major. By incorporating this understanding of system vulnerability with data on changes in the state of each threat (e.g., decreasing domestic pollution and increasing fishing) into a food web model, managers may be better able to estimate and predict cumulative human impacts on ecosystems and to prioritize conservation actions. © 2015 Society for Conservation Biology.

  12. Impact of external influences on food packaging.

    PubMed

    Brody, A L

    1977-09-01

    Since the food supply is dependent upon an effective packaging system, threats to packaging represent implied threats to food processing and distribution. Enacted and potential legislation and regulation are retarding technological and commercial progress in food packaging and have already restricted some food packaging/processins systems. The results of these external influences is not simply the sum of the individual acts, but is a cascading self-imposed arresting of food packaging/processing advancement. The technological bases for the enacted and proposed legislation and regulation are presented in the enumeration of the external influences on food packaging. Economic and sociological arguments and facts surrounding the issues are also presented. Among the external influences on food packaging detailed are indirect additives, nutritional labeling, benefit:risk, solid waste and litter, environmental pollution, universal product code, and food industry productivity. The magnitude of the total impact of these external influences upon the food supply is so large that assertive action must be taken to channel these influences into more productive awareness. An objective and comprehensive public communications program supported by the technological community appears mandatory.

  13. Joking about cancer as an avoidance strategy among US adults.

    PubMed

    Carcioppolo, Nick; John, Kevin K; Jensen, Jakob D; King, Andy J

    2017-12-13

    Findings from years of research on fear appeals suggest that individuals with low efficacy utilize avoidance strategies when they perceive a significant threat-a process called fear control. Some research suggests that joking could be an avoidance strategy. The current study identifies conditions in which people are more likely to joke about colorectal cancer and explores how this behavior may be associated with screening avoidance. Older adults (N = 209) recruited from eight different worksites completed a survey measuring fear appeal constructs and enactment of colorectal cancer-related joking. Results of a moderated mediation analysis suggest that men were more likely to joke about colorectal cancer than women, particularly if they perceived significant threat but had limited self-efficacy, signifying fear control. Results support prior fear appeal research, suggesting that an increase in joking behavior concerning colorectal cancer may be indicative of screening avoidance, and describe belief-based mechanisms that explain differences between biological sex and joking. Published by Oxford University Press 2017. This work is written by US Government employees and is in the public domain in the US.

  14. Who Trusts? Race, Gender, and The September 11 Rally Effect Among Young Adults

    PubMed Central

    Perrin, Andrew J.; Smolek, Sondra J.

    2009-01-01

    First proposed by Mueller, the theory of the “rally effect” predicts that public support for government officials will increase when an event occurs that (1) is international; (2) involves the United States; and (3) is specific, dramatic, and sharply focused (Mueller 1973, p. 209). Using the natural experiment of a large (N=15,127) survey of young adults ages 18-27 that was in the field during the September 11, 2001, terrorist attacks, we confirm the existence of a rally effect on trust in government as well as its subsequent decay. We then use a predictive modeling approach to investigate individual-level dynamics of rallying around the flag and anti-rallying in the face of the national threat. By disaggregating predictors of rallying, we demonstrate remarkably different patterns of response to the attacks based on sex and, particularly, race. The results confirm expectations of national threat inciting a rally effect, but indicate that the dynamics of this rally effect are complex and race and gender-dependent. The article offers previously-unavailable insights into the dynamics of rallying and trust in government. PMID:19569296

  15. Modeling Laser Effects on Imaging Spacecraft Using the SSM

    NASA Astrophysics Data System (ADS)

    Buehler, P.; Smith, J.; Farmer, J.; Bonn, D.

    The Satellite Survivability Module (SSM) is an end-to-end, physics-based, performance prediction model for directed energy engagement of orbiting spacecraft. Two engagement types are currently supported: laser engagement of the focal plane array of an imaging spacecraft; and Radio Frequency (RF) engagement of spacecraft components. For laser engagements, the user creates a spacecraft, its optical system, any protection techniques used by the optical system, a laser threat, and an atmosphere through which the laser will pass. For RF engagements, the user creates a spacecraft (as a set of subsystem components), any protection techniques, and an RF source. SSM then models the engagement and its impact on the spacecraft using four impact levels: degradation, saturation, damage, and destruction. Protection techniques, if employed, will mitigate engagement effects. SSM currently supports several two laser and three RF protection techniques. SSM allows the user to create and implement a variety of "what if" scenarios. Satellites can be placed in a variety of orbits. Threats can be placed anywhere on the Earth. Satellites and threats can be mixed and matched to examine possibilities. Protection techniques for a particular spacecraft can be turned on or off individually; and can be arranged in any order to simulate more complicated protection schemes. Results can be displayed as 2-D or 3-D visualizations, or as textual reports. In order to test SSM capabilities, the Ball team used it to model engagement scenarios for a space experiment scheduled for the 2011 time frame. SSM was created by Ball Aerospace & Technologies Corp. Systems Engineering Solutions in Albuquerque, New Mexico as an add-on module for the Satellite Tool Kit (STK). The current version of SSM (1.0) interfaces with STK through the Programmer's Library (STK/PL). Future versions of SSM will employ STK/Connect to provide the user access to STK functionality. The work is currently funded by the Air Force Research Laboratory, Space Vehicles directorate at Kirtland AFB, New Mexico, under contract number FA9453-06-C-0096.

  16. Science summary in support of Manatee Protection Area (MPA) design in Puerto Rico

    USGS Publications Warehouse

    Drew, C. Ashton; Alexander-Vaughn, Louise B.; Collazo, Jaime A.

    2012-01-01

    The Antillean manatee (Trichechus manatus manatus), a subspecies of the West Indian manatee, is listed as endangered by the US Department of Interior. In accordance with its listing, the U.S. Fish and Wildlife Service’s Caribbean Field Office (USFWS) is mandated to create one or more Manatee Protection Areas (MPAs) for Puerto Rico. Designation of these areas must comply with the legal definition of an MPA’s purpose: to prevent or reduce take of manatees (CFR 50: 44 FR 60964, Oct. 22, 1979). To meet this goal, we pursued two objectives: 1) identify areas which include the specific ecological attributes necessary to support manatee populations, and 2) identify areas where take can be reduced through approved MPA regulatory frameworks. We achieved these objectives through literature review, expert elicitation, and geospatial modeling. This report delivers to USFWS a set of nine potential MPA regions. These regions represent the spatial realization of experts’ hypotheses regarding manatee requirements and threats, and the potential to implement MPA strategies (e.g. watercraft access, speed regulations, signage and boater education). The nine regions are compared based on a number of factors, including their potential to reduce take, quality of the habitat encompassed, and total area. These maps and statistics serve as suitable starting points to select one or more MPA sites, but we recommend that the mapped attributes and threats (i.e., boating activity) of MPAs be ground-truthed to visually confirm the local presence of resources, threats, and manatees before any area is selected. Once established, the effectiveness of MPAs can be monitored and updated through processes of adaptive monitoring and management. Aerial surveys, radio tracking studies, and public surveys are all valuable tools to assess the success of an MPA. Establishing MPAs is a management action that, integrated within the species Recovery Plan, should enhance the conservation of manatees.

  17. Planetary Defense: Are we currently looking for our keys under the lamp post?

    NASA Astrophysics Data System (ADS)

    Nuth, J. A., III; Barbee, B.; Leung, R. Y.

    2016-12-01

    Planetary Defense is a serious and important endeavor and the approach taken to date is a sensible beginning. Finding and cataloging all potentially hazardous asteroids and supporting research into relevant topics required to divert such a threat to our home planet is a necessary, but far from sufficient set of activities required to ensure the survival of our species. Concentrating our efforts on the asteroid threat is relatively easy. Most asteroids move in near-circular orbits, are relatively close to the ecliptic plane and are likely to be detected as hazards many decades in advance of a potential impact. The single most likely problem that will be encountered in deflecting such a threat will be developing the political will to fund the project while there is still ample time for multiple deflection techniques to be applied successfully. While asteroid threats can be mitigated, comets are the invisible danger lurking in the vast, dark parking lot that is the outer solar system. Very few comets falling into the inner solar system will be detected more than two years before their arrival: refinement of a new comet's trajectory requires months of observation before its hazard potential can be realistically assessed and knowledge of the composition, mass and shape of the body cannot be refined sufficiently to design a deflection campaign without much more observational effort. To make matters worse, because of the highly elliptical orbits of most new comets, some of which can be far out of the ecliptic plane while a few can even be in retrograde orbits, the impact velocity of a typical comet will be significantly higher than that of an asteroid. If this increase is only a factor of two, then a typical comet carries four times the impact energy of an asteroid of similar size, though much higher multipliers are possible. The distribution of meteor stream velocities can be examined to place bounds on this threat. Finally, the time required to assemble and launch an asteroid deflection mission starting from scratch and with a high probability of success could exceed three years from mission approval. Based on the recent passage of Comet Siding Spring one must therefore conclude that a successful comet deflection mission must begin well before a hazardous comet is even detected, much less characterized as a significant threat.

  18. Threats to desert tortoise populations: a critical review of the literature

    USGS Publications Warehouse

    Boarman, William I.

    2002-01-01

    Decision in resource management are generally based on a combination of sociopolitical, economic, and environmental factors, and may be biased by personal values. These three components often contradict each other resulting in controversy. Controversies can usually be reduced when solid scientific evidence is used to support or refute a decision. However, it is important to recognize that data often do little to alter antagonists' positions when differences in values are the bases if the dispute. But, supporting data can make the decision more defensible, both legally and ethically, especially if the data supporting all opposing viewpoints are included in the decision-making process. Resource management decisions must be made using the best scientific information currently available. However, scientific data vary in two important measures of quality: reliability and validity. The reliability of the data is a measure of the degree to which the observations or conclusion can be repeated. Validity of the data is a measure of the degree to which the observation or conclusion reflects what actually occurs in nature. How the data are collected strongly affects the reliability of validity of ecological conclusions that can be made. Research data potentially relevant to management come from different sources, and the source often provides clues to the reliability and, to a certain extent, validity of data. Understanding the quality of data being used to make management decisions helps to separate the philosophical or value-based aspects of arguments from the objective ones, thus helping to clarify the decisions and judgments that need to be made. The West Mojave Plan is a multispecies, bioregional plan for the management of natural resources within a 9.4 million-acre area of the Mojave Desert in California. The plan addresses the legal requirements for the recovery of the desert tortoise (Gopherus agazzizii), a threatened species, but also covers an additional approximately 80 species of plants and animals assigned special status by the Bureau of Land Management, U. S. Fish and Wildlife Service, and California Department of Fish and Game. Within the planning area, 28 separate jurisdictions (counties, cities, towns, military installations, etc.) seek programmatic prescriptions that will facilitate streamlined environmental review, result in expedited authorization for development projects, and protect listed and unlisted species into the foreseeable future to avoid or minimize conflicts between proposed development and species' conservation and recovery. All of the scientific data available concerning the biology and management of these approximately 80 species and their habitats must be evaluated to develop a scientifically credible plan. This document provides an overview and evaluation of the knowledge of the major threats to the persistence and recovery of desert tortoise populations. I was specifically asked to evaluate the scientific veracity of the data and reports available. I summarize the data presently available with particular focus on the West Mojave Desert, evaluate the scientific integrity of the data. and identify major gaps in the available knowledge. I do not attempt to provide in-depth details on each study or threat; for more details I encourage the reader to consult the individual papers or reports city throughout this report (many of which are available at most university libraries and at the West Mojave Plan office in Riverside, California). I also do not attempt to characterize or evaluate the past or present management actions, except where they have direct bearing on evaluation of threats, nor do I attempt, for the most part, to acquire, generate, or evaluate new or existing, but uninterpreted data.

  19. Cybersecurity:The Road Ahead for Defense Acquisition

    DTIC Science & Technology

    2016-06-01

    tion programs. A key challenge for DoD acquisition addressing the cyber threat is how do we “ bake in” cybersecurity for our DoD ac- quisition programs...cybersecurity must be “ baked in” the design of our warfighting systems. Supporting policy and best practices for effective cyberse- curity in acquisition...contacted at steve.mills@dau.mil and steve.monks@ dau.mil. A key challenge for DoD acquisition addressing the cyber threat is how do we “ bake in” cybersecurity for our DoD acquisition programs vs. “bolting it on.”

  20. Cyberspace security system

    DOEpatents

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  1. [Biological research and security institutes].

    PubMed

    Darsie, G; Falczuk, A J; Bergmann, I E

    2006-04-01

    The threat of using biological material for ago-bioterrorist ends has risen in recent years, which means that research and diagnostic laboratories, biological agent banks and other institutions authorised to carry out scientific activities have had to implement biosafety and biosecurity measures to counter the threat, while carrying out activities to help prevent and monitor the accidental or intentional introduction of exotic animal diseases. This article briefly sets outthe basic components of biosafety and biosecurity, as well as recommendations on organisational strategies to consider in laboratories that support agro-bioterrorist surveillance and prevention programs.

  2. The main concern of burn survivors in Iran

    PubMed Central

    Zamanzadeh, Vahid; Valizadeh, Lila; Lotfi, Mojgan; Salehi, Feridoon; Khalili, Assef

    2016-01-01

    Background: The present work was conducted to study the burn patients’ experiences to get an insight into their main concerns when they suffer the tragic event, recover from it, and adjust back in the society, so that better rehabilitation programs can be planned corresponding to their needs as well as to the needs of the society and the existing situations. Materials and Methods: In this qualitative study, 17 burn survivors were enrolled. Unstructured interviews were used for data collection. All the interviews were recorded, transcribed, and analyzed using qualitative content analysis method. Results: Based on the existing elements of the explicit textual meanings, two categories of threat and disturbance were formed. The category of threat was extracted from the following five subcategories: (a) Threat to physical life; (b) threat to the process of living; (c) psychological threat; (d) spiritual threat; and (e) social threat. The category of disturbance was extracted from the following three subcategories: (a) Sensory disturbance: Suffering pain; (b) self-concept disturbance; and (c) behavioral disturbance. Conclusions: Burn survivors experience severe pain, enduring and suffering in their daily activities after burn. Passing through these difficult trajectories is perceived as a threat and disturbance in self-integrity. PMID:27563326

  3. [Leaking: Frequency and correlates of announcements and threats of homicidal violence reported by Berlin schools between 1996 and 2007].

    PubMed

    Leuschner, Vincenz; Bondü, Rebecca; Allroggen, Marc; Scheithauer, Herbert

    2016-01-01

    Threats and announcements of homicidal violence at schools may have massive consequences like evacuations, police searches, criminal investigations, or loss of the sense of security by students, teachers, and parents. However, there is a lack of systematic studies about that phenomenon. The present article would like to contribute to closing the research gap. It presents results about the frequency and structure of threats and announcements of homicidal violence in schools in Berlin. The study is based on an official dataset from school administration reports of violent acts in Berlin schools which has been studied within the Berlin Leaking-Projekt. The sample consists of 427 threats and announcements of homicidal violence between 1996 and 2007. The study is an exceptional analysis of the phenomenon: it presents crosscutting results about frequency and characteristics of threats and the threatening students as well as results of a longitudinal analysis about the development of threats and announcements. Results show a rate of 0,3 threats and announcements per 1 000 student and year. During the observation time span a steady increase of threats and announcements – year by year, influenced by imitation effects after school shootings – has been observed.

  4. 77 FR 14597 - Designation of One Individual Pursuant to Executive Order 13224 of September 23, 2001, “Blocking...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-12

    ... Persons Who Commit, Threaten To Commit, or Support Terrorism'' AGENCY: Office of Foreign Assets Control... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the Director of OFAC..., the President declared a national emergency to address grave acts of terrorism and threats of...

  5. 78 FR 36827 - Designation of 1 Individual Pursuant to Executive Order 13224 of September 23, 2001, “Blocking...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-19

    ... Persons Who Commit, Threaten To Commit, or Support Terrorism'' AGENCY: Office of Foreign Assets Control... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the Director of OFAC... President declared a national emergency to address grave acts of terrorism and threats of terrorism...

  6. 77 FR 10806 - Designation of One Entity Pursuant to Executive Order 13224 of September 23, 2001, “Blocking...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-23

    ... Who Commit, Threaten To Commit, or Support Terrorism'' AGENCY: Office of Foreign Assets Control... Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the Director of OFAC of the... President declared a national emergency to address grave acts of terrorism and threats of terrorism...

  7. 76 FR 64427 - Designation of One Entity Pursuant to Executive Order 13224 of September 23, 2001, “Blocking...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-18

    ... Who Commit, Threaten To Commit, or Support Terrorism'' AGENCY: Office of Foreign Assets Control... Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the Director of OFAC of the... national emergency to address grave acts of terrorism and threats of terrorism committed by foreign...

  8. 75 FR 57159 - Continuation of the National Emergency With Respect to Persons Who Commit, Threaten to Commit, or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-20

    ... Commit, or Support Terrorism On September 23, 2001, by Executive Order 13224, the President declared a national emergency with respect to persons who commit, threaten to commit, or support terrorism, pursuant... economy of the United States constituted by the grave acts of terrorism and threats of terrorism committed...

  9. 78 FR 65938 - Endangered and Threatened Wildlife and Plants; 12-Month Finding on a Petition and Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ... support towhees and their habitat. Further, the number of water diversions at towhee-occupied sites has... vehicle (OHV) use), water diversion, and mining. Potential threats identified since listing include energy.... Comments and materials we receive, as well as supporting documentation we used in preparing this proposed...

  10. Light Armored Reconnaissance: Misunderstood and Underemployed in Deep Operations

    DTIC Science & Technology

    2010-04-01

    then CoB 2na LA! Bn deploys in support of Operation NIMROD DANCER in Panama Dec 1989 Co D, 2d LA! Bn deploys in support of Operation JUST CAUSE in...Marine Corns Long- Range Plan (MLRP) and U.S. Marine Corps Mid-Range Plan (MMRP). An analysis of the threat discussed in these documents reveals

  11. Preventing Perinatal Depression through Home Visiting: The Mothers and Babies Course

    ERIC Educational Resources Information Center

    Perry, Deborah F.; Tandon, S. Darius; Edwards, Karen; Mendelson, Tamar

    2014-01-01

    Home visiting (HV) programs serve women at high risk for developing postpartum depression because of factors such as poverty and low social support. Depression poses serious threats not only to mother-child attachment and healthy infant development but also to women's ability to engage with HV services and supports. The Mothers and Babies (MB)…

  12. The US Wilderness Managers Survey: Charting a path for the future

    Treesearch

    Chad P. Dawson; Ken Cordell; Alan E. Watson; Ramesh Ghimire; Gary T. Green

    2016-01-01

    The Wilderness Manager Survey (WMS) was developed in 2014 to support interagency strategic planning for the National Wilderness Preservation System (NWPS) and asked managers about their perceived threats to the NWPS, the need for science information to support decisionmaking, the need for education and training, and the most important problems for managers in the...

  13. Information Dominance: Special Operations Forces in MOOTW.

    DTIC Science & Technology

    1997-04-15

    threats to our national security. In a rapidly changing world, S0F must be affordable yet technologically advanced to fully support emerging operational concepts and achieve critical information dominance for America in MOOTW.

  14. Women's Health: The Biggest Threats to Women's Health are often Preventable.

    MedlinePlus

    ... of Privacy Practices Notice of Nondiscrimination Manage Cookies Advertising Mayo Clinic is a not-for-profit organization and proceeds from Web advertising help support our mission. Mayo Clinic does not ...

  15. 32 CFR 245.21 - ESCAT air traffic priority list.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... aircraft post-maintenance test flights. (7) Federal aircraft post maintenance check flights in support of... identified as high threat targets. (c) Priority Three. (1) Forces being deployed or performing pre-deployment...

  16. 32 CFR 245.21 - ESCAT air traffic priority list.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... aircraft post-maintenance test flights. (7) Federal aircraft post maintenance check flights in support of... identified as high threat targets. (c) Priority Three. (1) Forces being deployed or performing pre-deployment...

  17. 32 CFR 245.21 - ESCAT air traffic priority list.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... aircraft post-maintenance test flights. (7) Federal aircraft post maintenance check flights in support of... identified as high threat targets. (c) Priority Three. (1) Forces being deployed or performing pre-deployment...

  18. 32 CFR 245.21 - ESCAT air traffic priority list.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... aircraft post-maintenance test flights. (7) Federal aircraft post maintenance check flights in support of... identified as high threat targets. (c) Priority Three. (1) Forces being deployed or performing pre-deployment...

  19. Cluster munitions: a threat to health and human rights.

    PubMed

    Parikh, Sujal M

    2010-01-01

    Over the course of 2009, dozens of nations signed a new convention on cluster munitions, and several nations ratified the convention. To determine how public health professionals can participate in preventing death and injury from cluster munitions, we review the history of these weapons, their effects on individuals and communities, the history of efforts to limit their use, the Convention on Cluster Munitions, and ways that health professionals can support efforts to ban their use. Cluster munitions are a threat to civilians in conflict and post-conflict settings. They render homes, farms and businesses dangerous and inaccessible, and delay resettlement after the end of a conflict. Health professionals have led efforts to limit the use and proliferation of other weapons, and global collaboration to support the Convention on Cluster Munitions would be a step towards protecting the public's health.

  20. Terrorism-related risk management for health care facilities.

    PubMed

    Reid, Daniel J; Reid, William H

    2005-01-01

    Clinicians should have a basic understanding of the physical and financial risk to mental health facilities related to external threat, such as (but not necessarily limited to) terrorism. Patient care and accessibility to mental health services rest not only on clinical skills, but on a place to practice them and an organized system supported by staff, physical facilities and funding. Clinicians who have some familiarity with the non-clinical requirements for care are in a position to support non-clinical staff in preventing care from being interrupted by external threats or events such as terrorist activity, and/or serving at the interface of facility operations and direct clinical care. Readers should note that this article is an introduction to the topic and cannot address all local, state, and national standards for hospital safety, or insurance providers' individual facility requirements.

Top