Sample records for target hazard threat

  1. Hazards and accessibility: combining and visualizing threat and open infrastructure data for disaster management

    NASA Astrophysics Data System (ADS)

    Tost, Jordi; Ehmel, Fabian; Heidmann, Frank; Olen, Stephanie M.; Bookhagen, Bodo

    2018-05-01

    The assessment of natural hazards and risk has traditionally been built upon the estimation of threat maps, which are used to depict potential danger posed by a particular hazard throughout a given area. But when a hazard event strikes, infrastructure is a significant factor that can determine if the situation becomes a disaster. The vulnerability of the population in a region does not only depend on the area's local threat, but also on the geographical accessibility of the area. This makes threat maps by themselves insufficient for supporting real-time decision-making, especially for those tasks that involve the use of the road network, such as management of relief operations, aid distribution, or planning of evacuation routes, among others. To overcome this problem, this paper proposes a multidisciplinary approach divided in two parts. First, data fusion of satellite-based threat data and open infrastructure data from OpenStreetMap, introducing a threat-based routing service. Second, the visualization of this data through cartographic generalization and schematization. This emphasizes critical areas along roads in a simple way and allows users to visually evaluate the impact natural hazards may have on infrastructure. We develop and illustrate this methodology with a case study of landslide threat for an area in Colombia.

  2. Threat Assessment of Hazardous Materials Transportation in Aircraft Cargo Compartments.

    DOT National Transportation Integrated Search

    1999-12-01

    The Volpe National Transportation Systems Center of the U.S. Department of Transportation's (DOT's) Research and Special Programs Administration (RSPA) has conducted a quantitative threat assessment for RSPA's Office of Hazardous Materials Safety (OH...

  3. Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon

    PubMed Central

    Jones, Robert; Wills, Brandon; Kang, Christopher

    2010-01-01

    Chlorine gas represents a hazardous material threat from industrial accidents and as a terrorist weapon. This review will summarize recent events involving chlorine disasters and its use by terrorists, discuss pre-hospital considerations and suggest strategies for the initial management for acute chlorine exposure events. PMID:20823965

  4. Assessing homeland chemical hazards outside the military gates: industrial hazard threat assessments for department of defense installations.

    PubMed

    Kirkpatrick, Jeffrey S; Howard, Jacqueline M; Reed, David A

    2002-04-08

    As part of comprehensive joint medical surveillance measures outlined by the Department of Defense, the US Army Center for Health Promotion and Preventive Medicine (USACHPPM) is beginning to assess environmental health threats to continental US military installations. A common theme in comprehensive joint medical surveillance, in support of Force Health Protection, is the identification and assessment of potential environmental health hazards, and the evaluation and documentation of actual exposures in both a continental US and outside a continental US setting. For the continental US assessments, the USACHPPM has utilized the US Environmental Protection Agency (EPA) database for risk management plans in accordance with Public Law 106-40, and the toxic release inventory database, in a state-of the art geographic information systems based program, termed the Consequence Assessment and Management Tool Set, or CATS, for assessing homeland industrial chemical hazards outside the military gates. As an example, the US EPA toxic release inventory and risk management plans databases are queried to determine the types and locations of industries surrounding a continental US military installation. Contaminants of concern are then ranked with respect to known toxicological and physical hazards, where they are then subject to applicable downwind hazard simulations using applicable meteorological and climatological data sets. The composite downwind hazard areas are mapped in relation to emergency response planning guidelines (ERPG), which were developed by the American Industrial Hygiene Association to assist emergency response personnel planning for catastrophic chemical releases. In addition, other geographic referenced data such as transportation routes, satellite imagery and population data are included in the operational, equipment, and morale risk assessment and management process. These techniques have been developed to assist military medical planners and operations

  5. Lava flow hazards-An impending threat at Miyakejima volcano, Japan

    NASA Astrophysics Data System (ADS)

    Cappello, Annalisa; Geshi, Nobuo; Neri, Marco; Del Negro, Ciro

    2015-12-01

    The majority of the historic eruptions recorded at Miyakejima volcano were fissure eruptions that occurred on the flanks of the volcano. During the last 1100 years, 17 fissure eruptions have been reported with a mean interval of about 76-78 years. In the last century, the mean interval between fissure eruptions decreased to 21-22 years, increasing significantly the threat of lava flow inundations to people and property. Here we quantify the lava flow hazards posed by effusive eruptions in Miyakejima by combining field data, numerical simulations and probability analysis. Our analysis is the first to assess both the spatiotemporal probability of vent opening, which highlights the areas most likely to host a new eruption, and the lava flow hazard, which shows the probabilities of lava-flow inundation in the next 50 years. Future eruptive vents are expected in the vicinity of the Hatchodaira caldera, radiating from the summit of the volcano toward the costs. Areas more likely to be threatened by lava flows are Ako and Kamitsuki villages, as well as Miike port and Miyakejima airport. Thus, our results can be useful for risk evaluation, investment decisions, and emergency response preparation.

  6. Natural Hazards - A National Threat

    USGS Publications Warehouse

    Geological Survey, U.S.

    2007-01-01

    The USGS Role in Reducing Disaster Losses -- In the United States each year, natural hazards cause hundreds of deaths and cost billions of dollars in disaster aid, disruption of commerce, and destruction of homes and critical infrastructure. Although the number of lives lost to natural hazards each year generally has declined, the economic cost of major disaster response and recovery continues to rise. Each decade, property damage from natural hazards events doubles or triples. The United States is second only to Japan in economic damages resulting from natural disasters. A major goal of the U.S. Geological Survey (USGS) is to reduce the vulnerability of the people and areas most at risk from natural hazards. Working with partners throughout all sectors of society, the USGS provides information, products, and knowledge to help build more resilient communities.

  7. Brain activation underlying threat detection to targets of different races.

    PubMed

    Senholzi, Keith B; Depue, Brendan E; Correll, Joshua; Banich, Marie T; Ito, Tiffany A

    2015-01-01

    The current study examined blood oxygen level-dependent signal underlying racial differences in threat detection. During functional magnetic resonance imaging, participants determined whether pictures of Black or White individuals held weapons. They were instructed to make shoot responses when the picture showed armed individuals but don't shoot responses to unarmed individuals, with the cost of not shooting armed individuals being greater than that of shooting unarmed individuals. Participants were faster to shoot armed Blacks than Whites, but faster in making don't shoot responses to unarmed Whites than Blacks. Brain activity differed to armed versus unarmed targets depending on target race, suggesting different mechanisms underlying threat versus safety decisions. Anterior cingulate cortex was preferentially engaged for unarmed Whites than Blacks. Parietal and visual cortical regions exhibited greater activity for armed Blacks than Whites. Seed-based functional connectivity of the amygdala revealed greater coherence with parietal and visual cortices for armed Blacks than Whites. Furthermore, greater implicit Black-danger associations were associated with increased amygdala activation to armed Blacks, compared to armed Whites. Our results suggest that different neural mechanisms may underlie racial differences in responses to armed versus unarmed targets.

  8. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  9. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    PubMed

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  10. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    PubMed Central

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2013-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232

  11. Earthquake hazards: a national threat

    USGS Publications Warehouse

    ,

    2006-01-01

    Earthquakes are one of the most costly natural hazards faced by the Nation, posing a significant risk to 75 million Americans in 39 States. The risks that earthquakes pose to society, including death, injury, and economic loss, can be greatly reduced by (1) better planning, construction, and mitigation practices before earthquakes happen, and (2) providing critical and timely information to improve response after they occur. As part of the multi-agency National Earthquake Hazards Reduction Program, the U.S. Geological Survey (USGS) has the lead Federal responsibility to provide notification of earthquakes in order to enhance public safety and to reduce losses through effective forecasts based on the best possible scientific information.

  12. Association between problematic alcohol use and reactivity to uncertain threat in two independent samples

    PubMed Central

    Gorka, Stephanie M.; Lieberman, Lynne; Phan, K. Luan; Shankman, Stewart A.

    2016-01-01

    Background Recent laboratory studies have shown that acute alcohol intoxication selectively and effectively dampens aversive responding to an uncertain threat. An emerging hypothesis is that individuals who exhibit heightened reactivity to an uncertain threat may be especially motivated to use alcohol to dampen their distress, setting the stage for negative reinforcement processes to drive excessive alcohol use. However, no study to date has directly examined whether current problematic drinkers exhibit heightened reactivity to an uncertain threat as would be expected. Methods The present study was therefore designed to examine the association between current problematic alcohol use and reactivity to an uncertain threat during sobriety in two, independent samples. In Study 1 (n = 221) and Study 2 (n = 74), adult participants completed the same well-validated threat-of-shock task which separately probes responses to temporally predictable and unpredictable threat. Startle potentiation was measured as an index of aversive responding. Problematic alcohol use was defined as number of binge episodes within the past 30 days in Study 1 and total scores on a self-report measure of hazardous drinking in Study 2. Results As hypothesized, across both studies greater levels of problematic drinking were associated with greater startle potentiation to an unpredictable threat. In Study 2, hazardous drinking scores were also positively associated with startle potentiation to predictable threat. Conclusions The findings are notably consistent with the notion that heightened reactivity to an uncertain threat is an important individual difference factor associated with the onset and/or maintenance of problematic drinking behaviors and may therefore be a novel prevention and intervention target. PMID:27173662

  13. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    PubMed

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  14. 40 CFR Appendix A to Part 300 - The Hazard Ranking System

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false The Hazard Ranking System A Appendix A to Part 300 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND... value. 4.1.4.3Environmental threat-targets. 4.1.4.3.1Sensitive environments. 4.1.4.3.1.1Level I...

  15. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  16. Los Angeles County Department of Public Health's Health Hazard Assessment: putting the "health" into hazard assessment.

    PubMed

    Dean, Brandon; Bagwell, Dee Ann; Dora, Vinita; Khan, Sinan; Plough, Alonzo

    2013-01-01

    A ll communities, explicitly or implicitly, assess and prepare for the natural and manmade hazards that they know could impact their community. The commonality of hazard-based threats in most all communities does not usually result in standard or evidence-based preparedness practice and outcomes across those communities. Without specific efforts to build a shared perspective and prioritization, "all-hazards" preparedness can result in a random hodgepodge of priorities and preparedness strategies, resulting in diminished emergency response capabilities. Traditional risk assessments, with a focus on physical infrastructure, do not present the potential health and medical impacts of specific hazards and threats. With the implementation of Centers for Disease Control and Prevention's capability-based planning, there is broad recognition that a health-focused hazard assessment process--that engages the "Whole of Community"--is needed. Los Angeles County's Health Hazard Assessment and Prioritization tool provides a practical and innovative approach to enhance existing planning capacities. Successful utilization of this tool can provide a way for local and state health agencies and officials to more effectively identify the health consequences related to hazard-specific threats and risk, determine priorities, and develop improved and better coordinated agency planning, including community engagement in prioritization.

  17. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  18. Planetary Asteroid Defense Study: Assessing and Responding to the Natural Space Debris Threat

    DTIC Science & Technology

    1995-04-01

    Spectrum of Natural Space Debris Effects 82 Figure 5-1. Threat is a Product of Hazard and Risk 84 Figure 5-2. Variables Affecting Threat...are perhaps the most unique family in the extra-belt region. Unlike other families who define their own orbits, the Trojans share Jupiter’s orbit...Threat. We define threat as the relationship between hazard and risk. It can be likened to a product of the two, notionally depicted in Figure 5-1

  19. System for ranking relative threats of U.S. volcanoes

    USGS Publications Warehouse

    Ewert, J.W.

    2007-01-01

    A methodology to systematically rank volcanic threat was developed as the basis for prioritizing volcanoes for long-term hazards evaluations, monitoring, and mitigation activities. A ranking of 169 volcanoes in the United States and the Commonwealth of the Northern Mariana Islands (U.S. volcanoes) is presented based on scores assigned for various hazard and exposure factors. Fifteen factors define the hazard: Volcano type, maximum known eruptive explosivity, magnitude of recent explosivity within the past 500 and 5,000 years, average eruption-recurrence interval, presence or potential for a suite of hazardous phenomena (pyroclastic flows, lahars, lava flows, tsunami, flank collapse, hydrothermal explosion, primary lahar), and deformation, seismic, or degassing unrest. Nine factors define exposure: a measure of ground-based human population in hazard zones, past fatalities and evacuations, a measure of airport exposure, a measure of human population on aircraft, the presence of power, transportation, and developed infrastructure, and whether or not the volcano forms a significant part of a populated island. The hazard score and exposure score for each volcano are multiplied to give its overall threat score. Once scored, the ordered list of volcanoes is divided into five overall threat categories from very high to very low. ?? 2007 ASCE.

  20. Method for detecting and avoiding flight hazards

    NASA Astrophysics Data System (ADS)

    von Viebahn, Harro; Schiefele, Jens

    1997-06-01

    Today's aircraft equipment comprise several independent warning and hazard avoidance systems like GPWS, TCAS or weather radar. It is the pilot's task to monitor all these systems and take the appropriate action in case of an emerging hazardous situation. The developed method for detecting and avoiding flight hazards combines all potential external threats for an aircraft into a single system. It is based on an aircraft surrounding airspace model consisting of discrete volume elements. For each element of the volume the threat probability is derived or computed from sensor output, databases, or information provided via datalink. The position of the own aircraft is predicted by utilizing a probability distribution. This approach ensures that all potential positions of the aircraft within the near future are considered while weighting the most likely flight path. A conflict detection algorithm initiates an alarm in case the threat probability exceeds a threshold. An escape manoeuvre is generated taking into account all potential hazards in the vicinity, not only the one which caused the alarm. The pilot gets a visual information about the type, the locating, and severeness o the threat. The algorithm was implemented and tested in a flight simulator environment. The current version comprises traffic, terrain and obstacle hazards avoidance functions. Its general formulation allows an easy integration of e.g. weather information or airspace restrictions.

  1. Identifying Hazards

    EPA Pesticide Factsheets

    The federal government has established a system of labeling hazardous materials to help identify the type of material and threat posed. Summaries of information on over 300 chemicals are maintained in the Envirofacts Master Chemical Integrator.

  2. Hurricane hazards: a national threat

    USGS Publications Warehouse

    ,

    2005-01-01

    Hurricanes bring destructive winds, storm surge, torrential rain, flooding, and tornadoes. A single storm can wreak havoc on coastal and inland communities and on natural areas over thousands of square miles. In 2005, Hurricanes Katrina, Rita, and Wilma demonstrated the devastation that hurricanes can inflict and the importance of hurricane hazards research and preparedness. More than half of the U.S. population lives within 50 miles of a coast, and this number is increasing. Many of these areas, especially the Atlantic and Gulf coasts, will be in the direct path of future hurricanes. Hawaii is also vulnerable to hurricanes.

  3. Modifications to risk-targeted seismic design maps for subduction and near-fault hazards

    USGS Publications Warehouse

    Liel, Abbie B.; Luco, Nicolas; Raghunandan, Meera; Champion, C.; Haukaas, Terje

    2015-01-01

    ASCE 7-10 introduced new seismic design maps that define risk-targeted ground motions such that buildings designed according to these maps will have 1% chance of collapse in 50 years. These maps were developed by iterative risk calculation, wherein a generic building collapse fragility curve is convolved with the U.S. Geological Survey hazard curve until target risk criteria are met. Recent research shows that this current approach may be unconservative at locations where the tectonic environment is much different than that used to develop the generic fragility curve. This study illustrates how risk-targeted ground motions at selected sites would change if generic building fragility curve and hazard assessment were modified to account for seismic risk from subduction earthquakes and near-fault pulses. The paper also explores the difficulties in implementing these changes.

  4. Threat Assessment and Targeted Violence at Institutions of Higher Education: Implications for Policy and Practice Including Unique Considerations for Community Colleges

    ERIC Educational Resources Information Center

    Bennett, Laura; Bates, Michael

    2015-01-01

    This article provides an overview of the research on targeted violence, including campus violence, and the implications for policy and practice at institutions of higher education. Unique challenges of threat assessment in the community college setting are explored, and an overview of an effective threat assessment policy and team at William…

  5. Attentional bias to threat in the general population is contingent on target competition, not on attentional control settings.

    PubMed

    Wirth, Benedikt Emanuel; Wentura, Dirk

    2018-04-01

    Dot-probe studies usually find an attentional bias towards threatening stimuli only in anxious participants. Here, we investigated under what conditions such a bias occurs in unselected samples. According to contingent-capture theory, an irrelevant cue only captures attention if it matches an attentional control setting. Therefore, we first tested the hypothesis that an attentional control setting tuned to threat must be activated in (non-anxious) individuals. In Experiment 1, we used a dot-probe task with a manipulation of attentional control settings ('threat' - set vs. control set). Surprisingly, we found an (anxiety-independent) attentional bias to angry faces that was not moderated by attentional control settings. Since we presented two stimuli (i.e., a target and a distractor) on the target screen in Experiment 1 (a necessity to realise the test of contingent capture), but most dot-probe studies only employ a single target, we conducted Experiment 2 to test the hypothesis that attentional bias in the general population is contingent on target competition. Participants performed a dot-probe task, involving presentation of a stand-alone target or a target competing with a distractor. We found an (anxiety-independent) attentional bias towards angry faces in the latter but not the former condition. This suggests that attentional bias towards angry faces in unselected samples is not contingent on attentional control settings but on target competition.

  6. EU alerting and reporting systems for potential chemical public health threats and hazards.

    PubMed

    Orford, R; Crabbe, H; Hague, C; Schaper, A; Duarte-Davidson, R

    2014-11-01

    A number of European and international IT platforms are used to notify competent authorities of new potential chemical exposures. Recently the European Parliament and the Council of European Union adopted new legislation that aims to improve the co-ordinated response to cross border health threats (Decision 1082/2013/EU). The Decision, inter alia, sets provisions on notification, ad hoc monitoring and coordination of public health measures following serious cross border threats to health from biological, chemical and environmental events as well as events that have an unknown origin. The legal instrument applies to all European Union Member States and is comparable to the International Health Regulations in its content, requirements and adoption of a multiple hazards approach. An inter-sectoral and multidisciplinary response to events with potentially dangerous cross border exposure pathways is often required. For example, European Poisons Centres may be aware of cases of toxic exposure to a product and, in parallel, trading standards may be aware of the same product due to a breach of consumer product standards. Whilst both cases would have been recorded for separate purposes in different alerting systems, they relate to the same exposure pathway; therefore a process for linking these records would allow a more robust approach to risk assessment and risk mitigation. The Decision seeks to reconcile this issue for serious threats by linking relevant platforms into one overarching higher level risk management IT platform called the Early Warning Response System (EWRS). This system will serve to link other sectors within the European Commission (EC) to public health (e.g. medicines), as well as other EU agencies and international bodies via co-notification features. Other European alert systems will be linked to EWRS to facilitate information sharing at both the assessment and management levels. This paper provides a timely overview of the main systems run by the EC

  7. Bundle Data Approach at GES DISC Targeting Natural Hazards

    NASA Technical Reports Server (NTRS)

    Shie, Chung-Lin; Shen, Suhung; Kempler, Steven J.

    2015-01-01

    Severe natural phenomena such as hurricane, volcano, blizzard, flood and drought have the potential to cause immeasurable property damages, great socioeconomic impact, and tragic loss of human life. From searching to assessing the Big, i.e., massive and heterogeneous scientific data (particularly, satellite and model products) in order to investigate those natural hazards, it has, however, become a daunting task for Earth scientists and applications researchers, especially during recent decades. The NASA Goddard Earth Sciences Data and Information Service Center (GES DISC) has served Big Earth science data, and the pertinent valuable information and services to the aforementioned users of diverse communities for years. In order to help and guide our users to online readily (i.e., with a minimum effort) acquire their requested data from our enormous resource at GES DISC for studying their targeted hazard event, we have thus initiated a Bundle Data approach in 2014, first targeting the hurricane event topic. We have recently worked on new topics such as volcano and blizzard. The bundle data of a specific hazard event is basically a sophisticated integrated data package consisting of a series of proper datasets containing a group of relevant (knowledge--based) data variables readily accessible to users via a system-prearranged table linking those data variables to the proper datasets (URLs). This online approach has been developed by utilizing a few existing data services such as Mirador as search engine; Giovanni for visualization; and OPeNDAP for data access, etc. The online Data Cookbook site at GES DISC is the current host for the bundle data. We are now also planning on developing an Automated Virtual Collection Framework that shall eventually accommodate the bundle data, as well as further improve our management in Big Data.

  8. "Bundle Data" Approach at GES DISC Targeting Natural Hazards

    NASA Astrophysics Data System (ADS)

    Shie, C. L.; Shen, S.; Kempler, S. J.

    2015-12-01

    Severe natural phenomena such as hurricane, volcano, blizzard, flood and drought have the potential to cause immeasurable property damages, great socioeconomic impact, and tragic loss of human life. From searching to assessing the "Big", i.e., massive and heterogeneous scientific data (particularly, satellite and model products) in order to investigate those natural hazards, it has, however, become a daunting task for Earth scientists and applications researchers, especially during recent decades. The NASA Goddard Earth Sciences Data and Information Service Center (GES DISC) has served "Big" Earth science data, and the pertinent valuable information and services to the aforementioned users of diverse communities for years. In order to help and guide our users to online readily (i.e., with a minimum effort) acquire their requested data from our enormous resource at GES DISC for studying their targeted hazard/event, we have thus initiated a "Bundle Data" approach in 2014, first targeting the hurricane event/topic. We have recently worked on new topics such as volcano and blizzard. The "bundle data" of a specific hazard/event is basically a sophisticated integrated data package consisting of a series of proper datasets containing a group of relevant ("knowledge-based") data variables readily accessible to users via a system-prearranged table linking those data variables to the proper datasets (URLs). This online approach has been developed by utilizing a few existing data services such as Mirador as search engine; Giovanni for visualization; and OPeNDAP for data access, etc. The online "Data Cookbook" site at GES DISC is the current host for the "bundle data". We are now also planning on developing an "Automated Virtual Collection Framework" that shall eventually accommodate the "bundle data", as well as further improve our management in "Big Data".

  9. Tsunami Hazards - A National Threat

    USGS Publications Warehouse

    ,

    2006-01-01

    In December 2004, when a tsunami killed more than 200,000 people in 11 countries around the Indian Ocean, the United States was reminded of its own tsunami risks. In fact, devastating tsunamis have struck North America before and are sure to strike again. Especially vulnerable are the five Pacific States--Hawaii, Alaska, Washington, Oregon, and California--and the U.S. Caribbean islands. In the wake of the Indian Ocean disaster, the United States is redoubling its efforts to assess the Nation's tsunami hazards, provide tsunami education, and improve its system for tsunami warning. The U.S. Geological Survey (USGS) is helping to meet these needs, in partnership with the National Oceanic and Atmospheric Administration (NOAA) and with coastal States and counties.

  10. Hydro-geomorphic connectivity and landslide features extraction to identifying potential threats and hazardous areas

    NASA Astrophysics Data System (ADS)

    Tarolli, Paolo; Fuller, Ian C.; Basso, Federica; Cavalli, Marco; Sofia, Giulia

    2017-04-01

    Hydro-geomorphic connectivity has significantly emerged as a new concept to understand the transfer of surface water and sediment through landscapes. A further scientific challenge is determining how the concept can be used to enable sustainable land and water management. This research proposes an interesting approach to integrating remote sensing techniques, connectivity theory, and geomorphometry based on high-resolution digital terrain model (HR-DTMs) to automatically extract landslides crowns and gully erosion, to determine the different rate of connectivity among the main extracted features and the river network, and thus determine a possible categorization of hazardous areas. The study takes place in two mountainous regions in the Wellington Region (New Zealand). The methodology is a three step approach. Firstly, we performed an automatic detection of the likely landslides crowns through the use of thresholds obtained by the statistical analysis of the variability of landform curvature. After that, the research considered the Connectivity Index to analyse how a complex and rugged topography induces large variations in erosion and sediment delivery in the two catchments. Lastly, the two methods have been integrated to create a unique procedure able to classify the different rate of connectivity among the main features and the river network and thus identifying potential threats and hazardous areas. The methodology is fast, and it can produce a detailed and updated inventory map that could be a key tool for erosional and sediment delivery hazard mitigation. This fast and simple method can be a useful tool to manage emergencies giving priorities to more failure-prone zones. Furthermore, it could be considered to do a preliminary interpretations of geomorphological phenomena and more in general, it could be the base to develop inventory maps. References Cavalli M, Trevisani S, Comiti F, Marchi L. 2013. Geomorphometric assessment of spatial sediment connectivity

  11. Guideline for assessing the performance of electric power systems in natural hazard and human threat events

    USGS Publications Warehouse

    Savage, W.U.; Nishenko, S.P.; Honegger, D.G.; Kempner, L.

    2006-01-01

    Electric power utilities are familiar with and skilled in preparing for and responding to almost-routine natural hazard events such as strong wind and ice storms and seasonal floods, as well as intentional human acts such as vandalism. Recent extreme weather (hurricanes Katrina and Rita), extremely destructive international earthquakes (in Sumatra and Pakistan), and nation-wide concerns regarding future terrorist attacks have increased the pressure on utilities to take appropriate steps to avoid being overwhelmed by such infrequent and exceedingly severe events. Determining what constitutes the appropriate steps to take requires various levels of understanding of the specific hazards and the risks faced by the utility. The American Lifelines Alliance (www. americanlifelinesalliance.org) has prepared a Guideline that provides clear, concise, and nationally-applicable guidance on determining the scope and level of effort necessary to assess power system performance in the wide range of natural hazard or human threat events. Included in this Guideline are specific procedures to follow and information to consider in performing standardized assessments. With the results of such assessments, utility owners can effectively establish and carry out risk management programs that will lead to achieving appropriate levels of performance in future events. The Guideline incorporates an inquiry-driven process with a two-phase performance assessment that can be applied to power systems of any size. The screening phase enables systems or components that are clearly not at risk to be screened out early. The subsequent analysis phase uses results from the screening phase to prioritize and allocate resources for more detailed assessments of hazard, vulnerability, and system performance. This process helps assure that the scope of the assessment meets the specific performance objectives of the inquiry. A case history is presented to illustrate the type of experience with an inquiry

  12. Workplace threats to health and job turnover among women workers.

    PubMed

    Gucer, Patricia W; Oliver, Marc; McDiarmid, Melissa

    2003-07-01

    Is job turnover related to concern about workplace health risks? Using data from a national sample of working women, we examined the relationships among workplace risk communications, worker concerns about workplace threats from hazardous substances, indoor air quality, and job change. Eight percent reported changing a job as a result of concern over workplace threats to health. Previous workplace injury predicted concern about hazardous materials and indoor air quality as well as job change, but employer communication about workplace health risks was associated with less job change and less concern about indoor air quality. Women worry about workplace threats to their health enough to change their jobs, but employers may have the power to cut turnover costs and reduce disruption to workers' lives through the use of risk communication programs.

  13. Warning Triggers in Environmental Hazards: Who Should Be Warned to Do What and When?

    PubMed

    Cova, Thomas J; Dennison, Philip E; Li, Dapeng; Drews, Frank A; Siebeneck, Laura K; Lindell, Michael K

    2017-04-01

    Determining the most effective public warnings to issue during a hazardous environmental event is a complex problem. Three primary questions need to be answered: Who should take protective action? What is the best action? and When should this action be initiated? Warning triggers provide a proactive means for emergency managers to simultaneously answer these questions by recommending that a target group take a specified protective action if a preset environmental trigger condition occurs (e.g., warn a community to evacuate if a wildfire crosses a proximal ridgeline). Triggers are used to warn the public across a wide variety of environmental hazards, and an improved understanding of their nature and role promises to: (1) advance protective action theory by unifying the natural, built, and social themes in hazards research into one framework, (2) reveal important information about emergency managers' risk perception, situational awareness, and threat assessment regarding threat behavior and public response, and (3) advance spatiotemporal models for representing the geography and timing of disaster warning and response (i.e., a coupled natural-built-social system). We provide an overview and research agenda designed to advance our understanding and modeling of warning triggers. © 2016 Society for Risk Analysis.

  14. Targeted violence against law enforcement officers.

    PubMed

    Schouten, Ronald; Brennan, Douglas V

    2016-09-01

    As highly visible representatives and guardians of society, law enforcement officers (LEOs) are very public figures. Injury or death in the line of duty, whether due to accidents or intentional acts of violence, is an occupational hazard for LEOs. Targeted assaults on police officers, referred to as ambushes in previous literature, are a particularly perplexing problem with significant implications for society at large. In the summer of 2016, the latest in a series of high-profile acts of violence aimed at police occurred, leading to increased examination of the acts themselves and their causes. This article examines recent trends in assaults on LEOs, focusing on predatory rather than reactive attacks, and applies a threat assessment model to a case of targeted violence against police. We use State of Washington v. Christopher Monfort (2015), a prosecution for arson, assault with intent to murder, and murder, as a case example, to examine how the threat assessment model, and the concepts of affective versus predatory violence help in understanding targeted violence against LEOs, assessing its risk, and managing it. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  15. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    PubMed

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  16. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. PMID:23736227

  17. Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode, and Target Cuing on Vigilance

    ERIC Educational Resources Information Center

    Parasuraman, Raja; de Visser, Ewart; Clarke, Ellen; McGarry, W. Ryan; Hussey, Elizabeth; Shaw, Tyler; Thompson, James C.

    2009-01-01

    Three experiments examined the vigilance performance of participants watching videos depicting intentional actions of an individual's hand reaching for and grasping an object--involving transporting or using either a gun or a hairdryer--in order to detect infrequent threat-related actions. Participants indicated detection of target actions either…

  18. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    PubMed

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  19. Hazard-Specific Vulnerability Mapping for Water Security in a Shale Gas Context

    NASA Astrophysics Data System (ADS)

    Allen, D. M.; Holding, S.; McKoen, Z.

    2015-12-01

    Northeast British Columbia (NEBC) is estimated to hold large reserves of unconventional natural gas and has experienced rapid growth in shale gas development activities over recent decades. Shale gas development has the potential to impact the quality and quantity of surface and ground water. Robust policies and sound water management are required to protect water security in relation to the water-energy nexus surrounding shale gas development. In this study, hazard-specific vulnerability mapping was conducted across NEBC to identify areas most vulnerable to water quality and quantity deterioration due to shale gas development. Vulnerability represents the combination of a specific hazard threat and the susceptibility of the water system to that threat. Hazard threats (i.e. potential contamination sources and water abstraction) were mapped spatially across the region. The shallow aquifer susceptibility to contamination was characterised using the DRASTIC aquifer vulnerability approach, while the aquifer susceptibility to abstraction was mapped according to aquifer productivity. Surface water susceptibility to contamination was characterised on a watershed basis to describe the propensity for overland flow (i.e. contaminant transport), while watershed discharge estimates were used to assess surface water susceptibility to water abstractions. The spatial distribution of hazard threats and susceptibility were combined to form hazard-specific vulnerability maps for groundwater quality, groundwater quantity, surface water quality and surface water quantity. The vulnerability maps identify priority areas for further research, monitoring and policy development. Priority areas regarding water quality occur where hazard threat (contamination potential) coincide with high aquifer susceptibility or high overland flow potential. Priority areas regarding water quantity occur where demand is estimated to represent a significant proportion of estimated supply. The identification

  20. Reactivity to unpredictable threat as a treatment target for fear-based anxiety disorders.

    PubMed

    Gorka, S M; Lieberman, L; Klumpp, H; Kinney, K L; Kennedy, A E; Ajilore, O; Francis, J; Duffecy, J; Craske, M G; Nathan, J; Langenecker, S; Shankman, S A; Phan, K L

    2017-10-01

    Heightened reactivity to unpredictable threat (U-threat) is a core individual difference factor underlying fear-based psychopathology. Little is known, however, about whether reactivity to U-threat is a stable marker of fear-based psychopathology or if it is malleable to treatment. The aim of the current study was to address this question by examining differences in reactivity to U-threat within patients before and after 12-weeks of selective serotonin reuptake inhibitors (SSRIs) or cognitive-behavioral therapy (CBT). Participants included patients with principal fear (n = 22) and distress/misery disorders (n = 29), and a group of healthy controls (n = 21) assessed 12-weeks apart. A well-validated threat-of-shock task was used to probe reactivity to predictable (P-) and U-threat and startle eyeblink magnitude was recorded as an index of defensive responding. Across both assessments, individuals with fear-based disorders displayed greater startle magnitude to U-threat relative to healthy controls and distress/misery patients (who did not differ). From pre- to post-treatment, startle magnitude during U-threat decreased only within the fear patients who received CBT. Moreover, within fear patients, the magnitude of decline in startle to U-threat correlated with the magnitude of decline in fear symptoms. For the healthy controls, startle to U-threat across the two time points was highly reliable and stable. Together, these results indicate that startle to U-threat characterizes fear disorder patients and is malleable to treatment with CBT but not SSRIs within fear patients. Startle to U-threat may therefore reflect an objective, psychophysiological indicator of fear disorder status and CBT treatment response.

  1. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    PubMed Central

    Pennington, Charlotte R.; McCann, Joseph J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females’ gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group’s ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females’ gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group’s gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat. PMID:29444126

  2. Stereotype Threat in Classroom Settings: The Interactive Effect of Domain Identification, Task Difficulty and Stereotype Threat on Female Students' Maths Performance

    ERIC Educational Resources Information Center

    Keller, Johannes

    2007-01-01

    Background: Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths…

  3. Threat and error management for anesthesiologists: a predictive risk taxonomy

    PubMed Central

    Ruskin, Keith J.; Stiegler, Marjorie P.; Park, Kellie; Guffey, Patrick; Kurup, Viji; Chidester, Thomas

    2015-01-01

    Purpose of review Patient care in the operating room is a dynamic interaction that requires cooperation among team members and reliance upon sophisticated technology. Most human factors research in medicine has been focused on analyzing errors and implementing system-wide changes to prevent them from recurring. We describe a set of techniques that has been used successfully by the aviation industry to analyze errors and adverse events and explain how these techniques can be applied to patient care. Recent findings Threat and error management (TEM) describes adverse events in terms of risks or challenges that are present in an operational environment (threats) and the actions of specific personnel that potentiate or exacerbate those threats (errors). TEM is a technique widely used in aviation, and can be adapted for the use in a medical setting to predict high-risk situations and prevent errors in the perioperative period. A threat taxonomy is a novel way of classifying and predicting the hazards that can occur in the operating room. TEM can be used to identify error-producing situations, analyze adverse events, and design training scenarios. Summary TEM offers a multifaceted strategy for identifying hazards, reducing errors, and training physicians. A threat taxonomy may improve analysis of critical events with subsequent development of specific interventions, and may also serve as a framework for training programs in risk mitigation. PMID:24113268

  4. Hazardous waste: cleanup and prevention

    USGS Publications Warehouse

    Vandas, Stephen; Cronin, Nancy L.; Farrar, Frank; Serrano, Guillermo Eliezer Ávila; Yajimovich, Oscar Efraín González; Muñoz, Aurora R.; Rivera, María del C.

    1996-01-01

    Our lifestyles are supported by complex Industrial activities that produce many different chemicals and chemical wastes. The Industries that produce our clothing, cars, medicines, paper, food, fuels, steel, plastics, and electric components use and discard thousands of chemicals every year. At home we may use lawn chemicals, solvents, disinfectants, cleaners, and auto products to Improve our quality of life. A chemical that presents a threat or unreasonable risk to people or the environment Is a hazardous material. When a hazardous material can no longer be used, It becomes a hazardous waste. Hazardous wastes come from a variety of sources, from both present and past activities. Impacts to human health and the environment can result from Improper handling and disposal of hazardous waste.

  5. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  6. A Prototype Flight-Deck Airflow Hazard Visualization System

    NASA Technical Reports Server (NTRS)

    Aragon, Cecilia R.

    2004-01-01

    Airflow hazards such as turbulence, vortices, or low-level wind shear can pose a threat to landing aircraft and are especially dangerous to helicopters. Because pilots usually cannot see airflow, they may be unaware of the extent of the hazard. We have developed a prototype airflow hazard visual display for use in helicopter cockpits to alleviate this problem. We report on the results of a preliminary usability study of our airflow hazard visualization system in helicopter-shipboard operations.

  7. Hazard identification and risk assessment for biologics targeting the immune system.

    PubMed

    Weir, Andrea B

    2008-01-01

    Biologic pharmaceuticals include a variety of products, such as monoclonal antibodies, fusion proteins and cytokines. Products in those classes include immunomodulatory biologics, which are intended to enhance or diminish the activity of the immune system. Immunomodulatory biologics have been approved by the U.S. FDA for a variety of indications, including cancer and inflammatory conditions. Prior to gaining approval for marketing, sponsoring companies for all types of products must demonstrate a product's safety in toxicology studies conducted in animals and show safety and efficacy in clinical trials conducted in patients. The overall goal of toxicology studies, which applies to immunomodulatory and other product types, is to identify the hazards that products pose to humans. Because biologics are generally highly selective for specific targets (receptors/epitopes), conducting toxicology studies in animal models with the target is essential. Such animals are referred to as pharmacologically relevant. Endpoints routinely included in toxicology studies, such as hematology, organ weight and histopathology, can be used to assess the effect of a product on the structure of the immune system. Additionally, specialized endpoints, such as immunophenotyping and immune function tests, can be used to define effects of immunomodulatory products on the immune system. Following hazard identification, risks posed to patients are assessed and managed. Risks can be managed through clinical trial design and risk communication, a practice that applies to immunomodulatory and other product types. Examples of risk management in clinical trial design include establishing a safe starting dose, defining the appropriate patient population and establishing appropriate patient monitoring. Risk communication starts during clinical trials and continues after product approval. A combination of hazard identification, risk assessment and risk management allows for drug development to proceed

  8. Worker training for new threats: a proposed framework.

    PubMed

    Mitchell, Clifford S; Doyle, Mary L; Moran, John B; Lippy, Bruce; Hughes, Joseph T; Lum, Max; Agnew, Jacqueline

    2004-11-01

    In an effort to identify health and safety training needs for various groups of workers related to weapons of mass destruction, including chemical, biological, radiological, and nuclear weapons and high yield explosives (CBRNE), a conference, "Worker Training in a New Era: Responding to New Threats," was held at the Johns Hopkins Bloomberg School of Public Health in October 2002. Two questions were addressed: Which general skills and knowledge are common to all workers who might be exposed to terrorist threats from CBRNE weapons? What are the particular skills and knowledge relevant to these threats that are specific to workers in different sectors? Thirteen core components for pre- and post-event training were identified. Pre-event training applies to all workers. Post-event training applies to selected personnel including first responders, skilled support personnel, and other workers involved in these operations. Recommendations to improve worker safety training related to preparedness include: identify specific competencies for worker pre- and post-event training; coordinate Federal policy on worker training for CBRNE hazards; adopt federal guidelines or standards on worker training for new CBRNE threats, based on the competencies and coordinated Federal policy; conduct an inventory of training programs and other resources that could be used or adapted for use for new threats; and develop new training content and methods for pre- and post-event training to address specific competencies. Given the possibility for the introduction of CBRNE threats into the workplace, all workers need some training in the potential hazards involved: the individual worker's specific role in an emergency; incident command; activation of the emergency notification system; use of personal protective equipment (PPE); and safe evacuation of the workplace. While some occupational sectors have developed effective training related to these new threats, there is a need to develop, implement

  9. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  10. Development of an Online Hazards Atlas to Improve Disaster Awareness

    ERIC Educational Resources Information Center

    Battersby, Sarah E.; Mitchell, Jerry T.; Cutter, Susan L.

    2011-01-01

    Understanding the causes, effects and geographic patterns of local hazards is important for helping individuals make educated decisions about how to respond to their threat. Unfortunately, it is often difficult to find comprehensive sources of information about local hazards. In this paper, we discuss the development of an online hazards atlas for…

  11. Heterogeneous Defensive Naval Weapon Assignment To Swarming Threats In Real Time

    DTIC Science & Technology

    2016-03-01

    threat Damage potential of target t if it hits the ship [integer from 0 to 3] _ ttarget phit Probability that target t hits the ship [probability...secondary weapon systems on target t [integer] _ tsec phit Probability that secondary weapon systems launched from target t hit the ship...pairing. These parameters are calculated as follows: 310 _ _t t tpriority target threat target phit = × × (3.1) 3_ 10 _ _t t tsec priority sec

  12. Probabilistic tsunami hazard analysis: Multiple sources and global applications

    USGS Publications Warehouse

    Grezio, Anita; Babeyko, Andrey; Baptista, Maria Ana; Behrens, Jörn; Costa, Antonio; Davies, Gareth; Geist, Eric L.; Glimsdal, Sylfest; González, Frank I.; Griffin, Jonathan; Harbitz, Carl B.; LeVeque, Randall J.; Lorito, Stefano; Løvholt, Finn; Omira, Rachid; Mueller, Christof; Paris, Raphaël; Parsons, Thomas E.; Polet, Jascha; Power, William; Selva, Jacopo; Sørensen, Mathilde B.; Thio, Hong Kie

    2017-01-01

    Applying probabilistic methods to infrequent but devastating natural events is intrinsically challenging. For tsunami analyses, a suite of geophysical assessments should be in principle evaluated because of the different causes generating tsunamis (earthquakes, landslides, volcanic activity, meteorological events, and asteroid impacts) with varying mean recurrence rates. Probabilistic Tsunami Hazard Analyses (PTHAs) are conducted in different areas of the world at global, regional, and local scales with the aim of understanding tsunami hazard to inform tsunami risk reduction activities. PTHAs enhance knowledge of the potential tsunamigenic threat by estimating the probability of exceeding specific levels of tsunami intensity metrics (e.g., run-up or maximum inundation heights) within a certain period of time (exposure time) at given locations (target sites); these estimates can be summarized in hazard maps or hazard curves. This discussion presents a broad overview of PTHA, including (i) sources and mechanisms of tsunami generation, emphasizing the variety and complexity of the tsunami sources and their generation mechanisms, (ii) developments in modeling the propagation and impact of tsunami waves, and (iii) statistical procedures for tsunami hazard estimates that include the associated epistemic and aleatoric uncertainties. Key elements in understanding the potential tsunami hazard are discussed, in light of the rapid development of PTHA methods during the last decade and the globally distributed applications, including the importance of considering multiple sources, their relative intensities, probabilities of occurrence, and uncertainties in an integrated and consistent probabilistic framework.

  13. Probabilistic Tsunami Hazard Analysis: Multiple Sources and Global Applications

    NASA Astrophysics Data System (ADS)

    Grezio, Anita; Babeyko, Andrey; Baptista, Maria Ana; Behrens, Jörn; Costa, Antonio; Davies, Gareth; Geist, Eric L.; Glimsdal, Sylfest; González, Frank I.; Griffin, Jonathan; Harbitz, Carl B.; LeVeque, Randall J.; Lorito, Stefano; Løvholt, Finn; Omira, Rachid; Mueller, Christof; Paris, Raphaël.; Parsons, Tom; Polet, Jascha; Power, William; Selva, Jacopo; Sørensen, Mathilde B.; Thio, Hong Kie

    2017-12-01

    Applying probabilistic methods to infrequent but devastating natural events is intrinsically challenging. For tsunami analyses, a suite of geophysical assessments should be in principle evaluated because of the different causes generating tsunamis (earthquakes, landslides, volcanic activity, meteorological events, and asteroid impacts) with varying mean recurrence rates. Probabilistic Tsunami Hazard Analyses (PTHAs) are conducted in different areas of the world at global, regional, and local scales with the aim of understanding tsunami hazard to inform tsunami risk reduction activities. PTHAs enhance knowledge of the potential tsunamigenic threat by estimating the probability of exceeding specific levels of tsunami intensity metrics (e.g., run-up or maximum inundation heights) within a certain period of time (exposure time) at given locations (target sites); these estimates can be summarized in hazard maps or hazard curves. This discussion presents a broad overview of PTHA, including (i) sources and mechanisms of tsunami generation, emphasizing the variety and complexity of the tsunami sources and their generation mechanisms, (ii) developments in modeling the propagation and impact of tsunami waves, and (iii) statistical procedures for tsunami hazard estimates that include the associated epistemic and aleatoric uncertainties. Key elements in understanding the potential tsunami hazard are discussed, in light of the rapid development of PTHA methods during the last decade and the globally distributed applications, including the importance of considering multiple sources, their relative intensities, probabilities of occurrence, and uncertainties in an integrated and consistent probabilistic framework.

  14. Focused study of interweaving hazards across the Caribbean

    NASA Astrophysics Data System (ADS)

    Braun, John J.; Mattioli, Glen S.; Calais, Eric; Carlson, David; Dixon, Timothy H.; Jackson, Michael E.; Kursinski, E. Robert; Mora-Paez, Hector; Miller, M. Meghan; Pandya, Rajul; Robertson, Richard; Wang, Guoquan

    2012-02-01

    The Caribbean is a region of lush vegetation, beaches, active volcanoes, and significant mountain ranges, all of which create a natural aesthetic that is recognized globally. Yet these very same features, molded through geological, oceanic, and atmospheric processes, also pose natural hazards for the developing countries in the Caribbean. The rise in population density, migration to coastal areas, and substandard building practices, combined with the threat of natural hazards, put the region's human population at risk for particularly devastating disasters. These demographic and social characteristics exist against a backdrop of the threat of an evolving climate, which produces a more vigorous hurricane environment and a rising average sea level.

  15. Is Your School Sick? Five Threats to Healthy Schools.

    ERIC Educational Resources Information Center

    Grubb, Deborah; Diamantes, Thomas

    1998-01-01

    Examines the five major threats to healthy school buildings: sick building syndrome; health-threatening building materials; environmental hazards such as radon gas and asbestos; lead poisoning; and general indoor air quality. Discusses ways to assess and address them. (SR)

  16. Major Threats to Environmental Quality in North America.

    ERIC Educational Resources Information Center

    Vogl, Robert; And Others

    1986-01-01

    Reports study findings of environmental educators' opinions on issues which pose threats to environmental quality in North America and the status of the availability of educational materials for the issues. Identified as priority items were hazardous wastes management, water contamination, and acid deposition. Compares responses of American and…

  17. Using expert opinion surveys to rank threats to endangered species: a case study with sea turtles.

    PubMed

    Donlan, C Josh; Wingfield, Dana K; Crowder, Larry B; Wilcox, Chris

    2010-12-01

    Little is known about how specific anthropogenic hazards affect the biology of organisms. Quantifying the effect of regional hazards is particularly challenging for species such as sea turtles because they are migratory, difficult to study, long lived, and face multiple anthropogenic threats. Expert elicitation, a technique used to synthesize opinions of experts while assessing uncertainty around those views, has been in use for several decades in the social science and risk assessment sectors. We conducted an internet-based survey to quantify expert opinion on the relative magnitude of anthropogenic hazards to sea turtle populations at the regional level. Fisheries bycatch and coastal development were most often ranked as the top hazards to sea turtle species in a geographic region. Nest predation and direct take followed as the second and third greatest threats, respectively. Survey results suggest most experts believe sea turtles are threatened by multiple factors, including substantial at-sea threats such as fisheries bycatch. Resources invested by the sea turtle community, however, appear biased toward terrestrial-based impacts. Results from the survey are useful for conservation planning because they provide estimates of relative impacts of hazards on sea turtles and a measure of consensus on the magnitude of those impacts among researchers and practitioners. Our survey results also revealed patterns of expert bias, which we controlled for in our analysis. Respondents with no experience with respect to a sea turtle species tended to rank hazards affecting that sea turtle species higher than respondents with experience. A more-striking pattern was with hazard-based expertise: the more experience a respondent had with a specific hazard, the higher the respondent scored the impact of that hazard on sea turtle populations. Bias-controlled expert opinion surveys focused on threatened species and their hazards can help guide and expedite species recovery plans.

  18. Stress-induced cortisol facilitates threat-related decision making among police officers.

    PubMed

    Akinola, Modupe; Mendes, Wendy Berry

    2012-02-01

    Previous research suggests that cortisol can affect cognitive functions such as memory, decision making, and attentiveness to threat-related cues. Here, we examine whether increases in cortisol, brought on by an acute social stressor, influence threat-related decision making. Eighty-one police officers completed a standardized laboratory stressor and then immediately completed a computer simulated decision-making task designed to examine decisions to accurately shoot or not shoot armed and unarmed Black and White targets. Results indicated that police officers who had larger cortisol increases to the social-stress task subsequently made fewer errors when deciding to shoot armed Black targets relative to armed White targets, suggesting that hypothalamic pituitary adrenal (HPA) activation may exacerbate vigilance for threat cues. We conclude with a discussion of the implications of threat-initiated decision making.

  19. Multiple kernel based feature and decision level fusion of iECO individuals for explosive hazard detection in FLIR imagery

    NASA Astrophysics Data System (ADS)

    Price, Stanton R.; Murray, Bryce; Hu, Lequn; Anderson, Derek T.; Havens, Timothy C.; Luke, Robert H.; Keller, James M.

    2016-05-01

    A serious threat to civilians and soldiers is buried and above ground explosive hazards. The automatic detection of such threats is highly desired. Many methods exist for explosive hazard detection, e.g., hand-held based sensors, downward and forward looking vehicle mounted platforms, etc. In addition, multiple sensors are used to tackle this extreme problem, such as radar and infrared (IR) imagery. In this article, we explore the utility of feature and decision level fusion of learned features for forward looking explosive hazard detection in IR imagery. Specifically, we investigate different ways to fuse learned iECO features pre and post multiple kernel (MK) support vector machine (SVM) based classification. Three MK strategies are explored; fixed rule, heuristics and optimization-based. Performance is assessed in the context of receiver operating characteristic (ROC) curves on data from a U.S. Army test site that contains multiple target and clutter types, burial depths and times of day. Specifically, the results reveal two interesting things. First, the different MK strategies appear to indicate that the different iECO individuals are all more-or-less important and there is not a dominant feature. This is reinforcing as our hypothesis was that iECO provides different ways to approach target detection. Last, we observe that while optimization-based MK is mathematically appealing, i.e., it connects the learning of the fusion to the underlying classification problem we are trying to solve, it appears to be highly susceptible to over fitting and simpler, e.g., fixed rule and heuristics approaches help us realize more generalizable iECO solutions.

  20. People living under threat of volcanic hazard in southern Iceland: vulnerability and risk perception

    NASA Astrophysics Data System (ADS)

    Jóhannesdóttir, G.; Gísladóttir, G.

    2010-02-01

    Residents in the village of Vík and in the farming community of Álftaver in southern Iceland are living with the threat of volcanic hazards. The highly active subglacial volcano Katla has erupted approximately twice per century since the beginning of settlement around 874 AD. The last major eruption was in 1918 and Katla has recently entered an agitated stage. The purpose of this research was to (1) review residents' responses in relation to vulnerability, (2) examine their risk perception, preparedness and mitigation in relation to an eruption of Katla, and (3) investigate the public and the representative of the local authorities and emergency manager's knowledge of the official evacuation plan. In 2004, we conducted in-depth, face-to-face interviews with local residents using a snowball sample technique. All participants were permanent residents of the two communities, between the ages of 25-95 and most had lived in the area their entire lives. Regardless of the residents' knowledge about past volcanic activity of Katla and the associated future risk, many residents were doubtful about the imminent eruption forecast by scientists and they believed that the volcano is no longer active. In both communities, different social, cultural and economic factors played a central role in how people perceived natural hazards and how they dealt with the fact that their lives and livelihoods could be at risk. The participants had good knowledge about the existing evacuation plan and had participated in evacuation exercises. However, they had not made personal mitigation or preparedness plans in the event of a future eruption. In contrast to the residents of Vík, the inhabitants in Álftaver are concerned about the evacuation process and found it very confusing; they neither found the emergency plan nor the proposed methods for risk communication relevant for their farming community. The perception of the inhabitants, especially in Álftaver, does not correspond to those

  1. ThinkHazard!: an open-source, global tool for understanding hazard information

    NASA Astrophysics Data System (ADS)

    Fraser, Stuart; Jongman, Brenden; Simpson, Alanna; Nunez, Ariel; Deparday, Vivien; Saito, Keiko; Murnane, Richard; Balog, Simone

    2016-04-01

    Rapid and simple access to added-value natural hazard and disaster risk information is a key issue for various stakeholders of the development and disaster risk management (DRM) domains. Accessing available data often requires specialist knowledge of heterogeneous data, which are often highly technical and can be difficult for non-specialists in DRM to find and exploit. Thus, availability, accessibility and processing of these information sources are crucial issues, and an important reason why many development projects suffer significant impacts from natural hazards. The World Bank's Global Facility for Disaster Reduction and Recovery (GFDRR) is currently developing a new open-source tool to address this knowledge gap: ThinkHazard! The main aim of the ThinkHazard! project is to develop an analytical tool dedicated to facilitating improvements in knowledge and understanding of natural hazards among non-specialists in DRM. It also aims at providing users with relevant guidance and information on handling the threats posed by the natural hazards present in a chosen location. Furthermore, all aspects of this tool will be open and transparent, in order to give users enough information to understand its operational principles. In this presentation, we will explain the technical approach behind the tool, which translates state-of-the-art probabilistic natural hazard data into understandable hazard classifications and practical recommendations. We will also demonstrate the functionality of the tool, and discuss limitations from a scientific as well as an operational perspective.

  2. Spatially explicit risk approach for multi-hazard assessment and management in marine environment: The case study of the Adriatic Sea.

    PubMed

    Furlan, Elisa; Torresan, Silvia; Critto, Andrea; Marcomini, Antonio

    2018-03-15

    In the last few decades the health of marine ecosystems has been progressively endangered by the anthropogenic presence. Natural and human-made pressures, as well as climate change effects, are posing increasing threats on marine areas, triggering alteration of biological, chemical and physical processes. Planning of marine areas has become a challenge for decision makers involved in the design of sustainable management options. In order to address threats posed by climate drivers in combination with local to regional anthropogenic pressures affecting marine ecosystems and activities, a multi-hazard assessment methodology was developed and applied to the Adriatic Sea for the reference scenario 2000-2015. Through a four-stages process based on the consecutive analysis of hazard, exposure, vulnerability and risk the methodology allows a semi-quantitative evaluation of the relative risk from anthropogenic and natural sources to multiple endpoints, thus supporting the identification and ranking of areas and targets more likely to be at risk. Resulting output showed that the higher relative hazard scores are linked to exogenic pressures (e.g. sea surface temperature variation) while the lower ones resulted from endogenic and more localized stressors (e.g. abrasion, nutrient input). Relatively very high scores were observed for vulnerability over the whole case study for almost all the considered pressures, showing seagrasses meadows, maërl and coral beds as the most susceptible targets. The approach outlined in this study provides planners and decision makers a quick-screening tool to evaluate progress towards attaining a good environmental status and to identify marine areas where management actions and adaptation strategies would be best targeted. Moreover, by focusing on risks induced by land-based drivers, resulting output can support the design of infrastructures for reducing pressures on the sea, contributing to improve the land-sea interface management

  3. Temporal allocation of attention toward threat in individuals with posttraumatic stress symptoms.

    PubMed

    Amir, Nader; Taylor, Charles T; Bomyea, Jessica A; Badour, Christal L

    2009-12-01

    Research suggests that individuals with posttraumatic stress disorder (PTSD) selectively attend to threat-relevant information. However, little is known about how initial detection of threat influences the processing of subsequently encountered stimuli. To address this issue, we used a rapid serial visual presentation paradigm (RSVP; Raymond, J. E., Shapiro, K. L., & Arnell, K. M. (1992). Temporary suppression of visual processing in an RSVP task: An attentional blink? Journal of Experimental Psychology: Human Perception and Performance, 18, 849-860) to examine temporal allocation of attention to threat-related and neutral stimuli in individuals with PTSD symptoms (PTS), traumatized individuals without PTSD symptoms (TC), and non-anxious controls (NAC). Participants were asked to identify one or two targets in an RSVP stream. Typically processing of the first target decreases accuracy of identifying the second target as a function of the temporal lag between targets. Results revealed that the PTS group was significantly more accurate in detecting a neutral target when it was presented 300 or 500ms after threat-related stimuli compared to when the target followed neutral stimuli. These results suggest that individuals with PTSD may process trauma-relevant information more rapidly and efficiently than benign information.

  4. Fear-related behaviors in situations of mass threat

    PubMed Central

    Espinola, Maria; Shultz, James M.; Espinel, Zelde; Althouse, Benjamin M.; Cooper, Janice L.; Baingana, Florence; Marcelin, Louis Herns; Cela, Toni; Towers, Sherry; Mazurik, Laurie; Greene, M. Claire; Beck, Alyssa; Fredrickson, Michelle; McLean, Andrew; Rechkemmer, Andreas

    2016-01-01

    ABSTRACT This Disaster Health Briefing focuses on the work of an expanding team of researchers that is exploring the dynamics of fear-related behaviors in situations of mass threat. Fear-related behaviors are individual or collective behaviors and actions initiated in response to fear reactions that are triggered by a perceived threat or actual exposure to a potentially traumatizing event. Importantly, fear-related behaviors modulate the future risk of harm. Disaster case scenarios are presented to illustrate how fear-related behaviors operate when a potentially traumatic event threatens or endangers the physical and/or psychological health, wellbeing, and integrity of a population. Fear-related behaviors may exacerbate harm, leading to severe and sometimes deadly consequences as exemplified by the Ebola pandemic in West Africa. Alternatively, fear-related behaviors may be channeled in a constructive and life-saving manner to motivate protective behaviors that mitigate or prevent harm, depending upon the nature of the threat scenario that is confronting the population. The interaction between fear-related behaviors and a mass threat is related to the type, magnitude, and consequences of the population encounter with the threat or hazard. The expression of FRBs, ranging from risk exacerbation to risk reduction, is also influenced by such properties of the threat as predictability, familiarity, controllability, preventability, and intentionality. PMID:28265486

  5. 21 CFR 2.5 - Imminent hazard to the public health.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 1 2014-04-01 2014-04-01 false Imminent hazard to the public health. 2.5 Section... GENERAL ADMINISTRATIVE RULINGS AND DECISIONS General Provisions § 2.5 Imminent hazard to the public health... a significant threat of danger to health, creates a public health situation (1) that should be...

  6. 21 CFR 2.5 - Imminent hazard to the public health.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 1 2013-04-01 2013-04-01 false Imminent hazard to the public health. 2.5 Section... GENERAL ADMINISTRATIVE RULINGS AND DECISIONS General Provisions § 2.5 Imminent hazard to the public health... a significant threat of danger to health, creates a public health situation (1) that should be...

  7. 21 CFR 2.5 - Imminent hazard to the public health.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Imminent hazard to the public health. 2.5 Section... GENERAL ADMINISTRATIVE RULINGS AND DECISIONS General Provisions § 2.5 Imminent hazard to the public health... a significant threat of danger to health, creates a public health situation (1) that should be...

  8. 21 CFR 2.5 - Imminent hazard to the public health.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Imminent hazard to the public health. 2.5 Section... GENERAL ADMINISTRATIVE RULINGS AND DECISIONS General Provisions § 2.5 Imminent hazard to the public health... a significant threat of danger to health, creates a public health situation (1) that should be...

  9. 21 CFR 2.5 - Imminent hazard to the public health.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Imminent hazard to the public health. 2.5 Section... GENERAL ADMINISTRATIVE RULINGS AND DECISIONS General Provisions § 2.5 Imminent hazard to the public health... a significant threat of danger to health, creates a public health situation (1) that should be...

  10. Threats to Feminist Identity and Reactions to Gender Discrimination.

    PubMed

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists ( M age  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed.

  11. Assessing Homeland Chemical Hazards Outside the Military Gates: Industrial Hazard Threat Assessments for Department of Defense Installations

    DTIC Science & Technology

    2002-01-01

    catastrophic health consequences , resulting from potential exposures to industrial chemicals (Armed Forces Medical Intelligence Center, 1998). These...susceptible to damage from a toxic industrial material release. For this second component, the Consequence Assessment Tools Set (CATS) (Defense Threat...accidental toxic industrial material release, the severity of the release, and any associated consequences that might occur. These are based on estimated

  12. Search for Two Categories of Target Produces Fewer Fixations to Target-Color Items

    ERIC Educational Resources Information Center

    Menneer, Tamaryn; Stroud, Michael J.; Cave, Kyle R.; Li, Xingshan; Godwin, Hayward J.; Liversedge, Simon P.; Donnelly, Nick

    2012-01-01

    Searching simultaneously for metal threats (guns and knives) and improvised explosive devices (IEDs) in X-ray images is less effective than 2 independent single-target searches, 1 for metal threats and 1 for IEDs. The goals of this study were to (a) replicate this dual-target cost for categorical targets and to determine whether the cost remains…

  13. Environmental threats to children's health in Southeast Asia and the Western Pacific.

    PubMed Central

    Suk, William A; Ruchirawat, Kuhnying Mathuros; Balakrishnan, Kalpana; Berger, Martha; Carpenter, David; Damstra, Terri; de Garbino, Jenny Pronczuk; Koh, David; Landrigan, Philip J; Makalinao, Irma; Sly, Peter D; Xu, Y; Zheng, B S

    2003-01-01

    The Southeast Asia and Western Pacific regions contain half of the world's children and are among the most rapidly industrializing regions of the globe. Environmental threats to children's health are widespread and are multiplying as nations in the area undergo industrial development and pass through the epidemiologic transition. These environmental hazards range from traditional threats such as bacterial contamination of drinking water and wood smoke in poorly ventilated dwellings to more recently introduced chemical threats such as asbestos construction materials; arsenic in groundwater; methyl isocyanate in Bhopal, India; untreated manufacturing wastes released to landfills; chlorinated hydrocarbon and organophosphorous pesticides; and atmospheric lead emissions from the combustion of leaded gasoline. To address these problems, pediatricians, environmental health scientists, and public health workers throughout Southeast Asia and the Western Pacific have begun to build local and national research and prevention programs in children's environmental health. Successes have been achieved as a result of these efforts: A cost-effective system for producing safe drinking water at the village level has been devised in India; many nations have launched aggressive antismoking campaigns; and Thailand, the Philippines, India, and Pakistan have all begun to reduce their use of lead in gasoline, with resultant declines in children's blood lead levels. The International Conference on Environmental Threats to the Health of Children, held in Bangkok, Thailand, in March 2002, brought together more than 300 representatives from 35 countries and organizations to increase awareness on environmental health hazards affecting children in these regions and throughout the world. The conference, a direct result of the Environmental Threats to the Health of Children meeting held in Manila in April 2000, provided participants with the latest scientific data on children's vulnerability to

  14. Environmental threats to children's health in Southeast Asia and the Western Pacific.

    PubMed

    Suk, William A; Ruchirawat, Kuhnying Mathuros; Balakrishnan, Kalpana; Berger, Martha; Carpenter, David; Damstra, Terri; de Garbino, Jenny Pronczuk; Koh, David; Landrigan, Philip J; Makalinao, Irma; Sly, Peter D; Xu, Y; Zheng, B S

    2003-08-01

    The Southeast Asia and Western Pacific regions contain half of the world's children and are among the most rapidly industrializing regions of the globe. Environmental threats to children's health are widespread and are multiplying as nations in the area undergo industrial development and pass through the epidemiologic transition. These environmental hazards range from traditional threats such as bacterial contamination of drinking water and wood smoke in poorly ventilated dwellings to more recently introduced chemical threats such as asbestos construction materials; arsenic in groundwater; methyl isocyanate in Bhopal, India; untreated manufacturing wastes released to landfills; chlorinated hydrocarbon and organophosphorous pesticides; and atmospheric lead emissions from the combustion of leaded gasoline. To address these problems, pediatricians, environmental health scientists, and public health workers throughout Southeast Asia and the Western Pacific have begun to build local and national research and prevention programs in children's environmental health. Successes have been achieved as a result of these efforts: A cost-effective system for producing safe drinking water at the village level has been devised in India; many nations have launched aggressive antismoking campaigns; and Thailand, the Philippines, India, and Pakistan have all begun to reduce their use of lead in gasoline, with resultant declines in children's blood lead levels. The International Conference on Environmental Threats to the Health of Children, held in Bangkok, Thailand, in March 2002, brought together more than 300 representatives from 35 countries and organizations to increase awareness on environmental health hazards affecting children in these regions and throughout the world. The conference, a direct result of the Environmental Threats to the Health of Children meeting held in Manila in April 2000, provided participants with the latest scientific data on children's vulnerability to

  15. Critical asset and portfolio risk analysis: an all-hazards framework.

    PubMed

    Ayyub, Bilal M; McGill, William L; Kaminskiy, Mark

    2007-08-01

    This article develops a quantitative all-hazards framework for critical asset and portfolio risk analysis (CAPRA) that considers both natural and human-caused hazards. Following a discussion on the nature of security threats, the need for actionable risk assessments, and the distinction between asset and portfolio-level analysis, a general formula for all-hazards risk analysis is obtained that resembles the traditional model based on the notional product of consequence, vulnerability, and threat, though with clear meanings assigned to each parameter. Furthermore, a simple portfolio consequence model is presented that yields first-order estimates of interdependency effects following a successful attack on an asset. Moreover, depending on the needs of the decisions being made and available analytical resources, values for the parameters in this model can be obtained at a high level or through detailed systems analysis. Several illustrative examples of the CAPRA methodology are provided.

  16. Performance estimation for threat detection in CT systems

    NASA Astrophysics Data System (ADS)

    Montgomery, Trent; Karl, W. Clem; Castañón, David A.

    2017-05-01

    Detecting the presence of hazardous materials in suitcases and carry-on luggage is an important problem in aviation security. As the set of threats is expanding, there is a corresponding need to increase the capabilities of explosive detection systems to address these threats. However, there is a lack of principled tools for predicting the performance of alternative designs for detection systems. In this paper, we describe an approach for computing bounds on the achievable classification performance of material discrimination systems based on empirical statistics that estimate the f-divergence of the underlying features. Our approach can be used to examine alternative physical observation modalities and measurement configurations, as well as variations in reconstruction and feature extraction algorithms.

  17. The Impact of Age Stereotypes on Older Adults' Hazard Perception Performance and Driving Confidence.

    PubMed

    Chapman, Lyn; Sargent-Cox, Kerry; Horswill, Mark S; Anstey, Kaarin J

    2016-06-01

    This study examined the effect of age-stereotype threat on older adults' performance on a task measuring hazard perception performance in driving. The impact of age-stereotype threat in relation to the value participants placed on driving and pre- and post-task confidence in driving ability was also investigated. Eighty-six adults aged from 65 years of age completed a questionnaire measuring demographic information, driving experience, self-rated health, driving importance, and driving confidence. Prior to undertaking a timed hazard perception task, participants were exposed to either negative or positive age stereotypes. Results showed that age-stereotype threats, while not influencing hazard perception performance, significantly reduced post-driving confidence compared with pre-driving confidence for those in the negative prime condition. This finding builds on the literature that has found that stereotype-based influences cannot simply be understood in terms of performance outcomes alone and may be relevant to factors affected by confidence such as driving cessation decisions. © The Author(s) 2014.

  18. Stochastic model for threat assessment in multi-sensor defense system

    NASA Astrophysics Data System (ADS)

    Wang, Yongcheng; Wang, Hongfei; Jiang, Changsheng

    2007-11-01

    This paper puts forward a stochastic model for target detecting and tracking in multi-sensor defense systems and applies the Lanchester differential equations to threat assessment in combat. The two different modes of targets tracking and their respective Lanchester differential equations are analyzed and established. By use of these equations, we could briefly estimate the loss of each combat side and accordingly get the threat estimation results, given the situation analysis is accomplished.

  19. Threat interferes with response inhibition.

    PubMed

    Hartikainen, Kaisa M; Siiskonen, Anna R; Ogawa, Keith H

    2012-05-09

    A potential threat, such as a spider, captures attention and engages executive functions to adjust ongoing behavior and avoid danger. We and many others have reported slowed responses to neutral targets in the context of emotional distractors. This behavioral slowing has been explained in the framework of attentional competition for limited resources with emotional stimuli prioritized. Alternatively, slowed performance could reflect the activation of avoidance/freezing-type motor behaviors associated with threat. Although the interaction of attention and emotion has been widely studied, little is known on the interaction between emotion and executive functions. We studied how threat-related stimuli (spiders) interact with executive performance and whether the interaction profile fits with a resource competition model or avoidance/freezing-type motor behaviors. Twenty-one young healthy individuals performed a Go-NoGo visual discrimination reaction time (RT) task engaging several executive functions with threat-related and emotionally neutral distractors. The threat-related distractors had no effect on the RT or the error rate in the Go trials. The NoGo error rate, reflecting failure in response inhibition, increased significantly because of threat-related distractors in contrast to neutral distractors, P less than 0.05. Thus, threat-related distractors temporarily impaired response inhibition. Threat-related distractors associated with increased commission errors and no effect on RT does not suggest engagement of avoidance/freezing-type motor behaviors. The results fit in the framework of the resource competition model. A potential threat calls for evaluation of affective significance as well as inhibition of undue emotional reactivity. We suggest that these functions tax executive resources and may render other executive functions, such as response inhibition, temporarily compromised when the demands for resources exceed availability.

  20. Narcissism and other-derogation in the absence of ego threat.

    PubMed

    Park, Sun W; Colvin, C Randall

    2015-06-01

    The relation between narcissism and other-derogation has been examined primarily in the context of ego threat. In three studies, we investigated whether narcissistic individuals derogate others in the absence of ego threat. In Study 1, 79 judges watched four videotaped dyadic interactions and rated the personality of the same four people. In Study 2, 66 judges rated the personality of a friend. In Study 3, 72 judges considered the average Northeastern University student and rated the personality of this hypothetical person. Across the three studies, targets' personality characteristics were described on the 100-item California Adult Q-Sort (CAQ; Block, 2008). Judges' ratings of targets were compared to a CAQ prototype of the optimally adjusted person to assess target-derogation. Judges' narcissism and other-derogation were positively related in Studies 1 and 2. Narcissism positively predicted and self-esteem negatively predicted target-derogation after controlling for each other in Study 3. Narcissistic individuals derogate others more than non-narcissistic individuals regardless of whether ego threat is present or absent. © 2014 Wiley Periodicals, Inc.

  1. Dangerous Enough: Moderating Racial Bias with Contextual Threat Cues

    PubMed Central

    Correll, Joshua; Wittenbrink, Bernd; Park, Bernadette; Judd, Charles M.; Goyle, Arina

    2010-01-01

    Research shows that participants shoot armed Blacks more frequently and quickly than armed Whites, but make don’t-shoot responses more frequently and quickly for unarmed Whites than unarmed Blacks. We argue that this bias reflects the perception of threat – specifically, threat associated with Black males. Other danger cues (not just race) may create a similar predisposition to shoot, and if these cues promote shooting when the target is White, they should attenuate racial bias. We embedded targets in threatening andsafe backgrounds. Racial bias was evident in safe contexts but disappeared when context signaled danger, and this reduction was largely due to an increased tendency to shoot White targets. PMID:21344058

  2. Long-term multi-hazard assessment for El Misti volcano (Peru)

    NASA Astrophysics Data System (ADS)

    Sandri, Laura; Thouret, Jean-Claude; Constantinescu, Robert; Biass, Sébastien; Tonini, Roberto

    2014-02-01

    We propose a long-term probabilistic multi-hazard assessment for El Misti Volcano, a composite cone located <20 km from Arequipa. The second largest Peruvian city is a rapidly expanding economic centre and is classified by UNESCO as World Heritage. We apply the Bayesian Event Tree code for Volcanic Hazard (BET_VH) to produce probabilistic hazard maps for the predominant volcanic phenomena that may affect c.900,000 people living around the volcano. The methodology accounts for the natural variability displayed by volcanoes in their eruptive behaviour, such as different types/sizes of eruptions and possible vent locations. For this purpose, we treat probabilistically several model runs for some of the main hazardous phenomena (lahars, pyroclastic density currents (PDCs), tephra fall and ballistic ejecta) and data from past eruptions at El Misti (tephra fall, PDCs and lahars) and at other volcanoes (PDCs). The hazard maps, although neglecting possible interactions among phenomena or cascade effects, have been produced with a homogeneous method and refer to a common time window of 1 year. The probability maps reveal that only the north and east suburbs of Arequipa are exposed to all volcanic threats except for ballistic ejecta, which are limited to the uninhabited but touristic summit cone. The probability for pyroclastic density currents reaching recently expanding urban areas and the city along ravines is around 0.05 %/year, similar to the probability obtained for roof-critical tephra loading during the rainy season. Lahars represent by far the most probable threat (around 10 %/year) because at least four radial drainage channels can convey them approximately 20 km away from the volcano across the entire city area in heavy rain episodes, even without eruption. The Río Chili Valley represents the major concern to city safety owing to the probable cascading effect of combined threats: PDCs and rockslides, dammed lake break-outs and subsequent lahars or floods

  3. The Threat Among Us: Insiders Intensify Aviation Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krull, Katie E.

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway formore » attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.« less

  4. Attention to Threats and Combat-Related Posttraumatic Stress Symptoms

    PubMed Central

    Wald, Ilan; Degnan, Kathryn A.; Gorodetsky, Elena; Charney, Dennis S.; Fox, Nathan A.; Fruchter, Eyal; Goldman, David; Lubin, Gad; Pine, Daniel S.; Bar-Haim, Yair

    2015-01-01

    Importance Combat places soldiers at risk for post-traumatic stress disorder (PTSD). The excessive rates of PTSD and other adjustment disorders in soldiers returning home make it imperative to identify risk and resilience factors that could be targeted by novel therapeutic treatments. Objective To investigate the interplay among attention to threat, combat exposure, and other risk factors for PTSD symptoms in soldiers deployed to combat. Design and Setting Longitudinal prospective study of Israeli Defense Force infantry soldiers carried out in 2008 through 2010. Repeated measurements during a 1-year period included baseline and predeployment data collected in training camps and deployment data collected in the combat theater. Participants Infantry soldiers (1085 men; mean age,18.8 years). Main Outcome Measures Postcombat PTSD symptoms. Results Soldiers developed threat vigilance during combat deployment, particularly when they were exposed to high-intensity combat, as indicated by faster response times to targets appearing at the location of threat relative to neutral stimuli (P < .001). Threat-related attention bias also interacted with combat exposure to predict risk for PTSD (P <.05). Bias toward threat at recruitment (P <.001) and bias away from threat just before deployment (P < .05) predicted postcombat PTSD symptoms. Moreover, these threat-related attention associations with PTSD were moderated by genetic and environmental factors, including serotonin transporter (5-HTTLPR) genotype. Conclusions and Relevance Combat exposure interacts with threat-related attention to place soldiers at risk for PTSD, and interactions with other risk factors account for considerable variance in PTSD vulnerability. Understanding these associations informs research on novel attention bias modification techniques and prevention of PTSD. PMID:23407816

  5. Threat Assessment of Small Near-Earth Objects

    NASA Astrophysics Data System (ADS)

    Ryan, E.; Ryan, W.

    2010-09-01

    Researchers at the Magdalena Ridge Observatory’s (MRO) 2.4-meter telescope facility are in their third year of a program to derive physical characterization information on some of the smallest (less than 200 meters in diameter) objects in the Near-Earth Object (NEO) population. Tiny comets and asteroids are being discovered by survey programs on a routine basis, so targets available for study have been abundant. Our primary objective is to derive rotation rates for these objects, and to place the results in context with previous data to enhance our understanding of asteroid impact physics and better address the threat from NEOs having Earth-crossing orbits. Rotation rate can be used to infer internal structure, which is a physical property important to assessing the energy needed for object disruption or other forms of hazard mitigation. Since the existing database of rotational data derived from lightcurves of objects in this small size regime is sparse, collection of additional observational data is beneficial. Acquiring more knowledge about the physical nature of NEOs not only contributes to general scientific pursuits, but is important to planetary defense.

  6. In Silico Screening-Level Prioritization of 8468 Chemicals Produced in OECD Countries to Identify Potential Planetary Boundary Threats.

    PubMed

    Reppas-Chrysovitsinos, Efstathios; Sobek, Anna; MacLeod, Matthew

    2018-01-01

    Legislation such as the Stockholm Convention and REACH aim to identify and regulate the production and use of chemicals that qualify as persistent organic pollutants (POPs) and very persistent and very bioaccumulative (vPvB) chemicals, respectively. Recently, a series of studies on planetary boundary threats proposed seven chemical hazard profiles that are distinct from the POP and vPvB profiles. We previously defined two exposure-based hazard profiles; airborne persistent contaminants (APCs) and waterborne persistent contaminants (WPCs) that correspond to two profiles of chemicals that are planetary boundary threats. Here, we extend our method to screen a database of chemicals consisting of 8648 substances produced within the OECD countries. We propose a new scoring scheme to disentangle the POP, vPvB, APC and WPC profiles by focusing on the spatial range of exposure potential, discuss the relationship between high exposure hazard and elemental composition of chemicals, and identify chemicals with high exposure hazard potential.

  7. Video Games in Volcanic Hazard Communications: Methods & Issues

    NASA Astrophysics Data System (ADS)

    Mani, Lara; Cole, Paul; Stewart, Iain

    2016-04-01

    Educational outreach plays a vital role in improving the resilience of vulnerable populations at risk from natural disasters. Currently, that activity is undertaken in many guises including the distribution of leaflets and posters, maps, presentations, education sessions and through radio and TV broadcasts. Such tried-and-tested communication modes generally target traditional stakeholder groups, but it is becoming increasingly important to engage with the new generation of learners who, due to advancements in technology, obtain information in ways different to their predecessors. That new generation is defined by a technological way of life and it remains a challenge to keep them motivated. On the eastern Caribbean island of St. Vincent, the La Soufriere Volcano lies in quiescence since the last eruption in 1979. Since then, an entire generation - over 56% of the population (Worldbank, 2015) - has little or no direct experience of a volcanic eruption. The island experiences, more frequently, other hazards (hurricanes, flooding, earthquakes landsliding), such that disaster preparedness measures give less priority to volcanic threats, which are deemed to pose less of a risk. With no accurate predictions to warn of the next eruption, it is especially important to educate residents about the potential of future volcanic hazards on the island, and to motivate them to prepare to mitigate their risk. This research critically examines the application of video games in supporting and enhancing existing public education and outreach programmes for volcanic hazards. St. Vincent's Volcano is a computer game designed to improve awareness and knowledge of the eruptive phenomena from La Soufriere that could pose a threat to residents. Within an interactive and immersive environment, players become acquainted with a 3D model of St. Vincent together with an overlay of the established volcanic hazard map (Robertson, 2005). Players are able to view visualisations of two historical

  8. Modelling Multi Hazard Mapping in Semarang City Using GIS-Fuzzy Method

    NASA Astrophysics Data System (ADS)

    Nugraha, A. L.; Awaluddin, M.; Sasmito, B.

    2018-02-01

    One important aspect of disaster mitigation planning is hazard mapping. Hazard mapping can provide spatial information on the distribution of locations that are threatened by disaster. Semarang City as the capital of Central Java Province is one of the cities with high natural disaster intensity. Frequent natural disasters Semarang city is tidal flood, floods, landslides, and droughts. Therefore, Semarang City needs spatial information by doing multi hazard mapping to support disaster mitigation planning in Semarang City. Multi Hazards map modelling can be derived from parameters such as slope maps, rainfall, land use, and soil types. This modelling is done by using GIS method with scoring and overlay technique. However, the accuracy of modelling would be better if the GIS method is combined with Fuzzy Logic techniques to provide a good classification in determining disaster threats. The Fuzzy-GIS method will build a multi hazards map of Semarang city can deliver results with good accuracy and with appropriate threat class spread so as to provide disaster information for disaster mitigation planning of Semarang city. from the multi-hazard modelling using GIS-Fuzzy can be known type of membership that has a good accuracy is the type of membership Gauss with RMSE of 0.404 the smallest of the other membership and VAF value of 72.909% of the largest of the other membership.

  9. Creating a critical mass eliminates the effects of stereotype threat on women's mathematical performance.

    PubMed

    Pennington, Charlotte R; Heim, Derek

    2016-09-01

    Women in mathematical domains may become attuned to situational cues that signal a discredited social identity, contributing to their lower achievement and underrepresentation. This study examined whether heightened in-group representation alleviates the effects of stereotype threat on women's mathematical performance. It further investigated whether single-sex testing environments and stereotype threat influenced participants to believe that their ability was fixed (fixed mindset) rather than a trait that could be developed (growth mindset). One hundred and forty-four female participants were assigned randomly to a self-as-target or group-as-target stereotype threat condition or to a control condition. They completed a modular arithmetic maths test and a mindset questionnaire either alone or in same-sex groups of 3-5 individuals. Participants solved fewer mathematical problems under self-as-target and group-as-target stereotype threat when they were tested alone, but these performance deficits were eliminated when they were tested in single-sex groups. Participants reported a weaker growth mindset when they were tested under stereotype threat and in single-sex groups. Moreover, evidence of inconsistent mediation indicated that single-sex testing environments negatively predicted mindset but positively predicted mathematical performance. These findings suggest that single-sex testing environments may represent a practical intervention to alleviate stereotype threat effects but may have a paradoxical effect on mindset. © 2016 The British Psychological Society.

  10. Unhealthy interactions: the role of stereotype threat in health disparities.

    PubMed

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  11. Unhealthy Interactions: The Role of Stereotype Threat in Health Disparities

    PubMed Central

    Burgess, Diana; Phelan, Sean M.; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors. PMID:23153125

  12. Stereotype threat among older employees: relationship with job attitudes and turnover intentions.

    PubMed

    von Hippel, Courtney; Kalokerinos, Elise K; Henry, Julie D

    2013-03-01

    Stereotype threat, or the belief that one may be the target of demeaning stereotypes, leads to acute performance decrements and reduced psychological well-being. The current research examined stereotype threat among older employees, a group that is the target of many negative stereotypes. Study 1 surveyed older workers in two different organizations regarding their experiences of stereotype threat, their job attitudes and work mental health, and their intentions to resign or retire. Across both samples, feelings of stereotype threat were related to more negative job attitudes and poorer work mental health. In turn, these negative job attitudes were associated with intentions to resign and (possibly) retire. In Study 2, younger and older employees were surveyed. The results indicated that only for older employees were feelings of stereotype threat negatively related to job attitudes, work mental health, and intentions to resign. The implications of these findings for understanding job attitudes and intentions among older workers are discussed. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  13. A global response roadmap to the asteroid impact threat: The NEOShield perspective

    NASA Astrophysics Data System (ADS)

    Perna, D.; Barucci, M. A.; Drube, L.; Falke, A.; Fulchignoni, M.; Harris, A. W.; Harris, A. W.; Kanuchova, Z.

    2015-12-01

    Besides being of great scientific interest, near-Earth objects represent a well-founded threat to life on our planet. Nonetheless, up to now there has been no concerted international plan on how to deal with the impact threat, and how to prepare and implement mitigation measures. The NEOShield project is funded by the European Commission to address such issues, to investigate the feasibility of techniques to prevent a potentially catastrophic impact on Earth by an asteroid or a comet, and to develop detailed designs of appropriate space missions to test deflection techniques. In this work we present and discuss the scientific and strategic aspects of the asteroid impact threat, highlighting the necessary steps so as to be ready to react to future hazardous objects.

  14. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    PubMed

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  15. Section 11: Surface Water Pathway - Likelihood of Release

    EPA Pesticide Factsheets

    Surface water releases can include the threat to targets from overland flow of hazardous substances and from flooding or the threat from the release of hazardous substances to ground water and the subsequent discharge of contaminated ground w

  16. A combined emitter threat assessment method based on ICW-RCM

    NASA Astrophysics Data System (ADS)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  17. The development of Army relevant peptide-based surface enhanced Raman scattering (SERS) sensors for biological threat detection

    NASA Astrophysics Data System (ADS)

    Farrell, Mikella E.; Strobbia, Pietro; Sarkes, Deborah A.; Stratis-Cullum, Dimitra N.; Cullum, Brian M.; Pellegrino, Paul M.

    2016-05-01

    The utility of peptide-based molecular sensing for the development of novel biosensors has resulted in a significant increase in their development and usage for sensing targets like chemical, biological, energetic and toxic materials. Using peptides as a molecular recognition element is particularly advantageous because there are several mature peptide synthesis protocols that already exist, peptide structures can be tailored, selected and manipulated to be highly discerning towards desired targets, peptides can be modified to be very stable in a host of environments and stable under many different conditions, and through the development of bifunctionalized peptides can be synthesized to also bind onto desired sensing platforms (various metal materials, glass, etc.). Two examples of the several Army relevant biological targets for peptide-based sensing platforms include Ricin and Abrin. Ricin and Abrin are alarming threats because both can be weaponized and there is no antidote for exposure. Combining the sensitivity of SERS with the selectivity of a bifunctional peptide allows for the emergence of dynamic hazard sensor for Army application.

  18. Vulnerability of port and harbor communities to earthquake and tsunami hazards: The use of GIS in community hazard planning

    USGS Publications Warehouse

    Wood, Nathan J.; Good, James W.

    2004-01-01

    AbstractEarthquakes and tsunamis pose significant threats to Pacific Northwest coastal port and harbor communities. Developing holistic mitigation and preparedness strategies to reduce the potential for loss of life and property damage requires community-wide vulnerability assessments that transcend traditional site-specific analyses. The ability of a geographic information system (GIS) to integrate natural, socioeconomic, and hazards information makes it an ideal assessment tool to support community hazard planning efforts. This article summarizes how GIS was used to assess the vulnerability of an Oregon port and harbor community to earthquake and tsunami hazards, as part of a larger risk-reduction planning initiative. The primary purposes of the GIS were to highlight community vulnerability issues and to identify areas that both are susceptible to hazards and contain valued port and harbor community resources. Results of the GIS analyses can help decision makers with limited mitigation resources set priorities for increasing community resiliency to natural hazards.

  19. Environmental Hazard of Selenium in the Animas La Plata Wate Development Project

    Treesearch

    A. Dennis Lemly

    1997-01-01

    A hazard assessment of selenium was conducted for the Animas La Plata Project, a multiple-use water development proposed for Colorado and New Mexico by the United States Bureau of Reclamation. A published protocol for aquatic hazard assessment of selenium was applied to environmental monitoring data to assess current threats to biota in the water supply rivers (Animas...

  20. Exposure Levels for Chemical Threat Compounds; Information to Facilitate Chemical Incident Response

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hauschild, Veronique; Watson, Annetta Paule

    2013-01-01

    Exposure Standards, Limits and Guidelines for Chemical Threat Compunds ABSTRACT Exposure criteria for chemical warfare (CW) agents and certain toxic industrial chemicals (TICs) used as CW agents (such as chlorine fill in an improvised explosive device) have been developed for protection of the civilian general public, civilian employees in chemical agent processing facilities and deployed military populations. In addition, compound-specific concentrations have been developed to serve as how clean is clean enough clearance criteria guiding facility recovery following chemical terrorist or other hazardous release events. Such criteria are also useful to verify compound absence, identify containment boundaries and expedite facilitymore » recovery following chemical threat release. There is no single right value or concentration appropriate for all chemical hazard control applications. It is acknowledged that locating and comparing the many sources of CW agent and TIC exposure criteria has not been previously well-defined. This paper summarizes many of these estimates and assembles critical documentation regarding their derivation and use.« less

  1. 49 CFR 192.923 - How is direct assessment used and for what threats?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192.923 How is direct assessment used and for what threats? (a...

  2. Incorporating threat in hotspots and coldspots of biodiversity and ecosystem services.

    PubMed

    Schröter, Matthias; Kraemer, Roland; Ceauşu, Silvia; Rusch, Graciela M

    2017-11-01

    Spatial prioritization could help target conservation actions directed to maintain both biodiversity and ecosystem services. We delineate hotspots and coldspots of two biodiversity conservation features and five regulating and cultural services by incorporating an indicator of 'threat', i.e. timber harvest profitability for forest areas in Telemark (Norway). We found hotspots, where high values of biodiversity, ecosystem services and threat coincide, ranging from 0.1 to 7.1% of the area, depending on varying threshold levels. Targeting of these areas for conservation follows reactive conservation approaches. In coldspots, high biodiversity and ecosystem service values coincide with low levels of threat, and cover 0.1-3.4% of the forest area. These areas might serve proactive conservation approaches at lower opportunity cost (foregone timber harvest profits). We conclude that a combination of indicators of biodiversity, ecosystem services and potential threat is an appropriate approach for spatial prioritization of proactive and reactive conservation strategies.

  3. Impaired threat prioritisation after selective bilateral amygdala lesions

    PubMed Central

    Bach, Dominik R.; Hurlemann, Rene; Dolan, Raymond J.

    2015-01-01

    The amygdala is proposed to process threat-related information in non-human animals. In humans, empirical evidence from lesion studies has provided the strongest evidence for a role in emotional face recognition and social judgement. Here we use a face-in-the-crowd (FITC) task which in healthy control individuals reveals prioritised threat processing, evident in faster serial search for angry compared to happy target faces. We investigate AM and BG, two individuals with bilateral amygdala lesions due to Urbach–Wiethe syndrome, and 16 control individuals. In lesion patients we show a reversal of a threat detection advantage indicating a profound impairment in prioritising threat information. This is the first direct demonstration that human amygdala lesions impair prioritisation of threatening faces, providing evidence that this structure has a causal role in responding to imminent danger. PMID:25282058

  4. Physician office readiness for managing Internet security threats.

    PubMed

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  5. Physician Office Readiness for Managing Internet Security Threats

    PubMed Central

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks. Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done. PMID:17238600

  6. Public concern about industrial hazards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stallen, P.J.M.; Tomas, A.

    1988-06-01

    In this paper the authors propose adopting a noncognitive perspective for the understanding of people's anxiety or, its opposite, feelings of security about living near hazardous industrial facilities. Results of their empirical investigations among residents of a heavily industrialized area indicate that at least four qualitatively different response patterns exist: the Secure, the Accepting, the Defensive, and the Vigilant response. In this order manifest anxiety increases, which increase is shown to be a function of the assessment of the threat, of the opportunities for personal control (specific), and of hope (generalized) to bring about a better environment by one's ownmore » action. As an application of the usefulness of this typology they discuss the various explanations for the often-observed male/female difference in anxiety regarding industrial threat.« less

  7. Sigma-1 receptor ligands control a switch between passive and active threat responses

    PubMed Central

    Rennekamp, Andrew J.; Huang, Xi-Ping; Wang, You; Patel, Samir; Lorello, Paul J.; Cade, Lindsay; Gonzales, Andrew P. W.; Yeh, Jing-Ruey Joanna; Caldarone, Barbara J.; Roth, Bryan L.; Kokel, David; Peterson, Randall T.

    2016-01-01

    Humans and many animals exhibit freezing behavior in response to threatening stimuli. In humans, inappropriate threat responses are fundamental characteristics of several mental illnesses. To identify small molecules that modulate threat responses, we developed a high-throughput behavioral assay in zebrafish (Danio rerio) and characterized the effects of 10,000 compounds on freezing behavior. We found three classes of compounds that switch the threat response from freezing to escape-like behavior. We then screened these for binding activity across 45 candidate targets. Using target profile clustering we implicated the sigma-1 receptor in the mechanism of behavioral switching and confirmed that known sigma-1 ligands also disrupt freezing behavior. Furthermore, mutation of the sigma-1 gene prevented the behavioral effect of escape-inducing compounds. The compound ‘finazine’ potently bound mammalian sigma-1 and altered rodent threat response behavior. Thus, pharmacological and genetic interrogation of the freezing response revealed sigma-1 as a mediator of vertebrate threat responses. PMID:27239788

  8. ERP correlates of attentional processing in spider fear: evidence of threat-specific hypervigilance.

    PubMed

    Venetacci, Rebecca; Johnstone, Amber; Kirkby, Kenneth C; Matthews, Allison

    2018-05-01

    Attentional bias towards threat can be demonstrated by enhanced processing of threat-related targets and/or greater interference when threat-related distractors are present. These effects are argued to reflect processing within the orienting and executive control networks of the brain respectively. This study investigated behavioural (RT) and electrophysiological correlates of early selective attention and top-down attentional control among females with high (n = 16) or low (n = 16) spider fear (Mean age = 22 years). Participants completed a novel flanker go/nogo task in which a central schematic flower or spider stimulus was flanked by either congruent or incongruent distractors. Participants responded to green stimuli (go trials) and withheld response to yellow stimuli (nogo trials). High fear participants demonstrated significantly shorter reaction times and greater P1 amplitude to spider targets, suggesting specific hypervigilance towards threat-relevant stimuli. In contrast to predictions, there was little evidence for behavioural interference effects or differences in N2 amplitude when distractor stimuli were threat-relevant.

  9. Stereotype threat and executive resource depletion: examining the influence of emotion regulation.

    PubMed

    Johns, Michael; Inzlicht, Michael; Schmader, Toni

    2008-11-01

    Research shows that stereotype threat reduces performance by diminishing executive resources, but less is known about the psychological processes responsible for these impairments. The authors tested the idea that targets of stereotype threat try to regulate their emotions and that this regulation depletes executive resources, resulting in underperformance. Across 4 experiments, they provide converging evidence that targets of stereotype threat spontaneously attempt to control their expression of anxiety and that such emotion regulation depletes executive resources needed to perform well on tests of cognitive ability. They also demonstrate that providing threatened individuals with a means to effectively cope with negative emotions--by reappraising the situation or the meaning of their anxiety--can restore executive resources and improve test performance. They discuss these results within the framework of an integrated process model of stereotype threat, in which affective and cognitive processes interact to undermine performance.

  10. Stereotype Threat and Executive Resource Depletion: Examining the Influence of Emotion Regulation

    PubMed Central

    Johns, Michael; Inzlicht, Michael; Schmader, Toni

    2010-01-01

    Research shows that stereotype threat reduces performance by diminishing executive resources, but less is known about the psychological processes responsible for these impairments. The authors tested the idea that targets of stereotype threat try to regulate their emotions and that this regulation depletes executive resources, resulting in underperformance. Across 4 experiments, they provide converging evidence that targets of stereotype threat spontaneously attempt to control their expression of anxiety and that such emotion regulation depletes executive resources needed to perform well on tests of cognitive ability. They also demonstrate that providing threatened individuals with a means to effectively cope with negative emotions—by reappraising the situation or the meaning of their anxiety—can restore executive resources and improve test performance. They discuss these results within the framework of an integrated process model of stereotype threat, in which affective and cognitive processes interact to undermine performance. PMID:18999361

  11. Airborne Particulate Threat Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. governmentmore » agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing

  12. SOCIOECONOMIC ANALYSIS OF HAZARDOUS WASTE MANAGEMENT ALTERNATIVES: METHOLOLOGY AND DEMONSTRATION

    EPA Science Inventory

    A methodology for analyzing economic and social effects of alternatives in hazardous waste management is presented and demonstrated. The approach includes the use of environmental threat scenarios and evaluation of effects on and responses by parties-at-interest. The methodology ...

  13. Hazards of decreasing marine oxygen: the near-term and millennial-scale benefits of meeting the Paris climate targets

    NASA Astrophysics Data System (ADS)

    Battaglia, Gianna; Joos, Fortunat

    2018-06-01

    Ocean deoxygenation is recognized as key ecosystem stressor of the future ocean and associated climate-related ocean risks are relevant for current policy decisions. In particular, benefits of reaching the ambitious 1.5 °C warming target mentioned by the Paris Agreement compared to higher temperature targets are of high interest. Here, we model oceanic oxygen, warming and their compound hazard in terms of metabolic conditions on multi-millennial timescales for a range of equilibrium temperature targets. Scenarios where radiative forcing is stabilized by 2300 are used in ensemble simulations with the Bern3D Earth System Model of Intermediate Complexity. Transiently, the global mean ocean oxygen concentration decreases by a few percent under low forcing and by 40 % under high forcing. Deoxygenation peaks about a thousand years after stabilization of radiative forcing and new steady-state conditions are established after AD 8000 in our model. Hypoxic waters expand over the next millennium and recovery is slow and remains incomplete under high forcing. Largest transient decreases in oxygen are projected for the deep sea. Distinct and near-linear relationships between the equilibrium temperature response and marine O2 loss emerge. These point to the effectiveness of the Paris climate target in reducing marine hazards and risks. Mitigation measures are projected to reduce peak decreases in oceanic oxygen inventory by 4.4 % °C-1 of avoided equilibrium warming. In the upper ocean, the decline of a metabolic index, quantified by the ratio of O2 supply to an organism's O2 demand, is reduced by 6.2 % °C-1 of avoided equilibrium warming. Definitions of peak hypoxia demonstrate strong sensitivity to additional warming. Volumes of water with less than 50 mmol O2 m-3, for instance, increase between 36 % and 76 % °C-1 of equilibrium temperature response. Our results show that millennial-scale responses should be considered in assessments of ocean deoxygenation and associated

  14. There's Life in Hazard Trees

    Treesearch

    Mary Torsello; Toni McLellan

    The goals of hazard tree management programs are to maximize public safety and maintain a healthy sustainable tree resource. Although hazard tree management frequently targets removal of trees or parts of trees that attract wildlife, it can take into account a diversity of tree values. With just a little extra planning, hazard tree management can be highly beneficial...

  15. Modeling lahar behavior and hazards

    USGS Publications Warehouse

    Manville, Vernon; Major, Jon J.; Fagents, Sarah A.

    2013-01-01

    Lahars are highly mobile mixtures of water and sediment of volcanic origin that are capable of traveling tens to > 100 km at speeds exceeding tens of km hr-1. Such flows are among the most serious ground-based hazards at many volcanoes because of their sudden onset, rapid advance rates, long runout distances, high energy, ability to transport large volumes of material, and tendency to flow along existing river channels where populations and infrastructure are commonly concentrated. They can grow in volume and peak discharge through erosion and incorporation of external sediment and/or water, inundate broad areas, and leave deposits many meters thick. Furthermore, lahars can recur for many years to decades after an initial volcanic eruption, as fresh pyroclastic material is eroded and redeposited during rainfall events, resulting in a spatially and temporally evolving hazard. Improving understanding of the behavior of these complex, gravitationally driven, multi-phase flows is key to mitigating the threat to communities at lahar-prone volcanoes. However, their complexity and evolving nature pose significant challenges to developing the models of flow behavior required for delineating their hazards and hazard zones.

  16. Volcanic hazards and aviation safety

    USGS Publications Warehouse

    Casadevall, Thomas J.; Thompson, Theodore B.; Ewert, John W.; ,

    1996-01-01

    An aeronautical chart was developed to determine the relative proximity of volcanoes or ash clouds to the airports and flight corridors that may be affected by volcanic debris. The map aims to inform and increase awareness about the close spatial relationship between volcanoes and aviation operations. It shows the locations of the active volcanoes together with selected aeronautical navigation aids and great-circle routes. The map mitigates the threat that volcanic hazards pose to aircraft and improves aviation safety.

  17. Ranking the risk of wildlife species hazardous to military aircraft

    USGS Publications Warehouse

    Zakrajsek, E.J.; Bissonette, J.A.

    2005-01-01

    Collisions between birds and aircraft (birdstrikes) pose a major threat to aviation safety. Different species pose different levels of threat; thus, identification of the most hazardous species can help managers identify the level of hazard and prioritize mitigation efforts. Dolbeer et al. (2000) assessed the hazard posed by birds to civilian aircraft by analyzing data from the Federal Aviation Administration's (FAA) Wildlife Strike Database to rank the hazardous species and species groups. A similar analysis has not been done for the military but would be useful and necessary. Military flight characteristics differ from those of civilian flights. During the period 1985-1998, birdstrikes cost the United States Air Force (USAF) an average of $35 million/year in damage. Using the USAF Birdstrike Database, we selected and evaluated each species or species group by the number of strikes recorded in each of 3 damage categories. We weighted damage categories to reflect extent and cost of damage. The USAF Birdstrike Database contained 25,519 records of wildlife strikes in the United States. During the period 1985-1998, 22 (mean = 1.6/year) Class-A birdstrikes (>$1,000,000 damage, loss of aircraft, loss of life, or permanent total disability) were sustained, accounting for 80% of total monetary losses caused by birds. Vultures (Cathartes aura, Coragyps atratus, Caracara cheriway) were ranked the most hazardous species group (Hazard Index Rank [HIR] = 127) to USAF aircraft, followed by geese (Branta canadensis, Chen caerulescens, HIR = 76), pelicans (Pelecanus erythrorhynchos, P. occidentalis, HIR = 47), and buteos (Buteo sp., HIR = 30). Of the smaller flocking birds, blackbirds and starlings (mostly Agelaius phoeniceus, Euphagus cyanocephalus, Molothrus ater, Sturnus vulgaris, HIR = 46), horned larks (Eremophila alpestris, HIR = 24), and swallows (Families Hirundinidae, Apodidae, HIR = 23) were species groups ranked highest. Coupling these results with local bird census

  18. California's Vulnerability to Volcanic Hazards: What's at Risk?

    NASA Astrophysics Data System (ADS)

    Mangan, M.; Wood, N. J.; Dinitz, L.

    2015-12-01

    California is a leader in comprehensive planning for devastating earthquakes, landslides, floods, and tsunamis. Far less attention, however, has focused on the potentially devastating impact of volcanic eruptions, despite the fact that they occur in the State about as frequently as the largest earthquakes on the San Andreas Fault Zone. At least 10 eruptions have occurred in the past 1,000 years—most recently in northern California (Lassen Peak 1914 to 1917)—and future volcanic eruptions are inevitable. The likelihood of renewed volcanism in California is about one in a few hundred to one in a few thousand annually. Eight young volcanoes, ranked as Moderate to Very High Threat [1] are dispersed throughout the State. Partially molten rock (magma) resides beneath at least seven of these—Medicine Lake Volcano, Mount Shasta, Lassen Volcanic Center, Clear Lake Volcanic Field, Long Valley Volcanic Region, Coso Volcanic Field, and Salton Buttes— causing earthquakes, toxic gas emissions, hydrothermal activity, and (or) ground deformation. Understanding the hazards and identifying what is at risk are the first steps in building community resilience to volcanic disasters. This study, prepared in collaboration with the State of California Governor's Office of Emergency Management and the California Geological Survey, provides a broad perspective on the State's exposure to volcano hazards by integrating mapped volcano hazard zones with geospatial data on at-risk populations, infrastructure, and resources. The study reveals that ~ 16 million acres fall within California's volcano hazard zones, along with ~ 190 thousand permanent and 22 million transitory populations. Additionally, far-field disruption to key water delivery systems, agriculture, utilities, and air traffic is likely. Further site- and sector-specific analyses will lead to improved hazard mitigation efforts and more effective disaster response and recovery. [1] "Volcanic Threat and Monitoring Capabilities

  19. Natural phenomena hazards design and evaluation criteria for Department of Energy Facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-01-01

    The Department of Energy (DOE) has issued an Order 420.1 which establishes policy for its facilities in the event of natural phenomena hazards (NPH) along with associated NPH mitigation requirements. This DOE Standard gives design and evaluation criteria for NPH effects as guidance for implementing the NPH mitigation requirements of DOE Order 420.1 and the associated implementation Guides. These are intended to be consistent design and evaluation criteria for protection against natural phenomena hazards at DOE sites throughout the United States. The goal of these criteria is to assure that DOE facilities can withstand the effects of natural phenomena suchmore » as earthquakes, extreme winds, tornadoes, and flooding. These criteria apply to the design of new facilities and the evaluation of existing facilities. They may also be used for modification and upgrading of existing facilities as appropriate. The design and evaluation criteria presented herein control the level of conservatism introduced in the design/evaluation process such that earthquake, wind, and flood hazards are treated on a consistent basis. These criteria also employ a graded approach to ensure that the level of conservatism and rigor in design/evaluation is appropriate for facility characteristics such as importance, hazards to people on and off site, and threat to the environment. For each natural phenomena hazard covered, these criteria consist of the following: Performance Categories and target performance goals as specified in the DOE Order 420.1 NPH Implementation Guide, and DOE-STD-1 021; specified probability levels from which natural phenomena hazard loading on structures, equipment, and systems is developed; and design and evaluation procedures to evaluate response to NPH loads and criteria to assess whether or not computed response is permissible.« less

  20. Categorizing threat : building and using a generic threat matrix.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and ismore » not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.« less

  1. User perception and interpretation of tornado probabilistic hazard information: Comparison of four graphical designs.

    PubMed

    Miran, Seyed M; Ling, Chen; James, Joseph J; Gerard, Alan; Rothfusz, Lans

    2017-11-01

    Effective design for presenting severe weather information is important to reduce devastating consequences of severe weather. The Probabilistic Hazard Information (PHI) system for severe weather is being developed by NOAA National Severe Storms Laboratory (NSSL) to communicate probabilistic hazardous weather information. This study investigates the effects of four PHI graphical designs for tornado threat, namely, "four-color"," red-scale", "grayscale" and "contour", on users' perception, interpretation, and reaction to threat information. PHI is presented on either a map background or a radar background. Analysis showed that the accuracy was significantly higher and response time faster when PHI was displayed on map background as compared to radar background due to better contrast. When displayed on a radar background, "grayscale" design resulted in a higher accuracy of responses. Possibly due to familiarity, participants reported four-color design as their favorite design, which also resulted in the fastest recognition of probability levels on both backgrounds. Our study shows the importance of using intuitive color-coding and sufficient contrast in conveying probabilistic threat information via graphical design. We also found that users follows a rational perceiving-judging-feeling-and acting approach in processing probabilistic hazard information for tornado. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Development, Evaluation, and Future Directions of the Virginia Student Threat Assessment Guidelines

    ERIC Educational Resources Information Center

    Cornell, Dewey; Allen, Korrie

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed in response to studies of school shootings conducted by the U.S. Federal Bureau of Investigation, U.S. Secret Service, and U.S. Department of Education that recommended schools should adopt a threat assessment approach to prevent targeted violence. This article reviews the…

  3. Communicating landslide risk by combining hazard and open infrastructure data in interactive visualizations

    NASA Astrophysics Data System (ADS)

    Tost, Jordi; Olen, Stephanie M.; Bookhagen, Bodo; Heidmann, Frank

    2017-04-01

    The DIGENTI project ("DIGitaler ENtscheiderTIsch für das Naturgefahrenmanagement auf Basis von Satellitendaten und Volunteered Geographic Information") has the goal of quantifying and communicating the threat of natural hazards in the Cesar and La Guajira departments of northeast Colombia. The end-goal of the project is to provide an interactive guide for policy and decision makers, and for disaster relief coordination. Over the last years, abundant research has been done in order to analyze risk and to provide relevant information that improves effectiveness in disaster management. The communication of natural hazards risk has traditionally been built upon the estimation of hazard maps. In the context of landslides, hazard maps are used to depict potential danger from landslides and visualize the possibility of future landsliding throughout a given area. Such hazard maps provide a static snapshot of the local estimated threat in a region. However, in mountainous regions, a sufficiently large landslide in remote mountainous areas may represent a potential threat to settlements located downstream of a landslide event. The research presented here proposes an approach to visualize and interactively explore landslide risk by combining static hazard maps, hydrologic networks, and OpenStreetMap data. We estimated the potential for hillslope instabilities scenarios in the region of interest by using the TanDEM-X World DEM to calculate a suite Factor of Safety (FOS) maps. The FOS estimates the ratio of total resisting and driving forces to hillslope mass movements. By combining the World DEM with other environmental data (e.g., the Harmonized World Soil Database), we were able to create a suite of high-resolution landslide potential maps for the region of interest. The suite of FOS maps are calculated based on user-selectable parameters (e.g, total mass sliding thickness) that are not well constrained by field observations. We additionally use the TanDEM-X World DEM to

  4. Measuring attentional biases for threat in children and adults.

    PubMed

    LoBue, Vanessa

    2014-10-19

    Investigators have long been interested in the human propensity for the rapid detection of threatening stimuli. However, until recently, research in this domain has focused almost exclusively on adult participants, completely ignoring the topic of threat detection over the course of development. One of the biggest reasons for the lack of developmental work in this area is likely the absence of a reliable paradigm that can measure perceptual biases for threat in children. To address this issue, we recently designed a modified visual search paradigm similar to the standard adult paradigm that is appropriate for studying threat detection in preschool-aged participants. Here we describe this new procedure. In the general paradigm, we present participants with matrices of color photographs, and ask them to find and touch a target on the screen. Latency to touch the target is recorded. Using a touch-screen monitor makes the procedure simple and easy, allowing us to collect data in participants ranging from 3 years of age to adults. Thus far, the paradigm has consistently shown that both adults and children detect threatening stimuli (e.g., snakes, spiders, angry/fearful faces) more quickly than neutral stimuli (e.g., flowers, mushrooms, happy/neutral faces). Altogether, this procedure provides an important new tool for researchers interested in studying the development of attentional biases for threat.

  5. Understanding the Anti-Access and Area Denial Threat: An Army Perspective

    DTIC Science & Technology

    2015-05-21

    Perspective Approved by: , Monograph Director Peter J . Schifferle, PhD , Seminar Leader James MacGregor, COL...targeting purposes. See also: Ben Berk , China’s Silver Bullet: A Brief Analysis of the Threat Posed by the PRC’s Anti- ship Ballistic Missile (Chapel...16Ben Berk , China’s Silver Bullet: A Brief Analysis of the Threat Posed by the PRC’s Anti

  6. Identifying species threat hotspots from global supply chains.

    PubMed

    Moran, Daniel; Kanemoto, Keiichiro

    2017-01-04

    Identifying hotspots of species threat has been a successful approach for setting conservation priorities. One important challenge in conservation is that, in many hotspots, export industries continue to drive overexploitation. Conservation measures must consider not just the point of impact, but also the consumer demand that ultimately drives resource use. To understand which species threat hotspots are driven by which consumers, we have developed a new approach to link a set of biodiversity footprint accounts to the hotspots of threatened species on the IUCN Red List of Threatened Species. The result is a map connecting consumption to spatially explicit hotspots driven by production on a global scale. Locating biodiversity threat hotspots driven by consumption of goods and services can help to connect conservationists, consumers, companies and governments in order to better target conservation actions.

  7. The Impact Hazard in the Context of Other Natural Hazards and Predictive Science

    NASA Astrophysics Data System (ADS)

    Chapman, C. R.

    1998-09-01

    The hazard due to impact of asteroids and comets has been recognized as analogous, in some ways, to other infrequent but consequential natural hazards (e.g. floods and earthquakes). Yet, until recently, astronomers and space agencies have felt no need to do what their colleagues and analogous agencies must do in order the assess, quantify, and communicate predictions to those with a practical interest in the predictions (e.g. public officials who must assess the threats, prepare for mitigation, etc.). Recent heightened public interest in the impact hazard, combined with increasing numbers of "near misses" (certain to increase as Spaceguard is implemented) requires that astronomers accept the responsibility to place their predictions and assessments in terms that may be appropriately considered. I will report on preliminary results of a multi-year GSA/NCAR study of "Prediction in the Earth Sciences: Use and Misuse in Policy Making" in which I have represented the impact hazard, while others have treated earthquakes, floods, weather, global climate change, nuclear waste disposal, acid rain, etc. The impact hazard presents an end-member example of a natural hazard, helping those dealing with more prosaic issues to learn from an extreme. On the other hand, I bring to the astronomical community some lessons long adopted in other cases: the need to understand the policy purposes of impact predictions, the need to assess potential societal impacts, the requirements to very carefully assess prediction uncertainties, considerations of potential public uses of the predictions, awareness of ethical considerations (e.g. conflicts of interest) that affect predictions and acceptance of predictions, awareness of appropriate means for publicly communicating predictions, and considerations of the international context (especially for a hazard that knows no national boundaries).

  8. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  9. The costs of hazardous alcohol consumption in Germany.

    PubMed

    Effertz, Tobias; Verheyen, Frank; Linder, Roland

    2017-07-01

    Hazardous alcohol consumption in Germany is a main threat to health. By using insurance claim data from the German Statutory Health Insurance and a classification strategy based on ICD10 diagnoses-codes we analyzed a sample of 146,000 subjects with more than 19,000 hazardous alcohol consumers. Employing different regression models with a control function approach, we calculate life years lost due to alcohol consumption, annual direct and indirect health costs, and the burden of pain and suffering measured by the Charlson-Index and assessed pain diagnoses. Additionally, we simulate the net accumulated premium payments over expenses in the German Statutory Health Insurance and the Statutory Pension Fund for hazardous alcohol consumers from a lifecycle perspective. In total, €39.3 billion each year result from hazardous alcohol consumption with an average loss of 7 years in life expectancy. Hazardous alcohol consumers clearly do not "pay their way" in the two main German social security systems and also display a higher intangible burden according to our definitions of pain and suffering.

  10. Method and apparatus for identification of hazards along an intended travel route

    NASA Technical Reports Server (NTRS)

    Kronfeld, Kevin M. (Inventor); Lapis, Mary Beth (Inventor); Walling, Karen L. (Inventor); Chackalackal, Mathew S. (Inventor)

    2003-01-01

    Targets proximate to a travel route plan were evaluated to determine hazardousness. Projected geometric representation of a vehicle determines intrusion of hazardous targets along travel route plan. Geometric representation of hazardous targets projected along motion vector to determine intrusion upon travel route plan. Intrusion assessment presented on user display.

  11. Optimal Fragmentation and Dispersion of Hazardous Near-Earth Objects

    NASA Technical Reports Server (NTRS)

    Wie, Bong

    2012-01-01

    The complex problem of protecting the Earth from the possibility of a catastrophic impact by a hazardous near-Earth object (NEO) has been recently reassessed in [1]. In a letter on NEOs from the White House Office of Science and Technology Policy (OSTP) to the U.S. Senate and Congress in 2010, the White House OSTP strongly recommended that NASA take the lead in conducting research activities for NEO detection, characterization, and deflection technologies. Furthermore, President Obama's new National Space Policy specifically directs NASA to "pursue capabilities, in cooperation with other departments, agencies, and commercial partners, to detect, track, catalog, and characterize NEOs to reduce the risk of harm to humans from an unexpected impact on our planet." The Planetary Defense Task Force of the NASA Advisory Council also recommended that the NASA Office of the Chief Technologist (OCT) begin efforts to investigate asteroid deflection techniques. With national interest growing in the United States, the NEO threat detection and mitigation problem was recently identified as one of NASA's Space Technology Grand Challenges. An innovative solution to NASA's NEO Impact Threat Mitigation Grand Challenge problem was developed through a NIAC Phase I study (9/16/11 - 9/15/12), and it will be further investigated for a NIAC Phase II study (9/10/12 - 9/9/14). Various NEO deflection technologies, including nuclear explosions, kinetic impactors, and slow-pull gravity tractors, have been proposed and examined during the past two decades. Still, there is no consensus on how to reliably deflect or disrupt hazardous NEOs in a timely manner. It is expected that the most probable mission scenarios will have a mission lead time much shorter than 10 years, so the use of nuclear explosives becomes the most feasible method for planetary defense. Direct intercept missions with a short warning time will result in arrival closing velocities of 10-30 kilometers per second with respect to

  12. Climatic Changes and Consequences on the French West Indies (C3AF), Hurricane and Tsunami Hazards Assessment

    NASA Astrophysics Data System (ADS)

    Arnaud, G.; Krien, Y.; Zahibo, N.; Dudon, B.

    2017-12-01

    Coastal hazards are among the most worrying threats of our time. In a context of climate change coupled to a large population increase, tropical areas could be the most exposed zones of the globe. In such circumstances, understanding the underlying processes can help to better predict storm surges and the associated global risks.Here we present the partial preliminary results integrated in a multidisciplinary project focused on climatic change effects over the coastal threat in the French West Indies and funded by the European Regional Development Fund. The study aims to provide a coastal hazard assessment based on hurricane surge and tsunami modeling including several aspects of climate changes that can affect hazards such as sea level rise, crustal subsidence/uplift, coastline changes etc. Several tsunamis scenarios have been simulated including tele-tsunamis to ensure a large range of tsunami hazards. Surge level of hurricane have been calculated using a large number of synthetic hurricanes to cover the actual and forecasted climate over the tropical area of Atlantic ocean. This hazard assessment will be later coupled with stakes assessed over the territory to provide risk maps.

  13. Stereotype threat and social function in opioid substitution therapy patients.

    PubMed

    von Hippel, Courtney; Henry, Julie D; Terrett, Gill; Mercuri, Kimberly; McAlear, Karen; Rendell, Peter G

    2017-06-01

    People with a history of substance abuse are subject to widespread stigmatization. It seems likely that this societal disapproval will result in feelings of stereotype threat, or the belief that one is the target of demeaning stereotypes. If so, stereotype threat has the potential to contribute to functional difficulties including poor social outcomes. Eighty drug users on opioid substitution therapy and 84 demographically matched controls completed measures of mental health and social function. The opioid substitution therapy group were additionally asked to complete a measure that focused on their feelings of stereotype threat in relation to their drug use history. Bivariate correlations and hierarchical regression analyses were conducted to establish the magnitude and specificity of the relationship between stereotype threat and social functioning. Relative to controls, the opioid substitution therapy group reported higher levels of negative affect and schizotypy, and poorer social functioning, with all three of these indices significantly correlated with their feelings of stereotype threat. The results also showed that stereotype threat contributed significant unique variance to social functioning in the opioid substitution therapy group, even after taking into account other background, clinical, and mental health variables. Social functioning is an important aspect of recovery, yet these data indicate that people with a history of drug abuse who believe they are the target of stereotypical attitudes have poorer social functioning. This relationship holds after controlling for the impact of other variables on social functioning, including mental health. The theoretical and practical implications of these findings are discussed. Concerns about being stereotyped can shape the social experiences of opioid substitution therapy patients. Opioid substitution therapy patients who feel negatively stereotyped experience greater social function deficits, and this

  14. Integrated response to the dynamic threat of school violence.

    PubMed

    Callaway, David W; Westmoreland, Ted C; Baez, Alejandro A; McKay, Sean A; Raja, Ali S

    2010-01-01

    A terrorist attack on US schools no longer can be considered a Black Swan event. Mounting evidence suggests that extremist organizations actively are targeting US schools. Equally disturbing are data suggesting that schools, universities, and communities are unprepared for large-scale violence. The Operational Medicine Institute Conference on an Integrated Response to the Modern Urban Terrorist Threat revealed significant variations in the perceived threats and critical response gaps among emergency medical providers, law enforcement personnel, politicians, and security specialists. The participants recommended several steps to address these gaps in preparedness, training, responses, and recovery.

  15. The cyber security threat stops in the boardroom.

    PubMed

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  16. Hazards and hazard combinations relevant for the safety of nuclear power plants

    NASA Astrophysics Data System (ADS)

    Decker, Kurt; Brinkman, Hans; Raimond, Emmanuel

    2017-04-01

    The potential of the contemporaneous impact of different, yet causally related, hazardous events and event cascades on nuclear power plants is a major contributor to the overall risk of nuclear installations. In the aftermath of the Fukushima accident, which was caused by a combination of severe ground shaking by an earthquake, an earthquake-triggered tsunami and the disruption of the plants from the electrical grid by a seismically induced landslide, hazard combinations and hazard cascades moved into the focus of nuclear safety research. We therefore developed an exhaustive list of external hazards and hazard combinations which pose potential threats to nuclear installations in the framework of the European project ASAMPSAE (Advanced Safety Assessment: Extended PSA). The project gathers 31 partners from Europe, North Amerika and Japan. The list comprises of exhaustive lists of natural hazards, external man-made hazards, and a cross-correlation matrix of these hazards. The hazard list is regarded comprehensive by including all types of hazards that were previously cited in documents by IAEA, the Western European Nuclear Regulators Association (WENRA), and others. 73 natural hazards and 24 man-made external hazards are included. Natural hazards are grouped into seismotectonic hazards, flooding and hydrological hazards, extreme values of meteorological phenomena, rare meteorological phenomena, biological hazards / infestation, geological hazards, and forest fire / wild fire. The list of external man-made hazards includes industry accidents, military accidents, transportation accidents, pipeline accidents and other man-made external events. The large number of different hazards results in the extremely large number of 5.151 theoretically possible hazard combinations (not considering hazard cascades). In principle all of these combinations are possible to occur by random coincidence except for 82 hazard combinations that - depending on the time scale - are mutually

  17. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  18. Girls can play ball: Stereotype threat reduces variability in a motor skill.

    PubMed

    Huber, Meghan E; Brown, Adam J; Sternad, Dagmar

    2016-09-01

    The majority of research on stereotype threat shows what is expected: threat debilitates performance. However, facilitation is also possible, although seldom reported. This study investigated how stereotype threat influences novice females when performing the sensorimotor task of bouncing a ball to a target. We tested the predictions of two prevailing accounts for debilitation and facilitation due to sterotype threat effects: working memory and mere effort. Experimental results showed that variability in performance decreased more in stigmatized females than in control females, consistent with the prediction of the mere effort account, but inconsistent with the working memory account. These findings suggest that stereotype threat effects may be predicated upon the correctness of the dominant motor behavior, rather than on a novice-expert distinction or task difficulty. Further, a comprehensive understanding should incorporate the fact that stereotype threat can facilitate, as well as debilitate, performance. Copyright © 2016 Elsevier B.V. All rights reserved.

  19. Examining the Association between Hazardous Waste Facilities and Rural "Brain Drain"

    ERIC Educational Resources Information Center

    Hunter, Lori M.; Sutton, Jeannette

    2004-01-01

    Rural communities are increasingly being faced with the prospect of accepting facilities characterized as "opportunity-threat," such as facilities that generate, treat, store, or otherwise dispose of hazardous wastes. Such facilities may offer economic gains through jobs and tax revenue, although they may also act as environmental "disamenities."…

  20. Girls Can Play Ball: Stereotype Threat Reduces Variability in a Motor Skill

    PubMed Central

    Huber, Meghan E.; Brown, Adam J.; Sternad, Dagmar

    2016-01-01

    The majority of research on stereotype threat shows what is expected: threat debilitates performance. However, facilitation is also possible, although seldom reported. This study investigated how stereotype threat influences novice females when performing the sensorimotor task of bouncing a ball to target. We tested the predictions of two prevailing accounts for debilitation and facilitation due to ST effects: working memory and mere effort. Experimental results showed that variability in performance decreased more in stigmatized females than in control females, consistent with the prediction of the mere effort account, but inconsistent with the working memory account. These findings suggest that stereotype threat effects may be predicated upon the correctness of the dominant motor behavior rather than on a novice-expert distinction or task difficulty. Further, a comprehensive understanding should incorporate the fact that stereotype threat can facilitate, as well as debilitate, performance. PMID:27249638

  1. Assessing the long-term probabilistic volcanic hazard for tephra fallout in Reykjavik, Iceland: a preliminary multi-source analysis

    NASA Astrophysics Data System (ADS)

    Tonini, Roberto; Barsotti, Sara; Sandri, Laura; Tumi Guðmundsson, Magnús

    2015-04-01

    Icelandic volcanism is largely dominated by basaltic magma. Nevertheless the presence of glaciers over many Icelandic volcanic systems results in frequent phreatomagmatic eruptions and associated tephra production, making explosive eruptions the most common type of volcanic activity. Jökulhlaups are commonly considered as major volcanic hazard in Iceland for their high frequency and potentially very devastating local impact. Tephra fallout is also frequent and can impact larger areas. It is driven by the wind direction that can change with both altitude and season, making impossible to predict a priori where the tephra will be deposited during the next eruptions. Most of the volcanic activity in Iceland occurs in the central eastern part, over 100 km to the east of the main population centre around the capital Reykjavík. Therefore, the hazard from tephra fallout in Reykjavík is expected to be smaller than for communities settled near the main volcanic systems. However, within the framework of quantitative hazard and risk analyses, less frequent and/or less intense phenomena should not be neglected, since their risk evaluation depends on the effects suffered by the selected target. This is particularly true if the target is highly vulnerable, as large urban areas or important infrastructures. In this work we present the preliminary analysis aiming to perform a Probabilistic Volcanic Hazard Assessment (PVHA) for tephra fallout focused on the target area which includes the municipality of Reykjavík and the Keflavík international airport. This approach reverts the more common perspective where the hazard analysis is focused on the source (the volcanic system) and it follows a multi-source approach: indeed, the idea is to quantify, homogeneously, the hazard due to the main hazardous volcanoes that could pose a tephra fallout threat for the municipality of Reykjavík and the Keflavík airport. PVHA for each volcanic system is calculated independently and the results

  2. Signals of threat do not capture, but prioritize, attention: a conditioning approach.

    PubMed

    Notebaert, Lies; Crombez, Geert; Van Damme, Stefaan; De Houwer, Jan; Theeuwes, Jan

    2011-02-01

    Research suggests that threatening information captures attention more rapidly than neutral information. However, in most studies threat stimuli differ perceptually from neutral stimuli and are instrumental to perform the task, leaving the question unanswered whether threat is sufficient to capture attention. In experiment 1, we designed a visual search task with stimuli of equal salience (colored circles) that have the potential to lead to efficient search (10 ms/item). In experiment 2, one of the colors (conditioned stimulus, CS+) was made threatening by means of fear conditioning. Participants responded to a target presented in one of the circles. Overall, the search was faster on congruent trials (where the target was presented in the CS+) than on baseline trials (where the CS + was absent). Furthermore, the search was slower on incongruent trials (where the target was presented in another color than the CS+) than on baseline trials. The search on congruent trials was affected by set size (90 ms/item), but to a lesser extent than on baseline trials (105 ms/item). We conclude that threat prioritizes, but does not capture attention. PsycINFO Database Record (c) 2011 APA, all rights reserved.

  3. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  4. Monitoring Space Weather Hazards caused by geomagnetic disturbances with Space Hazard Monitor (SHM) systems

    NASA Astrophysics Data System (ADS)

    Xu, Z.; Gannon, J. L.; Peek, T. A.; Lin, D.

    2017-12-01

    One space weather hazard is the Geomagnetically Induced Currents (GICs) in the electric power transmission systems, which is naturally induced geoelectric field during the geomagnetic disturbances (GMDs). GICs are a potentially catastrophic threat to bulk power systems. For instance, the Blackout in Quebec in March 1989 was caused by GMDs during a significant magnetic storm. To monitor the GMDs, the autonomous Space Hazard Monitor (SHM) system is developed recently. The system includes magnetic field measurement from magnetometers and geomagnetic field measurement from electrodes. In this presentation, we introduce the six sites of SHMs which have been deployed in the US continental regions. The data from the magnetometers are processed with the Multiple Observatory Geomagnetic Data Analysis Software (MOGDAS). And the statistical results are presented here. It reveals not only the impacts of space weather over US continental region but also the potential of improving instrumentation development to provide better space weather monitor.

  5. Convolutional neural network based side attack explosive hazard detection in three dimensional voxel radar

    NASA Astrophysics Data System (ADS)

    Brockner, Blake; Veal, Charlie; Dowdy, Joshua; Anderson, Derek T.; Williams, Kathryn; Luke, Robert; Sheen, David

    2018-04-01

    The identification followed by avoidance or removal of explosive hazards in past and/or present conflict zones is a serious threat for both civilian and military personnel. This is a challenging task as variability exists with respect to the objects, their environment and emplacement context, to name a few factors. A goal is the development of automatic or human-in-the-loop sensor technologies that leverage signal processing, data fusion and machine learning. Herein, we explore the detection of side attack explosive hazards (SAEHs) in three dimensional voxel space radar via different shallow and deep convolutional neural network (CNN) architectures. Dimensionality reduction is performed by using multiple projected images versus the raw three dimensional voxel data, which leads to noteworthy savings in input size and associated network hyperparameters. Last, we explore the accuracy and interpretation of solutions learned via random versus intelligent network weight initialization. Experiments are provided on a U.S. Army data set collected over different times, weather conditions, target types and concealments. Preliminary results indicate that deep learning can perform as good as, if not better, than a skilled domain expert, even in light of limited training data with a class imbalance.

  6. Method for immobilizing mixed waste chloride salts containing radionuclides and other hazardous wastes

    DOEpatents

    Lewis, Michele A.; Johnson, Terry R.

    1993-09-07

    The invention is a method for the encapsulation of soluble radioactive waste chloride salts containing radionuclides such as strontium, cesium and hazardous wastes such as barium so that they may be permanently stored without future threat to the environment. The process consists of contacting the salts containing the radionuclides and hazardous wastes with certain zeolites which have been found to ion exchange with the radionuclides and to occlude the chloride salts so that the resulting product is leach resistant.

  7. Method for immobilizing mixed waste chloride salts containing radionuclides and other hazardous wastes

    DOEpatents

    Lewis, Michele A.; Johnson, Terry R.

    1993-01-01

    The invention is a method for the encapsulation of soluble radioactive waste chloride salts containing radionuclides such as strontium, cesium and hazardous wastes such as barium so that they may be permanently stored without future threat to the environment. The process consists of contacting the salts containing the radionuclides and hazardous wastes with certain zeolites which have been found to ion exchange with the radionuclides and to occlude the chloride salts so that the resulting product is leach resistant.

  8. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  9. Emergency Planning Guidelines for Campus Health Services: An All-Hazards Approach

    ERIC Educational Resources Information Center

    Journal of American College Health, 2011

    2011-01-01

    This document, written collaboratively by members of ACHA's Emerging Public Health Threats and Emergency Response Coalition and Campus Safety and Violence Coalition, is designed to assist members of the college health community in planning for emergencies using an all-hazards approach. Its perspective is both macro and micro, beginning with a…

  10. The cyber threat, trophy information and the fortress mentality.

    PubMed

    Scully, Tim

    2011-10-01

    'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.

  11. Pareto frontier analyses based decision making tool for transportation of hazardous waste.

    PubMed

    Das, Arup; Mazumder, T N; Gupta, A K

    2012-08-15

    Transportation of hazardous wastes through a region poses immense threat on the development along its road network. The risk to the population, exposed to such activities, has been documented in the past. However, a comprehensive framework for routing hazardous wastes has often been overlooked. A regional Hazardous Waste Management scheme should incorporate a comprehensive framework for hazardous waste transportation. This framework would incorporate the various stakeholders involved in decision making. Hence, a multi-objective approach is required to safeguard the interest of all the concerned stakeholders. The objective of this study is to design a methodology for routing of hazardous wastes between the generating units and the disposal facilities through a capacity constrained network. The proposed methodology uses posteriori method with multi-objective approach to find non-dominated solutions for the system consisting of multiple origins and destinations. A case study of transportation of hazardous wastes in Kolkata Metropolitan Area has also been provided to elucidate the methodology. Copyright © 2012 Elsevier B.V. All rights reserved.

  12. Smart CMOS sensor for wideband laser threat detection

    NASA Astrophysics Data System (ADS)

    Schwarze, Craig R.; Sonkusale, Sameer

    2015-09-01

    The proliferation of lasers has led to their widespread use in applications ranging from short range standoff chemical detection to long range Lidar sensing and target designation operating across the UV to LWIR spectrum. Recent advances in high energy lasers have renewed the development of laser weapons systems. The ability to measure and assess laser source information is important to both identify a potential threat as well as determine safety and nominal hazard zone (NHZ). Laser detection sensors are required that provide high dynamic range, wide spectral coverage, pulsed and continuous wave detection, and large field of view. OPTRA, Inc. and Tufts have developed a custom ROIC smart pixel imaging sensor architecture and wavelength encoding optics for measurement of source wavelength, pulse length, pulse repetition frequency (PRF), irradiance, and angle of arrival. The smart architecture provides dual linear and logarithmic operating modes to provide 8+ orders of signal dynamic range and nanosecond pulse measurement capability that can be hybridized with the appropriate detector array to provide UV through LWIR laser sensing. Recent advances in sputtering techniques provide the capability for post-processing CMOS dies from the foundry and patterning PbS and PbSe photoconductors directly on the chip to create a single monolithic sensor array architecture for measuring sources operating from 0.26 - 5.0 microns, 1 mW/cm2 - 2 kW/cm2.

  13. Potential primary and secondary hazards of avicides

    USGS Publications Warehouse

    Schafer, E.W.; Clark, Dell O.

    1984-01-01

    There are six chemicals or groups of chemicals that are currently registered as avicides that can be used in some or all of the U.S. Most of these chemicals, because of their diverse chemical composition and innate toxicological effects, present somewhat different primary and secondary hazards to avian and mammalian predators and scavengers. Of the chemicals reviewed, all appear to present some degree of primary hazard to non-target birds and mammals; however, PA-14, the Starlicide family of chemicals and fenthion appear to be the least hazardous when used according to use directions. 4-Aminopyridine, endrin and strychnine, because of their high acute toxicity and lack of selectivity, must be considered potentially more hazardous. With respect to secondary hazards, the ranking of chemicals changes considerably and only PA-14 appears to present a negligible hazard. The Starlicide family of chemicals presents negligible hazards to most animal species under currently registered uses, but may be potentially hazardous to cats and owls under specific use conditions. Two chemicals, 4-aminopyridine and strychnine, are potentially more hazardous to predatory and scavenger animals due to their highly toxic nature and rapid lethal effects in target species, leaving unassimilated chemical in the gastrointestinal tract. The remaining chemicals, endrin and fenthion, have been shown to possess the potential for more significant secondary poisoning; however, because of restrictive uses, most of the potential hazards have been avoided in operational use.

  14. Natural Hazard Resilience - A Large-scale Transdisciplinary "National Science Challenge" for New Zealand

    NASA Astrophysics Data System (ADS)

    Cronin, S. J.

    2017-12-01

    The National Science Challenges are initiatives to address the most important public science issues that face New Zealand with long-term funding and the combined strength of a coordinated science-sector behind them. Eleven major topics are tackled, across our human, natural and built environments. In the "Resilience Challenge" we address New Zealand's natural hazards. Alongside severe metrological threats, New Zealand also faces one of the highest levels of earthquake and volcanic hazard in the world. Resilience is a hotly discussed concept, here, we take the view: Resilience encapsulates the features of a system to anticipate threats, acknowledge there will be impacts (no matter how prepared we are), quickly pick up the pieces, as well as learn and adapt from the experience to better absorb and rebound from future shocks. Our research must encompass innovation in building and lifelines engineering, planning and regulation, emergency management practice, alongside understanding how our natural hazard systems work, how we monitor them and how our communities/governance/industries can be influenced and encouraged (e.g., via economic incentives) to develop and implement resilience practice. This is a complex interwoven mix of areas and is best addressed through case-study areas where researchers and the users of the research can jointly identify problems and co-develop science solutions. I will highlight some of the strengths and weaknesses of this coordinated approach to an all-hazard, all-country problem, using the example of the Resilience Challenge approach after its first two and a half years of operation. Key issues include balancing investment into high-profile (and often high consequence), but rare hazards against the frequent "monthly" hazards that collectively occupy regional and local governance. Also, it is clear that despite increasingly sophisticated hazard and hazard mitigation knowledge being generated in engineering and social areas, a range of policy

  15. Assessment of volcanic hazards, vulnerability, risk and uncertainty (Invited)

    NASA Astrophysics Data System (ADS)

    Sparks, R. S.

    2009-12-01

    A volcanic hazard is any phenomenon that threatens communities . These hazards include volcanic events like pyroclastic flows, explosions, ash fall and lavas, and secondary effects such as lahars and landslides. Volcanic hazards are described by the physical characteristics of the phenomena, by the assessment of the areas that they are likely to affect and by the magnitude-dependent return period of events. Volcanic hazard maps are generated by mapping past volcanic events and by modelling the hazardous processes. Both these methods have their strengths and limitations and a robust map should use both approaches in combination. Past records, studied through stratigraphy, the distribution of deposits and age dating, are typically incomplete and may be biased. Very significant volcanic hazards, such as surge clouds and volcanic blasts, are not well-preserved in the geological record for example. Models of volcanic processes are very useful to help identify hazardous areas that do not have any geological evidence. They are, however, limited by simplifications and incomplete understanding of the physics. Many practical volcanic hazards mapping tools are also very empirical. Hazards maps are typically abstracted into hazards zones maps, which are some times called threat or risk maps. Their aim is to identify areas at high levels of threat and the boundaries between zones may take account of other factors such as roads, escape routes during evacuation, infrastructure. These boundaries may change with time due to new knowledge on the hazards or changes in volcanic activity levels. Alternatively they may remain static but implications of the zones may change as volcanic activity changes. Zone maps are used for planning purposes and for management of volcanic crises. Volcanic hazards maps are depictions of the likelihood of future volcanic phenomena affecting places and people. Volcanic phenomena are naturally variable, often complex and not fully understood. There are

  16. Adrenocortical responses to offspring-directed threats in two open-nesting birds.

    PubMed

    Butler, Luke K; Bisson, Isabelle-Anne; Hayden, Timothy J; Wikelski, Martin; Romero, L Michael

    2009-07-01

    Dependent young are often easy targets for predators, so for many parent vertebrates, responding to offspring-directed threats is a fundamental part of reproduction. We tested the parental adrenocortical response of the endangered black-capped vireo (Vireo atricapilla) and the common white-eyed vireo (V. griseus) to acute and chronic threats to their offspring. Like many open-nesting birds, our study species experience high offspring mortality. Parents responded behaviorally to a predator decoy or human 1-2m from their nests, but, in contrast to similar studies of cavity-nesting birds, neither these acute threats nor chronic offspring-directed threats altered plasma corticosterone concentrations of parents. Although parents in this study showed no corticosterone response to offspring-directed threats, they always increased corticosterone concentrations in response to capture. To explain these results, we propose that parents perceive their risk of nest-associated death differently depending on nest type, with cavity-nesting adults perceiving greater risk to themselves than open-nesters that can readily detect and escape from offspring-directed threats. Our results agree with previous studies suggesting that the hypothalamic-pituitary-adrenal axis, a major physiological mechanism for coping with threats to survival, probably plays no role in coping with threats to offspring when risks to parents and offspring are not correlated. We extend that paradigm by demonstrating that nest style may influence how adults perceive the correlation between offspring-directed and self-directed threats.

  17. A Probabilistic Tsunami Hazard Study of the Auckland Region, Part I: Propagation Modelling and Tsunami Hazard Assessment at the Shoreline

    NASA Astrophysics Data System (ADS)

    Power, William; Wang, Xiaoming; Lane, Emily; Gillibrand, Philip

    2013-09-01

    Regional source tsunamis represent a potentially devastating threat to coastal communities in New Zealand, yet are infrequent events for which little historical information is available. It is therefore essential to develop robust methods for quantitatively estimating the hazards posed, so that effective mitigation measures can be implemented. We develop a probabilistic model for the tsunami hazard posed to the Auckland region of New Zealand from the Kermadec Trench and the southern New Hebrides Trench subduction zones. An innovative feature of our model is the systematic analysis of uncertainty regarding the magnitude-frequency distribution of earthquakes in the source regions. The methodology is first used to estimate the tsunami hazard at the coastline, and then used to produce a set of scenarios that can be applied to produce probabilistic maps of tsunami inundation for the study region; the production of these maps is described in part II. We find that the 2,500 year return period regional source tsunami hazard for the densely populated east coast of Auckland is dominated by events originating in the Kermadec Trench, while the equivalent hazard to the sparsely populated west coast is approximately equally due to events on the Kermadec Trench and the southern New Hebrides Trench.

  18. Reactivity to uncertain threat as a familial vulnerability factor for alcohol use disorder.

    PubMed

    Gorka, S M; Hee, D; Lieberman, L; Mittal, V A; Phan, K L; Shankman, S A

    2016-12-01

    When sober, problematic drinkers display exaggerated reactivity to threats that are uncertain (U-threat). Since this aversive affective state can be alleviated via acute alcohol intoxication, it has been posited that individuals who exhibit heightened reactivity to U-threat at baseline are motivated to use alcohol as a means of avoidance-based coping, setting the stage for excessive drinking. To date, however, no study has attempted to characterize the dispositional nature of exaggerated reactivity to U-threat and test whether it is a vulnerability factor or exclusively a disease marker of problematic alcohol use. The current investigation utilized a family study design to address these gaps by examining whether (1) reactivity to U-threat is associated with risk for problematic alcohol use, defined by family history of alcohol use disorder (AUD) and (2) reactivity to U-threat is correlated amongst adult biological siblings. A total of 157 families, and 458 individuals, participated in the study and two biological siblings completed a threat-of-shock task designed to probe reactivity to U-threat and predictable threat (P-threat). Startle potentiation was collected as an index of aversive responding. Within biological siblings, startle potentiation to U-threat [intraclass correlation (ICC) = 0.35] and P-threat (ICC = 0.63) was significantly correlated. In addition, independent of an individuals' own AUD status, startle potentiation to U-threat, but not P-threat, was positively associated with risk for AUD (i.e. AUD family history). This suggests that heightened reactivity to U-threat may be a familial vulnerability factor for problematic drinking and a novel prevention target for AUD.

  19. Threat affects risk preferences in movement decision making

    PubMed Central

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  20. Threat affects risk preferences in movement decision making.

    PubMed

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  1. The effects of momentary visual disruption on hazard anticipation and awareness in driving.

    PubMed

    Borowsky, Avinoam; Horrey, William J; Liang, Yulan; Garabet, Angela; Simmons, Lucinda; Fisher, Donald L

    2015-01-01

    Driver distraction is known to increase crash risk, especially when a driver glances inside the vehicle for especially long periods of time. Though it is clear that such glances increase the risk for the driver when looking inside the vehicle, it is less clear how these glances disrupt the ongoing processing of information outside the vehicle once the driver's eyes return to the road. The present study was aimed at exploring the effect of in-vehicle glances on the top-down processes that guide the detection and monitoring of hazards on the forward roadway. Using a driving simulator, 12 participants were monitored with an eye-tracking system while they navigated various hazardous scenarios. Six participants were momentarily interrupted by a visual secondary task (simulating a glance inside the vehicle) prior to the occurrence of a potential hazard and 6 were not. Eye movement analyses showed that interrupted drivers often failed to continue scanning for a potential hazard when their forward view reappeared, especially when the potential threat could not easily be localized. Additionally, drivers' self-appraisal of workload and performance of the driving task indicated that, contrary to what one might expect, drivers in the interruption condition reported workload levels lower than and performance equal to drivers in the no interruption condition. Drivers who are momentarily disrupted even for a brief duration are at risk of missing important information when they return their gaze to the forward roadway. In addition, because they are not aware of missing this information they are likely to continue engaging in in-vehicle tasks even though they are demonstrably unsafe. The implications for safety, calibration, and targeted remediation are discussed.

  2. Evaluating anthropogenic threats to endangered killer whales to inform effective recovery plans.

    PubMed

    Lacy, Robert C; Williams, Rob; Ashe, Erin; Balcomb Iii, Kenneth C; Brent, Lauren J N; Clark, Christopher W; Croft, Darren P; Giles, Deborah A; MacDuffee, Misty; Paquet, Paul C

    2017-10-26

    Understanding cumulative effects of multiple threats is key to guiding effective management to conserve endangered species. The critically endangered, Southern Resident killer whale population of the northeastern Pacific Ocean provides a data-rich case to explore anthropogenic threats on population viability. Primary threats include: limitation of preferred prey, Chinook salmon; anthropogenic noise and disturbance, which reduce foraging efficiency; and high levels of stored contaminants, including PCBs. We constructed a population viability analysis to explore possible demographic trajectories and the relative importance of anthropogenic stressors. The population is fragile, with no growth projected under current conditions, and decline expected if new or increased threats are imposed. Improvements in fecundity and calf survival are needed to reach a conservation objective of 2.3% annual population growth. Prey limitation is the most important factor affecting population growth. However, to meet recovery targets through prey management alone, Chinook abundance would have to be sustained near the highest levels since the 1970s. The most optimistic mitigation of noise and contaminants would make the difference between a declining and increasing population, but would be insufficient to reach recovery targets. Reducing acoustic disturbance by 50% combined with increasing Chinook by 15% would allow the population to reach 2.3% growth.

  3. Deep learning algorithms for detecting explosive hazards in ground penetrating radar data

    NASA Astrophysics Data System (ADS)

    Besaw, Lance E.; Stimac, Philip J.

    2014-05-01

    Buried explosive hazards (BEHs) have been, and continue to be, one of the most deadly threats in modern conflicts. Current handheld sensors rely on a highly trained operator for them to be effective in detecting BEHs. New algorithms are needed to reduce the burden on the operator and improve the performance of handheld BEH detectors. Traditional anomaly detection and discrimination algorithms use "hand-engineered" feature extraction techniques to characterize and classify threats. In this work we use a Deep Belief Network (DBN) to transcend the traditional approaches of BEH detection (e.g., principal component analysis and real-time novelty detection techniques). DBNs are pretrained using an unsupervised learning algorithm to generate compressed representations of unlabeled input data and form feature detectors. They are then fine-tuned using a supervised learning algorithm to form a predictive model. Using ground penetrating radar (GPR) data collected by a robotic cart swinging a handheld detector, our research demonstrates that relatively small DBNs can learn to model GPR background signals and detect BEHs with an acceptable false alarm rate (FAR). In this work, our DBNs achieved 91% probability of detection (Pd) with 1.4 false alarms per square meter when evaluated on anti-tank and anti-personnel targets at temperate and arid test sites. This research demonstrates that DBNs are a viable approach to detect and classify BEHs.

  4. Communicating Volcanic Hazards in the North Pacific

    NASA Astrophysics Data System (ADS)

    Dehn, J.; Webley, P.; Cunningham, K. W.

    2014-12-01

    For over 25 years, effective hazard communication has been key to effective mitigation of volcanic hazards in the North Pacific. These hazards are omnipresent, with a large event happening in Alaska every few years to a decade, though in many cases can happen with little or no warning (e.g. Kasatochi and Okmok in 2008). Here a useful hazard mitigation strategy has been built on (1) a large database of historic activity from many datasets, (2) an operational alert system with graduated levels of concern, (3) scenario planning, and (4) routine checks and communication with emergency managers and the public. These baseline efforts are then enhanced in the time of crisis with coordinated talking points, targeted studies and public outreach. Scientists naturally tend to target other scientists as their audience, whereas in effective monitoring of hazards that may only occur on year to decadal timescales, details can distract from the essentially important information. Creating talking points and practice in public communications can help make hazard response a part of the culture. Promoting situational awareness and familiarity can relieve indecision and concerns at the time of a crisis.

  5. High Speed Hazard Avoidance for Unmanned Ground Vehicles in Emergency Situations

    DTIC Science & Technology

    2006-11-01

    xx κτ ,vnominal ≡ , where x designates the UGV osition in space. If a hazard detected by a range sensor oses a threat, the UGV enacts an...source of error is the calculation of the path curvature, which can be highly sensitive to the GPS and INS position estimates. 6.2. Validation of

  6. Conceptual geoinformation model of natural hazards risk assessment

    NASA Astrophysics Data System (ADS)

    Kulygin, Valerii

    2016-04-01

    Natural hazards are the major threat to safe interactions between nature and society. The assessment of the natural hazards impacts and their consequences is important in spatial planning and resource management. Today there is a challenge to advance our understanding of how socio-economical and climate changes will affect the frequency and magnitude of hydro-meteorological hazards and associated risks. However, the impacts from different types of natural hazards on various marine and coastal economic activities are not of the same type. In this study, the conceptual geomodel of risk assessment is presented to highlight the differentiation by the type of economic activities in extreme events risk assessment. The marine and coastal ecosystems are considered as the objects of management, on the one hand, and as the place of natural hazards' origin, on the other hand. One of the key elements in describing of such systems is the spatial characterization of their components. Assessment of ecosystem state is based on ecosystem indicators (indexes). They are used to identify the changes in time. The scenario approach is utilized to account for the spatio-temporal dynamics and uncertainty factors. Two types of scenarios are considered: scenarios of using ecosystem services by economic activities and scenarios of extreme events and related hazards. The reported study was funded by RFBR, according to the research project No. 16-35-60043 mol_a_dk.

  7. A~probabilistic tsunami hazard assessment for Indonesia

    NASA Astrophysics Data System (ADS)

    Horspool, N.; Pranantyo, I.; Griffin, J.; Latief, H.; Natawidjaja, D. H.; Kongko, W.; Cipta, A.; Bustaman, B.; Anugrah, S. D.; Thio, H. K.

    2014-05-01

    Probabilistic hazard assessments are a fundamental tool for assessing the threats posed by hazards to communities and are important for underpinning evidence based decision making on risk mitigation activities. Indonesia has been the focus of intense tsunami risk mitigation efforts following the 2004 Indian Ocean Tsunami, but this has been largely concentrated on the Sunda Arc, with little attention to other tsunami prone areas of the country such as eastern Indonesia. We present the first nationally consistent Probabilistic Tsunami Hazard Assessment (PTHA) for Indonesia. This assessment produces time independent forecasts of tsunami hazard at the coast from tsunami generated by local, regional and distant earthquake sources. The methodology is based on the established monte-carlo approach to probabilistic seismic hazard assessment (PSHA) and has been adapted to tsunami. We account for sources of epistemic and aleatory uncertainty in the analysis through the use of logic trees and through sampling probability density functions. For short return periods (100 years) the highest tsunami hazard is the west coast of Sumatra, south coast of Java and the north coast of Papua. For longer return periods (500-2500 years), the tsunami hazard is highest along the Sunda Arc, reflecting larger maximum magnitudes along the Sunda Arc. The annual probability of experiencing a tsunami with a height at the coast of > 0.5 m is greater than 10% for Sumatra, Java, the Sunda Islands (Bali, Lombok, Flores, Sumba) and north Papua. The annual probability of experiencing a tsunami with a height of >3.0 m, which would cause significant inundation and fatalities, is 1-10% in Sumatra, Java, Bali, Lombok and north Papua, and 0.1-1% for north Sulawesi, Seram and Flores. The results of this national scale hazard assessment provide evidence for disaster managers to prioritise regions for risk mitigation activities and/or more detailed hazard or risk assessment.

  8. A probabilistic tsunami hazard assessment for Indonesia

    NASA Astrophysics Data System (ADS)

    Horspool, N.; Pranantyo, I.; Griffin, J.; Latief, H.; Natawidjaja, D. H.; Kongko, W.; Cipta, A.; Bustaman, B.; Anugrah, S. D.; Thio, H. K.

    2014-11-01

    Probabilistic hazard assessments are a fundamental tool for assessing the threats posed by hazards to communities and are important for underpinning evidence-based decision-making regarding risk mitigation activities. Indonesia has been the focus of intense tsunami risk mitigation efforts following the 2004 Indian Ocean tsunami, but this has been largely concentrated on the Sunda Arc with little attention to other tsunami prone areas of the country such as eastern Indonesia. We present the first nationally consistent probabilistic tsunami hazard assessment (PTHA) for Indonesia. This assessment produces time-independent forecasts of tsunami hazards at the coast using data from tsunami generated by local, regional and distant earthquake sources. The methodology is based on the established monte carlo approach to probabilistic seismic hazard assessment (PSHA) and has been adapted to tsunami. We account for sources of epistemic and aleatory uncertainty in the analysis through the use of logic trees and sampling probability density functions. For short return periods (100 years) the highest tsunami hazard is the west coast of Sumatra, south coast of Java and the north coast of Papua. For longer return periods (500-2500 years), the tsunami hazard is highest along the Sunda Arc, reflecting the larger maximum magnitudes. The annual probability of experiencing a tsunami with a height of > 0.5 m at the coast is greater than 10% for Sumatra, Java, the Sunda islands (Bali, Lombok, Flores, Sumba) and north Papua. The annual probability of experiencing a tsunami with a height of > 3.0 m, which would cause significant inundation and fatalities, is 1-10% in Sumatra, Java, Bali, Lombok and north Papua, and 0.1-1% for north Sulawesi, Seram and Flores. The results of this national-scale hazard assessment provide evidence for disaster managers to prioritise regions for risk mitigation activities and/or more detailed hazard or risk assessment.

  9. The Target Industries: Profiles of Five Hazardous Occupations.

    ERIC Educational Resources Information Center

    Occupational Safety and Health Administration, Washington, DC.

    To contribute to a fuller understanding and awareness of the hazards involved in industries as well as to call attention to steps being taken to solve safety problems, this pamphlet surveys five industries cited among those having the highest rates of job-related injuries in the country. Industries include: (1) Roofing and Sheet Metal, (2)…

  10. Place-classification analysis of community vulnerability to near-field tsunami threats in the U.S. Pacific Northwest (Invited)

    NASA Astrophysics Data System (ADS)

    Wood, N. J.; Jones, J.; Spielman, S.

    2013-12-01

    Near-field tsunami hazards are credible threats to many coastal communities throughout the world. Along the U.S. Pacific Northwest coast, low-lying areas could be inundated by a series of catastrophic tsunami waves that begin to arrive in a matter of minutes following a Cascadia subduction zone (CSZ) earthquake. This presentation summarizes analytical efforts to classify communities with similar characteristics of community vulnerability to tsunami hazards. This work builds on past State-focused inventories of community exposure to CSZ-related tsunami hazards in northern California, Oregon, and Washington. Attributes used in the classification, or cluster analysis, include demography of residents, spatial extent of the developed footprint based on mid-resolution land cover data, distribution of the local workforce, and the number and type of public venues, dependent-care facilities, and community-support businesses. Population distributions also are characterized by a function of travel time to safety, based on anisotropic, path-distance, geospatial modeling. We used an unsupervised-model-based clustering algorithm and a v-fold, cross-validation procedure (v=50) to identify the appropriate number of community types. We selected class solutions that provided the appropriate balance between parsimony and model fit. The goal of the vulnerability classification is to provide emergency managers with a general sense of the types of communities in tsunami hazard zones based on similar characteristics instead of only providing an exhaustive list of attributes for individual communities. This classification scheme can be then used to target and prioritize risk-reduction efforts that address common issues across multiple communities. The presentation will include a discussion of the utility of proposed place classifications to support regional preparedness and outreach efforts.

  11. Confronting unknown planetary boundary threats from chemical pollution.

    PubMed

    Persson, Linn M; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; MacLeod, Matthew; McLachlan, Michael S

    2013-11-19

    Rockström et al. proposed a set of planetary boundaries that delimitate a "safe operating space for humanity". One of the planetary boundaries is determined by "chemical pollution", however no clear definition was provided. Here, we propose that there is no single chemical pollution planetary boundary, but rather that many planetary boundary issues governed by chemical pollution exist. We identify three conditions that must be simultaneously met for chemical pollution to pose a planetary boundary threat. We then discuss approaches to identify chemicals that could fulfill those conditions, and outline a proactive hazard identification strategy that considers long-range transport and the reversibility of chemical pollution.

  12. STEREO as a "Planetary Hazards" Mission

    NASA Technical Reports Server (NTRS)

    Guhathakurta, M.; Thompson, B. J.

    2014-01-01

    NASA's twin STEREO probes, launched in 2006, have advanced the art and science of space weather forecasting more than any other spacecraft or solar observatory. By surrounding the Sun, they provide previously-impossible early warnings of threats approaching Earth as they develop on the solar far side. They have also revealed the 3D shape and inner structure of CMEs-massive solar storms that can trigger geomagnetic storms when they collide with Earth. This improves the ability of forecasters to anticipate the timing and severity of such events. Moreover, the unique capability of STEREO to track CMEs in three dimensions allows forecasters to make predictions for other planets, giving rise to the possibility of interplanetary space weather forecasting too. STEREO is one of those rare missions for which "planetary hazards" refers to more than one world. The STEREO probes also hold promise for the study of comets and potentially hazardous asteroids.

  13. Comparative risk analysis of technological hazards (a review).

    PubMed Central

    Kates, R W; Kasperson, J X

    1983-01-01

    Hazards are threats to people and what they value and risks are measures of hazards. Comparative analyses of the risks and hazards of technology can be dated to Starr's 1969 paper [Starr, C. (1969) Science 165, 1232-1238] but are rooted in recent trends in the evolution of technology, the identification of hazard, the perception of risk, and the activities of society. These trends have spawned an interdisciplinary quasi profession with new terminology, methodology, and literature. A review of 54 English-language monographs and book-length collections, published between 1970 and 1983, identified seven recurring themes: (i) overviews of the field of risk assessment, (ii) efforts to estimate and quantify risk, (iii) discussions of risk acceptability, (iv) perception, (v) analyses of regulation, (vi) case studies of specific technological hazards, and (vii) agenda for research. Within this field, science occupies a unique niche, for many technological hazards transcend the realm of ordinary experience and require expert study. Scientists can make unique contributions to each area of hazard management but their primary contribution is the practice of basic science. Beyond that, science needs to further risk assessment by understanding the more subtle processes of hazard creation and by establishing conventions for estimating risk and for presenting and handling uncertainty. Scientists can enlighten the discussion of tolerable risk by setting risks into comparative contexts, by studying the process of evaluation, and by participating as knowledgeable individuals, but they cannot decide the issue. Science can inform the hazard management process by broadening the range of alternative control actions and modes of implementation and by devising methods to evaluate their effectiveness. PMID:6580625

  14. Addressing Loss of Efficiency Due to Misclassification Error in Enriched Clinical Trials for the Evaluation of Targeted Therapies Based on the Cox Proportional Hazards Model.

    PubMed

    Tsai, Chen-An; Lee, Kuan-Ting; Liu, Jen-Pei

    2016-01-01

    A key feature of precision medicine is that it takes individual variability at the genetic or molecular level into account in determining the best treatment for patients diagnosed with diseases detected by recently developed novel biotechnologies. The enrichment design is an efficient design that enrolls only the patients testing positive for specific molecular targets and randomly assigns them for the targeted treatment or the concurrent control. However there is no diagnostic device with perfect accuracy and precision for detecting molecular targets. In particular, the positive predictive value (PPV) can be quite low for rare diseases with low prevalence. Under the enrichment design, some patients testing positive for specific molecular targets may not have the molecular targets. The efficacy of the targeted therapy may be underestimated in the patients that actually do have the molecular targets. To address the loss of efficiency due to misclassification error, we apply the discrete mixture modeling for time-to-event data proposed by Eng and Hanlon [8] to develop an inferential procedure, based on the Cox proportional hazard model, for treatment effects of the targeted treatment effect for the true-positive patients with the molecular targets. Our proposed procedure incorporates both inaccuracy of diagnostic devices and uncertainty of estimated accuracy measures. We employed the expectation-maximization algorithm in conjunction with the bootstrap technique for estimation of the hazard ratio and its estimated variance. We report the results of simulation studies which empirically investigated the performance of the proposed method. Our proposed method is illustrated by a numerical example.

  15. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  16. Using hazard maps to identify and eliminate workplace hazards: a union-led health and safety training program.

    PubMed

    Anderson, Joe; Collins, Michele; Devlin, John; Renner, Paul

    2012-01-01

    The Institute for Sustainable Work and Environment and the Utility Workers Union of America worked with a professional evaluator to design, implement, and evaluate the results of a union-led system of safety-based hazard identification program that trained workers to use hazard maps to identify workplace hazards and target them for elimination. The evaluation documented program implementation and impact using data collected from both qualitative interviews and an on-line survey from worker trainers, plant managers, and health and safety staff. Managers and workers reported that not only were many dangerous hazards eliminated as a result of hazard mapping, some of which were long-standing, difficult-to-resolve issues, but the evaluation also documented improved communication between union members and management that both workers and managers agreed resulted in better, more sustainable hazard elimination.

  17. Hazard analysis of Clostridium perfringens in the Skylab Food System

    NASA Technical Reports Server (NTRS)

    Bourland, C. T.; Huber, C. S.; Kiser, P. R.; Heidelbaugh, N. D.; Rowley, D. B.

    1974-01-01

    The Skylab Food System presented unique microbiological problems because food was warmed in null-gravity and because the heat source was limited to 69.4 C (to prevent boiling in null-gravity). For these reasons, the foods were manufactured using critical control point techniques of quality control coupled with appropriate hazard analyses. One of these hazard analyses evaluated the threat from Clostridium perfringens. Samples of food were inoculated with C. perfringens and incubated for 2 h at temperatures ranging from 25 to 55 C. Generation times were determined for the foods at various temperatures. Results of these tests were evaluated taking into consideration: food-borne disease epidemiology, the Skylab food manufacturing procedures, and the performance requirements of the Skylab Food System. Based on this hazard analysis, a limit for C. perfringens of 100/g was established for Skylab foods.

  18. Variations in population vulnerability to tectonic and landslide-related tsunami hazards in Alaska

    USGS Publications Warehouse

    Wood, Nathan J.; Peters, Jeff

    2015-01-01

    Effective tsunami risk reduction requires an understanding of how at-risk populations are specifically vulnerable to tsunami threats. Vulnerability assessments primarily have been based on single hazard zones, even though a coastal community may be threatened by multiple tsunami sources that vary locally in terms of inundation extents and wave arrival times. We use the Alaskan coastal communities of Cordova, Kodiak, Seward, Valdez, and Whittier (USA), as a case study to explore population vulnerability to multiple tsunami threats. We use anisotropic pedestrian evacuation models to assess variations in population exposure as a function of travel time out of hazard zones associated with tectonic and landslide-related tsunamis (based on scenarios similar to the 1964 M w9.2 Good Friday earthquake and tsunami disaster). Results demonstrate that there are thousands of residents, employees, and business customers in tsunami hazard zones associated with tectonically generated waves, but that at-risk individuals will likely have sufficient time to evacuate to high ground before waves are estimated to arrive 30–60 min after generation. Tsunami hazard zones associated with submarine landslides initiated by a subduction zone earthquake are smaller and contain fewer people, but many at-risk individuals may not have enough time to evacuate as waves are estimated to arrive in 1–2 min and evacuations may need to occur during earthquake ground shaking. For all hazard zones, employees and customers at businesses far outnumber residents at their homes and evacuation travel times are highest on docks and along waterfronts. Results suggest that population vulnerability studies related to tsunami hazards should recognize non-residential populations and differences in wave arrival times if emergency managers are to develop realistic preparedness and outreach efforts.

  19. Natural and technologic hazardous material releases during and after natural disasters: a review.

    PubMed

    Young, Stacy; Balluz, Lina; Malilay, Josephine

    2004-04-25

    Natural disasters may be powerful and prominent mechanisms of direct and indirect hazardous material (hazmat) releases. Hazardous materials that are released as the result of a technologic malfunction precipitated by a natural event are referred to as natural-technologic or na-tech events. Na-tech events pose unique environmental and human hazards. Disaster-associated hazardous material releases are of concern, given increases in population density and accelerating industrial development in areas subject to natural disasters. These trends increase the probability of catastrophic future disasters and the potential for mass human exposure to hazardous materials released during disasters. This systematic review summarizes direct and indirect disaster-associated releases, as well as environmental contamination and adverse human health effects that have resulted from natural disaster-related hazmat incidents. Thorough examination of historic disaster-related hazmat releases can be used to identify future threats and improve mitigation and prevention efforts.

  20. Modelling the tsunami threat to Sydney Harbour, Australia, with comparisons to historical events.

    NASA Astrophysics Data System (ADS)

    Wilson, O.; Power, H.

    2016-12-01

    Sydney Harbour is an iconic location with a dense population and low-lying development. On the east coast of Australia, facing the Pacific Ocean it is exposed to several tsunamigenic trenches. To date, this is the most detailed assessment of the potential for earthquake-generated tsunami impact on Sydney Harbour. The tsunami wave trains modelled include tsunami modelled from earthquakes of magnitude 7.5, 8.0, 8.5 and 9.0 MW from the Puysegur and New Hebrides trenches. Historical events from Chile in 1960 and Japan in 2011 are also modelled for comparison. Using the hydrodynamic model ANUGA, results show that the events modelled have the potential to cause high current speeds, hazardous waves and rapid changes in water level. These effects are most dramatic at pinch points such as Spit Bridge and Anzac Bridge, particularly with regard to current speeds. Large waves are shown to be a particular threat at the mouth of the harbour, where the bathymetry causes the tsunami wave train to shoal. Inundation is less of a hazard for the tsunami events modlled, although some inundation is evident at several low-lying embayments in the south of the harbour. These results will provide an evidence base for tsunami threat emergency management.

  1. Countering Threat Networks

    DTIC Science & Technology

    2016-12-21

    PLANNING TO COUNTER THREAT NETWORKS  Joint Intelligence Preparation of the Operational Environment and Threat Networks...Army Expeditionary Forensic Facility in Afghanistan ........ E-9 E-4 Exploitation Support to Intelligence Fusion and Decision Making ......... E-10...Approach The groundwork for successful countering threat networks activities starts with information and intelligence to develop an understanding

  2. Targets as perceivers: How people determine when they will be negatively stereotyped

    PubMed Central

    Wout, Daryl A.; Shih, Margaret J.; Jackson, James S.; Sellers, Robert M.

    2009-01-01

    Research on stereotype threat has demonstrated that when targets are forced to contend with the threat of being negatively stereotyped, their academic performance suffers (Steele & Aronson, 1995). The present research explored how the targets of negative stereotypes determine when they must contend with this threat. Across five experiments, we manipulated both the possibility and probability that Black and female students would be stereotyped as unintelligent prior to taking an analytical test. Collectively, these experiments showed that these students only contended with stereotype threat when they perceived that it was both possible and probable that they would be negatively stereotyped. We discuss the implications of these findings on the experience of being the target of negative stereotypes and on the academic achievement of Blacks and women. PMID:19159136

  3. Downscaling GLOF Hazards: An in-depth look at the Nepal Himalaya

    NASA Astrophysics Data System (ADS)

    Rounce, D.; McKinney, D. C.; Lala, J.

    2016-12-01

    The Nepal Himalaya house a large number of glacial lakes that pose a flood hazard to downstream communities and infrastructure. The modeling of the entire process chain of these glacial lake outburst floods (GLOFs) has been advancing rapidly in recent years. The most common cause of failure is mass movement entering the glacial lake, which triggers a tsunami-like wave that breaches the terminal moraine and causes the ensuing downstream flood. Unfortunately, modeling the avalanche, the breach of the moraine, and the downstream flood requires a large amount of site-specific information and can be very labor-intensive. Therefore, these detailed models need to be paired with large-scale hazard assessments that identify the glacial lakes that are the biggest threat and the triggering events that threaten these lakes. This study discusses the merger of a large-scale, remotely-based hazard assessment with more detailed GLOF models to show how GLOF hazard modeling can be downscaled in the Nepal Himalaya.

  4. Extreme events and natural hazards: The complexity perspective

    NASA Astrophysics Data System (ADS)

    Schultz, Colin

    2012-10-01

    Advanced societies have become quite proficient at defending against moderate-size earthquakes, hurricanes, floods, or other natural assaults. What still pose a significant threat, however, are the unknowns, the extremes, the natural phenomena encompassed by the upper tail of the probability distribution. Alongside the large or powerful events, truly extreme natural disasters are those that tie different systems together: an earthquake that causes a tsunami, which leads to flooding, which takes down a nuclear reactor. In the geophysical monograph Extreme Events and Natural Hazards: The Complexity Perspective, editors A. Surjalal Sharma, Armin Bunde, Vijay P. Dimro, and Daniel N. Baker present a lens through which such multidisciplinary phenomena can be understood. In this interview, Eos talks to Sharma about complexity science, predicting extreme events and natural hazards, and the push for "big data."

  5. Reducing the risk of potential hazard in tourist activities of Mount Bromo

    NASA Astrophysics Data System (ADS)

    Meilani, R.; Muthiah, J.; Muntasib, E. K. S. H.

    2018-05-01

    Mount Bromo has been crowned as one of the most beautiful mountains in the world, having a particular landscape uniqueness. Not only volcano, Bromo also has savanna, sea of sands, and culture of Tengger tribe. Its panoramic landscape has attracted a large number of tourists, both domestic and foreign, despites the threat of eruption. To ensure tourists safety and satisfaction, the potentials hazard, both from eruption and other features should be managed carefully. The study objective was to identify and map hazard potentials and identify the existing hazard management. It was carried out in Mei – June 2017. Lava, tephra, eruption cloud, ash, earthquake, land sliding, extreme weather, slope, transportation modes (jeep, motorcycle, and horse), human, and land fire were found as potential hazards in Mount Bromo. Five locations had been identified as hazard area in the tourism areas, i.e. savanna, sea of sand, Bromo caldera and Pananjakan I trail and viewing point. Early warning system should be developed as part of hazard management in the area. Capacity building of local stakeholders and visitors would be needed to reduce risk of the hazard.

  6. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  7. Disaster Risks Reduction for Extreme Natural Hazards

    NASA Astrophysics Data System (ADS)

    Plag, H.; Jules-Plag, S.

    2013-12-01

    Mega disasters associated with extreme natural hazards have the potential to escalate the global sustainability crisis and put us close to the boundaries of the safe operating space for humanity. Floods and droughts are major threats that potentially could reach planetary extent, particularly through secondary economic and social impacts. Earthquakes and tsunamis frequently cause disasters that eventually could exceed the immediate coping capacity of the global economy, particularly since we have built mega cities in hazardous areas that are now ready to be harvested by natural hazards. Unfortunately, the more we learn to cope with the relatively frequent hazards (50 to 100 years events), the less we are worried about the low-probability, high-impact events (a few hundred and more years events). As a consequence, threats from the 500 years flood, drought, volcano eruption are not appropriately accounted for in disaster risk reduction (DRR) discussions. Extreme geohazards have occurred regularly throughout the past, but mostly did not cause major disasters because exposure of human assets to hazards was much lower in the past. The most extreme events that occurred during the last 2,000 years would today cause unparalleled damage on a global scale and could worsen the sustainability crisis. Simulation of these extreme hazards under present conditions can help to assess the disaster risk. Recent extreme earthquakes have illustrated the destruction they can inflict, both directly and indirectly through tsunamis. Large volcano eruptions have the potential to impact climate, anthropogenic infrastructure and resource supplies on global scale. During the last 2,000 years several large volcano eruptions occurred, which under today's conditions are associated with extreme disaster risk. The comparison of earthquakes and volcano eruptions indicates that large volcano eruptions are the low-probability geohazards with potentially the highest impact on our civilization

  8. Accident hazard evaluation and control decisions on forested recreation sites

    Treesearch

    Lee A. Paine

    1971-01-01

    Accident hazard associated with trees on recreation sites is inherently concerned with probabilities. The major factors include the probabilities of mechanical failure and of target impact if failure occurs, the damage potential of the failure, and the target value. Hazard may be evaluated as the product of these factors; i.e., expected loss during the current...

  9. Rapid screening and identification of chemical hazards in surface and drinking water using high resolution mass spectrometry and a case-control filter.

    PubMed

    Kaserzon, Sarit L; Heffernan, Amy L; Thompson, Kristie; Mueller, Jochen F; Gomez Ramos, Maria Jose

    2017-09-01

    Access to clean, safe drinking water poses a serious challenge to regulators, and requires analytical strategies capable of rapid screening and identification of potentially hazardous chemicals, specifically in situations when threats to water quality or security require rapid investigations and potential response. This study describes a fast and efficient chemical hazard screening strategy for characterising trace levels of polar organic contaminants in water matrices, based on liquid chromatography high resolution mass spectrometry with post-acquisition 'case-control' data processing. This method allowed for a rapid response time of less than 24 h for the screening of target, suspect and non-target unknown chemicals via direct injection analysis, and a second, more sensitive analysis option requiring sample pre-concentration. The method was validated by fortifying samples with a range of pesticides, pharmaceuticals and personal care products (n = 46); with >90% of target compounds positively screened in samples at 1 ng mL -1 , and 46% at 0.1 ng mL -1 when analysed via direct injection. To simulate a contamination event samples were fortified with compounds not present in the commercial library (designated 'non-target compounds'; fipronil and fenitrothion), tentatively identified at 0.2 and 1 ng mL -1 , respectively; and a compound not included in any known commercial library or public database (designated 'unknown' compounds; 8Cl - perfluorooctanesulfonic acid), at 0.8 ng mL -1 . The method was applied to two 'real-case' scenarios: (1) the assessment of drinking water safety during a high-profile event in Brisbane, Australia; and (2) to screen treated, re-circulated drinking water and pre-treated (raw) water. The validated workflow was effective for rapid prioritisation and screening of suspect and non-target potential hazards at trace levels, and could be applied to a wide range of matrices and investigations where comparison of organic contaminants

  10. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  11. The effectiveness of coral reefs for coastal hazard risk reduction and adaptation.

    PubMed

    Ferrario, Filippo; Beck, Michael W; Storlazzi, Curt D; Micheli, Fiorenza; Shepard, Christine C; Airoldi, Laura

    2014-05-13

    The world's coastal zones are experiencing rapid development and an increase in storms and flooding. These hazards put coastal communities at heightened risk, which may increase with habitat loss. Here we analyse globally the role and cost effectiveness of coral reefs in risk reduction. Meta-analyses reveal that coral reefs provide substantial protection against natural hazards by reducing wave energy by an average of 97%. Reef crests alone dissipate most of this energy (86%). There are 100 million or more people who may receive risk reduction benefits from reefs or bear hazard mitigation and adaptation costs if reefs are degraded. We show that coral reefs can provide comparable wave attenuation benefits to artificial defences such as breakwaters, and reef defences can be enhanced cost effectively. Reefs face growing threats yet there is opportunity to guide adaptation and hazard mitigation investments towards reef restoration to strengthen this first line of coastal defence.

  12. Probabilistic volcanic hazard assessments of Pyroclastic Density Currents: ongoing practices and future perspectives

    NASA Astrophysics Data System (ADS)

    Tierz, Pablo; Sandri, Laura; Ramona Stefanescu, Elena; Patra, Abani; Marzocchi, Warner; Costa, Antonio; Sulpizio, Roberto

    2014-05-01

    Explosive volcanoes and, especially, Pyroclastic Density Currents (PDCs) pose an enormous threat to populations living in the surroundings of volcanic areas. Difficulties in the modeling of PDCs are related to (i) very complex and stochastic physical processes, intrinsic to their occurrence, and (ii) to a lack of knowledge about how these processes actually form and evolve. This means that there are deep uncertainties (namely, of aleatory nature due to point (i) above, and of epistemic nature due to point (ii) above) associated to the study and forecast of PDCs. Consequently, the assessment of their hazard is better described in terms of probabilistic approaches rather than by deterministic ones. What is actually done to assess probabilistic hazard from PDCs is to couple deterministic simulators with statistical techniques that can, eventually, supply probabilities and inform about the uncertainties involved. In this work, some examples of both PDC numerical simulators (Energy Cone and TITAN2D) and uncertainty quantification techniques (Monte Carlo sampling -MC-, Polynomial Chaos Quadrature -PCQ- and Bayesian Linear Emulation -BLE-) are presented, and their advantages, limitations and future potential are underlined. The key point in choosing a specific method leans on the balance between its related computational cost, the physical reliability of the simulator and the pursued target of the hazard analysis (type of PDCs considered, time-scale selected for the analysis, particular guidelines received from decision-making agencies, etc.). Although current numerical and statistical techniques have brought important advances in probabilistic volcanic hazard assessment from PDCs, some of them may be further applicable to more sophisticated simulators. In addition, forthcoming improvements could be focused on three main multidisciplinary directions: 1) Validate the simulators frequently used (through comparison with PDC deposits and other simulators), 2) Decrease

  13. Report: EPA Provided Quality and Timely Information on Hurricane Katrina Hazardous Material Releases and Debris Management

    EPA Pesticide Factsheets

    Report #2006-P-00023, May 2, 2006. After Hurricane Katrina, EPA was the agency with lead responsibility to prevent, minimize, or mitigate threats to public health and the environment caused by hazardous materials and oil spills in inland zones.

  14. Assessing Student Threats

    ERIC Educational Resources Information Center

    Brunner, Judy; Emmendorfer, Beth; Lewis, Dennis

    2009-01-01

    For administrators at the secondary level, not many school days go according to plan or script, but few things are more disruptive than a student threat of violence. When threats are made--or if there is a rumor of a serious student threat--it can take both time and resources to investigate, interview, and analyze multiple pieces of information in…

  15. Analyzing Cyber-Physical Threats on Robotic Platforms.

    PubMed

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  16. Linguistic threat activates the human amygdala

    PubMed Central

    Isenberg, N.; Silbersweig, D.; Engelien, A.; Emmerich, S.; Malavade, K.; Beattie, B.; Leon, A. C.; Stern, E.

    1999-01-01

    Studies in animals demonstrate a crucial role for the amygdala in emotional and social behavior, especially as related to fear and aggression. Whereas lesion and functional-imaging studies in humans indicate the amygdala’s participation in assessing the significance of nonverbal as well as paralinguistic cues, direct evidence for its role in the emotional processing of linguistic cues is lacking. In this study, we use a modified Stroop task along with a high-sensitivity neuroimaging technique to target the neural substrate engaged specifically when processing linguistic threat. Healthy volunteer subjects were instructed to name the color of words of either threat or neutral valence, presented in different color fonts, while neural activity was measured by using H215O positron-emission tomography. Bilateral amygdalar activation was significantly greater during color naming of threat words than during color naming of neutral words. Associated activations were also noted in sensory-evaluative and motor-planning areas of the brain. Thus, our results demonstrate the amygdala’s role in the processing of danger elicited by language. In addition, the results reinforce the amygdala’s role in the modulation of the perception of, and response to, emotionally salient stimuli. The current study further suggests conservation of phylogenetically older mechanisms of emotional evaluation in the context of more recently evolved linguistic function. PMID:10468630

  17. Incorporating fine-scale drought information into an eastern US wildfire hazard model

    Treesearch

    Matthew P. Peters; Louis R. Iverson

    2017-01-01

    Wildfires in the eastern United States are generally caused by humans in locations where human development and natural vegetation intermingle, e.g. the wildland–urban interface (WUI). Knowing where wildfire hazards are elevated across the forested landscape may help land managers and property owners plan or allocate resources for potential wildfire threats. In an...

  18. Freezing Rain as an In-Flight Icing Hazard

    NASA Technical Reports Server (NTRS)

    Bernstein, Ben C.; Ratvasky, Thomas P.; Miller, Dean R.; McDonough, Frank

    2000-01-01

    Exposure to supercooled large drops (SLD-subfreezing water droplets with diameters greater than approx. 50 microns) can pose a significant threat to the safety of some aircraft. Although SLD includes both freezing drizzle (FZDZ) and freezing rain (FZRA), much of the SLD research and development of operational SLD forecast tools has focused on FZDZ and ignored FZRA, regarding is as less of a hazard to aviation. This paper provides a counterpoint case study that demonstrates FZRA as a significant in-flight icing hazard. The case study is based on flight and meteorological data from a joint NASA/FAA/NCAR SLD icing research project collected on February 4, 1998. The NASA Twin Otter Icing Research Aircraft experienced a prolonged exposure to "classical" FZRA that formed extensive ice formations including ridges and nodules on the wing and tail, and resulted in a substantial performance penalty. Although the case study provides only a singular FZRA event with one aircraft type, it is clear that classical FZRA can pose a significant in-flight icing hazard, and should not be ignored when considering SLD issues.

  19. An Expert System For Multispectral Threat Assessment And Response

    NASA Astrophysics Data System (ADS)

    Steinberg, Alan N.

    1987-05-01

    A concept has been defined for an automatic system to manage the self-defense of a combat aircraft. Distinctive new features of this concept include: a. the flexible prioritization of tasks and coordinated use of sensor, countermeasures, flight systems and weapons assets by means of an automated planning function; b. the integration of state-of-the-art data fusion algorithms with event prediction processing; c. the use of advanced Artificial Intelligence tools to emulate the decision processes of tactical EW experts. Threat Assessment functions (a) estimate threat identity, lethality and intent on the basis of multi-spectral sensor data, and (b) predict the time to critical events in threat engagements (e.g., target acquisition, tracking, weapon launch, impact). Response Management functions (a) select candidate responses to reported threat situations; (b) estimate the effects of candidate actions on survival; and (c) coordinate the assignment of sensors, weapons and countermeasures with the flight plan. The system employs Finite State Models to represent current engagements and to predict subsequent events. Each state in a model is associated with a set of observable features, allowing interpretation of sensor data and adaptive use of sensor assets. Defined conditions on state transitions allow prediction of times to critical future states and are used in planning self-defensive responses, which are designed either to impede a particular state transition or to force a transition to a lower threat state.

  20. An Optimal Mitigation Strategy Against the Asteroid Impact Threat with Short Warning Time

    NASA Technical Reports Server (NTRS)

    Wie, Bong; Barbee, Brent W.

    2015-01-01

    This paper presents the results of a NASA Innovative Advanced Concept (NIAC) Phase 2 study entitled "An Innovative Solution to NASA's Near-Earth Object (NEO) Impact Threat Mitigation Grand Challenge and Flight Validation Mission Architecture Development." This NIAC Phase 2 study was conducted at the Asteroid Deflection Research Center (ADRC) of Iowa State University in 2012-2014. The study objective was to develop an innovative yet practically implementable mitigation strategy for the most probable impact threat of an asteroid or comet with short warning time (less than 5 years). The mitigation strategy described in this paper is intended to optimally reduce the severity and catastrophic damage of the NEO impact event, especially when we don't have sufficient warning times for non-disruptive deflection of a hazardous NEO. This paper provides an executive summary of the NIAC Phase 2 study results.

  1. Risk-targeted maps for Romania

    NASA Astrophysics Data System (ADS)

    Vacareanu, Radu; Pavel, Florin; Craciun, Ionut; Coliba, Veronica; Arion, Cristian; Aldea, Alexandru; Neagu, Cristian

    2018-03-01

    Romania has one of the highest seismic hazard levels in Europe. The seismic hazard is due to a combination of local crustal seismic sources, situated mainly in the western part of the country and the Vrancea intermediate-depth seismic source, which can be found at the bend of the Carpathian Mountains. Recent seismic hazard studies have shown that there are consistent differences between the slopes of the seismic hazard curves for sites situated in the fore-arc and back-arc of the Carpathian Mountains. Consequently, in this study we extend this finding to the evaluation of the probability of collapse of buildings and finally to the development of uniform risk-targeted maps. The main advantage of uniform risk approach is that the target probability of collapse will be uniform throughout the country. Finally, the results obtained are discussed in the light of a recent study with the same focus performed at European level using the hazard data from SHARE project. The analyses performed in this study have pointed out to a dominant influence of the quantile of peak ground acceleration used for anchoring the fragility function. This parameter basically alters the shape of the risk-targeted maps shifting the areas which have higher collapse probabilities from eastern Romania to western Romania, as its exceedance probability increases. Consequently, a uniform procedure for deriving risk-targeted maps appears as more than necessary.

  2. Threat in dreams: an adaptation?

    PubMed

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, p<.00012). Contrary to TST's predictions, the SA participants reported significantly fewer threat dreams (chi([1,N=287])(2)=6.11, p<.0134), and did not differ from the Welsh participants in responses to dream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  3. The effectiveness of coral reefs for coastal hazard risk reduction and adaptation

    PubMed Central

    Ferrario, Filippo; Beck, Michael W.; Storlazzi, Curt D.; Micheli, Fiorenza; Shepard, Christine C.; Airoldi, Laura

    2014-01-01

    The world’s coastal zones are experiencing rapid development and an increase in storms and flooding. These hazards put coastal communities at heightened risk, which may increase with habitat loss. Here we analyse globally the role and cost effectiveness of coral reefs in risk reduction. Meta-analyses reveal that coral reefs provide substantial protection against natural hazards by reducing wave energy by an average of 97%. Reef crests alone dissipate most of this energy (86%). There are 100 million or more people who may receive risk reduction benefits from reefs or bear hazard mitigation and adaptation costs if reefs are degraded. We show that coral reefs can provide comparable wave attenuation benefits to artificial defences such as breakwaters, and reef defences can be enhanced cost effectively. Reefs face growing threats yet there is opportunity to guide adaptation and hazard mitigation investments towards reef restoration to strengthen this first line of coastal defence. PMID:24825660

  4. The effectiveness of coral reefs for coastal hazard risk reduction and adaptation

    USGS Publications Warehouse

    Ferrario, Filippo; Beck, Michael W.; Storlazzi, Curt D.; Micheli, Fiorenza; Shepard, Christine C.; Airoldi, Laura

    2014-01-01

    The world’s coastal zones are experiencing rapid development and an increase in storms and flooding. These hazards put coastal communities at heightened risk, which may increase with habitat loss. Here we analyse globally the role and cost effectiveness of coral reefs in risk reduction. Meta-analyses reveal that coral reefs provide substantial protection against natural hazards by reducing wave energy by an average of 97%. Reef crests alone dissipate most of this energy (86%). There are 100 million or more people who may receive risk reduction benefits from reefs or bear hazard mitigation and adaptation costs if reefs are degraded. We show that coral reefs can provide comparable wave attenuation benefits to artificial defences such as breakwaters, and reef defences can be enhanced cost effectively. Reefs face growing threats yet there is opportunity to guide adaptation and hazard mitigation investments towards reef restoration to strengthen this first line of coastal defence.

  5. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    PubMed

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  6. Lava Flow Hazard Assessment, as of August 2007, for Kilauea East Rift Zone Eruptions, Hawai`i Island

    USGS Publications Warehouse

    Kauahikaua, Jim

    2007-01-01

    The most recent episode in the ongoing Pu'u 'O'o-Kupaianaha eruption of Kilauea Volcano is currently producing lava flows north of the east rift zone. Although they pose no immediate threat to communities, changes in flow behavior could conceivably cause future flows to advance downrift and impact communities thus far unaffected. This report reviews lava flow hazards in the Puna District and discusses the potential hazards posed by the recent change in activity. Members of the public are advised to increase their general awareness of these hazards and stay up-to-date on current conditions.

  7. Resilience to Interacting multi-natural hazards

    NASA Astrophysics Data System (ADS)

    Zhuo, Lu; Han, Dawei

    2016-04-01

    temporal changes in hazards and vulnerability during successive hazards; 2) hazard monitoring, forecasting and early warning systems have not fully utilised the domain knowledge of physical processes and the statistical information of the observations; 3) uncertainties have not been well recognised in the current risk management practice, and ignorance of uncertainties could lead to major threat to the society and poor consideration with inefficient or unsustainable preferences of options; 4) there is increasing recognition that the so called 'natural' disasters are not just the consequences of nature-related processes alone, but are attributable to various social, economic, historical, political and cultural causes. However, despite this recognition, the current hazard and risk assessments are fragmented with a weakness in holistically combining quantitative and qualitative information from a variety of sources; 5) successful disaster risk management must be relevant and useful to all stakeholders involved. Efforts should enable the essential common purpose, collective learning and entrepreneurial collaborations that underpin effective and efficient resilience. Therefore, there is an urgent need for the systems thinking framework and decision support system tools in adequate scenario assessment and resilience development from a harmonised and transdisciplinary perspective. It is important that the aforementioned issues should be tackled with a joint effort from a multidisciplinary team in social science, natural science, engineering and systems.

  8. We can do it: the interplay of construal orientation and social comparisons under threat.

    PubMed

    Marx, David M; Stapel, Diederik A; Muller, Dominique

    2005-03-01

    The authors investigated how a collective self-construal orientation in combination with positive social comparisons "turns off" the negative effects of stereotype threat. Specifically, Experiment 1 demonstrated that stereotype threat led to increased accessibility of participants' collective self ("we"). Experiment 2 showed that this feeling of "we-ness" in the stereotype threat condition centered on the participants' stereotyped group membership and not on other important social groups (e.g., students). Experiment 3 indicated that in threat situations, when participants' collective self is accessible, positive social comparison information led to improved math test performance and less concern, whereas in nonthreat situations, when the collective self is less accessible, positive comparison information led to worse test performance and more concern. Our final experiment revealed that under stereotype threat, only those comparison targets who are competent in the relevant domain (math), rather than in domains unrelated to math (athletics), enhanced participants' math test performance. ((c) 2005 APA, all rights reserved).

  9. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    PubMed

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior.

  10. Attentional Modulation of Visual-Evoked Potentials by Threat: Investigating the Effect of Evolutionary Relevance

    ERIC Educational Resources Information Center

    Brown, Christopher; El-Deredy, Wael; Blanchette, Isabelle

    2010-01-01

    In dot-probe tasks, threatening cues facilitate attention to targets and enhance the amplitude of the target P1 peak of the visual-evoked potential. While theories have suggested that evolutionarily relevant threats should obtain preferential neural processing, this has not been examined empirically. In this study we examined the effects of…

  11. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  12. Neutron Interrogation System For Underwater Threat Detection And Identification

    NASA Astrophysics Data System (ADS)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C.

    2009-03-01

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  13. Contribution of Asteroid Generated Tsunami to the Impact Hazard

    NASA Technical Reports Server (NTRS)

    Morrison, David; Venkatapathy, Ethiraj

    2017-01-01

    The long-standing uncertainty about the importance of asteroid-generated tsunami was addressed at a workshop in August 2016, co-sponsored by NASA and NOAA. Experts from NASA, NOAA, the DoE tri-labs (LLNL, SNL, and LANL), DHS, FEMA, and academia addressed the hazard of tsunami created by asteroid impacts, focusing primarily on NEAs with diameter less than 250m. Participants jointly identified key issues and shared information for nearly a year to coordinate their results for discussion at the workshop. They used modern computational tools to examine 1) Near-field wave generation by the impact; 2) Long-distance wave propagation; 3) Damage from coastal run-up and inundation, and associated hazard. The workshop resulted in broad consensus that the asteroid impact tsunami threat is not as great as previously thought.

  14. Volcanic hazards on the Island of Hawaii

    USGS Publications Warehouse

    Mullineaux, Donal Ray; Peterson, Donald W.

    1974-01-01

    identify sites where either overall risk or risk from some specific hazard is relatively high, and to identify areas in which there is a threat to lives as well as to property. The report further can serve as a basis for warning persons about hazards in areas most likely to be affected by volcanic eruptions. Perhaps most important, however, the report provides basic information needed for zoning to control future land use.

  15. A systems approach to risk reduction of transportation infrastructure networks subject to multiple hazards : final report, December 31, 2008.

    DOT National Transportation Integrated Search

    2008-12-31

    Integrity, robustness, reliability, and resiliency of infrastructure networks are vital to the economy, : security and well-being of any country. Faced with threats caused by natural and man-made hazards, : transportation infrastructure network manag...

  16. Information Exchange Between Resilient and High-Threat Networks: Techniques for Threat Mitigation

    DTIC Science & Technology

    2004-11-01

    Information Exchange between Resilient and High-Threat Networks : Techniques for Threat Mitigation Tim Dean and Graham Wyatt QinetiQ...SUMMARY High resilience military networks frequently have requirements for exchange of information with networks of low assurance, including networks of...assured, two-way, information flow between high resilience networks and other networks of unknown threat. The techniques include conventional and

  17. Terrorism threats and preparedness in Canada: the perspective of the Canadian public.

    PubMed

    Gibson, Stacey; Lemyre, Louise; Clément, Mélanie; Markon, Marie-Pierre L; Lee, Jennifer E C

    2007-06-01

    Although Canada has not experienced a major terrorist attack, an increased global pending threat has put preparedness at the top of the Canadian government's agenda. Given its strong multicultural community and close proximity to the recently targeted United States, the Canadian experience is unique. However, minimal research exists on the public's reactions to terrorism threats and related preparedness strategies. In order for response initiatives to be optimally effective, it is important that the public's opinions regarding terrorism and preparedness be considered. This qualitative study examined perceptions of terrorism threats among Canadians living in Central and Eastern Canada (N = 75) in the fall of 2004. Conceptualizations of terrorism threat, psychosocial impacts, and sense of preparedness were explored in a series of qualitative interviews. Findings revealed that the majority of Canadians did not feel overly threatened by terrorist attacks, due in part to a perception of terrorist threats as related to global sociopolitical events and a positive Canadian identity. In addition, while most respondents did not feel they were individually affected by the threat of terrorism, there was some concern regarding larger societal impacts, such as increased paranoia, discrimination, and threats to civil liberties. Participants' views on preparedness focused largely on the utility of emergency preparedness strategies and the factors that could mitigate or inhibit preparedness at the individual and institutional levels, with a specific focus on education. Finally, the significant relevance of these findings in shaping terrorism preparedness, both in Canada and generally, is discussed.

  18. Attribute-driven transfer learning for detecting novel buried threats with ground-penetrating radar

    NASA Astrophysics Data System (ADS)

    Colwell, Kenneth A.; Collins, Leslie M.

    2016-05-01

    Ground-penetrating radar (GPR) technology is an effective method of detecting buried explosive threats. The system uses a binary classifier to distinguish "targets", or buried threats, from "nontargets" arising from system prescreener false alarms; this classifier is trained on a dataset of previously-observed buried threat types. However, the threat environment is not static, and new threat types that appear must be effectively detected even if they are not highly similar to every previously-observed type. Gathering a new dataset that includes a new threat type is expensive and time-consuming; minimizing the amount of new data required to effectively detect the new type is therefore valuable. This research aims to reduce the number of training examples needed to effectively detect new types using transfer learning, which leverages previous learning tasks to accelerate and improve new ones. Further, new types have attribute data, such as composition, components, construction, and size, which can be observed without GPR and typically are not explicitly included in the learning process. Since attribute tags for buried threats determine many aspects of their GPR representation, a new threat type's attributes can be highly relevant to the transfer-learning process. In this work, attribute data is used to drive transfer learning, both by using attributes to select relevant dataset examples for classifier fusion, and by extending a relevance vector machine (RVM) model to perform intelligent attribute clustering and selection. Classification performance results for both the attribute-only case and the low-data case are presented, using a dataset containing a variety of threat types.

  19. Political Orientation Predicts Credulity Regarding Putative Hazards.

    PubMed

    Fessler, Daniel M T; Pisor, Anne C; Holbrook, Colin

    2017-05-01

    To benefit from information provided by other people, people must be somewhat credulous. However, credulity entails risks. The optimal level of credulity depends on the relative costs of believing misinformation and failing to attend to accurate information. When information concerns hazards, erroneous incredulity is often more costly than erroneous credulity, given that disregarding accurate warnings is more harmful than adopting unnecessary precautions. Because no equivalent asymmetry exists for information concerning benefits, people should generally be more credulous of hazard information than of benefit information. This adaptive negatively biased credulity is linked to negativity bias in general and is more prominent among people who believe the world to be more dangerous. Because both threat sensitivity and beliefs about the dangerousness of the world differ between conservatives and liberals, we predicted that conservatism would positively correlate with negatively biased credulity. Two online studies of Americans supported this prediction, potentially illuminating how politicians' alarmist claims affect different portions of the electorate.

  20. Ocean acidification increases cadmium accumulation in marine bivalves: a potential threat to seafood safety.

    PubMed

    Shi, Wei; Zhao, Xinguo; Han, Yu; Che, Zhumei; Chai, Xueliang; Liu, Guangxu

    2016-01-21

    To date, the effects of ocean acidification on toxic metals accumulation and the underlying molecular mechanism remains unknown in marine bivalve species. In the present study, the effects of the realistic future ocean pCO2 levels on the cadmium (Cd) accumulation in the gills, mantle and adductor muscles of three bivalve species, Mytilus edulis, Tegillarca granosa, and Meretrix meretrix, were investigated. The results obtained suggested that all species tested accumulated significantly higher Cd (p < 0.05) in the CO2 acidified seawater during the 30 days experiment and the health risk of Cd (based on the estimated target hazard quotients, THQ) via consumption of M. meretrix at pH 7.8 and 7.4 significantly increased 1.21 and 1.32 times respectively, suggesting a potential threat to seafood safety. The ocean acidification-induced increase in Cd accumulation may have occurred due to (i) the ocean acidification increased the concentration of Cd and the Cd(2+)/Ca(2+) in the seawater, which in turn increased the Cd influx through Ca channel; (ii) the acidified seawater may have brought about epithelia damage, resulting in easier Cd penetration; and (iii) ocean acidification hampered Cd exclusion.

  1. Ocean acidification increases cadmium accumulation in marine bivalves: a potential threat to seafood safety

    PubMed Central

    Shi, Wei; Zhao, Xinguo; Han, Yu; Che, Zhumei; Chai, Xueliang; Liu, Guangxu

    2016-01-01

    To date, the effects of ocean acidification on toxic metals accumulation and the underlying molecular mechanism remains unknown in marine bivalve species. In the present study, the effects of the realistic future ocean pCO2 levels on the cadmium (Cd) accumulation in the gills, mantle and adductor muscles of three bivalve species, Mytilus edulis, Tegillarca granosa, and Meretrix meretrix, were investigated. The results obtained suggested that all species tested accumulated significantly higher Cd (p < 0.05) in the CO2 acidified seawater during the 30 days experiment and the health risk of Cd (based on the estimated target hazard quotients, THQ) via consumption of M. meretrix at pH 7.8 and 7.4 significantly increased 1.21 and 1.32 times respectively, suggesting a potential threat to seafood safety. The ocean acidification-induced increase in Cd accumulation may have occurred due to (i) the ocean acidification increased the concentration of Cd and the Cd2+/Ca2+ in the seawater, which in turn increased the Cd influx through Ca channel; (ii) the acidified seawater may have brought about epithelia damage, resulting in easier Cd penetration; and (iii) ocean acidification hampered Cd exclusion. PMID:26795597

  2. Signaling threat: how situational cues affect women in math, science, and engineering settings.

    PubMed

    Murphy, Mary C; Steele, Claude M; Gross, James J

    2007-10-01

    This study examined the cues hypothesis, which holds that situational cues, such as a setting's features and organization, can make potential targets vulnerable to social identity threat. Objective and subjective measures of identity threat were collected from male and female math, science, and engineering (MSE) majors who watched an MSE conference video depicting either an unbalanced ratio of men to women or a balanced ratio. Women who viewed the unbalanced video exhibited more cognitive and physiological vigilance, and reported a lower sense of belonging and less desire to participate in the conference, than did women who viewed the gender-balanced video. Men were unaffected by this situational cue. The implications for understanding vulnerability to social identity threat, particularly among women in MSE settings, are discussed.

  3. Evaluation of silvicultural treatments and biomass use for reducing fire hazard in western states

    Treesearch

    Kenneth E. Skog; R. James Barbour; Karen L. Abt; E.M. (Ted) Bilek; Frank Burch; Roger D. Fight; Robert J. Hugget; Patrick D. Miles; Elizabeth D. Reinhardt; Wayne D. Shepperd

    2006-01-01

    Several analyses have shown that fire hazard is a concern for substantial areas of forestland, shrubland, grassland, and range in the western United States. In response, broadscale management strategies, such as the National Fire Plan, established actions to reduce the threat of undesirable fire. Available budgets are insufficient to pay for vegetative management on...

  4. Analyzing Cyber-Physical Threats on Robotic Platforms †

    PubMed Central

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  5. Cognitive appraisals of stereotype threat.

    PubMed

    Berjot, S; Roland-Levy, C; Girault-Lidvan, N

    2011-04-01

    Using the cognitive appraisal conceptualisation of the transactional model of stress, the goal was to assess how victims of stereotype threat respond to this situation in terms of primary appraisals (threat/challenge) and to investigate whether those appraisals may mediate the relation between stereotype threat and performance. Results show that, while participants from North Africa living in France did appraise the situation more as a threat and less as a challenge, only challenge appraisal mediated between stereotype threat and performance.

  6. Stereotype Threat in U.S. Students Abroad: Negotiating American Identity in the Age of Trump

    ERIC Educational Resources Information Center

    Goldstein, Susan B.

    2017-01-01

    An underinvestigated and significant source of stress for U.S. student sojourners across racial/ethnic groups is exposure to stereotypes that target their American identity. This study built on the extensive research literature on stereotype threat to investigate U.S. students' vulnerability and reactions to being the target of stereotypes.…

  7. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    PubMed

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message.

  8. A cross-hazard analysis of terse message retransmission on Twitter.

    PubMed

    Sutton, Jeannette; Gibson, C Ben; Phillips, Nolan Edward; Spiro, Emma S; League, Cedar; Johnson, Britta; Fitzhugh, Sean M; Butts, Carter T

    2015-12-01

    For decades, public warning messages have been relayed via broadcast information channels, including radio and television; more recently, risk communication channels have expanded to include social media sites, where messages can be easily amplified by user retransmission. This research examines the factors that predict the extent of retransmission for official hazard communications disseminated via Twitter. Using data from events involving five different hazards, we identity three types of attributes--local network properties, message content, and message style--that jointly amplify and/or attenuate the retransmission of official communications under imminent threat. We find that the use of an agreed-upon hashtag and the number of users following an official account positively influence message retransmission, as does message content describing hazard impacts or emphasizing cohesion among users. By contrast, messages directed at individuals, expressing gratitude, or including a URL were less widely disseminated than similar messages without these features. Our findings suggest that some measures commonly taken to convey additional information to the public (e.g., URL inclusion) may come at a cost in terms of message amplification; on the other hand, some types of content not traditionally emphasized in guidance on hazard communication may enhance retransmission rates.

  9. Stereotype threat prevents perceptual learning

    PubMed Central

    Shiffrin, Richard M.; Boucher, Kathryn L.; Van Loo, Katie; Rydell, Michael T.

    2010-01-01

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype “women are bad at math” causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task as an increasing rate of search for a target Chinese character in a display of such characters. Displays contained two or four characters and half of these contained a target. Search rate increased across a session of training for a control group of women, but not women under ST. Speeding of search is typically explained in terms of learned “popout” (automatic attraction of attention to a target). Did women under ST learn popout but fail to express it? Following training, the women were shown two colored squares and asked to choose the one with the greater color saturation. Superimposed on the squares were task-irrelevant Chinese characters. For women not trained under ST, the presence of a trained target on one square slowed responding, indicating that training had caused the learning of an attention response to targets. Women trained under ST showed no slowing, indicating that they had not learned such an attention response. PMID:20660737

  10. The role of warning behaviors in threat assessment: an exploration and suggested typology.

    PubMed

    Reid Meloy, J; Hoffmann, Jens; Guldimann, Angela; James, David

    2012-01-01

    The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors. Previous research on risk factors associated with such warning behaviors is reviewed, and examples of each warning behavior from various intended violence cases are presented, including public figure assassination, adolescent and adult mass murder, corporate celebrity stalking, and both domestic and foreign acts of terrorism. Practical applications and future research into warning behaviors are suggested. Copyright © 2011 John Wiley & Sons, Ltd.

  11. Poland and Global Threats

    NASA Astrophysics Data System (ADS)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  12. Vigilant attention to threat, sleep patterns, and anxiety in peripubertal youth.

    PubMed

    Ricketts, Emily J; Price, Rebecca B; Siegle, Greg J; Silk, Jennifer S; Forbes, Erika E; Ladouceur, Cecile D; Harvey, Allison G; Ryan, Neal D; Dahl, Ronald E; McMakin, Dana L

    2018-05-02

    Vigilant attention to threat is commonly observed in anxiety, undergoes developmental changes in early adolescence, and has been proposed to interfere with sleep initiation and maintenance. We present one of the first studies to use objective measures to examine associations between vigilant attention to threat and difficulties initiating and maintaining sleep in an early adolescent anxious sample. We also explore the moderating role of development (age, puberty) and sex. Participants were 66 peripubertal youth (ages 9-14) with a primary anxiety disorder and 24 healthy control subjects. A dot-probe task was used to assess attentional bias to fearful relative to neutral face stimuli. Eye-tracking indexed selective attentional bias to threat, and reaction time bias indexed action readiness to threat. Sleep was assessed via actigraphy (e.g. sleep onset delay, wake after sleep onset, etc.), parent report (Children's Sleep Habits Questionnaire), and child report (Sleep Self-Report). The Pediatric Anxiety Rating Scale assessed anxiety severity. Eye-tracking initial threat fixation bias (β = .33, p = .001) and threat dwell time bias (β = .22, p = .041) were positively associated with sleep onset latency. Reaction time bias was positively associated with wake after sleep onset (β = .24, p = .026) and parent-reported sleep disturbance (β = .25, p = .019). Anxiety (severity, diagnosis) was not associated with these outcomes. Sex (β = -.32, p = .036) moderated the relation between initial threat fixation bias and sleep onset latency, with a positive association for males (p = .005), but not for females (p = .289). Age and pubertal status did not moderate effects. Vigilant attention to threat is related to longer sleep onset and reduced sleep maintenance. These associations are not stronger in early adolescents with anxiety. Implications for early intervention or prevention that targets vigilant attention to threat to impact sleep disturbance, and

  13. People's behaviour in the face of volcanic hazards: Perspectives from Javanese communities, Indonesia

    NASA Astrophysics Data System (ADS)

    Lavigne, Franck; De Coster, Benjamin; Juvin, Nancy; Flohic, François; Gaillard, Jean-Christophe; Texier, Pauline; Morin, Julie; Sartohadi, Junun

    2008-05-01

    This paper is concerned with the way in which the Indonesian people living on the slopes or near active volcanoes behave in the face of volcanic threats. It explores the role of three factors in the shaping of this behaviour, e.g. risk perception, cultural beliefs and socio-economic constraints. The paper is mainly based on field data collected during the last 5 years on four volcanoes in Central Java, namely Sumbing, Sindoro, Dieng, and Merapi. The common assumption that hazard knowledge, risk perception and people's behaviour are closely related and conditional on volcanic activity is debatable in the Indonesian context. Factors that play a role in hazard knowledge—e.g. basic knowledge of volcanic processes, personal experience of volcanic crisis, time lapsed since the last volcanic eruption, etc.—differ from those that influence risk perception. Indeed, local people often underestimate the scientifically or statistically estimated risk. This poor risk perception is characterized by an approximate personal representation of the volcanic processes, an excess of trust in concrete countermeasures, the presence of a physical-visual obstructions, or cultural beliefs related to former eruptions. In addition, the commonly-acknowledged factors that influence hazard knowledge and/or risk perception may be at odds with the non hazard-related factors that prompt or force people to live in or to exploit areas at risk. These factors may be either socio-cultural—e.g., attachment to place, cultural beliefs, etc.—or social and socio-economical —e.g., standard of living, strength of people's livelihoods, well-being. These factors are fundamental in explaining the short-term behaviour in the face of a developing threat during a volcanic crisis.

  14. Lizard threat display handicaps endurance.

    PubMed Central

    Brandt, Y

    2003-01-01

    Honest-signalling theory asserts that threat displays reliably advertise attributes that influence fighting success. Endurance, as measured by treadmill performance, predicts the outcome of agonistic interactions among lizards. If threat displays in lizards function to advertise endurance capacity then variation in threat displays should correlate with endurance. I tested this prediction for the duration of threat posturing in male side-blotched lizards (Uta stansburiana) and examined whether threat displays act as quality handicaps, reliable signals that expend the attribute that is advertised. Individual variation in the duration of threat posturing correlated with endurance, while an experimental reduction of endurance diminished the duration of threat posturing. As expected of a quality handicap, endurance fell below baseline after display production. A restriction of aerobic metabolism can account for this effect. In threat posturing, lateral compression of the thorax may interfere with respiration or with circulation, limiting aerobic metabolism and causing a compensatory increase in anaerobic metabolism, thereby generating lactate and diminishing locomotor capacity. Concentrations of lactate measured after display production were higher than baseline, consistent with the proposed mechanism. By restricting aerobic metabolism, the threat posture can act as a quality handicap, simultaneously advertising and expending the endurance capacity of displaying lizards. PMID:12803896

  15. Differential Brain Activation to Angry Faces by Elite Warfighters: Neural Processing Evidence for Enhanced Threat Detection

    PubMed Central

    Paulus, Martin P.; Simmons, Alan N.; Fitzpatrick, Summer N.; Potterat, Eric G.; Van Orden, Karl F.; Bauman, James; Swain, Judith L.

    2010-01-01

    Background Little is known about the neural basis of elite performers and their optimal performance in extreme environments. The purpose of this study was to examine brain processing differences between elite warfighters and comparison subjects in brain structures that are important for emotion processing and interoception. Methodology/Principal Findings Navy Sea, Air, and Land Forces (SEALs) while off duty (n = 11) were compared with n = 23 healthy male volunteers while performing a simple emotion face-processing task during functional magnetic resonance imaging. Irrespective of the target emotion, elite warfighters relative to comparison subjects showed relatively greater right-sided insula, but attenuated left-sided insula, activation. Navy SEALs showed selectively greater activation to angry target faces relative to fearful or happy target faces bilaterally in the insula. This was not accounted for by contrasting positive versus negative emotions. Finally, these individuals also showed slower response latencies to fearful and happy target faces than did comparison subjects. Conclusions/Significance These findings support the hypothesis that elite warfighters deploy greater processing resources toward potential threat-related facial expressions and reduced processing resources to non-threat-related facial expressions. Moreover, rather than expending more effort in general, elite warfighters show more focused neural and performance tuning. In other words, greater neural processing resources are directed toward threat stimuli and processing resources are conserved when facing a nonthreat stimulus situation. PMID:20418943

  16. Educating Emergency Managers About Weather -Related Hazards

    NASA Astrophysics Data System (ADS)

    Spangler, T. C.; Johnson, V.

    2006-12-01

    The most common crises that emergency managers face are those related to hazardous weather - snowstorms, floods, hurricanes, heat waves, tornadoes, etc. However, man-made disasters, such as accidental releases of hazardous substances or terrorist acts, also often have a weather component. For example, after the bombing of the Alfred P. Murrah Federal Building in Oklahoma City, emergency managers were concerned that thunderstorms in the area might cause the building to collapse, putting rescuers in further danger. Training emergency managers to recognize the importance of weather in disaster planning and response has been a small but important focus of the COMET Program's educational development effort. Topics addressed in COMET training modules that are pertinent to emergency management include fire weather, hurricanes, flood events, and air contaminant dispersion. Additionally, the module entitled Anticipating Hazardous Weather and Community Risk provides an overview of basic meteorological processes, describes a broad range of weather phenomenon, and then addresses what forecast products are available to emergency managers to assess a threat to their community. In many of the modules, learners are presented with scenarios that give them the opportunity to practice decision-making in hazardous weather situations. We will demonstrate some of those scenarios and discuss how training can be used to model good emergency management skills. We will discuss ways to communicate with the emergency management community and provide examples of how distance learning can be used to educate and train emergency managers.

  17. Medical countermeasures for unwanted CBRN exposures: Part I chemical and biological threats with review of recent countermeasure patents.

    PubMed

    Singh, Vijay K; Garcia, Melissa; Wise, Stephen Y; Seed, Thomas M

    2016-12-01

    The threat of chemical, biological, radiological, and nuclear (CBRN) warfare has been addressed as the uppermost risk to national security since the terrorist attacks on 11 September 2001. Despite significant scientific advances over the past several decades toward the development of safe, non-toxic and effective countermeasures to combat CBRN threats, relatively few countermeasures have been approved by the US Food and Drug Administration (US FDA). Therefore, countermeasures capable of protecting the population from the effects of CBRN attack remain a significant unmet medical need. Chemical and biological (CB) threat agents can be particularly hazardous due to their effectiveness in small quantities and ease of distribution. Area covered: This article reviews the development of countermeasures for CB threats and highlights specific threats for which at least one countermeasure has been approved following the FDA Animal Rule. Patents of CB countermeasures since 2010 have been included. Expert opinion: Nine CB countermeasures have received FDA approval for use in humans following the Animal Rule, and a number of promising CB countermeasures are currently under development. In the next few years, we should expect to have multiple countermeasures approved by the FDA for each indication allowing for more flexible and effective treatment options.

  18. Sensemaking of patient safety risks and hazards.

    PubMed

    Battles, James B; Dixon, Nancy M; Borotkanics, Robert J; Rabin-Fastmen, Barbara; Kaplan, Harold S

    2006-08-01

    In order for organizations to become learning organizations, they must make sense of their environment and learn from safety events. Sensemaking, as described by Weick (1995), literally means making sense of events. The ultimate goal of sensemaking is to build the understanding that can inform and direct actions to eliminate risk and hazards that are a threat to patient safety. True sensemaking in patient safety must use both retrospective and prospective approach to learning. Sensemaking is as an essential part of the design process leading to risk informed design. Sensemaking serves as a conceptual framework to bring together well established approaches to assessment of risk and hazards: (1) at the single event level using root cause analysis (RCA), (2) at the processes level using failure modes effects analysis (FMEA) and (3) at the system level using probabilistic risk assessment (PRA). The results of these separate or combined approaches are most effective when end users in conversation-based meetings add their expertise and knowledge to the data produced by the RCA, FMEA, and/or PRA in order to make sense of the risks and hazards. Without ownership engendered by such conversations, the possibility of effective action to eliminate or minimize them is greatly reduced.

  19. Sensemaking of Patient Safety Risks and Hazards

    PubMed Central

    Battles, James B; Dixon, Nancy M; Borotkanics, Robert J; Rabin-Fastmen, Barbara; Kaplan, Harold S

    2006-01-01

    In order for organizations to become learning organizations, they must make sense of their environment and learn from safety events. Sensemaking, as described by Weick (1995), literally means making sense of events. The ultimate goal of sensemaking is to build the understanding that can inform and direct actions to eliminate risk and hazards that are a threat to patient safety. True sensemaking in patient safety must use both retrospective and prospective approach to learning. Sensemaking is as an essential part of the design process leading to risk informed design. Sensemaking serves as a conceptual framework to bring together well established approaches to assessment of risk and hazards: (1) at the single event level using root cause analysis (RCA), (2) at the processes level using failure modes effects analysis (FMEA) and (3) at the system level using probabilistic risk assessment (PRA). The results of these separate or combined approaches are most effective when end users in conversation-based meetings add their expertise and knowledge to the data produced by the RCA, FMEA, and/or PRA in order to make sense of the risks and hazards. Without ownership engendered by such conversations, the possibility of effective action to eliminate or minimize them is greatly reduced. PMID:16898979

  20. Beyond Adapting to Climate Change: Embedding Adaptation in Responses to Multiple Threats and Stresses

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilbanks, Thomas J; Kates, Dr. Robert W.

    2010-01-01

    Climate change impacts are already being experienced in every region of the United States and every part of the world most severely in Arctic regions and adaptation is needed now. Although climate change adaptation research is still in its infancy, significant adaptation planning in the United States has already begun in a number of localities. This article seeks to broaden the adaptation effort by integrating it with broader frameworks of hazards research, sustainability science, and community and regional resilience. To extend the range of experience, we draw from ongoing case studies in the Southeastern United States and the environmental historymore » of New Orleans to consider the multiple threats and stresses that all communities and regions experience. Embedding climate adaptation in responses to multiple threats and stresses helps us to understand climate change impacts, themselves often products of multiple stresses, to achieve community acceptance of needed adaptations as co-benefits of addressing multiple threats, and to mainstream the process of climate adaptation through the larger envelope of social relationships, communication channels, and broad-based awareness of needs for risk management that accompany community resilience.« less

  1. Stereotype threat and lift effects in motor task performance: the mediating role of somatic and cognitive anxiety.

    PubMed

    Laurin, Raphael

    2013-01-01

    The aim of this investigation was to replicate the stereotype threat and lift effects in a motor task in a neutral sex-typed activity, using somatic and cognitive anxiety as key mediators of these phenomena. It was hypothesized that an ingroup/outgroup social categorization based on gender would have distinctive effects for female and male participants. A total of 161 French physical education students were randomly assigned to three threat conditions--no threat, female threat, and male threat--thus leading to a 3 x 2 (threat by gender) design. The analyses revealed a stereotype lift effect on the performances for both male and female participants, as well as a stereotype threat effect only for female participants. They also indicated that somatic anxiety had a mediating effect on the performance of female participants targeted by a negative stereotype, but that it had a facilitating effect on their performance. The stereotype threat and lift effects on motor tasks were replicated in a neutral sex-typed activity and somatic anxiety seems to have a facilitating mediating effect of the relationships between the gender-conditions (control or female threat) interaction and free-throw performance. The model used to distinguish somatic and cognitive anxiety appeared to be a relevant means of explaining the stereotype threat and lift mechanisms.

  2. The Domestic IED Threat

    DTIC Science & Technology

    2008-01-01

    threat that could use IEDs in the homeland is single-issue organizations. This threat includes such groups as the Okla- homa City bombers and other...threat during joint Army–Air Force exercise U .S . A ir Fo rc e (S te ph en O te ro ) ndupress .ndu.edu issue 48, 1st quarter 2008 / JFQ        69

  3. Near-Earth Object (NEO) Hazard Background

    NASA Technical Reports Server (NTRS)

    Mazanek, Daniel D.

    2005-01-01

    The fundamental problem regarding NEO hazards is that the Earth and other planets, as well as their moons, share the solar system with a vast number of small planetary bodies and orbiting debris. Objects of substantial size are typically classified as either comets or asteroids. Although the solar system is quite expansive, the planets and moons (as well as the Sun) are occasionally impacted by these objects. We live in a cosmic shooting gallery where collisions with Earth occur on a regular basis. Because the number of smaller comets and asteroids is believed to be much greater than larger objects, the frequency of impacts is significantly higher. Fortunately, the smaller objects, which are much more numerous, are usually neutralized by the Earth's protective atmosphere. It is estimated that between 1000 and 10,000 tons of debris fall to Earth each year, most of it in the form of dust particles and extremely small meteorites. With no atmosphere, the Moon's surface is continuously impacted with dust and small debris. On November 17 and 18, 1999, during the annual Leonid meteor shower, several lunar surface impacts were observed by amateur astronomers in North America. The Leonids result from the Earth's passage each year through the debris ejected from Comet Tempel-Tuttle. These annual showers provide a periodic reminder of the possibility of a much more consequential cosmic collision, and the heavily cratered lunar surface acts a constant testimony to the impact threat. The impact problem and those planetary bodies that are a threat have been discussed in great depth in a wide range of publications and books, such as The Spaceguard Survey , Hazards Due to Comets and Asteroids, and Cosmic Catastrophes. This paper gives a brief overview on the background of this problem and address some limitations of ground-based surveys for detection of small and/or faint near-Earth objects.

  4. Modeling peripheral vision for moving target search and detection.

    PubMed

    Yang, Ji Hyun; Huston, Jesse; Day, Michael; Balogh, Imre

    2012-06-01

    Most target search and detection models focus on foveal vision. In reality, peripheral vision plays a significant role, especially in detecting moving objects. There were 23 subjects who participated in experiments simulating target detection tasks in urban and rural environments while their gaze parameters were tracked. Button responses associated with foveal object and peripheral object (PO) detection and recognition were recorded. In an urban scenario, pedestrians appearing in the periphery holding guns were threats and pedestrians with empty hands were non-threats. In a rural scenario, non-U.S. unmanned aerial vehicles (UAVs) were considered threats and U.S. UAVs non-threats. On average, subjects missed detecting 2.48 POs among 50 POs in the urban scenario and 5.39 POs in the rural scenario. Both saccade reaction time and button reaction time can be predicted by peripheral angle and entrance speed of POs. Fast moving objects were detected faster than slower objects and POs appearing at wider angles took longer to detect than those closer to the gaze center. A second-order mixed-effect model was applied to provide each subject's prediction model for peripheral target detection performance as a function of eccentricity angle and speed. About half the subjects used active search patterns while the other half used passive search patterns. An interactive 3-D visualization tool was developed to provide a representation of macro-scale head and gaze movement in the search and target detection task. An experimentally validated stochastic model of peripheral vision in realistic target detection scenarios was developed.

  5. From tsunami hazard assessment to risk management in Guadeloupe (F.W.I.)

    NASA Astrophysics Data System (ADS)

    Zahibo, Narcisse; Dudon, Bernard; Krien, Yann; Arnaud, Gaël; Mercado, Aurelio; Roger, Jean

    2017-04-01

    The Caribbean region is prone to numerous natural hazards such as earthquakes, landslides, storm surges, tsunamis, coastal erosion or hurricanes. All these threats may cause great human and economic losses and are thus of prime interest for applied research. One of the main challenges for the scientific community is to conduct state-of-the-art research to assess hazards and share the results with coastal planners and decision makers so that they can regulate land use and develop mitigation strategies. We present here the results of a scientific collaborative project between Guadeloupe and Porto Rico which aimed at bringing a decision-making support to the authorities regarding tsunami hazards. This project led us to build a database of potential extreme events, and to study their impacts on Guadeloupe to investigate storm surge and tsunami hazards. The results were used by local authorities to develop safeguarding and mitigation measures in coastal areas. This project is thus a good example to demonstrate the benefit of inter Caribbean scientific collaboration for natural risks management.

  6. Occupational, social, and relationship hazards and psychological distress among low-income workers: implications of the 'inverse hazard law'.

    PubMed

    Krieger, Nancy; Kaddour, Afamia; Koenen, Karestan; Kosheleva, Anna; Chen, Jarvis T; Waterman, Pamela D; Barbeau, Elizabeth M

    2011-03-01

    Few studies have simultaneously included exposure information on occupational hazards, relationship hazards (eg, intimate partner violence) and social hazards (eg, poverty and racial discrimination), especially among low-income multiracial/ethnic populations. A cross-sectional study (2003-2004) of 1202 workers employed at 14 worksites in the greater Boston area of Massachusetts investigated the independent and joint association of occupational, social and relationship hazards with psychological distress (K6 scale). Among this low-income cohort (45% were below the US poverty line), exposure to occupational, social and relationship hazards, per the 'inverse hazard law,' was high: 82% exposed to at least one occupational hazard, 79% to at least one social hazard, and 32% of men and 34% of women, respectively, stated they had been the perpetrator or target of intimate partner violence (IPV). Fully 15.4% had clinically significant psychological distress scores (K6 score ≥ 13). All three types of hazards, and also poverty, were independently associated with increased risk of psychological distress. In models including all three hazards, however, significant associations with psychological distress occurred among men and women for workplace abuse and high exposure to racial discrimination only; among men, for IPV; and among women, for high exposure to occupational hazards, poverty and smoking. Reckoning with the joint and embodied reality of diverse types of hazards involving how people live and work is necessary for understanding determinants of health status.

  7. SLATE: scanning laser automatic threat extraction

    NASA Astrophysics Data System (ADS)

    Clark, David J.; Prickett, Shaun L.; Napier, Ashley A.; Mellor, Matthew P.

    2016-10-01

    SLATE is an Autonomous Sensor Module (ASM) designed to work with the SAPIENT system providing accurate location tracking and classifications of targets that pass through its field of view. The concept behind the SLATE ASM is to produce a sensor module that provides a complementary view of the world to the camera-based systems that are usually used for wide area surveillance. Cameras provide a hi-fidelity, human understandable view of the world with which tracking and identification algorithms can be used. Unfortunately, positioning and tracking in a 3D environment is difficult to implement robustly, making location-based threat assessment challenging. SLATE uses a Scanning Laser Rangefinder (SLR) that provides precise (<1cm) positions, sizes, shapes and velocities of targets within its field-of-view (FoV). In this paper we will discuss the development of the SLATE ASM including the techniques used to track and classify detections that move through the field of view of the sensor providing the accurate tracking information to the SAPIENT system. SLATE's ability to locate targets precisely allows subtle boundary-crossing judgements, e.g. on which side of a chain-link fence a target is. SLATE's ability to track targets in 3D throughout its FoV enables behavior classification such as running and walking which can provide an indication of intent and help reduce false alarm rates.

  8. Student threat assessment as a standard school safety practice: Results from a statewide implementation study.

    PubMed

    Cornell, Dewey; Maeng, Jennifer L; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick

    2018-06-01

    Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat assessment teams distinguish serious from nonserious threats. The sample consisted of 1,865 threat assessment cases reported by 785 elementary, middle, and high schools. Students ranged from pre-K to Grade 12, including 74.4% male, 34.6% receiving special education services, 51.2% White, 30.2% Black, 6.8% Hispanic, and 2.7% Asian. Survey data were collected from school-based teams to measure student demographics, threat characteristics, and assessment results. Logistic regression indicated that threat assessment teams were more likely to identify a threat as serious if it was made by a student above the elementary grades (odds ratio 0.57; 95% lower and upper bound 0.42-0.78), a student receiving special education services (1.27; 1.00-1.60), involved battery (1.61; 1.20-2.15), homicide (1.40; 1.07-1.82), or weapon possession (4.41; 2.80-6.96), or targeted an administrator (3.55; 1.73-7.30). Student race and gender were not significantly associated with a serious threat determination. The odds ratio that a student would attempt to carry out a threat classified as serious was 12.48 (5.15-30.22). These results provide new information on the nature and prevalence of threats in schools using threat assessment that can guide further work to develop this emerging school safety practice. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  9. Reactions to a health threat: dispositional threat orientations and message characteristics.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Gonzalez, Amelia; Denison, Elizabeth

    2011-05-01

    This study explored the interactive effects of dispositional threat orientation, type of message, and having children on reactions to a message about exposure to bisphenol A (BPA) in plastics. The study used a 2 (message: Fear Arousal or Plain)×2 (parenting status: child or no child)×2 (threat orientation: high or low) mixed factorial design. Adults (N= 200) recruited via the Internet completed measures of threat orientations, reported whether they were a parent, and read either a low or high fear-arousal message about the risks of BPA exposure. They then completed measures of reactions to the message (perceived susceptibility to BPA effects, negative emotions, and behavioural intentions to engage in protection). Depending on threat orientations, the fear arousal version of the message and parenthood had strikingly different effects, ranging from no effect (for those high in a control-based approach) to prompting change (for those low in a control-based approach) to counterproductive (for those high in an optimistic denial approach). These findings suggest that considering individual differences and their interactions with situational factors could improve both the predictive ability of threat protection theories and the delivery of messages intended to change behaviour. ©2010 The British Psychological Society.

  10. Community Capacity in The Face Of Landslide Hazards in the Southern Of Semarang City

    NASA Astrophysics Data System (ADS)

    Tjahjono, Heri; Suripin; Kismartini

    2018-02-01

    The study was done at Semarang, Central Java. The aims of the study are: (a) to know the variation in the level of community capacity in dealing with landslide hazards in the southern of Semarang city; (B) to know the factors that affect the capacity of communities in facing the hazards of landslides. This research was conducted by the sample method with a sample of 198 people, taken by purposive sampling. Samples taken are people living in areas that have experienced landslide or in areas that are expected to be vulnerable to landslides. The variables used in this research are (1) regulatory and institutional capacity in the prevention of landslide disaster, (2) early warning system in community, (3) education of disaster skill training, (4) mitigation to reduce basic risk factor, and (5) Preparedness on all fronts. Data were collected with questioner and interviews. Data analysis was performed by percentage descriptions, and map overlay analysis using ArcGIS release 10.3 technology. The result of the research shows that there are 5 variations of society's capacity level in facing the landslide hazard in southern Semarang city, that is the very high capacity of society as much as 4,35 % of the people that researched, the high community capacity is 7,25 % of the people that researched, the medium community capacity is 30.43 %. of the people that researched, low community capacity as much as 36.23 % of the people that researched and very low community capacity as much as 21.74% of the people that researched. Based on the result of overlay map of landslide threat in southern Semarang City with map about variation of community capacity level in facing landslide hazard indicate that community capacity with very high criterion and high occupancy area of threat of landslide with high and medium criterion which have been experienced landslide. While the capacity of the community with the criteria of medium, low and very low occupies the threat of landslide areas with high

  11. Change-based threat detection in urban environments with a forward-looking camera

    NASA Astrophysics Data System (ADS)

    Morton, Kenneth, Jr.; Ratto, Christopher; Malof, Jordan; Gunter, Michael; Collins, Leslie; Torrione, Peter

    2012-06-01

    Roadside explosive threats continue to pose a significant risk to soldiers and civilians in conflict areas around the world. These objects are easy to manufacture and procure, but due to their ad hoc nature, they are difficult to reliably detect using standard sensing technologies. Although large roadside explosive hazards may be difficult to conceal in rural environments, urban settings provide a much more complicated background where seemingly innocuous objects (e.g., piles of trash, roadside debris) may be used to obscure threats. Since direct detection of all innocuous objects would flag too many objects to be of use, techniques must be employed to reduce the number of alarms generated and highlight only a limited subset of possibly threatening regions for the user. In this work, change detection techniques are used to reduce false alarm rates and increase detection capabilities for possible threat identification in urban environments. The proposed model leverages data from multiple video streams collected over the same regions by first applying video aligning and then using various distance metrics to detect changes based on image keypoints in the video streams. Data collected at an urban warfare simulation range at an Eastern US test site was used to evaluate the proposed approach, and significant reductions in false alarm rates compared to simpler techniques are illustrated.

  12. Combatting Insider Threats

    NASA Astrophysics Data System (ADS)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  13. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    PubMed Central

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  14. Hazardous factories: Nigerian evidence.

    PubMed

    Oloyede, Olajide

    2005-06-01

    The past 15 years have seen an increasing governmental and corporate concern for the environment worldwide. For governments, information about the environmental performance of the industrial sector is required to inform macro-level decisions about environmental targets such as those required to meet UN directives. However, in many African, Asian, and Latin American countries, researching and reporting company environmental performance is limited. This article serves as a contribution to filling the gap by presenting evidence of physical and chemical risk in Nigerian factories. One hundred and three factories with a total of 5,021 workers were studied. One hundred and twenty physical and chemical hazards were identified and the result shows a high number of workers exposed to such hazards. The study also reveals that workers' awareness level of chemical hazards was high. Yet the danger was perceived in behavioral terms, especially by manufacturing firms, which tend to see environmental investment in an increasingly global economy as detrimental to profitability.

  15. Threat perception after the Boston Marathon bombings: The effects of personal relevance and conceptual framing.

    PubMed

    Wormwood, Jolie Baumann; Lynn, Spencer K; Feldman Barrett, Lisa; Quigley, Karen S

    2016-01-01

    We examined how the Boston Marathon bombings affected threat perception in the Boston community. In a threat perception task, participants attempted to "shoot" armed targets and avoid shooting unarmed targets. Participants viewing images of the bombings accompanied by affectively negative music and text (e.g., "Terror Strikes Boston") made more false alarms (i.e., more errors "shooting" unarmed targets) compared to participants viewing the same images accompanied by affectively positive music and text (e.g., "Boston Strong") and participants who did not view bombing images. This difference appears to be driven by decreased sensitivity (i.e., decreased ability to distinguish guns from non-guns) as opposed to a more liberal bias (i.e., favouring the "shoot" response). Additionally, the more strongly affected the participant was by the bombings, the more their sensitivity was reduced in the negatively framed condition, suggesting that this framing was particularly detrimental to the most vulnerable individuals in the affected community.

  16. The Critical Role of Cyberinfrastructure in Global Observations of Natural Hazards

    NASA Astrophysics Data System (ADS)

    Orcutt, J. A.

    2005-12-01

    This past year has brought grave lessons about the critical risks posed by natural hazards. The Sumatra earthquake and resultant tsunami causing as many as 300,000 deaths, and Hurricane Katrina and its destruction of the Gulf Coast in Louisiana and Mississippi with an unknown loss of life and infrastructure damage that may approach $100,000,000,000 in rebuilding costs, have been shattering experiences. The Sumatra earthquake reminds us of the tsunami threat we face in Cascadia and news about the avian flu in the orient and its potential transmission to and between humans threatens to bring a natural disaster that can dwarf either of this year's disasters. All of these phenomena have their roots in the geosciences. While the threats of terrorism have dominated political discussions globally for the past few years, the growing impact of natural hazards, including the long-term impact of a potentially changing climate, require that geoscientists develop globally distributed observing systems critically important in mitigating the societal impacts of these hazards. This is particularly important for the AGU, the largest professional geosciences organization in the world today. One of the lessons learned during the past year, however, is that accessing the data and information needed to predict and subsequently understand the impact of hazards is difficult requiring more time than can generally be afforded. For the AGU, the new Focus Group on Earth and Space Science Informatics has an important role in bringing modern methods in information technology, computer sciences, and cyberinfrastructure to the problem of providing coherent access to near-real-time data from the growing suite of Earth observations, the use of the data in model assimilation, the transformation of data to knowledge, and the visualization of the results for use by those responsible for managing the damage caused by these natural hazards. While the challenge is enormous, there is considerable promise

  17. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  18. In Brief: Forecasting meningitis threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  19. Ground-Level Ozone Following Astrophysical Ionizing Radiation Events: An Additional Biological Hazard?

    PubMed

    Thomas, Brian C; Goracke, Byron D

    2016-01-01

    Astrophysical ionizing radiation events such as supernovae, gamma-ray bursts, and solar proton events have been recognized as a potential threat to life on Earth, primarily through depletion of stratospheric ozone and subsequent increase in solar UV radiation at Earth's surface and in the upper levels of the ocean. Other work has also considered the potential impact of nitric acid rainout, concluding that no significant threat is likely. Not yet studied to date is the potential impact of ozone produced in the lower atmosphere following an ionizing radiation event. Ozone is a known irritant to organisms on land and in water and therefore may be a significant additional hazard. Using previously completed atmospheric chemistry modeling, we examined the amount of ozone produced in the lower atmosphere for the case of a gamma-ray burst and found that the values are too small to pose a significant additional threat to the biosphere. These results may be extended to other ionizing radiation events, including supernovae and extreme solar proton events.

  20. Contribution of Near Real Time MODIS-Based Forest Disturbance Detection Products to a National Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph; Hargrove, William; Gasser, Gerald; Smoot, James; Kuper, Philip

    2011-01-01

    U.S. forests occupy approx. 751 million acres (approx. 1/3 of total land). These forests are exposed to multiple biotic and abiotic threats that collectively damage extensive acreages each year. Hazardous forest disturbances can threaten human life and property, bio-diversity and water supplies. Timely regional forest monitoring products are needed to aid forest management and decision making by the US Forest Service and its state and private partners. Daily MODIS data products provide a means to monitor regional forest disturbances on a weekly basis. In response, we began work in 2006 to develop a Near Real Time (NRT) forest monitoring capability, based on MODIS NDVI data, as part of a national forest threat early warning system (EWS)

  1. Bullets versus burgers: is it threat or relevance that captures attention?

    PubMed

    de Oca, Beatrice M; Black, Alison A

    2013-01-01

    Previous studies have found that potentially dangerous stimuli are better at capturing attention than neutral stimuli, a finding sometimes called the threat superiority effect. However, non-threatening stimuli also capture attention in many studies of visual attention. In Experiment 1, the relevance superiority effect was tested with a visual search task comparing detection times for threatening stimuli (guns), pleasant but motivationally relevant stimuli (food), and neutral stimuli (flowers and chairs). Gun targets were detected more rapidly than both types of neutral targets, whereas food targets were detected more quickly than the neutral chair targets only. Guns were detected more rapidly than food. In Experiment 2, threatening targets (guns and snakes), pleasant but motivationally relevant targets (money and food), and neutral targets (trees and couches) were all presented with the same neutral distractors (cactus and pots) in order to control for the valence of the distractor stimulus across the three categories of target stimuli. Threatening and pleasant target categories facilitated attention relative to neutral targets. The results support the view that both threatening and pleasant pictures can be detected more rapidly than neutral targets.

  2. A UAV System for Observing Volcanoes and Natural Hazards

    NASA Astrophysics Data System (ADS)

    Saggiani, G.; Persiani, F.; Ceruti, A.; Tortora, P.; Troiani, E.; Giuletti, F.; Amici, S.; Buongiorno, M.; Distefano, G.; Bentini, G.; Bianconi, M.; Cerutti, A.; Nubile, A.; Sugliani, S.; Chiarini, M.; Pennestri, G.; Petrini, S.; Pieri, D.

    2007-12-01

    Fixed or rotary wing manned aircraft are currently the most commonly used platforms for airborne reconnaissance in response to natural hazards, such as volcanic eruptions, oil spills, wild fires, earthquakes. Such flights are very often undertaken in hazardous flying conditions (e.g., turbulence, downdrafts, reduced visibility, close proximity to dangerous terrain) and can be expensive. To mitigate these two fundamental issues-- safety and cost--we are exploring the use of small (less than 100kg), relatively inexpensive, but effective, unmanned aerial vehicles (UAVs) for this purpose. As an operational test, in 2004 we flew a small autonomous UAV in the airspace above and around Stromboli Volcano. Based in part on this experience, we are adapting the RAVEN UAV system for such natural hazard surveillance missions. RAVEN has a 50km range, with a 3.5m wingspan, main fuselage length of 4.60m, and maximum weight of 56kg. It has autonomous flight capability and a ground control Station for the mission planning and control. It will carry a variety of imaging devices, including a visible camera, and an IR camera. It will also carry an experimental Fourier micro-interferometer based on MOEMS technology, (developed by IMM Institute of CNR), to detect atmospheric trace gases. Such flexible, capable, and easy-to-deploy UAV systems may significantly shorten the time necessary to characterize the nature and scale of the natural hazard threats if used from the outset of, and systematically during, natural hazard events. When appropriately utilized, such UAVs can provide a powerful new hazard mitigation and documentation tool for civil protection hazard responders. This research was carried out under the auspices of the Italian government, and, in part, under contract to NASA at the Jet Propulsion Laboratory.

  3. Estimating animal mortality from anthropogenic hazards

    EPA Science Inventory

    Carcass searches are a common method for studying the risk of anthropogenic hazards to wildlife, including non-target poisoning and collisions with anthropogenic structures. Typically, numbers of carcasses found must be corrected for scavenging rates and imperfect detection. Para...

  4. Volcano hazards program in the United States

    USGS Publications Warehouse

    Tilling, R.I.; Bailey, R.A.

    1985-01-01

    Volcano monitoring and volcanic-hazards studies have received greatly increased attention in the United States in the past few years. Before 1980, the Volcanic Hazards Program was primarily focused on the active volcanoes of Kilauea and Mauna Loa, Hawaii, which have been monitored continuously since 1912 by the Hawaiian Volcano Observatory. After the reawakening and catastrophic eruption of Mount St. Helens in 1980, the program was substantially expanded as the government and general public became aware of the potential for eruptions and associated hazards within the conterminous United States. Integrated components of the expanded program include: volcanic-hazards assessment; volcano monitoring; fundamental research; and, in concert with federal, state, and local authorities, emergency-response planning. In 1980 the David A. Johnston Cascades Volcano Observatory was established in Vancouver, Washington, to systematically monitor the continuing activity of Mount St. Helens, and to acquire baseline data for monitoring the other, presently quiescent, but potentially dangerous Cascade volcanoes in the Pacific Northwest. Since June 1980, all of the eruptions of Mount St. Helens have been predicted successfully on the basis of seismic and geodetic monitoring. The largest volcanic eruptions, but the least probable statistically, that pose a threat to western conterminous United States are those from the large Pleistocene-Holocene volcanic systems, such as Long Valley caldera (California) and Yellowstone caldera (Wyoming), which are underlain by large magma chambers still potentially capable of producing catastrophic caldera-forming eruptions. In order to become better prepared for possible future hazards associated with such historically unpecedented events, detailed studies of these, and similar, large volcanic systems should be intensified to gain better insight into caldera-forming processes and to recognize, if possible, the precursors of caldera-forming eruptions

  5. Visually impaired individuals, safety perceptions and traumatic events: a qualitative study of hazards, reactions and coping.

    PubMed

    Saur, Randi; Hansen, Marianne Bang; Jansen, Anne; Heir, Trond

    2017-04-01

    To explore the types of risks and hazards that visually impaired individuals face, how they manage potential threats and how reactions to traumatic events are manifested and coped with. Participants were 17 visually impaired individuals who had experienced some kind of potentially traumatic event. Two focus groups and 13 individual interviews were conducted. The participants experienced a variety of hazards and potential threats in their daily life. Fear of daily accidents was more pronounced than fear of disasters. Some participants reported avoiding help-seeking in unsafe situations due to shame at not being able to cope. The ability to be independent was highlighted. Traumatic events were re-experienced through a variety of sense modalities. Fear of labelling and avoidance of potential risks were recurring topics, and the risks of social withdrawal and isolation were addressed. Visual impairment causes a need for predictability and adequate information to increase and prepare for coping and self-efficacy. The results from this study call for greater emphasis on universal design in order to ensure safety and predictability. Fear of being labelled may inhibit people from using assistive devices and adequate coping strategies and seeking professional help in the aftermath of a trauma. Implications for Rehabilitation Visual impairment entails a greater susceptibility to a variety of hazards and potential threats in daily life. This calls for a greater emphasis on universal design in public spaces to ensure confidence and safety. Visual impairment implies a need for predictability and adequate information to prepare for coping and self-efficacy. Rehabilitation professionals should be aware of the need for independence and self-reliance, the possible fear of labelling, avoidance of help-seeking or reluctance to use assistive devices. In rehabilitation after accidents or potential traumatizing events, professionals' knowledge about the needs for information, training

  6. Volcanic hazard maps of the Nevado del Ruiz volcano, Colombia

    NASA Astrophysics Data System (ADS)

    Parra, Eduardo; Cepeda, Hector

    1990-07-01

    Although the potential hazards associated with an eruption of Nevado del Ruiz volcano were known to civil authorities before the catastrophic eruption there in November 1985, their low perception of risk and the long quiescent period since the last eruption (140 years), caused them to wait for stronger activity before developing an eruption alert system. Unfortunately, the eruption occurred suddenly after a period of relative quiet, and as a result more than 25,000 people were killed. Although it was accurate and reasonably comprehensive, the hazard map that existed before the eruption was poorly understood by the authorities and even less so by the general population, because the scientific terminology and probabilistic approach to natural hazards were unfamiliar to many of them. This confusion was shared by the communication media, which at critical times placed undue emphasis on the possibility of lava flows rather than on the more imminent threat from mudflows, in keeping with the popular but often inaccurate perception of volcanic eruptions. This work presents an updated hazard map of Nevado del Ruiz that combines information on various hazardous phenomena with their relative probability of occurrence in order to depict numerical "hazard levels" that are easily comprehensible to nonspecialists and therefore less susceptible to misinterpretation. The scale of relative risk is arbitrary, ranging from five to one, and is intended to provide an intuitive indication of danger to people, property and crops. The map is meant to facilitate emergency preparedness and management by political and civil authorities, to educate the public concerning volcanic hazards and to assist in land-use planning decisions.

  7. Application of the improved fuzzy analytic hierarchy process for landslide hazard assessment based on RS and GIS

    NASA Astrophysics Data System (ADS)

    Li, Baishou; Gao, Yujiu

    2015-12-01

    The landslide is a geological disaster that caused the second disruptions and losses next to the earthquake, and people around the world suffered a serious threat to their lives and property damage as a result of landslide disaster every year. So carrying on the study of the landslide hazard will create important theoretical meaning and practical value for proposing targeted prevention and treatment measures. Landslides occur more frequently in Guangxi where serious landslide disasters run riot because of its unique karst topography environment and abundant rainfall. The Wanxiu District of Wuzhou, Guangxi was selected as the study area, the landslide hazard zonation evaluation was studied on the basis of RS and GIS technology. The factors that influence landslide occurrence, such as elevation, slope inclination, slope aspect, curvature and distance to streams were derived from the DEM; land use was extracted from the Google Earth image; lithology was digitalized from the geologic map; rainfall information was from the literature. An improved analytic hierarchy process was presented to determine the index weight in this study. The method weakens the uncertainty in the process of comparing the importance of each factor, it need not to do the consistency check, which can also reduce the iteration times enormously, and improve operating speed. Combined with fuzzy comprehensive evaluation method, the landslide hazard mapping of the study area was made according to the maximum membership degree principle. The resulting map can be used to provide some reference values for risk management, land-use planning and urbanization.

  8. Scientific and public responses to the ongoing volcanic crisis at Popocatépetl Volcano, Mexico: Importance of an effective hazards-warning system

    USGS Publications Warehouse

    De la Cruz-Reyna, Servando; Tilling, Robert I.

    2008-01-01

    Volcanic eruptions and other potentially hazardous natural phenomena occur independently of any human actions. However, such phenomena can cause disasters when a society fails to foresee the hazardous manifestations and adopt adequate measures to reduce its vulnerability. One of the causes of such a failure is the lack of a consistent perception of the changing hazards posed by an ongoing eruption, i.e., with members of the scientific community, the Civil Protection authorities and the general public having diverging notions about what is occurring and what may happen. The problem of attaining a perception of risk as uniform as possible in a population measured in millions during an evolving eruption requires searching for communication tools that can describe—as simply as possible—the relations between the level of threat posed by the volcano, and the level of response of the authorities and the public. The hazards-warning system adopted at Popocatépetl Volcano, called the Volcanic Traffic Light Alert System(VTLAS), is a basic communications protocol that translates volcano threat into seven levels of preparedness for the emergency-management authorities, but only three levels of alert for the public (color coded green–yellow–red). The changing status of the volcano threat is represented as the most likely scenarios according to the opinions of an official scientific committee analyzing all available data. The implementation of the VTLAS was intended to reduce the possibility of ambiguous interpretations of intermediate levels by the endangered population. Although the VTLAS is imperfect and has not solved all problems involved in mass communication and decision-making during a volcanic crisis, it marks a significant advance in the management of volcanic crises in Mexico.

  9. Temporal Changes in Community Resilience to Drought Hazard

    NASA Astrophysics Data System (ADS)

    Mihunov, V.

    2017-12-01

    The threat of droughts and their associated impacts on the landscape and human communities have long been recognized. While considerable research on the climatological aspect of droughts has been conducted, studies on the resilience of human communities to the effects of drought remain limited. Understanding how different communities respond to and recover from the drought hazard, i.e. their community resilience, should inform the development of better strategies to cope with the hazard. This research assesses community resilience to drought hazard in South-Central U.S. and captures the temporal changes of community resilience in the region facing the climate change. First, the study applies the Resilience Inference Measurement (RIM) framework using the existing drought incidence, crop damage, socio-economic and food-water-energy nexus variables, which allows to assign county-level resilience scores in the study region and derive variables contributing to the resilience. Second, it captures the temporal changes in community resilience by using the model extracted from the RIM study and socio-economic data from several consecutive time periods. The resilience measurement study should help understand the complex process underlying communities' response to the drought impacts. The results identify gaps in resilience planning and help the improvement of the community resilience to the droughts of increasing frequency and intensity.

  10. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  11. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: a review.

    PubMed

    Upadhyayula, Venkata K K

    2012-02-17

    There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad range of threat agents, including radioactive substances, explosive compounds, chemical warfare agents, biotoxins, and biothreat pathogens through any of the four sensory means mentioned previously. Copyright © 2011 Elsevier B.V. All rights reserved.

  12. Integrated management of hazardous waste generated from community sources in Thailand

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yodnane, P.; Spaeder, D.J.

    A system for the collection, transport, disposal and recycling of hazardous waste was developed as part of an overall master plan for the management of hazardous waste generated from community sources in Thailand. Results of a waste generation survey conducted as part of the study indicated that over 300 million kilograms per year of hazardous waste is generated from non-industrial, community sources such as automotive repair shops, gas stations, hospitals, farms, and households in Thailand. Hazardous waste from community sources consists primarily of used oils, lead-acid and dry cell batteries, cleaning chemicals, pesticides, medical wastes, solvents and fuels. Most ofmore » this waste was found to be mismanaged by codisposing with municipal waste in burning, unlined dumps, dumping directly to land or water courses, dumping into sewers, or recycling improperly, all of which pose serious threats to human health and the environment. The survey data on waste generation quantities and data from a reconnaissance survey of the conditions and operations of 86 existing waste disposal facilities was incorporated into a nationwide Geographic Information System (GIS) database. Based on this data, problems associated with hazardous waste were identified and needs for waste management systems were tabulated. A system was developed for ranking geographic regions according to hazardous waste management problems and needs, in order to prioritize implementation of waste management programs. The data were also used in developing solutions for hazardous waste management, which addressed methods for storing, collecting, transporting, disposing, and recycling the waste. It was recommended that centralized waste management facilities be utilized which included hazardous waste and medical waste incinerators, waste stabilization units, and secure landfills.« less

  13. Application of the FTA and ETA Method for Gas Hazard Identification for the Performance of Safety Systems in the Industrial Department

    NASA Astrophysics Data System (ADS)

    Ignac-Nowicka, Jolanta

    2018-03-01

    The paper analyzes the conditions of safe use of industrial gas systems and factors influencing gas hazards. Typical gas installation and its basic features have been characterized. The results of gas threat analysis in an industrial enterprise using FTA error tree method and ETA event tree method are presented. Compares selected methods of identifying hazards gas industry with respect to the scope of their use. The paper presents an analysis of two exemplary hazards: an industrial gas catastrophe (FTA) and an explosive gas explosion (ETA). In both cases, technical risks and human errors (human factor) were taken into account. The cause-effect relationships of hazards and their causes are presented in the form of diagrams in the drawings.

  14. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  15. Dust on Mars: An Aeolian Threat to Human Exploration?

    NASA Technical Reports Server (NTRS)

    Marshall, J.

    1999-01-01

    The NASA HEDS Program is duly concerned for human explorers regarding the potential hazard posed by the ubiquitous dust mantle on Mars. To evaluate properties of dust that could be hazardous to humans, the NMS 2001 Lander payload will include the Mars Environmental Compatibility Assessment (MECA) experiment. This includes optical and atomic-force microscopy to evaluate soil grains for shape and size, wet chemistry to evaluate toxic substances, electrometry to evaluate triboelectric charging, and test-material palets to evaluate electrostatic and magnetic adhesion, and the hardness/abrasiveness of soil grains; these experimental subcomponents are delivered samples by the camera-equipped robotic arm of the lander which will acquire material from depths of 0.5 to 1.0 m in the soil. Data returned by MECA will be of value to both the hEDS and planetary/astrobiology communities. Dust poses a threat to human exploration because the martian system does not hydrologically or chemically remove fine particles that are being continuously generated by thermal, aeolian, and colluvial weathering, and by volcanism and impact over billions of years. The dust is extremely fine-grained, in copious quantities, ubiquitous in distribution, continually mobile, and a source of poorly-grounded static charges -- a suite of characteristics posing a particulate and electrical threat to explorers and their equipment. Dust is mobilized on global and regional scales, but probably also unpredictably and violently at local scales by dust devils. The latter might be expected in great abundance owing to near surface atmospheric instability (dust devils were detected by Pathfinder during its brief lifetime). Preliminary laboratory experiments suggest that space-suit materials subjected to windblown dust may acquire a uniform, highly adhesive dust layer that is also highly cohesive laterally owing to electrostatic forces. This layer will obscure visibility through the helmet visor, penetrate joints

  16. Dust on Mars: An Aeolian Threat to Human Exploration?

    NASA Technical Reports Server (NTRS)

    Marshall, J.

    1999-01-01

    The NASA HEDS Program is duly concerned for human explorers regarding the potential hazard posed by the ubiquitous dust mantle on Mars. To evaluate properties of dust that could be hazardous to humans, the MPS 2001 Lander payload will include the Mars Environmental Compatibility Assessment (MECA) experiment. This includes optical and atomic-force microscopy to evaluate soil grains for shape and size, wet chemistry to evaluate toxic substances, electrometry to evaluate triboelectric charging, and test-material palets to evaluate electrostatic and magnetic adhesion, and the hardness/abrasiveness of soil grains; these experimental subcomponents are delivered samples by the camera-equipped robotic arm of the lander which will acquire material from depths of 0.5 to 1.0 m in the soil. Data returned by MECA will be of value to both the BEDS and planetary/astrobiology communities. Dust poses a threat to human exploration because the martian system does not hydrologically or chemically remove fine particles that are being continuously generated by thermal, aeolian, and colluvial weathering, and by volcanism and impact over billions of years. The dust is extremely fine-grained, in copious quantities, ubiquitous in distribution, continually mobile, and a source of poorly-grounded static charges -- a suite of characteristics posing a particulate and electrical threat to explorers and their equipment. Dust is mobilized on global and regional scales, but probably also unpredictably and violently at local scales by dust devils. The latter might be expected in great abundance owing to near surface atmospheric instability (dust devils were detected by Pathfinder during its brief lifetime). Preliminary laboratory experiments suggest that space-suit materials subjected to windblown dust may acquire a uniform, highly adhesive dust layer that is also highly cohesive laterally owing to electrostatic forces. This layer will obscure visibility through the helmet visor, penetrate joints

  17. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    PubMed

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  18. Targeted gene flow for conservation.

    PubMed

    Kelly, Ella; Phillips, Ben L

    2016-04-01

    Anthropogenic threats often impose strong selection on affected populations, causing rapid evolutionary responses. Unfortunately, these adaptive responses are rarely harnessed for conservation. We suggest that conservation managers pay close attention to adaptive processes and geographic variation, with an eye to using them for conservation goals. Translocating pre-adapted individuals into recipient populations is currently considered a potentially important management tool in the face of climate change. Targeted gene flow, which involves moving individuals with favorable traits to areas where these traits would have a conservation benefit, could have a much broader application in conservation. Across a species' range there may be long-standing geographic variation in traits or variation may have rapidly developed in response to a threatening process. Targeted gene flow could be used to promote natural resistance to threats to increase species resilience. We suggest that targeted gene flow is a currently underappreciated strategy in conservation that has applications ranging from the management of invasive species and their impacts to controlling the impact and virulence of pathogens. © 2015 Society for Conservation Biology.

  19. Augmented Reality Cues and Elderly Driver Hazard Perception

    PubMed Central

    Schall, Mark C.; Rusch, Michelle L.; Lee, John D.; Dawson, Jeffrey D.; Thomas, Geb; Aksan, Nazan; Rizzo, Matthew

    2013-01-01

    Objective Evaluate the effectiveness of augmented reality (AR) cues in improving driving safety in elderly drivers who are at increased crash risk due to cognitive impairments. Background Cognitively challenging driving environments pose a particular crash risk for elderly drivers. AR cueing is a promising technology to mitigate risk by directing driver attention to roadway hazards. This study investigates whether AR cues improve or interfere with hazard perception in elderly drivers with age-related cognitive decline. Methods Twenty elderly (Mean= 73 years, SD= 5 years), licensed drivers with a range of cognitive abilities measured by a speed of processing (SOP) composite participated in a one-hour drive in an interactive, fixed-base driving simulator. Each participant drove through six, straight, six-mile-long rural roadway scenarios following a lead vehicle. AR cues directed attention to potential roadside hazards in three of the scenarios, and the other three were uncued (baseline) drives. Effects of AR cueing were evaluated with respect to: 1) detection of hazardous target objects, 2) interference with detecting nonhazardous secondary objects, and 3) impairment in maintaining safe distance behind a lead vehicle. Results AR cueing improved the detection of hazardous target objects of low visibility. AR cues did not interfere with detection of nonhazardous secondary objects and did not impair ability to maintain safe distance behind a lead vehicle. SOP capacity did not moderate those effects. Conclusion AR cues show promise for improving elderly driver safety by increasing hazard detection likelihood without interfering with other driving tasks such as maintaining safe headway. PMID:23829037

  20. Theory of Prejudice and American Identity Threat Transfer for Latino and Asian Americans.

    PubMed

    Sanchez, Diana T; Chaney, Kimberly E; Manuel, Sara K; Remedios, Jessica D

    2018-03-01

    Latinos and Asian Americans confront similar stereotypes as they are often presumed to be foreigners and subjected to American identity denial. Across six studies (total N = 992), we demonstrate that Latinos and Asians anticipate ingroup prejudice and specific types of subordination (e.g., American identity threat) in the face of outgroup threats that target one another (i.e., stigma transfer). The studies explore whether stigma transfer occurred primarily when shared Latino and Asian stereotype content was a salient component of the prejudice remark (e.g., foreigner stereotypes; Study 3), or when outgroup prejudice targeted a social group with shared stereotype content (Study 4), though neither appeared to substantively moderate stigma transfer. Minority group members who conceptualize prejudiced people as holding multiple biases (i.e., a monolithic prejudice theory) were more susceptible to stigma transfer suggesting that stereotype content is not necessary for stigma transfer because people assume that prejudice is not singular.

  1. Counterfactual Volcano Hazard Analysis

    NASA Astrophysics Data System (ADS)

    Woo, Gordon

    2013-04-01

    The historical database of past disasters is a cornerstone of catastrophe risk assessment. Whereas disasters are fortunately comparatively rare, near-misses are quite common for both natural and man-made hazards. The word disaster originally means 'an unfavourable aspect of a star'. Except for astrologists, disasters are no longer perceived fatalistically as pre-determined. Nevertheless, to this day, historical disasters are treated statistically as fixed events, although in reality there is a large luck element involved in converting a near-miss crisis situation into a disaster statistic. It is possible to conceive a stochastic simulation of the past to explore the implications of this chance factor. Counterfactual history is the exercise of hypothesizing alternative paths of history from what actually happened. Exploring history from a counterfactual perspective is instructive for a variety of reasons. First, it is easy to be fooled by randomness and see regularity in event patterns which are illusory. The past is just one realization of a variety of possible evolutions of history, which may be analyzed through a stochastic simulation of an array of counterfactual scenarios. In any hazard context, there is a random component equivalent to dice being rolled to decide whether a near-miss becomes an actual disaster. The fact that there may be no observed disaster over a period of time may belie the occurrence of numerous near-misses. This may be illustrated using the simple dice paradigm. Suppose a dice is rolled every month for a year, and an event is recorded if a six is thrown. There is still an 11% chance of no events occurring during the year. A variety of perils may be used to illustrate the use of near-miss information within a counterfactual disaster analysis. In the domain of natural hazards, near-misses are a notable feature of the threat landscape. Storm surges are an obvious example. Sea defences may protect against most meteorological scenarios. However

  2. Natural Hazards of the Space Environment

    NASA Technical Reports Server (NTRS)

    Evans, Steven W.; Kross, Dennis A. (Technical Monitor)

    2000-01-01

    Spacecraft in Low Earth Orbit (LEO) are subject to numerous environmental hazards. Here I'll briefly discuss three environment factors that pose acute threats to the survival of spacecraft systems and crew: atmospheric drag, impacts by meteoroids and orbital debris, and ionizing radiation. Atmospheric drag continuously opposes the orbital motion of a satellite, causing the orbit to decay. This decay will lead to reentry if not countered by reboost maneuvers. Orbital debris is a by-product of man's activities in space, and consists of objects ranging in size from miniscule paint chips to spent rocket stages and dead satellites. Ionizing radiation experienced in LEO has several components: geomagnetically trapped protons and electrons (Van Allen belts); energetic solar particles; galactic cosmic rays; and albedo neutrons. These particles can have several types of prompt harmful effects on equipment and crew, from single-event upsets, latchup, and burnout of electronics, to lethal doses to crew.All three types of prompt threat show some dependence on the solar activity cycle. Atmospheric drag mitigation and large debris avoidance require propulsive maneuvers. M/OD and ionizing radiation require some form of shielding for crew and sensitive equipment. Limiting exposure time is a mitigation technique for ionizing radiation and meteor streams.

  3. Perceptions of Threats to Physical Safety, Sexual Autonomy, Values, and of Discrimination Drive LGB Prejudices Toward Heterosexuals.

    PubMed

    Pirlott, Angela G; Rusten, Marta L; Butterfuss, Reese M

    2016-09-01

    Many studies have investigated heterosexuals' prejudices toward nonheterosexuals, yet LGB's prejudices toward heterosexuals remain largely unexplored. Therefore, we sought to determine the threats and opportunities (i.e., affordances) LGB perceive heterosexuals to pose and whether those affordances explain their sexual prejudices toward heterosexuals. Study 1 analyzed LGB's reasons for liking and disliking heterosexuals, which determined whether the threats predicted to be salient for LGB mirrored the affordances they generated. Study 2 measured these perceived affordances and examined the extent to which they drove LGB's prejudices toward heterosexuals. Generally, perceptions of discrimination and unreciprocated sexual interest threats drove anger, physical safety and sexual autonomy threats drove fear, and values threats drove moral disgust toward heterosexuals, although results varied slightly by perceiver and target groups. Goals to alleviate the tensions between heterosexuals and LGB require an understanding of the dynamics between these groups. This research provides preliminary insights into understanding those dynamics. © 2016 by the Society for Personality and Social Psychology, Inc.

  4. Database for potential hazards from future volcanic eruptions in California

    USGS Publications Warehouse

    White, Melissa N.; Ramsey, David W.; Miller, C. Dan

    2011-01-01

    More than 500 volcanic vents have been identified in the State of California. At least 76 of these vents have erupted, some repeatedly, during the past 10,000 yr. Past volcanic activity has ranged in scale and type from small rhyolitic and basaltic eruptions through large catastrophic rhyolitic eruptions. Sooner or later, volcanoes in California will erupt again, and they could have serious impacts on the health and safety of the State's citizens as well as on its economy. This report describes the nature and probable distribution of potentially hazardous volcanic phenomena and their threat to people and property. It includes hazard-zonation maps that show areas relatively likely to be affected by future eruptions in California. This digital release contains information from maps of potential hazards from future volcanic eruptions in the state of California, published as Plate 1 in U.S. Geological Survey Bulletin 1847. The main component of this digital release is a spatial database prepared using geographic information systems (GIS) applications. This release also contains links to files to view or print the map plate, main report text, and accompanying hazard tables from Bulletin 1847. It should be noted that much has been learned about the ages of eruptive events in the State of California since the publication of Bulletin 1847 in 1989. For the most up to date information on the status of California volcanoes, please refer to the U.S. Geological Survey Volcano Hazards Program website.

  5. Maturation of the Asteroid Threat Assessment Project

    NASA Technical Reports Server (NTRS)

    Arnold, J. O..; Burkhard, C. D.

    2017-01-01

    As described at IPPW 12 [1], NASA initiated a new research activity focused on Planetary Defense (PD) on October 1, 2014. The overarching function of the Asteroid Threat Assessment Project (ATAP) is to provide capabilities to assess impact damage of any Near-Earth Object (NEO) that could inflict on the Earth. The activity includes four interrelated efforts: Initial Conditions (at the atmospheric entry interface); Entry Modeling (energy deposition in the atmosphere); Hazards (on the surface including winds, over pressures, thermal exposures, craters, tsunami and earthquakes) and Risk (physics-based). This paper outlines progress by ATAP and highlights achievements that are complimentary to activities of interest to the International Planetary Probe community. The ATAPs work is sponsored by NASAs Planetary Defense Coordination Office (PDCO), a part of the agency's Science Mission Directorate [1] Arnold, J. O., et. al., Overview of a New NASA Activity Focused on Planetary Defense, IPPW 12 Cologne Germany, June 15-19. 2015.

  6. Integration of Behavioral Threat Management into Fusion Center Operations to Prevent Mass or Targeted Violence

    DTIC Science & Technology

    2016-12-01

    On Killing: The Psychological Cost of Learning to Kill in War and Society (New York: Integrated Media Incorporated, 2014), Kindle location 2618...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. INTEGRATION OF...REPORT DATE December 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE INTEGRATION OF BEHAVIORAL THREAT MANAGEMENT INTO

  7. NOAA/National Weather Service Support in Response to the Threat of Debris Flows from the 2009 Station Fire in Los Angeles County: Lessons Learned in Hazard Communications and Public Response

    NASA Astrophysics Data System (ADS)

    Jackson, M.; Laber, J. L.; Boldt, E.

    2010-12-01

    The National Oceanic and Atmospheric Administration’s (NOAA) National Weather Service (NWS) and the United States Geological Survey (USGS) have developed a prototype debris flow early warning system for Southern California. The system uses USGS-defined rainfall rate thresholds for debris flows and burn area hazard maps to protect interests in and near burn areas of damaging and potentially deadly debris flows. Although common throughout Southern California, as witnessed by the December 25, 2003 storm in which sixteen people were swept to their deaths by debris flows generated from a recent burn area near Devore, debris flows are commonly misunderstood by the public. They are often perceived as rare events, are difficult to warn for with sufficient lead time, and present unique challenges when communicating proper calls to action to best save lives and property. Many improvements to the system have been realized since the project’s inception in 2005, including using more refined rainfall rate thresholds, use of burn area hazard maps, and the establishment of a tiered system to categorize the potential severity of flash floods and debris flows. These efforts have collectively resulted in a reduction of warning false alarms. However, the massive 400,000 hectare 2009 Station burn area in the Angeles National Forest of Los Angeles County has created numerous challenges to the early warning system. The geology of the area burned is highly susceptible to debris flows, due in part to the burn severity, soil types and steep slopes. Most importantly, the burn area is adjacent to and uphill of the highly populated lower foothills of the San Fernando Valley. NOAA/NWS and the USGS have thus worked closely with local response and preparedness agencies to analyze and communicate the threat and assist in developing a unified command response plan in preparation for flash flood and debris flows from this burn area. The early warning system was put to the ultimate test on

  8. The Paradox of Parks in Low-Income Areas: Park Use and Perceived Threats

    PubMed Central

    Cohen, Deborah A.; Han, Bing; Derose, Kathryn P.; Williamson, Stephanie; Marsh, Terry; Raaen, Laura; McKenzie, Thomas L.

    2015-01-01

    Concerns about safety and perceived threats have been considered responsible for lower use of parks in high poverty neighborhoods. To quantify the role of perceived threats on park use we systematically observed 48 parks and surveyed park users and household residents in low-income neighborhoods in the City of Los Angeles. Across all parks, the majority of both park users and local residents perceive parks as safe or very safe. We noted apparently homeless individuals during nearly half of all observations, but very few instances of fighting, intimidating groups, smoking and intoxication. The presence of homeless individuals was associated with higher numbers of park users, while the presence of intoxicated persons was associated with lower numbers. Overall the strongest predictors of increased park use were the presence of organized and supervised activities. Therefore, to increase park use, focusing resources on programming may be more fruitful than targeting perceived threats. PMID:27065480

  9. The measurement of threat orientations.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Bovin, Michelle J

    2006-01-01

    To develop measures of 3 threat orientations that affect responses to health behavior messages. In Study 1, college students (N = 47) completed items assessing threat orientations and health behaviors. In Study 2, college students and community adults (N = 110) completed the threat orientation items and measures of convergent and discriminant validity. In Study 1, the control-based, denial-based, and heightened-sensitivity-based threat orientation scales demonstrated good internal consistency and correlated with engagement in health behaviors. In Study 2, the convergent and discriminant validity of the 3 measures was established. The 3 scales have good internal reliability and construct validity.

  10. Tsunami hazard and risk assessment in El Salvador

    NASA Astrophysics Data System (ADS)

    González, M.; González-Riancho, P.; Gutiérrez, O. Q.; García-Aguilar, O.; Aniel-Quiroga, I.; Aguirre, I.; Alvarez, J. A.; Gavidia, F.; Jaimes, I.; Larreynaga, J. A.

    2012-04-01

    Tsunamis are relatively infrequent phenomena representing a greater threat than earthquakes, hurricanes and tornadoes, causing the loss of thousands of human lives and extensive damage to coastal infrastructure around the world. Several works have attempted to study these phenomena in order to understand their origin, causes, evolution, consequences, and magnitude of their damages, to finally propose mechanisms to protect coastal societies. Advances in the understanding and prediction of tsunami impacts allow the development of adaptation and mitigation strategies to reduce risk on coastal areas. This work -Tsunami Hazard and Risk Assessment in El Salvador-, funded by AECID during the period 2009-12, examines the state of the art and presents a comprehensive methodology for assessing the risk of tsunamis at any coastal area worldwide and applying it to the coast of El Salvador. The conceptual framework is based on the definition of Risk as the probability of harmful consequences or expected losses resulting from a given hazard to a given element at danger or peril, over a specified time period (European Commission, Schneiderbauer et al., 2004). The HAZARD assessment (Phase I of the project) is based on propagation models for earthquake-generated tsunamis, developed through the characterization of tsunamigenic sources -sismotectonic faults- and other dynamics under study -tsunami waves, sea level, etc.-. The study area is located in a high seismic activity area and has been hit by 11 tsunamis between 1859 and 1997, nine of them recorded in the twentieth century and all generated by earthquakes. Simulations of historical and potential tsunamis with greater or lesser affection to the country's coast have been performed, including distant sources, intermediate and close. Deterministic analyses of the threats under study -coastal flooding- have been carried out, resulting in different hazard maps (maximum wave height elevation, maximum water depth, minimum tsunami

  11. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  12. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  13. Precision Landing and Hazard Avoidance Doman

    NASA Technical Reports Server (NTRS)

    Robertson, Edward A.; Carson, John M., III

    2016-01-01

    The Precision Landing and Hazard Avoidance (PL&HA) domain addresses the development, integration, testing, and spaceflight infusion of sensing, processing, and GN&C functions critical to the success and safety of future human and robotic exploration missions. PL&HA sensors also have applications to other mission events, such as rendezvous and docking. Autonomous PL&HA builds upon the core GN&C capabilities developed to enable soft, controlled landings on the Moon, Mars, and other solar system bodies. Through the addition of a Terrain Relative Navigation (TRN) function, precision landing within tens of meters of a map-based target is possible. The addition of a 3-D terrain mapping lidar sensor improves the probability of a safe landing via autonomous, real-time Hazard Detection and Avoidance (HDA). PL&HA significantly improves the probability of mission success and enhances access to sites of scientific interest located in challenging terrain. PL&HA can also utilize external navigation aids, such as navigation satellites and surface beacons. Advanced Lidar Sensors High precision ranging, velocimetry, and 3-D terrain mapping Terrain Relative Navigation (TRN) TRN compares onboard reconnaissance data with real-time terrain imaging data to update the S/C position estimate Hazard Detection and Avoidance (HDA) Generates a high-resolution, 3-D terrain map in real-time during the approach trajectory to identify safe landing targets Inertial Navigation During Terminal Descent High precision surface relative sensors enable accurate inertial navigation during terminal descent and a tightly controlled touchdown within meters of the selected safe landing target.

  14. Attention Bias Modification (ABM): Review of Effects of Multisession ABM Training on Anxiety and Threat-Related Attention in High-Anxious Individuals

    PubMed Central

    Mogg, Karin; Waters, Allison M.; Bradley, Brendan P.

    2017-01-01

    Attention bias modification (ABM) aims to reduce anxiety by reducing attention bias (AB) to threat; however, effects on anxiety and AB are variable. This review examines 34 studies assessing effects of multisession-ABM on both anxiety and AB in high-anxious individuals. Methods include ABM-threat-avoidance (promoting attention-orienting away from threat), ABM-positive-search (promoting explicit, goal-directed attention-search for positive/nonthreat targets among negative/threat distractors), and comparison conditions (e.g., control-attention training combining threat-cue exposure and attention-task practice without AB-modification). Findings indicate anxiety reduction often occurs during both ABM-threat-avoidance and control-attention training; anxiety reduction is not consistently accompanied by AB reduction; anxious individuals often show no pretraining AB in orienting toward threat; and ABM-positive-search training appears promising in reducing anxiety. Methodological and theoretical issues are discussed concerning ABM paradigms, comparison conditions, and AB assessment. ABM methods combining explicit goal-directed attention-search for nonthreat/positive information and effortful threat-distractor inhibition (promoting top-down cognitive control during threat-cue exposure) warrant further evaluation. PMID:28752017

  15. Seismic survey probes urban earthquake hazards in Pacific Northwest

    USGS Publications Warehouse

    Fisher, M.A.; Brocher, T.M.; Hyndman, R.D.; Trehu, A.M.; Weaver, C.S.; Creager, K.C.; Crosson, R.S.; Parsons, T.; Cooper, A. K.; Mosher, D.; Spence, G.; Zelt, B.C.; Hammer, P.T.; Childs, J. R.; Cochrane, G.R.; Chopra, S.; Walia, R.

    1999-01-01

    A multidisciplinary seismic survey earlier this year in the Pacific Northwest is expected to reveal much new information about the earthquake threat to U.S. and Canadian urban areas there. A disastrous earthquake is a very real possibility in the region. The survey, known as the Seismic Hazards Investigation in Puget Sound (SHIPS), engendered close cooperation among geologists, biologists, environmental groups, and government agencies. It also succeeded in striking a fine balance between the need to prepare for a great earthquake and the requirement to protect a coveted marine environment while operating a large airgun array.

  16. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically andmore » religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.« less

  17. Threat-detection in child development: an evolutionary perspective.

    PubMed

    Boyer, Pascal; Bergstrom, Brian

    2011-03-01

    Evidence for developmental aspects of fear-targets and anxiety suggests a complex but stable pattern whereby specific kinds of fears emerge at different periods of development. This developmental schedule seems appropriate to dangers encountered repeatedly during human evolution. Also consistent with evolutionary perspective, the threat-detection systems are domain-specific, comprising different kinds of cues to do with predation, intraspecific violence, contamination-contagion and status loss. Proper evolutionary models may also be relevant to outstanding issues in the domain, notably the connections between typical development and pathology. Copyright © 2010 Elsevier Ltd. All rights reserved.

  18. Volcanic hazards and public response

    NASA Astrophysics Data System (ADS)

    Peterson, Donald W.

    1988-05-01

    Although scientific understanding of volcanoes is advancing, eruptions continue to take a substantial toll of life and property. Some of these losses could be reduced by better advance preparation, more effective flow of information between scientists and public officials, and better understanding of volcanic behavior by all segments of the public. The greatest losses generally occur at volcanoes that erupt infrequently where people are not accustomed to dealing with them. Scientists sometimes tend to feel that the blame for poor decisions in emergency management lies chiefly with officials or journalists because of their failure to understand the threat. However, the underlying problem embraces a set of more complex issues comprising three pervasive factors. The first factor is the volcano: signals given by restless volcanoes are often ambiguous and difficult to interpret, especially at long-quiescent volcanoes. The second factor is people: people confront hazardous volcanoes in widely divergent ways, and many have difficulty in dealing with the uncertainties inherent in volcanic unrest. The third factor is the scientists: volcanologists correctly place their highest priority on monitoring and hazard assessment, but they sometimes fail to explain clearly their conclusions to responsible officials and the public, which may lead to inadequate public response. Of all groups in society, volcanologists have the clearest understanding of the hazards and vagaries of volcanic activity; they thereby assume an ethical obligation to convey effectively their knowledge to benefit all of society. If society resists, their obligation nevertheless remains. They must use the same ingenuity and creativity in dealing with information for the public that they use in solving scientific problems. When this falls short, even excellent scientific results may be nullified.

  19. Traits, States, and Attentional Gates: Temperament and Threat Relevance as Predictors of Attentional Bias to Social Threat

    PubMed Central

    Helzer, Erik G.; Connor-Smith, Jennifer K.; Reed, Marjorie A.

    2009-01-01

    This study investigated the influence of situational and dispositional factors on attentional biases toward social threat, and the impact of these attentional biases on distress in a sample of adolescents. Results suggest greater biases for personally-relevant threat cues, as individuals reporting high social stress were vigilant to subliminal social threat cues, but not physical threat cues, and those reporting low social stress showed no attentional biases. Individual differences in fearful temperament and attentional control interacted to influence attentional biases, with fearful temperament predicting biases to supraliminal social threat only for individuals with poor attentional control. Multivariate analyses exploring relations between attentional biases for social threat and symptoms of anxiety and depression revealed that attentional biases alone were rarely related to symptoms. However, biases did interact with social stress, fearful temperament, and attentional control to predict distress. Results are discussed in terms of automatic and effortful cognitive mechanisms underlying threat cue processing. PMID:18791905

  20. Explosive and chemical threat detection by surface-enhanced Raman scattering: a review.

    PubMed

    Hakonen, Aron; Andersson, Per Ola; Stenbæk Schmidt, Michael; Rindzevicius, Tomas; Käll, Mikael

    2015-09-17

    Acts of terror and warfare threats are challenging tasks for defense agencies around the world and of growing importance to security conscious policy makers and the general public. Explosives and chemical warfare agents are two of the major concerns in this context, as illustrated by the recent Boston Marathon bombing and nerve gas attacks on civilians in the Middle East. To prevent such tragic disasters, security personnel must be able to find, identify and deactivate the threats at multiple locations and levels. This involves major technical and practical challenges, such as detection of ultra-low quantities of hazardous compounds at remote locations for anti-terror purposes and monitoring of environmental sanitation of dumped or left behind toxic substances and explosives. Surface-enhanced Raman scattering (SERS) is one of todays most interesting and rapidly developing methods for label-free ultrasensitive vibrational "fingerprinting" of a variety of molecular compounds. Performance highlights include attomolar detection of TNT and DNT explosives, a sensitivity that few, if any, other technique can compete with. Moreover, instrumentation needed for SERS analysis are becoming progressively better, smaller and cheaper, and can today be acquired for a retail price close to 10,000 US$. This contribution aims to give a comprehensive overview of SERS as a technique for detection of explosives and chemical threats. We discuss the prospects of SERS becoming a major tool for convenient in-situ threat identification and we summarize existing SERS detection methods and substrates with particular focus on ultra-sensitive real-time detection. General concepts, detection capabilities and perspectives are discussed in order to guide potential users of the technique for homeland security and anti-warfare purposes. Copyright © 2015 Elsevier B.V. All rights reserved.

  1. Asynchronous threat awareness by observer trials using crowd simulation

    NASA Astrophysics Data System (ADS)

    Dunau, Patrick; Huber, Samuel; Stein, Karin U.; Wellig, Peter

    2016-10-01

    The last few years showed that a high risk of asynchronous threats is given in every day life. Especially in large crowds a high probability of asynchronous attacks is evident. High observational abilities to detect threats are desirable. Consequently highly trained security and observation personal is needed. This paper evaluates the effectiveness of a training methodology to enhance performance of observation personnel engaging in a specific target identification task. For this purpose a crowd simulation video is utilized. The study first provides a measurement of the base performance before the training sessions. Furthermore a training procedure will be performed. Base performance will then be compared to the after training performance in order to look for a training effect. A thorough evaluation of both the training sessions as well as the overall performance will be done in this paper. A specific hypotheses based metric is used. Results will be discussed in order to provide guidelines for the design of training for observational tasks.

  2. Planning and preparing for public health threats at airports.

    PubMed

    Martin, Greg; Boland, Mairin

    2018-03-07

    The ever-increasing speed and scope of human mobility by international air travel has led to a global transport network for infectious diseases with the potential to introduce pathogens into non-endemic areas, and to facilitate rapid spread of novel or mutated zoonotic agents.Robust national emergency preparedness is vital to mitigate the transmission of infectious diseases agents domestically and to prevent onward spread to other countries. Given the complex range of stakeholders who respond to an infectious disease threat being transmitted through air travel, it is important that protocols be tested and practised extensively in advance of a real emergency. Simulation exercises include the identification of possible scenarios based on the probability of hazards and the vulnerability of populations as a basis for planning, and provide a useful measure of preparedness efforts and capabilities.In October 2016, a live simulation exercise was conducted at a major airport in Ireland incorporating a public health threat for the first time, with the notification of a possible case of MERS-CoV aboard an aircraft plus an undercarriage fire. Strengths of the response to the communicable disease threat included appropriate public health risk assessment, case management, passenger information gathering, notification to relevant parties, and communication to passengers and multiple agencies.Lessons learned include:o Exercise planning should not be overly ambitious. In testing too many facets of emergency response, the public health response could be deprioritised.o The practical implementation of communication protocols in a real-time exercise of this scope proved challenging. These protocols should continue to be checked and tested by desk-top exercises to ensure that all staff concerned are familiar with them, especially in the context of staff turn-over.o The roles and responsibilities of the various agencies must be clear to avoid role confusion.o Equipment and

  3. Patient safety room of horrors: a novel method to assess medical students and entering residents' ability to identify hazards of hospitalisation.

    PubMed

    Farnan, Jeanne M; Gaffney, Sean; Poston, Jason T; Slawinski, Kris; Cappaert, Melissa; Kamin, Barry; Arora, Vineet M

    2016-03-01

    Patient safety curricula in undergraduate medical education (UME) are often didactic format with little focus on skills training. Despite recent focus on safety, practical training in residency education is also lacking. Assessments of safety skills in UME and graduate medical education (GME) are generally knowledge, and not application-focused. We aimed to develop and pilot a safety-focused simulation with medical students and interns to assess knowledge regarding hazards of hospitalisation. A simulation demonstrating common hospital-based safety threats was designed. A case scenario was created including salient patient information and simulated safety threats such as the use of upper-extremity restraints and medication errors. After entering the room and reviewing the mock chart, learners were timed and asked to identify and document as many safety hazards as possible. Learner satisfaction was assessed using constructed-response evaluation. Descriptive statistics, including per cent correct and mean correct hazards, were performed. All 86 third-year medical students completed the encounter. Some hazards were identified by a majority of students (fall risk, 83% of students) while others were rarely identified (absence of deep venous thrombosis prophylaxis, 13% of students). Only 5% of students correctly identified pressure ulcer risk. 128 of 131 interns representing 49 medical schools participated in the GME implementation. Incoming interns were able to identify a mean of 5.1 hazards out of the 9 displayed (SD 1.4) with 40% identifying restraints as a hazard, and 20% identifying the inappropriate urinary catheter as a hazard. A simulation showcasing safety hazards was a feasible and effective way to introduce trainees to safety-focused content. Both students and interns had difficulty identifying common hazards of hospitalisation. Despite poor performance, learners appreciated the interactive experience and its clinical utility. Published by the BMJ Publishing

  4. Hazard index calculation for 31 May 1984 microburst at Erie, Colorado

    NASA Technical Reports Server (NTRS)

    Kropfli, R. A.

    1988-01-01

    Two x-band Doppler radars, operated by NOAA, were used to collect high resolution data within a small, benign looking microburst during the PHOENIX II boundary layer experiment. The lowest 2.5 km of the microbursts was observed throughout its development and dissipation over a 15 minute period. These observations presented an excellent opportunity to compute a quantitative threat to a hypothetical aircraft whose flight track would carry it through the microburst. The hazard index is based on the kinetic energy loss to the aircraft that would be produced by the microburst; it is a function of the vertical air motion, horizontal spatial derivatives of the wind field, and the assumed aircraft air speed and direction. Indices were computed and plotted for all 8 volume scans and peak values were observed to be sufficiently high to present a significant hazard to an aircraft.

  5. Orbital Debris: the Growing Threat to Space Operations

    NASA Technical Reports Server (NTRS)

    Johnson, Nicholas L.

    2010-01-01

    For nearly 50 years the amount of man-made debris in Earth orbit steadily grew, accounting for about 95% of all cataloged space objects over the past few decades. The Chinese anti-satellite test in January 2007 and the accidental collision of two spacecraft in February 2009 created more than 4000 new cataloged debris, representing an increase of 40% of the official U.S. Satellite Catalog. The frequency of collision avoidance maneuvers for both human space flight and robotic operations is increasing along with the orbital debris population. However, the principal threat to space operations is driven by the smaller and much more numerous uncataloged debris. Although the U.S. and the international aerospace communities have made significant progress in recognizing the hazards of orbital debris and in reducing or eliminating the potential for the creation of new debris, the future environment is expected to worsen without additional corrective measures.

  6. Developmental changes in threat and self-blame for preschoolers exposed to intimate partner violence (IPV).

    PubMed

    Miller, Laura E; Howell, Kathryn H; Graham-Bermann, Sandra A

    2014-06-01

    The presence of threat and self-blame in children exposed to violence in the home has been linked to a number of negative behavioral and emotional consequences across developmental periods. Little research, however, has examined self-reported attributions of threat and self-blame in children under the age of 6. The current study evaluated the developmental trajectories of appraisals of threat and self-blame in preschool-aged children recently exposed to intimate partner violence. It was hypothesized that (a) children's appraisals of threat and self-blame would naturally decrease over time and (b) there would be a main effect of child sex on appraisals of self-blame but not threat, such that girls would report higher levels of self-blame than boys. Participants included 68 preschool-aged children (ages 4-6) who were interviewed at two time points over the course of 1 year. Multilevel modeling was employed to examine the effects of violence exposure, child age, and child sex over time. Children's attributions of threat were stable over the course of 1 year, but greater child age was related to lower appraisals of threat. Children's appraisals of self-blame increased over time, and there was a trend for girls to report more self-blame than did boys. It appears that without intervention, young children may be at risk of developing relatively stable maladaptive cognitive patterns, thereby heightening their risk of subsequent developmental psychopathology. Furthermore, girls may need additional intervention targeted at addressing attributions of self-blame.

  7. Exploration of resilience assessments for natural hazards

    NASA Astrophysics Data System (ADS)

    Lo Jacomo, Anna; Han, Dawei; Champneys, Alan

    2017-04-01

    measures of resilience are hazard dependent, and require hazard information. In those cases, the type of hazard information required varies from long term information such as the general probability of occurrence of a particular hazard, to short term information such as the observed damage following a specific earthquake occurrence. The required information also varies from national scale, such as census data, to local scale, such as stakeholder perceptions of a threat. This is shown through examples of resilience assessments, along with a discussion of their ability to inform decision making.

  8. Insider Threat: Preventing Direct Action Attacks Within the United States Army

    DTIC Science & Technology

    2017-06-09

    violence within the United States, this study focused solely on cases where a US Army Soldier attacked fellow Soldiers. For the purposes of this study ...chapters will examine Army doctrine and two case studies , in detail. The conclusion of this project will provide recommendations on improved... study specifically on insider threats pertaining to targeted violence, this literature review does not include information pertaining to cases

  9. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  10. Oregon Hazard Explorer for Lifelines Program (OHELP): A web-based geographic information system tool for assessing potential Cascadia earthquake hazard

    NASA Astrophysics Data System (ADS)

    Sharifi Mood, M.; Olsen, M. J.; Gillins, D. T.; Javadnejad, F.

    2016-12-01

    The Cascadia Subduction Zone (CSZ) has the ability to generate earthquake as powerful as 9 moment magnitude creating great amount of damage to structures and facilities in Oregon. Series of deterministic earthquake analysis are performed for M9.0, M8.7, M8.4 and M8.1 presenting persistent, long lasting shaking associated with other geological threats such as ground shaking, landslides, liquefaction-induced ground deformations, fault rupture vertical displacement, tsunamis, etc. These ground deformation endangers urban structures, foundations, bridges, roadways, pipelines and other lifelines. Lifeline providers in Oregon, including private and public practices responsible for transportation, electric and gas utilities, water and wastewater, fuel, airports, and harbors face an aging infrastructure that was built prior to a full understanding of this extreme seismic risk. As recently experienced in Chile and Japan, a three to five minutes long earthquake scenario, expected in Oregon, necessities a whole different method of risk mitigation for these major lifelines than those created for shorter shakings from crustal earthquakes. A web-based geographic information system tool is developed to fully assess the potential hazard from the multiple threats impending from Cascadia subduction zone earthquakes in the region. The purpose of this website is to provide easy access to the latest and best available hazard information over the web, including work completed in the recent Oregon Resilience Plan (ORP) (OSSPAC, 2013) and other work completed by the Department of Geology and Mineral Industries (DOGAMI) and the United States Geological Survey (USGS). As a result, this tool is designated for engineers, planners, geologists, and others who need this information to help make appropriate decisions despite the fact that this web-GIS tool only needs minimal knowledge of GIS to work with.

  11. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  12. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    PubMed

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  13. From leaves to landscape: A multiscale approach to assess fire hazard in wildland-urban interface areas.

    PubMed

    Ghermandi, Luciana; Beletzky, Natacha A; de Torres Curth, Mónica I; Oddi, Facundo J

    2016-12-01

    The overlapping zone between urbanization and wildland vegetation, known as the wildland urban interface (WUI), is often at high risk of wildfire. Human activities increase the likelihood of wildfires, which can have disastrous consequences for property and land use, and can pose a serious threat to lives. Fire hazard assessments depend strongly on the spatial scale of analysis. We assessed the fire hazard in a WUI area of a Patagonian city by working at three scales: landscape, community and species. Fire is a complex phenomenon, so we used a large number of variables that correlate a priori with the fire hazard. Consequently, we analyzed environmental variables together with fuel load and leaf flammability variables and integrated all the information in a fire hazard map with four fire hazard categories. The Nothofagus dombeyi forest had the highest fire hazard while grasslands had the lowest. Our work highlights the vulnerability of the wildland-urban interface to fire in this region and our suggested methodology could be applied in other wildland-urban interface areas. Particularly in high hazard areas, our work could help in spatial delimitation policies, urban planning and development of plans for the protection of human lives and assets. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Using Broken Windows Theory as the Backdrop for a Proactive Approach to Threat Identification in Health Care.

    PubMed

    Boquet, Albert J; Cohen, Tara N; Cabrera, Jennifer S; Litzinger, Tracy L; Captain, Kevin A; Fabian, Michael A; Miles, Steven G; Shappell, Scott A

    2016-09-09

    Historically, health care has relied on error management techniques to measure and reduce the occurrence of adverse events. This study proposes an alternative approach for identifying and analyzing hazardous events. Whereas previous research has concentrated on investigating individual flow disruptions, we maintain the industry should focus on threat windows, or the accumulation of these disruptions. This methodology, driven by the broken windows theory, allows us to identify process inefficiencies before they manifest and open the door for the occurrence of errors and adverse events. Medical human factors researchers observed disruptions during 34 trauma cases at a Level II trauma center. Data were collected during resuscitation and imaging and were classified using a human factors taxonomy: Realizing Improved Patient Care Through Human-Centered Operating Room Design for Threat Window Analysis (RIPCHORD-TWA). Of the 576 total disruptions observed, communication issues were the most prevalent (28%), followed by interruptions and coordination issues (24% each). Issues related to layout (16%), usability (5%), and equipment (2%) comprised the remainder of the observations. Disruptions involving communication issues were more prevalent during resuscitation, whereas coordination problems were observed more frequently during imaging. Rather than solely investigating errors and adverse events, we propose conceptualizing the accumulation of disruptions in terms of threat windows as a means to analyze potential threats to the integrity of the trauma care system. This approach allows for the improved identification of system weaknesses or threats, affording us the ability to address these inefficiencies and intervene before errors and adverse events may occur.

  15. Determination of High-Speed Multiple Threat Using Kalman Filter Analysis of Maritime Movement

    DTIC Science & Technology

    2015-06-01

    Ownship, in the blue circle, has destroyed a threat Figure 9. ship, as represented with the red line... destroyed and still arriving when the ship is destroyed ...defenses of a given target. These kinds of attacks are typically used against High Value Assets (HVA), destroyers or larger. While it would be easy

  16. Building a risk-targeted regional seismic hazard model for South-East Asia

    NASA Astrophysics Data System (ADS)

    Woessner, J.; Nyst, M.; Seyhan, E.

    2015-12-01

    The last decade has tragically shown the social and economic vulnerability of countries in South-East Asia to earthquake hazard and risk. While many disaster mitigation programs and initiatives to improve societal earthquake resilience are under way with the focus on saving lives and livelihoods, the risk management sector is challenged to develop appropriate models to cope with the economic consequences and impact on the insurance business. We present the source model and ground motions model components suitable for a South-East Asia earthquake risk model covering Indonesia, Malaysia, the Philippines and Indochine countries. The source model builds upon refined modelling approaches to characterize 1) seismic activity from geologic and geodetic data on crustal faults and 2) along the interface of subduction zones and within the slabs and 3) earthquakes not occurring on mapped fault structures. We elaborate on building a self-consistent rate model for the hazardous crustal fault systems (e.g. Sumatra fault zone, Philippine fault zone) as well as the subduction zones, showcase some characteristics and sensitivities due to existing uncertainties in the rate and hazard space using a well selected suite of ground motion prediction equations. Finally, we analyze the source model by quantifying the contribution by source type (e.g., subduction zone, crustal fault) to typical risk metrics (e.g.,return period losses, average annual loss) and reviewing their relative impact on various lines of businesses.

  17. Buying time: Franchising hazardous and nuclear waste cleanup

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hale, D.R.

    This paper describes a private franchise approach to long-term custodial care, monitoring and eventual cleanup of hazardous and nuclear waste sites. The franchise concept could be applied to Superfund sites, decommissioning commercial reactors and safeguarding their wastes and to Department of Energy sites. Privatization would reduce costs by enforcing efficient operations and capital investments during the containment period, by providing incentives for successful innovation and by sustaining containment until the cleanup`s net benefits exceed its costs. The franchise system would also permit local governments and citizens to demand and pay for more risk reduction than provided by the federal government.more » In principle, they would have the option of taking over site management. The major political drawback of the idea is that it requires society to be explicit about what it is willing to pay for now to protect current and future generations. Hazardous waste sites are enduring legacies of energy development. Abandoned mines, closed refineries, underground storage tanks and nuclear facilities have often become threats to human health and water quality. The policy of the United States government is that such sites should quickly be made nonpolluting and safe for unrestricted use. That is, the policy of the United States is prompt cleanup. Orphaned commercial hazardous waste sites are addressed by the US Environmental Protection Agency`s Superfund program. 17 refs., 2 tabs.« less

  18. Policy guidance on threats to legislative interventions in public health: a realist synthesis.

    PubMed

    Wong, Geoff; Pawson, Ray; Owen, Lesley

    2011-04-10

    Legislation is one of the most powerful weapons for improving population health and is often used by policy and decision makers. Little research exists to guide them as to whether legislation is feasible and/or will succeed. We aimed to produce a coherent and transferable evidence based framework of threats to legislative interventions to assist the decision making process and to test this through the 'case study' of legislation to ban smoking in cars carrying children. We conceptualised legislative interventions as a complex social interventions and so used the realist synthesis method to systematically review the literature for evidence. 99 articles were found through searches on five electronic databases (MEDLINE, HMIC, EMBASE, PsychINFO, Social Policy and Practice) and iterative purposive searching. Our initial searches sought any studies that contained information on smoking in vehicles carrying children. Throughout the review we continued where needed to search for additional studies of any type that would conceptually contribute to helping build and/or test our framework. Our framework identified a series of transferable threats to public health legislation. When applied to smoking bans in vehicles; problem misidentification; public support; opposition; and enforcement issues were particularly prominent threats. Our framework enabled us to understand and explain the nature of each threat and to infer the most likely outcome if such legislation were to be proposed in a jurisdiction where no such ban existed. Specifically, the micro-environment of a vehicle can contain highly hazardous levels of second hand smoke. Public support for such legislation is high amongst smokers and non-smokers and their underlying motivations were very similar - wanting to practice the Millian principle of protecting children from harm. Evidence indicated that the tobacco industry was not likely to oppose legislation and arguments that such a law would be 'unenforceable' were

  19. Autobiographical memory sources of threats in dreams.

    PubMed

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Eliminating Childhood Lead Poisoning: A Federal Strategy Targeting Lead Paint Hazards.

    ERIC Educational Resources Information Center

    2000

    Noting that lead poisoning is a preventable disease, this report details a coordinated federal program to eliminate childhood lead poisoning in the United States. The report describes how lead poisoning harms children, how pervasive lead poisoning is, and how lead paint hazards in housing could be eliminated in 10 years. Following information on…

  1. The concept of leakage in threat assessment.

    PubMed

    Meloy, J Reid; O'Toole, Mary Ellen

    2011-01-01

    Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings. Copyright © 2011 John Wiley & Sons, Ltd.

  2. Exaggerated neurobiological sensitivity to threat as a mechanism linking anxiety with increased risk for diseases of aging

    PubMed Central

    O’Donovan, Aoife; Slavich, George M; Epel, Elissa S.; Neylan, Thomas C

    2015-01-01

    Anxiety disorders increase risk for the early development of several diseases of aging. Elevated inflammation, a common risk factor across diseases of aging, may play a key role in the relationship between anxiety and physical disease. However, the neurobiological mechanisms linking anxiety with elevated inflammation remain unclear. In this review, we present a neurobiological model of the mechanisms by which anxiety promotes inflammation. Specifically we propose that exaggerated neurobiological sensitivity to threat in anxious individuals may lead to sustained threat perception, which is accompanied by prolonged activation of threat-related neural circuitry and threat-responsive biological systems including the hypothalamic-pituitary-adrenal (HPA) axis, autonomic nervous system (ANS), and inflammatory response. Over time, this pattern of responding can promote chronic inflammation through structural and functional brain changes, altered sensitivity of immune cell receptors, dysregulation of the HPA axis and ANS, and accelerated cellular aging. Chronic inflammation, in turn, increases risk for diseases of aging. Exaggerated neurobiological sensitivity to threat may thus be a treatment target for reducing disease risk in anxious individuals. PMID:23127296

  3. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to this subpart must ensure that each of the following undergoes a security threat assessment or a comparable...

  4. Layoffs and tradeoffs: production, quality, and safety demands under the threat of job loss.

    PubMed

    Probst, Tahira M

    2002-07-01

    Employees often face a conflict between production targets, quality assurance, and adherence to safety policies. In a time when layoffs are on the rise, it is important to understand the effects of employee job insecurity on these potentially competing demands. A laboratory experiment manipulated the threat of layoffs in a simulated organization and assessed its effect on employee productivity, product quality, and adherence to safety policies. Results suggest that student participants faced with the threat of layoffs were more productive, yet violated more safety rules and produced lower quality outputs, than participants in the control condition. Implications for organizations contemplating layoffs and directions for future research are discussed.

  5. Conditioned social dominance threat: observation of others’ social dominance biases threat learning

    PubMed Central

    Molapour, Tanaz; Olsson, Andreas

    2016-01-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants’ eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. PMID:27217107

  6. A standard lexicon for biodiversity conservation: unified classifications of threats and actions.

    PubMed

    Salafsky, Nick; Salzer, Daniel; Stattersfield, Alison J; Hilton-Taylor, Craig; Neugarten, Rachel; Butchart, Stuart H M; Collen, Ben; Cox, Neil; Master, Lawrence L; O'Connor, Sheila; Wilkie, David

    2008-08-01

    An essential foundation of any science is a standard lexicon. Any given conservation project can be described in terms of the biodiversity targets, direct threats, contributing factors at the project site, and the conservation actions that the project team is employing to change the situation. These common elements can be linked in a causal chain, which represents a theory of change about how the conservation actions are intended to bring about desired project outcomes. If project teams want to describe and share their work and learn from one another, they need a standard and precise lexicon to specifically describe each node along this chain. To date, there have been several independent efforts to develop standard classifications for the direct threats that affect biodiversity and the conservation actions required to counteract these threats. Recognizing that it is far more effective to have only one accepted global scheme, we merged these separate efforts into unified classifications of threats and actions, which we present here. Each classification is a hierarchical listing of terms and associated definitions. The classifications are comprehensive and exclusive at the upper levels of the hierarchy, expandable at the lower levels, and simple, consistent, and scalable at all levels. We tested these classifications by applying them post hoc to 1191 threatened bird species and 737 conservation projects. Almost all threats and actions could be assigned to the new classification systems, save for some cases lacking detailed information. Furthermore, the new classification systems provided an improved way of analyzing and comparing information across projects when compared with earlier systems. We believe that widespread adoption of these classifications will help practitioners more systematically identify threats and appropriate actions, managers to more efficiently set priorities and allocate resources, and most important, facilitate cross-project learning and the

  7. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  8. Attention bias for social threat in youth with tic disorders: Links with tic severity and social anxiety.

    PubMed

    Pile, Victoria; Robinson, Sally; Topor, Marta; Hedderly, Tammy; Lau, Jennifer Y F

    2018-06-07

    Many individuals with Tourette syndrome and chronic tic disorders (TS/CTDs) report poor social functioning and comorbid social anxiety. Yet limited research has investigated the role of cognitive factors that highlight social threats in youth with TS/CTD, and whether these biases underlie tic severity and co-occurring social anxiety. This study examined whether selective attention to social threat is enhanced young people with TS/CTDs compared to healthy controls, and whether attention biases are associated with tic severity and social anxiety. Twenty seven young people with TS/CTDs and 25 matched control participants completed an experimental measure of attention bias toward/away from threat stimuli. A clinician-rated interview measuring tic severity/impairment (YGTSS Total Score) and questionnaire measures of social anxiety were completed by participants and their parents. Young people with TS/CTD showed an attention bias to social threat words (relative to benign words) compared to controls but no such bias for social threat faces. Attention bias for social threat words was associated with increasing YGTSS Total Score and parent-reported social anxiety in the TS/CTDs group. Mediation analysis revealed a significant indirect path between YGTSS Total Score and social anxiety, via attention to social threat. Tentatively, these associations appeared to be driven by impairment rather than tic severity scores. Preliminary data suggests that youth with TS/CTD have enhanced attention to threat, compared to controls, and this is associated with impairment and social anxiety. Attention to threat could offer a cognitive mechanism connecting impairment and social anxiety, and so be a valuable trans-diagnostic treatment target.

  9. Flood hazards in the Seattle-Tacoma urban complex and adjacent areas, Washington

    USGS Publications Warehouse

    Foxworthy, B.L.; Nassar, E.G.

    1975-01-01

    Floods are natural hazards that have complicated man's land-use planning for as long as we have had a history. Although flood hzards are a continuing danger, the year-to-year threat cannot be accurately predicted. Also, on any one stream, the time since the last destructive flood might be so long that most people now living near the stream have not experienced such a flood. Because of the unpredictability and common infrequency of disastrous flooding, or out of ignorance about the danger, or perhaps because of an urge to gamble, man tends to focus his attention on only the advantages of the flood-prone areas, rather than the risk due to the occasional major flood. The purposes of this report are to: (1) briefly describe flood hazards in this region, including some that may be unique to the Puget Sound basin, (2) indicate the parts of the area for which flood-hazard data are available, and (3) list the main sources of hydrologic information that is useful for flood-hazard analysis in conjuction with long-range planning. This map-type report is one of a series being prepared by the U.S. Geological Survey to present basic environmental information and interpretations to assist land-use planning in the Puget Sound region.

  10. Postural threat influences vestibular-evoked muscular responses.

    PubMed

    Lim, Shannon B; Cleworth, Taylor W; Horslen, Brian C; Blouin, Jean-Sébastien; Inglis, J Timothy; Carpenter, Mark G

    2017-02-01

    Standing balance is significantly influenced by postural threat. While this effect has been well established, the underlying mechanisms of the effect are less understood. The involvement of the vestibular system is under current debate, and recent studies that investigated the effects of height-induced postural threat on vestibular-evoked responses provide conflicting results based on kinetic (Horslen BC, Dakin CJ, Inglis JT, Blouin JS, Carpenter MG. J Physiol 592: 3671-3685, 2014) and kinematic (Osler CJ, Tersteeg MC, Reynolds RF, Loram ID. Eur J Neurosci 38: 3239-3247, 2013) data. We examined the effect of threat of perturbation, a different form of postural threat, on coupling (cross-correlation, coherence, and gain) of the vestibulo-muscular relationship in 25 participants who maintained standing balance. In the "No-Threat" conditions, participants stood quietly on a stable surface. In the "Threat" condition, participants' balance was threatened with unpredictable mediolateral support surface tilts. Quiet standing immediately before the surface tilts was compared to an equivalent time from the No-Threat conditions. Surface EMG was recorded from bilateral trunk, hip, and leg muscles. Hip and leg muscles exhibited significant increases in peak cross-correlation amplitudes, coherence, and gain (1.23-2.66×) in the Threat condition compared with No-Threat conditions, and significant correlations were observed between threat-related changes in physiological arousal and medium-latency peak cross-correlation amplitude in medial gastrocnemius (r = 0.408) muscles. These findings show a clear threat effect on vestibular-evoked responses in muscles in the lower body, with less robust effects of threat on trunk muscles. Combined with previous work, the present results can provide insight into observed changes during balance control in threatening situations. This is the first study to show increases in vestibular-evoked responses of the lower body muscles under conditions

  11. Tracking Temporal Hazard in the Human Electroencephalogram Using a Forward Encoding Model

    PubMed Central

    2018-01-01

    Abstract Human observers automatically extract temporal contingencies from the environment and predict the onset of future events. Temporal predictions are modeled by the hazard function, which describes the instantaneous probability for an event to occur given it has not occurred yet. Here, we tackle the question of whether and how the human brain tracks continuous temporal hazard on a moment-to-moment basis, and how flexibly it adjusts to strictly implicit variations in the hazard function. We applied an encoding-model approach to human electroencephalographic data recorded during a pitch-discrimination task, in which we implicitly manipulated temporal predictability of the target tones by varying the interval between cue and target tone (i.e. the foreperiod). Critically, temporal predictability either was driven solely by the passage of time (resulting in a monotonic hazard function) or was modulated to increase at intermediate foreperiods (resulting in a modulated hazard function with a peak at the intermediate foreperiod). Forward-encoding models trained to predict the recorded EEG signal from different temporal hazard functions were able to distinguish between experimental conditions, showing that implicit variations of temporal hazard bear tractable signatures in the human electroencephalogram. Notably, this tracking signal was reconstructed best from the supplementary motor area, underlining this area’s link to cognitive processing of time. Our results underline the relevance of temporal hazard to cognitive processing and show that the predictive accuracy of the encoding-model approach can be utilized to track abstract time-resolved stimuli. PMID:29740594

  12. 40 CFR 156.85 - Non-target organisms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Non-target organisms. 156.85 Section 156.85 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS... Non-target organisms. (a) Requirement. Where a hazard exists to non-target organisms, EPA may require...

  13. 40 CFR 156.85 - Non-target organisms.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Non-target organisms. 156.85 Section 156.85 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS... Non-target organisms. (a) Requirement. Where a hazard exists to non-target organisms, EPA may require...

  14. Defending Planet Earth: Near-Earth Object Surveys and Hazard Mitigation Strategies

    NASA Technical Reports Server (NTRS)

    2010-01-01

    The United States spends approximately four million dollars each year searching for near-Earth objects (NEOs). The objective is to detect those that may collide with Earth. The majority of this funding supports the operation of several observatories that scan the sky searching for NEOs. This, however, is insufficient in detecting the majority of NEOs that may present a tangible threat to humanity. A significantly smaller amount of funding supports ways to protect the Earth from such a potential collision or "mitigation." In 2005, a Congressional mandate called for NASA to detect 90 percent of NEOs with diameters of 140 meters of greater by 2020. Defending Planet Earth: Near-Earth Object Surveys and Hazard Mitigation Strategies identifies the need for detection of objects as small as 30 to 50 meters as these can be highly destructive. The book explores four main types of mitigation including civil defense, "slow push" or "pull" methods, kinetic impactors and nuclear explosions. It also asserts that responding effectively to hazards posed by NEOs requires national and international cooperation. Defending Planet Earth: Near-Earth Object Surveys and Hazard Mitigation Strategies is a useful guide for scientists, astronomers, policy makers and engineers.

  15. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  16. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glenn, Colleen; Sterbentz, Dane; Wright, Aaron

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best

  17. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model.

    PubMed

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 ( N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 ( N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 ( N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 ( N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict.

  18. Threats: power, family mealtimes, and social influence.

    PubMed

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  19. Surveillance of Washington OSHA exposure data to identify uncharacterized or emerging occupational health hazards.

    PubMed

    Lofgren, Don J; Reeb-Whitaker, Carolyn K; Adams, Darrin

    2010-07-01

    Chemical substance exposure data from the Washington State Occupational Safety and Health Administration (OSHA) program were reviewed to determine if inspections conducted as a result of a report of a hazard from a complainant or referent may alert the agency to uncharacterized or emerging health hazards. Exposure and other electronically stored data from 6890 health inspection reports conducted between April 2003 and August 2008 were extracted from agency records. A total of 515 (7%) inspections with one or more personal airborne chemical substance samples were identified for further study. Inspections by report of a hazard and by targeting were compared for the following: number of inspections, number and percentage of inspections with workers exposed to substances above an agency's permissible exposure limit, types of industries inspected, and number and type of chemical substances assessed. Report of a hazard inspections documented work sites with worker overexposure at the same rate as agency targeted inspections (approximately 35% of the time), suggesting that complainants and referents are a credible pool of observers capable of directing the agency to airborne chemical substance hazards. Report of a hazard inspections were associated with significantly broader distribution of industries as well as a greater variety of chemical substance exposures than were targeted inspections. Narrative text that described business type and processes inspected was more useful than NAICS codes alone and critical in identifying processes and industries that may be associated with new hazards. Finally, previously identified emerging hazards were found among the report of a hazard data. These findings indicate that surveillance of OSHA inspection data can be a valid tool to identify uncharacterized and emerging health hazards. Additional research is needed to develop criteria for objective review and prioritization of the data for intervention. Federal OSHA and other state

  20. The role of threats in animal cooperation

    PubMed Central

    Cant, Michael A.

    2011-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors—impact, accuracy and perception—that together determine the effectiveness of threats to induce cooperation. PMID:20798110

  1. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    DTIC Science & Technology

    2013-08-01

    potential threats present in this scene and explain the meaning and implications of these threats. You have two minutes to write a response...could be due to the nature of the tasks or to fatigue. Requiring Soldiers to write answers on multiple trials, and across similar tasks, might have...tasks will likely be significantly different from those experienced in the trainer. This would remove the writing requirement over multiple trials

  2. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  3. Insider Threat to Computer Security at Nuclear Facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    West, Rebecca Lynn

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  4. Conditioned social dominance threat: observation of others' social dominance biases threat learning.

    PubMed

    Haaker, Jan; Molapour, Tanaz; Olsson, Andreas

    2016-10-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants' eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  5. Perceptions of Wildfire Threat and Mitigation Measures by Residents of Fire-Prone Communities in the Northeast: Survey Results and Wildland Fire Management Implications

    Treesearch

    Robert L. Ryan; Mark B. Wamsley

    2006-01-01

    We surveyed residents of fire-prone areas of the Central Pine Barrens of Long Island, New York, and the Plymouth Pine Barrens in Massachusetts to learn how they perceived wildland fire risk and management techniques for reducing fire hazard. We found that residents considered the fire threat to their own property to be relatively low in spite of first-hand experience...

  6. Expectancy influences on attention to threat are only weak and transient: Behavioral and physiological evidence.

    PubMed

    Aue, Tatjana; Chauvigné, Léa A S; Bristle, Mirko; Okon-Singer, Hadas; Guex, Raphaël

    2016-12-01

    Can prior expectancies shape attention to threat? To answer this question, we manipulated the expectancies of spider phobics and nonfearful controls regarding the appearance of spider and bird targets in a visual search task. We observed robust evidence for expectancy influences on attention to birds, reflected in error rates, reaction times, pupil diameter, and heart rate (HR). We found no solid effect, however, of the same expectancies on attention to spiders; only HR revealed a weak and transient impact of prior expectancies on the orientation of attention to threat. Moreover, these asymmetric effects for spiders versus birds were observed in both phobics and controls. Our results are thus consistent with the notion of a threat detection mechanism that is only partially permeable to current expectancies, thereby increasing chances of survival in situations that are mistakenly perceived as safe. Copyright © 2016 Elsevier B.V. All rights reserved.

  7. Target Trailing With Safe Navigation for Maritime Autonomous Surface Vehicles

    NASA Technical Reports Server (NTRS)

    Wolf, Michael; Kuwata, Yoshiaki; Zarzhitsky, Dimitri V.

    2013-01-01

    This software implements a motion-planning module for a maritime autonomous surface vehicle (ASV). The module trails a given target while also avoiding static and dynamic surface hazards. When surface hazards are other moving boats, the motion planner must apply International Regulations for Avoiding Collisions at Sea (COLREGS). A key subset of these rules has been implemented in the software. In case contact with the target is lost, the software can receive and follow a "reacquisition route," provided by a complementary system, until the target is reacquired. The programmatic intention is that the trailed target is a submarine, although any mobile naval platform could serve as the target. The algorithmic approach to combining motion with a (possibly moving) goal location, while avoiding local hazards, may be applicable to robotic rovers, automated landing systems, and autonomous airships. The software operates in JPL s CARACaS (Control Architecture for Robotic Agent Command and Sensing) software architecture and relies on other modules for environmental perception data and information on the predicted detectability of the target, as well as the low-level interface to the boat controls.

  8. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    PubMed Central

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  9. Quantifying human response capabilities towards tsunami threats at community level

    NASA Astrophysics Data System (ADS)

    Post, J.; Mück, M.; Zosseder, K.; Wegscheider, S.; Taubenböck, H.; Strunz, G.; Muhari, A.; Anwar, H. Z.; Birkmann, J.; Gebert, N.

    2009-04-01

    Decision makers at the community level need detailed information on tsunami risks in their area. Knowledge on potential hazard impact, exposed elements such as people, critical facilities and lifelines, people's coping capacity and recovery potential are crucial to plan precautionary measures for adaptation and to mitigate potential impacts of tsunamis on society and the environment. A crucial point within a people-centred tsunami risk assessment is to quantify the human response capabilities towards tsunami threats. Based on this quantification and spatial representation in maps tsunami affected and safe areas, difficult-to-evacuate areas, evacuation target points and evacuation routes can be assigned and used as an important contribution to e.g. community level evacuation planning. Major component in the quantification of human response capabilities towards tsunami impacts is the factor time. The human response capabilities depend on the estimated time of arrival (ETA) of a tsunami, the time until technical or natural warning signs (ToNW) can be received, the reaction time (RT) of the population (human understanding of a tsunami warning and the decision to take appropriate action), the evacuation time (ET, time people need to reach a safe area) and the actual available response time (RsT = ETA - ToNW - RT). If RsT is larger than ET, people in the respective areas are able to reach a safe area and rescue themselves. Critical areas possess RsT values equal or even smaller ET and hence people whin these areas will be directly affected by a tsunami. Quantifying the factor time is challenging and an attempt to this is presented here. The ETA can be derived by analyzing pre-computed tsunami scenarios for a respective area. For ToNW we assume that the early warning center is able to fulfil the Indonesian presidential decree to issue a warning within 5 minutes. RT is difficult as here human intrinsic factors as educational level, believe, tsunami knowledge and experience

  10. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    PubMed

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  11. Insular threat associations within taxa worldwide.

    PubMed

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  12. Attitudes toward environmental hazards: Where do toxic wastes fit?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Burger, J.; Cooper, K.; Martin, M.

    1997-10-01

    The public is continually faced with making decisions about the risks associated with environmental hazards, and, along with managers and government officials, must make informed decisions concerning possible regulation, mitigation, and restoration of degraded sites or other environmental threats. We explored the attitudes regarding several environmental hazards of six groups of people: undergraduate science majors, undergraduate nonscience majors, and graduate students in environmental health, in ecological risk assessment, and in nonscience disciplines, as well as nonstudents over 35 yr of age. We had predicted that there would be significant differences in attitudes between science and nonscience majors and as amore » function of age. Relative concerns could be divided into three discrete classes (in descending order of concern): (1) general ecological problems (cutting tropical forests, polluting groundwater, trash along the coasts, lead in drinking water, and acid rain), (2) radon and nuclear wastes, and finally (3) specific nuclear waste facilities, chromium, fertilizers and pesticides, and electromagnetic waves. For any hazard, attitudes were consistent across groups with regard to ranking the severity of the environmental problem and willingness to expend funds to solve the problems. Attitudes about spending money to develop methods to evaluate risk fell in the middle level of concern. There were no major differences among classes of college-age students, or between them and older nonstudents. 26 refs., 3 figs., 2 tabs.« less

  13. Preparing for Euro 2012: developing a hazard risk assessment.

    PubMed

    Wong, Evan G; Razek, Tarek; Luhovy, Artem; Mogilevkina, Irina; Prudnikov, Yuriy; Klimovitskiy, Fedor; Yutovets, Yuriy; Khwaja, Kosar A; Deckelbaum, Dan L

    2015-04-01

    Risk assessment is a vital step in the disaster-preparedness continuum as it is the foundation of subsequent phases, including mitigation, response, and recovery. To develop a risk assessment tool geared specifically towards the Union of European Football Associations (UEFA) Euro 2012. In partnership with the Donetsk National Medical University, Donetsk Research and Development Institute of Traumatology and Orthopedics, Donetsk Regional Public Health Administration, and the Ministry of Emergency of Ukraine, a table-based tool was created, which, based on historical evidence, identifies relevant potential threats, evaluates their impacts and likelihoods on graded scales based on previous available data, identifies potential mitigating shortcomings, and recommends further mitigation measures. This risk assessment tool has been applied in the vulnerability-assessment-phase of the UEFA Euro 2012. Twenty-three sub-types of potential hazards were identified and analyzed. Ten specific hazards were recognized as likely to very likely to occur, including natural disasters, bombing and blast events, road traffic collisions, and disorderly conduct. Preventative measures, such as increased stadium security and zero tolerance for impaired driving, were recommended. Mitigating factors were suggested, including clear, incident-specific preparedness plans and enhanced inter-agency communication. This hazard risk assessment tool is a simple aid in vulnerability assessment, essential for disaster preparedness and response, and may be applied broadly to future international events.

  14. Stakeholder perspectives on land-use strategies for adapting to climate-change-enhanced coastal hazards: Sarasota, Florida

    USGS Publications Warehouse

    Frazier, Tim G.; Wood, Nathan; Yarnal, Brent

    2010-01-01

    Sustainable land-use planning requires decision makers to balance community growth with resilience to natural hazards. This balance is especially difficult in many coastal communities where planners must grapple with significant growth projections, the persistent threat of extreme events (e.g., hurricanes), and climate-change-driven sea level rise that not only presents a chronic hazard but also alters the spatial extent of sudden-onset hazards such as hurricanes. We examine these stressors on coastal, long-term land-use planning by reporting the results of a one-day community workshop held in Sarasota County, Florida that included focus groups and participatory mapping exercises. Workshop participants reflected various political agendas and socioeconomic interests of five local knowledge domains: business, environment, emergency management and infrastructure, government, and planning. Through a series of alternating domain-specific focus groups and interactive plenary sessions, participants compared the county 2050 comprehensive land-use plan to maps of contemporary hurricane storm-surge hazard zones and projected storm-surge hazard zones enlarged by sea level rise scenarios. This interactive, collaborative approach provided each group of domain experts the opportunity to combine geographically-specific, scientific knowledge on natural hazards and climate change with local viewpoints and concerns. Despite different agendas, interests, and proposed adaptation strategies, there was common agreement among participants for the need to increase community resilience to contemporary hurricane storm-surge hazards and to explore adaptation strategies to combat the projected, enlarged storm-surge hazard zones.

  15. Credible threats and promises.

    PubMed

    McNamara, John M; Houston, Alasdair I

    2002-11-29

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest.

  16. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  17. Hazard recognition in mining: A psychological perspective. Information circular/1995

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Perdue, C.W.; Kowalski, K.M.; Barrett, E.A.

    1995-07-01

    This U.S. Bureau of Mines report considers, from a psychological perspective, the perceptual process by which miners recognize and respond to mining hazards. It proposes that if the hazard recognition skills of miners can be improved, mining accidents may be reduced to a significant degree. Prior studies of hazard perception in mining are considered, as are relevant studies from investigations of military target identification, pilot and gunnery officer training, transportation safety, automobile operator behavior, as well as research into sensory functioning and visual information processing. A general model of hazard perception is introduced, and selected concepts from the psychology ofmore » perception that are applicable to the detection of mining hazards are reviewed. Hazard recognition is discussed as a function of the perceptual cues available to the miner as well as the cognitive resources and strategies employed by the miner. The development of expertise in resonding to hazards is related to individual differences in the experience, aptitude, and personality of the worker. Potential applications to miner safety and training are presented.« less

  18. Risk for household safety hazards: Socioeconomic and sociodemographic factors.

    PubMed

    Mayes, Sunnye; Roberts, Michael C; Stough, Cathleen Odar

    2014-12-01

    Many unintentional injuries to young children occur in the home. The current study examines the relation between family socioeconomic and sociodemographic factors and risk factors for home injury. Presence of household hazards was examined in 80 families with toddler-aged children. Parental ability to identify household hazards in pictures was also assessed. ANOVAs and Pearson product-moment correlations examined the relationship between presence of household hazards, knowledge to identify hazards, and factors of yearly family income, parental age, parental education, parental marital status, child ethnicity, and the number of children living in the home. A greater number of hazards were found in the homes of both the lowest and highest income families, but poorer knowledge to identify household hazards was found only among parents of the lowest income families and younger parents. Across family socioeconomic status, parent knowledge of hazards was related to observed household hazards. The relationship between family income and risk for injury is complex, and children of both lower and higher SES families may be at risk for injury. While historically particular focus has been placed on risk for injury among children in low income families, injury prevention efforts should target reducing presence of household hazards in both high and low SES families. Copyright © 2014 National Safety Council and Elsevier Ltd. Published by Elsevier Ltd. All rights reserved.

  19. Environmental and health impacts of fine and ultrafine metallic particles: assessment of threat scores.

    PubMed

    Goix, Sylvaine; Lévêque, Thibaut; Xiong, Tian-Tian; Schreck, Eva; Baeza-Squiban, Armelle; Geret, Florence; Uzu, Gaëlle; Austruy, Annabelle; Dumat, Camille

    2014-08-01

    This study proposes global threat scores to prioritize the harmfulness of anthropogenic fine and ultrafine metallic particles (FMP) emitted into the atmosphere at the global scale. (Eco)toxicity of physicochemically characterized FMP oxides for metals currently observed in the atmosphere (CdO, CuO, PbO, PbSO(4), Sb(2)O(3), and ZnO) was assessed by performing complementary in vitro tests: ecotoxicity, human bioaccessibility, cytotoxicity, and oxidative potential. Using an innovative methodology based on the combination of (eco)toxicity and physicochemical results, the following hazard classification of the particles is proposed: CdCl2~CdO>CuO>PbO>ZnO>PbSO(4)>Sb(2)O(3). Both cadmium compounds exhibited the highest threat score due to their high cytotoxicity and bioaccessible dose, whatever their solubility and speciation, suggesting that cadmium toxicity is due to its chemical form rather than its physical form. In contrast, the Sb(2)O(3) threat score was the lowest due to particles with low specific area and solubility, with no effects except a slight oxidative stress. As FMP physicochemical properties reveal differences in specific area, crystallization systems, dissolution process, and speciation, various mechanisms may influence their biological impact. Finally, this newly developed and global approach could be widely used in various contexts of pollution by complex metal particles and may improve risk management. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. Copyright © 2016 Elsevier Inc. All rights reserved.

  1. Sensors Provide Early Warning of Biological Threats

    NASA Technical Reports Server (NTRS)

    2009-01-01

    Early Warning Inc. of Troy, New York, licensed powerful biosensor technology from Ames Research Center. Incorporating carbon nanotubes tipped with single strands of nucleic acid from waterborne pathogens, the sensor can detect even minute amounts of targeted, disease causing bacteria, viruses, and parasites. Early Warning features the NASA biosensor in its water analyzer, which can provide advance alert of potential biological hazards in water used for agriculture, food and beverages, showers, and at beaches and lakes -- within hours instead of the days required by conventional laboratory methods.

  2. An Innovative Solution to NASA's NEO Impact Threat Mitigation Grand Challenge and Flight Validation Mission Architecture Development

    NASA Technical Reports Server (NTRS)

    Wie, Bong; Barbee, Brent W.

    2015-01-01

    This paper presents the results of a NASA Innovative Advanced Concept (NIAC) Phase 2 study entitled "An Innovative Solution to NASA's Near-Earth Object (NEO) Impact Threat Mitigation Grand Challenge and Flight Validation Mission Architecture Development." This NIAC Phase 2 study was conducted at the Asteroid Deflection Research Center (ADRC) of Iowa State University in 2012-2014. The study objective was to develop an innovative yet practically implementable mitigation strategy for the most probable impact threat of an asteroid or comet with short warning time (< 5 years). The mitigation strategy described in this paper is intended to optimally reduce the severity and catastrophic damage of the NEO impact event, especially when we don't have sufficient warning times for non-disruptive deflection of a hazardous NEO. This paper provides an executive summary of the NIAC Phase 2 study results. Detailed technical descriptions of the study results are provided in a separate final technical report, which can be downloaded from the ADRC website (www.adrc.iastate.edu).

  3. Insider Threat Mitigation Workshop Instructional Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  4. Environmental and health impacts of fine and ultrafine metallic particles: Assessment of threat scores

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goix, Sylvaine; UMR 5245 CNRS-INP-UPS, EcoLab; Lévêque, Thibaut

    2014-08-15

    This study proposes global threat scores to prioritize the harmfulness of anthropogenic fine and ultrafine metallic particles (FMP) emitted into the atmosphere at the global scale. (Eco)toxicity of physicochemically characterized FMP oxides for metals currently observed in the atmosphere (CdO, CuO, PbO, PbSO{sub 4}, Sb{sub 2}O{sub 3}, and ZnO) was assessed by performing complementary in vitro tests: ecotoxicity, human bioaccessibility, cytotoxicity, and oxidative potential. Using an innovative methodology based on the combination of (eco)toxicity and physicochemical results, the following hazard classification of the particles is proposed: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}. Both cadmium compounds exhibited the highest threat score duemore » to their high cytotoxicity and bioaccessible dose, whatever their solubility and speciation, suggesting that cadmium toxicity is due to its chemical form rather than its physical form. In contrast, the Sb{sub 2}O{sub 3} threat score was the lowest due to particles with low specific area and solubility, with no effects except a slight oxidative stress. As FMP physicochemical properties reveal differences in specific area, crystallization systems, dissolution process, and speciation, various mechanisms may influence their biological impact. Finally, this newly developed and global approach could be widely used in various contexts of pollution by complex metal particles and may improve risk management. - Highlights: • Seven micro- and nano- monometallic characterized particles were studied as references. • Bioaccessibility, eco and cytotoxicity, and oxidative potential assays were performed. • According to calculated threat scores: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}.« less

  5. Radiological Hazard of Spallation Products in Accelerator-Driven System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saito, M.; Stankovskii, A.; Artisyuk, V.

    The central issue underlying this paper is related to elucidating the hazard of radioactive spallation products that might be an important factor affecting the design option of accelerator-driven systems (ADSs). Hazard analysis based on the concept of Annual Limit on Intake identifies alpha-emitting isotopes of rare earths (REs) (dysprosium, gadolinium, and samarium) as the dominant contributors to the overall toxicity of traditional (W, Pb, Pb-Bi) targets. The matter is addressed from several points of view: code validation to simulate their yields, choice of material for the neutron producing targets, and challenging the beam type. The paper quantitatively determines the domainmore » in which the toxicity of REs exceeds that of polonium activation products broadly discussed now in connection with advertising lead-bismuth technology for the needs of ADSs.« less

  6. Psychoanalysis and the nuclear threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threatmore » to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.« less

  7. Linking terrestrial and marine conservation planning and threats analysis.

    PubMed

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  8. Architecture Design for the Space Situational Awareness System in the Preparedness Plan for Space Hazards of Republic of Korea

    NASA Astrophysics Data System (ADS)

    Choi, E.; Cho, S.; Shin, S.; Park, J.; Kim, J.; Kim, D.

    The threat posed by asteroids and comets has become one of the important issues. Jinju meteorite discovered in March 2014 has expanded the interest of the people of the fall of the natural space objects. Furthermore, the growing quantity of space debris is a serious threat to satellites and other spacecraft, which risk being damaged or even destroyed. In May of 2014, Korea established the preparedness plan for space hazards according to the space development promotion act which is amended to take action with respect to hazards from space. This plan is largely composed of 3 items such as system, technology and infrastructure. System is included the establishment and management of national space hazards headquarters at risk situation. Korea Astronomy and Space Science Institute (KASI) was designated as a space environment monitoring agency under the ministry of science, ICT and future planning (MSIP). Technology is supposed to develop the space situational awareness system that can monitor and detect space objects. For infrastructure, research and development of core technology will be promoted for capabilities improvement of space hazards preparedness such as software tools, application and data systems. This paper presents the architectural design for building space situational awareness system. The trade-off study of space situational awareness system for the Korea situation was performed. The results have shown the proposed architectural design. The baseline architecture is composed of Integrated Analysis System and Space Objects Monitoring System. Integrated Analysis System collects the status data from Space Objects Monitoring System and analyzes the space risk information through a data processing. For Space Objects Monitoring System, the all-sky surveillance camera, array radar and meteoroid surveillance sensor networks were considered. This system focuses on not only the threat of a large artificial satellite and natural space objects such as asteroids that

  9. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  10. Climate change and natural hazards in the Arctic

    NASA Astrophysics Data System (ADS)

    Eichelberger, J. C.; Eichelberger, L. P.

    2015-12-01

    Climate change is motivating much of the science research in the Arctic. Natural hazards, which have always been with us and can be influenced by climate, also pose a serious threat to sustainability of Arctic communities, the Native cultures they support, and the health and wellbeing of their residents. These are themes of the US Chairship of the Arctic Council. For example, repetitive floods, often associated with spring ice jams, are a particularly severe problem for river communities. People live near rivers because access to food, water and river transportation support an indigenous subsistence lifestyle. Some settlement sites for Indigenous Peoples were mandated by distant authorities without regard to natural hazards, in Alaska no less than in other countries. Thus bad policy of the past casts a long shadow into the future. Remote communities are subject to multiple challenges, including natural hazards, access to education, and limited job opportunities. These intersect to reproduce structural vulnerability and have over time created a need for substantial support from government. In the past 40 years, the themes of "sustainability" and "self reliance" have become prominent strategies for governance at both state and local levels. Communities now struggle to demonstrate their sustainability while grappling with natural hazards and chronic poverty. In the extreme, the shifting of responsibility to resource-poor communities can be called "structural violence". Accepting the status quo can mean living without sanitation and reliable water supply, leading to the high observed rates of disease not normally encountered in developed countries. Many of the efforts to address climate change and natural hazards are complementary: monitoring the environment; forecasting extreme events; and community-based participatory research and planning. Natural disaster response is complementary to the Arctic Council's Search and Rescue (SAR) initiative, differing in that those

  11. Variations in community exposure to lahar hazards from multiple volcanoes in Washington State (USA)

    USGS Publications Warehouse

    Diefenbach, Angela K.; Wood, Nathan J.; Ewert, John W.

    2015-01-01

    Understanding how communities are vulnerable to lahar hazards provides critical input for effective design and implementation of volcano hazard preparedness and mitigation strategies. Past vulnerability assessments have focused largely on hazards posed by a single volcano, even though communities and officials in many parts of the world must plan for and contend with hazards associated with multiple volcanoes. To better understand community vulnerability in regions with multiple volcanic threats, we characterize and compare variations in community exposure to lahar hazards associated with five active volcanoes in Washington State, USA—Mount Baker, Glacier Peak, Mount Rainier, Mount Adams and Mount St. Helens—each having the potential to generate catastrophic lahars that could strike communities tens of kilometers downstream. We use geospatial datasets that represent various population indicators (e.g., land cover, residents, employees, tourists) along with mapped lahar-hazard boundaries at each volcano to determine the distributions of populations within communities that occupy lahar-prone areas. We estimate that Washington lahar-hazard zones collectively contain 191,555 residents, 108,719 employees, 433 public venues that attract visitors, and 354 dependent-care facilities that house individuals that will need assistance to evacuate. We find that population exposure varies considerably across the State both in type (e.g., residential, tourist, employee) and distribution of people (e.g., urban to rural). We develop composite lahar-exposure indices to identify communities most at-risk and communities throughout the State who share common issues of vulnerability to lahar-hazards. We find that although lahars are a regional hazard that will impact communities in different ways there are commonalities in community exposure across multiple volcanoes. Results will aid emergency managers, local officials, and the public in educating at-risk populations and developing

  12. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  13. Assessing fear and anxiety in humans using the threat of predictable and unpredictable aversive events (the NPU-threat test)

    PubMed Central

    Schmitz, Anja; Grillon, Christian

    2012-01-01

    The threat of predictable and unpredictable aversive events was developed to assess short-duration (fear) and long-duration (anxiety) aversive states in humans. A typical experiment consists of three conditions: a safe condition (neutral (N)), during which participants are safe from aversive stimuli, and two threat conditions—one in which aversive events are administered predictably (P) (i.e., signaled by a threat cue), and one in which aversive stimuli are administered unpredictably (U). During the so-called NPU -threat test, ongoing change in aversive states is measured with the startle reflex. The NPU -threat test has been validated in pharmacological and clinical studies and can be implemented in children and adults. Similar procedures have been applied in animal models, making the NPU -threat test an ideal tool for translational research. The procedure is relatively short (35 min), simple to implement and generates consistent results with large effect sizes. PMID:22362158

  14. Policy guidance on threats to legislative interventions in public health: a realist synthesis

    PubMed Central

    2011-01-01

    Background Legislation is one of the most powerful weapons for improving population health and is often used by policy and decision makers. Little research exists to guide them as to whether legislation is feasible and/or will succeed. We aimed to produce a coherent and transferable evidence based framework of threats to legislative interventions to assist the decision making process and to test this through the 'case study' of legislation to ban smoking in cars carrying children. Methods We conceptualised legislative interventions as a complex social interventions and so used the realist synthesis method to systematically review the literature for evidence. 99 articles were found through searches on five electronic databases (MEDLINE, HMIC, EMBASE, PsychINFO, Social Policy and Practice) and iterative purposive searching. Our initial searches sought any studies that contained information on smoking in vehicles carrying children. Throughout the review we continued where needed to search for additional studies of any type that would conceptually contribute to helping build and/or test our framework. Results Our framework identified a series of transferable threats to public health legislation. When applied to smoking bans in vehicles; problem misidentification; public support; opposition; and enforcement issues were particularly prominent threats. Our framework enabled us to understand and explain the nature of each threat and to infer the most likely outcome if such legislation were to be proposed in a jurisdiction where no such ban existed. Specifically, the micro-environment of a vehicle can contain highly hazardous levels of second hand smoke. Public support for such legislation is high amongst smokers and non-smokers and their underlying motivations were very similar - wanting to practice the Millian principle of protecting children from harm. Evidence indicated that the tobacco industry was not likely to oppose legislation and arguments that such a law would be

  15. Stereotype threat can reduce older adults' memory errors.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  16. Threatening the heart and mind of gender stereotypes: Can imagined contact influence the physiology of stereotype threat?

    PubMed

    Allen, Ben; Friedman, Bruce H

    2016-01-01

    Research shows that when a gender stereotype is made salient and the target of the stereotype is asked to perform in the stereotyped domain, targets of the stereotype often perform at a lower level compared to situations when the stereotype was not made salient. The noticeable absence of female faculty and students in math and science departments at coed universities throughout the United States may increase the belief in gender stereotypes and discourage women from pursuing careers in these fields. Contact with counterstereotypical exemplars, such as female science experts, decreases belief in gender stereotypes and increases women's motivation to pursue careers in science. Thus, the present study examined whether imagining an interpersonal interaction with a counterstereotypical exemplar removes the physiological and performance effects of stereotype threat. Subjects were asked to imagine either a nature scene or meeting a female math professor, and were also assigned to either a control or stereotype threat condition. Imagination was used because studies have shown it to be an effective method of simulating interpersonal contact. Subjects were 139 young women (mean age 19 years) recruited from a pool of undergraduates. Results showed that the stereotype threat manipulation elicited greater vagal withdrawal and poorer working memory capacity during the n-back, and that vagal withdrawal was attenuated when the stereotype threat manipulation was preceded by a brief imagined interaction with a counterstereotypical exemplar. This study provides novel evidence that exposure to counterstereotypical exemplars can diminish cardiovascular reactions to salient information about threatening gender stereotypes. © 2015 Society for Psychophysiological Research.

  17. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  18. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  19. The Pedestrian Evacuation Analyst: geographic information systems software for modeling hazard evacuation potential

    USGS Publications Warehouse

    Jones, Jeanne M.; Ng, Peter; Wood, Nathan J.

    2014-01-01

    Recent disasters such as the 2011 Tohoku, Japan, earthquake and tsunami; the 2013 Colorado floods; and the 2014 Oso, Washington, mudslide have raised awareness of catastrophic, sudden-onset hazards that arrive within minutes of the events that trigger them, such as local earthquakes or landslides. Due to the limited amount of time between generation and arrival of sudden-onset hazards, evacuations are typically self-initiated, on foot, and across the landscape (Wood and Schmidtlein, 2012). Although evacuation to naturally occurring high ground may be feasible in some vulnerable communities, evacuation modeling has demonstrated that other communities may require vertical-evacuation structures within a hazard zone, such as berms or buildings, if at-risk individuals are to survive some types of sudden-onset hazards (Wood and Schmidtlein, 2013). Researchers use both static least-cost-distance (LCD) and dynamic agent-based models to assess the pedestrian evacuation potential of vulnerable communities. Although both types of models help to understand the evacuation landscape, LCD models provide a more general overview that is independent of population distributions, which may be difficult to quantify given the dynamic spatial and temporal nature of populations (Wood and Schmidtlein, 2012). Recent LCD efforts related to local tsunami threats have focused on an anisotropic (directionally dependent) path distance modeling approach that incorporates travel directionality, multiple travel speed assumptions, and cost surfaces that reflect variations in slope and land cover (Wood and Schmidtlein, 2012, 2013). The Pedestrian Evacuation Analyst software implements this anisotropic path-distance approach for pedestrian evacuation from sudden-onset hazards, with a particular focus at this time on local tsunami threats. The model estimates evacuation potential based on elevation, direction of movement, land cover, and travel speed and creates a map showing travel times to safety (a

  20. System considerations for detection and tracking of small targets using passive sensors

    NASA Astrophysics Data System (ADS)

    DeBell, David A.

    1991-08-01

    Passive sensors provide only a few discriminants to assist in threat assessment of small targets. Tracking of the small targets provides additional discriminants. This paper discusses the system considerations for tracking small targets using passive sensors, in particular EO sensors. Tracking helps establish good versus bad detections. Discussed are the requirements to be placed on the sensor system's accuracy, with respect to knowledge of the sightline direction. The detection of weak targets sets a requirement for two levels of tracking in order to reduce processor throughput. A system characteristic is the need to track all detections. For low thresholds, this can mean a heavy track burden. Therefore, thresholds must be adaptive in order not to saturate the processors. Second-level tracks must develop a range estimate in order to assess threat. Sensor platform maneuvers are required if the targets are moving. The need for accurate pointing, good stability, and a good update rate will be shown quantitatively, relating to track accuracy and track association.

  1. Toward a Framework for Conducting Ecoregional Threats Assessments

    Treesearch

    Jamison Ervin; Jeffrey Parrish

    2006-01-01

    Assessing threats to biodiversity is widely recognized as a critical step in conservation planning. While there have been recent advances in understanding how to assess threats at a site level, there has been relatively little consensus on how threats can be meaningfully assessed at an ecoregional scale. Drawing from numerous threat assessment studies, this paper...

  2. The virtual-hand illusion: effects of impact and threat on perceived ownership and affective resonance

    PubMed Central

    Ma, Ke; Hommel, Bernhard

    2013-01-01

    The rubber hand illusion refers to the observation that participants perceive “body ownership” for a rubber hand if it moves, or is stroked in synchrony with the participant's real (covered) hand. Research indicates that events targeting artificial body parts can trigger affective responses (affective resonance) only with perceived body ownership, while neuroscientific findings suggest affective resonance irrespective of ownership (e.g., when observing other individuals under threat). We hypothesized that this may depend on the severity of the event. We first replicated previous findings that the rubber hand illusion can be extended to virtual hands—the virtual-hand illusion. We then tested whether hand ownership and affective resonance (assessed by galvanic skin conductance) are modulated by the experience of an event that either “impacted” (a ball hitting the hand) or “threatened” (a knife cutting the hand) the virtual hand. Ownership was stronger if the virtual hand moved synchronously with the participant's own hand, but this effect was independent from whether the hand was impacted or threatened. Affective resonance was mediated by ownership however: In the face of mere impact, participants showed more resonance in the synchronous condition (i.e., with perceived ownership) than in the asynchronous condition. In the face of threat, in turn, affective resonance was independent of synchronicity—participants were emotionally involved even if a threat was targeting a hand that they did not perceive as their own. Our findings suggest that perceived body ownership and affective responses to body-related impact or threat can be dissociated and are thus unlikely to represent the same underlying process. We argue that affective reactions to impact are produced in a top-down fashion if the impacted effector is assumed to be part of one's own body, whereas threatening events trigger affective responses more directly in a bottom-up fashion—irrespective of

  3. Place-classification analysis of community vulnerability to near-field tsunami threats in the U.S. Pacific Northwest

    NASA Astrophysics Data System (ADS)

    Wood, N. J.; Spielman, S.

    2012-12-01

    Near-field tsunami hazards are credible threats to many coastal communities throughout the world. Along the U.S. Pacific Northwest coast, low-lying areas could be inundated by a series of catastrophic tsunamis that begin to arrive in a matter of minutes following a major Cascadia subduction zone (CSZ) earthquake. Previous research has documented the residents, employees, tourists at public venues, customers at local businesses, and vulnerable populations at dependent-care facilities that are in CSZ-related tsunami-prone areas of northern California, Oregon, and the open-ocean coast of Washington. Community inventories of demographic attributes and other characteristics of the at-risk population have helped emergency managers to develop preparedness and outreach efforts. Although useful for distinct risk-reduction issues, these data can be difficult to fully appreciate holistically given the large number of community attributes. This presentation summarizes analytical efforts to classify communities with similar characteristics of community exposure to tsunami hazards. This work builds on past State-focused inventories of community exposure to CSZ-related tsunami hazards in northern California, Oregon, and Washington. Attributes used in the classification, or cluster analysis, fall into several categories, including demography of residents, spatial extent of the developed footprint based on mid-resolution land cover data, distribution of the local workforce, and the number and type of public venues, dependent-care facilities, and community-support businesses. As we were unsure of the number of different types of communities, we used an unsupervised-model-based clustering algorithm and a v-fold, cross-validation procedure (v=50) to identify the appropriate number of community types. Ultimately we selected class solutions that provided the appropriate balance between parsimony and model fit. The goal of the exposure classification is to provide emergency managers with

  4. An Agent-Based Intervention to Assist Drivers Under Stereotype Threat: Effects of In-Vehicle Agents' Attributional Error Feedback.

    PubMed

    Joo, Yeon Kyoung; Lee-Won, Roselyn J

    2016-10-01

    For members of a group negatively stereotyped in a domain, making mistakes can aggravate the influence of stereotype threat because negative stereotypes often blame target individuals and attribute the outcome to their lack of ability. Virtual agents offering real-time error feedback may influence performance under stereotype threat by shaping the performers' attributional perception of errors they commit. We explored this possibility with female drivers, considering the prevalence of the "women-are-bad-drivers" stereotype. Specifically, we investigated how in-vehicle voice agents offering error feedback based on responsibility attribution (internal vs. external) and outcome attribution (ability vs. effort) influence female drivers' performance under stereotype threat. In addressing this question, we conducted an experiment in a virtual driving simulation environment that provided moment-to-moment error feedback messages. Participants performed a challenging driving task and made mistakes preprogrammed to occur. Results showed that the agent's error feedback with outcome attribution moderated the stereotype threat effect on driving performance. Participants under stereotype threat had a smaller number of collisions when the errors were attributed to effort than to ability. In addition, outcome attribution feedback moderated the effect of responsibility attribution on driving performance. Implications of these findings are discussed.

  5. Assessing Local and Surrounding Threats to the Protected Area Network in a Biodiversity Hotspot: The Hengduan Mountains of Southwest China.

    PubMed

    Ye, Xin; Liu, Guohua; Li, Zongshan; Wang, Hao; Zeng, Yuan

    2015-01-01

    Protected areas (PAs) not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitatively assessing local and surrounding threats to different types of PAs with gradient buffers, and to main ecoregions in the Hengduan Mountain Hotspot of southwest China. Our findings show that national protected areas (NPAs) have lower and significantly lower threat values (p<0.05) than provincial protected areas (PPAs) and other protected areas (OPAs), respectively, which indicates that NPAs are lands with a lower threat level and higher levels of protection and management. PAs have clear edge effects, as the proportion of areas with low threat levels decline dramatically in the 5-kilometer buffers just outside the PAs. However, NPAs suffered greater declines (58.3%) than PPAs (34.8%) and OPAs (33.4%) in the 5-kilometer buffers. Moreover, a significant positive correlation was found between the size of PAs and the proportion of areas with low threat levels that they contained in both PAs and PA buffers (p<0.01). To control or mitigate current threats at the regional scale, PA managers often require quantitative information related to threat intensities and spatial distribution. The threat assessment in the Hengduan Mountain Hotspot will be useful to policy makers and managers in their efforts to establish effective plans and target-oriented management strategies.

  6. Assessing Local and Surrounding Threats to the Protected Area Network in a Biodiversity Hotspot: The Hengduan Mountains of Southwest China

    PubMed Central

    Ye, Xin; Liu, Guohua; Li, Zongshan; Wang, Hao; Zeng, Yuan

    2015-01-01

    Protected areas (PAs) not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitatively assessing local and surrounding threats to different types of PAs with gradient buffers, and to main ecoregions in the Hengduan Mountain Hotspot of southwest China. Our findings show that national protected areas (NPAs) have lower and significantly lower threat values (p<0.05) than provincial protected areas (PPAs) and other protected areas (OPAs), respectively, which indicates that NPAs are lands with a lower threat level and higher levels of protection and management. PAs have clear edge effects, as the proportion of areas with low threat levels decline dramatically in the 5-kilometer buffers just outside the PAs. However, NPAs suffered greater declines (58.3%) than PPAs (34.8%) and OPAs (33.4%) in the 5-kilometer buffers. Moreover, a significant positive correlation was found between the size of PAs and the proportion of areas with low threat levels that they contained in both PAs and PA buffers (p<0.01). To control or mitigate current threats at the regional scale, PA managers often require quantitative information related to threat intensities and spatial distribution. The threat assessment in the Hengduan Mountain Hotspot will be useful to policy makers and managers in their efforts to establish effective plans and target-oriented management strategies. PMID:26382763

  7. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  8. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  9. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  10. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  11. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  12. Seaside, Oregon Tsunami Pilot Study - modernization of FEMA flood hazard maps

    USGS Publications Warehouse

    ,

    2006-01-01

    FEMA Flood Insurance Rate Map (FIRM) guidelines do not currently exist for conducting and incorporating tsunami hazard assessments that reflect the substantial advances in tsunami research achieved in the last two decades; this conclusion is the result of two FEMA-sponsored workshops and the associated Tsunami Focused Study. Therefore, as part of FEMA's Map Modernization Program, a Tsunami Pilot Study was carried out in the Seaside/Gearhart, Oregon, area to develop an improved Probabilistic Tsunami Hazard Assessment (PTHA) methodology and to provide recommendations for improved tsunami hazard assessment guidelines. The Seaside area was chosen because it is typical of many coastal communities in the section of the Pacific Coast from Cape Mendocino to the Strait of Juan de Fuca, and because State Agencies and local stakeholders expressed considerable interest in mapping the tsunami threat to this area. The study was an interagency effort by FEMA, U.S. Geological Survey and the National Oceanic and Atmospheric Administration, in collaboration with the University of Southern California, Middle East Technical University. Portland State University, Horning Geosciences, Northwest Hydraulics Consultants, and the Oregon Department of Geological and Mineral Industries. Draft copies and a briefing on the contents, results and recommendations of this document were provided to FEMA officials before final publication.

  13. Stereotype threat affects financial decision making.

    PubMed

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  14. Stereotype threat can reduce older adults' memory errors

    PubMed Central

    Barber, Sarah J.; Mather, Mara

    2014-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment (Seibt & Förster, 2004). Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 & 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well. PMID:24131297

  15. Common IED exploitation target set ontology

    NASA Astrophysics Data System (ADS)

    Russomanno, David J.; Qualls, Joseph; Wowczuk, Zenovy; Franken, Paul; Robinson, William

    2010-04-01

    The Common IED Exploitation Target Set (CIEDETS) ontology provides a comprehensive semantic data model for capturing knowledge about sensors, platforms, missions, environments, and other aspects of systems under test. The ontology also includes representative IEDs; modeled as explosives, camouflage, concealment objects, and other background objects, which comprise an overall threat scene. The ontology is represented using the Web Ontology Language and the SPARQL Protocol and RDF Query Language, which ensures portability of the acquired knowledge base across applications. The resulting knowledge base is a component of the CIEDETS application, which is intended to support the end user sensor test and evaluation community. CIEDETS associates a system under test to a subset of cataloged threats based on the probability that the system will detect the threat. The associations between systems under test, threats, and the detection probabilities are established based on a hybrid reasoning strategy, which applies a combination of heuristics and simplified modeling techniques. Besides supporting the CIEDETS application, which is focused on efficient and consistent system testing, the ontology can be leveraged in a myriad of other applications, including serving as a knowledge source for mission planning tools.

  16. Impact: an Integrated Approach (Space and Ground) for Monitoring the Threat of Earth Orbit Corssing Celestial Bodies

    NASA Astrophysics Data System (ADS)

    Bussolino, L.; Somma, R.

    The threat of possible collision of asteroids and comets with our planet has reached an international stage since 1990 when U.S.A. Congress set up a dedicated committee for the analysis and the assessment of this problem.The U.N. organized a congress later on to summarize the current knowledge on this subject as well as the Europea Council recommended its member states to conduct studies to further deepen the understanding in terms of tackling and solving this kind of problem interesting the entire world. IMPACT is the acronym for " International Monitoring Program for Asteroids and Comets Threats " coming out as proposal from a study funded by the italian region PIEMONTE throughout the Civil Protection Bureau and performed by the Planetology Group of the Astronomical Observatory of Torino ( Italy ) and Alenia Spazio for the engineering part. They have carried out a series of analyses aimed at contributing in subsequent steps to the solution of the two fundamental problems associated to the potential impact threat : the assessment of the numbers of killers/terminators and the impact rates from one side and the development of the idea of considering space segments for supporting activities of discovery as well as the physical and mineralogical characterization using satellites in orbit around the Earth. other additional studies also funded by the European Space Agency where the space technology appears to offer a great contribution if conveniently integrated with the Earth networks for Potentially Hazardous Asteroids ( PHA ) detection. An international approach for monitoring this threat for the Earth is then proposed.

  17. GIS-based probability assessment of natural hazards in forested landscapes of Central and South-Eastern Europe.

    PubMed

    Lorz, C; Fürst, C; Galic, Z; Matijasic, D; Podrazky, V; Potocic, N; Simoncic, P; Strauch, M; Vacik, H; Makeschin, F

    2010-12-01

    We assessed the probability of three major natural hazards--windthrow, drought, and forest fire--for Central and South-Eastern European forests which are major threats for the provision of forest goods and ecosystem services. In addition, we analyzed spatial distribution and implications for a future oriented management of forested landscapes. For estimating the probability of windthrow, we used rooting depth and average wind speed. Probabilities of drought and fire were calculated from climatic and total water balance during growing season. As an approximation to climate change scenarios, we used a simplified approach with a general increase of pET by 20%. Monitoring data from the pan-European forests crown condition program and observed burnt areas and hot spots from the European Forest Fire Information System were used to test the plausibility of probability maps. Regions with high probabilities of natural hazard are identified and management strategies to minimize probability of natural hazards are discussed. We suggest future research should focus on (i) estimating probabilities using process based models (including sensitivity analysis), (ii) defining probability in terms of economic loss, (iii) including biotic hazards, (iv) using more detailed data sets on natural hazards, forest inventories and climate change scenarios, and (v) developing a framework of adaptive risk management.

  18. Multi-Action Planning for Threat Management: A Novel Approach for the Spatial Prioritization of Conservation Actions

    PubMed Central

    Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J.; Linke, Simon

    2015-01-01

    Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms. PMID:26020794

  19. Multi-action planning for threat management: a novel approach for the spatial prioritization of conservation actions.

    PubMed

    Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J; Linke, Simon

    2015-01-01

    Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms.

  20. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  1. Detection of Natural Hazards Generated TEC Perturbations and Related New Applications

    NASA Astrophysics Data System (ADS)

    Komjathy, A.; Yang, Y.; Langley, R. B.

    2013-12-01

    Natural hazards, including earthquakes, volcanic eruptions, and tsunamis, have been significant threats to humans throughout recorded history. The Global Positioning System satellites have become primary sensors to measure signatures associated with such natural hazards. These signatures typically include GPS-derived seismic deformation measurements, co-seismic vertical displacements, and real-time GPS-derived ocean buoy positioning estimates. Another way to use GPS observables is to compute the ionospheric total electron content (TEC) to measure and monitor post-seismic ionospheric disturbances caused by earthquakes, volcanic eruptions, and tsunamis. Research at the University of New Brunswick (UNB) laid the foundations to model the three-dimensional ionosphere at NASA's Jet Propulsion Laboratory by ingesting ground- and space-based GPS measurements into the state-of-the-art Global Assimilative Ionosphere Modeling (GAIM) software. As an outcome of the UNB and NASA research, new and innovative GPS applications have been invented including the use of ionospheric measurements to detect tiny fluctuations in the GPS signals between the spacecraft and GPS receivers caused by natural hazards occurring on or near the Earth's surface. This continuing research is expected to provide early warning for tsunamis, earthquakes, volcanic eruptions, and meteor impacts, for example, using GPS and other global navigation satellite systems. We will demonstrate new and upcoming applications including recent natural hazards and artificial explosions that generated TEC perturbations to perform state-of-the-art imaging and modeling of earthquakes, tsunamis and meteor impacts. By studying the propagation properties of ionospheric perturbations generated by natural hazards along with applying sophisticated first-principles physics-based modeling, we are on track to develop new technologies that can potentially save human lives and minimize property damage.

  2. Preparing our Workforce: Discussing Traditional and Non-Traditional Geoscience Careers - Natural hazard risk

    NASA Astrophysics Data System (ADS)

    Castaldi, A.

    2013-12-01

    Many young people interested in science think that their only professional opportunities lie within academia or in some government sponsored project. The private sector is often dismissed as not providing the opportunities to a natural scientist or at least an opportunity where they can make a difference. The threat of natural disasters and in the rise of economic losses caused by these disasters as well as the potential problems brought about by climate change have opened up a number of opportunities for the natural scientist. The insurance industry and reinsurance industry is one industry looking for natural scientists and structural engineers. The insurance industry's largest singular threat comes from the risks caused by geological or atmospheric hazards. Over the last decade more and more scientists have used their seismological, hydrological, or weather related knowledge to develop new tools and technology to identify and estimate the economic and social impact due to these natural events. The insurance and reinsurance industry were one of the first industries to call attention to the risk posed by climate change. Our goal is to reduce losses and the cost to insure these losses. Our work starts with the hazard. Hazard identification is one of the best methods for reducing loss nevertheless not all areas of the world have the ability to identify these hazards. Swiss Re transforms science into application. As an example most of the world does not have flood maps to help consumers and policymakers decide which locations are highly exposed and which are not. Swiss Re used a decade of learning to develop a global set of flood maps that identifies the 100 year and 500 year flood zones. To an emerging market these maps will add them in their zoning and building considerations. Academia is a noble profession and the work completed within the university walls is the basis for what we do. Nevertheless the private sector has the ability to use this knowledge and apply

  3. Hazardous Waste: Learn the Basics of Hazardous Waste

    MedlinePlus

    ... to set up a framework for the proper management of hazardous waste. Need More Information on Hazardous Waste? The RCRA Orientation Manual provides ... facility management standards, specific provisions governing hazardous waste management units ... information on the final steps in EPA’s hazardous waste ...

  4. Bio-threat preparedness: Need for a paradigm shift.

    PubMed

    Jindal, A K; Roy, Kaushik

    2014-04-01

    India of late has been vulnerable to Chemical, Biological, Radiological and Nuclear (CBRN) threat, on account of its unique geographic position. Biological threat is an imminent threat in the hands of a terrorist. The public health system of our country is overburdened due to its present role and bio-attack response is not a priority area. This paper suggests that as the prime focus is on the CR and N threats in the integrated CBRN preparedness strategy and that specialized and technical forces are needed to deal with a bio-threat; hence there is a need for a paradigm shift in policy. The emerging field of bio-threat needs to be delinked from the joint family of 'CBRN', with consequent structural and functional changes. A separate specialized cadre needs to be formed for dealing with bio-threat, created from the pool of doctors and non-medical scientists from the AFMS and the DRDO. Structural changes are needed in the organization, to bring in the resources of NCDC, New Delhi for enhanced disease surveillance capacity and creation of a bio-threat mitigation node in the AFMC, Pune.

  5. Are Older Adults Perceived as A Threat to Society? Exploring Perceived Age-Based Threats in 29 Nations.

    PubMed

    Ayalon, Liat

    2017-08-05

    The present study adds to the current body of literature by simultaneously examining the public perception of young and old people as posing realistic threats (e.g., to the group's power, resources, and welfare) and symbolic threats (e.g., to one's world view, belief system and values). The fourth wave of the European Social Survey was administered to individuals from 29 countries. Analysis is based on 56,170 individuals, who had data on the four relevant indicators. The study relied on a latent profile analysis to develop a typology of perceived realistic and symbolic threats to society by younger and older adults. A three-profile solution indicated that the perception of older and younger adults as threats to society often co-occurs. Sociodemographic characteristics at the individual-level and the Gini coefficient (e.g., an inequality indicator) at the country-level had differential associations with the profiles identified. The study calls for a more balanced approach which evaluates attitudes toward both younger and older adults as potential sources of threat. Attention should be paid to individual- and national-level characteristics associated with age-based threats (e.g., the perception of a group, defined by its chronological age, as threatening). © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  6. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  7. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  8. Collaborative community hazard exposure mapping: Distant Early Warning radar sites in Alaska's North Slope

    NASA Astrophysics Data System (ADS)

    Brady, M.

    2015-12-01

    A method to produce hazard exposure maps that are developed in collaboration with local coastal communities is the focus of this research. Typically efforts to map community exposure to climate threats over large areas have limited consideration of local perspectives about associated risks, constraining their utility for local management. This problem is especially acute in remote locations such as the Arctic where there are unique vulnerabilities to coastal threats that can be fully understood only through inclusion of community stakeholders. Through collaboration with community members, this study identifies important coastal assets and places and surveys local perspectives of exposure to climate threats along Alaska's vast North Slope coastline spanning multiple municipalities. To model physical exposure, the study adapts the U.S. Geological Survey's (USGS) coastal vulnerability index (CVI) to the Arctic context by incorporating the effects of open water distance determined by sea ice extent, and assigning CVI values to coastal assets and places according to direction and proximity. The study found that in addition to concerns about exposed municipal and industrial assets, North Slope communities viewed exposure of traditional activity sites as presenting a particular risk for communities. Highly exposed legacy Cold War Distant Early Warning Line sites are of particular concern with impacts ranging from financial risk to contamination of sensitive coastal marine environments. This research demonstrates a method to collaboratively map community exposure to coastal climate threats to better understand local risks and produce locally usable exposure maps.

  9. Hazardous sign detection for safety applications in traffic monitoring

    NASA Astrophysics Data System (ADS)

    Benesova, Wanda; Kottman, Michal; Sidla, Oliver

    2012-01-01

    The transportation of hazardous goods in public streets systems can pose severe safety threats in case of accidents. One of the solutions for these problems is an automatic detection and registration of vehicles which are marked with dangerous goods signs. We present a prototype system which can detect a trained set of signs in high resolution images under real-world conditions. This paper compares two different methods for the detection: bag of visual words (BoW) procedure and our approach presented as pairs of visual words with Hough voting. The results of an extended series of experiments are provided in this paper. The experiments show that the size of visual vocabulary is crucial and can significantly affect the recognition success rate. Different code-book sizes have been evaluated for this detection task. The best result of the first method BoW was 67% successfully recognized hazardous signs, whereas the second method proposed in this paper - pairs of visual words and Hough voting - reached 94% of correctly detected signs. The experiments are designed to verify the usability of the two proposed approaches in a real-world scenario.

  10. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    PubMed

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  11. When and Why Threats Go Undetected: Impacts of Event Rate and Shift Length on Threat Detection Accuracy During Airport Baggage Screening.

    PubMed

    Meuter, Renata F I; Lacherez, Philippe F

    2016-03-01

    We aimed to assess the impact of task demands and individual characteristics on threat detection in baggage screeners. Airport security staff work under time constraints to ensure optimal threat detection. Understanding the impact of individual characteristics and task demands on performance is vital to ensure accurate threat detection. We examined threat detection in baggage screeners as a function of event rate (i.e., number of bags per minute) and time on task across 4 months. We measured performance in terms of the accuracy of detection of Fictitious Threat Items (FTIs) randomly superimposed on X-ray images of real passenger bags. Analyses of the percentage of correct FTI identifications (hits) show that longer shifts with high baggage throughput result in worse threat detection. Importantly, these significant performance decrements emerge within the first 10 min of these busy screening shifts only. Longer shift lengths, especially when combined with high baggage throughput, increase the likelihood that threats go undetected. Shorter shift rotations, although perhaps difficult to implement during busy screening periods, would ensure more consistently high vigilance in baggage screeners and, therefore, optimal threat detection and passenger safety. © 2015, Human Factors and Ergonomics Society.

  12. Transportation of Hazardous Materials Emergency Preparedness Hazards Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blanchard, A.

    This report documents the Emergency Preparedness Hazards Assessment (EPHA) for the Transportation of Hazardous Materials (THM) at the Department of Energy (DOE) Savannah River Site (SRS). This hazards assessment is intended to identify and analyze those transportation hazards significant enough to warrant consideration in the SRS Emergency Management Program.

  13. Cognitive control processes in paranoia: the impact of threat induction on strategic cognition and self-focused attention.

    PubMed

    Flower, Laura; Newman-Taylor, Katherine; Stopa, Lusia

    2015-01-01

    Current clinical models emphasize certain cognitive processes in the maintenance of distressing paranoia. While a number of these processes have been examined in detail, the role of strategic cognition and self-focused attention remain under-researched. This study examined the deployment of cognitive strategies and self-focused attention in people with non-clinical paranoia. An experimental design was used to examine the impact of a threat activation task on these processes, in participants with high and low non-clinical paranoia. Twenty-eight people were recruited to each group, and completed measures of anxiety, paranoid cognition, strategic cognition and self-focused attention. The threat activation task was effective in increasing anxiety in people with high and low non-clinical paranoia. The high paranoia group experienced more paranoid cognitions following threat activation. This group also reported greater use of thought suppression, punishment and worry, and less use of social control strategies when under threat. No differences were found between the groups on measures of self-focused attention. This study shows that the threat activation task increased anxiety in people with high non-clinical paranoia, leading to increased paranoid thinking. The use of strategic cognition following threat activation varied dependent on level of non-clinical paranoia. If these differences are replicated in clinical groups, the strategies may be implicated in the maintenance of distressing psychosis, and may therefore be a valuable target for therapeutic intervention.

  14. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  15. Technosocial Modeling of IED Threat Scenarios and Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less

  16. Avoidance temperament and social-evaluative threat in college students' math performance: a mediation model of math and test anxiety.

    PubMed

    Liew, Jeffrey; Lench, Heather C; Kao, Grace; Yeh, Yu-Chen; Kwok, Oi-man

    2014-01-01

    Standardized testing has become a common form of student evaluation with high stakes, and limited research exists on understanding the roles of students' personality traits and social-evaluative threat on their academic performance. This study examined the roles of avoidance temperament (i.e., fear and behavioral inhibition) and evaluative threat (i.e., fear of failure and being viewed as unintelligent) in standardized math test and course grades in college students. Undergraduate students (N=184) from a large public university were assessed on temperamental fear and behavioral inhibition. They were then given 15 minutes to complete a standardized math test. After the test, students provided data on evaluative threat and their math performance (scores on standardized college entrance exam and average grades in college math courses). Results indicate that avoidance temperament was linked to social-evaluative threat and low standardized math test scores. Furthermore, evaluative threat mediated the influence of avoidance temperament on both types of math performance. Results have educational and clinical implications, particularly for students at risk for test anxiety and underperformance. Interventions targeting emotion regulation and stress management skills may help individuals reduce their math and test anxieties.

  17. Hazard function theory for nonstationary natural hazards

    NASA Astrophysics Data System (ADS)

    Read, L.; Vogel, R. M.

    2015-12-01

    Studies from the natural hazards literature indicate that many natural processes, including wind speeds, landslides, wildfires, precipitation, streamflow and earthquakes, show evidence of nonstationary behavior such as trends in magnitudes through time. Traditional probabilistic analysis of natural hazards based on partial duration series (PDS) generally assumes stationarity in the magnitudes and arrivals of events, i.e. that the probability of exceedance is constant through time. Given evidence of trends and the consequent expected growth in devastating impacts from natural hazards across the world, new methods are needed to characterize their probabilistic behavior. The field of hazard function analysis (HFA) is ideally suited to this problem because its primary goal is to describe changes in the exceedance probability of an event over time. HFA is widely used in medicine, manufacturing, actuarial statistics, reliability engineering, economics, and elsewhere. HFA provides a rich theory to relate the natural hazard event series (x) with its failure time series (t), enabling computation of corresponding average return periods and reliabilities associated with nonstationary event series. This work investigates the suitability of HFA to characterize nonstationary natural hazards whose PDS magnitudes are assumed to follow the widely applied Poisson-GP model. We derive a 2-parameter Generalized Pareto hazard model and demonstrate how metrics such as reliability and average return period are impacted by nonstationarity and discuss the implications for planning and design. Our theoretical analysis linking hazard event series x, with corresponding failure time series t, should have application to a wide class of natural hazards.

  18. Hazard function theory for nonstationary natural hazards

    NASA Astrophysics Data System (ADS)

    Read, Laura K.; Vogel, Richard M.

    2016-04-01

    Impact from natural hazards is a shared global problem that causes tremendous loss of life and property, economic cost, and damage to the environment. Increasingly, many natural processes show evidence of nonstationary behavior including wind speeds, landslides, wildfires, precipitation, streamflow, sea levels, and earthquakes. Traditional probabilistic analysis of natural hazards based on peaks over threshold (POT) generally assumes stationarity in the magnitudes and arrivals of events, i.e., that the probability of exceedance of some critical event is constant through time. Given increasing evidence of trends in natural hazards, new methods are needed to characterize their probabilistic behavior. The well-developed field of hazard function analysis (HFA) is ideally suited to this problem because its primary goal is to describe changes in the exceedance probability of an event over time. HFA is widely used in medicine, manufacturing, actuarial statistics, reliability engineering, economics, and elsewhere. HFA provides a rich theory to relate the natural hazard event series (X) with its failure time series (T), enabling computation of corresponding average return periods, risk, and reliabilities associated with nonstationary event series. This work investigates the suitability of HFA to characterize nonstationary natural hazards whose POT magnitudes are assumed to follow the widely applied generalized Pareto model. We derive the hazard function for this case and demonstrate how metrics such as reliability and average return period are impacted by nonstationarity and discuss the implications for planning and design. Our theoretical analysis linking hazard random variable X with corresponding failure time series T should have application to a wide class of natural hazards with opportunities for future extensions.

  19. How to test the threat-simulation theory.

    PubMed

    Revonsuo, Antti; Valli, Katja

    2008-12-01

    Malcolm-Smith, Solms, Turnbull and Tredoux [Malcolm-Smith, S., Solms, M.,Turnbull, O., & Tredoux, C. (2008). Threat in dreams: An adaptation? Consciousness and Cognition, 17, 1281-1291.] have made an attempt to test the Threat-Simulation Theory (TST), a theory offering an evolutionary psychological explanation for the function of dreaming [Revonsuo, A. (2000a). The reinterpretation of dreams: An evolutionary hypothesis of the function of dreaming. Behavioral and Brain Sciences, 23(6), 877-901]. Malcolm-Smith et al. argue that empirical evidence from their own study as well as from some other studies in the literature does not support the main predictions of the TST: that threatening events are frequent and overrepresented in dreams, that exposure to real threats activates the threat-simulation system, and that dream threats contain realistic rehearsals of threat avoidance responses. Other studies, including our own, have come up with results and conclusions that are in conflict with those of Malcolm-Smith et al. In this commentary, we provide an analysis of the sources of these disagreements, and their implications to the TST. Much of the disagreement seems to stem from differing interpretations of the theory and, consequently, of differing methods to test it.

  20. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  1. Salient beliefs about earthquake hazards and household preparedness.

    PubMed

    Becker, Julia S; Paton, Douglas; Johnston, David M; Ronan, Kevin R

    2013-09-01

    Prior research has found little or no direct link between beliefs about earthquake risk and household preparedness. Furthermore, only limited work has been conducted on how people's beliefs influence the nature and number of preparedness measures adopted. To address this gap, 48 qualitative interviews were undertaken with residents in three urban locations in New Zealand subject to seismic risk. The study aimed to identify the diverse hazard and preparedness-related beliefs people hold and to articulate how these are influenced by public education to encourage preparedness. The study also explored how beliefs and competencies at personal, social, and environmental levels interact to influence people's risk management choices. Three main categories of beliefs were found: hazard beliefs; preparedness beliefs; and personal beliefs. Several salient beliefs found previously to influence the preparedness process were confirmed by this study, including beliefs related to earthquakes being an inevitable and imminent threat, self-efficacy, outcome expectancy, personal responsibility, responsibility for others, and beliefs related to denial, fatalism, normalization bias, and optimistic bias. New salient beliefs were also identified (e.g., preparedness being a "way of life"), as well as insight into how some of these beliefs interact within the wider informational and societal context. © 2013 Society for Risk Analysis.

  2. Flood Hazards - A National Threat

    USGS Publications Warehouse

    ,

    2006-01-01

    In the late summer of 2005, the remarkable flooding brought by Hurricane Katrina, which caused more than $200 billion in losses, constituted the costliest natural disaster in U.S. history. However, even in typical years, flooding causes billions of dollars in damage and threatens lives and property in every State. Natural processes, such as hurricanes, weather systems, and snowmelt, can cause floods. Failure of levees and dams and inadequate drainage in urban areas can also result in flooding. On average, floods kill about 140 people each year and cause $6 billion in property damage. Although loss of life to floods during the past half-century has declined, mostly because of improved warning systems, economic losses have continued to rise due to increased urbanization and coastal development.

  3. Volcano Hazards - A National Threat

    USGS Publications Warehouse

    ,

    2006-01-01

    When the violent energy of a volcano is unleashed, the results are often catastrophic. The risks to life, property, and infrastructure from volcanoes are escalating as more and more people live, work, play, and travel in volcanic regions. Since 1980, 45 eruptions and 15 cases of notable volcanic unrest have occurred at 33 U.S. volcanoes. Lava flows, debris avalanches, and explosive blasts have invaded communities, swept people to their deaths, choked major riverways, destroyed bridges, and devastated huge tracts of forest. Noxious volcanic gas emissions have caused widespread lung problems. Airborne ash clouds have disrupted the health, lives, and businesses of hundreds of thousands of people; caused millions of dollars of aircraft damage; and nearly brought down passenger flights.

  4. The Perceived Threat of Affirmative Action Policy

    DTIC Science & Technology

    1975-06-06

    as- sumption was made that affirmative action threat was a phenomenon which was separate and distinct from general racial feelings. The...the respond- ents. However, affirmative action threat was found to be differentially related to general racial feelings at the .001 confidence...level. Thus, affirmative action threat feelings were not independent from general racial feelings. Based on the findings of this study, it was

  5. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... threat; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... SECURITY: GENERAL RULES Security Threat Assessments § 1540.205 Procedures for security threat assessment...

  6. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart. (a...

  7. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  8. Enhanced processing of threat stimuli under limited attentional resources.

    PubMed

    De Martino, Benedetto; Kalisch, Raffael; Rees, Geraint; Dolan, Raymond J

    2009-01-01

    The ability to process stimuli that convey potential threat, under conditions of limited attentional resources, confers adaptive advantages. This study examined the neurobiology underpinnings of this capacity. Employing an attentional blink paradigm, in conjunction with functional magnetic resonance imaging, we manipulated the salience of the second of 2 face target stimuli (T2), by varying emotionality. Behaviorally, fearful T2 faces were identified significantly more than neutral faces. Activity in fusiform face area increased with correct identification of T2 faces. Enhanced activity in rostral anterior cingulate cortex (rACC) accounted for the benefit in detection of fearful stimuli reflected in a significant interaction between target valence and correct identification. Thus, under conditions of limited attention resources activation in rACC correlated with enhanced processing of emotional stimuli. We suggest that these data support a model in which a prefrontal "gate" mechanism controls conscious access of emotional information under conditions of limited attentional resources.

  9. Perception of Natural Hazards and Risk among University of Washington Students

    NASA Astrophysics Data System (ADS)

    Herr, K.; Brand, B.; Hamlin, N.; Ou, J.; Thomas, B.; Tudor, E.

    2012-12-01

    Familiarity with a given population's perception of natural hazards and the threats they present is vital for the development of effective education prior to and emergency management response after a natural event. While much work has been done in other active tectonic regions, perception of natural hazards and risk among Pacific Northwest (PNW) residents is poorly constrained. The objective of this work is to assess the current perception of earthquake and volcanic hazards and risk in the PNW, and to better understand the factors which drive the public's behavior concerning preparedness and response. We developed a survey to assess the knowledge of natural hazards common to the region, their perception of risk concerning these hazards, and their level of preparedness should a natural hazard occur. The survey was distributed to University of Washington students and employees via an internet link as part of a class project in 'Living with Volcanoes' (ESS 106) in March of 2012, which returned more than 900 responses. The UW student population was chosen as our first "population" to assess because of their uniqueness as a large, semi-transient population (typical residence of less than 5 years). Only 50% of participants correctly reported their proximity to an active volcano, indicating either lack of knowledge of active volcanoes in the region or poor spatial awareness. When asked which area were most at risk to lahars, respondents indicated that all areas close to the hazard source, including topographically elevated regions, were at a higher risk than more distal and low-lying localities that are also at high risk, indicating a lack of knowledge concerning the topographic dependency of this hazard. Participants perceived themselves to be able to cope better with an earthquake than a volcanic event. This perception may be due to lack of knowledge of volcanic hazards and their extent or due to a false sense of security concerning earthquakes fostered by regular

  10. Public-private provision of protection measures against natural hazards

    NASA Astrophysics Data System (ADS)

    Gruber, M.

    2009-04-01

    Natural hazards threaten human lives as well as economic values of a society. Due to an increasing population density, augmenting property holdings in congested areas as well as higher frequencies of catastrophic events, the damage potential associated with natural hazards is growing. In order to safeguard societal assets against this threat, active and passive protection measures can be established. While passive protection measures provide for this type of risk by means of thorough land use planning, active protection measures aim at improving safety through technical or biological protective systems and structures. However, these provisions are costly and need to be handled prudentially. In most European countries protection measures against natural hazards are provided by the public. Specific governmental funds have been set up for the establishment of preventive systems as well as for damage compensation payments after the occurrence of catastrophic events. Though, additional capital is urgently needed in order to facilitate the realisation of all necessary projects in this field and to provide for maximal safety. One potential solution for such financial deficiencies can be found in Public Private Partnerships (PPP). PPPs have been implemented as attractive concepts for the funding of diverse projects in the fields of e.g. road construction, municipal, health and social services. In principle, they could also provide alternative funding solutions for the establishment of crucial protective infrastructure in respect of natural hazards, adding private financial means to the currently available public funds. Thereby, the entire capacities for catastrophe funding could be enhanced. Beside PPPs, also alternative funding mechanisms such as the emission of catastrophe bonds, contingent credit lines or leasing arrangements may enhance available capacities for the financing of protection measures. This contribution discusses innovative solutions for the funding of

  11. Secondary impact hazard assessment

    NASA Technical Reports Server (NTRS)

    1986-01-01

    A series of light gas gun shots (4 to 7 km/sec) were performed with 5 mg nylon and aluminum projectiles to determine the size, mass, velocity, and spatial distribution of spall and ejecta from a number of graphite/epoxy targets. Similar determinations were also performed on a few aluminum targets. Target thickness and material were chosen to be representative of proposed Space Station structure. The data from these shots and other information were used to predict the hazard to Space Station elements from secondary particles resulting from impacts of micrometeoroids and orbital debris on the Space Station. This hazard was quantified as an additional flux over and above the primary micrometeoroid and orbital debris flux that must be considered in the design process. In order to simplify the calculations, eject and spall mass were assumed to scale directly with the energy of the projectile. Other scaling systems may be closer to reality. The secondary particles considered are only those particles that may impact other structure immediately after the primary impact. The addition to the orbital debris problem from these primary impacts was not addressed. Data from this study should be fed into the orbital debris model to see if Space Station secondaries make a significant contribution to orbital debris. The hazard to a Space Station element from secondary particles above and beyond the micrometeoroid and orbital debris hazard is categorized in terms of two factors: (1) the 'view factor' of the element to other Space Station structure or the geometry of placement of the element, and (2) the sensitivity to damage, stated in terms of energy. Several example cases were chosen, the Space Station module windows, windows of a Shuttle docked to the Space Station, the habitat module walls, and the photovoltaic solar cell arrays. For the examples chosen the secondary flux contributed no more than 10 percent to the total flux (primary and secondary) above a given calculated

  12. The Relative Severity of Single Hazards within a Multi-Hazard Framework

    NASA Astrophysics Data System (ADS)

    Gill, Joel C.; Malamud, Bruce D.

    2013-04-01

    Here we present a description of the relative severity of single hazards within a multi-hazard framework, compiled through examining, quantifying and ranking the extent to which individual hazards trigger or increase the probability of other hazards. Hazards are broken up into six major groupings (geophysical, hydrological, shallow earth processes, atmospheric, biophysical and space), with the interactions for 21 different hazard types examined. These interactions include both one primary hazard triggering a secondary hazard, and one primary hazard increasing the probability of a secondary hazard occurring. We identify, through a wide-ranging review of grey- and peer-review literature, >90 interactions. The number of hazard-type linkages are then summed for each hazard in terms of their influence (the number of times one hazard type triggers another type of hazard, or itself) and their sensitivity (the number of times one hazard type is triggered by other hazard types, or itself). The 21 different hazards are then ranked based on (i) influence and (ii) sensitivity. We found, by quantification and ranking of these hazards, that: (i) The strongest influencers (those triggering the most secondary hazards) are volcanic eruptions, earthquakes and storms, which when taken together trigger almost a third of the possible hazard interactions identified; (ii) The most sensitive hazards (those being triggered by the most primary hazards) are identified to be landslides, volcanic eruptions and floods; (iii) When sensitivity rankings are adjusted to take into account the differential likelihoods of different secondary hazards being triggered, the most sensitive hazards are found to be landslides, floods, earthquakes and ground heave. We believe that by determining the strongest influencing and the most sensitive hazards for specific spatial areas, the allocation of resources for mitigation measures might be done more effectively.

  13. Hazard function theory for nonstationary natural hazards

    DOE PAGES

    Read, Laura K.; Vogel, Richard M.

    2016-04-11

    Impact from natural hazards is a shared global problem that causes tremendous loss of life and property, economic cost, and damage to the environment. Increasingly, many natural processes show evidence of nonstationary behavior including wind speeds, landslides, wildfires, precipitation, streamflow, sea levels, and earthquakes. Traditional probabilistic analysis of natural hazards based on peaks over threshold (POT) generally assumes stationarity in the magnitudes and arrivals of events, i.e., that the probability of exceedance of some critical event is constant through time. Given increasing evidence of trends in natural hazards, new methods are needed to characterize their probabilistic behavior. The well-developed field ofmore » hazard function analysis (HFA) is ideally suited to this problem because its primary goal is to describe changes in the exceedance probability of an event over time. HFA is widely used in medicine, manufacturing, actuarial statistics, reliability engineering, economics, and elsewhere. HFA provides a rich theory to relate the natural hazard event series ( X) with its failure time series ( T), enabling computation of corresponding average return periods, risk, and reliabilities associated with nonstationary event series. This work investigates the suitability of HFA to characterize nonstationary natural hazards whose POT magnitudes are assumed to follow the widely applied generalized Pareto model. We derive the hazard function for this case and demonstrate how metrics such as reliability and average return period are impacted by nonstationarity and discuss the implications for planning and design. As a result, our theoretical analysis linking hazard random variable  X with corresponding failure time series  T should have application to a wide class of natural hazards with opportunities for future extensions.« less

  14. Hazard function theory for nonstationary natural hazards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Read, Laura K.; Vogel, Richard M.

    Impact from natural hazards is a shared global problem that causes tremendous loss of life and property, economic cost, and damage to the environment. Increasingly, many natural processes show evidence of nonstationary behavior including wind speeds, landslides, wildfires, precipitation, streamflow, sea levels, and earthquakes. Traditional probabilistic analysis of natural hazards based on peaks over threshold (POT) generally assumes stationarity in the magnitudes and arrivals of events, i.e., that the probability of exceedance of some critical event is constant through time. Given increasing evidence of trends in natural hazards, new methods are needed to characterize their probabilistic behavior. The well-developed field ofmore » hazard function analysis (HFA) is ideally suited to this problem because its primary goal is to describe changes in the exceedance probability of an event over time. HFA is widely used in medicine, manufacturing, actuarial statistics, reliability engineering, economics, and elsewhere. HFA provides a rich theory to relate the natural hazard event series ( X) with its failure time series ( T), enabling computation of corresponding average return periods, risk, and reliabilities associated with nonstationary event series. This work investigates the suitability of HFA to characterize nonstationary natural hazards whose POT magnitudes are assumed to follow the widely applied generalized Pareto model. We derive the hazard function for this case and demonstrate how metrics such as reliability and average return period are impacted by nonstationarity and discuss the implications for planning and design. As a result, our theoretical analysis linking hazard random variable  X with corresponding failure time series  T should have application to a wide class of natural hazards with opportunities for future extensions.« less

  15. Hazard function theory for nonstationary natural hazards

    NASA Astrophysics Data System (ADS)

    Read, L. K.; Vogel, R. M.

    2015-11-01

    Impact from natural hazards is a shared global problem that causes tremendous loss of life and property, economic cost, and damage to the environment. Increasingly, many natural processes show evidence of nonstationary behavior including wind speeds, landslides, wildfires, precipitation, streamflow, sea levels, and earthquakes. Traditional probabilistic analysis of natural hazards based on peaks over threshold (POT) generally assumes stationarity in the magnitudes and arrivals of events, i.e. that the probability of exceedance of some critical event is constant through time. Given increasing evidence of trends in natural hazards, new methods are needed to characterize their probabilistic behavior. The well-developed field of hazard function analysis (HFA) is ideally suited to this problem because its primary goal is to describe changes in the exceedance probability of an event over time. HFA is widely used in medicine, manufacturing, actuarial statistics, reliability engineering, economics, and elsewhere. HFA provides a rich theory to relate the natural hazard event series (X) with its failure time series (T), enabling computation of corresponding average return periods, risk and reliabilities associated with nonstationary event series. This work investigates the suitability of HFA to characterize nonstationary natural hazards whose POT magnitudes are assumed to follow the widely applied Generalized Pareto (GP) model. We derive the hazard function for this case and demonstrate how metrics such as reliability and average return period are impacted by nonstationarity and discuss the implications for planning and design. Our theoretical analysis linking hazard event series X, with corresponding failure time series T, should have application to a wide class of natural hazards with rich opportunities for future extensions.

  16. Experimental estimation of snare detectability for robust threat monitoring.

    PubMed

    O'Kelly, Hannah J; Rowcliffe, J Marcus; Durant, Sarah; Milner-Gulland, E J

    2018-02-01

    Hunting with wire snares is rife within many tropical forest systems, and constitutes one of the severest threats to a wide range of vertebrate taxa. As for all threats, reliable monitoring of snaring levels is critical for assessing the relative effectiveness of management interventions. However, snares pose a particular challenge in terms of tracking spatial or temporal trends in their prevalence because they are extremely difficult to detect, and are typically spread across large, inaccessible areas. As with cryptic animal targets, any approach used to monitor snaring levels must address the issue of imperfect detection, but no standard method exists to do so. We carried out a field experiment in Keo Seima Wildlife Reserve in eastern Cambodia with the following objectives: (1) To estimate the detection probably of wire snares within a tropical forest context, and to investigate how detectability might be affected by habitat type, snare type, or observer. (2) To trial two sets of sampling protocols feasible to implement in a range of challenging field conditions. (3) To conduct a preliminary assessment of two potential analytical approaches to dealing with the resulting snare encounter data. We found that although different observers had no discernible effect on detection probability, detectability did vary between habitat type and snare type. We contend that simple repeated counts carried out at multiple sites and analyzed using binomial mixture models could represent a practical yet robust solution to the problem of monitoring snaring levels both inside and outside of protected areas. This experiment represents an important first step in developing improved methods of threat monitoring, and such methods are greatly needed in southeast Asia, as well as in as many other regions.

  17. Hazard Interactions and Interaction Networks (Cascades) within Multi-Hazard Methodologies

    NASA Astrophysics Data System (ADS)

    Gill, Joel; Malamud, Bruce D.

    2016-04-01

    Here we combine research and commentary to reinforce the importance of integrating hazard interactions and interaction networks (cascades) into multi-hazard methodologies. We present a synthesis of the differences between 'multi-layer single hazard' approaches and 'multi-hazard' approaches that integrate such interactions. This synthesis suggests that ignoring interactions could distort management priorities, increase vulnerability to other spatially relevant hazards or underestimate disaster risk. We proceed to present an enhanced multi-hazard framework, through the following steps: (i) describe and define three groups (natural hazards, anthropogenic processes and technological hazards/disasters) as relevant components of a multi-hazard environment; (ii) outline three types of interaction relationship (triggering, increased probability, and catalysis/impedance); and (iii) assess the importance of networks of interactions (cascades) through case-study examples (based on literature, field observations and semi-structured interviews). We further propose visualisation frameworks to represent these networks of interactions. Our approach reinforces the importance of integrating interactions between natural hazards, anthropogenic processes and technological hazards/disasters into enhanced multi-hazard methodologies. Multi-hazard approaches support the holistic assessment of hazard potential, and consequently disaster risk. We conclude by describing three ways by which understanding networks of interactions contributes to the theoretical and practical understanding of hazards, disaster risk reduction and Earth system management. Understanding interactions and interaction networks helps us to better (i) model the observed reality of disaster events, (ii) constrain potential changes in physical and social vulnerability between successive hazards, and (iii) prioritise resource allocation for mitigation and disaster risk reduction.

  18. A review of multi-threat medical countermeasures against chemical warfare and terrorism.

    PubMed

    Cowan, Fred M; Broomfield, Clarence A; Stojiljkovic, Milos P; Smith, William J

    2004-11-01

    The Multi-Threat Medical Countermeasure (MTMC) hypothesis has been proposed with the aim of developing a single countermeasure drug with efficacy against different pathologies caused by multiple classes of chemical warfare agents. Although sites and mechanisms of action and the pathologies caused by different chemical insults vary, common biochemical signaling pathways, molecular mediators, and cellular processes provide targets for MTMC drugs. This article will review the MTMC hypothesis for blister and nerve agents and will expand the scope of the concept to include other chemicals as well as briefly consider biological agents. The article will also consider how common biochemical signaling pathways, molecular mediators, and cellular processes that contribute to clinical pathologies and syndromes may relate to the toxicity of threat agents. Discovery of MTMC provides the opportunity for the integration of diverse researchers and clinicians, and for the exploitation of cutting-edge technologies and drug discovery. The broad-spectrum nature of MTMC can augment military and civil defense to combat chemical warfare and chemical terrorism.

  19. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    PubMed Central

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  20. PyBetVH: A Python tool for probabilistic volcanic hazard assessment and for generation of Bayesian hazard curves and maps

    NASA Astrophysics Data System (ADS)

    Tonini, Roberto; Sandri, Laura; Anne Thompson, Mary

    2015-06-01

    PyBetVH is a completely new, free, open-source and cross-platform software implementation of the Bayesian Event Tree for Volcanic Hazard (BET_VH), a tool for estimating the probability of any magmatic hazardous phenomenon occurring in a selected time frame, accounting for all the uncertainties. New capabilities of this implementation include the ability to calculate hazard curves which describe the distribution of the exceedance probability as a function of intensity (e.g., tephra load) on a grid of points covering the target area. The computed hazard curves are (i) absolute (accounting for the probability of eruption in a given time frame, and for all the possible vent locations and eruptive sizes) and (ii) Bayesian (computed at different percentiles, in order to quantify the epistemic uncertainty). Such curves allow representation of the full information contained in the probabilistic volcanic hazard assessment (PVHA) and are well suited to become a main input to quantitative risk analyses. PyBetVH allows for interactive visualization of both the computed hazard curves, and the corresponding Bayesian hazard/probability maps. PyBetVH is designed to minimize the efforts of end users, making PVHA results accessible to people who may be less experienced in probabilistic methodologies, e.g. decision makers. The broad compatibility of Python language has also allowed PyBetVH to be installed on the VHub cyber-infrastructure, where it can be run online or downloaded at no cost. PyBetVH can be used to assess any type of magmatic hazard from any volcano. Here we illustrate how to perform a PVHA through PyBetVH using the example of analyzing tephra fallout from the Okataina Volcanic Centre (OVC), New Zealand, and highlight the range of outputs that the tool can generate.

  1. Social Hazards as Manifested Workplace Discrimination and Health (Vietnamese and Ukrainian Female and Male Migrants in Czechia)

    PubMed Central

    Drbohlav, Dušan; Dzúrová, Dagmar

    2017-01-01

    Social hazards as one of the dimensions of workplace discrimination are a potential social determinant of health inequalities. The aim of this study was to investigate relations between self-reported health and social hazard characteristics (defined as—discrimination as such, violence or threat of violence, time pressure or work overload and risk of accident) among Vietnamese and Ukrainian migrants (males and females) in Czechia by age, education level and marital status. This study is based on data from a survey of 669 immigrants in Czechia in 2013. Logistic regression analysis indicates that the given independent variables (given social hazards and socio-demographic characteristics), as predictors of a quality of self-reported health are more important for immigrant females than for males, irrespective of citizenship, albeit only for some of them and to differing extents. We found out that being exposed to the selected social hazards in the workplace leads to worsening self-rated health, especially for females. On the other hand, there was no statistically significant relationship found between poor self-rated health and discrimination as such. Reality calls for more research and, consequently, better policies and practices in the field of health inequalities. PMID:28994700

  2. An evaluation of a risk-based environmental regulation in Brazil: Limitations to risk management of hazardous installations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Naime, Andre, E-mail: andre.naime.ibama@gmail.com

    The environmental regulation of hazardous projects with risk-based decision-making processes can lead to a deficient management of human exposure to technological hazards. Such an approach for regulation is criticized for simplifying the complexity of decisions involving the economic, social, and environmental aspects of the installation and operation of hazardous facilities in urban areas. Results of a Brazilian case study indicate that oil and gas transmission pipelines may represent a threat to diverse communities if the relationship between such linear projects and human populations is overlooked by regulatory bodies. Results also corroborate known challenges to the implementation of EIA processes andmore » outline limitations to an effective environmental and risk management. Two preliminary topics are discussed to strengthen similar regulatory practices. Firstly, an effective integration between social impact assessment and risk assessment in EIA processes to have a more comprehensive understanding of the social fabric. Secondly, the advancement of traditional management practices for hazardous installations to pursue a strong transition from assessment and evaluation to management and control and to promote an effective interaction between land-use planning and environmental regulation.« less

  3. Social Hazards as Manifested Workplace Discrimination and Health (Vietnamese and Ukrainian Female and Male Migrants in Czechia).

    PubMed

    Drbohlav, Dušan; Dzúrová, Dagmar

    2017-10-10

    Social hazards as one of the dimensions of workplace discrimination are a potential social determinant of health inequalities. The aim of this study was to investigate relations between self-reported health and social hazard characteristics (defined as-discrimination as such, violence or threat of violence, time pressure or work overload and risk of accident) among Vietnamese and Ukrainian migrants (males and females) in Czechia by age, education level and marital status. This study is based on data from a survey of 669 immigrants in Czechia in 2013. Logistic regression analysis indicates that the given independent variables (given social hazards and socio-demographic characteristics), as predictors of a quality of self-reported health are more important for immigrant females than for males, irrespective of citizenship, albeit only for some of them and to differing extents. We found out that being exposed to the selected social hazards in the workplace leads to worsening self-rated health, especially for females. On the other hand, there was no statistically significant relationship found between poor self-rated health and discrimination as such. Reality calls for more research and, consequently, better policies and practices in the field of health inequalities.

  4. Stereotype threat lowers older adults’ self-reported hearing abilities

    PubMed Central

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  5. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    PubMed

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  6. Childhood maltreatment and threats with weapons.

    PubMed

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  7. Hidden Markov models for estimating animal mortality from anthropogenic hazards

    EPA Science Inventory

    Carcasses searches are a common method for studying the risk of anthropogenic hazards to wildlife, including non-target poisoning and collisions with anthropogenic structures. Typically, numbers of carcasses found must be corrected for scavenging rates and imperfect detection. ...

  8. Hazard interactions and interaction networks (cascades) within multi-hazard methodologies

    NASA Astrophysics Data System (ADS)

    Gill, Joel C.; Malamud, Bruce D.

    2016-08-01

    This paper combines research and commentary to reinforce the importance of integrating hazard interactions and interaction networks (cascades) into multi-hazard methodologies. We present a synthesis of the differences between multi-layer single-hazard approaches and multi-hazard approaches that integrate such interactions. This synthesis suggests that ignoring interactions between important environmental and anthropogenic processes could distort management priorities, increase vulnerability to other spatially relevant hazards or underestimate disaster risk. In this paper we proceed to present an enhanced multi-hazard framework through the following steps: (i) description and definition of three groups (natural hazards, anthropogenic processes and technological hazards/disasters) as relevant components of a multi-hazard environment, (ii) outlining of three types of interaction relationship (triggering, increased probability, and catalysis/impedance), and (iii) assessment of the importance of networks of interactions (cascades) through case study examples (based on the literature, field observations and semi-structured interviews). We further propose two visualisation frameworks to represent these networks of interactions: hazard interaction matrices and hazard/process flow diagrams. Our approach reinforces the importance of integrating interactions between different aspects of the Earth system, together with human activity, into enhanced multi-hazard methodologies. Multi-hazard approaches support the holistic assessment of hazard potential and consequently disaster risk. We conclude by describing three ways by which understanding networks of interactions contributes to the theoretical and practical understanding of hazards, disaster risk reduction and Earth system management. Understanding interactions and interaction networks helps us to better (i) model the observed reality of disaster events, (ii) constrain potential changes in physical and social vulnerability

  9. A modeling framework for investment planning in interdependent infrastructures in multi-hazard environments.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown, Nathanael J. K.; Gearhart, Jared Lee; Jones, Dean A.

    Currently, much of protection planning is conducted separately for each infrastructure and hazard. Limited funding requires a balance of expenditures between terrorism and natural hazards based on potential impacts. This report documents the results of a Laboratory Directed Research & Development (LDRD) project that created a modeling framework for investment planning in interdependent infrastructures focused on multiple hazards, including terrorism. To develop this framework, three modeling elements were integrated: natural hazards, terrorism, and interdependent infrastructures. For natural hazards, a methodology was created for specifying events consistent with regional hazards. For terrorism, we modeled the terrorists actions based on assumptions regardingmore » their knowledge, goals, and target identification strategy. For infrastructures, we focused on predicting post-event performance due to specific terrorist attacks and natural hazard events, tempered by appropriate infrastructure investments. We demonstrate the utility of this framework with various examples, including protection of electric power, roadway, and hospital networks.« less

  10. The increasing wildfire and post-fire debris-flow threat in western USA, and implications for consequences of climate change

    USGS Publications Warehouse

    Cannon, Susan H.; DeGraff, Jerry

    2009-01-01

    In southern California and the intermountain west of the USA, debris flows generated from recently-burned basins pose significant hazards. Increases in the frequency and size of wildfires throughout the western USA can be attributed to increases in the number of fire ignitions, fire suppression practices, and climatic influences. Increased urbanization throughout the western USA, combined with the increased wildfire magnitude and frequency, carries with it the increased threat of subsequent debris-flow occurrence. Differences between rainfall thresholds and empirical debris-flow susceptibility models for southern California and the intermountain west indicate a strong influence of climatic and geologic settings on post-fire debris-flow potential. The linkages between wildfires, debris-flow occurrence, and global warming suggests that the experiences in the western United States are highly likely to be duplicated in many other parts of the world, and necessitate hazard assessment tools that are specific to local climates and physiographies.

  11. Deflecting the trajectory and changing the narrative: how self-affirmation affects academic performance and motivation under identity threat.

    PubMed

    Sherman, David K; Hartson, Kimberly A; Binning, Kevin R; Purdie-Vaughns, Valerie; Garcia, Julio; Taborsky-Barba, Suzanne; Tomassetti, Sarah; Nussbaum, A David; Cohen, Geoffrey L

    2013-04-01

    To the extent that stereotype and identity threat undermine academic performance, social psychological interventions that lessen threat could buffer threatened students and improve performance. Two studies, each featuring a longitudinal field experiment in a mixed-ethnicity middle school, examined whether a values affirmation writing exercise could attenuate the achievement gap between Latino American and European American students. In Study 1, students completed multiple self-affirmation (or control) activities as part of their regular class assignments. Latino American students, the identity threatened group, earned higher grades in the affirmation than control condition, whereas White students were unaffected. The effects persisted 3 years and, for many students, continued into high school by lifting their performance trajectory. Study 2 featured daily diaries to examine how the affirmation affected psychology under identity threat, with the expectation that it would shape students' narratives of their ongoing academic experience. By conferring a big-picture focus, affirmation was expected to broaden construals, prevent daily adversity from being experienced as identity threat, and insulate academic motivation from identity threat. Indeed, affirmed Latino American students not only earned higher grades than nonaffirmed Latino American students but also construed events at a more abstract than concrete level and were less likely to have their daily feelings of academic fit and motivation undermined by identity threat. Discussion centers on how social-psychological processes propagate themselves over time and how timely interventions targeting these processes can promote well-being and achievement.

  12. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  13. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  14. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  15. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  16. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  17. Threat-Detection and Attentional Bias to Threat in Women Recovered from Anorexia Nervosa: Neural Alterations in Extrastriate and Medial Prefrontal Cortices.

    PubMed

    Bang, Lasse; Rø, Øyvind; Endestad, Tor

    2017-03-01

    Behavioral studies have shown that anorexia nervosa (AN) is associated with attentional bias to general threat cues. The neurobiological underpinnings of attentional bias to threat in AN are unknown. This study investigated the neural responses associated with threat-detection and attentional bias to threat in AN. We measured neural responses to a dot-probe task, involving pairs of angry and neutral face stimuli, in 22 adult women recovered from AN and 21 comparison women. Recovered AN women did not exhibit a behavioral attentional bias to threat. In response to angry faces, recovered women showed significant hypoactivation in the extrastriate cortex. During attentional bias to angry faces, recovered women showed significant hyperactivation in the medial prefrontal cortex. This was because of significant deactivation in comparison women, which was absent in recovered AN women. Women recovered from AN are characterized by altered neural responses to threat cues. Copyright © 2016 John Wiley & Sons, Ltd and Eating Disorders Association. Copyright © 2016 John Wiley & Sons, Ltd and Eating Disorders Association.

  18. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    PubMed Central

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  19. The effect of natural disturbances on the risk from hydrogeomorphic hazards under climate change

    NASA Astrophysics Data System (ADS)

    Scheidl, Christian; Thaler, Thomas; Seidl, Rupert; Rammer, Werner; Kohl, Bernhard; Markart, Gerhard

    2017-04-01

    Recent storm events in Austria show once more how floods, sediment transport processes and debris flows constitute a major threat in alpine regions with a high density of population and an increasing spatial development. As protection forests have a major control function on runoff and erosion, they directly affect the risk from such hydrogeomorphic processes. However, research on future climate conditions, with an expected increase of the global average surface temperature of 3-5°C by 2100, compared to the first decade of the 20th century, raises a number of open questions for a sustainable and improved hazard management in mountain forests. For Europe, for instance, a climate-induced increase in forest disturbances like wildfire, wind, and insect's outbreaks is highly likely for the coming decades. Especially in protection forests, future scenarios of such climate induced natural disturbances and their impact on the protective effect remain an unresolved issue. Combining methods from forestry, hydrology and geotechnical engineering our project uses an integral approach to simulate possible effects of natural disturbances on hydrogeomorphic hazards in the perspective of future protection forest developments. With the individual-based forest landscape and disturbance model (iLand) we conduct an ensemble of forest landscape simulations, assessing the impact of future changes in natural disturbance regimes in four selected torrential catchments. These catchments are situated in two different forest growth areas. Drainage rate simulations are based on the conceptual hydrological model (ZEMOKOST), whereas simulations of the effect of forest disturbances on hillslope erosion processes are conducted by the Distributed Hydrology Soil Vegetation Model (DHSVM). Beside process based simulations, we also emphasis to identify the risk perception and adaptive capacity to mitigate a probable loss of protection functions in forests. For this reason, a postal survey among

  20. Threat visibility modulates the defensive brain circuit underlying fear and anxiety.

    PubMed

    Rigoli, Francesco; Ewbank, Michael; Dalgleish, Tim; Calder, Andrew

    2016-01-26

    Recent theories distinguish anxiety from fear in the brain. Anxiety is associated with activation in ventromedial prefrontal cortex and hippocampus, while fear is associated with activation in periaqueductal gray, with amygdala involved in processing aspects of both emotional responses. These theories propose that the amount of information available about threat determines which of the two defensive responses is elicited, with fear and anxiety associated with well-defined and uncertain threats respectively. However, a direct test of this hypothesis is lacking. Here we provide such a test using fMRI to record participants' brain activity while they performed a computer-based task which required to press a button to move an artificial agent to a target position while an artificial predator chased the agent. In one condition (associated with fear) the predator was visible, while in another condition (associated with anxiety) the predator was invisible. Ventromedial prefrontal cortex, hippocampus, and amygdala showed increased activity when the predator was invisible compared to visible, while the opposite effect was observed in periaqueductal gray. We also observed that participants with high but not low trait-anxiety showed an hippocampal activation with invisible threat at an earlier time stage during the trial. These findings help clarify the neural mechanisms that underlie different defensive emotions and shed light on how these mechanisms may contribute to exaggerated anxiety. Copyright © 2015 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  1. Combating the Insider Cyber Threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  2. Keeping Schools Safe through Threat Assessment

    ERIC Educational Resources Information Center

    Barton, Rhonda

    2008-01-01

    This article illustrates how effective a threat assessment program like the Mid-Valley Student Threat Assessment (STAT) program can be in dealing with violent and threatening students. STAT is a a regional system that draws together resources from schools, mental health agencies, law enforcement bureaus, and other youth-serving organizations in…

  3. Recent Progress in Understanding Natural-Hazards-Generated TEC Perturbations: Measurements and Modeling Results

    NASA Astrophysics Data System (ADS)

    Komjathy, A.; Yang, Y. M.; Meng, X.; Verkhoglyadova, O. P.; Mannucci, A. J.; Langley, R. B.

    2015-12-01

    Natural hazards, including earthquakes, volcanic eruptions, and tsunamis, have been significant threats to humans throughout recorded history. The Global Positioning System satellites have become primary sensors to measure signatures associated with such natural hazards. These signatures typically include GPS-derived seismic deformation measurements, co-seismic vertical displacements, and real-time GPS-derived ocean buoy positioning estimates. Another way to use GPS observables is to compute the ionospheric total electron content (TEC) to measure and monitor post-seismic ionospheric disturbances caused by earthquakes, volcanic eruptions, and tsunamis. Research at the University of New Brunswick (UNB) laid the foundations to model the three-dimensional ionosphere at NASA's Jet Propulsion Laboratory by ingesting ground- and space-based GPS measurements into the state-of-the-art Global Assimilative Ionosphere Modeling (GAIM) software. As an outcome of the UNB and NASA research, new and innovative GPS applications have been invented including the use of ionospheric measurements to detect tiny fluctuations in the GPS signals between the spacecraft and GPS receivers caused by natural hazards occurring on or near the Earth's surface.We will show examples for early detection of natural hazards generated ionospheric signatures using ground-based and space-borne GPS receivers. We will also discuss recent results from the U.S. Real-time Earthquake Analysis for Disaster Mitigation Network (READI) exercises utilizing our algorithms. By studying the propagation properties of ionospheric perturbations generated by natural hazards along with applying sophisticated first-principles physics-based modeling, we are on track to develop new technologies that can potentially save human lives and minimize property damage. It is also expected that ionospheric monitoring of TEC perturbations might become an integral part of existing natural hazards warning systems.

  4. Lifecycle Management of Hazardous Materials/ Hazardous Waste. Revision 1.

    DTIC Science & Technology

    1997-02-01

    1 WHAT YOU NEED TO KNOW ABOUT HAZARDOUS MATERIALS (HM) ....................... 1 PURCHASING HAZARDOUS MATERIALS...20 Figures 1 . Acquisition Flowchart .................................. 12 2. NRaD Hazardous Material Pre-Purchase Checklist ........ 13 3. NRaD...Hazardous Waste Profile Sheet (Part 111) .................. 18 Tables 1 . Class 1 Ozone Depleting Substances .................... 11 i INTRODUCTION This

  5. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    PubMed

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  6. Site-specific seismic probabilistic tsunami hazard analysis: performances and potential applications

    NASA Astrophysics Data System (ADS)

    Tonini, Roberto; Volpe, Manuela; Lorito, Stefano; Selva, Jacopo; Orefice, Simone; Graziani, Laura; Brizuela, Beatriz; Smedile, Alessandra; Romano, Fabrizio; De Martini, Paolo Marco; Maramai, Alessandra; Piatanesi, Alessio; Pantosti, Daniela

    2017-04-01

    Seismic Probabilistic Tsunami Hazard Analysis (SPTHA) provides probabilities to exceed different thresholds of tsunami hazard intensity, at a specific site or region and in a given time span, for tsunamis caused by seismic sources. Results obtained by SPTHA (i.e., probabilistic hazard curves and inundation maps) represent a very important input to risk analyses and land use planning. However, the large variability of source parameters implies the definition of a huge number of potential tsunami scenarios, whose omission could lead to a biased analysis. Moreover, tsunami propagation from source to target requires the use of very expensive numerical simulations. At regional scale, the computational cost can be reduced using assumptions on the tsunami modeling (i.e., neglecting non-linear effects, using coarse topo-bathymetric meshes, empirically extrapolating maximum wave heights on the coast). On the other hand, moving to local scale, a much higher resolution is required and such assumptions drop out, since detailed inundation maps require significantly greater computational resources. In this work we apply a multi-step method to perform a site-specific SPTHA which can be summarized in the following steps: i) to perform a regional hazard assessment to account for both the aleatory and epistemic uncertainties of the seismic source, by combining the use of an event tree and an ensemble modeling technique; ii) to apply a filtering procedure which use a cluster analysis to define a significantly reduced number of representative scenarios contributing to the hazard of a specific target site; iii) to perform high resolution numerical simulations only for these representative scenarios and for a subset of near field sources placed in very shallow waters and/or whose coseismic displacements induce ground uplift or subsidence at the target. The method is applied to three target areas in the Mediterranean located around the cities of Milazzo (Italy), Thessaloniki (Greece) and

  7. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers.

    PubMed

    Carey, Rachel N; Sarma, Kiran M

    2016-07-27

    Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These 'threat appeals' feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62) examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81) investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Findings suggest that threat-based road safety communications that target affective (fear) and cognitive (perceived efficacy) mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.

  8. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  9. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... prevent completion of the threat assessment). (5) Gender. (6) Country of citizenship. (7) If the applicant... subpart remains valid for five years from the date that TSA issues a Determination of No Security Threat...

  10. Stereotype Threat Alters the Subjective Experience of Memory.

    PubMed

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  11. Non-targeted, high resolution mass spectrometry strategy for simultaneous monitoring of xenobiotics and endogenous compounds in green sea turtles on the Great Barrier Reef.

    PubMed

    Heffernan, Amy L; Gómez-Ramos, Maria M; Gaus, Caroline; Vijayasarathy, Soumini; Bell, Ian; Hof, Christine; Mueller, Jochen F; Gómez-Ramos, Maria J

    2017-12-01

    Chemical contamination poses a threat to ecosystem, biota and human health, and identifying these hazards is a complex challenge. Traditional hazard identification relies on a priori-defined targets of limited chemical scope, and is generally inappropriate for exploratory studies such as explaining toxicological effects in environmental systems. Here we present a non-target high resolution mass spectrometry environmental monitoring study with multivariate statistical analysis to simultaneously detect biomarkers of exposure (e.g. xenobiotics) and biomarkers of effect in whole turtle blood. Borrowing the concept from clinical chemistry, a case-control sampling approach was used to investigate the potential influence of xenobiotics of anthropogenic origin on free-ranging green sea turtles (Chelonia mydas) from a remote, offshore 'control' site; and two coastal 'case' sites influenced by urban/industrial and agricultural activities, respectively, on the Great Barrier Reef in North Queensland, Australia. Multiple biomarkers of exposure, including sulfonic acids (n=9), a carbamate insecticide metabolite, and other industrial chemicals; and five biomarkers of effect (lipid peroxidation products), were detected in case sites. Additionally, two endogenous biomarkers of neuroinflammation and oxidative stress were identified, and showed moderate-to-strong correlations with clinical measures of inflammation and liver dysfunction. Our data filtering strategy overcomes limitations of traditional a priori selection of target compounds, and adds to the limited environmental xenobiotic metabolomics literature. To our knowledge this is the first case-control study of xenobiotics in marine megafauna, and demonstrates the utility of green sea turtles to link internal and external exposure, to explain potential toxicological effects in environmental systems. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Pictures cueing threat: brain dynamics in viewing explicitly instructed danger cues

    PubMed Central

    Schupp, Harald T.

    2012-01-01

    Recent event-related brain potential studies revealed the selective processing of emotional and threatening pictures. Integrating the picture viewing and threat-of-shock paradigm, the present study examined the processing of emotional pictures while they were explicitly instructed to cue threat of real world danger (i.e. electric shocks). Toward this end, 60 pleasant, neutral and unpleasant IAPS-pictures were presented (1 s) as a continuous random stream while high-density EEG and self-reported threat were assessed. In three experimental runs, each picture category was used once as a threat-cue, whereas in the other conditions the same category served as safety-cue. An additional passive viewing run served as a no-threat condition, thus, establishing a threat–safety continuum (threat-cue–safety-cue–no-threat) for each picture category. Threat-of-shock modulated P1, P2 and parieto-occipital LPP amplitudes. While the P1 component differentiated among threat- and no-threat conditions, the P2 and LPP effects were specific to pictures signaling threat-of-shock. Thus, stimulus processing progressively gained more accurate information about environmental threat conditions. Interestingly, the finding of increased EPN and centro-parietal LPP amplitudes to emotional pictures was independent from threat-of-shock manipulation. Accordingly, the results indicate distinct effects associated with the intrinsic significance of emotional pictures and explicitly instructed threat contingencies. PMID:21719425

  13. Evaluation of volatile organic emissions from hazardous waste incinerators.

    PubMed Central

    Sedman, R M; Esparza, J R

    1991-01-01

    Conventional methods of risk assessment typically employed to evaluate the impact of hazardous waste incinerators on public health must rely on somewhat speculative emissions estimates or on complicated and expensive sampling and analytical methods. The limited amount of toxicological information concerning many of the compounds detected in stack emissions also complicates the evaluation of the public health impacts of these facilities. An alternative approach aimed at evaluating the public health impacts associated with volatile organic stack emissions is presented that relies on a screening criterion to evaluate total stack hydrocarbon emissions. If the concentration of hydrocarbons in ambient air is below the screening criterion, volatile emissions from the incinerator are judged not to pose a significant threat to public health. Both the screening criterion and a conventional method of risk assessment were employed to evaluate the emissions from 20 incinerators. Use of the screening criterion always yielded a substantially greater estimate of risk than that derived by the conventional method. Since the use of the screening criterion always yielded estimates of risk that were greater than that determined by conventional methods and measuring total hydrocarbon emissions is a relatively simple analytical procedure, the use of the screening criterion would appear to facilitate the evaluation of operating hazardous waste incinerators. PMID:1954928

  14. Face processing in adolescents with positive and negative threat bias.

    PubMed

    Sylvester, C M; Petersen, S E; Luby, J L; Barch, D M

    2017-04-01

    Individuals with anxiety disorders exhibit a 'vigilance-avoidance' pattern of attention to threatening stimuli when threatening and neutral stimuli are presented simultaneously, a phenomenon referred to as 'threat bias'. Modifying threat bias through cognitive retraining during adolescence reduces symptoms of anxiety, and so elucidating neural mechanisms of threat bias during adolescence is of high importance. We explored neural mechanisms by testing whether threat bias in adolescents is associated with generalized or threat-specific differences in the neural processing of faces. Subjects were categorized into those with (n = 25) and without (n = 27) threat avoidance based on a dot-probe task at average age 12.9 years. Threat avoidance in this cohort has previously been shown to index threat bias. Brain response to individually presented angry and neutral faces was assessed in a separate session using functional magnetic resonance imaging. Adolescents with threat avoidance exhibited lower activity for both angry and neutral faces relative to controls in several regions in the occipital, parietal, and temporal lobes involved in early visual and facial processing. Results generalized to happy, sad, and fearful faces. Adolescents with a prior history of depression and/or an anxiety disorder had lower activity for all faces in these same regions. A subset of results replicated in an independent dataset. Threat bias is associated with generalized, rather than threat-specific, differences in the neural processing of faces in adolescents. Findings may aid in the development of novel treatments for anxiety disorders that use attention training to modify threat bias.

  15. Human genomics and obesity: finding appropriate drug targets.

    PubMed

    Ravussin, E; Bouchard, C

    2000-12-27

    The increasing prevalence of obesity worldwide has prompted the World Health Organization (WHO) to classify it as a global epidemic. Around the globe, more than a half billion people are overweight, and the chronic disease of obesity represents a major threat to health care systems in developed and developing countries. The major health hazards associated with obesity are the risks of developing diabetes, cardiovascular disease, stroke, osteoarthritis and some forms of cancer. In this paper, we review the prevalence of obesity and its cost to health care systems and present the relative contribution of environmental conditions and genetic makeup to the development of obesity in people. We also discuss the concept of "essential" obesity in an "obesigenic" environment. Though weight gain results from a sustained imbalance between energy intake and energy expenditure, it is only recently that studies have identified important new mechanisms involved in the regulation of body weight. The etiology of the disease is presented as a feedback model in which afferent signals inform the central controllers in the brain as to the state of the external and internal environment and elicit responses related to the regulation of food intake and energy metabolism. Pharmaceutical agents may intervene at different levels of this feedback model, i.e., reinforce the afferent signals from the periphery, target the central pathways involved in the regulation of food intake and energy expenditure, and increase peripheral energy expenditure and fat oxidation directly. Since obesity results from genetic predisposition, combined with the proactive environmental situation, we discuss new potential targets for generation of drugs that may assist people in gaining control over appetite as well as increasing total energy expenditure and fat oxidation.

  16. DEVELOPMENT OF A HAZARDOUS WASTE INCINERATOR TARGET ANALYTE LIST OF PRODUCTS OF INCOMPLETE COMBUSTION

    EPA Science Inventory

    The report gives results of pilot-scale incineration testing to develop a comprehensive list of products of incomplete combustion (PICs) from hazardous waste combustion (HWC) systems. Project goals were to: (1) identify the total mass of organic compounds sufficiently to estimate...

  17. Eastern forest environmental threat assessment center

    Treesearch

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  18. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  19. Cascading hazards: Understanding triggering relations between wet tropical cyclones, landslides, and earthquakes

    NASA Astrophysics Data System (ADS)

    Wdowinski, S.; Peng, Z.; Ferrier, K.; Lin, C. H.; Hsu, Y. J.; Shyu, J. B. H.

    2017-12-01

    Earthquakes, landslides, and tropical cyclones are extreme hazards that pose significant threats to human life and property. Some of the couplings between these hazards are well known. For example, sudden, widespread landsliding can be triggered by large earthquakes and by extreme rainfall events like tropical cyclones. Recent studies have also shown that earthquakes can be triggered by erosional unloading over 100-year timescales. In a NASA supported project, titled "Cascading hazards: Understanding triggering relations between wet tropical cyclones, landslides, and earthquake", we study triggering relations between these hazard types. The project focuses on such triggering relations in Taiwan, which is subjected to very wet tropical storms, landslides, and earthquakes. One example for such triggering relations is the 2009 Morakot typhoon, which was the wettest recorded typhoon in Taiwan (2850 mm of rain in 100 hours). The typhoon caused widespread flooding and triggered more than 20,000 landslides, including the devastating Hsiaolin landslide. Six months later, the same area was hit by the 2010 M=6.4 Jiashian earthquake near Kaohsiung city, which added to the infrastructure damage induced by the typhoon and the landslides. Preliminary analysis of temporal relations between main-shock earthquakes and the six wettest typhoons in Taiwan's past 50 years reveals similar temporal relations between M≥5 events and wet typhoons. Future work in the project will include remote sensing analysis of landsliding, seismic and geodetic monitoring of landslides, detection of microseismicity and tremor activities, and mechanical modeling of crustal stress changes due to surface unloading.

  20. Evaluation of external hazards to nuclear power plants in the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kimura, C.Y.; Budnitz, R.J.

    1987-12-01

    The Lawrence Livermore National Laboratory (LLNL) has performed a study of the risk of core damage to nuclear power plants in the United States due to externally initiated events. The broad objective has been to gain an understanding of whether or not each external initiator is among the major potential accident initiators that may pose a threat of severe reactor core damage or of large radioactive release to the environment from the reactor. Four external hazards were investigated in this report. These external hazards are internal fires, high winds/tornadoes, external floods, and transportation accidents. Analysis was based on two figures-of-merit,more » one based on core damage frequency and the other based on the frequency of large radioactive releases. Using these two figures-of-merit as evaluation criteria, it has been feasible to ascertain whether the risk from externally initiated accidents is, or is not, an important contributor to overall risk for the US nuclear power plants studied. This has been accomplished for each initiator separately. 208 refs., 17 figs., 45 tabs.« less

  1. Working memory regulates trait anxiety-related threat processing biases.

    PubMed

    Booth, Robert W; Mackintosh, Bundy; Sharma, Dinkar

    2017-06-01

    High trait anxious individuals tend to show biased processing of threat. Correlational evidence suggests that executive control could be used to regulate such threat-processing. On this basis, we hypothesized that trait anxiety-related cognitive biases regarding threat should be exaggerated when executive control is experimentally impaired by loading working memory. In Study 1, 68 undergraduates read ambiguous vignettes under high and low working memory load; later, their interpretations of these vignettes were assessed via a recognition test. Trait anxiety predicted biased interpretation of social threat vignettes under high working memory load, but not under low working memory load. In Study 2, 53 undergraduates completed a dot probe task with fear-conditioned Japanese characters serving as threat stimuli. Trait anxiety predicted attentional bias to the threat stimuli but, again, this only occurred under high working memory load. Interestingly however, actual eye movements toward the threat stimuli were only associated with state anxiety, and this was not moderated by working memory load, suggesting that executive control regulates biased threat-processing downstream of initial input processes such as orienting. These results suggest that cognitive loads can exacerbate trait anxiety-related cognitive biases, and therefore represent a useful tool for assessing cognitive biases in future research. More importantly, since biased threat-processing has been implicated in the etiology and maintenance of anxiety, poor executive control may be a risk factor for anxiety disorders. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  2. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    PubMed Central

    Zhang, Tianyang; Xi, Sisi; Jin, Yan; Wu, Yanhong

    2017-01-01

    Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1). Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2). The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming. PMID:29081755

  3. Pervasive competition between threat and reward in the brain

    PubMed Central

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip

    2014-01-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the ‘salience hypothesis’, in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the ‘competition hypothesis’, the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. PMID:23547242

  4. Interactions between stereotype threat, subjective aging, and memory in older adults.

    PubMed

    Marquet, Manon; Missotten, Pierre; Dardenne, Benoit; Adam, Stéphane

    2017-12-08

    This study examined whether the effects of stereotype threat on memory and subjective age were moderated by positive age stereotypes and self-perceptions of aging among older adults. Perceived threat as a mechanism underlying these effects was also explored. Results showed that stereotype threat (high vs. low threat) did not affect the dependent variables. Moreover, self-perceptions of aging did not moderate the effect of stereotype threat on the dependent variables. However, for people with more positive age stereotypes, older people under highthreat perceived more threat than people under low threat. This could be explained by an effect of age stereotypes in the high-threat group: the more positive age stereotypes held by participants, the more they perceived threat, which in turn decreased their memory performance and made them feel mentally older. We hypothesized that age group identity is stronger in people with more positive age stereotypes, which increase perceived threat.

  5. Municipal Regulation of Hazardous Materials Due to the Threat of Terrorism and Its Effect on the Rail Industry

    DTIC Science & Technology

    2006-06-01

    stop the fire and clean up thousands of gallons of hydrochloric acid , tripropylene, and hydrofluoric acid (Associated Press, 2001). In March 2005 a... weaknesses and (3) evaluate and identify assets and infrastructure as to their importance to safety and the economy (GAO-03-435). This GAO report...leaking rail car outside Salt Lake City, containing a misidentified mix of hazardous waste acid and ammonia, caused the evacuation of over 8,000

  6. An examination of stereotype threat effects on girls' mathematics performance.

    PubMed

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias.

  7. Data fusion approach to threat assessment for radar resources management

    NASA Astrophysics Data System (ADS)

    Komorniczak, Wojciech; Pietrasinski, Jerzy; Solaiman, Basel

    2002-03-01

    The paper deals with the problem of the multifunction radar resources management. The problem consists of target/tasks ranking and tasks scheduling. The paper is focused on the target ranking, with the data fusion approach. The data from the radar (object's velocity, range, altitude, direction etc.), IFF system (Identification Friend or Foe) and ESM system (Electronic Support Measures - information concerning threat's electro - magnetic activities) is used to decide of the importance assignment for each detected target. The main problem consists of the multiplicity of various types of the input information. The information from the radar is of the probabilistic or ambiguous imperfection type and the IFF information is of evidential type. To take the advantage of these information sources the advanced data fusion system is necessary. The system should deal with the following situations: fusion of the evidential and fuzzy information, fusion of the evidential information and a'priori information. The paper describes the system which fuses the fuzzy and the evidential information without previous change to the same type of information. It is also described the proposal of using of the dynamic fuzzy qualifiers. The paper shows the results of the preliminary system's tests.

  8. Identity threat and stigma in cancer patients

    PubMed Central

    Marziliano, Allison; Moyer, Anne

    2014-01-01

    Cancer stigma has undergone an important transformation in recent decades. In general, this disease no longer fits squarely into Goffman’s classic taxonomy of stigmatized conditions. This review will demonstrate that, with important adaptations, an identity-threat model of stigma can be used to organize cancer stigma research post-Goffman. This adapted model postulates that one’s personal attributions, responses to situational threat, and disease/treatment characteristics can be used to predict identity threat and well-being of individuals with cancer. Implications for further research and clinical practice are discussed. PMID:28070343

  9. Forecasting extreme temperature health hazards in Europe

    NASA Astrophysics Data System (ADS)

    Di Napoli, Claudia; Pappenberger, Florian; Cloke, Hannah L.

    2017-04-01

    Extreme hot temperatures, such as those experienced during a heat wave, represent a dangerous meteorological hazard to human health. Heat disorders such as sunstroke are harmful to people of all ages and responsible for excess mortality in the affected areas. In 2003 more than 50,000 people died in western and southern Europe because of a severe and sustained episode of summer heat [1]. Furthermore, according to the Intergovernmental Panel on Climate Change heat waves are expected to get more frequent in the future thus posing an increasing threat to human lives. Developing appropriate tools for extreme hot temperatures prediction is therefore mandatory to increase public preparedness and mitigate heat-induced impacts. A recent study has shown that forecasts of the Universal Thermal Climate Index (UTCI) provide a valid overview of extreme temperature health hazards on a global scale [2]. UTCI is a parameter related to the temperature of the human body and its regulatory responses to the surrounding atmospheric environment. UTCI is calculated using an advanced thermo-physiological model that includes the human heat budget, physiology and clothing. To forecast UTCI the model uses meteorological inputs, such as 2m air temperature, 2m water vapour pressure and wind velocity at body height derived from 10m wind speed, from NWP models. Here we examine the potential of UTCI as an extreme hot temperature prediction tool for the European area. UTCI forecasts calculated using above-mentioned parameters from ECMWF models are presented. The skill in predicting UTCI for medium lead times is also analysed and discussed for implementation to international health-hazard warning systems. This research is supported by the ANYWHERE project (EnhANcing emergencY management and response to extreme WeatHER and climate Events) which is funded by the European Commission's HORIZON2020 programme. [1] Koppe C. et al., Heat waves: risks and responses. World Health Organization. Health and

  10. Evaluation of the public health risks associated with semivolatile metal and dioxin emissions from hazardous waste incinerators.

    PubMed Central

    Sedman, R M; Esparza, J R

    1991-01-01

    The public health impacts associated with stack emissions from hazardous waste incinerators have become a major concern in recent years. Most evaluations of incinerator stack emissions have focused on three classes of compounds: metals, semivolatile, and volatile compounds. These investigations have been complicated by the difficulty and expense of analyzing the emissions and the limited amount of toxicity information for many of the compounds that have been detected. The results of over 20 trial burns at hazardous waste incinerators were assembled in an attempt to determine which compounds may pose a significant threat to the public health. The risks associated with semivolatile emissions were found to be inconsequential, although further study of dioxins and dibenzofurans emissions appears to be warranted. The risk associated with the emission of cadmium and perhaps chromium (VI) may pose a significant risk to public health at certain facilities. Controls on waste feed or air pollution control devices should be employed to reduce the emission of these metals. Any monitoring of metal emissions from hazardous waste incinerators should focus on cadmium and chromium (VI). PMID:1954929

  11. High power microwave hazard facing smart ammunitions

    NASA Astrophysics Data System (ADS)

    Bohl, J.

    1995-03-01

    The battle field of the present and even more the one in future will be characterized by the use of weapon systems with a high degree of electronics, computers, and sensors, designed and built to keep not only the man out of the loop. But the higher the technology used for smart weapon systems, the more these systems are endangered by numerous sources of hazard. One of those sources is the threat caused by induced or natural electromagnetic fields. These threat factors can be generated by natural, civil and military environment. In principle there are two main applications which must be considered in military applications: Firstly, weapon systems, that is, high power microwave sources as well as intelligent electromagnetic radiation systems to defeat ammunition on the battle field and secondly, the hardening of the own smart ammunition systems and missiles against the interference sources created by the different types of electromagnetic fields. This report will discuss the possible electromagnetic coupling effects on smart ammunition and missiles and their typical interference caused on the electronics and sensor level. Real time 6-DOF simulations show the flight mission which may be compromised depending on the coupled electromagnetic fields. The German MOD has established a research program where smart ammunitions with different seeker systems are investigated in respect of the coupling effects on smart ammunition caused by high power microwaves. This program considers all available resources and know how in Germany. The systems are investigated by analytical, numerical, and experimental methods with passive and activated missiles.

  12. You may worry, but can you recognize threats when you see them?; Neuroticism, threat identifications, and negative affect.

    PubMed

    Tamir, Maya; Robinson, Michael D; Solberg, Emily Crawford

    2006-10-01

    The present studies sought to investigate the hedonic consequences of threat-identification skills at low and high levels of neuroticism. Such skills were assessed in terms of both speed (Study 1) and accuracy (Study 2) of identifying threatening objects in cognitive tasks. As predicted, threat-identification skills interacted with trait neuroticism in predicting subjective experiences. Specifically, individuals high in neuroticism experienced lower levels of negative affect during their everyday lives if they were also skilled in identifying threats in the cognitive tasks (Studies 1-2). Such skills did not matter at low levels of neuroticism. This interactive pattern was also replicated in the context of life domain satisfaction (Study 2). The results support the view that avoidance motivation encompasses multiple component processes, including some that are cognitive in nature, and specifically extends self-regulatory views of neuroticism. Of most importance, our data indicate that threat-identification skills can be hedonically beneficial, rather than costly, at high levels of neuroticism.

  13. Communicating Homeland Security Threats: Government and Public Efforts

    DTIC Science & Technology

    2010-12-01

    States has never operated at a threat level lower than blue - guarded risk. The Homeland Security Advisory Council’s primary recommendations included...changing the alert level baseline to blue (guarded risk). Their rationale for resetting the threat level baseline includes acknowledging that a...accustomed to the guarded blue level indicative of a general threat of terrorist attack. To assume that public officials and citizens would ever

  14. A new remote hazard and risk assessment framework for glacial lakes in the Nepal Himalaya

    NASA Astrophysics Data System (ADS)

    Rounce, David R.; McKinney, Daene C.; Lala, Jonathan M.; Byers, Alton C.; Watson, C. Scott

    2016-08-01

    Glacial lake outburst floods (GLOFs) pose a significant threat to downstream communities and infrastructure due to their potential to rapidly unleash stored lake water. The most common triggers of these GLOFs are mass movement entering the lake and/or the self-destruction of the terminal moraine due to hydrostatic pressures or a buried ice core. This study initially uses previous qualitative and quantitative assessments to understand the hazards associated with eight glacial lakes in the Nepal Himalaya that are widely considered to be highly dangerous. The previous assessments yield conflicting classifications with respect to each glacial lake, which spurred the development of a new holistic, reproducible, and objective approach based solely on remotely sensed data. This remote hazard assessment analyzes mass movement entering the lake, the stability of the moraine, and lake growth in conjunction with a geometric GLOF to determine the downstream impacts such that the present and future risk associated with each glacial lake may be quantified. The new approach is developed within a hazard, risk, and management action framework with the aim that this remote assessment may guide future field campaigns, modeling efforts, and ultimately risk-mitigation strategies. The remote assessment was found to provide valuable information regarding the hazards faced by each glacial lake and results were discussed within the context of the current state of knowledge to help guide future efforts.

  15. Dry bulk cargo shipping - An overlooked threat to the marine environment?

    PubMed

    Grote, Matthias; Mazurek, Nicole; Gräbsch, Carolin; Zeilinger, Jana; Le Floch, Stéphane; Wahrendorf, Dierk-Steffen; Höfer, Thomas

    2016-09-15

    Approximately 9.5billiontonnes of goods is transported over the world oceans annually with dry bulk representing the largest cargo group. This paper aims to analyse whether the transport and associated inputs of dry bulks into the sea create a risk for the marine environment. For this purpose, we analyse the international regulatory background concerning environmental protection (MARPOL), estimate quantities and identify inputs of such cargoes into the oceans (accidental and operational), and use available information for hazard assessment. Annually, more than 2.15milliontonnes of dry bulk cargoes are likely to enter the oceans, of which 100,000tonnes are potentially harmful to the marine environment according to the definition included in draft maritime regulation. The assessment of the threat to the marine environment is hampered by a lack of available information on chemical composition, bioavailability and toxicity. Perspectives for amendments of the unsatisfying pollution prevention regulations are discussed. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  16. Emergence of PPR and its threat to Europe.

    PubMed

    Parida, Satya; Muniraju, Murali; Altan, Eda; Baazizi, Ratiba; Raj, Gopal Dhinakar; Mahapatra, Mana

    2016-09-01

    PPR is an important infectious viral disease of domestic and wild small ruminants, that threatens the food security and sustainable livelihood of farmers across Africa, the Middle East and Asia. Europe is free of the disease except in Thrace (European part of Turkey) and Israel where outbreaks occur. Following the successful eradication of RPV, PPR has been targeted by the OIE and FAO as the next viral pathogen to be eradicated by 2030. However, the recent outbreaks in Northen Africa and Thrace (European part of Turkey) represent a significant threat to mainland Europe, as a source of disease spread. We have discussed here the emergence of PPR worldwide since its discovery with particular reference to the recent outbreaks in Northen Africa and Thrace, and the potential for spread of the disease into Europe.

  17. Demonstration of Hazardous Hypervelocity Test Capability

    NASA Technical Reports Server (NTRS)

    Rodriquez, Karen M.

    1991-01-01

    NASA Johnson Space Center (JSC) White Sands Test Facility (WSTF) participated in a joint test program with NASA JSC Hypervelocity Impact Research Laboratory (HIRL) to determine if JSC was capable of performing hypervelocity impact tests on hazardous targets. Seven pressurized vessels were evaluated under hypervelocity impact conditions. The vessels were tested with various combinations of liquids and gasses at various pressures. Results from the evaluation showed that vessels containing 100-percent pressurized gas sustained more severe damage and had a higher potential for damaging nearby equipment, than vessels containing 75-percent liquid, 25-percent inert pressurized gas. Two water-filled test vessels, one of which was placed behind an aluminum shield, failed by bulging and splitting open at the impact point; pressure was relieved without the vessel fragmenting or sustaining internal damage. An additional water-filled test vessel, placed a greater distance behind an aluminum shield, sustained damage that resembled a shotgun blast, but did not bulge or split open; again, pressure was relieved without the vessel fragmenting. Two test vessels containing volatile liquids (nitro methane and hydrazine) also failed by bulging and splitting open; neither liquid detonated under hypervelocity test conditions. A test vessel containing nitrogen gas failed by relieving pressure through a circular entry hole; multiple small penetrations opposite the point of entry provided high velocity target debris to surrounding objects. A high-pressure oxygen test vessel fragmented upon impact; the ensuing fire and high velocity fragments caused secondary damage to surrounding objects. The results from the evaluation of the pressurized vessels indicated that JSC is capable of performing hypervelocity impact tests on hazardous targets.

  18. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  19. Pervasive competition between threat and reward in the brain.

    PubMed

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  20. Attention Training and the Threat Bias: An ERP Study

    PubMed Central

    O’Toole, Laura; Dennis, Tracy A.

    2011-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these changes remain unclear. To address this issue, 49 non-anxious adults were randomly assigned to either attentional training toward or training away from threat using a modified version of the dot probe task. Behavioral measures of attentional biases were also generated pre- and post-training using the dot probe task. Event-related potentials (ERPs) were generated to threat and non-threat face pairs and probes during pre- and post-training assessments. Effects of training on behavioral measures of the threat bias were significant, but only for those participants showing pre-training biases. Attention training also influenced early spatial attention, as measured by post-training P1 amplitudes to cues. Results illustrate the importance of taking pre-training attention biases in non-anxious individuals into account when evaluating the effects of attention training and tracking physiological changes in attention following training. PMID:22083026