ERIC Educational Resources Information Center
Newton, Paul E.
2016-01-01
This paper argues that the dominant framework for conceptualizing validation evidence and analysis--the "five sources" framework from the 1999 "Standards"--is seriously limited. Its limitation raises a significant barrier to understanding the nature of comprehensive validation, and this presents a significant threat to…
Anxiety and Threat-Related Attention: Cognitive-Motivational Framework and Treatment.
Mogg, Karin; Bradley, Brendan P
2018-03-01
Research in experimental psychopathology and cognitive theories of anxiety highlight threat-related attention biases (ABs) and underpin the development of a computer-delivered treatment for anxiety disorders: attention-bias modification (ABM) training. Variable effects of ABM training on anxiety and ABs generate conflicting research recommendations, novel ABM training procedures, and theoretical controversy. This article summarises an updated cognitive-motivational framework, integrating proposals from cognitive models of anxiety and attention, as well as evidence of ABs. Interactions between motivational salience-driven and goal-directed influences on multiple cognitive processes (e.g., stimulus evaluation, inhibition, switching, orienting) underlie anxiety and the variable manifestations of ABs (orienting towards and away from threat; threat-distractor interference). This theoretical analysis also considers ABM training as cognitive skill training, describes a conceptual framework for evaluating/developing novel ABM training procedures, and complements network-based research on reciprocal anxiety-cognition relationships. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hoette, Trisha Marie
Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of themore » attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.« less
School-Based Decision Making: A Principal-Agent Perspective.
ERIC Educational Resources Information Center
Ferris, James M.
1992-01-01
A principal-agent framework is used to examine potential gains in educational performance and potential threats to public accountability that school-based decision-making proposals pose. Analysis underscores the need to tailor the design of decentralized decision making to the sources of poor educational performance and threats to school…
The wilderness threats matrix: A framework for assessing impacts
David N. Cole
1994-01-01
A comprehensive framework for assessing threats to wilderness is described. The framework is represented as a matrix of potential threats and attributes of wilderness character. Cells in the matrix represent the impacts of threats on each attribute. Potential applications of the matrix are described. An application of the matrix to the wildernesses in the Forest...
The comparative risk assessment framework and tools (CRAFT)
Southern Research Station USDA Forest Service
2010-01-01
To help address these challenges, the USDA Forest Serviceâs Eastern Forest Environmental Threat Assessment Center (EFETAC) and the University of North Carolina Ashevilleâs National Environmental Modeling and Analysis Center (NEMAC) designed a planning framework, called the Comparative Risk Assessment Framework and Tools (CRAFT). CRAFT is...
Using a Strategic Planning Tool as a Framework for Case Analysis
ERIC Educational Resources Information Center
Lai, Christine A.; Rivera, Julio C., Jr.
2006-01-01
In this article, the authors describe how they use a strategic planning tool known as SWOT as a framework for case analysis, using it to analyze the strengths, weaknesses, opportunities, and threats of a public works project intended to enhance regional economic development in Tempe, Arizona. Students consider the project in light of a variety of…
Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R
2013-01-01
In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardwaremore » and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.« less
ERIC Educational Resources Information Center
Schultz, Christopher
2012-01-01
Empirical research on information security trends and practices in e-learning is scarce. Many articles that have been published apply basic information security concepts to e-learning and list potential threats or propose frameworks for classifying threats. The purpose of this research is to identify, categorize and understand trends and issues in…
Critical asset and portfolio risk analysis: an all-hazards framework.
Ayyub, Bilal M; McGill, William L; Kaminskiy, Mark
2007-08-01
This article develops a quantitative all-hazards framework for critical asset and portfolio risk analysis (CAPRA) that considers both natural and human-caused hazards. Following a discussion on the nature of security threats, the need for actionable risk assessments, and the distinction between asset and portfolio-level analysis, a general formula for all-hazards risk analysis is obtained that resembles the traditional model based on the notional product of consequence, vulnerability, and threat, though with clear meanings assigned to each parameter. Furthermore, a simple portfolio consequence model is presented that yields first-order estimates of interdependency effects following a successful attack on an asset. Moreover, depending on the needs of the decisions being made and available analytical resources, values for the parameters in this model can be obtained at a high level or through detailed systems analysis. Several illustrative examples of the CAPRA methodology are provided.
Linux Incident Response Volatile Data Analysis Framework
ERIC Educational Resources Information Center
McFadden, Matthew
2013-01-01
Cyber incident response is an emphasized subject area in cybersecurity in information technology with increased need for the protection of data. Due to ongoing threats, cybersecurity imposes many challenges and requires new investigative response techniques. In this study a Linux Incident Response Framework is designed for collecting volatile data…
Exploring the function of selective attention and hypervigilance for threat in anxiety.
Richards, Helen J; Benson, Valerie; Donnelly, Nick; Hadwin, Julie A
2014-02-01
Theoretical frameworks of anxiety propose that attentional biases to threat-related stimuli cause or maintain anxious states. The current paper draws on theoretical frameworks and key empirical studies to outline the distinctive attentional processes highlighted as being important in understanding anxiety. We develop a conceptual framework to make a distinction between two attentional biases: selective attention to threat and hypervigilance for threat. We suggest that these biases each have a different purpose and can account for the typical patterns of facilitated and impaired attention evident in anxious individuals. The framework is novel in its specification of the eye movement behavior associated with these attentional biases. We highlight that selective attention involves narrowing overt attention onto threat to ensure that these stimuli receive processing priority, leading to rapid engagement with task-relevant threat and delayed disengagement from task-irrelevant threat. We show that hypervigilance operates in the presence and absence of threat and involves monitoring for potential dangers via attentional broadening or excessive scanning of the environment with numerous eye movements, leading to improved threat detection and increased distraction from task-irrelevant threat. We conclude that future research could usefully employ eye movement measures to more clearly understand the diverse roles of attention in anxiety. Copyright © 2013 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful
2017-09-01
Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.
NASA Astrophysics Data System (ADS)
Kehres, Jan; Lyksborg, Mark; Olsen, Ulrik L.
2017-09-01
Energy dispersive X-ray diffraction (EDXRD) can be applied for identification of liquid threats in luggage scanning in security applications. To define the instrumental design, the framework for data reduction and analysis and test the performance of the threat detection in various scenarios, a flexible laboratory EDXRD test setup was build. A data set of overall 570 EDXRD spectra has been acquired for training and testing of threat identification algorithms. The EDXRD data was acquired with limited count statistics and at multiple detector angles and merged after correction and normalization. Initial testing of the threat detection algorithms with this data set indicate the feasibility of detection levels of > 95 % true positive with < 6 % false positive alarms.
Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A
2016-01-01
The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity.
Holgado-Tello, Fco. P.; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A.
2016-01-01
The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991
Sequeira, R
1999-01-01
Foreign pest introductions and outbreaks represent threats to agricultural productivity and ecosystems, and, thus, to the health and national security of the United States. It is advisable to identify relevant techniques and bring all appropriate strategies to bear on the problem of controlling accidentally and intentionally introduced pest outbreaks. Recent political shifts indicate that the U.S. may be at increased risk for biological terrorism. The existing emergency-response strategies of the Animal and Plant Health Inspection Services (APHIS) will evolve to expand activities in coordination with other emergency management agencies. APHIS will evolve its information superstructure to include extensive application of simulation models for forecasting, meteorological databases and analysis, systems analysis, geographic information systems, satellite image analysis, remote sensing, and the training of specialized cadres within the emergency-response framework capable of managing the necessary information processing and analysis. Finally, the threat of key pests ranked according to perceived risk will be assessed with mathematical models and "what-if" scenarios analyzed to determine impact and mitigation practices. An infrastructure will be maintained that periodically surveys ports and inland regions for the presence of exotic pest threats and will identify trend abnormalities. This survey and monitoring effort will include cooperation from industry groups, federal and state organizations, and academic institutions.
Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.
Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A
2013-01-01
The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg
Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework
Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.
2013-01-01
Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. PMID:23736227
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greenwald, D.S.; Zeitlin, S.
Based on interviews with families from various ethnic and economic backgrounds, the authors look at the effect of the nuclear threat on family life, exploring such issues as how parents deal with their children's fears about the threat of nuclear war and the difficulty adolescents have committing themselves to the adult community in the nuclear age. Using Erik Erikson's stages of development as a framework, they move from early childhood to old age in their analysis of how families confront the nuclear issue.
Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework
NASA Astrophysics Data System (ADS)
Tsigkritis, Theocharis; Spanoudakis, George; Kloukinas, Christos; Lorenzoli, Davide
The SERENITY monitoring framework offers mechanisms for diagnosing the causes of violations of security and dependability (S&D) properties and detecting potential violations of such properties, called "Cthreats". Diagnostic information and threat detection are often necessary for deciding what an appropriate reaction to a violation is and taking pre-emptive actions against predicted violations, respectively. In this chapter, we describe the mechanisms of the SERENITY monitoring framework which generate diagnostic information for violations of S&D properties and detecting threats.
Threat evaluation for impact assessment in situation analysis systems
NASA Astrophysics Data System (ADS)
Roy, Jean; Paradis, Stephane; Allouche, Mohamad
2002-07-01
Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization approaches based on neural networks and other mathematical techniques.
Singh, Shweta R; Coker, Richard; Vrijhoef, Hubertus J-M; Leo, Yee Sin; Chow, Angela; Lim, Poh Lian; Tan, Qinghui; Chen, Mark I-Cheng; Hildon, Zoe Jane-Lara
2017-09-04
Hospital usage and service demand during an Infectious Disease (ID) outbreak can tax the health system in different ways. Herein we conceptualize hospital surge elements, and lessons learnt from such events, to help build appropriately matched responses to future ID surge threats. We used the Interpretive Descriptive qualitative approach. Interviews (n = 35) were conducted with governance and public health specialists; hospital based staff; and General Practitioners. Key policy literature in tandem with the interview data were used to iteratively generate a Hospital ID Surge framework. We anchored our narrative account within this framework, which is used to structure our analysis. A spectrum of surge threats from combinations of capacity (for crowding) and capability (for treatment complexity) demands were identified. Starting with the Pyramid scenario, or an influx of high screening rates flooding Emergency Departments, alongside fewer and manageable admissions; the Reverse-Pyramid occurs when few cases are screened and admitted but those that are, are complex; during a 'Black' scenario, the system is overburdened by both crowding and complexity. The Singapore hospital system is highly adapted to crowding, functioning remarkably well at constant near-full capacity in Peacetime and resilient to Endemic surges. We catalogue 26 strategies from lessons learnt relating to staffing, space, supplies and systems, crystalizing institutional memory. The DECIDE model advocates linking these strategies to types of surge threats and offers a step-by-step guide for coordinating outbreak planning and response. Lack of a shared definition and decision making of surge threats had rendered the procedures somewhat duplicative. This burden was paradoxically exacerbated by a health system that highly prizes planning and forward thinking, but worked largely in silo until an ID crisis hit. Many such lessons can be put into play to further strengthen our current hospital governance and adapted to more diverse settings.
Inferring the nature of anthropogenic threats from long-term abundance records.
Shoemaker, Kevin T; Akçakaya, H Resit
2015-02-01
Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of information into a common rigorous framework. Ultimately, our framework may greatly assist conservation organizations in documenting threatening processes and planning species recovery. © 2014 Society for Conservation Biology.
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
Threat driven modeling framework using petri nets for e-learning system.
Khamparia, Aditya; Pandey, Babita
2016-01-01
Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.
Flower power: the armoured expert in the CanMEDS competency framework?
Whitehead, Cynthia R; Austin, Zubin; Hodges, Brian D
2011-12-01
Competency frameworks based on roles definitions are currently being used extensively in health professions education internationally. One of the most successful and widely used models is the CanMEDS Roles Framework. The medical literature has raised questions about both the theoretical underpinnings and the practical application of outcomes-based frameworks, however little empirical research has yet been done examining specific roles frameworks. This study examines the historical development of an important early roles framework, the Educating Future Physicians of Ontario (EFPO) roles, which were instrumental in the development of the CanMEDS roles. Prominent discourses related to roles development are examined using critical discourse analysis methodology. Exploration of discourses that emerged in the development of this particular set of roles definitions highlights the contextual and negotiated nature of roles construction. The discourses of threat and protection prevalent in the EFPO roles development offer insight into the visual construction of a centre of medical expertise surrounded by supporting roles (such as collaborator and manager). Non-medical expert roles may perhaps play the part of 'armour' for the authority of medical expertise under threat. This research suggests that it may not be accurate to consider roles as objective ideals. Effective training models may require explicit acknowledgement of the socially negotiated and contextual nature of roles definitions.
Toward a Framework for Conducting Ecoregional Threats Assessments
Jamison Ervin; Jeffrey Parrish
2006-01-01
Assessing threats to biodiversity is widely recognized as a critical step in conservation planning. While there have been recent advances in understanding how to assess threats at a site level, there has been relatively little consensus on how threats can be meaningfully assessed at an ecoregional scale. Drawing from numerous threat assessment studies, this paper...
Towards a Threat Assessment Framework for Ecosystem Services.
Maron, Martine; Mitchell, Matthew G E; Runting, Rebecca K; Rhodes, Jonathan R; Mace, Georgina M; Keith, David A; Watson, James E M
2017-04-01
How can we tell if the ecosystem services upon which we rely are at risk of being lost, potentially permanently? Ecosystem services underpin human well-being, but we lack a consistent approach for categorizing the extent to which they are threatened. We present an assessment framework for assessing the degree to which the adequate and sustainable provision of a given ecosystem service is threatened. Our framework combines information on the states and trends of both ecosystem service supply and demand, with reference to two critical thresholds: demand exceeding supply and ecosystem service 'extinction'. This framework can provide a basis for global, national, and regional assessments of threat to ecosystem services, and accompany existing assessments of threat to species and ecosystems. Copyright © 2017 Elsevier Ltd. All rights reserved.
Modeling Human Behavior to Anticipate Insider Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Hohimer, Ryan E.
2011-06-09
The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach providesmore » automated support for the detection of high-risk behavioral “triggers” to help focus the analyst’s attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.« less
An Ecosystem Evaluation Framework for Global Seamount Conservation and Management
Taranto, Gerald H.; Kvile, Kristina Ø.; Pitcher, Tony J.; Morato, Telmo
2012-01-01
In the last twenty years, several global targets for protection of marine biodiversity have been adopted but have failed. The Convention on Biological Diversity (CBD) aims at preserving 10% of all the marine biomes by 2020. For achieving this goal, ecologically or biologically significant areas (EBSA) have to be identified in all biogeographic regions. However, the methodologies for identifying the best suitable areas are still to be agreed. Here, we propose a framework for applying the CBD criteria to locate potential ecologically or biologically significant seamount areas based on the best information currently available. The framework combines the likelihood of a seamount constituting an EBSA and its level of human impact and can be used at global, regional and local scales. This methodology allows the classification of individual seamounts into four major portfolio conservation categories which can help optimize management efforts toward the protection of the most suitable areas. The framework was tested against 1000 dummy seamounts and satisfactorily assigned seamounts to proper EBSA and threats categories. Additionally, the framework was applied to eight case study seamounts that were included in three out of four portfolio categories: areas highly likely to be identified as EBSA with high degree of threat; areas highly likely to be EBSA with low degree of threat; and areas with a low likelihood of being EBSA with high degree of threat. This framework will allow managers to identify seamount EBSAs and to prioritize their policies in terms of protecting undisturbed areas, disturbed areas for recovery of habitats and species, or both based on their management objectives. It also identifies seamount EBSAs and threats considering different ecological groups in both pelagic and benthic communities. Therefore, this framework may represent an important tool to mitigate seamount biodiversity loss and to achieve the 2020 CBD goals. PMID:22905190
An ecosystem evaluation framework for global seamount conservation and management.
Taranto, Gerald H; Kvile, Kristina Ø; Pitcher, Tony J; Morato, Telmo
2012-01-01
In the last twenty years, several global targets for protection of marine biodiversity have been adopted but have failed. The Convention on Biological Diversity (CBD) aims at preserving 10% of all the marine biomes by 2020. For achieving this goal, ecologically or biologically significant areas (EBSA) have to be identified in all biogeographic regions. However, the methodologies for identifying the best suitable areas are still to be agreed. Here, we propose a framework for applying the CBD criteria to locate potential ecologically or biologically significant seamount areas based on the best information currently available. The framework combines the likelihood of a seamount constituting an EBSA and its level of human impact and can be used at global, regional and local scales. This methodology allows the classification of individual seamounts into four major portfolio conservation categories which can help optimize management efforts toward the protection of the most suitable areas. The framework was tested against 1000 dummy seamounts and satisfactorily assigned seamounts to proper EBSA and threats categories. Additionally, the framework was applied to eight case study seamounts that were included in three out of four portfolio categories: areas highly likely to be identified as EBSA with high degree of threat; areas highly likely to be EBSA with low degree of threat; and areas with a low likelihood of being EBSA with high degree of threat. This framework will allow managers to identify seamount EBSAs and to prioritize their policies in terms of protecting undisturbed areas, disturbed areas for recovery of habitats and species, or both based on their management objectives. It also identifies seamount EBSAs and threats considering different ecological groups in both pelagic and benthic communities. Therefore, this framework may represent an important tool to mitigate seamount biodiversity loss and to achieve the 2020 CBD goals.
NASA Astrophysics Data System (ADS)
Olsen, Jolie; Sen, Sandip
2014-04-01
Steven Brams's [(1994). Theory of moves. Cambridge University Press] Theory of Moves (TOM) is an alternative to traditional game theoretic treatment of real-life interactions, in which players choose strategies based on analysis of future moves and counter-moves that arise if game play commences at a specified start state and either player can choose to move first. In repeated play, players using TOM rationality arrive at nonmyopic equilibria. One advantage of TOM is its ability to model scenarios in which power asymmetries exist between players. In particular, threat power, i.e. the ability of one player to threaten and sustain immediate, globally disadvantageous outcomes to force a desirable result long term, can be utilised to induce Pareto optimal states in games such as Prisoner's Dilemma which result in Pareto-dominated outcomes using traditional methods. Unfortunately, prior work on TOM is limited by an assumption of complete information. This paper presents a mechanism that can be used by a player to utilise threat power when playing a strict, ordinal 2×2 game under incomplete information. We also analyse the benefits of threat power and support in this analysis with empirical evidence.
Assessment of potential economic and environmental impacts caused by Phytophthora ramorum in Europe
Hella Kehlenbeck
2008-01-01
Economic and environmental impacts of Phytophthora ramorum in Europe were evaluated within the European Union framework 6 project on ?Risk Analysis for P. ramorum a pathogen threat to Europe? (RAPRA). Impact assessment was conducted according to three different scenarios: 1. ?Nursery System? - describes losses occurring in...
Analyzing the development of Indonesia shrimp industry
NASA Astrophysics Data System (ADS)
Wati, L. A.
2018-04-01
This research aimed to analyze the development of shrimp industry in Indonesia. Porter’s Diamond Theory was used for analysis. The Porter’s Diamond theory is one of framework for industry analysis and business strategy development. The Porter’s Diamond theory has five forces that determine the competitive intensity in an industry, namely (1) the threat of substitute products, (2) the threat of competition, (3) the threat of new entrants, (4) bargaining power of suppliers, and (5) bargaining power of consumers. The development of Indonesian shrimp industry pretty good, explained by Porter Diamond Theory analysis. Analysis of Porter Diamond Theory through four main components namely factor conditions; demand condition; related and supporting industries; and firm strategy, structure and rivalry coupled with a two-component supporting (regulatory the government and the factor of chance). Based on the result of this research show that two-component supporting (regulatory the government and the factor of chance) have positive. Related and supporting industries have negative, firm and structure strategy have negative, rivalry has positive, factor condition have positive (except science and technology resources).
A decision framework for managing risk to airports from terrorist attack.
Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R
2015-02-01
This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. © 2014 Society for Risk Analysis.
The impact of joint responses of devices in an airport security system.
Nie, Xiaofeng; Batta, Rajan; Drury, Colin G; Lin, Li
2009-02-01
In this article, we consider a model for an airport security system in which the declaration of a threat is based on the joint responses of inspection devices. This is in contrast to the typical system in which each check station independently declares a passenger as having a threat or not having a threat. In our framework the declaration of threat/no-threat is based upon the passenger scores at the check stations he/she goes through. To do this we use concepts from classification theory in the field of multivariate statistics analysis and focus on the main objective of minimizing the expected cost of misclassification. The corresponding correct classification and misclassification probabilities can be obtained by using a simulation-based method. After computing the overall false alarm and false clear probabilities, we compare our joint response system with two other independently operated systems. A model that groups passengers in a manner that minimizes the false alarm probability while maintaining the false clear probability within specifications set by a security authority is considered. We also analyze the staffing needs at each check station for such an inspection scheme. An illustrative example is provided along with sensitivity analysis on key model parameters. A discussion is provided on some implementation issues, on the various assumptions made in the analysis, and on potential drawbacks of the approach.
A cyber-event correlation framework and metrics
NASA Astrophysics Data System (ADS)
Kang, Myong H.; Mayfield, Terry
2003-08-01
In this paper, we propose a cyber-event fusion, correlation, and situation assessment framework that, when instantiated, will allow cyber defenders to better understand the local, regional, and global cyber-situation. This framework, with associated metrics, can be used to guide assessment of our existing cyber-defense capabilities, and to help evaluate the state of cyber-event correlation research and where we must focus our future cyber-event correlation research. The framework, based on the cyber-event gathering activities and analysis functions, consists of five operational steps, each of which provides a richer set of contextual information to support greater situational understanding. The first three steps are categorically depicted as increasingly richer and broader-scoped contexts achieved through correlation activity, while in the final two steps, these richer contexts are achieved through analytical activities (situation assessment, and threat analysis & prediction). Category 1 Correlation focuses on the detection of suspicious activities and the correlation of events from a single cyber-event source. Category 2 Correlation clusters the same or similar events from multiple detectors that are located at close proximity and prioritizes them. Finally, the events from different time periods and event sources at different location/regions are correlated at Category 3 to recognize the relationship among different events. This is the category that focuses on the detection of large-scale and coordinated attacks. The situation assessment step (Category 4) focuses on the assessment of cyber asset damage and the analysis of the impact on missions. The threat analysis and prediction step (Category 5) analyzes attacks based on attack traces and predicts the next steps. Metrics that can distinguish correlation and cyber-situation assessment tools for each category are also proposed.
Global Conservation Priorities for Marine Turtles
Wallace, Bryan P.; DiMatteo, Andrew D.; Bolten, Alan B.; Chaloupka, Milani Y.; Hutchinson, Brian J.; Abreu-Grobois, F. Alberto; Mortimer, Jeanne A.; Seminoff, Jeffrey A.; Amorocho, Diego; Bjorndal, Karen A.; Bourjea, Jérôme; Bowen, Brian W.; Briseño Dueñas, Raquel; Casale, Paolo; Choudhury, B. C.; Costa, Alice; Dutton, Peter H.; Fallabrino, Alejandro; Finkbeiner, Elena M.; Girard, Alexandre; Girondot, Marc; Hamann, Mark; Hurley, Brendan J.; López-Mendilaharsu, Milagros; Marcovaldi, Maria Angela; Musick, John A.; Nel, Ronel; Pilcher, Nicolas J.; Troëng, Sebastian; Witherington, Blair; Mast, Roderic B.
2011-01-01
Where conservation resources are limited and conservation targets are diverse, robust yet flexible priority-setting frameworks are vital. Priority-setting is especially important for geographically widespread species with distinct populations subject to multiple threats that operate on different spatial and temporal scales. Marine turtles are widely distributed and exhibit intra-specific variations in population sizes and trends, as well as reproduction and morphology. However, current global extinction risk assessment frameworks do not assess conservation status of spatially and biologically distinct marine turtle Regional Management Units (RMUs), and thus do not capture variations in population trends, impacts of threats, or necessary conservation actions across individual populations. To address this issue, we developed a new assessment framework that allowed us to evaluate, compare and organize marine turtle RMUs according to status and threats criteria. Because conservation priorities can vary widely (i.e. from avoiding imminent extinction to maintaining long-term monitoring efforts) we developed a “conservation priorities portfolio” system using categories of paired risk and threats scores for all RMUs (n = 58). We performed these assessments and rankings globally, by species, by ocean basin, and by recognized geopolitical bodies to identify patterns in risk, threats, and data gaps at different scales. This process resulted in characterization of risk and threats to all marine turtle RMUs, including identification of the world's 11 most endangered marine turtle RMUs based on highest risk and threats scores. This system also highlighted important gaps in available information that is crucial for accurate conservation assessments. Overall, this priority-setting framework can provide guidance for research and conservation priorities at multiple relevant scales, and should serve as a model for conservation status assessments and priority-setting for widespread, long-lived taxa. PMID:21969858
Using a Learning Progression Framework to Assess and Evaluate Student Growth
ERIC Educational Resources Information Center
Briggs, Derek C.; Diaz-Bilello, Elena; Peck, Fred; Alzen, Jessica; Chattergoon, Rajendra; Johnson, Raymond
2015-01-01
This report describes the use of a Learning Progression Framework (LPF) to support the Student Learning Objectives (SLO) process. The report highlights a few common threats we currently see in the SLO process implemented at various states and districts, and offers the LPF as a possible solution for addressing these threats. This report was…
2010-12-01
discovered that the NSA is concerned about speaker recognition being vulnerable to man- in-the-middle ( MITM ) attacks. The professional could tailor an MITM ...with the results of the test against the MITM threat. The Collective Acquisition framework comprises powerful search techniques found in the CRC
Christiansen, Terkel
2002-02-01
The organisation and financing of the Danish health care system was evaluated within a framework of a SWOT analysis (analysis of strengths, weaknesses, opportunities and threats) by a panel of five members with a background in health economics. This paper systematically summarises the panel's assessments, within the framework of the triangular model of health care. The members of the panel are in agreement on a number of aspects, while their views on other aspects differ. In general they find many strength in the way the system is organised and financed more so in the primary sector than in the hospital sector.
Using the 'protective environment' framework to analyse children's protection needs in Darfur.
Ager, Alastair; Boothby, Neil; Bremer, Megan
2009-10-01
A major humanitarian concern during the continuing crisis in Darfur, Sudan, has been the protection of children, although there has been little in the way of comprehensive analysis to guide intervention. Founded on a situational analysis conducted between October 2005 and March 2006, this paper documents the significant threats to children's well-being directly linked to the political conflict. It demonstrates the role of non-conflict factors in exacerbating these dangers and in promoting additional protection violations, and it uses the 'protective environment' framework (UNICEF Sudan, 2006a) to identify systematic features of the current environment that put children at risk. This framework is shown to provide a coherent basis for assessment and planning, prompting broad, multidisciplinary analysis, concentrating on preventive and protective action, and fostering a systemic approach (rather than placing an undue focus on the discrete needs of 'vulnerable groups'). Constraints on its present utility in emergency settings are also noted.
Sumner, Jennifer A.; Powers, Abigail; Jovanovic, Tanja; Koenen, Karestan C.
2015-01-01
The NIMH Research Domain Criteria (RDoC) initiative aims to describe key dimensional constructs underlying mental function across multiple units of analysis—from genes to observable behaviors—in order to better understand psychopathology. The acute threat (“fear”) construct of the RDoC Negative Valence System has been studied extensively from a translational perspective, and is highly pertinent to numerous psychiatric conditions, including anxiety and trauma-related disorders. We examined genetic contributions to the construct of acute threat at two units of analysis within the RDoC framework: 1) neural circuits and 2) physiology. Specifically, we focused on genetic influences on activation patterns of frontolimbic neural circuitry and on startle, skin conductance, and heart rate responses. Research on the heritability of activation in threat-related frontolimbic neural circuitry is lacking, but physiological indicators of acute threat have been found to be moderately heritable (35-50%). Genetic studies of the neural circuitry and physiology of acute threat have almost exclusively relied on the candidate gene method and, as in the broader psychiatric genetics literature, most findings have failed to replicate. The most robust support has been demonstrated for associations between variation in the serotonin transporter (SLC6A4) and catechol-O-methyltransferase (COMT) genes with threat-related neural activation and physiological responses. However, unbiased genome-wide approaches using very large samples are needed for gene discovery, and these can be accomplished with collaborative consortium-based research efforts, such as those of the Psychiatric Genomics Consortium (PGC) and Enhancing Neuro Imaging Genetics through Meta-Analysis (ENIGMA) Consortium. PMID:26377804
Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam
2013-02-01
To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.
Trajectory-Based Performance Assessment for Aviation Weather Information
NASA Technical Reports Server (NTRS)
Vigeant-Langlois, Laurence; Hansman, R. John, Jr.
2003-01-01
Based on an analysis of aviation decision-makers' time-related weather information needs, an abstraction of the aviation weather decision task was developed, that involves 4-D intersection testing between aircraft trajectory hypertubes and hazardous weather hypervolumes. The framework builds on the hypothesis that hazardous meteorological fields can be simplified using discrete boundaries of surrogate threat attributes. The abstractions developed in the framework may be useful in studying how to improve the performance of weather forecasts from the trajectory-centric perspective, as well as for developing useful visualization techniques of weather information.
McDonald, Renee; Grych, John H
2006-03-01
The present study investigated 2 questions pertinent to understanding developmental aspects of children's conflict appraisals: (a) Do 7- to 9-year-old children make reliable distinctions between their perceptions of conflict and their appraisals of threat and self-blame? (b) Do threat and blame appraisals mediate the association between exposure to interparental conflict and adjustment problems in this age group? Factor analysis of a new version of the Children's Perception of Interparental Conflict Scale (CPIC-Y) designed for younger children showed that 179 7- to 9-year-old children distinguished properties of conflict from their appraisals of it. Moreover, as predicted by the cognitive-contextual framework, threat and self-blame appraisals mediated the link between conflict and internalizing problems but not externalizing problems. This study provides compelling evidence that appraisals of interparental conflict can be reliably measured at relatively young ages and suggests that perceptions of threat and self-blame function similarly in 7- to 9-year-olds as they do in older children. Copyright 2006 APA, all rights reserved.
Towards a framework for assessment and management of cumulative human impacts on marine food webs.
Giakoumi, Sylvaine; Halpern, Benjamin S; Michel, Loïc N; Gobert, Sylvie; Sini, Maria; Boudouresque, Charles-François; Gambi, Maria-Cristina; Katsanevakis, Stelios; Lejeune, Pierre; Montefalcone, Monica; Pergent, Gerard; Pergent-Martini, Christine; Sanchez-Jerez, Pablo; Velimirov, Branko; Vizzini, Salvatrice; Abadie, Arnaud; Coll, Marta; Guidetti, Paolo; Micheli, Fiorenza; Possingham, Hugh P
2015-08-01
Effective ecosystem-based management requires understanding ecosystem responses to multiple human threats, rather than focusing on single threats. To understand ecosystem responses to anthropogenic threats holistically, it is necessary to know how threats affect different components within ecosystems and ultimately alter ecosystem functioning. We used a case study of a Mediterranean seagrass (Posidonia oceanica) food web and expert knowledge elicitation in an application of the initial steps of a framework for assessment of cumulative human impacts on food webs. We produced a conceptual seagrass food web model, determined the main trophic relationships, identified the main threats to the food web components, and assessed the components' vulnerability to those threats. Some threats had high (e.g., coastal infrastructure) or low impacts (e.g., agricultural runoff) on all food web components, whereas others (e.g., introduced carnivores) had very different impacts on each component. Partitioning the ecosystem into its components enabled us to identify threats previously overlooked and to reevaluate the importance of threats commonly perceived as major. By incorporating this understanding of system vulnerability with data on changes in the state of each threat (e.g., decreasing domestic pollution and increasing fishing) into a food web model, managers may be better able to estimate and predict cumulative human impacts on ecosystems and to prioritize conservation actions. © 2015 Society for Conservation Biology.
Hybrid methods for cybersecurity analysis :
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Warren Leon,; Dunlavy, Daniel M.
2014-01-01
Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling andmore » analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and years to hours and days for the application of new modeling and analysis capabilities to emerging threats. The development and deployment framework has been generalized into the Hybrid Framework and incor- porated into several LDRD, WFO, and DOE/CSL projects and proposals. And most importantly, the Hybrid project has provided Sandia security analysts with new, scalable, extensible analytic capabilities that have resulted in alerts not detectable using their previous work ow tool sets.« less
Using Decision Analysis to Improve Malaria Control Policy Making
Kramer, Randall; Dickinson, Katherine L.; Anderson, Richard M.; Fowler, Vance G.; Miranda, Marie Lynn; Mutero, Clifford M.; Saterson, Kathryn A.; Wiener, Jonathan B.
2013-01-01
Malaria and other vector-borne diseases represent a significant and growing burden in many tropical countries. Successfully addressing these threats will require policies that expand access to and use of existing control methods, such as insecticide-treated bed nets and artemesinin combination therapies for malaria, while weighing the costs and benefits of alternative approaches over time. This paper argues that decision analysis provides a valuable framework for formulating such policies and combating the emergence and re-emergence of malaria and other diseases. We outline five challenges that policy makers and practitioners face in the struggle against malaria, and demonstrate how decision analysis can help to address and overcome these challenges. A prototype decision analysis framework for malaria control in Tanzania is presented, highlighting the key components that a decision support tool should include. Developing and applying such a framework can promote stronger and more effective linkages between research and policy, ultimately helping to reduce the burden of malaria and other vector-borne diseases. PMID:19356821
Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam
2013-01-01
To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232
Assessing the potential threat landscape of a proposed reintroduction site for carnivores.
Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T
2015-01-01
This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.
ERIC Educational Resources Information Center
Taylor, Rebecca M.
2017-01-01
Debates about indoctrination raise fundamental questions about the ethics of teaching. This paper presents a philosophical analysis of indoctrination, including 1) an account of what indoctrination is and why it is harmful, and 2) a framework for understanding the responsibilities of teachers and other educational actors to avoid its negative…
A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)
Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.
2007-01-01
The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an example of the type of results generated, we estimated that the probability of the manatee population falling to less than 250 adults on either the Atlantic or Gulf coasts (from a current statewide population size of near 3300) within 100 years is 8.6%. Complete removal of the watercraft threat alone would reduce this risk to 0.4%; complete removal of the warm-water threat to 4.2%; removal of both threats would reduce the risk to 0.1%. The modeling approach we have taken also allows us to consider partial removal of threats, as well as removal of multiple threats simultaneously. We believe the measure we have proposed (probability of quasi-extinction over y years, with quasi-extinction defined as dropping below a threshold of z on either coast) is a suitable measure of status that integrates a number of the elements that are relevant to interpretation under the ESA (it directly integrates risk of extinction and reduction of range, and indirectly integrates loss of genetic diversity). But the identification of the time frame of interest and the tolerable risk of quasi-extinction are policy decisions, and an ecology-based quasi-extinction threshold has not yet been determined. We have endeavored to provide results over a wide range of these parameters to give decision-makers useful information to assess status. This assessment of threats suggests that watercraft-related mortality is having the greatest impact on manatee population growth and resilience. Elimination of this single threat would greatly reduce the probability of quasi-extinction. Loss of warm-water is also a significant threat, particularly over the long-term. Red tide and entanglement, while noticeable threats, have had less of an impact on the manatee population. The effect of water control structures may have already been largely mitigated. We did not, however, consider an exhaustive list of threats. Other threats (e.g., reduction of food resources due to storms and development) may play a
Flash flood disasters analysis and evaluation: a case study of Yiyang County in China
NASA Astrophysics Data System (ADS)
Li, Haichen; Zhang, Xiaolei; Li, Qing; Qin, Tao; Lei, Xiaohui
2018-03-01
Global climate change leads to the more extreme precipitation and more flash flood disasters, which is a serious threat to the mountain inhabitants. To prevent flash flood disasters, China started flash flood disaster control planning and other projects from 2006. Among those measures, non-engineering measures are effective and economical. This paper introduced the framework of flash flood disaster analysis and evaluation in China, followed by a case study of Yiyang County.
Pezdevšek Malovrh, Špela; Kurttila, Mikko; Hujala, Teppo; Kärkkäinen, Leena; Leban, Vasja; Lindstad, Berit H; Peters, Dörte Marie; Rhodius, Regina; Solberg, Birger; Wirth, Kristina; Zadnik Stirn, Lidija; Krč, Janez
2016-09-15
Complex policy-making situations around bioenergy production and use require examination of the operational environment of the society and a participatory approach. This paper presents and demonstrates a three-phase decision-making framework for analysing the operational environment of strategies related to increased forest bioenergy targets. The framework is based on SWOT (strengths, weaknesses, opportunities and threats) analysis and the Simple Multi-Attribute Rating Technique (SMART). Stakeholders of four case countries (Finland, Germany, Norway and Slovenia) defined the factors that affect the operational environments, classified in four pre-set categories (Forest Characteristics and Management, Policy Framework, Technology and Science, and Consumers and Society). The stakeholders participated in weighting of SWOT items for two future scenarios with SMART technique. The first scenario reflected the current 2020 targets (the Business-as-Usual scenario), and the second scenario contained a further increase in the targets (the Increase scenario). This framework can be applied to various problems of environmental management and also to other fields where public decision-making is combined with stakeholders' engagement. The case results show that the greatest differences between the scenarios appear in Germany, indicating a notably negative outlook for the Increase scenario, while the smallest differences were found in Finland. Policy Framework was a highly rated category across the countries, mainly with respect to weaknesses and threats. Intensified forest bioenergy harvesting and utilization has potentially wide country-specific impacts which need to be anticipated and considered in national policies and public dialogue. Copyright © 2016 Elsevier Ltd. All rights reserved.
Three tenets for secure cyber-physical system design and assessment
NASA Astrophysics Data System (ADS)
Hughes, Jeff; Cybenko, George
2014-06-01
This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.
A systematic analysis of influenza vaccine shortage policies.
Uscher-Pines, Lori; Barnett, Daniel J; Sapsin, Jason W; Bishai, David M; Balicer, Ran D
2008-02-01
The aim of this study was to apply SWOT analysis (strengths, weaknesses, opportunities, threats) to a domestic shortage of influenza vaccine, to identify lessons learned, and to generate effective solutions for future public health rationing emergencies. SWOT and TOWS techniques were employed to characterize the vulnerability of the USA to disruptions in the supply of influenza vaccine. A group of five researchers reviewed relevant literature, engaged in group brainstorming, and categorized elements according to the SWOT framework. Three strengths, five weaknesses, five threats and seven opportunities were identified in the areas of vaccine production, purchasing and distribution, and provision. Four future recommendations emerged with respect to government investment, communications, sanctioning of physicians, and incident command. Application of the SWOT technique is highly relevant to the health policy realm and can assist public health planners in planning for future resource scarcity.
Dunne, Simon; Gallagher, Pamela; Matthews, Anne
2015-01-01
Using a terror management theory framework, this study investigated if providing mortality reminders or self-esteem threats would lead participants to exhibit avoidant responses toward a point-of-care testing device for cardiovascular disease risk and if the nature of the device served to diminish the existential threat of cardiovascular disease. One hundred and twelve participants aged 40-55 years completed an experimental questionnaire. Findings indicated that participants were not existentially threatened by established terror management methodologies, potentially because of cross-cultural variability toward such methodologies. Highly positive appraisals of the device also suggest that similar technologies may beneficially affect the uptake of screening behaviors.
A framework for the study of coping, illness behaviour and outcomes.
Shaw, C
1999-05-01
This paper presents a theoretical framework for the study of coping, illness attribution, health behaviour and outcomes. It is based upon models developed within health psychology and aims to provide a theoretical basis for nurse researchers to utilize psychosocial variables. It is an interactionist model which views outcomes as dependent upon both situation and person variables. The situation is viewed as the health threat or illness symptoms as well as the psychosocial context within which the person is operating. This context includes socio-economic factors, social support, social norms, and external factors such as the mass media. The experience of health threat is dependent upon individual appraisal, and the framework incorporates Folkman and Lazarus' transactional model of stress, as well as Leventhal's illness representation model. Behaviour and the perception of threat are also dependent upon outcome expectancies and the appraisal of one's own coping resources, and so the concepts of locus of control and self-efficacy are also incorporated. This framework allows one to identify determinants of behaviour and outcome, and will aid nurses in identifying areas for psycho-social intervention.
Policy guidance on threats to legislative interventions in public health: a realist synthesis.
Wong, Geoff; Pawson, Ray; Owen, Lesley
2011-04-10
Legislation is one of the most powerful weapons for improving population health and is often used by policy and decision makers. Little research exists to guide them as to whether legislation is feasible and/or will succeed. We aimed to produce a coherent and transferable evidence based framework of threats to legislative interventions to assist the decision making process and to test this through the 'case study' of legislation to ban smoking in cars carrying children. We conceptualised legislative interventions as a complex social interventions and so used the realist synthesis method to systematically review the literature for evidence. 99 articles were found through searches on five electronic databases (MEDLINE, HMIC, EMBASE, PsychINFO, Social Policy and Practice) and iterative purposive searching. Our initial searches sought any studies that contained information on smoking in vehicles carrying children. Throughout the review we continued where needed to search for additional studies of any type that would conceptually contribute to helping build and/or test our framework. Our framework identified a series of transferable threats to public health legislation. When applied to smoking bans in vehicles; problem misidentification; public support; opposition; and enforcement issues were particularly prominent threats. Our framework enabled us to understand and explain the nature of each threat and to infer the most likely outcome if such legislation were to be proposed in a jurisdiction where no such ban existed. Specifically, the micro-environment of a vehicle can contain highly hazardous levels of second hand smoke. Public support for such legislation is high amongst smokers and non-smokers and their underlying motivations were very similar - wanting to practice the Millian principle of protecting children from harm. Evidence indicated that the tobacco industry was not likely to oppose legislation and arguments that such a law would be 'unenforceable' were unfounded. It is possible to develop a coherent and transferable evidence based framework of the ideas and assumptions behind the threats to legislative intervention that may assist policy and decision makers to analyse and judge if legislation is feasible and/or likely to succeed.
Policy guidance on threats to legislative interventions in public health: a realist synthesis
2011-01-01
Background Legislation is one of the most powerful weapons for improving population health and is often used by policy and decision makers. Little research exists to guide them as to whether legislation is feasible and/or will succeed. We aimed to produce a coherent and transferable evidence based framework of threats to legislative interventions to assist the decision making process and to test this through the 'case study' of legislation to ban smoking in cars carrying children. Methods We conceptualised legislative interventions as a complex social interventions and so used the realist synthesis method to systematically review the literature for evidence. 99 articles were found through searches on five electronic databases (MEDLINE, HMIC, EMBASE, PsychINFO, Social Policy and Practice) and iterative purposive searching. Our initial searches sought any studies that contained information on smoking in vehicles carrying children. Throughout the review we continued where needed to search for additional studies of any type that would conceptually contribute to helping build and/or test our framework. Results Our framework identified a series of transferable threats to public health legislation. When applied to smoking bans in vehicles; problem misidentification; public support; opposition; and enforcement issues were particularly prominent threats. Our framework enabled us to understand and explain the nature of each threat and to infer the most likely outcome if such legislation were to be proposed in a jurisdiction where no such ban existed. Specifically, the micro-environment of a vehicle can contain highly hazardous levels of second hand smoke. Public support for such legislation is high amongst smokers and non-smokers and their underlying motivations were very similar - wanting to practice the Millian principle of protecting children from harm. Evidence indicated that the tobacco industry was not likely to oppose legislation and arguments that such a law would be 'unenforceable' were unfounded. Conclusion It is possible to develop a coherent and transferable evidence based framework of the ideas and assumptions behind the threats to legislative intervention that may assist policy and decision makers to analyse and judge if legislation is feasible and/or likely to succeed. PMID:21477347
Psychological Coercion in Human Trafficking: An Application of Biderman's Framework.
Baldwin, Susie B; Fehrenbacher, Anne E; Eisenman, David P
2015-09-01
This study examined coercive conditions experienced by trafficked persons in the context of Biderman's theory of coercion. We conducted semi-structured interviews with 12 adult women trafficked into Los Angeles County, from 10 countries, for domestic work and/or sex work. Participants described health problems they experienced in relation to their trafficking experience and their perceptions of conditions that caused health problems. Utilizing a framework analysis approach, we analyzed themes using Biderman's framework. Participants reported experiencing the range of nonphysical coercive tactics outlined by Biderman, including isolation, monopolization of perception, induced debility or exhaustion, threats, occasional indulgences, demonstration of omnipotence, degradation, and enforcement of trivial demands. Our analysis demonstrates how these coercion tactics reinforced the submission of trafficked persons to their traffickers even in the absence of physical force or restraints. Such psychological abuse creates extreme stress that can lead to acute and chronic, physical and mental health problems. © The Author(s) 2014.
2007-04-01
Guanarito virus, Lassa fever • Bunyaviruses. Hantaviruses, Rift Valley fever • Flaviviruses. Dengue • Filoviruses. Ebola, Marburg Category B...Viruses V1. Chikungunya virus V2. Congo-Crimean haemorrhagic fever virus V3. Dengue fever virus...current context and an extensive set of interviews with subject matter experts (SME). After preliminary conversations with experts and scanning initial
Assessing the Potential Threat Landscape of a Proposed Reintroduction Site for Carnivores
Page, Samantha K.; Parker, Daniel M.; Peinke, Dean M.; Davies-Mostert, Harriet T.
2015-01-01
This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent’s first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid. PMID:25822468
Chambers, Jeanne C.; Maestas, Jeremy D.; Pyke, David A.; Boyd, Chad S.; Pellant, Mike; Wuenschel, Amarina
2017-01-01
Conservation of imperiled species often demands addressing a complex suite of threats that undermine species viability. Regulatory approaches, such as the US Endangered Species Act (1973), tend to focus on anthropogenic threats through adoption of policies and regulatory mechanisms. However, persistent ecosystem-based threats, such as invasive species and altered disturbance regimes, remain critical issues for most at-risk species considered to be conservation-reliant. We describe an approach for addressing persistent ecosystem threats to at-risk species based on ecological resilience and resistance concepts that is currently being used to conserve greater sage-grouse (Centrocercus urophasianus)and sagebrush ecosystems. The approach links biophysical indicators of ecosystem resilience and resistance with species-specific population and habitat requisites in a risk-based framework to identify priority areas for management and guide allocation of resources to manage persistent ecosystem-based threats. US federal land management and natural resource agencies have adopted this framework as a foundation for prioritizing sage-grouse conservation resources and determining effective restoration and management strategies. Because threats and strategies to address them cross-cut program areas, an integrated approach that includes wildland fire operations, postfire rehabilitation, fuels management, and habitat restoration is being used. We believe this approach is applicable to species conservation in other largely intact ecosystems with persistent, ecosystem-based threats.
Uncertainties in the governance of animal disease: an interdisciplinary framework for analysis
Fish, Robert; Austin, Zoe; Christley, Robert; Haygarth, Philip M.; Heathwaite, Louise A.; Latham, Sophia; Medd, William; Mort, Maggie; Oliver, David M.; Pickup, Roger; Wastling, Jonathan M.; Wynne, Brian
2011-01-01
Uncertainty is an inherent feature of strategies to contain animal disease. In this paper, an interdisciplinary framework for representing strategies of containment, and analysing how uncertainties are embedded and propagated through them, is developed and illustrated. Analysis centres on persistent, periodic and emerging disease threats, with a particular focus on cryptosporidiosis, foot and mouth disease and avian influenza. Uncertainty is shown to be produced at strategic, tactical and operational levels of containment, and across the different arenas of disease prevention, anticipation and alleviation. The paper argues for more critically reflexive assessments of uncertainty in containment policy and practice. An interdisciplinary approach has an important contribution to make, but is absent from current real-world containment policy. PMID:21624922
A SWOT analysis of the organization and financing of the Danish health care system.
Christiansen, Terkel
2002-02-01
The organization and financing of the Danish health care system was evaluated within a framework of a SWOT analysis (analysis of Strengths, Weaknesses, Opportunities and Threats) by a panel of five members with a background in health economics. The present paper describes the methods and materials used for the evaluation: selection of panel members, structure of the evaluation task according to the health care triangle model, selection of background material consisting of documents and literature on the Danish health care system, and a 1-week study visit.
Framework for managing mycotoxin risks in the food industry.
Baker, Robert C; Ford, Randall M; Helander, Mary E; Marecki, Janusz; Natarajan, Ramesh; Ray, Bonnie
2014-12-01
We propose a methodological framework for managing mycotoxin risks in the food processing industry. Mycotoxin contamination is a well-known threat to public health that has economic significance for the food processing industry; it is imperative to address mycotoxin risks holistically, at all points in the procurement, processing, and distribution pipeline, by tracking the relevant data, adopting best practices, and providing suitable adaptive controls. The proposed framework includes (i) an information and data repository, (ii) a collaborative infrastructure with analysis and simulation tools, (iii) standardized testing and acceptance sampling procedures, and (iv) processes that link the risk assessments and testing results to the sourcing, production, and product release steps. The implementation of suitable acceptance sampling protocols for mycotoxin testing is considered in some detail.
2011-05-04
UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER...13 The general considerations for shaping operations are to organize and train forces, rehearse for future actions, maintaining operational area...threat. In reality, however, a prudent intelligence organization will begin to develop these products as indications develop that the shaping
NASA Astrophysics Data System (ADS)
Brandon, R.; Page, S.; Varndell, J.
2012-06-01
This paper presents a novel application of Evidential Reasoning to Threat Assessment for critical infrastructure protection. A fusion algorithm based on the PCR5 Dezert-Smarandache fusion rule is proposed which fuses alerts generated by a vision-based behaviour analysis algorithm and a-priori watch-list intelligence data. The fusion algorithm produces a prioritised event list according to a user-defined set of event-type severity or priority weightings. Results generated from application of the algorithm to real data and Behaviour Analysis alerts captured at London's Heathrow Airport under the EU FP7 SAMURAI programme are presented. A web-based demonstrator system is also described which implements the fusion process in real-time. It is shown that this system significantly reduces the data deluge problem, and directs the user's attention to the most pertinent alerts, enhancing their Situational Awareness (SA). The end-user is also able to alter the perceived importance of different event types in real-time, allowing the system to adapt rapidly to changes in priorities as the situation evolves. One of the key challenges associated with fusing information deriving from intelligence data is the issue of Data Incest. Techniques for handling Data Incest within Evidential Reasoning frameworks are proposed, and comparisons are drawn with respect to Data Incest management techniques that are commonly employed within Bayesian fusion frameworks (e.g. Covariance Intersection). The challenges associated with simultaneously dealing with conflicting information and Data Incest in Evidential Reasoning frameworks are also discussed.
Matching species traits to projected threats and opportunities from climate change
Garcia, Raquel A; Araújo, Miguel B; Burgess, Neil D; Foden, Wendy B; Gutsche, Alexander; Rahbek, Carsten; Cabeza, Mar
2014-01-01
Aim Climate change can lead to decreased climatic suitability within species' distributions, increased fragmentation of climatically suitable space, and/or emergence of newly suitable areas outside present distributions. Each of these extrinsic threats and opportunities potentially interacts with specific intrinsic traits of species, yet this specificity is seldom considered in risk assessments. We present an analytical framework for examining projections of climate change-induced threats and opportunities with reference to traits that are likely to mediate species' responses, and illustrate the applicability of the framework. Location Sub-Saharan Africa. Methods We applied the framework to 195 sub-Saharan African amphibians with both available bioclimatic envelope model projections for the mid-21st century and trait data. Excluded were 500 narrow-ranging species mainly from montane areas. For each of projected losses, increased fragmentation and gains of climate space, we selected potential response-mediating traits and examined the spatial overlap with vulnerability due to these traits. We examined the overlap for all species, and individually for groups of species with different combinations of threats and opportunities. Results In the Congo Basin and arid Southern Africa, projected losses for wide-ranging amphibians were compounded by sensitivity to climatic variation, and expected gains were precluded by poor dispersal ability. The spatial overlap between exposure and vulnerability was more pronounced for species projected to have their climate space contracting in situ or shifting to distant geographical areas. Our results exclude the potential exposure of narrow-ranging species to shrinking climates in the African tropical mountains. Main conclusions We illustrate the application of a framework combining spatial projections of climate change exposure with traits that are likely to mediate species' responses. Although the proposed framework carries several assumptions that require further scrutiny, its application adds a degree of realism to familiar assessments that consider all species to be equally affected by climate change-induced threats and opportunities. PMID:25505356
Seekins, Tom; White, Glen W
2013-01-01
Researchers and disability advocates have been debating consumer involvement in disability and rehabilitation science since at least 1972. Despite the length of this debate, much confusion remains. Consumer involvement may represent a spirit of democracy or even empowerment, but as a tool of science, it is necessary to understand how to judge its application. To realize consumer involvement as a design element in science, researchers need a framework for understanding how it can contribute to the scientific process. The thesis of this article is that a primary scientific function of consumer involvement is to reduce threats to the social validity of research, the extent to which those expected to use or benefit from research products judge them as useful and actually use them. Social validity has traditionally not been treated with the same rigor as concerns for internal and external validity. This article presents a framework that describes 7 threats to social validity and explains how 15 forms of consumer involvement protect against those threats. We also suggest procedures for reporting and reviewing consumer involvement in proposals and manuscripts. This framework offers tools familiar to all scientists for identifying threats to the quality of research, and for judging the effectiveness of strategies for protecting against those threats. It may also enhance the standing of consumer involvement strategies as tools for protecting research quality by organizing them in a way that allows for systematic criticism of their effectiveness and subsequent improvement. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.
A Statistical Framework for Analyzing Cyber Threats
defender cares most about the attacks against certain ports or services). The grey-box statistical framework formulates a new methodology of Cybersecurity ...the design of prediction models. Our research showed that the grey-box framework is effective in predicting cybersecurity situational awareness.
Shapiro, Jenessa R
2011-04-01
Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.
A proposed framework to operationalize ESS for the mitigation of soil threats
NASA Astrophysics Data System (ADS)
Schwilch, Gudrun; Bernet, Lea; Fleskens, Luuk; Mills, Jane; Stolte, Jannes; van Delden, Hedwig; Verzandvoort, Simone
2015-04-01
Despite various research activities in the last decades across the world, many challenges remain to integrate the concept of ecosystem services (ESS) in decision-making, and a coherent approach to assess and value ESS is still lacking. There are a lot of different - often context-specific - ESS frameworks with their own definitions and understanding of terms. Based on a thorough review, the EU FP7 project RECARE (www.recare-project.eu) suggests an adapted framework for ecosystem services related to soils that can be used for practical application in preventing and remediating degradation of soils in Europe. This lays the foundation for the development and selection of appropriate methods to measure, evaluate, communicate and negotiate the services we obtain from soils with stakeholders in order to improve land management. Similar to many ESS frameworks, the RECARE framework distinguishes between an ecosystem and human well-being part. As the RECARE project is focused on soil threats, this is the starting point on the ecosystem part of the framework. Soil threats affect natural capital, such as soil, water, vegetation, air and animals, and are in turn influenced by those. Within the natural capital, the RECARE framework focuses especially on soil and its properties, classified in inherent and manageable properties. The natural capital then enables and underpins soil processes, while at the same time being affected by those. Soil processes, finally, are the ecosystem's capacity to provide services, thus they support the provision of soil functions and ESS. ESS may be utilized to produce benefits for individuals and human society. Those benefits are explicitly or implicitly valued by individuals and human society. The values placed on those benefits influence policy and decision-making and thus lead to a societal response. Individual (e.g. farmers') and societal decision making and policy determine land management and other (human) driving forces, which in turn affect soil threats and natural capital. In order to improve ESS with Sustainable Land Management (SLM) - i.e. measures aimed to prevent or remediate soil threats, the services identified in the framework need to be "manageable" (modifiable) for the stakeholders. To this end, effects of soil threats and prevention / remediation measures are captured by key soil properties as well as through bio-physical (e.g. reduced soil loss), socio-economic (e.g. reduced workload) and socio-cultural (e.g. aesthetics) impact indicators. In order to use such indicators in RECARE, it should be possible to associate the changes in soil processes to impacts of prevention / remediation measures (SLM). This requires the indicators to be sensitive enough to small changes, but still sufficiently robust to provide evidence of the change and attribute it to SLM. The RECARE ESS framework will be presented and discussed in order to further develop its operationalization. Inputs from the conference participants are highly welcome.
Jetz, Walter; Freckleton, Robert P
2015-02-19
In taxon-wide assessments of threat status many species remain not included owing to lack of data. Here, we present a novel spatial-phylogenetic statistical framework that uses a small set of readily available or derivable characteristics, including phylogenetically imputed body mass and remotely sensed human encroachment, to provide initial baseline predictions of threat status for data-deficient species. Applied to assessed mammal species worldwide, the approach effectively identifies threatened species and predicts the geographical variation in threat. For the 483 data-deficient species, the models predict highly elevated threat, with 69% 'at-risk' species in this set, compared with 22% among assessed species. This results in 331 additional potentially threatened mammals, with elevated conservation importance in rodents, bats and shrews, and countries like Colombia, Sulawesi and the Philippines. These findings demonstrate the future potential for combining phylogenies and remotely sensed data with species distributions to identify species and regions of conservation concern. © 2015 The Author(s) Published by the Royal Society. All rights reserved.
Threat and error management for anesthesiologists: a predictive risk taxonomy
Ruskin, Keith J.; Stiegler, Marjorie P.; Park, Kellie; Guffey, Patrick; Kurup, Viji; Chidester, Thomas
2015-01-01
Purpose of review Patient care in the operating room is a dynamic interaction that requires cooperation among team members and reliance upon sophisticated technology. Most human factors research in medicine has been focused on analyzing errors and implementing system-wide changes to prevent them from recurring. We describe a set of techniques that has been used successfully by the aviation industry to analyze errors and adverse events and explain how these techniques can be applied to patient care. Recent findings Threat and error management (TEM) describes adverse events in terms of risks or challenges that are present in an operational environment (threats) and the actions of specific personnel that potentiate or exacerbate those threats (errors). TEM is a technique widely used in aviation, and can be adapted for the use in a medical setting to predict high-risk situations and prevent errors in the perioperative period. A threat taxonomy is a novel way of classifying and predicting the hazards that can occur in the operating room. TEM can be used to identify error-producing situations, analyze adverse events, and design training scenarios. Summary TEM offers a multifaceted strategy for identifying hazards, reducing errors, and training physicians. A threat taxonomy may improve analysis of critical events with subsequent development of specific interventions, and may also serve as a framework for training programs in risk mitigation. PMID:24113268
Devitt, C; Boyle, L; Teixeira, D L; O'Connell, N E; Hawe, M; Hanlon, A
2016-01-01
A SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis is a strategic management tool applied to policy planning and decision-making. This short report presents the results of a SWOT analysis, carried out with n = 16 stakeholders i) involved in the pig industry in the Republic of Ireland and Northern Ireland, and ii) in general animal welfare and food safety policy areas. As part of a larger study called PIGWELFIND, the analysis sought to explore the potential development of pig meat inspection as an animal welfare and diagnostic tool. The final SWOT framework comprised two strengths, three opportunities, six weaknesses, and five threats. Issues around relationships and communication between producers and their veterinary practitioner, processors and producers were common to both the strengths and weakness clusters. Practical challenges within the processing plant were also named. Overall, the SWOT framework complements results reported in Devitt et al. (Ir Vet J 69:2, 2016) regarding problematic issues within the current system of information feedback on meat inspection especially within the Republic of Ireland, and the wider challenges of communication and problems of distrust. The results of the SWOT analysis support the conclusions from Devitt et al. (Ir Vet J 69:2, 2016), that trust between all stakeholders across the supply chain will be essential for the development of an effective environment in which to realise the full diagnostic potential of MI data. Further stakeholder engagement could seek to apply the findings of the SWOT analysis to a policy Delphi methodology, as used elsewhere.
Wallace, Bryan P.; DiMatteo, Andrew D.; Hurley, Brendan J.; Finkbeiner, Elena M.; Bolten, Alan B.; Chaloupka, Milani Y.; Hutchinson, Brian J.; Abreu-Grobois, F. Alberto; Amorocho, Diego; Bjorndal, Karen A.; Bourjea, Jerome; Bowen, Brian W.; Dueñas, Raquel Briseño; Casale, Paolo; Choudhury, B. C.; Costa, Alice; Dutton, Peter H.; Fallabrino, Alejandro; Girard, Alexandre; Girondot, Marc; Godfrey, Matthew H.; Hamann, Mark; López-Mendilaharsu, Milagros; Marcovaldi, Maria Angela; Mortimer, Jeanne A.; Musick, John A.; Nel, Ronel; Pilcher, Nicolas J.; Seminoff, Jeffrey A.; Troëng, Sebastian; Witherington, Blair; Mast, Roderic B.
2010-01-01
Background Resolving threats to widely distributed marine megafauna requires definition of the geographic distributions of both the threats as well as the population unit(s) of interest. In turn, because individual threats can operate on varying spatial scales, their impacts can affect different segments of a population of the same species. Therefore, integration of multiple tools and techniques — including site-based monitoring, genetic analyses, mark-recapture studies and telemetry — can facilitate robust definitions of population segments at multiple biological and spatial scales to address different management and research challenges. Methodology/Principal Findings To address these issues for marine turtles, we collated all available studies on marine turtle biogeography, including nesting sites, population abundances and trends, population genetics, and satellite telemetry. We georeferenced this information to generate separate layers for nesting sites, genetic stocks, and core distributions of population segments of all marine turtle species. We then spatially integrated this information from fine- to coarse-spatial scales to develop nested envelope models, or Regional Management Units (RMUs), for marine turtles globally. Conclusions/Significance The RMU framework is a solution to the challenge of how to organize marine turtles into units of protection above the level of nesting populations, but below the level of species, within regional entities that might be on independent evolutionary trajectories. Among many potential applications, RMUs provide a framework for identifying data gaps, assessing high diversity areas for multiple species and genetic stocks, and evaluating conservation status of marine turtles. Furthermore, RMUs allow for identification of geographic barriers to gene flow, and can provide valuable guidance to marine spatial planning initiatives that integrate spatial distributions of protected species and human activities. In addition, the RMU framework — including maps and supporting metadata — will be an iterative, user-driven tool made publicly available in an online application for comments, improvements, download and analysis. PMID:21253007
Research and development targeted at identifying and mitigating Internet security threats require current network data. To fulfill this need... researchers working for the Center for Applied Internet Data Analysis (CAIDA), a program at the San Diego Supercomputer Center (SDSC) which is based at the...vetted network and security researchers using the PREDICT/IMPACT portal and legal framework. We have also contributed to community building efforts that
Threat interferes with response inhibition.
Hartikainen, Kaisa M; Siiskonen, Anna R; Ogawa, Keith H
2012-05-09
A potential threat, such as a spider, captures attention and engages executive functions to adjust ongoing behavior and avoid danger. We and many others have reported slowed responses to neutral targets in the context of emotional distractors. This behavioral slowing has been explained in the framework of attentional competition for limited resources with emotional stimuli prioritized. Alternatively, slowed performance could reflect the activation of avoidance/freezing-type motor behaviors associated with threat. Although the interaction of attention and emotion has been widely studied, little is known on the interaction between emotion and executive functions. We studied how threat-related stimuli (spiders) interact with executive performance and whether the interaction profile fits with a resource competition model or avoidance/freezing-type motor behaviors. Twenty-one young healthy individuals performed a Go-NoGo visual discrimination reaction time (RT) task engaging several executive functions with threat-related and emotionally neutral distractors. The threat-related distractors had no effect on the RT or the error rate in the Go trials. The NoGo error rate, reflecting failure in response inhibition, increased significantly because of threat-related distractors in contrast to neutral distractors, P less than 0.05. Thus, threat-related distractors temporarily impaired response inhibition. Threat-related distractors associated with increased commission errors and no effect on RT does not suggest engagement of avoidance/freezing-type motor behaviors. The results fit in the framework of the resource competition model. A potential threat calls for evaluation of affective significance as well as inhibition of undue emotional reactivity. We suggest that these functions tax executive resources and may render other executive functions, such as response inhibition, temporarily compromised when the demands for resources exceed availability.
NASA Astrophysics Data System (ADS)
Margitus, Michael R.; Tagliaferri, William A., Jr.; Sudit, Moises; LaMonica, Peter M.
2012-06-01
Understanding the structure and dynamics of networks are of vital importance to winning the global war on terror. To fully comprehend the network environment, analysts must be able to investigate interconnected relationships of many diverse network types simultaneously as they evolve both spatially and temporally. To remove the burden from the analyst of making mental correlations of observations and conclusions from multiple domains, we introduce the Dynamic Graph Analytic Framework (DYGRAF). DYGRAF provides the infrastructure which facilitates a layered multi-modal network analysis (LMMNA) approach that enables analysts to assemble previously disconnected, yet related, networks in a common battle space picture. In doing so, DYGRAF provides the analyst with timely situation awareness, understanding and anticipation of threats, and support for effective decision-making in diverse environments.
Lemyre, Louise; Clément, Mélanie; Corneil, Wayne; Craig, Lorraine; Boutette, Paul; Tyshenko, Michael; Karyakina, Nataliya; Clarke, Robert; Krewski, Daniel
2005-01-01
Evidence in the disaster mental health literature indicates that psychosocial consequences of terrorism are a critical component of chemical, biological, radiological, and nuclear (CBRN) events, both at the clinical level and the normal behavioral and emotional levels. Planning for such psychosocial aspects should be an integral part of emergency preparedness. As Canada and other countries build the capacity to prevent, mitigate, and manage CBRN threats and events, it is important to recognize the range of social, psychological, emotional, spiritual, behavioral, and cognitive factors that may affect victims and their families, communities, children, the elderly, responders, decision makers, and others at all phases of terrorism, from threat to post-impact recovery. A structured process to assist CBRN emergency planners, decision makers, and responders in identifying psychosocial risks, vulnerable populations, resources, and interventions at various phases of a CBRN event to limit negative psychosocial impacts and promote resilience and adaptive responses is the essence of our psychosocial risk assessment and management (P-RAM) framework. This article presents the evidence base and conceptual underpinnings of the framework, the principles underlying its design, its key elements, and its use in the development of decision tools for responders, planners, decision makers, and the general public to better assess and manage psychosocial aspects of CBRN threats or attacks.
Putting all your eggs in one basket: life-history strategies, bet hedging, and diversification.
White, Andrew Edward; Li, Yexin Jessica; Griskevicius, Vladas; Neuberg, Steven L; Kenrick, Douglas T
2013-05-01
Diversification of resources is a strategy found everywhere from the level of microorganisms to that of giant Wall Street investment firms. We examine the functional nature of diversification using life-history theory-a framework for understanding how organisms navigate resource-allocation trade-offs. This framework suggests that diversification may be adaptive or maladaptive depending on one's life-history strategy and that these differences should be observed under conditions of threat. In three studies, we found that cues of mortality threat interact with one index of life-history strategy, childhood socioeconomic status (SES), to affect diversification. Among those from low-SES backgrounds, mortality threat increased preferences for diversification. However, among those from high-SES backgrounds, mortality threat had the opposite effect, inclining people to put all their eggs in one basket. The same interaction pattern emerged with a potential biomarker of life-history strategy, oxidative stress. These findings highlight when, and for whom, different diversification strategies can be advantageous.
Spencer, Steven J; Logel, Christine; Davies, Paul G
2016-01-01
When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.
Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.
2014-01-01
We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210
Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C
2013-07-01
We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Meador, Audrey
2018-01-01
Prior research regarding minorities in the science, technology, engineering, and mathematics (STEM) fields indicated that the factors of peer support and participation in STEM-related activities contributed positively to minority students' recruitment and retention in these fields. Utilizing stereotype threat as a conceptual framework, this…
Reusser, Deborah A.; Lee, Henry
2011-01-01
Threats to marine and estuarine species operate over many spatial scales, from nutrient enrichment at the watershed/estuarine scale to invasive species and climate change at regional and global scales. To help address research questions across these scales, we provide here a standardized framework for a biogeographical information system containing queriable biological data that allows extraction of information on multiple species, across a variety of spatial scales based on species distributions, natural history attributes and habitat requirements. As scientists shift from research on localized impacts on individual species to regional and global scale threats, macroecological approaches of studying multiple species over broad geographical areas are becoming increasingly important. The standardized framework described here for capturing and integrating biological and geographical data is a critical first step towards addressing these macroecological questions and we urge organizations capturing biogeoinformatics data to consider adopting this framework.
Teaching Political Science in the Arab World.
ERIC Educational Resources Information Center
Habiby, Raymond
There are many impediments to the development of political science as a true academic discipline in the Arab world. Each nation has its own ideological and political framework, and freedoms are determined within this framework. To operate outside this framework is considered an attack on the legality of the system and a possible threat to national…
Oliveira, Rui F.; Faustino, Ana I.
2017-01-01
ABSTRACT Group living animals can use the behavior of others as cues for the presence of threat in the environment and adjust their behavior accordingly. Therefore, different social phenomena that modulate the response to threat, such as social buffering, social transmission (contagion), and facilitation of alarm responses can be seen as different manifestations of social information use in threat detection. Thus, social phenomena that are functionally antagonistic, such as social buffering and social transmission of fear, may rely on shared neurobehavioral mechanisms related to the use of social information in decision-making about the presence of threat in the environment. Here, we propose a unifying conceptual framework for the study of social information use in threat perception based on signal detection theory.
Kossowska, Małgorzata; Trejtowicz, Mariusz; de Lemus, Soledad; Bukowski, Marcin; Van Hiel, Alain; Goodwin, Robin
2011-05-01
The present study tested the role of right-wing authoritarianism (RWA), terrorist threat, and sociopolitical 'climate' as predictors of support for governmental anti-terrorism policies and actions. Two dimensions of analysis were defined: the presence versus absence of al-Qaeda attacks, and adherence to surveillance versus anti-surveillance mainstream politics. In order to study the influence of these two contextual dimensions on the expression of attitudes, we selected four European countries that fall into these two dimensions--Poland, Belgium, Spain, and the UK. Results from our study provide support for the contention that attitudes towards restrictions of civil rights are related to RWA independently of the cultural context. Moreover, in the UK sample, we found that the threat of terrorism increases acceptance of limitations of civil liberties, but only among people who hold authoritarian beliefs. However, in Spain, the other country that experienced terrorist attacks, this moderation effect was not found which is interpreted in terms of differences in the sociopolitical climate in both countries. As predicted, we did not find such moderation effect in countries in which threat is relatively low (Poland and Belgium). The results are discussed with reference to the conceptual framework based on the importance of fear experiences, security-focused policies, as well as the specific cultural context in the study of reaction to terrorist threat. ©2010 The British Psychological Society.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lawton, Craig R.
2015-01-01
The military is undergoing a significant transformation as it modernizes for the information age and adapts to address an emerging asymmetric threat beyond traditional cold war era adversaries. Techniques such as traditional large-scale, joint services war gaming analysis are no longer adequate to support program evaluation activities and mission planning analysis at the enterprise level because the operating environment is evolving too quickly. New analytical capabilities are necessary to address modernization of the Department of Defense (DoD) enterprise. This presents significant opportunity to Sandia in supporting the nation at this transformational enterprise scale. Although Sandia has significant experience with engineeringmore » system of systems (SoS) and Complex Adaptive System of Systems (CASoS), significant fundamental research is required to develop modeling, simulation and analysis capabilities at the enterprise scale. This report documents an enterprise modeling framework which will enable senior level decision makers to better understand their enterprise and required future investments.« less
Sizo, Anton; Noble, Bram F; Bell, Scott
2016-03-01
This paper presents and demonstrates a spatial framework for the application of strategic environmental assessment (SEA) in the context of change analysis for urban wetland environments. The proposed framework is focused on two key stages of the SEA process: scoping and environmental baseline assessment. These stages are arguably the most information-intense phases of SEA and have a significant effect on the quality of the SEA results. The study aims to meet the needs for proactive frameworks to assess and protect wetland habitat and services more efficiently, toward the goal of advancing more intelligent urban planning and development design. The proposed framework, adopting geographic information system and remote sensing tools and applications, supports the temporal evaluation of wetland change and sustainability assessment based on landscape indicator analysis. The framework was applied to a rapidly developing urban environment in the City of Saskatoon, Saskatchewan, Canada, analyzing wetland change and land-use pressures from 1985 to 2011. The SEA spatial scale was rescaled from administrative urban planning units to an ecologically meaningful area. Landscape change assessed was based on a suite of indicators that were subsequently rolled up into a single, multi-dimensional, and easy to understand and communicate index to examine the implications of land-use change for wetland sustainability. The results show that despite the recent extremely wet period in the Canadian prairie region, land-use change contributed to increasing threats to wetland sustainability.
NASA Astrophysics Data System (ADS)
Sizo, Anton; Noble, Bram F.; Bell, Scott
2016-03-01
This paper presents and demonstrates a spatial framework for the application of strategic environmental assessment (SEA) in the context of change analysis for urban wetland environments. The proposed framework is focused on two key stages of the SEA process: scoping and environmental baseline assessment. These stages are arguably the most information-intense phases of SEA and have a significant effect on the quality of the SEA results. The study aims to meet the needs for proactive frameworks to assess and protect wetland habitat and services more efficiently, toward the goal of advancing more intelligent urban planning and development design. The proposed framework, adopting geographic information system and remote sensing tools and applications, supports the temporal evaluation of wetland change and sustainability assessment based on landscape indicator analysis. The framework was applied to a rapidly developing urban environment in the City of Saskatoon, Saskatchewan, Canada, analyzing wetland change and land-use pressures from 1985 to 2011. The SEA spatial scale was rescaled from administrative urban planning units to an ecologically meaningful area. Landscape change assessed was based on a suite of indicators that were subsequently rolled up into a single, multi-dimensional, and easy to understand and communicate index to examine the implications of land-use change for wetland sustainability. The results show that despite the recent extremely wet period in the Canadian prairie region, land-use change contributed to increasing threats to wetland sustainability.
van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter
2015-01-01
The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.
Durso, Francis T; Ferguson, Ashley N; Kazi, Sadaf; Cunningham, Charlene; Ryan, Christina
2015-03-01
Part of the work of a critical care nurse is to manage the threats that arise that could impede efficient and effective job performance. Nurses manage threats by employing various strategies to keep performance high and workload manageable. We investigated strategic threat management by using the Threat-Strategy Interview. Threats frequently involved technology, staff, or organizational components. The threats were managed by a toolbox of multifaceted strategies, the most frequent of which involved staff-, treatment- (patient + technology), examination- (patient + clinician), and patient-oriented strategies. The profile of strategies for a particular threat often leveraged work facets similar to the work facet that characterized the threat. In such cases, the nurse's strategy was directed at eliminating the threat (not working around it). A description at both a domain invariant level - useful for understanding strategic threat management generally - and a description at an operational, specific level - useful for guiding interventions-- are presented. A structural description of the relationship among threats, strategies, and the cues that trigger them is presented in the form of an evidence accumulation framework of strategic threat management. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Mission Continuity Planning: Strategically Assessing and Planning for Threats to Operations.
ERIC Educational Resources Information Center
Qayoumi, Mohammad H.
This book covers the principles of risk and risk management and offers a framework for analyzing the significant, often unforeseen threats facing higher education institutions today. It examines the critical elements of a disaster preparedness plan and addresses business continuity and mission continuity planning. The book also provides tools for…
Counter-terrorism threat prediction architecture
NASA Astrophysics Data System (ADS)
Lehman, Lynn A.; Krause, Lee S.
2004-09-01
This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model adaptation (learning). The increasingly complex demands facing analysts evaluating activity threatening to the security of the United States make the family of agent-based data collection (fusion) a promising area. This paper will discuss a system to support the collection and evaluation of potential threat activity as well as an approach fro presentation of the information.
An Examination of Age-Based Stereotype Threat About Cognitive Decline.
Barber, Sarah J
2017-01-01
"Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.
Barber, Sarah J.
2017-01-01
“Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332
Palliative Care in Latin America from the Professional Perspective: A SWOT Analysis.
Pastrana, Tania; Centeno, Carlos; De Lima, Liliana
2015-05-01
The development of palliative care (PC) in Latin America (LA) has been slow compared to other regions. A Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis may contribute to the identification of barriers and successful strategies. The study's objective was to conduct a SWOT analysis of the development of PC in LA from the PC professional perspective. Experts from 19 countries of the region were selected in collaboration with national associations. Specific questions were included in the Latin American Association for Palliative Care (ALCP) Atlas of Palliative Care cross-survey 2012. Content analysis was conducted categorizing responses in a SWOT framework. Descriptive and correlation analyses were performed. A total of 577 statements were provided. Among the Strengths were integration into health systems and increasing number of professionals with PC training. Among weaknesses were lack of national PC programs, limited connection between policymakers and professionals, and barriers in the availability of opioids. Opportunities were increased awareness of policymakers and higher interest of students and professionals. Threats were competing funding for other services and medications, limited interest of the pharmaceutical industry in producing affordable opioid medications, and emphasis by the media on opioid diversion and abuse. Comments were categorized under (1) health policy, (2) education and research, (3) service provision, (4) opioid availability, and (5) advocacy. A moderately positive correlation was found (R=0.4 in both) between the ALCP development index and the number of positive/negative factors mentioned by country. A SWOT framework is applicable in a situational analysis and helps to identify common aspects among the countries and key elements in the development of PC in Latin America.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Frincke, Deborah A.
2010-09-01
The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, so as to move from an insider threat detection stance to one that enables prediction of potential insider presence. Two distinctive aspects of the approach are the objective of predicting or anticipating potential risks and the use of organizational data in addition to cyber data to support the analysis. The chapter describes the challenges of this endeavor and progress in defining a usable set of predictive indicators, developing a framework for integrating the analysis of organizational and cyber security data tomore » yield predictions about possible insider exploits, and developing the knowledge base and reasoning capability of the system. We also outline the types of errors that one expects in a predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.« less
A United States national prioritization framework for tree species vulnerability to climate change
Kevin M. Potter; Barbara S. Crane; William W. Hargrove
2017-01-01
Climate change is one of several threats that will increase the likelihood that forest tree species could experience population-level extirpation or species-level extinction. Scientists and managers from throughout the United States Forest Service have cooperated to develop a framework for conservation priority-setting assessments of forest tree species. This framework...
NASA Astrophysics Data System (ADS)
Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.
2016-03-01
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.
NASA Astrophysics Data System (ADS)
Petit, Olivier; Kuper, Marcel; López-Gunn, Elena; Rinaudo, Jean-Daniel; Daoudi, Ali; Lejars, Caroline
2017-09-01
The aim of this paper is to investigate the notion of collapse of agricultural groundwater economies using the adaptive-cycle analytical framework. This framework was applied to four case studies in southern Europe and North Africa to question and discuss the dynamics of agricultural groundwater economies. In two case studies (Saiss in Morocco and Clain basin in France), the imminent physical or socio-economic collapse was a major concern for stakeholders and the early signs of collapse led to re-organization of the groundwater economy. In the other two cases (Biskra in Algeria and Almeria in Spain), collapse was either not yet a concern or had been temporarily resolved through increased efficiency and access to additional water resources. This comparative analysis shows the importance of taking the early signs of collapse into account. These signs can be either related to resource depletion or to environmental and socio-economic impacts. Beyond these four case studies, the large number of groundwater economies under threat in (semi-)arid areas should present a warning regarding their possible collapse. Collapse can have severe and irreversible consequences in some cases, but it can also mean new opportunities and changes.
Effective protective surveillance for waterside-located chemical plants
NASA Astrophysics Data System (ADS)
Love, John; Van Dover, Doug
2006-05-01
Millions of citizens live and work in the dangerous proximity of chemical plants, at ports and along waterways, which are under-protected and whose security is under-regulated, according to findings of the Congressional Research Service (CRS). There is a new and intense focus on the security of the nation's critical infrastructure. Thanks to recent philosophy and policy shifts within our federal government, the alarming situations in which we find ourselves will be mitigated somewhat a) by setting priorities based on proper threat analysis that considers event likelihoods and consequential impacts, and b) by employing effective systems design and engineering that will make it possible to address the highest priority threats with affordable solutions. It is the latter concern that we address, especially as it is relates to design and engineering of solutions for maintaining vigilance night and day. We begin by reviewing the nature of the facilities we wish to protect, our assumptions, and an accepted framework for analysis. Next we outline a hypothetical design case involving a representative facility and a plausible design basis threat. We then derive requirements for surveillance and examine the interrelationships among key design variables. Finally, we describe a solution involving multiple sensor types coupled with intelligent video. The end result is a significant increase in interdiction probability with a minimum of required assets.
On the (In)Validity of Tests of Simple Mediation: Threats and Solutions
Pek, Jolynn; Hoyle, Rick H.
2015-01-01
Mediation analysis is a popular framework for identifying underlying mechanisms in social psychology. In the context of simple mediation, we review and discuss the implications of three facets of mediation analysis: (a) conceptualization of the relations between the variables, (b) statistical approaches, and (c) relevant elements of design. We also highlight the issue of equivalent models that are inherent in simple mediation. The extent to which results are meaningful stem directly from choices regarding these three facets of mediation analysis. We conclude by discussing how mediation analysis can be better applied to examine causal processes, highlight the limits of simple mediation, and make recommendations for better practice. PMID:26985234
Willke, Richard J; Neumann, Peter J; Garrison, Louis P; Ramsey, Scott D
2018-02-01
The sixth section of our Special Task Force (STF) report reviews and comments on recent US-oriented value assessment frameworks, specifically those published by the American College of Cardiology/American Heart Association, the Institute for Clinical and Economic Research, the American Society of Clinical Oncology, the National Comprehensive Cancer Network, and the Memorial Sloan Kettering Cancer Center. We review published commentaries that address the validity, reliability, and conceptual underpinnings of these frameworks. We find common themes of critique regarding the strengths and limitations across frameworks. Particular shortcomings of some frameworks pose greater threats to their face validity and utility compared with others. The most significant limitations include lack of clear perspective (e.g., patient vs. health plan) and poor transparency in accounting for costs and benefits. We then review how each framework adheres to core STF recommendations, with particular emphasis on whether the framework can be used to support coverage decisions by health insurers, and whether it adheres to core principles of cost-effectiveness analysis. The Institute for Clinical and Economic Research framework most closely adheres to core STF recommendations. Others have significant limitations that vary widely from framework to framework. We also review how the frameworks follow STF recommendations for addressing potentially relevant issues beyond cost-effectiveness analysis - for example, equity in resource allocation and patient heterogeneity. Finally, we review whether and how each framework uses value thresholds and addresses affordability concerns. We conclude with suggestions for further research, particularly in the areas of testing the measurement and use of novel elements of value and deliberative processes. Copyright © 2018 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.
Technosocial Modeling of IED Threat Scenarios and Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.
2009-03-23
This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less
Best practices in ranking communicable disease threats: a literature review, 2015.
O'Brien, Eleanor Charlotte; Taft, Rachel; Geary, Katie; Ciotti, Massimo; Suk, Jonathan E
2016-04-28
The threat of serious, cross-border communicable disease outbreaks in Europe poses a significant challenge to public health and emergency preparedness because the relative likelihood of these threats and the pathogens involved are constantly shifting in response to a range of changing disease drivers. To inform strategic planning by enabling effective resource allocation to manage the consequences of communicable disease outbreaks, it is useful to be able to rank and prioritise pathogens. This paper reports on a literature review which identifies and evaluates the range of methods used for risk ranking. Searches were performed across biomedical and grey literature databases, supplemented by reference harvesting and citation tracking. Studies were selected using transparent inclusion criteria and underwent quality appraisal using a bespoke checklist based on the AGREE II criteria. Seventeen studies were included in the review, covering five methodologies. A narrative analysis of the selected studies suggests that no single methodology was superior. However, many of the methods shared common components, around which a 'best-practice' framework was formulated. This approach is intended to help inform decision makers' choice of an appropriate risk-ranking study design.
Biofuels Potential for Transportation Fuels in Vietnam: A Status Quo and SWOT Analysis
NASA Astrophysics Data System (ADS)
Trinh, Tu Anh; Phuong Linh Le, Thi
2018-04-01
Petroleum consumption for road transportation is well-known as the largest source of CO2 emissions. Worldwide, biofuel is becoming more attractive as substitute for crude oil owing to the increasing demand for environmentally friendly energy and its contribution towards petro dependency reduction and climate change mitigation. This paper reviews the facts and prospects of biofuel production in Vietnam. A SWOT model is adopted to study the strengths, weaknesses, opportunities and threats of biofuels production. The conclusion is drawn that with advantages of weather conditions, soil conditions, the availability of biomass and commitment from government, the country has potential to develop biobuels for domestic consumption. However, threats to production are posed by social acceptance, land use, and technology. Thus, biofuels production still need more supports from government through robust policies, regulations, and institutional framework.
ERIC Educational Resources Information Center
Ryan, Linda G.; Miller-Loessi, Karen; Nieri, Tanya
2007-01-01
Using a resilience framework, the authors examined the protective effects of parental support, self-disclosure to parents, parent-initiated monitoring of adolescent behavior, and relationships with school personnel on three critical problems of adolescents: substance use, gang involvement, and perceived threats to safety at school. The sample…
2016-12-01
From Profiles to Pathways and Roots to Routes: Perspectives from Psychology on Radicalization into Terrorism, “Annals of the American Academy of... American Psychological Association 2, no. 2 (2015): 63–87, doi: http://dx.doi. org/10.1037/tam0000043; Martin Bouchard, Social Networks, Terrorism...The Sociology of Secrecy and of Secret Societies ,” American Journal of Sociology 11 (1906): 441–498. 28 With the exploration of social network theory
Staging workers' use of hearing protection devices: application of the transtheoretical model.
Raymond, Delbert M; Lusk, Sally L
2006-04-01
The threat of noise-induced hearing loss is a serious concern for many workers. This study explores use of the transtheoretical model as a framework for defining stages of workers' acceptance of hearing protection devices. A secondary analysis was performed using a cross-section of data from a randomized, controlled clinical trial of an intervention to increase use of hearing protection. Use of hearing protection devices was well distributed across the theorized stages of change. Chi-square analysis and analysis of variance revealed significant differences between stages for the variables studied. Discrete stages of hearing protection device use can be identified, laying the foundation for further work investigating use of the transtheoretical model for promoting hearing protection device use. The model can provide a framework for tailoring interventions and evaluating their effects. With further development of the transtheoretical model, nurses may be able to easily identify workers' readiness to use hearing protection devices and tailor training toward that goal.
Twenty Years of Stereotype Threat Research: A Review of Psychological Mediators.
Pennington, Charlotte R; Heim, Derek; Levy, Andrew R; Larkin, Derek T
2016-01-01
This systematic literature review appraises critically the mediating variables of stereotype threat. A bibliographic search was conducted across electronic databases between 1995 and 2015. The search identified 45 experiments from 38 articles and 17 unique proposed mediators that were categorized into affective/subjective (n = 6), cognitive (n = 7) and motivational mechanisms (n = 4). Empirical support was accrued for mediators such as anxiety, negative thinking, and mind-wandering, which are suggested to co-opt working memory resources under stereotype threat. Other research points to the assertion that stereotype threatened individuals may be motivated to disconfirm negative stereotypes, which can have a paradoxical effect of hampering performance. However, stereotype threat appears to affect diverse social groups in different ways, with no one mediator providing unequivocal empirical support. Underpinned by the multi-threat framework, the discussion postulates that different forms of stereotype threat may be mediated by distinct mechanisms.
Twenty Years of Stereotype Threat Research: A Review of Psychological Mediators
Pennington, Charlotte R.; Heim, Derek; Levy, Andrew R.; Larkin, Derek T.
2016-01-01
This systematic literature review appraises critically the mediating variables of stereotype threat. A bibliographic search was conducted across electronic databases between 1995 and 2015. The search identified 45 experiments from 38 articles and 17 unique proposed mediators that were categorized into affective/subjective (n = 6), cognitive (n = 7) and motivational mechanisms (n = 4). Empirical support was accrued for mediators such as anxiety, negative thinking, and mind-wandering, which are suggested to co-opt working memory resources under stereotype threat. Other research points to the assertion that stereotype threatened individuals may be motivated to disconfirm negative stereotypes, which can have a paradoxical effect of hampering performance. However, stereotype threat appears to affect diverse social groups in different ways, with no one mediator providing unequivocal empirical support. Underpinned by the multi-threat framework, the discussion postulates that different forms of stereotype threat may be mediated by distinct mechanisms. PMID:26752551
Extending the explanatory utility of the EPPM beyond fear-based persuasion.
Lewis, Ioni; Watson, Barry; White, Katherine M
2013-01-01
In the 20 years since its inception, the Extended Parallel Process Model (EPPM) has attracted much empirical support. Currently, and unsurprisingly, given that is a model of fear-based persuasion, the EPPM's explanatory utility has been based only upon fear-based messages. However, an argument is put forth herein that draws upon existing evidence that the EPPM may be an efficacious framework for explaining the persuasive process and outcomes of emotion-based messages more broadly when such messages are addressing serious health topics. For the current study, four different types of emotional appeals were purposefully devised and included a fear-, an annoyance/agitation-, a pride-, and a humor-based message. All messages addressed the serious health issue of road safety, and in particular the risky behavior of speeding. Participants (n = 551) were exposed to only one of the four messages and subsequently provided responses within a survey. A series of 2 (threat: low, high) × 2 (efficacy: low, high) analysis of variance was conducted for each of the appeals based on the EPPM's message outcomes of acceptance and rejection. Support was found for the EPPM with a number of main effects of threat and efficacy emerging, reflecting that, irrespective of emotional appeal type, high levels of threat and efficacy enhanced message outcomes via maximizing acceptance and minimizing rejection. Theoretically, the findings provide support for the explanatory utility of the EPPM for emotion-based health messages more broadly. In an applied sense, the findings highlight the value of adopting the EPPM as a framework when devising and evaluating emotion-based health messages for serious health topics.
Holt, Kathryn E.; Wertheim, Heiman; Zadoks, Ruth N.; Baker, Stephen; Whitehouse, Chris A.; Dance, David; Jenney, Adam; Connor, Thomas R.; Hsu, Li Yang; Severin, Juliëtte; Brisse, Sylvain; Cao, Hanwei; Wilksch, Jonathan; Gorrie, Claire; Schultz, Mark B.; Edwards, David J.; Nguyen, Kinh Van; Nguyen, Trung Vu; Dao, Trinh Tuyet; Mensink, Martijn; Minh, Vien Le; Nhu, Nguyen Thi Khanh; Schultsz, Constance; Kuntaman, Kuntaman; Newton, Paul N.; Moore, Catrin E.; Strugnell, Richard A.; Thomson, Nicholas R.
2015-01-01
Klebsiella pneumoniae is now recognized as an urgent threat to human health because of the emergence of multidrug-resistant strains associated with hospital outbreaks and hypervirulent strains associated with severe community-acquired infections. K. pneumoniae is ubiquitous in the environment and can colonize and infect both plants and animals. However, little is known about the population structure of K. pneumoniae, so it is difficult to recognize or understand the emergence of clinically important clones within this highly genetically diverse species. Here we present a detailed genomic framework for K. pneumoniae based on whole-genome sequencing of more than 300 human and animal isolates spanning four continents. Our data provide genome-wide support for the splitting of K. pneumoniae into three distinct species, KpI (K. pneumoniae), KpII (K. quasipneumoniae), and KpIII (K. variicola). Further, for K. pneumoniae (KpI), the entity most frequently associated with human infection, we show the existence of >150 deeply branching lineages including numerous multidrug-resistant or hypervirulent clones. We show K. pneumoniae has a large accessory genome approaching 30,000 protein-coding genes, including a number of virulence functions that are significantly associated with invasive community-acquired disease in humans. In our dataset, antimicrobial resistance genes were common among human carriage isolates and hospital-acquired infections, which generally lacked the genes associated with invasive disease. The convergence of virulence and resistance genes potentially could lead to the emergence of untreatable invasive K. pneumoniae infections; our data provide the whole-genome framework against which to track the emergence of such threats. PMID:26100894
Scott L. Goodrick; John A. Stanturf
2010-01-01
In the Southeastern United States, forests are subject to a variety of damage-causing wind phenomena that range in scale from very localized (downbursts and tornadoes) to broad spatial scales (hurricanes). Incorporating the threat of wind damage into forest management plans requires tools capable of assessing risk across this range of scales. Our conceptual approach...
Social amplification of wildfire risk: The role of social interactions and information sources
Hannah Brenkert-Smith; Katherine L. Dickinson; Patricia A. Champ; Nicholas Flores
2013-01-01
Wildfire is a persistent and growing threat across much of the western United States. Understanding how people living in fire-prone areas perceive this threat is essential to the design of effective risk management policies. Drawing on the social amplification of risk framework, we develop a conceptual model of wildfire risk perceptions that incorporates the social...
ERIC Educational Resources Information Center
Lenhardt, Ann Marie C.; Graham, Lemuel W.; Farrell, Melissa L.
2018-01-01
Targeted violence continues to pose a threat to school safety. Reported here are the results of a study of 18 cases of school shooters from 1996 to 2012. Variables examined are individual factors and behaviors, family dynamics, and triggering events. Results indicate the need for expanded school-based mental health services, threat assessment, and…
Global resilience analysis of water distribution systems.
Diao, Kegong; Sweetapple, Chris; Farmani, Raziyeh; Fu, Guangtao; Ward, Sarah; Butler, David
2016-12-01
Evaluating and enhancing resilience in water infrastructure is a crucial step towards more sustainable urban water management. As a prerequisite to enhancing resilience, a detailed understanding is required of the inherent resilience of the underlying system. Differing from traditional risk analysis, here we propose a global resilience analysis (GRA) approach that shifts the objective from analysing multiple and unknown threats to analysing the more identifiable and measurable system responses to extreme conditions, i.e. potential failure modes. GRA aims to evaluate a system's resilience to a possible failure mode regardless of the causal threat(s) (known or unknown, external or internal). The method is applied to test the resilience of four water distribution systems (WDSs) with various features to three typical failure modes (pipe failure, excess demand, and substance intrusion). The study reveals GRA provides an overview of a water system's resilience to various failure modes. For each failure mode, it identifies the range of corresponding failure impacts and reveals extreme scenarios (e.g. the complete loss of water supply with only 5% pipe failure, or still meeting 80% of demand despite over 70% of pipes failing). GRA also reveals that increased resilience to one failure mode may decrease resilience to another and increasing system capacity may delay the system's recovery in some situations. It is also shown that selecting an appropriate level of detail for hydraulic models is of great importance in resilience analysis. The method can be used as a comprehensive diagnostic framework to evaluate a range of interventions for improving system resilience in future studies. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.
A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems
Choi, Donghee; Kim, Dohoon; Park, Seog
2015-01-01
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013
Applying the multi-threat framework of stereotype threat in the context of digital gaming
Pennington, Charlotte R.; McCann, Joseph J.
2018-01-01
Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females’ gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group’s ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females’ gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group’s gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat. PMID:29444126
Applying the multi-threat framework of stereotype threat in the context of digital gaming.
Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J
2018-01-01
Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.
Visualization techniques for computer network defense
NASA Astrophysics Data System (ADS)
Beaver, Justin M.; Steed, Chad A.; Patton, Robert M.; Cui, Xiaohui; Schultz, Matthew
2011-06-01
Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.
Chambers, Jeanne C.; Campbell, Steve; Carlson, John; Beck, Jeffrey L.; Clause, Karen J.; Dinkins, Jonathan B.; Doherty, Kevin E.; Espinosa, Shawn; Griffin, Kathleen A.; Christiansen, Thomas J.; Crist, Michele R.; Hanser, Steven E.; Havlina, Douglas W.; Henke, Kenneth F.; Hennig, Jacob D.; Kurth, Laurie L.; Maestas, Jeremy D.; Mayer, Kenneth E.; Manning, Mary E.; Mealor, Brian A.; McCarthy, Clinton; Pellant, Mike; Prentice, Karen L.; Perea, Marco A.; Pyke, David A.; Wiechman , Lief A.; Wuenschel, Amarina
2016-01-01
The Science Framework for the Conservation and Restoration Strategy of the Department of the Interior, Secretarial Order 3336 (SO 3336), Rangeland Fire Prevention, Management and Restoration, provides a strategic, multiscale approach for prioritizing areas for management and determining effective management strategies across the sagebrush biome. The emphasis of this version is on sagebrush ecosystems and greater sage-grouse. The Science Framework uses a six step process in which sagebrush ecosystem resilience to disturbance and resistance to nonnative, invasive annual grasses is linked to species habitat information based on the distribution and abundance of focal species. The predominant ecosystem and anthropogenic threats are assessed, and a habitat matrix is developed that helps decision makers evaluate risks and determine appropriate management strategies at regional and local scales. Areas are prioritized for management action using a geospatial approach that overlays resilience and resistance, species habitat information, and predominant threats. Decision tools are discussed for determining the suitability of priority areas for management and the most appropriate management actions at regional to local scales. The Science Framework and geospatial crosscut are intended to complement the mitigation strategies associated with the Greater Sage-Grouse Land Use Plan amendments for the Department of the Interior Bureaus, such as the Bureau of Land Management, and the U.S. Forest Service.
Insider Threat and Information Security Management
NASA Astrophysics Data System (ADS)
Coles-Kemp, Lizzie; Theoharidou, Marianthi
The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.
Langtimm, Catherine A.; Kendall, William L.; Beck, Cathy A.; Kochman, Howard I.; Teague, Amy L.; Meigs-Friend, Gaia; Peñaloza, Claudia L.
2016-11-30
This report provides supporting details and evidence for the rationale, validity and efficacy of a new mark-recapture model, the Barker Robust Design, to estimate regional manatee survival rates used to parameterize several components of the 2012 version of the Manatee Core Biological Model (CBM) and Threats Analysis (TA). The CBM and TA provide scientific analyses on population viability of the Florida manatee subspecies (Trichechus manatus latirostris) for U.S. Fish and Wildlife Service’s 5-year reviews of the status of the species as listed under the Endangered Species Act. The model evaluation is presented in a standardized reporting framework, modified from the TRACE (TRAnsparent and Comprehensive model Evaluation) protocol first introduced for environmental threat analyses. We identify this new protocol as TRACE-MANATEE SURVIVAL and this model evaluation specifically as TRACE-MANATEE SURVIVAL, Barker RD version 1. The longer-term objectives of the manatee standard reporting format are to (1) communicate to resource managers consistent evaluation information over sequential modeling efforts; (2) build understanding and expertise on the structure and function of the models; (3) document changes in model structures and applications in response to evolving management objectives, new biological and ecological knowledge, and new statistical advances; and (4) provide greater transparency for management and research review.
NASA Astrophysics Data System (ADS)
Bereskie, Ty; Rodriguez, Manuel J.; Sadiq, Rehan
2017-08-01
Drinking water management in Canada is complex, with a decentralized, three-tiered governance structure responsible for safe drinking water throughout the country. The current approach has been described as fragmented, leading to governance gaps, duplication of efforts, and an absence of accountability and enforcement. Although there have been no major waterborne disease outbreaks in Canada since 2001, a lack of performance improvement, especially in small drinking water systems, is evident. The World Health Organization water safety plan approach for drinking water management represents an alternative preventative management framework to the current conventional, reactive drinking water management strategies. This approach has seen successful implementation throughout the world and has the potential to address many of the issues with drinking water management in Canada. This paper presents a review and strengths-weaknesses-opportunities-threats analysis of drinking water management and governance in Canada at the federal, provincial/territorial, and municipal levels. Based on this analysis, a modified water safety plan (defined as the plan-do-check-act (PDCA)-WSP framework) is proposed, established from water safety plan recommendations and the principles of PDCA for continuous performance improvement. This proposed framework is designed to strengthen current drinking water management in Canada and is designed to fit within and incorporate the existing governance structure.
Bereskie, Ty; Rodriguez, Manuel J; Sadiq, Rehan
2017-08-01
Drinking water management in Canada is complex, with a decentralized, three-tiered governance structure responsible for safe drinking water throughout the country. The current approach has been described as fragmented, leading to governance gaps, duplication of efforts, and an absence of accountability and enforcement. Although there have been no major waterborne disease outbreaks in Canada since 2001, a lack of performance improvement, especially in small drinking water systems, is evident. The World Health Organization water safety plan approach for drinking water management represents an alternative preventative management framework to the current conventional, reactive drinking water management strategies. This approach has seen successful implementation throughout the world and has the potential to address many of the issues with drinking water management in Canada. This paper presents a review and strengths-weaknesses-opportunities-threats analysis of drinking water management and governance in Canada at the federal, provincial/territorial, and municipal levels. Based on this analysis, a modified water safety plan (defined as the plan-do-check-act (PDCA)-WSP framework) is proposed, established from water safety plan recommendations and the principles of PDCA for continuous performance improvement. This proposed framework is designed to strengthen current drinking water management in Canada and is designed to fit within and incorporate the existing governance structure.
Poudyal, Mahesh; Rothley, Kristina; Knowler, Duncan
2009-10-01
Nepal's greater one-horned rhinoceros (Rhinoceros unicornis) faces serious threats from poaching. Poaching of these rhinos is a complex problem, influenced by such diverse factors as the price of rhino horn on the international market, local socioeconomic factors, and the population dynamics of the species. Few studies have attempted to address this complexity. In this study, we model the poaching and population dynamics of the one-horned rhinoceros within an integrated framework of ecological, socioeconomic, political, and legal dimensions. The poaching model for rhinos in Royal Chitwan National Park (RCNP) in Nepal is combined with the population model for the species within a simulation framework and explored under various alternative policy scenarios with differing external socioeconomic and political conditions as well as internal policy response. We predict that, under the current (2003-2005) rhino conservation strategy, poaching would continue to be a major threat to the rhino population in RCNP. Furthermore, the internal policy response must begin to consider external factors such as socioeconomic conditions within the park buffer zone to be more effective in the long run. Finally, we find that, for long-run control, antipoaching policies should be directed at increasing the opportunity costs of poaching by creating better alternative economic opportunities, and at antipoaching enforcement.
Institutional misfit and environmental change: A systems approach to address ocean acidification.
Ekstrom, Julia A; Crona, Beatrice I
2017-01-15
Emerging environmental threats often lack sufficient governance to address the full extent of the problem. An example is ocean acidification which is a growing concern in fishing and aquaculture economies worldwide, but has remained a footnote in environmental policy at all governance levels. However, existing legal jurisdictions do account for some aspects of the system relating to ocean acidification and these may be leveraged to support adapting to and mitigating ocean acidification. We refine and apply a methodological framework that helps objectively evaluate governance, from a social-ecological systems perspective. We assess how well a set of extant US institutions fits with the social-ecological interactions pertinent to ocean acidification. The assessment points to measured legal gaps, for which we evaluate the government authorities most appropriate to help fill these gaps. The analysis is conducted on United State federal statutes and regulations. Results show quantitative improvement of institutional fit over time (2006 to 2013), but a substantial number of measured legal gaps persist especially around acknowledging local sources of acidification and adaptation strategies to deal with or avoid impacts. We demonstrate the utility of this framework to evaluate the governance surrounding any emerging environmental threat as a first step to guiding the development of jurisdictionally realistic solutions. Copyright © 2016 Elsevier B.V. All rights reserved.
Strengths, Opportunities, Aspirations, and Results: An Emerging Approach to Organization Development
ERIC Educational Resources Information Center
Zarestky, Jill; Cole, Catherine S.
2017-01-01
Organization development (OD) interventions have typically relied on the strengths, weaknesses, opportunities, and threats (SWOT) framework for strategic planning. The strengths, opportunities, aspirations, and results (SOAR) framework is a relatively new innovation in OD that may serve as a viable alternative to SWOT for those who wish to apply…
ERIC Educational Resources Information Center
Wilson, Joe M.
2013-01-01
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Decision making and coping in healthcare: the Coping in Deliberation (CODE) framework.
Witt, Jana; Elwyn, Glyn; Wood, Fiona; Brain, Kate
2012-08-01
To develop a framework of decision making and coping in healthcare that describes the twin processes of appraisal and coping faced by patients making preference-sensitive healthcare decisions. We briefly review the literature for decision making theories and coping theories applicable to preference-sensitive decisions in healthcare settings. We describe first decision making, then coping and finally attempt to integrate these processes by building on current theory. Deliberation in healthcare may be described as a six step process, comprised of the presentation of a health threat, choice, options, preference construction, the decision itself and consolidation post-decision. Coping can be depicted in three stages, beginning with a threat, followed by primary and secondary appraisal and ultimately resulting in a coping effort. Drawing together concepts from prominent decision making theories and coping theories, we propose a multidimensional, interactive framework which integrates both processes and describes coping in deliberation. The proposed framework offers an insight into the complexity of decision making in preference-sensitive healthcare contexts from a patient perspective and may act as theoretical basis for decision support. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
BIOS Security Analysis and a Kind of Trusted BIOS
NASA Astrophysics Data System (ADS)
Zhou, Zhenliu; Xu, Rongsheng
The BIOS's security threats to computer system are analyzed and security requirements for firmware BIOS are summarized in this paper. Through discussion about TCG's trust transitivity, a new approach about CRTM implementation based on BIOS is developed. In this paper, we also put forward a new trusted BIOS architecture-UTBIOS which is built on Intel Framework for EFI/UEFI. The trustworthiness of UTBIOS is based on trusted hardware TPM. In UTBIOS, trust encapsulation and trust measurement are used to construct pre-OS trust chain. Performance of trust measurement is also analyzed in the end.
Risk assessment of vector-borne diseases for public health governance.
Sedda, L; Morley, D W; Braks, M A H; De Simone, L; Benz, D; Rogers, D J
2014-12-01
In the context of public health, risk governance (or risk analysis) is a framework for the assessment and subsequent management and/or control of the danger posed by an identified disease threat. Generic frameworks in which to carry out risk assessment have been developed by various agencies. These include monitoring, data collection, statistical analysis and dissemination. Due to the inherent complexity of disease systems, however, the generic approach must be modified for individual, disease-specific risk assessment frameworks. The analysis was based on the review of the current risk assessments of vector-borne diseases adopted by the main Public Health organisations (OIE, WHO, ECDC, FAO, CDC etc…). Literature, legislation and statistical assessment of the risk analysis frameworks. This review outlines the need for the development of a general public health risk assessment method for vector-borne diseases, in order to guarantee that sufficient information is gathered to apply robust models of risk assessment. Stochastic (especially spatial) methods, often in Bayesian frameworks are now gaining prominence in standard risk assessment procedures because of their ability to assess accurately model uncertainties. Risk assessment needs to be addressed quantitatively wherever possible, and submitted with its quality assessment in order to enable successful public health measures to be adopted. In terms of current practice, often a series of different models and analyses are applied to the same problem, with results and outcomes that are difficult to compare because of the unknown model and data uncertainties. Therefore, the risk assessment areas in need of further research are identified in this article. Copyright © 2014 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
Buffers or Boosters? The Role of HRM Practices in Older Workers' Experience of Stereotype Threat.
Oliveira, Eduardo André da Silva; Cabral-Cardoso, Carlos José
2018-01-02
Building on the social identity approach and the HRM literature, this two-wave cross-sectional study examined the effects of negative age-based metastereotypes on the age-based stereotype threat experience of older workers and on organizational disidentification. The moderator role of HRM practices in the relationship between negative age-based metastereotypes and age-based stereotype threat was also investigated. Older workers survey results (n = 469) from 14 manufacturing companies indicated that negative age-based metastereotypes correlate positively with stereotype threat. Moderation results showed that age-awareness HRM practices (training for older workers) reinforced age-based stereotype threat, whereas general HRM practices (recognition and respect) impaired it. The article suggests that the combination of age-based metastereotypes with a stereotype threat framework contributes to further understand older workers' beliefs and attitudes. It also indicates that to be effective, HRM practices should emphasize positive social identities older workers share with their colleagues, rather than giving older workers special treatment that may, after all, reinforce stigmatization.
NASA Astrophysics Data System (ADS)
Schneider, Christof; Flörke, Martina; De Stefano, Lucia; Petersen-Perlman, Jacob D.
2017-06-01
Riparian wetlands have been disappearing at an accelerating rate. Their ecological integrity as well as their vital ecosystem services for humankind depend on regular patterns of inundation and drying provided by natural flow regimes. However, river hydrology has been altered worldwide. Dams cause less variable flow regimes and water abstractions decrease the amount of flow so that ecologically important flood pulses are often reduced. Given growing population pressure and projected climate change, immediate action is required. However, the implementation of counteractive measures is often a complex task. This study develops a screening tool for assessing hydrological threats to riparian wetlands on global scales. The approach is exemplified on 93 Ramsar sites, many of which are located in transboundary basins. First, the WaterGAP3 hydrological modeling framework is used to quantitatively compare current and future modified flow regimes to reference flow conditions. In our simulations current water resource management seriously impairs riparian wetland inundation at 29 % of the analyzed sites. A further 8 % experience significantly reduced flood pulses. In the future, eastern Europe, western Asia, as well as central South America could be hotspots of further flow modifications due to climate change. Second, a qualitative analysis of the 93 sites determined potential impact on overbank flows resulting from planned or proposed dam construction projects. They take place in one-third of the upstream areas and are likely to impair especially wetlands located in South America, Asia, and the Balkan Peninsula. Third, based on the existing legal/institutional framework and water resource availability upstream, further qualitative analysis evaluated the capacity to preserve overbank flows given future streamflow changes due to dam construction and climate change. Results indicate hotspots of vulnerability exist, especially in northern Africa and the Persian Gulf.
Petrosoniak, Andrew; Pinkney, Sonia; Hicks, Christopher; White, Kari; Almeida, Ana Paula Siquiera Silva; Campbell, Douglas; McGowan, Melissa; Gray, Alice; Trbovich, Patricia
2016-01-01
Introduction Errors in trauma resuscitation are common and have been attributed to breakdowns in the coordination of system elements (eg, tools/technology, physical environment and layout, individual skills/knowledge, team interaction). These breakdowns are triggered by unique circumstances and may go unrecognised by trauma team members or hospital administrators; they can be described as latent safety threats (LSTs). Retrospective approaches to identifying LSTs (ie, after they occur) are likely to be incomplete and prone to bias. To date, prospective studies have not used video review as the primary mechanism to identify any and all LSTs in trauma resuscitation. Methods and analysis A series of 12 unannounced in situ simulations (ISS) will be conducted to prospectively identify LSTs at a level 1 Canadian trauma centre (over 800 dedicated trauma team activations annually). 4 scenarios have already been designed as part of this protocol based on 5 recurring themes found in the hospital's mortality and morbidity process. The actual trauma team will be activated to participate in the study. Each simulation will be audio/video recorded from 4 different camera angles and transcribed to conduct a framework analysis. Video reviewers will code the videos deductively based on a priori themes of LSTs identified from the literature, and/or inductively based on the events occurring in the simulation. LSTs will be prioritised to target interventions in future work. Ethics and dissemination Institutional research ethics approval has been acquired (SMH REB #15-046). Results will be published in peer-reviewed journals and presented at relevant conferences. Findings will also be presented to key institutional stakeholders to inform mitigation strategies for improved patient safety. PMID:27821600
Stereotype threat and executive resource depletion: examining the influence of emotion regulation.
Johns, Michael; Inzlicht, Michael; Schmader, Toni
2008-11-01
Research shows that stereotype threat reduces performance by diminishing executive resources, but less is known about the psychological processes responsible for these impairments. The authors tested the idea that targets of stereotype threat try to regulate their emotions and that this regulation depletes executive resources, resulting in underperformance. Across 4 experiments, they provide converging evidence that targets of stereotype threat spontaneously attempt to control their expression of anxiety and that such emotion regulation depletes executive resources needed to perform well on tests of cognitive ability. They also demonstrate that providing threatened individuals with a means to effectively cope with negative emotions--by reappraising the situation or the meaning of their anxiety--can restore executive resources and improve test performance. They discuss these results within the framework of an integrated process model of stereotype threat, in which affective and cognitive processes interact to undermine performance.
Stereotype Threat and Executive Resource Depletion: Examining the Influence of Emotion Regulation
Johns, Michael; Inzlicht, Michael; Schmader, Toni
2010-01-01
Research shows that stereotype threat reduces performance by diminishing executive resources, but less is known about the psychological processes responsible for these impairments. The authors tested the idea that targets of stereotype threat try to regulate their emotions and that this regulation depletes executive resources, resulting in underperformance. Across 4 experiments, they provide converging evidence that targets of stereotype threat spontaneously attempt to control their expression of anxiety and that such emotion regulation depletes executive resources needed to perform well on tests of cognitive ability. They also demonstrate that providing threatened individuals with a means to effectively cope with negative emotions—by reappraising the situation or the meaning of their anxiety—can restore executive resources and improve test performance. They discuss these results within the framework of an integrated process model of stereotype threat, in which affective and cognitive processes interact to undermine performance. PMID:18999361
R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems
NASA Technical Reports Server (NTRS)
Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.
2015-01-01
We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.
ERIC Educational Resources Information Center
Conley-Ware, Lakita D.
2010-01-01
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
Johnson-Turbes, Ashani
2015-01-01
Purpose We describe how the Persuasive Health Message (PHM) framework was used to guide the formative evaluation informing development of messages and materials used in a community-based multi-media campaign intended to motivate low-income African American women to obtain low- or no-cost mammograms through the CDC’s National Breast and Cervical Cancer Early Detection Program. Methods Seventy-eight African American women were recruited for eight focus groups that discussed breast cancer screening. The moderator guide was developed in accordance with the PHM framework and solicited information on perceived threat and efficacy, cues, salient beliefs and referents, and barriers to self-efficacy. Results We created persuasive messages to emphasize that African American women are susceptible to the threat of breast cancer, but that their personal action in obtaining regular mammograms may lead to early detection, subsequent treatment, and reduced cancer mortality. The messages addressed concerns of self-efficacy by emphasizing that uninsured women can also obtain high-quality low- or no-cost mammograms. In an attempt to combat the sentiment that breast cancer is a death sentence, the messages indicated that breast cancer can be successfully treated, especially when detected early. Conclusions The PHM framework consists of three steps: (1) determine information about threat and efficacy; (2) develop an audience profile; and (3) construct a persuasive message. It offered our team easy-to-follow, flexible steps to create a persuasive and effective campaign promoting awareness and use of mammogram screening among low-income African American women. PMID:25724414
Directive 2013/39/EU amending and updating the Water Framework Directive (2000/60/EC) and its Daughter Directive (the so-called EQS Directive: 2008/105/EC) sets Environmental Quality Standards for biota (EQSbiota) for a number of bioaccumulative chemicals which can pose a threat ...
Directive 2013/39/EU amending and updating the Water Framework Directive (2000/60/EC) and its Daughter Directive (the so-called EQS Directive: 2008/105/EC) sets Environmental Quality Standards for biota (EQSbiota) for a number of bioaccumulative chemicals which can pose a threat ...
Visualization Techniques for Computer Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beaver, Justin M; Steed, Chad A; Patton, Robert M
2011-01-01
Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operatormore » to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.« less
High Level Information Fusion (HLIF) with nested fusion loops
NASA Astrophysics Data System (ADS)
Woodley, Robert; Gosnell, Michael; Fischer, Amber
2013-05-01
Situation modeling and threat prediction require higher levels of data fusion in order to provide actionable information. Beyond the sensor data and sources the analyst has access to, the use of out-sourced and re-sourced data is becoming common. Through the years, some common frameworks have emerged for dealing with information fusion—perhaps the most ubiquitous being the JDL Data Fusion Group and their initial 4-level data fusion model. Since these initial developments, numerous models of information fusion have emerged, hoping to better capture the human-centric process of data analyses within a machine-centric framework. 21st Century Systems, Inc. has developed Fusion with Uncertainty Reasoning using Nested Assessment Characterizer Elements (FURNACE) to address challenges of high level information fusion and handle bias, ambiguity, and uncertainty (BAU) for Situation Modeling, Threat Modeling, and Threat Prediction. It combines JDL fusion levels with nested fusion loops and state-of-the-art data reasoning. Initial research has shown that FURNACE is able to reduce BAU and improve the fusion process by allowing high level information fusion (HLIF) to affect lower levels without the double counting of information or other biasing issues. The initial FURNACE project was focused on the underlying algorithms to produce a fusion system able to handle BAU and repurposed data in a cohesive manner. FURNACE supports analyst's efforts to develop situation models, threat models, and threat predictions to increase situational awareness of the battlespace. FURNACE will not only revolutionize the military intelligence realm, but also benefit the larger homeland defense, law enforcement, and business intelligence markets.
ERIC Educational Resources Information Center
Ferrara, Steve
2017-01-01
Test security is not an end in itself; it is important because we want to be able to make valid interpretations from test scores. In this article, I propose a framework for comprehensive test security systems: prevention, detection, investigation, and resolution. The article discusses threats to test security, roles and responsibilities, rigorous…
Threat facilitates subsequent executive control during anxious mood.
Birk, Jeffrey L; Dennis, Tracy A; Shin, Lisa M; Urry, Heather L
2011-12-01
Dual competition framework (DCF) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance. To test these ideas directly, we examined the effects of low-level threat and experimentally induced anxiety on one executive control function, the efficiency of response inhibition. In Study 1, briefly presented stimuli that were mildly threatening (i.e., fearful faces) relative to nonthreatening (i.e., neutral faces) led to facilitated executive control efficiency during experimentally induced anxiety. No such effect was observed during an equally arousing, experimentally induced happy mood state. In Study 2, we assessed the effects of low-level threat, experimentally induced anxiety, and individual differences in trait anxiety on executive control efficiency. Consistent with Study 1, fearful relative to neutral faces led to facilitated executive control efficiency during experimentally induced anxiety. No such effect was observed during an experimentally induced neutral mood state. Moreover, individual differences in trait anxiety did not moderate the effects of threat and anxiety on executive control efficiency. The findings are partially consistent with the predictions of DCF in that low-level threat improved executive control, at least during a state of anxiety. (c) 2011 APA, all rights reserved.
Craig, Laura S.; Olden, Julian D.; Arthington, Angela; Entrekin, Sally; Hawkins, Charles P.; Kelly, John J.; Kennedy, Theodore A.; Maitland, Bryan M.; Rosi, Emma J.; Roy, Allison; Strayer, David L.; Tank, Jennifer L.; West, Amie O.; Wooten, Matthew S.
2017-01-01
Human activities create threats that have consequences for freshwater ecosystems and, in most watersheds, observed ecological responses are the result of complex interactions among multiple threats and their associated ecological alterations. Here we discuss the value of considering multiple threats in research and management, offer suggestions for filling knowledge gaps, and provide guidance for addressing the urgent management challenges posed by multiple threats in freshwater ecosystems. There is a growing literature assessing responses to multiple alterations, and we build off this background to identify three areas that require greater attention: linking observed alterations to threats, understanding when and where threats overlap, and choosing metrics that best quantify the effects of multiple threats. Advancing science in these areas will help us understand existing ecosystem conditions and predict future risk from multiple threats. Because addressing the complex issues and novel ecosystems that arise from the interaction of multiple threats in freshwater ecosystems represents a significant management challenge, and the risks of management failure include loss of biodiversity, ecological goods, and ecosystem services, we also identify actions that could improve decision-making and management outcomes. These actions include drawing insights from management of individual threats, using threat attributes (e.g., causes and spatio-temporal dynamics) to identify suitable management approaches, testing management strategies that are likely to be successful despite uncertainties about the nature of interactions among threats, avoiding unintended consequences, and maximizing conservation benefits. We also acknowledge the broadly applicable challenges of decision-making within a socio-political and economic framework, and suggest that multidisciplinary teams will be needed to innovate solutions to meet the current and future challenge of interacting threats in freshwater ecosystems.
Dixon, Martin; Turner, Martin J; Gillman, Jamie
2017-12-01
Previous research demonstrates that sports coaching is a stressful activity. This article investigates coaches' challenge and threat cognitive appraisals of stressful situations and their impact on coaching behaviour, using Blascovich and Mendes' (2000) biopsychosocial model as a theoretical framework. A cross-sectional correlational design was utilised to examine the relationships between irrational beliefs (Shortened general attitude and belief scale), challenge and threat appraisals (Appraisal of life events scale), and coaching behaviours (Leadership scale for sports) of 105 professional football academy coaches. Findings reveal significant positive associations between challenge appraisals and social support, and between threat appraisals and autocratic behaviour, and a significant negative association between threat appraisals and positive feedback. Results also show that higher irrational beliefs are associated with greater threat, and lesser challenge cognitive appraisals. However, no associations were revealed between irrational beliefs and challenge cognitive appraisals. Additionally, findings demonstrate a positive relationship between age and training and instruction. Results suggest that practitioners should help coaches to appraise stressful situations as a challenge to promote positive coaching behaviours.
Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management.
Ganin, Alexander A; Quach, Phuoc; Panwar, Mahesh; Collier, Zachary A; Keisler, Jeffrey M; Marchese, Dayton; Linkov, Igor
2017-09-05
Risk assessors and managers face many difficult challenges related to novel cyber systems. Among these challenges are the constantly changing nature of cyber systems caused by technical advances, their distribution across the physical, information, and sociocognitive domains, and the complex network structures often including thousands of nodes. Here, we review probabilistic and risk-based decision-making techniques applied to cyber systems and conclude that existing approaches typically do not address all components of the risk assessment triplet (threat, vulnerability, consequence) and lack the ability to integrate across multiple domains of cyber systems to provide guidance for enhancing cybersecurity. We present a decision-analysis-based approach that quantifies threat, vulnerability, and consequences through a set of criteria designed to assess the overall utility of cybersecurity management alternatives. The proposed framework bridges the gap between risk assessment and risk management, allowing an analyst to ensure a structured and transparent process of selecting risk management alternatives. The use of this technique is illustrated for a hypothetical, but realistic, case study exemplifying the process of evaluating and ranking five cybersecurity enhancement strategies. The approach presented does not necessarily eliminate biases and subjectivity necessary for selecting countermeasures, but provides justifiable methods for selecting risk management actions consistent with stakeholder and decisionmaker values and technical data. Published 2017. This article is a U.S. Government work and is in the public domain in the U.S.A.
Nuclear security policy in the context of counter-terrorism in Cambodia
NASA Astrophysics Data System (ADS)
Khun, Vuthy; Wongsawaeng, Doonyapong
2016-01-01
The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.
Impact modeling and prediction of attacks on cyber targets
NASA Astrophysics Data System (ADS)
Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan
2010-04-01
In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gibbs, P. W.
Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.
Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang
2017-08-01
Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.
Schlomer, Gabriel L.; Fosco, Gregory M.; Cleveland, H. H.; Vandenbergh, David J.; Feinberg, Mark E.
2015-01-01
Several studies have established that child interparental conflict evaluations link parent relationship functioning and adolescent adjustment. Using differential susceptibility theory and its vantage sensitivity complement as their framework, the authors examined differences between adolescents who vary in the DRD4 7 repeat genotype (i.e. 7+ vs. 7−) in how both interparental conflict and positivity affect adolescents’ evaluations of interparental conflict (i.e., threat appraisals) and how these evaluations affect internalizing problems. Results from longitudinal multiple-group path models using PROSPER data (N = 452) supported the hypothesis that threat appraisals for 7+ adolescents would be more affected by perceptions of interparental positivity compared to 7− adolescents; however, threat appraisals for 7+ adolescents were also less affected by interparental conflict. Among 7− adolescents, interparental conflict perceptions were associated with higher threat appraisals, and no association was found for perceptions of positivity. For adolescents of both genotypes, higher threat was associated with greater internalizing problems. PMID:25843974
Homeland defense: looking back, moving forward
NASA Astrophysics Data System (ADS)
Quine, Dennis H.
2002-07-01
A concern for homeland defense has been with us since the inception of the Republic. However, it has changed in focus and emphasis depending on the nature of the threat we perceived. In the earliest decades the threat was from invasion by a Britain that still did not accept the results of the Revolutionary War. Later the focus shifted to concern about possible attack by ships, and during WW I and WW II, by submarines. With the advent of the intercontinental nuclear-armed bomber in 1950, our focus changed again. When we could be attacked by ballistic missiles after 1960, our concern focused on that threat. Now that we have seen that damaging attacks can be brought to the homeland 'under the radar screen', by terrorist operations, the focus has shifted again. We are now entering an era when we must address potential homeland attacks with weapons of mass destruction (WMD) that may be delivered by a range of means, depending on the source of the attack. In response to this full spectrum of attack modes, the U.S. has implemented a three-stage defense policy that integrates overseas 'offense' and homeland 'defense'. This framework for defense analysis and planning is likely to be with us into the indefinite future.
Threat to life and risk-taking behaviors: a review of empirical findings and explanatory models.
Ben-Zur, Hasida; Zeidner, Moshe
2009-05-01
This article reviews the literature focusing on the relationship between perceived threat to life and risk-taking behaviors. The review of empirical data, garnered from field studies and controlled experiments, suggests that personal threat to life results in elevated risk-taking behavior. To account for these findings, this review proposes a number of theoretical explanations. These frameworks are grounded in divergent conceptual models: coping with stress, emotion regulation, replenishing of lost resources through self-enhancement, modifications of key parameters of cognitive processing of risky outcomes, and neurocognitive mechanisms. The review concludes with a number of methodological considerations, as well as directions for future work in this promising area of research.
Post, Brady; Buchmueller, Tom; Ryan, Andrew M
2017-08-01
Hospital-physician vertical integration is on the rise. While increased efficiencies may be possible, emerging research raises concerns about anticompetitive behavior, spending increases, and uncertain effects on quality. In this review, we bring together several of the key theories of vertical integration that exist in the neoclassical and institutional economics literatures and apply these theories to the hospital-physician relationship. We also conduct a literature review of the effects of vertical integration on prices, spending, and quality in the growing body of evidence ( n = 15) to evaluate which of these frameworks have the strongest empirical support. We find some support for vertical foreclosure as a framework for explaining the observed results. We suggest a conceptual model and identify directions for future research. Based on our analysis, we conclude that vertical integration poses a threat to the affordability of health services and merits special attention from policymakers and antitrust authorities.
Modeling Urban Scenarios & Experiments: Fort Indiantown Gap Data Collections Summary and Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Archer, Daniel E.; Bandstra, Mark S.; Davidson, Gregory G.
This report summarizes experimental radiation detector, contextual sensor, weather, and global positioning system (GPS) data collected to inform and validate a comprehensive, operational radiation transport modeling framework to evaluate radiation detector system and algorithm performance. This framework will be used to study the influence of systematic effects (such as geometry, background activity, background variability, environmental shielding, etc.) on detector responses and algorithm performance using synthetic time series data. This work consists of performing data collection campaigns at a canonical, controlled environment for complete radiological characterization to help construct and benchmark a high-fidelity model with quantified system geometries, detector response functions,more » and source terms for background and threat objects. This data also provides an archival, benchmark dataset that can be used by the radiation detection community. The data reported here spans four data collection campaigns conducted between May 2015 and September 2016.« less
Uncertainty and Anticipation in Anxiety
Grupe, Dan W.; Nitschke, Jack B.
2014-01-01
Uncertainty about a possible future threat disrupts our ability to avoid it or to mitigate its negative impact, and thus results in anxiety. Here, we focus the broad literature on the neurobiology of anxiety through the lens of uncertainty. We identify five processes essential for adaptive anticipatory responses to future threat uncertainty, and propose that alterations to the neural instantiation of these processes results in maladaptive responses to uncertainty in pathological anxiety. This framework has the potential to advance the classification, diagnosis, and treatment of clinical anxiety. PMID:23783199
Chopra, Shauhrat S; Dillon, Trent; Bilec, Melissa M; Khanna, Vikas
2016-05-01
Modern society is increasingly dependent on the stability of a complex system of interdependent infrastructure sectors. It is imperative to build resilience of large-scale infrastructures like metro systems for addressing the threat of natural disasters and man-made attacks in urban areas. Analysis is needed to ensure that these systems are capable of withstanding and containing unexpected perturbations, and develop heuristic strategies for guiding the design of more resilient networks in the future. We present a comprehensive, multi-pronged framework that analyses information on network topology, spatial organization and passenger flow to understand the resilience of the London metro system. Topology of the London metro system is not fault tolerant in terms of maintaining connectivity at the periphery of the network since it does not exhibit small-world properties. The passenger strength distribution follows a power law, suggesting that while the London metro system is robust to random failures, it is vulnerable to disruptions on a few critical stations. The analysis further identifies particular sources of structural and functional vulnerabilities that need to be mitigated for improving the resilience of the London metro network. The insights from our framework provide useful strategies to build resilience for both existing and upcoming metro systems. © 2016 The Author(s).
Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun
2015-01-01
Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff. PMID:26618034
Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung
2015-10-01
Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.
Alien plant invasions and native plant extinctions: a six-threshold framework.
Downey, Paul O; Richardson, David M
2016-01-01
Biological invasions are widely acknowledged as a major threat to global biodiversity. Species from all major taxonomic groups have become invasive. The range of impacts of invasive taxa and the overall magnitude of the threat is increasing. Plants comprise the biggest and best-studied group of invasive species. There is a growing debate; however, regarding the nature of the alien plant threat-in particular whether the outcome is likely to be the widespread extinction of native plant species. The debate has raised questions on whether the threat posed by invasive plants to native plants has been overstated. We provide a conceptual framework to guide discussion on this topic, in which the threat posed by invasive plants is considered in the context of a progression from no impact through to extinction. We define six thresholds along the 'extinction trajectory', global extinction being the final threshold. Although there are no documented examples of either 'in the wild' (Threshold 5) or global extinctions (Threshold 6) of native plants that are attributable solely to plant invasions, there is evidence that native plants have crossed or breached other thresholds along the extinction trajectory due to the impacts associated with plant invasions. Several factors may be masking where native species are on the trajectory; these include a lack of appropriate data to accurately map the position of species on the trajectory, the timeframe required to definitively state that extinctions have occurred and management interventions. Such interventions, focussing mainly on Thresholds 1-3 (a declining population through to the local extinction of a population), are likely to alter the extinction trajectory of some species. The critical issue for conservation managers is the trend, because interventions must be implemented before extinctions occur. Thus the lack of evidence for extinctions attributable to plant invasions does not mean we should disregard the broader threat. Published by Oxford University Press on behalf of the Annals of Botany Company.
Identification of threats using linguistics-based knowledge extraction.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chew, Peter A.
One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is themore » WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.« less
Mead, Erin L; Cohen, Joanna E; Kennedy, Caitlin E; Gallo, Joseph; Latkin, Carl A
2016-01-01
Health communication theories indicate that messages depicting efficacy and threat might promote behavior change by enhancing individuals' efficacy beliefs and risk perceptions, but this has received little attention in graphic warning label research. We explored low socioeconomic status (SES) smokers' perceptions of theory-based graphic warning labels to inform the development of labels to promote smoking cessation. Twelve graphic warning labels were developed with self-efficacy and response efficacy messages paired with messages portraying high, low, or no threat from smoking. Self-efficacy messages were designed to promote confidence in ability to quit, while response efficacy messages were designed to promote confidence in the ability of the Quitline to aid cessation. From January - February 2014, we conducted in-depth interviews with 25 low SES adult men and women smokers in Baltimore, Maryland, U.S. Participants discussed the labels' role in their self-efficacy beliefs, response efficacy beliefs about the Quitline, and risk perceptions (including perceived severity of and susceptibility to disease). Data were analyzed through framework analysis, a type of thematic analysis. Efficacy messages in which participants vicariously experienced the characters' quit successes were reported as most influential to self-efficacy beliefs. Labels portraying a high threat were reported as most influential to participants' perceived severity of and susceptibility to smoking risks. Self-efficacy messages alone and paired with high threat were seen as most influential on self-efficacy beliefs. Labels portraying the threat from smoking were most motivational for calling the Quitline, followed by labels showing healthy role models who had successfully quit using the Quitline. Role model-based efficacy messages might enhance the effectiveness of labels by making smokers' self-efficacy beliefs about quitting most salient and enhancing the perceived efficacy of the Quitline. Threatening messages play an important role in enhancing risk perceptions, but findings suggest that efficacy messages are also important in the impact of labels on beliefs and motivation. Our findings could aid in the development of labels to address smoking disparities among low SES populations in the U.S.
An, Perry G.
2004-01-01
For roughly forty years, from 1870 to 1910, Americans recognized and feared gases emanating from sewers, believing that they were responsible for causing an array of diseases. Fears of sewer gas arose from deeper anxieties toward contact with decomposing organic matter and the vapors emitted from such refuse. These anxieties were exacerbated by the construction of sewers across the country during the mid-to-late-nineteenth century, which concentrated waste emanations and connected homes to one another. The result was the birth of sewer gas and the attribution of sickness and death to it, as well as the development of a host of plumbing devices and, especially, bathroom fixtures, to combat sewer gas. The rise of the germ theory, laboratory science, and belief in disease specificity, however, transformed the threat of sewer gas, eventually replacing it (and the larger fear of miasmas) with the threat of germs. The germ theory framework, by 1910, proved more suitable than the sewer gas framework in explaining disease causation; it is this suitability that often shapes the relationship between science and society. PMID:15829149
Fuzzy logic based sensor performance evaluation of vehicle mounted metal detector systems
NASA Astrophysics Data System (ADS)
Abeynayake, Canicious; Tran, Minh D.
2015-05-01
Vehicle Mounted Metal Detector (VMMD) systems are widely used for detection of threat objects in humanitarian demining and military route clearance scenarios. Due to the diverse nature of such operational conditions, operational use of VMMD without a proper understanding of its capability boundaries may lead to heavy causalities. Multi-criteria fitness evaluations are crucial for determining capability boundaries of any sensor-based demining equipment. Evaluation of sensor based military equipment is a multi-disciplinary topic combining the efforts of researchers, operators, managers and commanders having different professional backgrounds and knowledge profiles. Information acquired through field tests usually involves uncertainty, vagueness and imprecision due to variations in test and evaluation conditions during a single test or series of tests. This report presents a fuzzy logic based methodology for experimental data analysis and performance evaluation of VMMD. This data evaluation methodology has been developed to evaluate sensor performance by consolidating expert knowledge with experimental data. A case study is presented by implementing the proposed data analysis framework in a VMMD evaluation scenario. The results of this analysis confirm accuracy, practicability and reliability of the fuzzy logic based sensor performance evaluation framework.
The Development and Deployment of a Maintenance Operations Safety Survey.
Langer, Marie; Braithwaite, Graham R
2016-11-01
Based on the line operations safety audit (LOSA), two studies were conducted to develop and deploy an equivalent tool for aircraft maintenance: the maintenance operations safety survey (MOSS). Safety in aircraft maintenance is currently measured reactively, based on the number of audit findings, reportable events, incidents, or accidents. Proactive safety tools designed for monitoring routine operations, such as flight data monitoring and LOSA, have been developed predominantly for flight operations. In Study 1, development of MOSS, 12 test peer-to-peer observations were collected to investigate the practicalities of this approach. In Study 2, deployment of MOSS, seven expert observers collected 56 peer-to-peer observations of line maintenance checks at four stations. Narrative data were coded and analyzed according to the threat and error management (TEM) framework. In Study 1, a line check was identified as a suitable unit of observation. Communication and third-party data management were the key factors in gaining maintainer trust. Study 2 identified that on average, maintainers experienced 7.8 threats (operational complexities) and committed 2.5 errors per observation. The majority of threats and errors were inconsequential. Links between specific threats and errors leading to 36 undesired states were established. This research demonstrates that observations of routine maintenance operations are feasible. TEM-based results highlight successful management strategies that maintainers employ on a day-to-day basis. MOSS is a novel approach for safety data collection and analysis. It helps practitioners understand the nature of maintenance errors, promote an informed culture, and support safety management systems in the maintenance domain. © 2016, Human Factors and Ergonomics Society.
The Development and Deployment of a Maintenance Operations Safety Survey
Langer, Marie; Braithwaite, Graham R.
2016-01-01
Objective: Based on the line operations safety audit (LOSA), two studies were conducted to develop and deploy an equivalent tool for aircraft maintenance: the maintenance operations safety survey (MOSS). Background: Safety in aircraft maintenance is currently measured reactively, based on the number of audit findings, reportable events, incidents, or accidents. Proactive safety tools designed for monitoring routine operations, such as flight data monitoring and LOSA, have been developed predominantly for flight operations. Method: In Study 1, development of MOSS, 12 test peer-to-peer observations were collected to investigate the practicalities of this approach. In Study 2, deployment of MOSS, seven expert observers collected 56 peer-to-peer observations of line maintenance checks at four stations. Narrative data were coded and analyzed according to the threat and error management (TEM) framework. Results: In Study 1, a line check was identified as a suitable unit of observation. Communication and third-party data management were the key factors in gaining maintainer trust. Study 2 identified that on average, maintainers experienced 7.8 threats (operational complexities) and committed 2.5 errors per observation. The majority of threats and errors were inconsequential. Links between specific threats and errors leading to 36 undesired states were established. Conclusion: This research demonstrates that observations of routine maintenance operations are feasible. TEM-based results highlight successful management strategies that maintainers employ on a day-to-day basis. Application: MOSS is a novel approach for safety data collection and analysis. It helps practitioners understand the nature of maintenance errors, promote an informed culture, and support safety management systems in the maintenance domain. PMID:27411354
Attention biases, anxiety, and development: Toward or away from threats or rewards?
Shechner, Tomer; Britton, Jennifer C.; Pérez-Edgar, Koraly; Bar-Haim, Yair; Ernst, Monique; Fox, Nathan A.; Leibenluft, Ellen; Pine, Daniel S.
2012-01-01
Research on attention provides a promising framework for studying anxiety pathophysiology and treatment. The study of attention biases appears particularly pertinent to developmental research, as attention affects learning and has down-stream effects on behavior. This review summarizes recent findings about attention orienting in anxiety, drawing on findings in recent developmental psychopathology and affective neuroscience research. These findings generate specific insights about both development and therapeutics. The review goes beyond a traditional focus on biased processing of threats and considers biased processing of rewards. Building on this work, we then turn to treatment of pediatric anxiety, where manipulation of attention to threat and/or reward may serve a therapeutic role as a component of Attention Bias Modification Therapy. PMID:22170764
Bayesian networks for evaluation of evidence from forensic entomology.
Andersson, M Gunnar; Sundström, Anders; Lindström, Anders
2013-09-01
In the aftermath of a CBRN incident, there is an urgent need to reconstruct events in order to bring the perpetrators to court and to take preventive actions for the future. The challenge is to discriminate, based on available information, between alternative scenarios. Forensic interpretation is used to evaluate to what extent results from the forensic investigation favor the prosecutors' or the defendants' arguments, using the framework of Bayesian hypothesis testing. Recently, several new scientific disciplines have been used in a forensic context. In the AniBioThreat project, the framework was applied to veterinary forensic pathology, tracing of pathogenic microorganisms, and forensic entomology. Forensic entomology is an important tool for estimating the postmortem interval in, for example, homicide investigations as a complement to more traditional methods. In this article we demonstrate the applicability of the Bayesian framework for evaluating entomological evidence in a forensic investigation through the analysis of a hypothetical scenario involving suspect movement of carcasses from a clandestine laboratory. Probabilities of different findings under the alternative hypotheses were estimated using a combination of statistical analysis of data, expert knowledge, and simulation, and entomological findings are used to update the beliefs about the prosecutors' and defendants' hypotheses and to calculate the value of evidence. The Bayesian framework proved useful for evaluating complex hypotheses using findings from several insect species, accounting for uncertainty about development rate, temperature, and precolonization. The applicability of the forensic statistic approach to evaluating forensic results from a CBRN incident is discussed.
Drinking water quality management: a holistic approach.
Rizak, S; Cunliffe, D; Sinclair, M; Vulcano, R; Howard, J; Hrudey, S; Callan, P
2003-01-01
A growing list of water contaminants has led to some water suppliers relying primarily on compliance monitoring as a mechanism for managing drinking water quality. While such monitoring is a necessary part of drinking water quality management, experiences with waterborne disease threats and outbreaks have shown that compliance monitoring for numerical limits is not, in itself, sufficient to guarantee the safety and quality of drinking water supplies. To address these issues, the Australian National Health and Medical Research Council (NHMRC) has developed a Framework for Management of Drinking Water Quality (the Framework) for incorporation in the Australian Drinking Water Guidelines, the primary reference on drinking water quality in Australia. The Framework was developed specifically for drinking water supplies and provides a comprehensive and preventive risk management approach from catchment to consumer. It includes holistic guidance on a range of issues considered good practice for system management. The Framework addresses four key areas: Commitment to Drinking Water Quality Management, System Analysis and System Management, Supporting Requirements, and Review. The Framework represents a significantly enhanced approach to the management and regulation of drinking water quality and offers a flexible and proactive means of optimising drinking water quality and protecting public health. Rather than the primary reliance on compliance monitoring, the Framework emphasises prevention, the importance of risk assessment, maintaining the integrity of water supply systems and application of multiple barriers to assure protection of public health. Development of the Framework was undertaken in collaboration with the water industry, regulators and other stakeholder, and will promote a common and unified approach to drinking water quality management throughout Australia. The Framework has attracted international interest.
Ye, Xin; Liu, Guohua; Li, Zongshan; Wang, Hao; Zeng, Yuan
2015-01-01
Protected areas (PAs) not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitatively assessing local and surrounding threats to different types of PAs with gradient buffers, and to main ecoregions in the Hengduan Mountain Hotspot of southwest China. Our findings show that national protected areas (NPAs) have lower and significantly lower threat values (p<0.05) than provincial protected areas (PPAs) and other protected areas (OPAs), respectively, which indicates that NPAs are lands with a lower threat level and higher levels of protection and management. PAs have clear edge effects, as the proportion of areas with low threat levels decline dramatically in the 5-kilometer buffers just outside the PAs. However, NPAs suffered greater declines (58.3%) than PPAs (34.8%) and OPAs (33.4%) in the 5-kilometer buffers. Moreover, a significant positive correlation was found between the size of PAs and the proportion of areas with low threat levels that they contained in both PAs and PA buffers (p<0.01). To control or mitigate current threats at the regional scale, PA managers often require quantitative information related to threat intensities and spatial distribution. The threat assessment in the Hengduan Mountain Hotspot will be useful to policy makers and managers in their efforts to establish effective plans and target-oriented management strategies. PMID:26382763
Ye, Xin; Liu, Guohua; Li, Zongshan; Wang, Hao; Zeng, Yuan
2015-01-01
Protected areas (PAs) not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitatively assessing local and surrounding threats to different types of PAs with gradient buffers, and to main ecoregions in the Hengduan Mountain Hotspot of southwest China. Our findings show that national protected areas (NPAs) have lower and significantly lower threat values (p<0.05) than provincial protected areas (PPAs) and other protected areas (OPAs), respectively, which indicates that NPAs are lands with a lower threat level and higher levels of protection and management. PAs have clear edge effects, as the proportion of areas with low threat levels decline dramatically in the 5-kilometer buffers just outside the PAs. However, NPAs suffered greater declines (58.3%) than PPAs (34.8%) and OPAs (33.4%) in the 5-kilometer buffers. Moreover, a significant positive correlation was found between the size of PAs and the proportion of areas with low threat levels that they contained in both PAs and PA buffers (p<0.01). To control or mitigate current threats at the regional scale, PA managers often require quantitative information related to threat intensities and spatial distribution. The threat assessment in the Hengduan Mountain Hotspot will be useful to policy makers and managers in their efforts to establish effective plans and target-oriented management strategies.
NASA Astrophysics Data System (ADS)
Ekedebe, Nnanna; Yu, Wei; Song, Houbing; Lu, Chao
2015-05-01
An intelligent transportation system (ITS) is one typical cyber-physical system (CPS) that aims to provide efficient, effective, reliable, and safe driving experiences with minimal congestion and effective traffic flow management. In order to achieve these goals, various ITS technologies need to work synergistically. Nonetheless, ITS's reliance on wireless connectivity makes it vulnerable to cyber threats. Thus, it is critical to understand the impact of cyber threats on ITS. In this paper, using real-world transportation dataset, we evaluated the consequences of cyber threats - attacks against service availability by jamming the communication channel of ITS. In this way, we can have a better understanding of the importance of ensuring adequate security respecting safety and life-critical ITS applications before full and expensive real-world deployments. Our experimental data shows that cyber threats against service availability could adversely affect traffic efficiency and safety performances evidenced by exacerbated travel time, fuel consumed, and other evaluated performance metrics as the communication network is compromised. Finally, we discuss a framework to make ITS secure and more resilient against cyber threats.
Protection: clarifying the concept for use in nursing practice.
Lorenz, Susan G
2007-01-01
The protection of patients is integral in any healthcare setting. Healthcare organizations are increasingly held accountable for preventable medical errors, the attitudes toward safety, and communication among all levels of providers, collaborative practices, and recognition of risks. The concept of protection is inherent in nursing practice. It provides a framework, that further defines healthcare provider's roles in meeting these imperatives. The scope of protection is considered both globally and individually prominent. Nurses protect patients from environmental hazards, themselves, and any perceived threat. In this analysis of the phenomenon, the concept is clarified, and an evidence-based approach to protection is utilized for theory development and concept measurement.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fotion, Katherine A.
2016-08-18
The Radionuclide Analysis Kit (RNAK), my team’s most recent nuclide identification software, is entering the testing phase. A question arises: will removing rare nuclides from the software’s library improve its overall performance? An affirmative response indicates fundamental errors in the software’s framework, while a negative response confirms the effectiveness of the software’s key machine learning algorithms. After thorough testing, I found that the performance of RNAK cannot be improved with the library choice effect, thus verifying the effectiveness of RNAK’s algorithms—multiple linear regression, Bayesian network using the Viterbi algorithm, and branch and bound search.
Claims in vapour device (e-cigarette) regulation: A Narrative Policy Framework analysis.
O'Leary, Renée; Borland, Ron; Stockwell, Tim; MacDonald, Marjorie
2017-06-01
The electronic cigarette or e-cigarette (vapour device) is a consumer product undergoing rapid growth, and governments have been adopting regulations on the sale of the devices and their nicotine liquids. Competing claims about vapour devices have ignited a contentious debate in the public health community. What claims have been taken up in the state arena, and how have they possibly influenced regulatory outcomes? This study utilized Narrative Policy Framework to analyze the claims made about vapour devices in legislation recommendation reports from Queensland Australia, Canada, and the European Union, and the 2016 deeming rule legislation from the United States, and examined the claims and the regulatory outcomes in these jurisdictions. The vast majority of claims in the policy documents represented vapour devices as a threat: an unsafe product harming the health of vapour device users, a gateway product promoting youth tobacco uptake, and a quasi-tobacco product impeding tobacco control. The opportunity for vapour devices to promote cessation or reduce exposure to toxins was very rarely presented, and these positive claims were not discussed at all in two of the four documents studied. The dominant claims of vapour devices as a public health threat have supported regulations that have limited their potential as a harm reduction strategy. Future policy debates should evaluate the opportunities for vapour devices to decrease the health and social burdens of the tobacco epidemic. Copyright © 2017 Elsevier B.V. All rights reserved.
Nuclear security policy in the context of counter-terrorism in Cambodia
DOE Office of Scientific and Technical Information (OSTI.GOV)
Khun, Vuthy, E-mail: vuthy.khun@gmail.com; Wongsawaeng, Doonyapong
The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the contextmore » of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.« less
Byars-Winston, Angela; Gutierrez, Belinda; Topp, Sharon; Carnes, Molly
2011-01-01
Few, if any, educational interventions intended to increase underrepresented minority (URM) graduate students in biological and behavioral sciences are informed by theory and research on career persistence. Training and Education to Advance Minority Scholars in Science (TEAM-Science) is a program funded by the National Institute of General Medical Sciences at the University of Wisconsin-Madison with the twin goals of increasing the number of URM students entering and completing a PhD in BBS and increasing the number of these students who pursue academic careers. A framework for career development in graduate research training is proposed using social cognitive career theory. Based on this framework, TEAM-Science has five core components: 1) mentor training for the research advisor, 2) eight consensus-derived fundamental competencies required for a successful academic career, 3) career coaching by a senior faculty member, 4) an individualized career development plan that aligns students' activities with the eight fundamental competencies, and 5) a strengths, weaknesses, opportunities, and threats personal career analysis. This paper describes the theoretical framework used to guide development of these components, the research and evaluation plan, and early experience implementing the program. We discuss the potential of this framework to increase desired career outcomes for URM graduate trainees in mentored research programs and, thereby, strengthen the effectiveness of such interventions on participants' career behaviors.
Byars-Winston, Angela; Gutierrez, Belinda; Topp, Sharon; Carnes, Molly
2011-01-01
Few, if any, educational interventions intended to increase underrepresented minority (URM) graduate students in biological and behavioral sciences are informed by theory and research on career persistence. Training and Education to Advance Minority Scholars in Science (TEAM-Science) is a program funded by the National Institute of General Medical Sciences at the University of Wisconsin–Madison with the twin goals of increasing the number of URM students entering and completing a PhD in BBS and increasing the number of these students who pursue academic careers. A framework for career development in graduate research training is proposed using social cognitive career theory. Based on this framework, TEAM-Science has five core components: 1) mentor training for the research advisor, 2) eight consensus-derived fundamental competencies required for a successful academic career, 3) career coaching by a senior faculty member, 4) an individualized career development plan that aligns students’ activities with the eight fundamental competencies, and 5) a strengths, weaknesses, opportunities, and threats personal career analysis. This paper describes the theoretical framework used to guide development of these components, the research and evaluation plan, and early experience implementing the program. We discuss the potential of this framework to increase desired career outcomes for URM graduate trainees in mentored research programs and, thereby, strengthen the effectiveness of such interventions on participants’ career behaviors. PMID:22135370
Gould, Gillian S; Watt, Kerrianne; Stevenson, Leah; McEwen, Andy; Cadet-James, Yvonne; Clough, Alan R
2014-03-13
Smoking rates in Australian Aboriginal and Torres Strait Islander peoples remain high, with limited impact of government measures for many subgroups. The aim of this cross-sectional study was to investigate differences in organisational practice for developing anti-tobacco messages for these target populations. Telephone interviews were conducted with 47 organisation representatives using a structured questionnaire based on health communication and health promotion frameworks. Responses were coded into phases of message development, message types (educational, threat, positive or advocacy), target groups, message recommendations, and evaluations undertaken. Cultural sensitivity for message development was divided into surface structure (use of images, language, demographics) and deep structure (use of socio-cultural values). A categorical principal component analysis explored the key dimensions of the findings and their component relationships. Among organisations interviewed, a community-orientated, bottom-up approach for developing anti-tobacco messages was reported by 47% (n=24); 55% based message development on a theoretical framework; 87% used a positive benefit appeal; 38% used threat messages. More Aboriginal Medical Services (AMSs) targeted youth (p<0.005) and advised smokers to quit (p<0.05) than other types of organisations. AMSs were significantly more likely to report using deep structure in tailoring messages compared with non-government (p<0.05) and government organisations (p<0.05). Organisations that were oriented to the general population were more likely to evaluate their programs (p<0.05). A two-dimensional non-linear principal component analysis extracted components interpreted as "cultural understanding" (bottom-up, community-based approaches, deep structures) and "rigour" (theoretical frameworks, and planned/completed evaluations), and accounted for 53% of the variability in the data. Message features, associated with successful campaigns in other populations, are starting to be used for Aboriginal and Torres Strait Islander peoples. A model is proposed to facilitate the development of targeted anti-tobacco messages for Aboriginal and Torres Strait Islander peoples. Organisations could consider incorporating both components of cultural understanding-rigour to enable the growth of evidence-based practice.
2014-01-01
Background Smoking rates in Australian Aboriginal and Torres Strait Islander peoples remain high, with limited impact of government measures for many subgroups. The aim of this cross-sectional study was to investigate differences in organisational practice for developing anti-tobacco messages for these target populations. Methods Telephone interviews were conducted with 47 organisation representatives using a structured questionnaire based on health communication and health promotion frameworks. Responses were coded into phases of message development, message types (educational, threat, positive or advocacy), target groups, message recommendations, and evaluations undertaken. Cultural sensitivity for message development was divided into surface structure (use of images, language, demographics) and deep structure (use of socio-cultural values). A categorical principal component analysis explored the key dimensions of the findings and their component relationships. Results Among organisations interviewed, a community-orientated, bottom-up approach for developing anti-tobacco messages was reported by 47% (n = 24); 55% based message development on a theoretical framework; 87% used a positive benefit appeal; 38% used threat messages. More Aboriginal Medical Services (AMSs) targeted youth (p < 0.005) and advised smokers to quit (p < 0.05) than other types of organisations. AMSs were significantly more likely to report using deep structure in tailoring messages compared with non-government (p < 0.05) and government organisations (p < 0.05). Organisations that were oriented to the general population were more likely to evaluate their programs (p < 0.05). A two-dimensional non-linear principal component analysis extracted components interpreted as “cultural understanding” (bottom-up, community-based approaches, deep structures) and “rigour” (theoretical frameworks, and planned/completed evaluations), and accounted for 53% of the variability in the data. Conclusion Message features, associated with successful campaigns in other populations, are starting to be used for Aboriginal and Torres Strait Islander peoples. A model is proposed to facilitate the development of targeted anti-tobacco messages for Aboriginal and Torres Strait Islander peoples. Organisations could consider incorporating both components of cultural understanding-rigour to enable the growth of evidence-based practice. PMID:24625235
2017-05-25
Wilkinson US Army School of Advanced Military Studies United States Army Command and General Staff College Fort Leavenworth, Kansas 2017 Approved for...SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) Advanced Military Studies Program 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S...adversary’s unconventional threat. To test this framework, this monograph analyzes a case study of how Russia will likely use unconventional forces and
Information fusion: telling the story (or threat narrative)
NASA Astrophysics Data System (ADS)
Fenstermacher, Laurie
2014-06-01
Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.
Mavhandu-Mudzusi, Azwihangwisi Helen; Sandy, Peter Thomas
2015-01-01
This paper reports on the stigma and discrimination experienced by lesbian, gay, bisexual and transgender students at a rural university in South Africa. Twenty lesbian, gay, bisexual and transgender students recruited through snowball sampling participated in this study. Interpretative Phenomenological Analysis was used as a framework for data analysis. Findings indicate that religion-related stigma and discrimination are common at a rural-based university in South Africa. Lesbian, gay, bisexual and transgender students are typically ascribed a range of labels, including 'sinners', 'devils' and 'demon possessed'. They are also exposed to a number of discriminatory acts, such as the denial of financial and healthcare services and threats of and/or actual rape. Study participants reported attempts to convert lesbian, gay, bisexual and transgender students' sexual orientation which involved the use of intervention in the form of prayers. Derogatory labelling and associated discriminatory acts, for example the threat of rape, led many students to conceal their sexual identity, not attend specific classes, terminate their studies and even attempt suicide. Universities should develop policies to promote greater social inclusion and the acceptance of lesbian, gay, bisexual and transgender students. Policies should also specify the steps or approaches to be taken in addressing discriminatory practices.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Markusen, E.R.
After preliminary discussion of the unprecedented scale of mass killing in the twentieth century, the threat of nuclear war, and the widespread neglect of these issues, the literature on two major types of government sanctioned mass killing is reviewed; genocide, in which a government slaughters its own citizens or subjects, and total war, in which two or more governments slaughter each other's civilian citizens or subjects. This literature review reaches two basic conclusions: (1) there is considerable inconsistency and ambiguity among definitions of genocide and total war; and (2) there is a controversy regarding how distinct or similar the twomore » forms of mass killing actually are. A comparative historical analysis was undertaken in which the Nazi Holocaust was selected as an example of genocide, and the Allied strategic bombing campaigns during World War II were selected to exemplify total war. The two cases are compared in terms of a conceptual framework of five hypothesized facilitating factors. On the basis of this comparative analysis, four or the five hypothesized facilitating factors are found to have played important roles in both cases. The findings of the study are discussed, and their implications for the threat of nuclear holocaust are explored.« less
A Cognitive Ecological Model of Women’s Response to Male Sexual Coercion in Dating
Nurius, Paula S.; Norris, Jeanette
2015-01-01
SUMMARY We offer a theoretical model that consolidates background, environmental, and intrapersonal variables related to women’s experience of sexual coercion in dating into a coherent ecological framework and present for the first time a cognitive analysis of the processes women use to formulate responses to sexual coercion. An underlying premise for this model is that a woman’s coping response to sexual coercion by an acquaintance is mediated through cognitive processing of background and situational influences. Because women encounter this form of sexual coercion in the context of relationships and situations that they presume will follow normative expectations (e.g., about making friends, socializing and dating), it is essential to consider normative processes of learning, cognitive mediation, and coping guiding their efforts to interpret and respond to this form of personal threat. Although acts of coercion unquestionably remain the responsibility of the perpetrator, a more complete understanding of the multilevel factors shaping women’s perception of and response to threats can strengthen future inquiry and prevention efforts. PMID:25729157
NASA Astrophysics Data System (ADS)
Thamvichai, Ratchaneekorn; Huang, Liang-Chih; Ashok, Amit; Gong, Qian; Coccarelli, David; Greenberg, Joel A.; Gehm, Michael E.; Neifeld, Mark A.
2017-05-01
We employ an adaptive measurement system, based on sequential hypotheses testing (SHT) framework, for detecting material-based threats using experimental data acquired on an X-ray experimental testbed system. This testbed employs 45-degree fan-beam geometry and 15 views over a 180-degree span to generate energy sensitive X-ray projection data. Using this testbed system, we acquire multiple view projection data for 200 bags. We consider an adaptive measurement design where the X-ray projection measurements are acquired in a sequential manner and the adaptation occurs through the choice of the optimal "next" source/view system parameter. Our analysis of such an adaptive measurement design using the experimental data demonstrates a 3x-7x reduction in the probability of error relative to a static measurement design. Here the static measurement design refers to the operational system baseline that corresponds to a sequential measurement using all the available sources/views. We also show that by using adaptive measurements it is possible to reduce the number of sources/views by nearly 50% compared a system that relies on static measurements.
Nuclear threats from small states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kahan, J.H.
1994-06-13
What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one ormore » more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.« less
Mobile agent application and integration in electronic anamnesis system.
Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De
2012-06-01
Electronic anamnesis is to transform ordinary paper trails to digitally formatted health records, which include the patient's general information, health status, and follow-ups on chronic diseases. Its main purpose is to let the records could be stored for a longer period of time and could be shared easily across departments and hospitals. Which means hospital management could use less resource on maintaining ever-growing database and reduce redundancy, so less money would be spent for managing the health records. In the foreseeable future, building up a comprehensive and integrated medical information system is a must, because it is critical to hospital resource integration and quality improvement. If mobile agent technology is adopted in the electronic anamnesis system, it would help the hospitals to make the medical practices more efficiently and conveniently. Nonetheless, most of the hospitals today are still using paper-based health records to manage the medical information. The reason why the institutions continue using traditional practices to manage the records is because there is no well-trusted and reliable electronic anamnesis system existing and accepted by both institutions and patients. The threat of privacy invasion is one of the biggest concerns when the topic of electronic anamnesis is brought up, because the security threats drag us back from using such a system. So, the medical service quality is difficult to be improved substantially. In this case, we have come up a theory to remove such security threats and make electronic anamnesis more appealing for use. Our theory is to integrate the mobile agent technology with the backbone of electronic anamnesis to construct a hierarchical access control system to retrieve the corresponding information based upon the permission classes. The system would create a classification for permission among the users inside the medical institution. Under this framework, permission control center would distribute an access key to each user, so they would only allow using the key to access information correspondingly. In order to verify the reliability of the proposed system framework, we have also conducted a security analysis to list all the possible security threats that may harm the system and to prove the system is reliable and safe. If the system is adopted, the doctors would be able to quickly access the information while performing medical examinations. Hence, the efficiency and quality of healthcare service would be greatly improved.
Using foresight methods to anticipate future threats: the case of disease management.
Ma, Sai; Seid, Michael
2006-01-01
We describe a unique foresight framework for health care managers to use in longer-term planning. This framework uses scenario-building to envision plausible alternate futures of the U.S. health care system and links those broad futures to business-model-specific "load-bearing" assumptions. Because the framework we describe simultaneously addresses very broad and very specific issues, it can be easily applied to a broad range of health care issues by using the broad framework and business-specific assumptions for the particular case at hand. We illustrate this method using the case of disease management, pointing out that although the industry continues to grow rapidly, its future also contains great uncertainties.
Development of a security vulnerability assessment process for the RAMCAP chemical sector.
Moore, David A; Fuller, Brad; Hazzan, Michael; Jones, J William
2007-04-11
The Department of Homeland Security (DHS), Directorate of Information Analysis & Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors: Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing sector. This method was developed through the cooperation of the many organizations and the individuals involved from the chemical sector RAMCAP development activities. The RAMCAP SVA method is intended to provide a common basis for making vulnerability assessments and risk-based decisions for homeland security. Mr. Moore serves as the coordinator for the chemical manufacturing, petroleum refining, and LNG sectors for the RAMCAP project and Dr. Jones is the chief technology officer for ASME-ITI, LLC for RAMCAP.
Mountjoy, M; Rhind, D J A; Tiivas, A; Leglise, M
2015-01-01
Participation in sport has many physical, psychological and social benefits for the child athlete. A growing body of evidence indicates, however, that sport participation may have inherent threats for the child’s well-being. The subject of safeguarding children in sport has seen an increase in scientific study in recent years. In particular, there is increasing emphasis on identifying who is involved in abuse, the context of where it occurs and the identification of the various forms of abuse that take place in the sporting domain. Safeguarding principles developed by the International Safeguarding Children in Sport Founders Group are presented along with 8 underlying pillars which underpin the successful adoption and implementation of safeguarding strategies. This safeguarding model is designed to assist sport organisations in the creation of a safe sporting environment to ensure that the child athlete can flourish and reach their athletic potential through an enjoyable experience. The aim of this narrative review is to (1) present a summary of the scientific literature on the threats to children in sport; (2) introduce a framework to categorise these threats; (3) identify research gaps in the field and (4) provide safeguarding recommendations for sport organisations. PMID:26084527
Hart, Joshua; Shaver, Phillip R; Goldenberg, Jamie L
2005-06-01
On the basis of prior work integrating attachment theory and terror management theory, the authors propose a model of a tripartite security system consisting of dynamically interrelated attachment, self-esteem, and worldview processes. Four studies are presented that, combined with existing evidence, support the prediction derived from the model that threats to one component of the security system result in compensatory defensive activation of other components. Further, the authors predicted and found that individual differences in attachment style moderate the defenses. In Studies 1 and 2, attachment threats motivated worldview defense among anxiously attached participants and motivated self-enhancement (especially among avoidant participants), effects similar to those caused by mortality salience. In Studies 3 and 4, a worldview threat and a self-esteem threat caused attachment-related proximity seeking among fearful participants and avoidance of proximity among dismissing participants. The authors' model provides an overarching framework within which to study attachment, self-esteem, and worldviews.
Homeland security : a framework for addressing the nation's efforts
DOT National Transportation Integrated Search
2001-09-21
According to a variety of U.S. intelligence assessments, the United States now confronts a range of increasingly diffuse threats that puts greater destructive power into the hands of small states, groups, and individuals and threatens our values and ...
Maritime security report. October 1998 [U.S. international crime control strategy
DOT National Transportation Integrated Search
1998-10-01
To coordinate all relevant Federal agencies, the International Crime Control Strategy (ICCS) was developed. The ICCS is intended to provide a framework for integrating all facets for the Federal response to the direct and immediate threat internation...
NASA Astrophysics Data System (ADS)
Winson, A.; Kinvig, H.; Gottsmann, J.; Partington, E.; Geyer, A.
2008-10-01
We present an analysis of volcanic threat of Nisyros island (Greece) based on a catalogue of questions compiled for the USGS National Volcano Early Warning System (NVEWS). We find that the score puts Nisyros in the league of volcanoes posing a very high threat. US volcanoes with a comparable threat level include Mt. St. Helens, Augustine and the Long Valley caldera.
Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs
Chen, You; Malin, Bradley
2014-01-01
Collaborative information systems (CIS) are deployed within a diverse array of environments, ranging from the Internet to intelligence agencies to healthcare. It is increasingly the case that such systems are applied to manage sensitive information, making them targets for malicious insiders. While sophisticated security mechanisms have been developed to detect insider threats in various file systems, they are neither designed to model nor to monitor collaborative environments in which users function in dynamic teams with complex behavior. In this paper, we introduce a community-based anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on information recorded in the access logs of collaborative environments. CADS is based on the observation that typical users tend to form community structures, such that users with low a nity to such communities are indicative of anomalous and potentially illicit behavior. The model consists of two primary components: relational pattern extraction and anomaly detection. For relational pattern extraction, CADS infers community structures from CIS access logs, and subsequently derives communities, which serve as the CADS pattern core. CADS then uses a formal statistical model to measure the deviation of users from the inferred communities to predict which users are anomalies. To empirically evaluate the threat detection model, we perform an analysis with six months of access logs from a real electronic health record system in a large medical center, as well as a publicly-available dataset for replication purposes. The results illustrate that CADS can distinguish simulated anomalous users in the context of real user behavior with a high degree of certainty and with significant performance gains in comparison to several competing anomaly detection models. PMID:25485309
The health information system security threat lifecycle: an informatics theory.
Fernando, Juanita I; Dawson, Linda L
2009-12-01
This manuscript describes the health information system security threat lifecycle (HISSTL) theory. The theory is grounded in case study data analyzing clinicians' health information system (HIS) privacy and security (P&S) experiences in the practice context. The 'questerview' technique was applied to this study of 26 clinicians situated in 3 large Australian (across Victoria) teaching hospitals. Questerviews rely on data collection that apply standardized questions and questionnaires during recorded interviews. Analysis (using Nvivo) involved the iterative scrutiny of interview transcripts to identify emergent themes. Issues including poor training, ambiguous legal frameworks containing punitive threats, productivity challenges, usability errors and the limitations of the natural hospital environment emerged from empirical data about the clinicians' HIS P&S practices. The natural hospital environment is defined by the permanence of electronic HISs (e-HISs), shared workspaces, outdated HIT infrastructure, constant interruption, a P&S regulatory environment that is not conducive to optimal training outcomes and budgetary constraints. The evidence also indicated the obtrusiveness, timeliness, and reliability of P&S implementations for clinical work affected participant attitudes to, and use of, e-HISs. The HISSTL emerged from the analysis of study evidence. The theory embodies elements such as the fiscal, regulatory and natural hospital environments which impede P&S implementations in practice settings. These elements conflict with improved patient care outcomes. Efforts by clinicians to avoid conflict and emphasize patient care above P&S tended to manifest as security breaches. These breaches entrench factors beyond clinician control and perpetuate those within clinician control. Security breaches of health information can progress through the HISSTL. Some preliminary suggestions for addressing these issues are proposed. Legislative frameworks that are not related to direct patient care were excluded from this study. Other limitations included an exclusive focus on patient care tasks post-admission and pre-discharge from public hospital wards. Finally, the number of cases was limited by the number of participants who volunteered to participate in the study. It is reasonable to assume these participants were more interested in the P&S of patient care work than their counterparts, though the study was not intended to provide quantitative or statistical data. Nonetheless, additional case studies would strengthen the HISSTL theory if confirmatory, practice-based evidence were found.
Wong, Vanessa K; Baker, Stephen; Pickard, Derek J; Parkhill, Julian; Page, Andrew J; Feasey, Nicholas A; Kingsley, Robert A; Thomson, Nicholas R; Keane, Jacqueline A; Weill, François-Xavier; Edwards, David J; Hawkey, Jane; Harris, Simon R; Mather, Alison E; Cain, Amy K; Hadfield, James; Hart, Peter J; Thieu, Nga Tran Vu; Klemm, Elizabeth J; Glinos, Dafni A; Breiman, Robert F; Watson, Conall H; Kariuki, Samuel; Gordon, Melita A; Heyderman, Robert S; Okoro, Chinyere; Jacobs, Jan; Lunguya, Octavie; Edmunds, W John; Msefula, Chisomo; Chabalgoity, Jose A; Kama, Mike; Jenkins, Kylie; Dutta, Shanta; Marks, Florian; Campos, Josefina; Thompson, Corinne; Obaro, Stephen; MacLennan, Calman A; Dolecek, Christiane; Keddy, Karen H; Smith, Anthony M; Parry, Christopher M; Karkey, Abhilasha; Mulholland, E Kim; Campbell, James I; Dongol, Sabina; Basnyat, Buddha; Dufour, Muriel; Bandaranayake, Don; Naseri, Take Toleafoa; Singh, Shalini Pravin; Hatta, Mochammad; Newton, Paul; Onsare, Robert S; Isaia, Lupeoletalalei; Dance, David; Davong, Viengmon; Thwaites, Guy; Wijedoru, Lalith; Crump, John A; De Pinna, Elizabeth; Nair, Satheesh; Nilles, Eric J; Thanh, Duy Pham; Turner, Paul; Soeng, Sona; Valcanis, Mary; Powling, Joan; Dimovski, Karolina; Hogg, Geoff; Farrar, Jeremy; Holt, Kathryn E; Dougan, Gordon
2015-06-01
The emergence of multidrug-resistant (MDR) typhoid is a major global health threat affecting many countries where the disease is endemic. Here whole-genome sequence analysis of 1,832 Salmonella enterica serovar Typhi (S. Typhi) identifies a single dominant MDR lineage, H58, that has emerged and spread throughout Asia and Africa over the last 30 years. Our analysis identifies numerous transmissions of H58, including multiple transfers from Asia to Africa and an ongoing, unrecognized MDR epidemic within Africa itself. Notably, our analysis indicates that H58 lineages are displacing antibiotic-sensitive isolates, transforming the global population structure of this pathogen. H58 isolates can harbor a complex MDR element residing either on transmissible IncHI1 plasmids or within multiple chromosomal integration sites. We also identify new mutations that define the H58 lineage. This phylogeographical analysis provides a framework to facilitate global management of MDR typhoid and is applicable to similar MDR lineages emerging in other bacterial species.
Wong, Vanessa K; Baker, Stephen; Pickard, Derek J; Parkhill, Julian; Page, Andrew J; Feasey, Nicholas A; Kingsley, Robert A; Thomson, Nicholas R; Keane, Jacqueline A; Weill, François-Xavier; Edwards, David J; Hawkey, Jane; Harris, Simon R; Mather, Alison E; Cain, Amy K; Hadfield, James; Hart, Peter J; Thieu, Nga Tran Vu; Klemm, Elizabeth J; Glinos, Dafni A; Breiman, Robert F; Watson, Conall H; Kariuki, Samuel; Gordon, Melita A; Heyderman, Robert S; Okoro, Chinyere; Jacobs, Jan; Lunguya, Octavie; Edmunds, W John; Msefula, Chisomo; Chabalgoity, Jose A; Kama, Mike; Jenkins, Kylie; Dutta, Shanta; Marks, Florian; Campos, Josefina; Thompson, Corinne; Obaro, Stephen; MacLennan, Calman A; Dolecek, Christiane; Keddy, Karen H; Smith, Anthony M; Parry, Christopher M; Karkey, Abhilasha; Mulholland, E Kim; Campbell, James I; Dongol, Sabina; Basnyat, Buddha; Dufour, Muriel; Bandaranayake, Don; Naseri, Take Toleafoa; Singh, Shalini Pravin; Hatta, Mochammad; Newton, Paul; Onsare, Robert S; Isaia, Lupeoletalalei; Dance, David; Davong, Viengmon; Thwaites, Guy; Wijedoru, Lalith; Crump, John A; De Pinna, Elizabeth; Nair, Satheesh; Nilles, Eric J; Thanh, Duy Pham; Turner, Paul; Soeng, Sona; Valcanis, Mary; Powling, Joan; Dimovski, Karolina; Hogg, Geoff; Farrar, Jeremy; Holt, Kathryn E; Dougan, Gordon
2016-01-01
The emergence of multidrug-resistant (MDR) typhoid is a major global health threat affecting many countries where the disease is endemic. Here whole-genome sequence analysis of 1,832 Salmonella enterica serovar Typhi (S. Typhi) identifies a single dominant MDR lineage, H58, that has emerged and spread throughout Asia and Africa over the last 30 years. Our analysis identifies numerous transmissions of H58, including multiple transfers from Asia to Africa and an ongoing, unrecognized MDR epidemic within Africa itself. Notably, our analysis indicates that H58 lineages are displacing antibiotic-sensitive isolates, transforming the global population structure of this pathogen. H58 isolates can harbor a complex MDR element residing either on transmissible IncHI1 plasmids or within multiple chromosomal integration sites. We also identify new mutations that define the H58 lineage. This phylogeographical analysis provides a framework to facilitate global management of MDR typhoid and is applicable to similar MDR lineages emerging in other bacterial species. PMID:25961941
Overgrazing- How far are we from passing the tipping point of turning our rangelands into desert?
USDA-ARS?s Scientific Manuscript database
Ecological science, particularly with regard to Mongolian rangelands, is not able to estimate when a tipping point will be passed. Nonetheless, it does provide a framework for responding to the threat of desertification tipping points. ...
The African Peace and Security Architecture: Myth or Reality
2013-03-01
resolving the conflicts. Efforts by African leaders to create continental peace and security mechanisms failed miserably . Consequently, Africans depended...Framework Document, October 2001), 14. 6 Andre Le Sage, “Africa’s Irregular Security Threats: Challenges for U.S. Engagement,” (Strategic Forum
Chouliara, Zoë; Karatzias, Thanos; Gullone, Angela; Ferguson, Sandra; Cosgrove, Katie; Burke Draucker, Claire
2017-04-01
Our understanding of therapeutic change processes in group therapy for complex interpersonal trauma has been limited. The present study aimed at addressing this gap by developing a framework of therapeutic change in this field from a survivor and therapist perspective. This is a qualitative study, which utilized semistructured individual interviews. Transcripts were analyzed using interpretative phenomenological analysis (IPA) to identify recurrent themes. A final sample of n = 16 patients and n = 5 facilitators completed the interview. Main change processes identified by survivors were as follows: self versus others, trust versus threat, confrontation versus avoidance, and "patching up" versus true healing. Therapeutic processes identified by therapist facilitators included managing group dynamics, unpredictability and uncertainty, and process versus content. The proposed framework explains therapeutic change in group therapy in relational terms, that is, therapeutic dissonance, the dynamic interaction of self and experience as well as building empathic trusting relations. The importance of managing dissonance to aid personally meaningful recovery was highlighted. These findings have implications for the usefulness of relational and person-centered approaches to clinical practice in the area of interpersonal and complex trauma, especially in the early identification, prevention, and management of dropouts.
Albuja, S; Daynard, R A
2009-02-01
The present work concerns the adoption of domestic tobacco control legislation in Ecuador after ratification of the World Health Organization (WHO) Framework Convention on Tobacco Control (FCTC). Analysis of legislation, and data collection via interviews with key actors involved in the adoption and implementation of domestic legislation passed purportedly to implement the FCTC and research of the Ecuadorian Congressional Archives. While the FCTC helped raise awareness about tobacco's imminent and future threats to public health, paradoxically, it had the effect of further entrenching tobacco-friendly norms. Philip Morris, with 87% dominance over the Ecuadorian tobacco market, subtly harnessed the FCTC to protect its interests. This outcome was also influenced by poor governmental readiness and intervention, lack of legislative technical capabilities and weak civil society involvement. The Ecuadorian experience suggests that more support should be provided to health ministries, legislatures and local tobacco control organisations to offset the power of the tobacco industry as developing nations get ready to adopt domestic tobacco control legislation.
Neural circuitry governing anxious individuals' mis-allocation of working memory to threat.
Stout, Daniel M; Shackman, Alexander J; Pedersen, Walker S; Miskovich, Tara A; Larson, Christine L
2017-08-18
Dispositional anxiety is a trait-like phenotype that confers increased risk for a range of debilitating neuropsychiatric disorders. Like many patients with anxiety disorders, individuals with elevated levels of dispositional anxiety are prone to intrusive and distressing thoughts in the absence of immediate threat. Recent electrophysiological research suggests that these symptoms are rooted in the mis-allocation of working memory (WM) resources to threat-related information. Here, functional MRI was used to identify the network of brain regions that support WM for faces and to quantify the allocation of neural resources to threat-related distracters in 81 young adults. Results revealed widespread evidence of mis-allocation. This was evident in both face-selective regions of the fusiform cortex and domain-general regions of the prefrontal and parietal cortices. This bias was exaggerated among individuals with a more anxious disposition. Mediation analyses provided compelling evidence that anxious individuals' tendency to mis-allocate WM resources to threat-related distracters is statistically explained by heightened amygdala reactivity. Collectively, these results provide a neurocognitive framework for understanding the pathways linking anxious phenotypes to the development of internalizing psychopathology and set the stage for developing improved intervention strategies.
Cyber threats to health information systems: A systematic review.
Luna, Raul; Rhine, Emily; Myhra, Matthew; Sullivan, Ross; Kruse, Clemens Scott
2016-01-01
Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. The rationale behind this systematic review is to provide a framework for future research by identifying themes and trends of cybercrime in the healthcare industry. The authors conducted a systematic search through the CINAHL, Academic Search Complete, PubMed, and ScienceDirect databases to gather literature relative to cyber threats in healthcare. All authors reviewed the articles collected and excluded literature that did not focus on the objective. Researchers selected and examined 19 articles for common themes. The most prevalent cyber-criminal activity in healthcare is identity theft through data breach. Other concepts identified are internal threats, external threats, cyber-squatting, and cyberterrorism. The industry has now come to rely heavily on digital technologies, which increase risks such as denial of service and data breaches. Current healthcare cyber-security systems do not rival the capabilities of cyber criminals. Security of information is a costly resource and therefore many HCOs may hesitate to invest what is required to protect sensitive information.
Alien plant invasions and native plant extinctions: a six-threshold framework
Downey, Paul O.; Richardson, David M.
2016-01-01
Biological invasions are widely acknowledged as a major threat to global biodiversity. Species from all major taxonomic groups have become invasive. The range of impacts of invasive taxa and the overall magnitude of the threat is increasing. Plants comprise the biggest and best-studied group of invasive species. There is a growing debate; however, regarding the nature of the alien plant threat—in particular whether the outcome is likely to be the widespread extinction of native plant species. The debate has raised questions on whether the threat posed by invasive plants to native plants has been overstated. We provide a conceptual framework to guide discussion on this topic, in which the threat posed by invasive plants is considered in the context of a progression from no impact through to extinction. We define six thresholds along the ‘extinction trajectory’, global extinction being the final threshold. Although there are no documented examples of either ‘in the wild’ (Threshold 5) or global extinctions (Threshold 6) of native plants that are attributable solely to plant invasions, there is evidence that native plants have crossed or breached other thresholds along the extinction trajectory due to the impacts associated with plant invasions. Several factors may be masking where native species are on the trajectory; these include a lack of appropriate data to accurately map the position of species on the trajectory, the timeframe required to definitively state that extinctions have occurred and management interventions. Such interventions, focussing mainly on Thresholds 1–3 (a declining population through to the local extinction of a population), are likely to alter the extinction trajectory of some species. The critical issue for conservation managers is the trend, because interventions must be implemented before extinctions occur. Thus the lack of evidence for extinctions attributable to plant invasions does not mean we should disregard the broader threat. PMID:27422543
The Motivation-Cognition Interface in Learning and Decision-Making.
Maddox, W Todd; Markman, Arthur B
2010-04-01
In this article we discuss how incentive motivations and task demands affect performance. We present a three-factor framework that suggests that performance is determined from the interaction of global incentives, local incentives, and the psychological processes needed to achieve optimal task performance. We review work that examines the implications of the motivation-cognition interface in classification, choice and on phenomena such as stereotype threat and performance pressure. We show that under some conditions stereotype threat and pressure accentuate performance. We discuss the implications of this work for neuropsychological assessment, and outline a number of challenges for future research.
NASA Astrophysics Data System (ADS)
Bétard, François
2016-04-01
For two decades, geoconservation has been driven by the need to conserve geodiversity considering its values or most valuable elements (i.e. geoheritage) facing the internal or external threats to it, mainly associated with human activities causing damages or irreversible destruction of sites. One main difficulty arises in how geoconservation priorities can objectively be identified at larger scales (e.g., state or region levels). Inspired by experiences in biological conservation, I propose a new conceptual and methodological framework for the identification of geoconservation priorities by theorizing and applying the concept of "geodiversity hotspot". Drawing an obvious parallel with the "biodiversity hotspot" concept first introduced in 1988 by the British ecologist Norman Myers, geodiversity hotspots are here defined as geographic areas that harbour very high levels of geodiversity while being threatened by human activities. From a methodological viewpoint, a basic analytical procedure is proposed to map geodiversity hotspots at a national or regional scale, that can be used as a tool to support decision-making and land-use planning. The method is based on the numerical processing and mapping of two indices: geodiversity index and degree of potential threat. The geodiversity index is calculated using a GIS environment as the sum of four sub-indexes representing the main components of geodiversity, i.e. geological diversity (rocks, minerals, fossils), geomorphodiversity (topography and landforms), pedodiversity (soils and palaeosoils) and hydrodiversity (rivers, lakes, springs…). The degree of potential threat is a graduated scale inversely proportional to the level of protection, from high degree of potential threat in areas without any protection status to low degree of potential threat in areas with high protection level (e.g., national parks, nature reserves). The mapping and delineation of geodiversity hotspots can automatically be obtained from a combination of the two main criteria, i.e. in areas where high geodiversity indexes meet with high degree of potential threat. This area-based approach is discussed along with the risk of neglecting some areas such as "geodiversity coldspots" which may have other types of conservation value. Selected examples from Northeastern Brazil, with a special focus on the Araripe Basin geodiversity hotspot including the eponymous UNESCO Geopark, concretely showcase the conceptual and methodological framework proposed above. Such an example also illustrates the spatial congruence that often exists between geodiversity hotspots and biodiversity hotspots, in a region where very high levels of geodiversity overlap exceptional concentrations of endemic species and present-day biodiversity (Atlantic Forest and savanna-like Cerrado biomes). These observations reinforce the need to assess geodiversity not only for itself, but also to support biodiversity research and actions programs, and should encourage researchers and practitioners to develop more integrated approaches to nature conservation and sustainable land management.
Gushulak, BD; Weekers, J; MacPherson, DW
2010-01-01
International population mobility is an underlying factor in the emergence of public health threats and risks that must be managed globally. These risks are often related, but not limited, to transmissible pathogens. Mobile populations can link zones of disease emergence to lowprevalence or nonendemic areas through rapid or high-volume international movements, or both. Against this background of human movement, other global processes such as economics, trade, transportation, environment and climate change, as well as civil security influence the health impacts of disease emergence. Concurrently, global information systems, together with regulatory frameworks for disease surveillance and reporting, affect organizational and public awareness of events of potential public health significance. International regulations directed at disease mitigation and control have not kept pace with the growing challenges associated with the volume, speed, diversity, and disparity of modern patterns of human movement. The thesis that human population mobility is itself a major determinant of global public health is supported in this article by review of the published literature from the perspective of determinants of health (such as genetics/biology, behavior, environment, and socioeconomics), population-based disease prevalence differences, existing national and international health policies and regulations, as well as inter-regional shifts in population demographics and health outcomes. This paper highlights some of the emerging threats and risks to public health, identifies gaps in existing frameworks to manage health issues associated with migration, and suggests changes in approach to population mobility, globalization, and public health. The proposed integrated approach includes a broad spectrum of stakeholders ranging from individual health-care providers to policy makers and international organizations that are primarily involved in global health management, or are influenced by global health events. PMID:22460280
Gushulak, Bd; Weekers, J; Macpherson, Dw
2009-01-01
International population mobility is an underlying factor in the emergence of public health threats and risks that must be managed globally. These risks are often related, but not limited, to transmissible pathogens. Mobile populations can link zones of disease emergence to lowprevalence or nonendemic areas through rapid or high-volume international movements, or both. Against this background of human movement, other global processes such as economics, trade, transportation, environment and climate change, as well as civil security influence the health impacts of disease emergence. Concurrently, global information systems, together with regulatory frameworks for disease surveillance and reporting, affect organizational and public awareness of events of potential public health significance. International regulations directed at disease mitigation and control have not kept pace with the growing challenges associated with the volume, speed, diversity, and disparity of modern patterns of human movement. The thesis that human population mobility is itself a major determinant of global public health is supported in this article by review of the published literature from the perspective of determinants of health (such as genetics/biology, behavior, environment, and socioeconomics), population-based disease prevalence differences, existing national and international health policies and regulations, as well as inter-regional shifts in population demographics and health outcomes. This paper highlights some of the emerging threats and risks to public health, identifies gaps in existing frameworks to manage health issues associated with migration, and suggests changes in approach to population mobility, globalization, and public health. The proposed integrated approach includes a broad spectrum of stakeholders ranging from individual health-care providers to policy makers and international organizations that are primarily involved in global health management, or are influenced by global health events.
Jeanne C. Chambers; Jeffrey L. Beck; Steve Campbell; John Carlson; Thomas J. Christiansen; Karen J. Clause; Michele R. Crist; Jonathan B. Dinkins; Kevin E. Doherty; Shawn Espinosa; Kathleen A. Griffin; Steven E. Hanser; Douglas W. Havlina; Kenneth F. Henke; Jacob D. Hennig; Laurie L. Kurth; Jeremy D. Maestas; Mary Manning; Kenneth E. Mayer; Brian A. Mealor; Clinton McCarthy; Mike Pellant; Marco A. Perea; Karen L. Prentice; David A. Pyke; Lief A. Wiechman; Amarina Wuenschel
2016-01-01
The Science Framework for the Conservation and Restoration Strategy of the Department of the Interior, Secretarial Order 3336 (SO 3336), Rangeland Fire Prevention, Management and Restoration, provides a strategic, multiscale approach for prioritizing areas for management and determining effective management strategies across the sagebrush biome. The emphasis of this...
Laser Threat Analysis System (LTAS)
NASA Astrophysics Data System (ADS)
Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.
2002-11-01
LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.
Vandergast, Amy G.
2017-06-02
Habitat and species conservation plans usually rely on monitoring to assess progress towards conservation goals. Southern California, USA, is a hotspot of biodiversity and home to many federally endangered and threatened species. Here, several regional multi-species conservation plans have been implemented to balance development and conservation goals, including in San Diego County. In the San Diego County Management Strategic Plan Area (MSPA), a monitoring framework for the preserve system has been developed with a focus on species monitoring, vegetation monitoring, threats monitoring and abiotic monitoring. Genetic sampling over time (genetic monitoring) has proven useful in gathering species presence and abundance data and detecting population trends, particularly related to species and threats monitoring objectives. This report reviews genetic concepts and techniques of genetics that relate to monitoring goals and outlines components of a genetic monitoring scheme that could be applied in San Diego or in other monitoring frameworks throughout the Nation.
Wood, Nathan; Jones, Jeanne; Schelling, John; Schmidtlein, Mathew
2014-01-01
Tsunami vertical-evacuation (TVE) refuges can be effective risk-reduction options for coastal communities with local tsunami threats but no accessible high ground for evacuations. Deciding where to locate TVE refuges is a complex risk-management question, given the potential for conflicting stakeholder priorities and multiple, suitable sites. We use the coastal community of Ocean Shores (Washington, USA) and the local tsunami threat posed by Cascadia subduction zone earthquakes as a case study to explore the use of geospatial, multi-criteria decision analysis for framing the locational problem of TVE siting. We demonstrate a mixed-methods approach that uses potential TVE sites identified at community workshops, geospatial analysis to model changes in pedestrian evacuation times for TVE options, and statistical analysis to develop metrics for comparing population tradeoffs and to examine influences in decision making. Results demonstrate that no one TVE site can save all at-risk individuals in the community and each site provides varying benefits to residents, employees, customers at local stores, tourists at public venues, children at schools, and other vulnerable populations. The benefit of some proposed sites varies depending on whether or not nearby bridges will be functioning after the preceding earthquake. Relative rankings of the TVE sites are fairly stable under various criteria-weighting scenarios but do vary considerably when comparing strategies to exclusively protect tourists or residents. The proposed geospatial framework can serve as an analytical foundation for future TVE siting discussions.
Marusak, Hilary A; Iadipaolo, Allesandra S; Harper, Felicity W; Elrahal, Farrah; Taub, Jeffrey W; Goldberg, Elimelech; Rabinak, Christine A
2018-06-01
Today, children are surviving pediatric cancer at unprecedented rates, making it one of modern medicine's true success stories. However, we are increasingly becoming aware of several deleterious effects of cancer and the subsequent "cure" that extend beyond physical sequelae. Indeed, survivors of childhood cancer commonly report cognitive, emotional, and psychological difficulties, including attentional difficulties, anxiety, and posttraumatic stress symptoms (PTSS). Cognitive late- and long-term effects have been largely attributed to neurotoxic effects of cancer treatments (e.g., chemotherapy, cranial irradiation, surgery) on brain development. The role of childhood adversity in pediatric cancer - namely, the presence of a life-threatening disease and endurance of invasive medical procedures - has been largely ignored in the existing neuroscientific literature, despite compelling research by our group and others showing that exposure to more commonly studied adverse childhood experiences (i.e., domestic and community violence, physical, sexual, and emotional abuse) strongly imprints on neural development. While these adverse childhood experiences are different in many ways from the experience of childhood cancer (e.g., context, nature, source), they do share a common element of exposure to threat (i.e., threat to life or physical integrity). Therefore, we argue that the double hit of early threat and cancer treatments likely alters neural development, and ultimately, cognitive, behavioral, and emotional outcomes. In this paper, we (1) review the existing neuroimaging research on child, adolescent, and adult survivors of childhood cancer, (2) summarize gaps in our current understanding, (3) propose a novel neurobiological framework that characterizes childhood cancer as a type of childhood adversity, particularly a form of early threat, focusing on development of the hippocampus and the salience and emotion network (SEN), and (4) outline future directions for research.
Lee, Adrian J; Jacobson, Sheldon H
2012-02-01
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.
Bedyńska, Sylwia; Żołnierczyk-Zreda, Dorota
2015-01-01
Stereotype threat as an example of serious interpersonal strain at workplace can lead either to impaired work engagement or it can motivate workers to strengthen their efforts to disconfirm a stereotype and can result in excessive work engagement. Thus, the basic aim of the study was to examine whether stereotype threat is related to burnout or to work engagement. The mediating role of the negative and positive emotions were also tested in the classical approach. Mediational analysis revealed a linear relation of stereotype threat and burnout, mediated by negative emotions and a quadratic relationship between stereotype threat and work engagement. In the latter analysis none of the mediators were significant. Therefore, the results showed that both burnout and work engagement are associated with stereotype threat at the workplace, probably depending on the stage of response to the stereotype threat. Further research should confirm these associations in a longitudinal study.
Threats to the ecological integrity of marine and estuarine systems operate over many spatial scales, from nutrient enrichment at watershed/estuarine linkages to invasive species and climate change at regional/global scales. Decision support tools and information systems needed t...
School Security and Crisis Preparedness: Make It Your Business.
ERIC Educational Resources Information Center
Trump, Kenneth S.
1999-01-01
The top five security risks in today's schools include aggressive behavior, weapons possession or use, drug trafficking, gangs, and "stranger danger." Home-made bomb threats are common. This article also discusses security system costs, risk-reduction frameworks, security assessments, crisis-preparedness guidelines, and security-related…
Fan, Mark; Petrosoniak, Andrew; Pinkney, Sonia; Hicks, Christopher; White, Kari; Almeida, Ana Paula Siquiera Silva; Campbell, Douglas; McGowan, Melissa; Gray, Alice; Trbovich, Patricia
2016-11-07
Errors in trauma resuscitation are common and have been attributed to breakdowns in the coordination of system elements (eg, tools/technology, physical environment and layout, individual skills/knowledge, team interaction). These breakdowns are triggered by unique circumstances and may go unrecognised by trauma team members or hospital administrators; they can be described as latent safety threats (LSTs). Retrospective approaches to identifying LSTs (ie, after they occur) are likely to be incomplete and prone to bias. To date, prospective studies have not used video review as the primary mechanism to identify any and all LSTs in trauma resuscitation. A series of 12 unannounced in situ simulations (ISS) will be conducted to prospectively identify LSTs at a level 1 Canadian trauma centre (over 800 dedicated trauma team activations annually). 4 scenarios have already been designed as part of this protocol based on 5 recurring themes found in the hospital's mortality and morbidity process. The actual trauma team will be activated to participate in the study. Each simulation will be audio/video recorded from 4 different camera angles and transcribed to conduct a framework analysis. Video reviewers will code the videos deductively based on a priori themes of LSTs identified from the literature, and/or inductively based on the events occurring in the simulation. LSTs will be prioritised to target interventions in future work. Institutional research ethics approval has been acquired (SMH REB #15-046). Results will be published in peer-reviewed journals and presented at relevant conferences. Findings will also be presented to key institutional stakeholders to inform mitigation strategies for improved patient safety. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Wilhelm, Frank H; Rattel, Julina A; Wegerer, Melanie; Liedlgruber, Michael; Schweighofer, Simon; Kreibig, Sylvia D; Kolodyazhniy, Vitaliy; Blechert, Jens
2017-12-01
Sex differences in emotional reactivity have been studied primarily for negative but less so for positive stimuli; likewise, sex differences in the psychophysiological response-patterning during such stimuli are poorly understood. Thus, the present study examined sex differences in response to negative/positive and high/low arousing films (classified as threat-, loss-, achievement-, and recreation-related, vs. neutral films), while measuring 18 muscular, autonomic, and respiratory parameters. Sex differences emerged for all films, but were most prominent for threat-related films: Despite equivalent valence and arousal ratings, women displayed more facial-muscular and respiratory responding than men and pronounced sympathetic activation (preejection period, other cardiovascular and electrodermal measures), while men showed coactivated sympathetic/parasympathetic responding (including increased respiratory sinus arrhythmia). This indicates a prototypical threat-related defense response in women, while men showed a pattern of sustained orienting, which can be understood as a shift toward less threat proximity in the defense cascade model. Clinical implications are discussed within a socio-evolutionary framework. Copyright © 2017 Elsevier B.V. All rights reserved.
A Decision Theoretic Approach to Evaluate Radiation Detection Algorithms
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nobles, Mallory A.; Sego, Landon H.; Cooley, Scott K.
2013-07-01
There are a variety of sensor systems deployed at U.S. border crossings and ports of entry that scan for illicit nuclear material. In this work, we develop a framework for comparing the performance of detection algorithms that interpret the output of these scans and determine when secondary screening is needed. We optimize each algorithm to minimize its risk, or expected loss. We measure an algorithm’s risk by considering its performance over a sample, the probability distribution of threat sources, and the consequence of detection errors. While it is common to optimize algorithms by fixing one error rate and minimizing another,more » our framework allows one to simultaneously consider multiple types of detection errors. Our framework is flexible and easily adapted to many different assumptions regarding the probability of a vehicle containing illicit material, and the relative consequences of a false positive and false negative errors. Our methods can therefore inform decision makers of the algorithm family and parameter values which best reduce the threat from illicit nuclear material, given their understanding of the environment at any point in time. To illustrate the applicability of our methods, in this paper, we compare the risk from two families of detection algorithms and discuss the policy implications of our results.« less
Detecting Anomalous Insiders in Collaborative Information Systems
Chen, You; Nyemba, Steve; Malin, Bradley
2012-01-01
Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on the access logs of collaborative environments. The framework is based on the observation that typical CIS users tend to form community structures based on the subjects accessed (e.g., patients’ records viewed by healthcare providers). CADS consists of two components: 1) relational pattern extraction, which derives community structures and 2) anomaly prediction, which leverages a statistical model to determine when users have sufficiently deviated from communities. We further extend CADS into MetaCADS to account for the semantics of subjects (e.g., patients’ diagnoses). To empirically evaluate the framework, we perform an assessment with three months of access logs from a real electronic health record (EHR) system in a large medical center. The results illustrate our models exhibit significant performance gains over state-of-the-art competitors. When the number of illicit users is low, MetaCADS is the best model, but as the number grows, commonly accessed semantics lead to hiding in a crowd, such that CADS is more prudent. PMID:24489520
Edmunds, Kelly L.; Hunter, Paul R.; Few, Roger; Bell, Diana J.
2013-01-01
Highly pathogenic avian influenza virus (HPAI) strain H5N1 has had direct and indirect economic impacts arising from direct mortality and control programmes in over 50 countries reporting poultry outbreaks. HPAI H5N1 is now reported as the most widespread and expensive zoonotic disease recorded and continues to pose a global health threat. The aim of this research was to assess the potential of utilising Hazard Analysis of Critical Control Points (HACCP) assessments in providing a framework for a rapid response to emerging infectious disease outbreaks. This novel approach applies a scientific process, widely used in food production systems, to assess risks related to a specific emerging health threat within a known zoonotic disease hotspot. We conducted a HACCP assessment for HPAI viruses within Vietnam’s domestic poultry trade and relate our findings to the existing literature. Our HACCP assessment identified poultry flock isolation, transportation, slaughter, preparation and consumption as critical control points for Vietnam’s domestic poultry trade. Introduction of the preventative measures highlighted through this HACCP evaluation would reduce the risks posed by HPAI viruses and pressure on the national economy. We conclude that this HACCP assessment provides compelling evidence for the future potential that HACCP analyses could play in initiating a rapid response to emerging infectious diseases. PMID:23967294
The Great Society: An Introduction to Stereotype Threat and Social Perceptions
NASA Astrophysics Data System (ADS)
Shackelford, R.; Ali, N. A.; Mendez, B.; Meinke, B. K.
2015-11-01
This workshop introduced the concept of stereotype threat, in which an individual's academic performance is affected by awareness of stereotypes. We explored how stereotype threat builds into perceptions and creates contradictions in our society that can impact work with particular groups, with an emphasis on working with Afro-American and urban audiences. Through the “The Great Society” activity, participants worked in groups to develop aesthetics and taboos for fictional societies. We discussed the ways in which each group's values are compatible and conflicting, how they influence our perceptions of self and others, and how similar interactions may be experienced while working with diverse audiences in earth and space science education and outreach efforts. This workshop sought to give participants a conceptual framework for cultivating awareness of their own and their audience's perceptions, which can then be used to work with cultural sensitivity with diverse audiences.
Mastering one's destiny: mastery goals promote challenge and success despite social identity threat.
Stout, Jane G; Dasgupta, Nilanjana
2013-06-01
We used an achievement goal framework to enhance identity-threatened individuals' motivation and performance by way of an understudied mechanism, namely, challenge appraisals. In three experiments, women were given a mastery goal (focus on building skills) or a performance goal (perform well, avoid errors) before a mock job interview. Women who focused on mastery rather than performance felt more challenged and less threatened when anticipating an identity-threatening interview; goals did not affect appraisals of a nonthreatening interview (Experiment 1). Mastery relative to performance goals enhanced women's intention to be assertive (Experiment 2) and their actual face-to-face performance during the job interview (Experiment 3); challenge appraisals (but not threat appraisals) served as a mediator for these effects. Whereas a great deal of prior work has alleviated identity threat by altering construals of one's identity, the current research uses an alternative strategy--modifying appraisals of the situation, leaving one's self-concept intact.
NASA Astrophysics Data System (ADS)
Caldwell, M.; Ransley, M.; Rogers, T. W.; Griffin, L. D.
2017-10-01
A significant obstacle to developing high performance Deep Learning algorithms for Automated Threat Detection (ATD) in security X-ray imagery, is the difficulty of obtaining large training datasets. In our previous work, we circumvented this problem for ATD in cargo containers, using Threat Image Projection and data augmentation. In this work, we investigate whether data scarcity for other modalities, such as parcels and baggage, can be ameliorated by transforming data from one domain so that it approximates the appearance of another. We present an ontology of ATD datasets to assess where transfer learning may be applied. We define frameworks for transfer at the training and testing stages, and compare the results for both methods against ATD where a common data source is used for training and testing. Our results show very poor transfer, which we attribute to the difficulty of accurately matching the blur and contrast characteristics of different scanners.
Selecting essential information for biosurveillance--a multi-criteria decision analysis.
Generous, Nicholas; Margevicius, Kristen J; Taylor-McCabe, Kirsten J; Brown, Mac; Daniel, W Brent; Castro, Lauren; Hengartner, Andrea; Deshpande, Alina
2014-01-01
The National Strategy for Biosurveillance defines biosurveillance as "the process of gathering, integrating, interpreting, and communicating essential information related to all-hazards threats or disease activity affecting human, animal, or plant health to achieve early detection and warning, contribute to overall situational awareness of the health aspects of an incident, and to enable better decision-making at all levels." However, the strategy does not specify how "essential information" is to be identified and integrated into the current biosurveillance enterprise, or what the metrics qualify information as being "essential". The question of data stream identification and selection requires a structured methodology that can systematically evaluate the tradeoffs between the many criteria that need to be taken in account. Multi-Attribute Utility Theory, a type of multi-criteria decision analysis, can provide a well-defined, structured approach that can offer solutions to this problem. While the use of Multi-Attribute Utility Theoryas a practical method to apply formal scientific decision theoretical approaches to complex, multi-criteria problems has been demonstrated in a variety of fields, this method has never been applied to decision support in biosurveillance.We have developed a formalized decision support analytic framework that can facilitate identification of "essential information" for use in biosurveillance systems or processes and we offer this framework to the global BSV community as a tool for optimizing the BSV enterprise. To demonstrate utility, we applied the framework to the problem of evaluating data streams for use in an integrated global infectious disease surveillance system.
Environmental DNA calibration study. Interim technical review report
Baerwaldt, K.; Bartron, Meredith L.; Schilling, K.; Lee, Debbie; Russo, Edmond; Estes, Trudy; Fischer, Richard; Fleming, Beth; Guilfoyle, Michael P.; Kilgore, K. Jack; Lance, Richard; Perkins, Edward; Schultz, Martin; Smith, David; Amberg, Jon J.; Chapman, Duane C.; Gaikowski, Mark P.; Klymus, Katy E.; Richter, Catherine A.
2014-01-01
Should a sustainable Asian carp population become established in the Great Lakes, native fish populations, as well as many threatened or endangered plant/animal species populations, could be impacted. In response to this threat, the Asian Carp Regional Control Committee (ACRCC) was formed in part to coordinate efforts to understand and organize against the Asian carp threat. The Asian Carp Control Strategy Framework (2012a) outlined major tasks to be completed for a better understanding of factors related to the advance of Asian carp populations towards the Great Lakes. In addition, the ACRCC formed the Monitoring and Rapid Response Workgroup to address Asian carp monitoring and removal (ACRCC 2012b).
Nuclear and radiological Security: Introduction.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, James Christopher
Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of themore » various entities involved in nuclear security.« less
Cyberwarfare on the Electricity Infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Murarka, N.; Ramesh, V.C.
2000-03-20
The report analyzes the possibility of cyberwarfare on the electricity infrastructure. The ongoing deregulation of the electricity industry makes the power grid all the more vulnerable to cyber attacks. The report models the power system information system components, models potential threats and protective measures. It therefore offers a framework for infrastructure protection.
Reconstructing Operational Theory: A Framework for Emerging Threats in a Complex Environment
2007-01-01
General Shimon Naveh. While the composition and construction of the urban environment traditionally influence targeting calculus , this is not the same as... Anton . "The Relevance of Chaos Theory to Operations." Australian Defense Force Journal. No. 162. Sep/Oct 2003, 4-18. Lind, William
Conflict Termination : A Selected Bibliography
2014-02-01
JZ6374 .G65 2011) Gompert, David C., Terrence K. Kelly, and Jessica Watkins . Security in Iraq: A Framework for Analyzing Emerging Threats as U.S...Strategy. Washington, DC: United States Institute of Peace, February 2011. 12pp. http://www.usip.org/files/ resources/SR267Jarvenpaa.pdf Jones, Seth G
Near-coastal (0-200 depth) ecosystems and species are under threat from increasing temperatures, ocean acidification, and sea level rise. However, species vary in their vulnerability to specific climatic changes and climate impacts will vary geographically. For management to resp...
The Threat of Unexamined Secondary Data: A Critical Race Transformative Convergent Mixed Methods
ERIC Educational Resources Information Center
Garcia, Nichole M.; Mayorga, Oscar J.
2018-01-01
This article uses a critical race theory framework to conceptualize a Critical Race Transformative Convergent Mixed Methods (CRTCMM) in education. CRTCMM is a methodology that challenges normative educational research practices by acknowledging that racism permeates educational institutions and marginalizes Communities of Color. The focus of this…
Cybersecurity Strategy in Developing Nations: A Jamaica Case Study
ERIC Educational Resources Information Center
Newmeyer, Kevin Patrick
2014-01-01
Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security arising from an increased dependency on Internet-connected systems in the developing world and rising cybercrime. Using a neorealist theoretical framework that draws from Gilpin and Waltz, this qualitative…
Reconstructing Operational Theory: A Framework for Emerging Threats in a Complex Environment
2007-01-01
closely with the above-sited Deleuze, referred to his writings as a toolbox from which users can apply his summations as needed. See also: Michel Foucault ...military planners. Eyal Weizman uses this term in his article “Lethal Theory” purposefully. Renowned philosopher Michael Foucault , who worked
Contributions of the Central Extended Amygdala to Fear and Anxiety.
Shackman, Alexander J; Fox, Andrew S
2016-08-03
It is widely thought that phasic and sustained responses to threat reflect dissociable circuits centered on the central nucleus of the amygdala (Ce) and the bed nucleus of the stria terminalis (BST), the two major subdivisions of the central extended amygdala. Early versions of this hypothesis remain highly influential and have been incorporated into the National Institute of Mental Health Research Research Domain Criteria framework. However, new observations encourage a different perspective. Anatomical studies show that the Ce and BST form a tightly interconnected unit, where different kinds of threat-relevant information can be integrated and used to assemble states of fear and anxiety. Imaging studies in humans and monkeys show that the Ce and BST exhibit similar functional profiles. Both regions are sensitive to a range of aversive challenges, including uncertain or temporally remote threat; both covary with concurrent signs and symptoms of fear and anxiety; both show phasic responses to short-lived threat; and both show heightened activity during sustained exposure to diffusely threatening contexts. Mechanistic studies demonstrate that both regions can control the expression of fear and anxiety during sustained exposure to diffuse threat. These observations compel a reconsideration of the central extended amygdala's contributions to fear and anxiety and its role in neuropsychiatric disease. Copyright © 2016 the authors 0270-6474/16/368050-14$15.00/0.
Contributions of the Central Extended Amygdala to Fear and Anxiety
2016-01-01
It is widely thought that phasic and sustained responses to threat reflect dissociable circuits centered on the central nucleus of the amygdala (Ce) and the bed nucleus of the stria terminalis (BST), the two major subdivisions of the central extended amygdala. Early versions of this hypothesis remain highly influential and have been incorporated into the National Institute of Mental Health Research Research Domain Criteria framework. However, new observations encourage a different perspective. Anatomical studies show that the Ce and BST form a tightly interconnected unit, where different kinds of threat-relevant information can be integrated and used to assemble states of fear and anxiety. Imaging studies in humans and monkeys show that the Ce and BST exhibit similar functional profiles. Both regions are sensitive to a range of aversive challenges, including uncertain or temporally remote threat; both covary with concurrent signs and symptoms of fear and anxiety; both show phasic responses to short-lived threat; and both show heightened activity during sustained exposure to diffusely threatening contexts. Mechanistic studies demonstrate that both regions can control the expression of fear and anxiety during sustained exposure to diffuse threat. These observations compel a reconsideration of the central extended amygdala's contributions to fear and anxiety and its role in neuropsychiatric disease. PMID:27488625
Warning Triggers in Environmental Hazards: Who Should Be Warned to Do What and When?
Cova, Thomas J; Dennison, Philip E; Li, Dapeng; Drews, Frank A; Siebeneck, Laura K; Lindell, Michael K
2017-04-01
Determining the most effective public warnings to issue during a hazardous environmental event is a complex problem. Three primary questions need to be answered: Who should take protective action? What is the best action? and When should this action be initiated? Warning triggers provide a proactive means for emergency managers to simultaneously answer these questions by recommending that a target group take a specified protective action if a preset environmental trigger condition occurs (e.g., warn a community to evacuate if a wildfire crosses a proximal ridgeline). Triggers are used to warn the public across a wide variety of environmental hazards, and an improved understanding of their nature and role promises to: (1) advance protective action theory by unifying the natural, built, and social themes in hazards research into one framework, (2) reveal important information about emergency managers' risk perception, situational awareness, and threat assessment regarding threat behavior and public response, and (3) advance spatiotemporal models for representing the geography and timing of disaster warning and response (i.e., a coupled natural-built-social system). We provide an overview and research agenda designed to advance our understanding and modeling of warning triggers. © 2016 Society for Risk Analysis.
Spatially-Correlated Risk in Nature Reserve Site Selection
Albers, Heidi J.; Busby, Gwenlyn M.; Hamaide, Bertrand; Ando, Amy W.; Polasky, Stephen
2016-01-01
Establishing nature reserves protects species from land cover conversion and the resulting loss of habitat. Even within a reserve, however, many factors such as fires and defoliating insects still threaten habitat and the survival of species. To address the risk to species survival after reserve establishment, reserve networks can be created that allow some redundancy of species coverage to maximize the expected number of species that survive in the presence of threats. In some regions, however, the threats to species within a reserve may be spatially correlated. As examples, fires, diseases, and pest infestations can spread from a starting point and threaten neighboring parcels’ habitats, in addition to damage caused at the initial location. This paper develops a reserve site selection optimization framework that compares the optimal reserve networks in cases where risks do and do not reflect spatial correlation. By exploring the impact of spatially-correlated risk on reserve networks on a stylized landscape and on an Oregon landscape, this analysis demonstrates an appropriate and feasible method for incorporating such post-reserve establishment risks in the reserve site selection literature as an additional tool to be further developed for future conservation planning. PMID:26789127
E-mentoring for violence and injury prevention: early lessons from a global programme.
Wadhwaniya, Shirin; Meddings, David; Gururaj, Gopalkrishna; Ozanne-Smith, Joan; Ameratunga, Shanthi; Hyder, Adnan A
2015-01-01
To address the growing burden of violence and injuries, especially in low- and middle-income countries, in 2007 the World Health Organization launched MENTOR-VIP, a global violence and injury prevention (VIP)-mentoring programme. The programme aims to develop human resource capacity through 12-month mentoring arrangements between individual VIP experts (mentors) and less-experienced injury practitioners (mentees). In this paper, we review the first five years of the programme (2007-2011) using a systems analysis and SWOT (Strengths, Weaknesses, Opportunities and Threats) frameworks, discuss programme findings and make recommendations. A well-defined programme with clear instructions, successful matching of mentorship pairs with similar interests and language, a formal accord agreement, institutional support and effective communication were identified as programme strengths. Overambitious projects, lack of funds and difficulties with communications were identified as programme weaknesses. Mentorship projects that require institutional permissions or resources could be potential threats to the success of mentorship. The study resulted in the four following recommendations to strengthen the programme: (1) institute additional steps in selection and matching mentor-mentee pair; (2) train mentors on e-mentoring; (3) conduct special orientation for mentees to the programme; and (4) maintain effective and open communication throughout the programme.
Conventional and New Ways of Governing Forest Threats: A Study of Stakeholder Coherence in Sweden.
Eriksson, Louise
2018-01-01
Based on a framework for analyzing stakeholder coherence horizontally and vertically, the present study examined the governance of forest threats in Sweden. Opinions of forest risk governance in stakeholder groups with and without a connection to private forestry were compared (n = 2496) and the opinions were analyzed in relation to current governance practices. More specifically, forest threat appraisals, trust in the Swedish Forest Agency (SFA), and the acceptability of forest risk policy measures directed at private forest owners were assessed. Results revealed an overall coherence between different stakeholders in this context. However, the groups differed in, for example, the acceptability of the hypothetical regulative measure aiming to reduce damages threatening the forest long-term (e.g., climate change). Furthermore, an extensive use of advice for a fee may challenge particularly the internal, but also the external, legitimacy of forest risk governance. The forest owner stakeholder group showed lower threat appraisals when evaluating threat to one's own forest rather than to the Swedish forest, except regarding browsing by animals. Regulations were not disapproved of in any of the stakeholder groups, although the forest owner group generally displayed higher acceptability of encouraging measures compared to the general public. Trust in the SFA was furthermore confirmed as an important driver of policy acceptability, and higher threat appraisals of novel threats, such as climate change and fire, resulted in a higher acceptability of measures less central or new in this context. The value of analyzing stakeholder coherence for natural resource management and governance is discussed.
Conventional and New Ways of Governing Forest Threats: A Study of Stakeholder Coherence in Sweden
NASA Astrophysics Data System (ADS)
Eriksson, Louise
2018-01-01
Based on a framework for analyzing stakeholder coherence horizontally and vertically, the present study examined the governance of forest threats in Sweden. Opinions of forest risk governance in stakeholder groups with and without a connection to private forestry were compared ( n = 2496) and the opinions were analyzed in relation to current governance practices. More specifically, forest threat appraisals, trust in the Swedish Forest Agency (SFA), and the acceptability of forest risk policy measures directed at private forest owners were assessed. Results revealed an overall coherence between different stakeholders in this context. However, the groups differed in, for example, the acceptability of the hypothetical regulative measure aiming to reduce damages threatening the forest long-term (e.g., climate change). Furthermore, an extensive use of advice for a fee may challenge particularly the internal, but also the external, legitimacy of forest risk governance. The forest owner stakeholder group showed lower threat appraisals when evaluating threat to one's own forest rather than to the Swedish forest, except regarding browsing by animals. Regulations were not disapproved of in any of the stakeholder groups, although the forest owner group generally displayed higher acceptability of encouraging measures compared to the general public. Trust in the SFA was furthermore confirmed as an important driver of policy acceptability, and higher threat appraisals of novel threats, such as climate change and fire, resulted in a higher acceptability of measures less central or new in this context. The value of analyzing stakeholder coherence for natural resource management and governance is discussed.
Are you ready? Crisis leadership in a hyper-VUCA environment.
Alkhaldi, Khaldoon H; Austin, Meredith L; Cura, Boris A; Dantzler, Darrell; Holland, Leslie; Maples, David L; Quarrelles, Jamie C; Weinkle, Robert K; Marcus, Leonard J
2017-01-01
The current hyper-volatile, -uncertain, -complex, and -ambiguous (VUCA) threat environment demands a more cohesive support structure for crisis leaders who may be faced with crises of increasing magnitude and frequency and, in some instances, multiple crisis events simultaneously. The project team investigates the perceptions of crisis leaders regarding establishing a crisis leader advisor position for crisis leaders to benefit from their experience while prosecuting crisis response activities. The team linked hyper-VUCA crises, crisis response frameworks, meta-leadership, crisis leader attributes, and advisor attributes. The overall goal of the project is to increase the ability of the crisis leaders to more effectively and efficiently navigate crisis events resulting in more efficient and effective response and recovery. Three research questions were developed to assess the following: thoughts of integrating a crisis leader advisor position; development of a crisis leader advisor certification program; and attributes of crisis leader advisors. A qualitative research methodology using a phenomenological approach was employed. Forty-one participants were purposefully selected and administered a short, online survey consisting of 11 questions. Data were analyzed using percentage analysis, weighted sums, and inductive thematic analysis. The project team found an overwhelming support for the crisis leader advisor position and the crisis leader advisor certification program. Additionally, experience and trustworthiness ranked among the top sought after attributes of a crisis leader advisor. The team recommendations included (1) implement a crisis leaders advisor guide/framework; (2) create a formal crisis leader advisor position in national incident management system; (3) implement a crisis leader advisor certification framework; (4) benchmark established advisor programs; and (5) implement a framework to match leaders and advisors.
Are you ready? Crisis leadership in a hyper-VUCA environment.
Alkhaldi, Khaldoon H; Austin, Meredith L; Cura, Boris A; Dantzler, Darrell; Holland, Leslie; Maples, David L; Quarrelles, Jamie C; Weinkle, Robert K; Marcus, Leonard J
The current hyper-volatile, -uncertain, -complex, and -ambiguous (VUCA) threat environment demands a more cohesive support structure for crisis leaders who may be faced with crises of increasing magnitude and frequency and, in some instances, multiple crisis events simultaneously. The project team investigates the perceptions of crisis leaders regarding establishing a crisis leader advisor position for crisis leaders to benefit from their experience while prosecuting crisis response activities. The team linked hyper-VUCA crises, crisis response frameworks, meta-leadership, crisis leader attributes, and advisor attributes. The overall goal of the project is to increase the ability of the crisis leaders to more effectively and efficiently navigate crisis events resulting in more efficient and effective response and recovery. Three research questions were developed to assess the following: thoughts of integrating a crisis leader advisor position; development of a crisis leader advisor certification program; and attributes of crisis leader advisors. A qualitative research methodology using a phenomenological approach was employed. Forty-one participants were purposefully selected and administered a short, on-line survey consisting of 11 questions. Data were analyzed using percentage analysis, weighted sums, and inductive thematic analysis. The project team found an overwhelming support for the crisis leader advisor position and the crisis leader advisor certification program. Additionally, experience and trustworthiness ranked among the top sought after attributes of a crisis leader advisor. The team recommendations included (1) implement a crisis leaders advisor guide/framework; (2) create a formal crisis leader advisor position in national incident management system; (3) implement a crisis leader advisor certification framework; (4) benchmark established advisor programs; and (5) implement a framework to match leaders and advisors.
Are you ready? Crisis leadership in a hyper-VUCA environment.
Alkhaldi, Khaldoon H; Austin, Meredith L; Cura, Boris A; Dantzler, Darrell; Holland, Leslie; Maples, David L; Quarrelles, Jamie C; Weinkle, Robert K; Marcus, Leonard J
The current hyper-volatile, -uncertain, -complex, and -ambiguous (VUCA) threat environment demands a more cohesive support structure for crisis leaders who may be faced with crises of increasing magnitude and frequency and, in some instances, multiple crisis events simultaneously. The project team investigates the perceptions of crisis leaders regarding establishing a crisis leader advisor position for crisis leaders to benefit from their experience while prosecuting crisis response activities. The team linked hyper-VUCA crises, crisis response frameworks, meta-leadership, crisis leader attributes, and advisor attributes. The overall goal of the project is to increase the ability of the crisis leaders to more effectively and efficiently navigate crisis events resulting in more efficient and effective response and recovery. Three research questions were developed to assess the following: thoughts of integrating a crisis leader advisor position; development of a crisis leader advisor certification program; and attributes of crisis leader advisors. A qualitative research methodology using a phenomenological approach was employed. Forty-one participants were purposefully selected and administered a short, on-line survey consisting of 11 questions. Data were analyzed using percentage analysis,weighted sums, and inductive thematic analysis. The project team found an overwhelming support for the crisis leader advisor position and the crisis leader advisor certification program. Additionally, experience and trustworthiness ranked among the top sought after attributes of a crisis leader advisor. The team recommendations included (1) implement a crisis leaders advisor guide/framework; (2) create a formal crisis leader advisor position in national incident management system; (3) implement a crisis leader advisor certification framework; (4) benchmark established advisor programs; and (5) implement a framework to match leaders and advisors.
Pervasive competition between threat and reward in the brain
Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip
2014-01-01
In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the ‘salience hypothesis’, in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the ‘competition hypothesis’, the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. PMID:23547242
Weiss, Rachel I.; McKie, Karen L.; Goodman, Richard A.
2007-01-01
Law influenced every aspect of the public health response to Hurricanes Katrina and Rita, from evacuation orders, to waivers of medical licensing requirements, to the clean-up of public health threats on private property. We used public health surveillance of news reports to identify and characterize legal issues arising during the disaster response in 5 Gulf Coast states. Data collected from news reports of the events in real time were followed-up by interviews with selected state legal and emergency management officials. Our analysis indicates the value of surveillance during and after emergency responses in identifying public health–related legal issues and helps to inform the strengthening of legal preparedness frameworks for future disasters. PMID:17413083
Strategic planning for neuroradiologists.
Berlin, Jonathan W; Lexa, Frank J
2012-08-01
Strategic planning is becoming essential to neuroradiology as the health care environment continues to emphasize cost efficiency, teamwork and collaboration. A strategic plan begins with a mission statement and vision of where the neuroradiology division would like to be in the near future. Formalized strategic planning frameworks, such as the strengths, weaknesses, opportunities and threats (SWOT), and the Balanced Scorecard frameworks, can help neuroradiology divisions determine their current position in the marketplace. Communication, delegation, and accountability in neuroradiology is essential in executing an effective strategic plan. Copyright © 2012 Elsevier Inc. All rights reserved.
Bedyńska, Sylwia; Żołnierczyk-Zreda, Dorota
2015-01-01
Stereotype threat as an example of serious interpersonal strain at workplace can lead either to impaired work engagement or it can motivate workers to strengthen their efforts to disconfirm a stereotype and can result in excessive work engagement. Thus, the basic aim of the study was to examine whether stereotype threat is related to burnout or to work engagement. The mediating role of the negative and positive emotions were also tested in the classical approach. Mediational analysis revealed a linear relation of stereotype threat and burnout, mediated by negative emotions and a quadratic relationship between stereotype threat and work engagement. In the latter analysis none of the mediators were significant. Therefore, the results showed that both burnout and work engagement are associated with stereotype threat at the workplace, probably depending on the stage of response to the stereotype threat. Further research should confirm these associations in a longitudinal study. PMID:26327256
Understanding the Anti-Access and Area Denial Threat: An Army Perspective
2015-05-21
Perspective Approved by: , Monograph Director Peter J . Schifferle, PhD , Seminar Leader James MacGregor, COL...targeting purposes. See also: Ben Berk , China’s Silver Bullet: A Brief Analysis of the Threat Posed by the PRC’s Anti- ship Ballistic Missile (Chapel...16Ben Berk , China’s Silver Bullet: A Brief Analysis of the Threat Posed by the PRC’s Anti
Kuchinke, Wolfgang; Ohmann, Christian; Verheij, Robert A; van Veen, Evert-Ben; Arvanitis, Theodoros N; Taweel, Adel; Delaney, Brendan C
2014-12-01
To develop a model describing core concepts and principles of data flow, data privacy and confidentiality, in a simple and flexible way, using concise process descriptions and a diagrammatic notation applied to research workflow processes. The model should help to generate robust data privacy frameworks for research done with patient data. Based on an exploration of EU legal requirements for data protection and privacy, data access policies, and existing privacy frameworks of research projects, basic concepts and common processes were extracted, described and incorporated into a model with a formal graphical representation and a standardised notation. The Unified Modelling Language (UML) notation was enriched by workflow and own symbols to enable the representation of extended data flow requirements, data privacy and data security requirements, privacy enhancing techniques (PET) and to allow privacy threat analysis for research scenarios. Our model is built upon the concept of three privacy zones (Care Zone, Non-care Zone and Research Zone) containing databases, data transformation operators, such as data linkers and privacy filters. Using these model components, a risk gradient for moving data from a zone of high risk for patient identification to a zone of low risk can be described. The model was applied to the analysis of data flows in several general clinical research use cases and two research scenarios from the TRANSFoRm project (e.g., finding patients for clinical research and linkage of databases). The model was validated by representing research done with the NIVEL Primary Care Database in the Netherlands. The model allows analysis of data privacy and confidentiality issues for research with patient data in a structured way and provides a framework to specify a privacy compliant data flow, to communicate privacy requirements and to identify weak points for an adequate implementation of data privacy. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Policies on pets for healthy cities: a conceptual framework
Rock, Melanie J.; Adams, Cindy L.; Degeling, Chris; Massolo, Alessandro; McCormack, Gavin R.
2015-01-01
Drawing on the One Health concept, and integrating a dual focus on public policy and practices of caring from the Ottawa Charter for Health Promotion, we outline a conceptual framework to help guide the development and assessment of local governments' policies on pets. This framework emphasizes well-being in human populations, while recognizing that these outcomes relate to the well-being of non-human animals. Five intersecting spheres of activity, each associated with local governments' jurisdiction over pets, are presented: (i) preventing threats and nuisances from pets, (ii) meeting pets' emotional and physical needs, (iii) procuring pets ethically, (iv) providing pets with veterinary services and (v) licensing and identifying pets. This conceptual framework acknowledges the tenets of previous health promotion frameworks, including overlapping and intersecting influences. At the same time, this framework proposes to advance our understanding of health promotion and, more broadly, population health by underscoring interdependence between people and pets as well as the dynamism of urbanized ecologies. PMID:24694682
Identification and analysis of obstacles in bioterrorism preparedness and response
NASA Astrophysics Data System (ADS)
Sincavage, Suzanne Michele
The focus of this study was to identify and analyze the obstacles to bioterrorism preparedness and response facing emergency management agencies and public authorities. In order to establish the limits of this discussion, the obstacles will examine a combined conceptual framework of public health, environmental security and social response. The interdisciplinary characteristics of this framework are ideal for addressing the issue of bioterrorism because of its simultaneous impact, which encompasses the complex interrelationships that pertain to public health and national security and social response. Based on a review of literature, the obstacles presented range from the absence of an effective surveillance system for biological terrorism related diseases to the inadequate training of first responders in bioterrorism preparedness and the difficult challenges of a mass casualty situation and the intense pressures associated with the crisis response. Furthermore, the impending reality of bioterrorism will further illustrate a close examination of the characteristics and management of three major biowarfare agents---anthrax, plague and smallpox. Finally, to provide a realistic understanding of the impact of bioterrorism, three case studies of actual events and two hypothetical scenarios will be discussed. Specifically, the discussion will provide the following three unconventional terrorist attacks: the recent anthrax attacks of 2001, the Aum Shinrikyo's attack of the Tokyo subway in 1995, and the Rajneeshees' use of salmonella poisoning in 1994. The inclusion of the hypothetical scenarios of two massive outbreaks of smallpox and anthrax will be presented to illuminate the seriousness and magnitude of the threat of bioterrorism and the probable consequences of failing to overcome the obstacles presented in this study. The importance of this research cannot be overemphasized, the threat is undeniably serious, and the potential for biological agents to cause devastating casualties can be minimized with the fighting strength of education.
Velsko, Stephan; Bates, Thomas
2016-01-01
Despite numerous calls for improvement, the US biosurveillance enterprise remains a patchwork of uncoordinated systems that fail to take advantage of the rapid progress in information processing, communication, and analytics made in the past decade. By synthesizing components from the extensive biosurveillance literature, we propose a conceptual framework for a national biosurveillance architecture and provide suggestions for implementation. The framework differs from the current federal biosurveillance development pathway in that it is not focused on systems useful for "situational awareness" but is instead focused on the long-term goal of having true warning capabilities. Therefore, a guiding design objective is the ability to digitally detect emerging threats that span jurisdictional boundaries, because attempting to solve the most challenging biosurveillance problem first provides the strongest foundation to meet simpler surveillance objectives. Core components of the vision are: (1) a whole-of-government approach to support currently disparate federal surveillance efforts that have a common data need, including those for food safety, vaccine and medical product safety, and infectious disease surveillance; (2) an information architecture that enables secure national access to electronic health records, yet does not require that data be sent to a centralized location for surveillance analysis; (3) an inference architecture that leverages advances in "big data" analytics and learning inference engines-a significant departure from the statistical process control paradigm that underpins nearly all current syndromic surveillance systems; and (4) an organizational architecture with a governance model aimed at establishing national biosurveillance as a critical part of the US national infrastructure. Although it will take many years to implement, and a national campaign of education and debate to acquire public buy-in for such a comprehensive system, the potential benefits warrant increased consideration by the US government.
Margevicius, Kristen J.; Generous, Nicholas; Taylor-McCabe, Kirsten J.; Brown, Mac; Daniel, W. Brent; Castro, Lauren; Hengartner, Andrea; Deshpande, Alina
2014-01-01
In recent years, biosurveillance has become the buzzword under which a diverse set of ideas and activities regarding detecting and mitigating biological threats are incorporated depending on context and perspective. Increasingly, biosurveillance practice has become global and interdisciplinary, requiring information and resources across public health, One Health, and biothreat domains. Even within the scope of infectious disease surveillance, multiple systems, data sources, and tools are used with varying and often unknown effectiveness. Evaluating the impact and utility of state-of-the-art biosurveillance is, in part, confounded by the complexity of the systems and the information derived from them. We present a novel approach conceptualizing biosurveillance from the perspective of the fundamental data streams that have been or could be used for biosurveillance and to systematically structure a framework that can be universally applicable for use in evaluating and understanding a wide range of biosurveillance activities. Moreover, the Biosurveillance Data Stream Framework and associated definitions are proposed as a starting point to facilitate the development of a standardized lexicon for biosurveillance and characterization of currently used and newly emerging data streams. Criteria for building the data stream framework were developed from an examination of the literature, analysis of information on operational infectious disease biosurveillance systems, and consultation with experts in the area of biosurveillance. To demonstrate utility, the framework and definitions were used as the basis for a schema of a relational database for biosurveillance resources and in the development and use of a decision support tool for data stream evaluation. PMID:24392093
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miron, M.S.; Christopher, C.; Hirshfield, S.
1978-05-01
Psycholinguistics provides crisis managers in nuclear threat incidents with a quantitative methodology which can aid in the determination of threat credibility, authorship identification and perpetrator apprehension. The objective of this contract is to improve and enhance present psycholinguistic software systems by means of newly-developed, computer-automated techniques which significantly extend the technology of automated content and stylistic analysis of nuclear threat. In accordance with this overall objective, the first two contract Tasks have been completed and are reported on in this document. The first Task specifies the development of software support for the purpose of syntax regularization of vocabulary to rootmore » form. The second calls for the exploration and development of alternative approaches to correlative analysis of vocabulary usage.« less
Bønes, Erlend; Hasvold, Per; Henriksen, Eva; Strandenaes, Thomas
2007-09-01
Instant messaging (IM) is suited for immediate communication because messages are delivered almost in real time. Results from studies of IM use in enterprise work settings make us believe that IM based services may prove useful also within the healthcare sector. However, today's public instant messaging services do not have the level of information security required for adoption of IM in healthcare. We proposed MedIMob, our own architecture for a secure enterprise IM service for use in healthcare. MedIMob supports IM clients on mobile devices in addition to desktop based clients. Security threats were identified in a risk analysis of the MedIMob architecture. The risk analysis process consists of context identification, threat identification, analysis of consequences and likelihood, risk evaluation, and proposals for risk treatment. The risk analysis revealed a number of potential threats to the information security of a service like this. Many of the identified threats are general when dealing with mobile devices and sensitive data; others are threats which are more specific to our service and architecture. Individual threats identified in the risks analysis are discussed and possible counter measures presented. The risk analysis showed that most of the proposed risk treatment measures must be implemented to obtain an acceptable risk level; among others blocking much of the additional functionality of the smartphone. To conclude on the usefulness of this IM service, it will be evaluated in a trial study of the human-computer interaction. Further work also includes an improved design of the proposed MedIMob architecture. 2006 Elsevier Ireland Ltd
Altered brain activation and connectivity during anticipation of uncertain threat in trait anxiety.
Geng, Haiyang; Wang, Yi; Gu, Ruolei; Luo, Yue-Jia; Xu, Pengfei; Huang, Yuxia; Li, Xuebing
2018-06-08
In the research field of anxiety, previous studies generally focus on emotional responses following threat. A recent model of anxiety proposes that altered anticipation prior to uncertain threat is related with the development of anxiety. Behavioral findings have built the relationship between anxiety and distinct anticipatory processes including attention, estimation of threat, and emotional responses. However, few studies have characterized the brain organization underlying anticipation of uncertain threat and its role in anxiety. In the present study, we used an emotional anticipation paradigm with functional magnetic resonance imaging (fMRI) to examine the aforementioned topics by employing brain activation and general psychophysiological interactions (gPPI) analysis. In the activation analysis, we found that high trait anxious individuals showed significantly increased activation in the thalamus, middle temporal gyrus (MTG), and dorsomedial prefrontal cortex (dmPFC), as well as decreased activation in the precuneus, during anticipation of uncertain threat compared to the certain condition. In the gPPI analysis, the key regions including the amygdala, dmPFC, and precuneus showed altered connections with distributed brain areas including the ventromedial prefrontal cortex (vmPFC), dorsolateral prefrontal cortex (dlPFC), inferior parietal sulcus (IPS), insula, para-hippocampus gyrus (PHA), thalamus, and MTG involved in anticipation of uncertain threat in anxious individuals. Taken together, our findings indicate that during the anticipation of uncertain threat, anxious individuals showed altered activations and functional connectivity in widely distributed brain areas, which may be critical for abnormal perception, estimation, and emotion reactions during the anticipation of uncertain threat. © 2018 Wiley Periodicals, Inc.
A genetically anchored physical framework for Theobroma cacao cv. Matina 1-6
USDA-ARS?s Scientific Manuscript database
Background: Theobroma cacao (cacao tree) is the main ingredient in chocolate. World cocoa production is estimated to be 7 million tons in 2010 with an annual estimated average growth rate of 2.2%. This cacao bean production industry is currently under threat from a rise in fungal diseases includi...
Learning about Agriculture within the Framework of Education for Sustainability
ERIC Educational Resources Information Center
Tal, Tali
2008-01-01
The last two decades have seen increased threats to agricultural landscapes in Israel. Key factors include population growth, strong pressure from construction entrepreneurs and possible profit to land owners who benefit from a legal conversion of farmland into lands allocated for construction. While each Israeli elementary school student used to…
Threats to marine and estuarine species operate over many spatial scales, from nutrient enrichment at the watershed/estuarine scale to invasive species and climate change at regional and global scales. To help address research questions across these scales, we provide here a stan...
Debbie Jewitt; Barend F.N. Erasmus; Peter S. Goodman; Timothy G. O' Connor; William W. Hargrove; Damian M. Maddalena; Ed. T.F. Witkowski
2015-01-01
Global climate change is having marked influences on species distributions, phenology and ecosystem composition and raises questions as to the effectiveness of current conservation strategies. Conservation planning has only recently begun to adequately account for dynamic threats such as climate change. We propose a method to incorporate climate-dynamic environmental...
An Autonomic Framework for Integrating Security and Quality of Service Support in Databases
ERIC Educational Resources Information Center
Alomari, Firas
2013-01-01
The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…
ERIC Educational Resources Information Center
Richman, Laura Smart; Leary, Mark R.
2009-01-01
This article describes a new model that provides a framework for understanding people's reactions to threats to social acceptance and belonging as they occur in the context of diverse phenomena such as rejection, discrimination, ostracism, betrayal, and stigmatization. People's immediate reactions are quite similar across different forms of…
ERIC Educational Resources Information Center
Chateignier, Cindy; Dutrevis, Marion; Nugier, Armelle; Chekroun, Peggy
2009-01-01
Stigmatized group membership leads to deleterious consequences for individuals. More specifically, according to stereotype threat literature, the awareness of negative intellectual stereotypes can impair stereotyped group members' performance. Based on this framework, two studies were designed to explain the lower grades obtained by French-Arab…
Conducting Adolescent Violence Risk Assessments: A Framework for 419 School Counselors
ERIC Educational Resources Information Center
Bernes, Kerry B.; Bardick, Angela D.
2007-01-01
There have been numerous publications devoted to preventing violence and bullying in schools, resulting in school counselors being well equipped with school-wide violence prevention ideas and programs. Despite these violence prevention efforts, some students may pose a threat to others and thus may require a comprehensive assessment for violence…
Kean, Brian
2005-01-01
This article reports the findings of a research study that used a critical social research methodology to review the increase in use of the diagnosis of attention deficit hyperactivity disorder (ADHD) and conceptualized the phenomenon within a theoretical framework based upon Beck's (1992, 1999) periodization of social change, the Risk Society. The study was qualitative in nature. Data were drawn from a wide range of sources including legitimating hearings, reports and studies, texts and seminal documents, field observations in schools and classrooms, and electronic discussion/bulletin board, and in-depth interviews with parents and teachers. The analysis used a critical framework to locate specific instances of claim and counter-claim and to set the historical context for understanding the "modern biological" method of intervention with children considered by parents and teachers as having ADHD. The findings of the study are structured in the context of risks. Further research will inform whether the risks become threats. Through exposure of silences, myths, contradictions and power relationships that create risks surrounding the ADHD phenomenon, it is hoped that discourse concerning the hegemonic medical model of ADHD in research and in the wider community will be further critically examined.
Natural zeolite reactivity towards ozone: the role of compensating cations.
Valdés, Héctor; Alejandro, Serguei; Zaror, Claudio A
2012-08-15
Among indoor pollutants, ozone is recognised to pose a threat to human health. Recently, low cost natural zeolites have been applied as alternative materials for ozone abatement. In this work, the effect of compensating cation content of natural zeolite on ozone removal is studied. A Chilean natural zeolite is used here as starting material. The amount of compensating cations in the zeolite framework was modified by ion exchange using an ammonium sulphate solution (0.1 mol L(-1)). Characterisation of natural and modified zeolites were performed by X-ray powder diffraction (XRD), nitrogen adsorption at 77K, elemental analysis, X-ray fluorescence (XRF), thermogravimetric analysis coupled with mass spectroscopy (TGA-MS), and temperature-programmed desorption of ammonia (NH(3)-TPD). Ozone adsorption and/or decomposition on natural and modified zeolites were studied by diffuse reflectance infrared Fourier transform spectroscopy (DRIFTS). Results show that the zeolite compensating cation content affects ozone interaction with zeolite active sites. Ammonium ion-exchange treatments followed by thermal out-gassing at 823 K, reduces ozone diffusion resistance inside the zeolite framework, increasing ozone abatement on zeolite surface active sites. Weak and strong Lewis acid sites of zeolite surface are identified here as the main active sites responsible of ozone removal. Copyright © 2012 Elsevier B.V. All rights reserved.
Jones, Christina L.; Jensen, Jakob D.; Scherr, Courtney L.; Brown, Natasha R.; Christy, Katheryn; Weaver, Jeremy
2015-01-01
The Health Belief Model (HBM) posits that messages will achieve optimal behavior change if they successfully target perceived barriers, benefits, self-efficacy, and threat. While the model seems to be an ideal explanatory framework for communication research, theoretical limitations have limited its use in the field. Notably, variable ordering is currently undefined in the HBM. Thus, it is unclear whether constructs mediate relationships comparably (parallel mediation), in sequence (serial mediation), or in tandem with a moderator (moderated mediation). To investigate variable ordering, adults (N = 1,377) completed a survey in the aftermath of an 8-month flu vaccine campaign grounded in the HBM. Exposure to the campaign was positively related to vaccination behavior. Statistical evaluation supported a model where the indirect effect of exposure on behavior through perceived barriers and threat was moderated by self-efficacy (moderated mediation). Perceived barriers and benefits also formed a serial mediation chain. The results indicate that variable ordering in the Health Belief Model may be complex, may help to explain conflicting results of the past, and may be a good focus for future research. PMID:25010519
Towards an eco-phylogenetic framework for infectious disease ecology.
Fountain-Jones, Nicholas M; Pearse, William D; Escobar, Luis E; Alba-Casals, Ana; Carver, Scott; Davies, T Jonathan; Kraberger, Simona; Papeş, Monica; Vandegrift, Kurt; Worsley-Tonks, Katherine; Craft, Meggan E
2018-05-01
Identifying patterns and drivers of infectious disease dynamics across multiple scales is a fundamental challenge for modern science. There is growing awareness that it is necessary to incorporate multi-host and/or multi-parasite interactions to understand and predict current and future disease threats better, and new tools are needed to help address this task. Eco-phylogenetics (phylogenetic community ecology) provides one avenue for exploring multi-host multi-parasite systems, yet the incorporation of eco-phylogenetic concepts and methods into studies of host pathogen dynamics has lagged behind. Eco-phylogenetics is a transformative approach that uses evolutionary history to infer present-day dynamics. Here, we present an eco-phylogenetic framework to reveal insights into parasite communities and infectious disease dynamics across spatial and temporal scales. We illustrate how eco-phylogenetic methods can help untangle the mechanisms of host-parasite dynamics from individual (e.g. co-infection) to landscape scales (e.g. parasite/host community structure). An improved ecological understanding of multi-host and multi-pathogen dynamics across scales will increase our ability to predict disease threats. © 2017 Cambridge Philosophical Society.
Meta-analysis in evidence-based healthcare: a paradigm shift away from random effects is overdue.
Doi, Suhail A R; Furuya-Kanamori, Luis; Thalib, Lukman; Barendregt, Jan J
2017-12-01
Each year up to 20 000 systematic reviews and meta-analyses are published whose results influence healthcare decisions, thus making the robustness and reliability of meta-analytic methods one of the world's top clinical and public health priorities. The evidence synthesis makes use of either fixed-effect or random-effects statistical methods. The fixed-effect method has largely been replaced by the random-effects method as heterogeneity of study effects led to poor error estimation. However, despite the widespread use and acceptance of the random-effects method to correct this, it too remains unsatisfactory and continues to suffer from defective error estimation, posing a serious threat to decision-making in evidence-based clinical and public health practice. We discuss here the problem with the random-effects approach and demonstrate that there exist better estimators under the fixed-effect model framework that can achieve optimal error estimation. We argue for an urgent return to the earlier framework with updates that address these problems and conclude that doing so can markedly improve the reliability of meta-analytical findings and thus decision-making in healthcare.
Biglan, Anthony; Barnes-Holmes, Yvonne
2015-01-01
Despite extensive knowledge of how to prevent or ameliorate serious diseases, natural disasters, environmental degradation, and a wide range of other problems, we often fail to take action that that would prevent or mitigate these problematic outcomes. In short, although we may have sound scientific knowledge about threats to future wellbeing, we appear to have limited insight into how to benefit from this knowledge. With this paper, we argue that our current scientific understanding of how to act in light of the future is limited, but we offer a theoretical analysis of future-oriented behavior at both individual and organizational levels. Specifically, the paper draws on a functional contextualist account of human language and cognition, Relational Frame Theory (RFT), and its integrated therapeutic approach, Acceptance and Commitment Therapy (ACT), and extends this framework to analyzing the evolution of the practices of groups and organizations. This framework can provide an understanding of how human behavior may be modified in the present to serve improving human wellbeing in the future at individual, organizational, and even national levels. PMID:26693140
NASA Astrophysics Data System (ADS)
Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli
In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.
Creating a framework for the prioritization of biosecurity risks to the New Zealand dairy industry.
Muellner, P; Hodges, D; Ahlstrom, C; Newman, M; Davidson, R; Pfeiffer, D; Marshall, J; Morley, C
2018-03-25
The New Zealand dairy sector relies on robust biosecurity measures to control and mitigate a wide range of threats to the industry. To optimize the prioritization of organisms and manage the risk they pose to the sector in a transparent and credible way, the Dairy Biosecurity Risk Evaluation Framework (D-BRiEF) was developed. This comprehensive framework was specifically designed for decision support, using a standardized approach to address the full spectrum of biosecurity threats to the sector, including exotic and endemic animal disease organisms, pest plants and insects. D-BRiEF is underpinned by three main processes, namely (i) hazard identification; (ii) multicriteria risk assessment; and (iii) communication for risk management. Expert knowledge and empirical data, including associated uncertainty, are harnessed in a standardized format. Results feed into a probability-impact model that was developed in close collaboration with dairy sector economists to provide overall comparative 10-year quantitative economic impact estimates for each assessed risk organism. A description of the overarching framework, which applies to diverse organism groups, is presented with detailed methodology on both endemic and exotic animal disease risk organisms. Examples of visual outputs are included, although actual ranking results are not reported due to industry confidentiality. D-BRiEF can provide a decision advantage to DairyNZ biosecurity risk managers and sector stakeholders by creating a transparent process that can be interrogated and updated at multiple levels to fully understand the layers of risk posed by different organisms. © 2018 Blackwell Verlag GmbH.
Pervasive competition between threat and reward in the brain.
Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz
2014-06-01
In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.
Threats: power, family mealtimes, and social influence.
Hepburn, Alexa; Potter, Jonathan
2011-03-01
One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.
He, Han-Qing; Ling, Luo-Ya; Xu, Xu-Qing
2009-02-01
To know the status of Immunization program in Zhejiang Province. The investigation on immunization program in zhejiang province was conducted, and the SWOT analysis was corducted to make a comprehensive evaluation. 11 cities, 22 counties and 44 towns were investigated in this study, and the current immunization program in Zhejiang province were explored by SWOT analysis. The SWOT Matrix, includes SO (strength-opportunity), ST (strength-threat), WO (weakness-opportunity) and WT (weakness-threat) can apply to make optimal strategy for the development of expanded program on immunization.
Leuschner, Vincenz; Bondü, Rebecca; Allroggen, Marc; Scheithauer, Herbert
2016-01-01
Threats and announcements of homicidal violence at schools may have massive consequences like evacuations, police searches, criminal investigations, or loss of the sense of security by students, teachers, and parents. However, there is a lack of systematic studies about that phenomenon. The present article would like to contribute to closing the research gap. It presents results about the frequency and structure of threats and announcements of homicidal violence in schools in Berlin. The study is based on an official dataset from school administration reports of violent acts in Berlin schools which has been studied within the Berlin Leaking-Projekt. The sample consists of 427 threats and announcements of homicidal violence between 1996 and 2007. The study is an exceptional analysis of the phenomenon: it presents crosscutting results about frequency and characteristics of threats and the threatening students as well as results of a longitudinal analysis about the development of threats and announcements. Results show a rate of 0,3 threats and announcements per 1 000 student and year. During the observation time span a steady increase of threats and announcements – year by year, influenced by imitation effects after school shootings – has been observed.
Increasing Space Situational Awareness for NEOs
NASA Astrophysics Data System (ADS)
Hestroffer, Daniel J. G. J.; Eggl, Siegfried; Thuillot, William
2015-05-01
Over the past years, Europe has strengthened its commitment to foster space situational awareness. Apart from the current efforts in tracking space weather, artificial satellites and space debris, Near Earth Asteroid threat assessment is a key task. NEOshield has been part of this European effort. We will give an overview over national projects and European programs with French participation such as PoDET, ESTERS, FRIPON, NEOShield, Gaia-FUN-SSO and Stardust. Future plans regarding Near Earth Object threat assessment and mitigation are described. The role of the IMCCE in this framework is discussed using the example of the post mitigation impact risk analyis of Gravity Tractor and Kinetic Impactor based asteroid deflection demonstration mission designs.
Hurdles to Overcome to Model Carrington Class Events
NASA Astrophysics Data System (ADS)
Engel, M.; Henderson, M. G.; Jordanova, V. K.; Morley, S.
2017-12-01
Large geomagnetic storms pose a threat to both space and ground based infrastructure. In order to help mitigate that threat a better understanding of the specifics of these storms is required. Various computer models are being used around the world to analyze the magnetospheric environment, however they are largely inadequate for analyzing the large and extreme storm time environments. Here we report on the first steps towards expanding and robustifying the RAM-SCB inner magnetospheric model, used in conjunction with BATS-R-US and the Space Weather Modeling Framework, in order to simulate storms with Dst > -400. These results will then be used to help expand our modelling capabilities towards including Carrington-class events.
Riccardo, Flavia; Shigematsu, Mika; Chow, Catherine; McKnight, C Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray
2014-01-01
The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an international network and, more specifically, how it was further developed in the EAR project.
Shigematsu, Mika; Chow, Catherine; McKnight, C. Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray
2014-01-01
The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an international network and, more specifically, how it was further developed in the EAR project. PMID:25470464
The impact of furloughs on emotional exhaustion, self-rated performance, and recovery experiences.
Halbesleben, Jonathon R B; Wheeler, Anthony R; Paustian-Underdahl, Samantha C
2013-05-01
The notion that strain can result as employees' resources are threatened or lost is well established. However, the transition from resource threats to resource losses is an important but understudied aspect of employee strain. We argue that the threat-to-loss transition triggers accelerated resource loss and a shift in how employees utilize their remaining resources unless employees engage in recovery experiences during the transition. Using a discontinuous change framework, we examine employee furloughs-the placement of employees on leave with no salary of any kind-in terms of the transition from resource threat to loss: Resources may be threatened when the furlough is announced and lost when the furlough occurs. Using 4 data collections with 180 state government employees, we found mean levels of emotional exhaustion increased and mean levels of self-reported performance decreased following the furlough. The discontinuous changes in exhaustion and performance were significantly impacted by employees' recovery experiences during the furlough. We discuss the implications of these findings for other threat-to-loss and recovery research as well as for organizations implementing furloughs. PsycINFO Database Record (c) 2013 APA, all rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wilbanks, Thomas J; Kates, Dr. Robert W.
2010-01-01
Climate change impacts are already being experienced in every region of the United States and every part of the world most severely in Arctic regions and adaptation is needed now. Although climate change adaptation research is still in its infancy, significant adaptation planning in the United States has already begun in a number of localities. This article seeks to broaden the adaptation effort by integrating it with broader frameworks of hazards research, sustainability science, and community and regional resilience. To extend the range of experience, we draw from ongoing case studies in the Southeastern United States and the environmental historymore » of New Orleans to consider the multiple threats and stresses that all communities and regions experience. Embedding climate adaptation in responses to multiple threats and stresses helps us to understand climate change impacts, themselves often products of multiple stresses, to achieve community acceptance of needed adaptations as co-benefits of addressing multiple threats, and to mainstream the process of climate adaptation through the larger envelope of social relationships, communication channels, and broad-based awareness of needs for risk management that accompany community resilience.« less
Human hippocampus arbitrates approach-avoidance conflict.
Bach, Dominik R; Guitart-Masip, Marc; Packard, Pau A; Miró, Júlia; Falip, Mercè; Fuentemilla, Lluís; Dolan, Raymond J
2014-03-03
Animal models of human anxiety often invoke a conflict between approach and avoidance. In these, a key behavioral assay comprises passive avoidance of potential threat and inhibition, both thought to be controlled by ventral hippocampus. Efforts to translate these approaches to clinical contexts are hampered by the fact that it is not known whether humans manifest analogous approach-avoidance dispositions and, if so, whether they share a homologous neurobiological substrate. Here, we developed a paradigm to investigate the role of human hippocampus in arbitrating an approach-avoidance conflict under varying levels of potential threat. Across four experiments, subjects showed analogous behavior by adapting both passive avoidance behavior and behavioral inhibition to threat level. Using functional magnetic resonance imaging (fMRI), we observe that threat level engages the anterior hippocampus, the human homolog of rodent ventral hippocampus. Testing patients with selective hippocampal lesions, we demonstrate a causal role for the hippocampus with patients showing reduced passive avoidance behavior and inhibition across all threat levels. Our data provide the first human assay for approach-avoidance conflict akin to that of animal anxiety models. The findings bridge rodent and human research on passive avoidance and behavioral inhibition and furnish a framework for addressing the neuronal underpinnings of human anxiety disorders, where our data indicate a major role for the hippocampus. Copyright © 2014 The Authors. Published by Elsevier Inc. All rights reserved.
The influence of stereotype threat on immigrants: review and meta-analysis
Appel, Markus; Weber, Silvana; Kronberger, Nicole
2015-01-01
In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256
Wang, Zhaoguo; Yang, Zhaoping; Du, Xishihui
2015-01-01
World Natural Heritage Sites (WNHS) are treasures that need human protection and invite appreciation, which makes conservation of WNHS an urgent task. This paper assesses where in the world threats are most pressing and which WNHS require emergency assistance. Using an analysis of "hot spots" and inverse distance weighting, it finds that Africa is the region where WNHS are least secure. Reports of the state of the conservation of WNHS describe the many threats that exist. Of these, management activities and institutional factors are the primary threats. The paper suggests relevant measures to improve the WNHS security.
Bjørnshave Noe, Bodil; Bjerrum, Merete; Angel, Sanne
2017-01-01
Introduction: The study was conducted at the Spinal Cord Injury Centre of Western Denmark (VCR). The aim of the study was to explore patients’ experiences following traumatic spinal cord injury and to identify characteristics of positive versus negative life situation 1 year post discharge from hospital rehabilitation. This was a qualitative study conducted using inductive content analysis. Case Presentation: In this qualitative study seven patients were interviewed one year after discharge from initial rehabilitation at the VCR. The interviews were analysed using inductive content analysis. Discussion: We found that two categories condensed the patients’ experiences of their life situation 1 year post discharge: ‘clarification in relation to overall life situation’ and ‘threat to core competences’. The transversal analysis across the derived categories identified different combinations of clarification and threats to core competences explaining the patients’ experiences: high degree of clarification combined with low degree of threat to core competences was indicative of positive life situation. Also, positive life situation was seen when a high degree of clarification compensated for high degree of threats on core competencies. In contrast, an overall stressful and negative life situation was influenced by poor clarification combined with a high degree of threat to core competences. However, when core competences can be transformed into new skills, threats were manageable. This study revealed that clarification related to overall life situation in combination with threat to core competences may explain traumatic spinal cord injury patients’ overall life situation 1 year post discharge. An appropriate balance characterises a positive life situation. There might be a need to pay attention to patients who are challenged by low degree of clarification and high degree of threats on core competencies 1 year post discharge as this may influence the life situation negatively. PMID:28435741
Selecting Essential Information for Biosurveillance—A Multi-Criteria Decision Analysis
Generous, Nicholas; Margevicius, Kristen J.; Taylor-McCabe, Kirsten J.; Brown, Mac; Daniel, W. Brent; Castro, Lauren; Hengartner, Andrea; Deshpande, Alina
2014-01-01
The National Strategy for Biosurveillancedefines biosurveillance as “the process of gathering, integrating, interpreting, and communicating essential information related to all-hazards threats or disease activity affecting human, animal, or plant health to achieve early detection and warning, contribute to overall situational awareness of the health aspects of an incident, and to enable better decision-making at all levels.” However, the strategy does not specify how “essential information” is to be identified and integrated into the current biosurveillance enterprise, or what the metrics qualify information as being “essential”. Thequestion of data stream identification and selection requires a structured methodology that can systematically evaluate the tradeoffs between the many criteria that need to be taken in account. Multi-Attribute Utility Theory, a type of multi-criteria decision analysis, can provide a well-defined, structured approach that can offer solutions to this problem. While the use of Multi-Attribute Utility Theoryas a practical method to apply formal scientific decision theoretical approaches to complex, multi-criteria problems has been demonstrated in a variety of fields, this method has never been applied to decision support in biosurveillance.We have developed a formalized decision support analytic framework that can facilitate identification of “essential information” for use in biosurveillance systems or processes and we offer this framework to the global BSV community as a tool for optimizing the BSV enterprise. To demonstrate utility, we applied the framework to the problem of evaluating data streams for use in an integrated global infectious disease surveillance system. PMID:24489748
Design of Mobile Augmented Reality in Health Care Education: A Theory-Driven Framework.
Zhu, Egui; Lilienthal, Anneliese; Shluzas, Lauren Aquino; Masiello, Italo; Zary, Nabil
2015-09-18
Augmented reality (AR) is increasingly used across a range of subject areas in health care education as health care settings partner to bridge the gap between knowledge and practice. As the first contact with patients, general practitioners (GPs) are important in the battle against a global health threat, the spread of antibiotic resistance. AR has potential as a practical tool for GPs to combine learning and practice in the rational use of antibiotics. This paper was driven by learning theory to develop a mobile augmented reality education (MARE) design framework. The primary goal of the framework is to guide the development of AR educational apps. This study focuses on (1) identifying suitable learning theories for guiding the design of AR education apps, (2) integrating learning outcomes and learning theories to support health care education through AR, and (3) applying the design framework in the context of improving GPs' rational use of antibiotics. The design framework was first constructed with the conceptual framework analysis method. Data were collected from multidisciplinary publications and reference materials and were analyzed with directed content analysis to identify key concepts and their relationships. Then the design framework was applied to a health care educational challenge. The proposed MARE framework consists of three hierarchical layers: the foundation, function, and outcome layers. Three learning theories-situated, experiential, and transformative learning-provide foundational support based on differing views of the relationships among learning, practice, and the environment. The function layer depends upon the learners' personal paradigms and indicates how health care learning could be achieved with MARE. The outcome layer analyzes different learning abilities, from knowledge to the practice level, to clarify learning objectives and expectations and to avoid teaching pitched at the wrong level. Suggestions for learning activities and the requirements of the learning environment form the foundation for AR to fill the gap between learning outcomes and medical learners' personal paradigms. With the design framework, the expected rational use of antibiotics by GPs is described and is easy to execute and evaluate. The comparison of specific expected abilities with the GP personal paradigm helps solidify the GP practical learning objectives and helps design the learning environment and activities. The learning environment and activities were supported by learning theories. This paper describes a framework for guiding the design, development, and application of mobile AR for medical education in the health care setting. The framework is theory driven with an understanding of the characteristics of AR and specific medical disciplines toward helping medical education improve professional development from knowledge to practice. Future research will use the framework as a guide for developing AR apps in practice to validate and improve the design framework.
Design of Mobile Augmented Reality in Health Care Education: A Theory-Driven Framework
Lilienthal, Anneliese; Shluzas, Lauren Aquino; Masiello, Italo; Zary, Nabil
2015-01-01
Background Augmented reality (AR) is increasingly used across a range of subject areas in health care education as health care settings partner to bridge the gap between knowledge and practice. As the first contact with patients, general practitioners (GPs) are important in the battle against a global health threat, the spread of antibiotic resistance. AR has potential as a practical tool for GPs to combine learning and practice in the rational use of antibiotics. Objective This paper was driven by learning theory to develop a mobile augmented reality education (MARE) design framework. The primary goal of the framework is to guide the development of AR educational apps. This study focuses on (1) identifying suitable learning theories for guiding the design of AR education apps, (2) integrating learning outcomes and learning theories to support health care education through AR, and (3) applying the design framework in the context of improving GPs’ rational use of antibiotics. Methods The design framework was first constructed with the conceptual framework analysis method. Data were collected from multidisciplinary publications and reference materials and were analyzed with directed content analysis to identify key concepts and their relationships. Then the design framework was applied to a health care educational challenge. Results The proposed MARE framework consists of three hierarchical layers: the foundation, function, and outcome layers. Three learning theories—situated, experiential, and transformative learning—provide foundational support based on differing views of the relationships among learning, practice, and the environment. The function layer depends upon the learners’ personal paradigms and indicates how health care learning could be achieved with MARE. The outcome layer analyzes different learning abilities, from knowledge to the practice level, to clarify learning objectives and expectations and to avoid teaching pitched at the wrong level. Suggestions for learning activities and the requirements of the learning environment form the foundation for AR to fill the gap between learning outcomes and medical learners’ personal paradigms. With the design framework, the expected rational use of antibiotics by GPs is described and is easy to execute and evaluate. The comparison of specific expected abilities with the GP personal paradigm helps solidify the GP practical learning objectives and helps design the learning environment and activities. The learning environment and activities were supported by learning theories. Conclusions This paper describes a framework for guiding the design, development, and application of mobile AR for medical education in the health care setting. The framework is theory driven with an understanding of the characteristics of AR and specific medical disciplines toward helping medical education improve professional development from knowledge to practice. Future research will use the framework as a guide for developing AR apps in practice to validate and improve the design framework. PMID:27731839
Dickmann, Petra; Apfel, Franklin; Biedenkopf, Nadine; Eickmann, Markus; Becker, Stephan
2015-01-01
Current risk assessment and risk communication of biosafety and biosecurity concerns lack a convenient metric and conceptual framework. The absence of such a systematic tool makes communication more difficult and can lead to ambiguous public perception of and response to laboratory biosafety incidents and biosecurity threats. A new 7-category scoring scale is proposed for incidents and situations in laboratories related to the handling of human and animal pathogens. The scale aims to help clarify risk categories, facilitate coordination and communication, and improve public understanding of risk related to biosafety and biosecurity.
Identity in agent-based models : modeling dynamic multiscale social processes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ozik, J.; Sallach, D. L.; Macal, C. M.
Identity-related issues play central roles in many current events, including those involving factional politics, sectarianism, and tribal conflicts. Two popular models from the computational-social-science (CSS) literature - the Threat Anticipation Program and SharedID models - incorporate notions of identity (individual and collective) and processes of identity formation. A multiscale conceptual framework that extends some ideas presented in these models and draws other capabilities from the broader CSS literature is useful in modeling the formation of political identities. The dynamic, multiscale processes that constitute and transform social identities can be mapped to expressive structures of the framework
Carey, Rachel N.; McDermott, Daragh T.; Sarma, Kiran M.
2013-01-01
The existing empirical research exploring the impact of threat appeals on driver behavior has reported inconsistent findings. In an effort to provide an up-to-date synthesis of the experimental findings, meta-analytic techniques were employed to examine the impact of threat-based messages on fear arousal and on lab-based indices of driving behavior. Experimental studies (k = 13, N = 3044), conducted between 1990 and 2011, were included in the analyses. The aims of the current analysis were (a) to examine whether or not the experimental manipulations had a significant impact on evoked fear, (b) to examine the impact of threat appeals on three distinct indices of driving, and (c) to identify moderators and mediators of the relationship between fear and driving outcomes. Large effects emerged for the level of fear evoked, with experimental groups reporting increased fear arousal in comparison to control groups (r = .64, n = 619, p<.01). The effect of threat appeals on driving outcomes, however, was not significant (r = .03, p = .17). This analysis of the experimental literature indicates that threat appeals can lead to increased fear arousal, but do not appear to have the desired impact on driving behavior. We discuss these findings in the context of threat-based road safety campaigns and future directions for experimental research in this area. PMID:23690955
Carey, Rachel N; McDermott, Daragh T; Sarma, Kiran M
2013-01-01
The existing empirical research exploring the impact of threat appeals on driver behavior has reported inconsistent findings. In an effort to provide an up-to-date synthesis of the experimental findings, meta-analytic techniques were employed to examine the impact of threat-based messages on fear arousal and on lab-based indices of driving behavior. Experimental studies (k = 13, N = 3044), conducted between 1990 and 2011, were included in the analyses. The aims of the current analysis were (a) to examine whether or not the experimental manipulations had a significant impact on evoked fear, (b) to examine the impact of threat appeals on three distinct indices of driving, and (c) to identify moderators and mediators of the relationship between fear and driving outcomes. Large effects emerged for the level of fear evoked, with experimental groups reporting increased fear arousal in comparison to control groups (r = .64, n = 619, p<.01). The effect of threat appeals on driving outcomes, however, was not significant (r = .03, p = .17). This analysis of the experimental literature indicates that threat appeals can lead to increased fear arousal, but do not appear to have the desired impact on driving behavior. We discuss these findings in the context of threat-based road safety campaigns and future directions for experimental research in this area.
NASA Astrophysics Data System (ADS)
Gómez, Wilmar
2017-04-01
By analyzing the spatial and temporal variability of extreme precipitation events we can prevent or reduce the threat and risk. Many water resources projects require joint probability distributions of random variables such as precipitation intensity and duration, which can not be independent with each other. The problem of defining a probability model for observations of several dependent variables is greatly simplified by the joint distribution in terms of their marginal by taking copulas. This document presents a general framework set frequency analysis bivariate and multivariate using Archimedean copulas for extreme events of hydroclimatological nature such as severe storms. This analysis was conducted in the lower Tunjuelo River basin in Colombia for precipitation events. The results obtained show that for a joint study of the intensity-duration-frequency, IDF curves can be obtained through copulas and thus establish more accurate and reliable information from design storms and associated risks. It shows how the use of copulas greatly simplifies the study of multivariate distributions that introduce the concept of joint return period used to represent the needs of hydrological designs properly in frequency analysis.
Kim, Kerri L; Jackson, Yo; Hunter, Heather L; Conrad, Selby M
2009-05-01
In line with the cognitive-contextual framework proposed by Grych and Fincham (1990), evidence suggests that children exposed to interparental conflict (IPC) are at risk for experiencing conflict within their own intimate relationships. The mediating role of adolescent appraisal in the relation between IPC and adolescent dating behavior was examined in the current study. Specifically, it was hypothesized that self-blame and threat appraisals would mediate the relation between IPC and adolescent maladaptive dating behaviors. To examine the potential mediating role of appraisal, 169 high school students completed the Children's Perception of Interparental Conflict (Grych, Seid, & Fincham, 1992) and Child and Adolescent Dating Relationships Inventory (Wolfe, Scott, Reitzel-Jaffe, Wekerle, Grasley, & Straatman, 2004). Findings suggest that self-blame appraisal partially mediated the relation between IPC and adolescent sexual aggression, and between IPC and adolescent threatening behavior. In addition, perceived threat appraisal partially mediated the relation between IPC and adolescent sexual aggression. Implications for the current findings are discussed.
International Health Regulations in practice: Focus on yellow fever and poliomyelitis.
Simons, H; Patel, D
2016-10-02
ASBTRACT The spread of infectious disease represents a global threat and therefore remains a priority on the international public health agenda. The International Health Regulations (IHR) (2005) came into effect in June 2007 and provide a legal framework to which the 196 member states of the World Health Assembly agree to abide. 1 These regulations include implementation of protective, control and response measures at points of entry to a country (i.e. land borders, sea and airports), and of notification measures, all of which aim to prevent or limit the spread of disease while minimising disruption to international trade. The World Health Organization can apply and enforce IHR (2005) to any disease considered to pose a significant threat to international public health. This short paper focuses on 2 diseases; yellow fever and poliomyelitis, both of which have the potential to spread internationally. It will discuss the measures applied under IHR (2005) to minimize the threat, and explore the implications for both travelers and travel health advisors.
Ritland, Raeann; Rodriguez, Lulu
2014-01-01
This study extended the ordered protection motivation framework to determine whether exposure and attention to antiobesity media content increases people's appraisals of threat and their ability to cope with it. It also assesses whether these cognitive processes, in turn, affected people's intention to abide by the practices recommended to prevent obesity. The results of a national online survey using a nonprobability sample indicate that attention to mediated obesity and related information significantly increased people's intention to exercise as well as their overall coping appraisals (the perceived effectiveness of the recommended behaviors and their ability to perform them). Likewise, increased threat and coping appraisals were both found to significantly influence people's intention to exercise and diet. Coping (rather than threat) appraisals more strongly predicted behavioral intent. Following the attitude-behavior literature, behavioral intention was used as the most proximate predictor of actual behavior (i.e., stronger intentions increase the likelihood of behavior change). PMID:25505981
Ritland, Raeann; Rodriguez, Lulu
2014-01-01
This study extended the ordered protection motivation framework to determine whether exposure and attention to antiobesity media content increases people's appraisals of threat and their ability to cope with it. It also assesses whether these cognitive processes, in turn, affected people's intention to abide by the practices recommended to prevent obesity. The results of a national online survey using a nonprobability sample indicate that attention to mediated obesity and related information significantly increased people's intention to exercise as well as their overall coping appraisals (the perceived effectiveness of the recommended behaviors and their ability to perform them). Likewise, increased threat and coping appraisals were both found to significantly influence people's intention to exercise and diet. Coping (rather than threat) appraisals more strongly predicted behavioral intent. Following the attitude-behavior literature, behavioral intention was used as the most proximate predictor of actual behavior (i.e., stronger intentions increase the likelihood of behavior change).
Hanser, S.E.; Leu, M.; Knick, S.T.; Aldridge, Cameron L.
2011-01-01
The Wyoming Basins are one of the remaining strongholds of the sagebrush ecosystem. However, like most sagebrush habitats, threats to this region are numerous. This book adds to current knowledge about the regional status of the sagebrush ecosystem, the distribution of habitats, the threats to the ecosystem, and the influence of threats and habitat conditions on occurrence and abundance of sagebrush associated fauna and flora in the Wyoming Basins. Comprehensive methods are outlined for use in data collection and monitoring of wildlife and plant populations. Field and spatial data are integrated into a spatially explicit analytical framework to develop models of species occurrence and abundance for the egion. This book provides significant new information on distributions, abundances, and habitat relationships for a number of species of conservation concern that depend on sagebrush in the region. The tools and models presented in this book increase our understanding of impacts from land uses and can contribute to the development of comprehensive management and conservation strategies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bri Rolston
2005-06-01
Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less
Worker training for new threats: a proposed framework.
Mitchell, Clifford S; Doyle, Mary L; Moran, John B; Lippy, Bruce; Hughes, Joseph T; Lum, Max; Agnew, Jacqueline
2004-11-01
In an effort to identify health and safety training needs for various groups of workers related to weapons of mass destruction, including chemical, biological, radiological, and nuclear weapons and high yield explosives (CBRNE), a conference, "Worker Training in a New Era: Responding to New Threats," was held at the Johns Hopkins Bloomberg School of Public Health in October 2002. Two questions were addressed: Which general skills and knowledge are common to all workers who might be exposed to terrorist threats from CBRNE weapons? What are the particular skills and knowledge relevant to these threats that are specific to workers in different sectors? Thirteen core components for pre- and post-event training were identified. Pre-event training applies to all workers. Post-event training applies to selected personnel including first responders, skilled support personnel, and other workers involved in these operations. Recommendations to improve worker safety training related to preparedness include: identify specific competencies for worker pre- and post-event training; coordinate Federal policy on worker training for CBRNE hazards; adopt federal guidelines or standards on worker training for new CBRNE threats, based on the competencies and coordinated Federal policy; conduct an inventory of training programs and other resources that could be used or adapted for use for new threats; and develop new training content and methods for pre- and post-event training to address specific competencies. Given the possibility for the introduction of CBRNE threats into the workplace, all workers need some training in the potential hazards involved: the individual worker's specific role in an emergency; incident command; activation of the emergency notification system; use of personal protective equipment (PPE); and safe evacuation of the workplace. While some occupational sectors have developed effective training related to these new threats, there is a need to develop, implement, and evaluate training programs across many different sectors of the workforce. Copyright 2004 Wiley-Liss, Inc.
Stakeholder Analysis of an Executable Achitecture Systems Engineering (EASE) Tool
2013-06-21
The FCR tables and stakeholder feedback are then used as the foundation of a Strengths, Weaknesses, Opportunities, and Threats ( SWOT ) analysis . Finally...the SWOT analysis and stakeholder feedback arc translated into an EASE future development strategy; a series of recommendations regarding...and Threats ( SWOT ) analysis . Finally, the SWOT analysis and stakeholder feedback are translated into an EASE future development strategy; a series
Complexity Studies and Security in the Complex World: An Epistemological Framework of Analysis
NASA Astrophysics Data System (ADS)
Mesjasz, Czeslaw
The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.
The Threat of the Dyscompetent Resident: A Plea to Make the Implicit More Explicit!
ERIC Educational Resources Information Center
van Mook, Walther N. K. A.; van Luijk, Scheltus J.; Zwietering, P. J.; Southgate, L.; Schuwirth, Lambert W. T.; Scherpbier, Albert J. J. A.; van der Vleuten, Cees P. M.
2015-01-01
Although several examples of frameworks dealing with "students'" unprofessional behaviour are available, guidance on how to deal locally or regionally with dysfunctional "residents" is limited (Hickson et al. in "Acad Med" 82(11):1040-1048, 2007b; Leape and Fromson in "Ann Intern Med" 144(2):107-115, 2006).…
2012-06-01
technology originally developed on the Java platform. The Hibernate framework supports rapid development of a data access layer without requiring a...31 viii 2. Hibernate ................................................................................ 31 3. Database Design...protect from security threats; o Easy aggregate management operations via file tags; 2. Hibernate We recommend using Hibernate technology for object
ERIC Educational Resources Information Center
Madensen, Tamara D.; Eck, John E.
2006-01-01
Alcohol-related riots among university students pose a significant problem for police agencies that serve college communities. The intensity of the disturbances may vary. However, the possible outcomes include property destruction and physical violence and are a serious threat to community and officer safety. This report provides a framework for…
ERIC Educational Resources Information Center
Palmer, Kris Russell
2017-01-01
There is a looming threat to the economic vitality of the organizational community of intentionally Christian colleges and universities, relevant to the use of Title IV funds. Within the framework of organizational ecology, this qualitative descriptive study investigated and summarized perceptions of the leadership from sample ABHE Bible colleges…
2008-01-01
special needs should enhance their awareness of risk and threats, develop household emergency plans that include care for pets and service animals , and...including persons, property, and structures. – Individuals with special needs, including those with service animals . – Individuals with household pets...supplies for household pets and service animals . See the recommended disaster supplies list at http://www.ready.gov. • Monitoring emergency
ERIC Educational Resources Information Center
Shamai, Michal
2003-01-01
Describes and analyzes an intervention program with social workers living and working in a situation of uncertainty created by political violence, such as war and terrorism. Uses a social constructionist perspective as a theoretical framework, emphasizing the effect of the social and political context in constructing the experience and a…
m-Learning: Positioning Educators for a Mobile, Connected Future
ERIC Educational Resources Information Center
Peters, Kristine
2007-01-01
Mobile learning is variously viewed as a fad, a threat, and an answer to the learning needs of time-poor mobile workers, so does it have a place in delivering mainstream learning? Based on a 2005 comparative research project, commissioned by the Australian Flexible Learning Framework, the paper reports on research into Web-based information…
CERT Resiliency Engineering Framework
2007-03-01
Heightened threat level and increasing uncertainty Shorter-lived skills 5 Operational risk management problems Poor planning and execution No asset...increasingly effective & efficient Today’s operational environment No operational boundaries Pervasive & rapidly changing technology Dynamic & expanding risks ...management function Seen as a technical function or responsibility Searching for magic bullet: CobiT , ITIL, ISO17799, NFP1600 Poorly defined and measured
The Role of Perceived Threat in Reducing Health Knowledge Gaps.
ERIC Educational Resources Information Center
Yows, Suzanne R.
A study tested the knowledge gap hypothesis, a promising framework for research in the field of mass communication devised by P. Tichenor, G. Donohue, and C. Olien in 1970. The study investigated the relative contribution of two types of factors--structural and motivational--in predicting the degree to which persons will attend to health messages,…
Malian Security Force Assistance Study (MSFAS)
2014-03-01
increasing tactical or operational capacity. Emphasis should specifically be placed on developing basic ministerial- level functions, delineating...Prevent, Contain, Counter framework. That is, how could the Malian Government have prevented the threat from reaching the level indicated in the...northern Mali. In particular, AE 1demonstrated that northerners with local knowledge would be vital to successful intelligence operations in northern
Moral Development and Student Motivation in Moral Education: A Singapore Study
ERIC Educational Resources Information Center
Koh, Caroline
2012-01-01
Recent world events such as the threat of terrorism and the global economic crises have rekindled an interest in ethics and values education. This study, conducted in Singapore, combines a Kohlbergian approach to the assessment of moral judgement with a framework based on the self-determination theory to assess the motivational regulations of…
ERIC Educational Resources Information Center
Jabbour, Ghassan
2010-01-01
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Using SWOT Analysis for Promoting the Accounting Program.
ERIC Educational Resources Information Center
Sawyer, Joe E.
2001-01-01
Describes how SWOT (strengths, weaknesses, opportunities, threats) analysis can be used by business educators to find the best match between environmental trends (opportunities and threats) and internal departmental capabilities (strengths and weaknesses). An example from accounting education is provided. (JOW)
Applying systems thinking to inform studies of wildlife trade in primates.
Blair, Mary E; Le, Minh D; Thạch, Hoàng M; Panariello, Anna; Vũ, Ngọc B; Birchette, Mark G; Sethi, Gautam; Sterling, Eleanor J
2017-11-01
Wildlife trade presents a major threat to primate populations, which are in demand from local to international scales for a variety of uses from food and traditional medicine to the exotic pet trade. We argue that an interdisciplinary framework to facilitate integration of socioeconomic, anthropological, and biological data across multiple spatial and temporal scales is essential to guide the study of wildlife trade dynamics and its impacts on primate populations. Here, we present a new way to design research on wildlife trade in primates using a systems thinking framework. We discuss how we constructed our framework, which follows a social-ecological system framework, to design an ongoing study of local, regional, and international slow loris (Nycticebus spp.) trade in Vietnam. We outline the process of iterative variable exploration and selection via this framework to inform study design. Our framework, guided by systems thinking, enables recognition of complexity in study design, from which the results can inform more holistic, site-appropriate, and effective trade management practices. We place our framework in the context of other approaches to studying wildlife trade and discuss options to address foreseeable challenges to implementing this new framework. © 2017 Wiley Periodicals, Inc.
Development of the Academic Stereotype Threat Inventory
ERIC Educational Resources Information Center
Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.
2008-01-01
The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…
2016-11-01
low- power RF transmissions used by the OBAN system. B. Threat Analysis Methodology To analyze the risk presented by a particular threat we use a... power efficiency5 and in the absolute worst case a compromise of the wireless channel could result in death. Fitness trackers on the other hand are...analysis is intended to inform the development of secure RT-PSM architectures. I. INTRODUCTION The development of very low- power computing devices and
Policies on pets for healthy cities: a conceptual framework.
Rock, Melanie J; Adams, Cindy L; Degeling, Chris; Massolo, Alessandro; McCormack, Gavin R
2015-12-01
Drawing on the One Health concept, and integrating a dual focus on public policy and practices of caring from the Ottawa Charter for Health Promotion, we outline a conceptual framework to help guide the development and assessment of local governments' policies on pets. This framework emphasizes well-being in human populations, while recognizing that these outcomes relate to the well-being of non-human animals. Five intersecting spheres of activity, each associated with local governments' jurisdiction over pets, are presented: (i) preventing threats and nuisances from pets, (ii) meeting pets' emotional and physical needs, (iii) procuring pets ethically, (iv) providing pets with veterinary services and (v) licensing and identifying pets. This conceptual framework acknowledges the tenets of previous health promotion frameworks, including overlapping and intersecting influences. At the same time, this framework proposes to advance our understanding of health promotion and, more broadly, population health by underscoring interdependence between people and pets as well as the dynamism of urbanized ecologies. © The Author (2014). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
A spatially integrated framework for assessing socioecological drivers of carnivore decline.
Gálvez, Nicolás; Guillera-Arroita, Gurutzeta; St John, Freya A V; Schüttler, Elke; Macdonald, David W; Davies, Zoe G
2018-05-01
Habitat loss, fragmentation and degradation are key threats to the long-term persistence of carnivores, which are also susceptible to direct persecution by people. Integrating natural and social science methods to examine how habitat configuration/quality and human-predator relations may interact in space and time to effect carnivore populations within human-dominated landscapes will help prioritise conservation investment and action effectively.We propose a socioecological modelling framework to evaluate drivers of carnivore decline in landscapes where predators and people coexist. By collecting social and ecological data at the same spatial scale, candidate models can be used to quantify and tease apart the relative importance of different threats.We apply our methodological framework to an empirical case study, the threatened güiña ( Leopardus guigna ) in the temperate forest ecoregion of southern Chile, to illustrate its use. Existing literature suggests that the species is declining due to habitat loss, fragmentation and persecution in response to livestock predation. Data used in modelling were derived from four seasons of camera-trap surveys, remote-sensed images and household questionnaires.Occupancy dynamics were explained by habitat configuration/quality covariates rather than by human-predator relations. Güiñas can tolerate a high degree of habitat loss (>80% within a home range). They are primarily impacted by fragmentation and land subdivision (larger farms being divided into smaller ones). Ten per cent of surveyed farmers ( N = 233) reported illegally killing the species over the past decade. Synthesis and applications . By integrating ecological and social data, collected at the same spatial scale, within a single modelling framework, our study demonstrates the value of an interdisciplinary approach to assessing the potential threats to a carnivore. It has allowed us to tease apart effectively the relative importance of different potential extinction pressures for the güiña ( Leopardus guigna ), make informed conservation recommendations and prioritise where future interventions should be targeted. We have identified that human-dominated landscapes with large intensive farms can be of conservation value, as long as an appropriate network of habitat patches is maintained within the matrix. Conservation efforts to secure the long-term persistence of the species should focus on reducing habitat fragmentation rather than human persecution.
A deep learning framework for the automated inspection of complex dual-energy x-ray cargo imagery
NASA Astrophysics Data System (ADS)
Rogers, Thomas W.; Jaccard, Nicolas; Griffin, Lewis D.
2017-05-01
Previously, we investigated the use of Convolutional Neural Networks (CNNs) to detect so-called Small Metallic Threats (SMTs) hidden amongst legitimate goods inside a cargo container. We trained a CNN from scratch on data produced by a Threat Image Projection (TIP) framework that generates images with realistic variation to robustify performance. The system achieved 90% detection of containers that contained a single SMT, while raising 6% false positives on benign containers. The best CNN architecture used the raw high energy image (single-energy) and its logarithm as input channels. Use of the logarithm improved performance, thus echoing studies on human operator performance. However, it is an unexpected result with CNNs. In this work, we (i) investigate methods to exploit material information captured in dual-energy images, and (ii) introduce a new CNN training scheme that generates `spot-the-difference' benign and threat pairs on-the-fly. To the best of our knowledge, this is the first time that CNNs have been applied directly to raw dual-energy X-ray imagery, in any field. To exploit dual-energy, we experiment with adapting several physics-derived approaches to material discrimination from the cargo literature, and introduce three novel variants. We hypothesise that CNNs can implicitly learn about the material characteristics of objects from the raw dual-energy images, and use this to suppress false positives. The best performing method is able to detect 95% of containers containing a single SMT, while raising 0.4% false positives on benign containers. This is a step change improvement in performance over our prior work
Activity Learning as a Foundation for Security Monitoring in Smart Homes.
Dahmen, Jessamyn; Thomas, Brian L; Cook, Diane J; Wang, Xiaobo
2017-03-31
Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed.
"Fighting a hurricane": tobacco industry efforts to counter the perceived threat of Islam.
Petticrew, Mark; Lee, Kelley; Ali, Haider; Nakkash, Rima
2015-06-01
Islamic countries are of key importance to transnational tobacco companies as growing markets with increasing smoking rates. We analyzed internal tobacco industry documents to assess the industry's response to rising concerns about tobacco use within Islamic countries. The tobacco industry perceived Islam as a significant threat to its expansion into these emerging markets. To counter these concerns, the industry framed antismoking views in Islamic countries as fundamentalist and fanatical and attempted to recruit Islamic consultants to portray smoking as acceptable. Tobacco industry lawyers also helped develop theological arguments in favor of smoking. These findings are valuable to researchers and policymakers seeking to implement culturally appropriate measures in Islamic countries under the World Health Organization Framework Convention on Tobacco Control.
Alternatives to the Randomized Controlled Trial
West, Stephen G.; Duan, Naihua; Pequegnat, Willo; Gaist, Paul; Des Jarlais, Don C.; Holtgrave, David; Szapocznik, José; Fishbein, Martin; Rapkin, Bruce; Clatts, Michael; Mullen, Patricia Dolan
2008-01-01
Public health researchers are addressing new research questions (e.g., effects of environmental tobacco smoke, Hurricane Katrina) for which the randomized controlled trial (RCT) may not be a feasible option. Drawing on the potential outcomes framework (Rubin Causal Model) and Campbellian perspectives, we consider alternative research designs that permit relatively strong causal inferences. In randomized encouragement designs, participants are randomly invited to participate in one of the treatment conditions, but are allowed to decide whether to receive treatment. In quantitative assignment designs, treatment is assigned on the basis of a quantitative measure (e.g., need, merit, risk). In observational studies, treatment assignment is unknown and presumed to be nonrandom. Major threats to the validity of each design and statistical strategies for mitigating those threats are presented. PMID:18556609
Health Education in India: A Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis
ERIC Educational Resources Information Center
Sharma, Manoj
2005-01-01
The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of the health education profession and discipline in India. Materials from CINAHL, ERIC, MEDLINE, and Internet were collected to conduct the open coding of the SWOT analysis. Strengths of health education in India include an elaborate…
Framework for Shared Drinking Water Risk Assessment.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lowry, Thomas Stephen; Tidwell, Vincent C.; Peplinski, William John
Central to protecting our nation's critical infrastructure is the development of methodologies for prioritizing action and supporting resource allocation decisions associated with risk-reduction initiatives. Toward this need a web-based risk assessment framework that promotes the anonymous sharing of results among water utilities is demonstrated. Anonymous sharing of results offers a number of potential advantages such as assistance in recognizing and correcting bias, identification of 'unknown, unknowns', self-assessment and benchmarking for the local utility, treatment of shared assets and/or threats across multiple utilities, and prioritization of actions beyond the scale of a single utility. The constructed framework was demonstrated for threemore » water utilities. Demonstration results were then compared to risk assessment results developed using a different risk assessment application by a different set of analysts.« less
An Analysis of Modeling Success in Explosive Ordnance Disposal Training
2010-03-01
Iraq due to makeshift roadside bombs (Hagey, 2007). EOD units are the primary assets to respond to IED threats. In 2006 alone, the total number of...increase from 2007. One year later, IED attacks increased a further 146 percent (Brook, 2009). As the primary asset to respond to an IED threat, EOD...threats and help protect his units. EOD technicians support the battlefield commander by addressing the primary threats to the coalition forces
Mikkola, Riitta; Huhtala, Heini; Paavilainen, Eija
2017-10-01
To describe fear, the threats causing fear and the occurrence of fear among emergency department nursing staff and physicians. The emergency department is a challenging workplace where the staff is often confronted by factors that cause fear. A cross-sectional study. A survey was conducted in 16 hospitals (n = 544). Nurses, practical nurses, orderlies and physicians from those hospitals participated in the survey. The survey questionnaire was based on the analysis of interviews of 30 nurses from one university hospital and one central hospital. The results of the interviews were analysed using the inductive content analysis method. The analysis of the survey was performed using statistical methods, such as frequencies, cross-tabulation and principal component analysis. The results showed that nearly all of the emergency department personnel had experienced work-related fear. Generally, the fear had been momentary. According to the survey results, fear was most often caused by medication errors, the resuscitation of a child, a catastrophic accident, urgent or violent situations or patients armed with weapons. Threats that caused fear included insecurity, danger in the work environment, threat of loss of one's health and threat of the consequences of one's mistakes and actions. The staff of emergency departments often encountered factors or situations that caused fear. The main threats causing fear that were raised by the respondents were insecurity and danger in the work environment. The data obtained from this study can be utilised in identifying and describing work-related fear and threats of fear among emergency department nursing staff and physicians. Based on the information herein, it will be possible to develop methods to prevent situations that cause fear in emergency departments. © 2016 John Wiley & Sons Ltd.
A conceptual framework for achieving performance enhancing drug compliance in sport.
Donovan, Robert J; Egger, Garry; Kapernick, Vicki; Mendoza, John
2002-01-01
There has been, and continues to be, widespread international concern about athletes' use of banned performance enhancing drugs (PEDs). This concern culminated in the formation of the World Anti-Doping Agency (WADA) in November 1999. To date, the main focus on controlling the use of PEDs has been on testing athletes and the development of tests to detect usage. Although athletes' beliefs and values are known to influence whether or not an athlete will use drugs, little is known about athletes' beliefs and attitudes, and the limited empirical literature shows little use of behavioural science frameworks to guide research methodology, results interpretation, and intervention implications. Mindful of this in preparing its anti-doping strategy for the 2000 Olympics, the Australian Sports Drug Agency (ASDA) in 1997 commissioned a study to assess the extent to which models of attitude-behaviour change in the public health/injury prevention literature had useful implications for compliance campaigns in the sport drug area. A preliminary compliance model was developed from three behavioural science frameworks: social cognition models; threat (or fear) appeals; and instrumental and normative approaches. A subsequent review of the performance enhancing drug literature confirmed that the overall framework was consistent with known empirical data, and therefore had at least face validity if not construct validity. The overall model showed six major inputs to an athlete's attitudes and intentions with respect to performance enhancing drug usage: personality factors, threat appraisal, benefit appraisal, reference group influences, personal morality and legitimacy. The model demonstrated that a comprehensive, fully integrated programme is necessary for maximal effect, and provides anti-doping agencies with a structured framework for strategic planning and implementing interventions. Programmes can be developed in each of the six major areas, with allocation of resources to each area based on needs-assessment research with athletes and other relevant groups.
Rethinking Soils: an under-investigated commons?
NASA Astrophysics Data System (ADS)
Short, Chrisopher; Mills, Jane; Ingram, Julie
2015-04-01
In a number of global contexts there is a re-awakening of interest in soils in both increasing the resilience of complex social-ecological systems (SES) and as a result of the threats to them, as shown by the UN International Year of Soils in 2015. Consequently the management of soils and their wider role within property regimes and natural resource management might need to be reassessed. At the heart of this is the rise in awareness regarding the connectedness of SES, and in frameworks such as the Ecosystem Approach and the identification and analysis of Ecosystem Services. Whilst not new to some, it has widened the understanding among many, that soils have a valuable role to play in complex SES because they are a slow variable crucial to underlying structure of the SES. The conventional approach that soils are linked to the ecosystem services category of provisioning services (production of food, timber and fibre) remains valid. Not surprisingly this link is strong within natural resource management and property rights regimes but soils remain at risk for a range of threats, for example soil erosion and compaction, salinization, sealing, desertification, loss of organic matter and biodiversity and contamination. However, soils are increasingly seen as a slow variable that can lead to increased resilience within a SES and have a profound importance to human life through a range of regulating services including water quality and purification, water flow and attenuation and , pest and disease control. Given the long-standing importance of soil as a natural resource there are also accompanying legal systems, property regimes, societal values, knowledge, custom and traditions. However, in the light of the wider understanding soil functions are these social frameworks appropriate and fit for purpose or would a shared resource of commons approach be more appropriate. To some extent this examination would also extend to the presence of soils within the cultural services category of ecosystem services. As a result of the increasing evidence regarding soil threats, there is concern that the knowledge relating to soils is fragmented and incomplete. This is particular true regarding the complexity and functioning of soil systems and their interaction with human activities and the effectiveness of governance arrangements to promote resilience in the management of soils. Therefore discussions concerning soils needs to be taken from an interdisciplinary perspectives that embraces both natural and social sciences. This paper will seek to examine soils from a multi-scale governance/complex commons perspective. It will also consider how a commons perspective might be useful in reducing soil threats and in the development of effective prevention, remediation and restoration measures. This often requires a change in thinking about soil, perhaps considering it as a 'slow variable', able to drive long-term change or as a 'cultural asset' and 'knowledge resource'.
Hanafiah, Marlia M; Leuven, Rob S E W; Sommerwerk, Nike; Tockner, Klement; Huijbregts, Mark A J
2013-12-17
While the ecological impact of anthropogenically introduced exotic species is considered a major threat for biodiversity and ecosystems functioning, it is generally not accounted for in the environmental life cycle assessment (LCA) of products. In this article, we propose a framework that includes exotic species introduction in an LCA context. We derived characterization factors for exotic fish species introduction related to the transport of goods across the Rhine-Main-Danube canal. These characterization factors are expressed as the potentially disappeared fraction (PDF) of native freshwater fish species in the rivers Rhine and Danube integrated over space and time per amount of goods transported (PDF·m(3)·yr·kg(-1)). Furthermore, we quantified the relative importance of exotic fish species introduction compared to other anthropogenic stressors in the freshwater environment (i.e., eutrophication, ecotoxicity, greenhouse gases, and water consumption) for transport of goods through the Rhine-Main-Danube waterway. We found that the introduction of exotic fish species contributed to 70-85% of the total freshwater ecosystem impact, depending on the distance that goods were transported. Our analysis showed that it is relevant and feasible to include the introduction of exotic species in an LCA framework. The proposed framework can be further extended by including the impacts of other exotic species groups, types of water bodies and pathways for introduction.
Assessing Terrorist Motivations for Attacking Critical Infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ackerman, G; Abhayaratne, P; Bale, J
Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CImore » facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made possible the identification of several target selection factors that were both important in the development of the analytical framework and subsequently validated by the case studies. Similarly, statistical analysis of the CrITIC data yielded measurable evidence that supported hypotheses derived from the framework, the case studies, and the writings of various experts. Besides providing an important mechanism of self-reinforcement and validation, the project's multifaceted nature made it possible to discern aspects of CI attack motivations that would likely have been missed if any single approach had been adopted.« less
Analyzing and strengthening the vaccine safety program in Manitoba.
Montalban, J M; Ogbuneke, C; Hilderman, T
2014-12-04
The emergence of a novel influenza A virus in 2009 and the rapid introduction of new pandemic vaccines prompted an analysis of the current state of the adverse events following immunization (AEFI) surveillance response in several provinces. To highlight aspects of the situational analysis of the Manitoba Health, Healthy Living and Seniors (MHHLS's) AEFI surveillance system and to demonstrate how common business techniques could be usefully applied to a provincial vaccine safety monitoring program. Situational analysis of the AEFI surveillance system in Manitoba was developed through a strengths-weaknesses-opportunities-threats (SWOT) analysis and informed by the National Immunization Strategy vaccine safety priorities. Strategy formulation was developed by applying the threats-opportunities-weaknesses-strengths (TOWS) matrix. Thirteen strategies were formulated that use strengths to either take advantage of opportunities or avoid threats, that exploit opportunities to overcome weaknesses, or that rectify weaknesses to circumvent threats. These strategies entailed the development of various tools and resources, most of which are either actively underway or completed. The SWOT analysis and the TOWS matrix enabled MHHLS to enhance the capacity of its vaccine safety program.
Analyzing and strengthening the vaccine safety program in Manitoba
Montalban, JM; Ogbuneke, C; Hilderman, T
2014-01-01
Background: The emergence of a novel influenza A virus in 2009 and the rapid introduction of new pandemic vaccines prompted an analysis of the current state of the adverse events following immunization (AEFI) surveillance response in several provinces. Objectives To highlight aspects of the situational analysis of the Manitoba Health, Healthy Living and Seniors (MHHLS’s) AEFI surveillance system and to demonstrate how common business techniques could be usefully applied to a provincial vaccine safety monitoring program. Method Situational analysis of the AEFI surveillance system in Manitoba was developed through a strengths-weaknesses-opportunities-threats (SWOT) analysis and informed by the National Immunization Strategy vaccine safety priorities. Strategy formulation was developed by applying the threats-opportunities-weaknesses-strengths (TOWS) matrix. Results Thirteen strategies were formulated that use strengths to either take advantage of opportunities or avoid threats, that exploit opportunities to overcome weaknesses, or that rectify weaknesses to circumvent threats. These strategies entailed the development of various tools and resources, most of which are either actively underway or completed. Conclusion The SWOT analysis and the TOWS matrix enabled MHHLS to enhance the capacity of its vaccine safety program. PMID:29769910
Cardiovascular reactivity as a mechanism linking child trauma to adolescent psychopathology.
Heleniak, Charlotte; McLaughlin, Katie A; Ormel, Johan; Riese, Harriette
2016-10-01
Alterations in physiological reactivity to stress are argued to be central mechanisms linking adverse childhood environmental experiences to internalizing and externalizing psychopathology. Childhood trauma exposure may influence physiological reactivity to stress in distinct ways from other forms of childhood adversity. This study applied a novel theoretical model to investigate the impact of childhood trauma on cardiovascular stress reactivity - the biopsychosocial model of challenge and threat. This model suggests that inefficient cardiovascular responses to stress - a threat as opposed to challenge profile - are characterized by blunted cardiac output (CO) reactivity and increased vascular resistance. We examined whether childhood trauma exposure predicted an indicator of the threat profile of cardiovascular reactivity and whether such a pattern was associated with adolescent psychopathology in a population-representative sample of 488 adolescents (M=16.17years old, 49.2% boys) in the TRacking Adolescents' Individual Lives Survey (TRAILS). Exposure to trauma was associated with both internalizing and externalizing symptoms and a pattern of cardiovascular reactivity consistent with the threat profile, including blunted CO reactivity during a social stress task. Blunted CO reactivity, in turn, was positively associated with externalizing, but not internalizing symptoms and mediated the link between trauma and externalizing psychopathology. None of these associations varied by gender. The biopsychosocial model of challenge and threat provides a novel theoretical framework for understanding disruptions in physiological reactivity to stress following childhood trauma exposure, revealing a potential pathway linking such exposure with externalizing problems in adolescents. Copyright © 2016 Elsevier B.V. All rights reserved.
Cardiovascular reactivity as a mechanism linking child trauma to adolescent psychopathology
Heleniak, Charlotte; McLaughlin, Katie A.; Ormel, Johan; Riese, Harriette
2016-01-01
Alterations in physiological reactivity to stress are argued to be central mechanisms linking adverse childhood environmental experiences to internalizing and externalizing psychopathology. Childhood trauma exposure may influence physiological reactivity to stress in distinct ways from other forms of childhood adversity. This study applied a novel theoretical model to investigate the impact of childhood trauma on cardiovascular stress reactivity – the biopsychosocial model of challenge and threat. This model suggests that inefficient cardiovascular responses to stress – a threat as opposed to challenge profile – are characterized by blunted cardiac output (CO) reactivity and increased vascular resistance. We examined whether childhood trauma exposure predicted an indicator of the threat profile of cardiovascular reactivity and whether such a pattern was associated with adolescent psychopathology in a population-representative sample of 488 adolescents (M = 16.17 years old, 49.2% boys) in the TRacking Adolescents’ Individual Lives Survey (TRAILS). Exposure to trauma was associated with both internalizing and externalizing symptoms and a pattern of cardiovascular reactivity consistent with the threat profile, including blunted CO reactivity during a social stress task. Blunted CO reactivity, in turn, was positively associated with externalizing, but not internalizing symptoms and mediated the link between trauma and externalizing psychopathology. None of these associations varied by gender. The biopsychosocial model of challenge and threat provides a novel theoretical framework for understanding disruptions in physiological reactivity to stress following childhood trauma exposure, revealing a potential pathway linking such exposure with externalizing problems in adolescents. PMID:27568327
Making decisions in complex landscapes: Headwater stream management across multiple federal agencies
Katz, Rachel; Grant, Evan H. Campbell; Runge, Michael C.; Connery, Bruce; Crockett, Marquette; Herland, Libby; Johnson, Sheela; Kirk, Dawn; Wofford, Jeb; Bennett, Rick; Nislow, Keith; Norris, Marian; Hocking, Daniel; Letcher, Benjamin; Roy, Allison
2014-01-01
Headwater stream ecosystems are vulnerable to numerous threats associated with climate and land use change. In the northeastern US, many headwater stream species (e.g., brook trout and stream salamanders) are of special conservation concern and may be vulnerable to climate change influences, such as changes in stream temperature and streamflow. Federal land management agencies (e.g., US Fish and Wildlife Service, National Park Service, USDA Forest Service, Bureau of Land Management and Department of Defense) are required to adopt policies that respond to climate change and may have longer-term institutional support to enforce such policies compared to state, local, non-governmental, or private land managers. However, federal agencies largely make management decisions in regards to headwater stream ecosystems independently. This fragmentation of management resources and responsibilities across the landscape may significantly impede the efficiency and effectiveness of conservation actions, and higher degrees of collaboration may be required to achieve conservation goals. This project seeks to provide an example of cooperative landscape decision-making to address the conservation of headwater stream ecosystems. We identified shared and contrasting objectives of each federal agency and potential collaboration opportunities that may increase efficient and effective management of headwater stream ecosystems in two northeastern US watersheds. These workshops provided useful insights into the adaptive capacity of federal institutions to address threats to headwater stream ecosystems. Our ultimate goal is to provide a decision-making framework and analysis that addresses large-scale conservation threats across multiple stakeholders, as a demonstration of cooperative landscape conservation for aquatic ecosystems. Additionally, we aim to provide new scientific knowledge and a regional perspective to resource managers to help inform local management decisions.
Women's descriptions of childbirth trauma relating to care provider actions and interactions.
Reed, Rachel; Sharman, Rachael; Inglis, Christian
2017-01-10
Many women experience psychological trauma during birth. A traumatic birth can impact on postnatal mental health and family relationships. It is important to understand how interpersonal factors influence women's experience of trauma in order to inform the development of care that promotes optimal psychosocial outcomes. As part of a large mixed methods study, 748 women completed an online survey and answered the question 'describe the birth trauma experience, and what you found traumatising'. Data relating to care provider actions and interactions were analysed using a six-phase inductive thematic analysis process. Four themes were identified in the data: 'prioritising the care provider's agenda'; 'disregarding embodied knowledge'; 'lies and threats'; and 'violation'. Women felt that care providers prioritised their own agendas over the needs of the woman. This could result in unnecessary intervention as care providers attempted to alter the birth process to meet their own preferences. In some cases, women became learning resources for hospital staff to observe or practice on. Women's own embodied knowledge about labour progress and fetal wellbeing was disregarded in favour of care provider's clinical assessments. Care providers used lies and threats to coerce women into complying with procedures. In particular, these lies and threats related to the wellbeing of the baby. Women also described actions that were abusive and violent. For some women these actions triggered memories of sexual assault. Care provider actions and interactions can influence women's experience of trauma during birth. It is necessary to address interpersonal birth trauma on both a macro and micro level. Maternity service development and provision needs to be underpinned by a paradigm and framework that prioritises both the physical and emotional needs of women. Care providers require training and support to minimise interpersonal birth trauma.
Bubeck, Philip; Wouter Botzen, W J; Laudan, Jonas; Aerts, Jeroen C J H; Thieken, Annegret H
2017-11-17
Protection motivation theory (PMT) has become a popular theory to explain the risk-reducing behavior of residents against natural hazards. PMT captures the two main cognitive processes that individuals undergo when faced with a threat, namely, threat appraisal and coping appraisal. The latter describes the evaluation of possible response measures that may reduce or avert the perceived threat. Although the coping appraisal component of PMT was found to be a better predictor of protective intentions and behavior, little is known about the factors that influence individuals' coping appraisals of natural hazards. More insight into flood-coping appraisals of PMT, therefore, are needed to better understand the decision-making process of individuals and to develop effective risk communication strategies. This study presents the results of two surveys among more than 1,600 flood-prone households in Germany and France. Five hypotheses were tested using multivariate statistics regarding factors related to flood-coping appraisals, which were derived from the PMT framework, related literature, and the literature on social vulnerability. We found that socioeconomic characteristics alone are not sufficient to explain flood-coping appraisals. Particularly, observational learning from the social environment, such as friends and neighbors, is positively related to flood-coping appraisals. This suggests that social norms and networks play an important role in flood-preparedness decisions. Providing risk and coping information can also have a positive effect. Given the strong positive influence of the social environment on flood-coping appraisals, future research should investigate how risk communication can be enhanced by making use of the observed social norms and network effects. © 2017 Society for Risk Analysis.
Outcomes-Balanced Framework for Emergency Management: A Predictive Model for Preparedness
2013-09-01
Management Total Quality Management (TQM) was developed by W. Edwards Deming in the post-World War II reconstruction period in Japan. It ushered in a...FIGURES Figure 1. From Total Quality Management Principles ....................................................30 Figure 2. Outcomes Logic Model (After...THIRA Threat and Hazard Identification and Risk Assessment TQM Total Quality Management UTL Universal Task List xiv ACKNOWLEDGMENTS German
A multicriteria framework for producing local, regional, and national insect and disease risk maps
Frank J. Jr. Krist; Frank J. Sapio
2010-01-01
The construction of the 2006 National Insect and Disease Risk Map, compiled by the USDA Forest Service, State and Private Forestry Area, Forest Health Protection Unit, resulted in the development of a GIS-based, multicriteria approach for insect and disease risk mapping that can account for regional variations in forest health concerns and threats. This risk mapping...
Opportunities and Threats for College Women's Health: Health Care Reform and Higher Education
ERIC Educational Resources Information Center
Yakaboski, Tamara; Hunter, Liz; Manning-Ouellette, Amber
2014-01-01
The Patient Protection and Affordable Care Act (PPACA) of 2010 (P.L. 118-148) has already changed college students' health care options and has a larger impact on women as they outnumber men in college enrollment and require unique services. Through a feminist policy framework, we discuss how the PPACA impacts college women's health and…
ERIC Educational Resources Information Center
Shain, Martin
2011-01-01
While industrial wind turbines (IWTs) clearly raise issues concerning threats to the health of a few in contrast to claimed health benefits to many, the trade-off has not been fully considered in a public health framework. This article reviews public health ethics justifications for the licensing and installation of IWTs. It concludes that the…
ERIC Educational Resources Information Center
Paciotto, Carla
2004-01-01
In 1991, the Bilingual Bicultural Education Program (BBEP) was launched in Chihuahua, Mexico, as a way of responding to the educational needs of the indigenous Tarahumara populations and the growing threat to their language and culture. Using a conceptual framework based on the literatures of curriculum inquiry, language shift and maintenance,…
2009-04-01
Gabbard (2008), p. 36 The extensions of our framework to opportunities and instantiations respect this admonition in focusing on uses of this...points above, which we found in reviewing other public reports on the current state and issues with analytic practice (notably Treverton & Gabbard , 2008...agencies, with differing backgrounds and expertise will need to work together to unravel tomorrow’s threats, which Treverton & Gabbard (2008) likened
2005-03-01
team-wide accountability and rewards Functional focus Group accountability and rewards Employee-owner interest conflicts Process focus Lack of...Collaborative and cross-functional work Incompatible IT Need to share Compartmentalization of functional groups Localized decision making Centralized...Steps are: • Step 1: Analyze Corporate Strategic Objectives Using SWOT (Strengths, Weaknesses, Opportunities, Threats) Methodology • Step 2
Species co-occurrence analysis predicts management outcomes for multiple threats.
Tulloch, Ayesha I T; Chadès, Iadine; Lindenmayer, David B
2018-03-01
Mitigating the impacts of global anthropogenic change on species is conservation's greatest challenge. Forecasting the effects of actions to mitigate threats is hampered by incomplete information on species' responses. We develop an approach to predict community restructuring under threat management, which combines models of responses to threats with network analyses of species co-occurrence. We discover that contributions by species to network co-occurrence predict their recovery under reduction of multiple threats. Highly connected species are likely to benefit more from threat management than poorly connected species. Importantly, we show that information from a few species on co-occurrence and expected responses to alternative threat management actions can be used to train a response model for an entire community. We use a unique management dataset for a threatened bird community to validate our predictions and, in doing so, demonstrate positive feedbacks in occurrence and co-occurrence resulting from shared threat management responses during ecosystem recovery.
Clinical laboratory as an economic model for business performance analysis
Buljanović, Vikica; Patajac, Hrvoje; Petrovečki, Mladen
2011-01-01
Aim To perform SWOT (strengths, weaknesses, opportunities, and threats) analysis of a clinical laboratory as an economic model that may be used to improve business performance of laboratories by removing weaknesses, minimizing threats, and using external opportunities and internal strengths. Methods Impact of possible threats to and weaknesses of the Clinical Laboratory at Našice General County Hospital business performance and use of strengths and opportunities to improve operating profit were simulated using models created on the basis of SWOT analysis results. The operating profit as a measure of profitability of the clinical laboratory was defined as total revenue minus total expenses and presented using a profit and loss account. Changes in the input parameters in the profit and loss account for 2008 were determined using opportunities and potential threats, and economic sensitivity analysis was made by using changes in the key parameters. The profit and loss account and economic sensitivity analysis were tools for quantifying the impact of changes in the revenues and expenses on the business operations of clinical laboratory. Results Results of simulation models showed that operational profit of €470 723 in 2008 could be reduced to only €21 542 if all possible threats became a reality and current weaknesses remained the same. Also, operational gain could be increased to €535 804 if laboratory strengths and opportunities were utilized. If both the opportunities and threats became a reality, the operational profit would decrease by €384 465. Conclusion The operational profit of the clinical laboratory could be significantly reduced if all threats became a reality and the current weaknesses remained the same. The operational profit could be increased by utilizing strengths and opportunities as much as possible. This type of modeling may be used to monitor business operations of any clinical laboratory and improve its financial situation by implementing changes in the next fiscal period. PMID:21853546
Clinical laboratory as an economic model for business performance analysis.
Buljanović, Vikica; Patajac, Hrvoje; Petrovecki, Mladen
2011-08-15
To perform SWOT (strengths, weaknesses, opportunities, and threats) analysis of a clinical laboratory as an economic model that may be used to improve business performance of laboratories by removing weaknesses, minimizing threats, and using external opportunities and internal strengths. Impact of possible threats to and weaknesses of the Clinical Laboratory at Našice General County Hospital business performance and use of strengths and opportunities to improve operating profit were simulated using models created on the basis of SWOT analysis results. The operating profit as a measure of profitability of the clinical laboratory was defined as total revenue minus total expenses and presented using a profit and loss account. Changes in the input parameters in the profit and loss account for 2008 were determined using opportunities and potential threats, and economic sensitivity analysis was made by using changes in the key parameters. The profit and loss account and economic sensitivity analysis were tools for quantifying the impact of changes in the revenues and expenses on the business operations of clinical laboratory. Results of simulation models showed that operational profit of €470 723 in 2008 could be reduced to only €21 542 if all possible threats became a reality and current weaknesses remained the same. Also, operational gain could be increased to €535 804 if laboratory strengths and opportunities were utilized. If both the opportunities and threats became a reality, the operational profit would decrease by €384 465. The operational profit of the clinical laboratory could be significantly reduced if all threats became a reality and the current weaknesses remained the same. The operational profit could be increased by utilizing strengths and opportunities as much as possible. This type of modeling may be used to monitor business operations of any clinical laboratory and improve its financial situation by implementing changes in the next fiscal period.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Silva, Consuelo Juanita
Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or datamore » to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.« less
Automating Risk Analysis of Software Design Models
Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P.
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance. PMID:25136688
Automating risk analysis of software design models.
Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.
Analysis of web-related threats in ten years of logs from a scientific portal
NASA Astrophysics Data System (ADS)
Santos, Rafael D. C.; Grégio, André R. A.; Raddick, Jordan; Vattki, Vamsi; Szalay, Alex
2012-06-01
SkyServer is an Internet portal to data from the Sloan Digital Sky Survey, the largest online archive of astronomy data in the world. provides free access to hundreds of millions of celestial objects for science, education and outreach purposes. Logs of accesses to SkyServer comprise around 930 million hits, 140 million web services accesses and 170 million SQL submitted queries, collected over the past 10 years. These logs also contain indications of compromise attempts on the servers. In this paper, we show some threats that were detected in ten years of stored logs, and compare them with known threats in those years. Also, we present an analysis of the evolution of those threats over these years.
NASA Technical Reports Server (NTRS)
Chung, Christopher A.; Marwaha, Shweta
2005-01-01
This paper describes an interactive multimedia simulator for air transportation bomb threat training. The objective of this project is to improve the air transportation sector s capability to respond to bomb threats received by commercial airports and aircraft. The simulator provides realistic training on receiving and responding to a variety of bomb threats that might not otherwise be possible due to time, cost, or operational constraints. Validation analysis indicates that the use of the simulator resulted in statistically significant increases in individual ability to respond to these types of bomb threats.
Assessing the risk of ignition in the Russian far east within a modeling framework of fire threat.
Loboda, Tatiana V; Csiszar, Ivan A
2007-04-01
The forests of high biological importance in the Russian Far East (RFE) have been experiencing increasing pressure from growing demands for natural resources under the changing economy of post-Soviet Russia. This pressure is further amplified by the rising threat of large and catastrophic fire occurrence, which threatens both the resources and the economic potential of the region. In this paper we introduce a conceptual Fire Threat Model (FTM) and use it to provide quantitative assessment of the risk of ignition in the Russian Far East. The remotely sensed data driven FTM is aimed at evaluating potential wildland fire occurrence and its impact and recovery potential for a given resource. This model is intended for use by resource managers to assist in assessing current levels of fire threat to a given resource, projecting the changes in fire threat under changing climate and land use, and evaluating the efficiency of various management approaches aimed at minimizing the fire impact. Risk of ignition (one of the major uncertainties within fire threat modeling) was analyzed using the MODIS active fire product. The risk of ignition in the RFE is shown to be highly variable in spatial and temporal domains. However, the number of ignition points is not directly proportional to the amount of fire occurrence in the area. Fire ignitions in the RFE are strongly linked to anthropogenic activity (transportation routes, settlements, and land use). An increase in the number of fire ignitions during summer months could be attributed to (1) disruption of the summer monsoons and subsequent changes in fire weather and (2) an increase in natural sources of fire ignitions.
The fear of others: a qualitative analysis of interpersonal threat in social phobia and paranoia.
Stopa, Luisa; Denton, Ruth; Wingfield, Megan; Taylor, Katherine Newman
2013-03-01
The cognitive models indicate that people with social phobia and paranoia share a common fear of others. While we recognize clinical differences, it is likely that some of the same psychological processes contribute to the maintenance of both presentations, yet the nature and extent of these similarities and differences are not yet clearly understood. This study explored threat experiences in people with social phobia and persecutory delusions in order to elucidate these aspects of the respective cognitive models. Accounts of interpersonal threat experiences were examined in nine people with social phobia and nine people with persecutory delusions. Verbatim transcripts were analyzed using thematic analysis. Three major themes emerged from the data: participants' experience of threat, reactions while under threat, and subsequent reflections. Narrative coherence emerged as a superordinate theme. Typical fear responses were found in both groups, particularly in their reactions to threat. The key differences were in participants' perceptual experiences, ability to stand back from the threat following the event, and narrative coherence. The findings are discussed in relation to current cognitive models of social phobia and paranoia. Theoretical and clinical implications are drawn out, and highlight the need to examine attentional and metacognitive processes more closely if we are to understand the maintenance of perceived threat in these groups, and means of alleviating associated distress.
Ayalon, Liat
2017-08-05
The present study adds to the current body of literature by simultaneously examining the public perception of young and old people as posing realistic threats (e.g., to the group's power, resources, and welfare) and symbolic threats (e.g., to one's world view, belief system and values). The fourth wave of the European Social Survey was administered to individuals from 29 countries. Analysis is based on 56,170 individuals, who had data on the four relevant indicators. The study relied on a latent profile analysis to develop a typology of perceived realistic and symbolic threats to society by younger and older adults. A three-profile solution indicated that the perception of older and younger adults as threats to society often co-occurs. Sociodemographic characteristics at the individual-level and the Gini coefficient (e.g., an inequality indicator) at the country-level had differential associations with the profiles identified. The study calls for a more balanced approach which evaluates attitudes toward both younger and older adults as potential sources of threat. Attention should be paid to individual- and national-level characteristics associated with age-based threats (e.g., the perception of a group, defined by its chronological age, as threatening). © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Framework model and principles for trusted information sharing in pervasive health.
Ruotsalainen, Pekka; Blobel, Bernd; Nykänen, Pirkko; Seppälä, Antto; Sorvari, Hannu
2011-01-01
Trustfulness (i.e. health and wellness information is processed ethically, and privacy is guaranteed) is one of the cornerstones for future Personal Health Systems, ubiquitous healthcare and pervasive health. Trust in today's healthcare is organizational, static and predefined. Pervasive health takes place in an open and untrusted information space where person's lifelong health and wellness information together with contextual data are dynamically collected and used by many stakeholders. This generates new threats that do not exist in today's eHealth systems. Our analysis shows that the way security and trust are implemented in today's healthcare cannot guarantee information autonomy and trustfulness in pervasive health. Based on a framework model of pervasive health and risks analysis of ubiquitous information space, we have formulated principles which enable trusted information sharing in pervasive health. Principles imply that the data subject should have the right to dynamically verify trust and to control the use of her health information, as well as the right to set situation based context-aware personal policies. Data collectors and processors have responsibilities including transparency of information processing, and openness of interests, policies and environmental features. Our principles create a base for successful management of privacy and information autonomy in pervasive health. They also imply that it is necessary to create new data models for personal health information and new architectures which support situation depending trust and privacy management.
Mind-sets matter: a meta-analytic review of implicit theories and self-regulation.
Burnette, Jeni L; O'Boyle, Ernest H; VanEpps, Eric M; Pollack, Jeffrey M; Finkel, Eli J
2013-05-01
This review builds on self-control theory (Carver & Scheier, 1998) to develop a theoretical framework for investigating associations of implicit theories with self-regulation. This framework conceptualizes self-regulation in terms of 3 crucial processes: goal setting, goal operating, and goal monitoring. In this meta-analysis, we included articles that reported a quantifiable assessment of implicit theories and at least 1 self-regulatory process or outcome. With a random effects approach used, meta-analytic results (total unique N = 28,217; k = 113) across diverse achievement domains (68% academic) and populations (age range = 5-42; 10 different nationalities; 58% from United States; 44% female) demonstrated that implicit theories predict distinct self-regulatory processes, which, in turn, predict goal achievement. Incremental theories, which, in contrast to entity theories, are characterized by the belief that human attributes are malleable rather than fixed, significantly predicted goal setting (performance goals, r = -.151; learning goals, r = .187), goal operating (helpless-oriented strategies, r = -.238; mastery-oriented strategies, r = .227), and goal monitoring (negative emotions, r = -.233; expectations, r = .157). The effects for goal setting and goal operating were stronger in the presence (vs. absence) of ego threats such as failure feedback. Discussion emphasizes how the present theoretical analysis merges an implicit theory perspective with self-control theory to advance scholarship and unlock major new directions for basic and applied research.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mar, M.H.
1995-07-01
Based on the vulnerability Lethality (V/L) taxonomy developed by the Ballistic Vulnerability Lethality Division (BVLD) of the Survivability Lethality Analysis Directorate (SLAD), a nuclear electromagnetic pulse (EMP) coupling V/L analysis taxonomy has been developed. A nuclear EMP threat to a military system can be divided into two levels: (1) coupling to a system level through a cable, antenna, or aperture; and (2) the component level. This report will focus on the initial condition, which includes threat definition and target description, as well as the mapping process from the initial condition to damaged components state. EMP coupling analysis at a systemmore » level is used to accomplish this. This report introduces the nature of EMP threat, interaction between the threat and target, and how the output of EMP coupling analysis at a system level becomes the input to the component level analysis. Many different tools (EMP coupling codes) will be discussed for the mapping process, which correponds to the physics of phenomenology. This EMP coupling V/L taxonomy and the models identified in this report will provide the tools necessary to conduct basic V/L analysis of EMP coupling.« less
Myers, Nathan
2016-01-01
In the last five years, the American public health emergency preparedness and response system has been tested by two significant threats, H1N1 and Ebola. While neither proved as dangerous as initially feared, these viruses highlighted on-going issues with collaborations in the field of public health and health care. Strengths were identified within the network, but also challenges that must be resolved before the U.S. faces a major pandemic. Employing interview data from public health emergency response practitioners and documentary evidence from the H1N1 and Ebola responses, this qualitative analysis uses the grounded theory approach to identify key areas for collaborative improvement. The grounded theory developed calls for a stronger policy framework at the federal level to facilitate more collaboration between U.S. agencies and facilitate more collaboration at the state and local level.
The OECI model: the CRO Aviano experience.
Da Pieve, Lucia; Collazzo, Raffaele; Masutti, Monica; De Paoli, Paolo
2015-01-01
In 2012, the "Centro di Riferimento Oncologico" (CRO) National Cancer Institute joined the accreditation program of the Organisation of European Cancer Institutes (OECI) and was one of the first institutes in Italy to receive recognition as a Comprehensive Cancer Center. At the end of the project, a strengths, weaknesses, opportunities, and threats (SWOT) analysis aimed at identifying the pros and cons, both for the institute and of the accreditation model in general, was performed. The analysis shows significant strengths, such as the affinity with other improvement systems and current regulations, and the focus on a multidisciplinary approach. The proposed suggestions for improvement concern mainly the structure of the standards and aim to facilitate the assessment, benchmarking, and sharing of best practices. The OECI accreditation model provided a valuable executive tool and a framework in which we can identify several important development projects. An additional impact for our institute is the participation in the project BenchCan, of which the OECI is lead partner.
Collaborative Access Control For Critical Infrastructures
NASA Astrophysics Data System (ADS)
Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed
A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.
A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack.
Li, Xuran; Wang, Qiu; Dai, Hong-Ning; Wang, Hao
2018-06-14
Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this paper, we propose a novel anti-eavesdropping scheme by introducing friendly jammers to an industrial crowdsensing network. In particular, we establish a theoretical framework considering both the probability of eavesdropping attacks and the probability of successful transmission to evaluate the effectiveness of our scheme. Our framework takes into account various channel conditions such as path loss, Rayleigh fading, and the antenna type of friendly jammers. Our results show that using jammers in industrial crowdsensing networks can effectively reduce the eavesdropping risk while having no significant influence on legitimate communications.
Strategic Analysis of Family Support in EHDI Systems
ERIC Educational Resources Information Center
Bradham, Tamala S.; Houston, K. Todd; Guignard, Gayla Hutsell; Hoffman, Jeff
2011-01-01
State coordinators of early hearing detection and intervention (EHDI) programs completed a strengths, weaknesses, opportunities, and threats, or SWOT, analysis that examined 12 areas within state EHDI programs. For the family support area, 47 EHDI coordinators listed 255 items, and themes were identified within each category. A threats,…
Evaluating the Effectiveness of School Instrumental Programs.
ERIC Educational Resources Information Center
Holtz, Glenn
2001-01-01
Describes the analysis of "Strengths and Weaknesses and Opportunities and Threats" (SWOT). Discusses the study, "Gemeinhardt 4," that used the SWOT analysis to determine 13 different types of music programs. Addresses how music teachers can utilize this information. Includes other sections such as, "Possible Solution to Music Program Threats."…
Water and Power Systems Co-optimization under a High Performance Computing Framework
NASA Astrophysics Data System (ADS)
Xuan, Y.; Arumugam, S.; DeCarolis, J.; Mahinthakumar, K.
2016-12-01
Water and energy systems optimizations are traditionally being treated as two separate processes, despite their intrinsic interconnections (e.g., water is used for hydropower generation, and thermoelectric cooling requires a large amount of water withdrawal). Given the challenges of urbanization, technology uncertainty and resource constraints, and the imminent threat of climate change, a cyberinfrastructure is needed to facilitate and expedite research into the complex management of these two systems. To address these issues, we developed a High Performance Computing (HPC) framework for stochastic co-optimization of water and energy resources to inform water allocation and electricity demand. The project aims to improve conjunctive management of water and power systems under climate change by incorporating improved ensemble forecast models of streamflow and power demand. First, by downscaling and spatio-temporally disaggregating multimodel climate forecasts from General Circulation Models (GCMs), temperature and precipitation forecasts are obtained and input into multi-reservoir and power systems models. Extended from Optimus (Optimization Methods for Universal Simulators), the framework drives the multi-reservoir model and power system model, Temoa (Tools for Energy Model Optimization and Analysis), and uses Particle Swarm Optimization (PSO) algorithm to solve high dimensional stochastic problems. The utility of climate forecasts on the cost of water and power systems operations is assessed and quantified based on different forecast scenarios (i.e., no-forecast, multimodel forecast and perfect forecast). Analysis of risk management actions and renewable energy deployments will be investigated for the Catawba River basin, an area with adequate hydroclimate predicting skill and a critical basin with 11 reservoirs that supplies water and generates power for both North and South Carolina. Further research using this scalable decision supporting framework will provide understanding and elucidate the intricate and interdependent relationship between water and energy systems and enhance the security of these two critical public infrastructures.
Children facing a family member's acute illness: a review of intervention studies.
Spath, Mary L
2007-07-01
A review of psycho-educational intervention studies to benefit children adapting to a close (parent, sibling, or grandparent) family member's serious illness was conducted. To review the literature on studies addressing this topic, critique research methods, describe clinical outcomes, and make recommendations for future research efforts. Research citations from 1990 to 2005 from Medline, CINAHL, Health Source: Nursing/Academic Edition, PsycARTICLES, and PsycINFO databases were identified. Citations were reviewed and evaluated for sample, design, theoretical framework, intervention, threats to validity, and outcomes. Reviewed studies were limited to those that included statistical analysis to evaluate interventions and outcomes. Six studies were reviewed. Positive outcomes were reported for all of the interventional strategies used in the studies. Reviewed studies generally lacked a theoretical framework and a control group, were generally composed of small convenience samples, and primarily used non-tested investigator instruments. They were diverse in terms of intervention length and intensity, and measured short-term outcomes related to participant program satisfaction, rather than participant cognitive and behavioral change. The paucity of interventional studies and lack of systematic empirical precision to evaluate intervention effectiveness necessitates future studies that are methodologically rigorous.
Lim, Ji Young; Noh, Wonjung; Kim, Eunjoo; Choi, Kyung Won
2014-01-01
The aim of this study was to describe the current state of home visit nursing services in the Korean context and to suggest future policy directions. First, the three home visit nursing services that have developed in Korea are compared using the analytic framework provided by Gilbert and Terrell in 2012. The framework is based on four dimensions of social welfare: users, services, source of funds, and service delivery process. Second, we perform a strength, weakness, opportunity, and threat analysis to suggest comprehensive and constructive home visit nursing service policies for the future. Specifically, we advocate the creation of an organization that steers the central government to operate an integrated management organization to distribute services and reduce redundancy for preventing the waste of both medical and state financial resources. This study also recommends the development of educational programs to improve the quality of services and service evaluation criteria for the objective assessment of those services. These policy guidelines may prove useful both for Korea and for other countries that intend to prepare or revise their home visit nursing service systems. © 2014 Wiley Periodicals, Inc.
Restif, Olivier; Hayman, David T S; Pulliam, Juliet R C; Plowright, Raina K; George, Dylan B; Luis, Angela D; Cunningham, Andrew A; Bowen, Richard A; Fooks, Anthony R; O'Shea, Thomas J; Wood, James L N; Webb, Colleen T
2012-01-01
Infectious disease ecology has recently raised its public profile beyond the scientific community due to the major threats that wildlife infections pose to biological conservation, animal welfare, human health and food security. As we start unravelling the full extent of emerging infectious diseases, there is an urgent need to facilitate multidisciplinary research in this area. Even though research in ecology has always had a strong theoretical component, cultural and technical hurdles often hamper direct collaboration between theoreticians and empiricists. Building upon our collective experience of multidisciplinary research and teaching in this area, we propose practical guidelines to help with effective integration among mathematical modelling, fieldwork and laboratory work. Modelling tools can be used at all steps of a field-based research programme, from the formulation of working hypotheses to field study design and data analysis. We illustrate our model-guided fieldwork framework with two case studies we have been conducting on wildlife infectious diseases: plague transmission in prairie dogs and lyssavirus dynamics in American and African bats. These demonstrate that mechanistic models, if properly integrated in research programmes, can provide a framework for holistic approaches to complex biological systems. PMID:22809422
Small threat and contraband detection with TNA-based systems.
Shaw, T J; Brown, D; D'Arcy, J; Liu, F; Shea, P; Sivakumar, M; Gozani, T
2005-01-01
The detection of small threats, such as explosives, drugs, and chemical weapons, concealed or encased in surrounding material, is a major concern in areas from security checkpoints to UneXploded Ordnance (UXO) clearance. Techniques such as X-ray and trace detection are often ineffectual in these applications. Thermal neutron analysis (TNA) provides an effective method for detecting concealed threats. This paper shows the effectiveness of Ancore's SPEDS, based on TNA, in detecting concealed liquid threats and differentiating live from inert mortar shells.
Assessing volcanic hazard at the most populated caldera in the world: Campi Flegrei, Southern Italy
NASA Astrophysics Data System (ADS)
Somma, R.; de Natale, G.; Troise, C.; Kilburn, C.; Moretti, R.
2017-12-01
Naples and its hinterland in Southern Italy are one of the most urbanized areas in the world under threat from volcanic activity. The region lies within range of three active volcanic centers: Vesuvius, Campi Flegrei, and Ischia. The Campi Flegrei caldera, in particular, has been in unrest for six decades. The unrest followed four centuries of quiescence and has heightened concern about an increased potential for eruption. Innovative geochemical and geophysical analysis, combined with scientific drilling, are being used to investigate Campi Flegrei. Results highlight key directions for better understanding the mechanisms of caldera formation and the respective roles of magma intrusion and hydrothermal activity in determining the volcano's behavior. They also provide a framework for evaluating and mitigating the risk from this caldera and other large ones worldwide.
Smith, Rachel A.; Greenberg, Marisa; Parrott, Roxanne L.
2014-01-01
With a growing interest in using genetic information to motivate young adults’ health behaviors, audience segmentation is needed for effective campaign design. Using latent class analysis, this study identifies segments based on young adults’ (N = 327) beliefs about genetic threats to their health and personal efficacy over genetic influences on their health. A four-class model was identified. The model indicators fit the risk perception attitude framework (Rimal & Real, 2003), but the covariates (e.g., current health behaviors) did not. In addition, opinion leader qualities covaried with one profile: those in this profile engaged in fewer preventative behaviors and more dangerous treatment options, and also liked to persuade others, making them a particularly salient group for campaign efforts. The implications for adult-onset disorders, like alpha-1 antitrypsin deficiency are discussed. PMID:24111749
Cascading disaster models in postburn flash flood
Fred May
2007-01-01
A useful method of modeling threats from hazards and documenting their disaster causation sequences is called âcascading threat modeling.â This type of modeling enables emergency planners to address hazard and risk assessments systematically. This paper describes a cascading threat modeling and analysis process. Wildfire and an associated postburn flash flood disaster...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heineke, J.M.
1978-12-20
This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)
Threats to riparian ecosystems in western North America: An analysis of existing literature
Boris Poff; Karen A. Koestner; Dan Neary; Victoria Henderson
2011-01-01
A total of 453 journal articles, reports, books, and book chapters addressing threats to riparian ecosystems in western North America were analyzed to identify, quantify, and qualify the major threats to these ecosystems as represented in the existing literature. Publications were identified either as research, policy, literature review, historical comparison, or...
Public health preparedness in Alberta: a systems-level study.
Moore, Douglas; Shiell, Alan; Noseworthy, Tom; Russell, Margaret; Predy, Gerald
2006-12-28
Recent international and national events have brought critical attention to the Canadian public health system and how prepared the system is to respond to various types of contemporary public health threats. This article describes the study design and methods being used to conduct a systems-level analysis of public health preparedness in the province of Alberta, Canada. The project is being funded under the Health Research Fund, Alberta Heritage Foundation for Medical Research. We use an embedded, multiple-case study design, integrating qualitative and quantitative methods to measure empirically the degree of inter-organizational coordination existing among public health agencies in Alberta, Canada. We situate our measures of inter-organizational network ties within a systems-level framework to assess the relative influence of inter-organizational ties, individual organizational attributes, and institutional environmental features on public health preparedness. The relative contribution of each component is examined for two potential public health threats: pandemic influenza and West Nile virus. The organizational dimensions of public health preparedness depend on a complex mix of individual organizational characteristics, inter-agency relationships, and institutional environmental factors. Our study is designed to discriminate among these different system components and assess the independent influence of each on the other, as well as the overall level of public health preparedness in Alberta. While all agree that competent organizations and functioning networks are important components of public health preparedness, this study is one of the first to use formal network analysis to study the role of inter-agency networks in the development of prepared public health systems.
Lu, Hui; Yan, Fei; Wang, Wei; Wu, Laiwa; Ma, Weiping; Chen, Jing; Shen, Xin; Mei, Jian
2013-01-01
Tuberculosis (TB) in internal migrants is one of three threats for TB control in China. To address this threat, a project was launched in eight of the 19 districts of Shanghai in 2007 to provide transportation subsidies and living allowances for all migrant TB cases. This study aims to determine if this project contributed to improved TB control outcomes among migrants in urban Shanghai. This was a community intervention study. The data were derived from the TB Management Information System in three project districts and three non-project districts in Shanghai between 2006 and 2010. The impact of the project was estimated in a difference-in-difference (DID) analysis framework, and a multivariable binary logistic regression analysis. A total of 1872 pulmonary TB (PTB) cases in internal migrants were included in the study. The treatment success rate (TSR) for migrant smear-positive cases in project districts increased from 59.9% in 2006 to 87.6% in 2010 (P < 0.001). The crude DID improvement of TSR was 18.9%. There was an increased probability of TSR in the project group before and after the project intervention period (coefficient = 1.156, odds ratio = 3.178, 95% confidence interval: 1.305-7.736, P = 0.011). The study showed the project could improve treatment success in migrant PTB cases. This was a short-term programme using special financial subsidies for all migrant PTB cases. It is recommended that project funds be continuously invested by governments with particular focus on the more vulnerable PTB cases among migrants.
Transformational Capacity - Exploring a Places Ability to Change
NASA Astrophysics Data System (ADS)
Hirschfeld, D.
2016-12-01
In the face of climate change, there is an emerging consensus that local transformations are necessary in order to avoid the most catastrophic of losses (Burch et al. 2014; Preston et al. 2013). Specifically, it is well known that rising sea levels will lead to increased flooding and habitat loss (McGranahan, et al., 2007). Solutions to sea level rise and its associated impacts will require the active participation of coastal communities who will continue to be relied upon for most of the critical land use and planning decisions (Hurlimann and March 2012). While local governments are needed, these changes are known to be extremely difficult and require a shift to a new development path. Additionally, municipalities need to be able to identify places that can be altered to prepare for sea level rise. Thus we need to enhancer our understanding of transformational capacity. The range of future sea level rise projections are well understood, what is not known is how people will react and change the coastal landscape to address these threats. Additionally, it is not well understood how these different shorezone strategies will in turn impact people. Building on other long-term historical models in coastal engineering, we have developed a framework to generate potential future shorezones in a complex estuarine environment. As shown in Figure 1, the framework includes three general components to determine potential future shorezones. Within each general part of the framework, there are a number of critical data sets used to support this part of the model. For example, the economic piece of the analysis includes, the costs of coastal protective infrastructure and the values of upland parcels. The future shorezones generated through this analysis will be used in sea level rise impacts assessments allowing for a richer conversation in the climate adaptation process. Ultimately, the goals of this presentation are to 1) introduce this specific framework designed to assess the transformational capacity of places 2) use the framework to compare and assess components of the system and 3) show results from research in the San Francisco Bay.
Needs assessment for business strategies of anesthesiology groups' practices.
Scurlock, Corey; Dexter, Franklin; Reich, David L; Galati, Maria
2011-07-01
Progress has been made in understanding strategic decision making influencing anesthesia groups' operating room business practices. However, there has been little analysis of the remaining gaps in our knowledge. We performed a needs assessment to identify unsolved problems in anesthesia business strategy based on Porter's Five Forces Analysis. The methodology was a narrative literature review. We found little previous investigation for 2 of the 5 forces (threat of new entrants and bargaining power of suppliers), modest understanding for 1 force (threat of substitute products or services), and substantial understanding for 2 forces (bargaining power of customers and jockeying for position among current competitors). Additional research in strategic decisions influencing anesthesia groups should focus on the threat of new entrants, bargaining power of suppliers, and the threat of substitute products or services.
Incorporating evolutionary measures into conservation prioritization.
Redding, David W; Mooers, Arne Ø
2006-12-01
Conservation prioritization is dominated by the threat status of candidate species. However, species differ markedly in the shared genetic information they embody, and this information is not taken into account if species are prioritized by threat status alone. We developed a system of prioritization that incorporates both threat status and genetic information and applied it to 9546 species of birds worldwide. We devised a simple measure of a species' genetic value that takes into account the shape of the entire taxonomic tree of birds. This measure approximates the evolutionary history that each species embodies and sums to the phylogenetic diversity of the entire taxonomic tree. We then combined this genetic value with each species' probability of extinction to create a species-specific measure of expected loss of genetic information. The application of our methods to the world's avifauna showed that ranking species by expected loss of genetic information may help preserve bird evolutionary history by upgrading those threatened species with fewer close relatives. We recommend developing a mechanism to incorporate a species' genetic value into the prioritization framework.
Leveraging the laboratory response network model for the global health security agenda.
Mangal, Chris N; Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks-natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern.
Leveraging the Laboratory Response Network Model for the Global Health Security Agenda
Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks—natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern. PMID:25254916
Jouriles, Ernest N; Vu, Nicole L; McDonald, Renee; Rosenfield, David
2014-12-01
This research examined whether children's threat and self-blame appraisals regarding interparental conflict and their beliefs about the justifiability of aggression predicted children's externalizing problems in families in which there had been recent severe intimate partner violence (IPV). Participants were 106 children (62 boys, 44 girls) aged 7 to 10 and their mothers. Families in which there had been recent severe IPV were recruited during their stay at a domestic violence shelter. Children completed measures of threat, self-blame, beliefs about the justifiability of aggression, and externalizing problems. Mothers completed a measure of children's externalizing problems. Measures were completed at 3 time points, spaced 6 months apart. In multilevel modeling analyses, threat appraisals and beliefs about the justifiability of aggression were positively associated with children's reports of externalizing problems concurrently, and self-blame appraisals were positively associated with mothers' reports of externalizing problems concurrently. In prospective analyses, beliefs about the justifiability of aggression at 1 time point were positively associated with children's reports of externalizing problems 6 months later. The results provide partial support for the modified cognitive-contextual framework.
Tsunami Forecasting and Monitoring in New Zealand
NASA Astrophysics Data System (ADS)
Power, William; Gale, Nora
2011-06-01
New Zealand is exposed to tsunami threats from several sources that vary significantly in their potential impact and travel time. One route for reducing the risk from these tsunami sources is to provide advance warning based on forecasting and monitoring of events in progress. In this paper the National Tsunami Warning System framework, including the responsibilities of key organisations and the procedures that they follow in the event of a tsunami threatening New Zealand, are summarised. A method for forecasting threat-levels based on tsunami models is presented, similar in many respects to that developed for Australia by Allen and Greenslade (Nat Hazards 46:35-52, 2008), and a simple system for easy access to the threat-level forecasts using a clickable pdf file is presented. Once a tsunami enters or initiates within New Zealand waters, its progress and evolution can be monitored in real-time using a newly established network of online tsunami gauge sensors placed at strategic locations around the New Zealand coasts and offshore islands. Information from these gauges can be used to validate and revise forecasts, and assist in making the all-clear decision.
Activity Learning as a Foundation for Security Monitoring in Smart Homes
Dahmen, Jessamyn; Thomas, Brian L.; Cook, Diane J.; Wang, Xiaobo
2017-01-01
Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed. PMID:28362342
Brooks, Matthew L.; Brown, Cynthia S.; Chambers, Jeanne C.; D'Antonio, Carla M.; Keeley, Jon E.; Belnap, Jayne
2016-01-01
Exotic annual Bromus species are widely recognized for their potential to invade, dominate, and alter the structure and function of ecosystems. In this chapter, we summarize the invasion potential, ecosystem threats, and management strategies for different Bromus species within each of five ecoregions of the western United States. We characterize invasion potential and threats in terms of ecosystem resistance to Bromus invasion and ecosystem resilience to disturbance with an emphasis on the importance of fi re regimes. We also explain how soil temperature and moisture regimes can be linked to patterns of resistance and resilience and provide a conceptual framework that can be used to evaluate the relative potential for invasion and ecological impact of the dominant exotic annual Bromus species in the western United States.
Jeffs, Lianne; Tregunno, Deborah; MacMillan, Kathleen; Espin, Sherry
2009-01-01
Healthcare delivery settings are complex adaptive and tightly coupled, interrelated systems. Within the larger healthcare system, a key subsystem is the "clinical microsystem" level. It is at this level that clinicians are faced with high levels of uncertainty in their daily work - uncertainty that impacts the quality and safety of care that patients receive. The first aim of this paper is to enhance healthcare leaders' understanding of what is currently known about safety threats and strategies to manage the inherent tensions and trade-offs that occur in everyday practice. The second aim is to inform strategies that build clinical and organizational resilience through a multi-level framework derived from the collective theoretical and empirical work. Together, this information can strengthen safety practices throughout healthcare organizations.
“Fighting a Hurricane”: Tobacco Industry Efforts to Counter the Perceived Threat of Islam
Lee, Kelley; Ali, Haider; Nakkash, Rima
2015-01-01
Islamic countries are of key importance to transnational tobacco companies as growing markets with increasing smoking rates. We analyzed internal tobacco industry documents to assess the industry’s response to rising concerns about tobacco use within Islamic countries. The tobacco industry perceived Islam as a significant threat to its expansion into these emerging markets. To counter these concerns, the industry framed antismoking views in Islamic countries as fundamentalist and fanatical and attempted to recruit Islamic consultants to portray smoking as acceptable. Tobacco industry lawyers also helped develop theological arguments in favor of smoking. These findings are valuable to researchers and policymakers seeking to implement culturally appropriate measures in Islamic countries under the World Health Organization Framework Convention on Tobacco Control. PMID:25880961
ERIC Educational Resources Information Center
Friman, Margareta; Nyberg, Claes; Norlander, Torsten
2004-01-01
A descriptive qualitative analysis of in-depth interviews involving seven provincial Soccer Association referees was carried out in order to find out how referees experience threats and aggression directed to soccer referees. The Empirical Phenomenological Psychological method (EPP-method) was used. The analysis resulted in thirty categories which…
ERIC Educational Resources Information Center
Guarino, Cassandra; Dieterle, Steven G.; Bargagliotti, Anna E.; Mason, William M.
2013-01-01
This study investigates the impact of teacher characteristics and instructional strategies on the mathematics achievement of students in kindergarten and first grade and tackles the question of how best to use longitudinal survey data to elicit causal inference in the face of potential threats to validity due to nonrandom assignment to treatment.…
Swiss Armed Forces Reform: Doctrinal and Organizational Challenges
2016-06-10
leadership can implement new ideas because they have the necessary power, either by enforcing adaptation or promoting agents of change . The promotion of... change implies effects across the DOTMLPF-P framework and without an immediate threat, strong political pressure, and determined military leadership , the...my committee chair, whose straightforward council and relentless attention to detail were desperately needed: Thank you for your leadership and
Charles Duncan; Becky Abel; Danny Kwan; David Mehlman
2005-01-01
The Nature Conservancy has adopted a framework for mission success called Conservation by Design. We plan at the ecoregional level to define conservation targets and the portfolio of sites needed to protect them. We consider threats and strategies for abating them at these key sites, and we define measures of success to hold ourselves accountable. Migratory birds...
Strand, Linn B; Tong, Shilu; Aird, Rosemary; McRae, David
2010-07-28
There is overwhelming scientific evidence that human activities have changed and will continue to change the climate of the Earth. Eco-environmental health, which refers to the interdependencies between ecological systems and population health and well-being, is likely to be significantly influenced by climate change. The aim of this study was to examine perceptions from government stakeholders and other relevant specialists about the threat of climate change, their capacity to deal with it, and how to develop and implement a framework for assessing vulnerability of eco-environmental health to climate change. Two focus groups were conducted in Brisbane, Australia with representatives from relevant government agencies, non-governmental organisations, and the industry sector (n = 15) involved in the discussions. The participants were specialists on climate change and public health from governmental agencies, industry, and non-governmental organisations in South-East Queensland. The specialists perceived climate change to be a threat to eco-environmental health and had substantial knowledge about possible implications and impacts. A range of different methods for assessing vulnerability were suggested by the participants and the complexity of assessment when dealing with multiple hazards was acknowledged. Identified factors influencing vulnerability were perceived to be of a social, physical and/or economic nature. They included population growth, the ageing population with associated declines in general health and changes in the vulnerability of particular geographical areas due to for example, increased coastal development, and financial stress. Education, inter-sectoral collaboration, emergency management (e.g. development of early warning systems), and social networks were all emphasised as a basis for adapting to climate change. To develop a framework, different approaches were discussed for assessing eco-environmental health vulnerability, including literature reviews to examine the components of vulnerability such as natural hazard risk and exposure and to investigate already existing frameworks for assessing vulnerability. The study has addressed some important questions in regard to government stakeholders and other specialists' views on the threat of climate change and its potential impacts on eco-environmental health. These findings may have implications in climate change and public health decision-making.
2010-01-01
Background There is overwhelming scientific evidence that human activities have changed and will continue to change the climate of the Earth. Eco-environmental health, which refers to the interdependencies between ecological systems and population health and well-being, is likely to be significantly influenced by climate change. The aim of this study was to examine perceptions from government stakeholders and other relevant specialists about the threat of climate change, their capacity to deal with it, and how to develop and implement a framework for assessing vulnerability of eco-environmental health to climate change. Methods Two focus groups were conducted in Brisbane, Australia with representatives from relevant government agencies, non-governmental organisations, and the industry sector (n = 15) involved in the discussions. The participants were specialists on climate change and public health from governmental agencies, industry, and non-governmental organisations in South-East Queensland. Results The specialists perceived climate change to be a threat to eco-environmental health and had substantial knowledge about possible implications and impacts. A range of different methods for assessing vulnerability were suggested by the participants and the complexity of assessment when dealing with multiple hazards was acknowledged. Identified factors influencing vulnerability were perceived to be of a social, physical and/or economic nature. They included population growth, the ageing population with associated declines in general health and changes in the vulnerability of particular geographical areas due to for example, increased coastal development, and financial stress. Education, inter-sectoral collaboration, emergency management (e.g. development of early warning systems), and social networks were all emphasised as a basis for adapting to climate change. To develop a framework, different approaches were discussed for assessing eco-environmental health vulnerability, including literature reviews to examine the components of vulnerability such as natural hazard risk and exposure and to investigate already existing frameworks for assessing vulnerability. Conclusion The study has addressed some important questions in regard to government stakeholders and other specialists' views on the threat of climate change and its potential impacts on eco-environmental health. These findings may have implications in climate change and public health decision-making. PMID:20663227
A Security Audit Framework to Manage Information System Security
NASA Astrophysics Data System (ADS)
Pereira, Teresa; Santos, Henrique
The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.
Setting conservation priorities.
Wilson, Kerrie A; Carwardine, Josie; Possingham, Hugh P
2009-04-01
A generic framework for setting conservation priorities based on the principles of classic decision theory is provided. This framework encapsulates the key elements of any problem, including the objective, the constraints, and knowledge of the system. Within the context of this framework the broad array of approaches for setting conservation priorities are reviewed. While some approaches prioritize assets or locations for conservation investment, it is concluded here that prioritization is incomplete without consideration of the conservation actions required to conserve the assets at particular locations. The challenges associated with prioritizing investments through time in the face of threats (and also spatially and temporally heterogeneous costs) can be aided by proper problem definition. Using the authors' general framework for setting conservation priorities, multiple criteria can be rationally integrated and where, how, and when to invest conservation resources can be scheduled. Trade-offs are unavoidable in priority setting when there are multiple considerations, and budgets are almost always finite. The authors discuss how trade-offs, risks, uncertainty, feedbacks, and learning can be explicitly evaluated within their generic framework for setting conservation priorities. Finally, they suggest ways that current priority-setting approaches may be improved.
On the Effectiveness of Security Countermeasures for Critical Infrastructures.
Hausken, Kjell; He, Fei
2016-04-01
A game-theoretic model is developed where an infrastructure of N targets is protected against terrorism threats. An original threat score is determined by the terrorist's threat against each target and the government's inherent protection level and original protection. The final threat score is impacted by the government's additional protection. We investigate and verify the effectiveness of countermeasures using empirical data and two methods. The first is to estimate the model's parameter values to minimize the sum of the squared differences between the government's additional resource investment predicted by the model and the empirical data. The second is to develop a multivariate regression model where the final threat score varies approximately linearly relative to the original threat score, sectors, and threat scenarios, and depends nonlinearly on the additional resource investment. The model and method are offered as tools, and as a way of thinking, to determine optimal resource investments across vulnerable targets subject to terrorism threats. © 2014 Society for Risk Analysis.
Delay and death-thought accessibility: a meta-analysis.
Steinman, Christopher T; Updegraff, John A
2015-12-01
The dual-process component of Terror Management Theory (TMT) proposes that different types of threats lead to increases in death-thought accessibility (DTA) after different delay intervals. Experimental studies of terror management threats' effect on DTA were collected and coded for their use of explicitly death-related (vs. not explicitly death-related) threats, and for their use of delay and task-switching during the delay. Results reveal that studies using death-related threats achieved larger DTA effect-sizes when they included more task-switching or a longer delay between the threat and the DTA measurement. In contrast, studies using threats that were not explicitly death-related achieved smaller DTA effect-sizes when they included more task-switching between the threat and the DTA measurement. These findings provide partial support for the dual-process component's predictions regarding delay and DTA. Limitations and future directions are discussed. © 2015 by the Society for Personality and Social Psychology, Inc.
Opposing Amygdala and Ventral Striatum Connectivity During Emotion Identification
Satterthwaite, Theodore D.; Wolf, Daniel H.; Pinkham, Amy E.; Ruparel, Kosha; Elliott, Mark A.; Valdez, Jeffrey N.; Overton, Eve; Seubert, Janina; Gur, Raquel E.; Gur, Ruben C.; Loughead, James
2011-01-01
Lesion and electrophysiological studies in animals provide evidence of opposing functions for subcortical nuclei such as the amygdala and ventral striatum, but the implications of these findings for emotion identification in humans remain poorly described. Here we report a high-resolution fMRI study in a sample of 39 healthy subjects who performed a well-characterized emotion identification task. As expected, the amygdala responded to THREAT (angry or fearful) faces more than NON-THREAT (sad or happy) faces. A functional connectivity analysis of the time series from an anatomically defined amygdala seed revealed a strong anti-correlation between the amygdala and the ventral striatum /ventral pallidum, consistent with an opposing role for these regions in during emotion identification. A second functional connectivity analysis (psychophysiological interaction) investigating relative connectivity on THREAT vs. NON-THREAT trials demonstrated that the amygdala had increased connectivity with the orbitofrontal cortex during THREAT trials, whereas the ventral striatum demonstrated increased connectivity with the posterior hippocampus on NON-THREAT trials. These results indicate that activity in the amygdala and ventral striatum may be inversely related, and that both regions may provide opposing affective bias signals during emotion identification. PMID:21600684
An Extended Proof-Carrying Code Framework for Security Enforcement
NASA Astrophysics Data System (ADS)
Pirzadeh, Heidar; Dubé, Danny; Hamou-Lhadj, Abdelwahab
The rapid growth of the Internet has resulted in increased attention to security to protect users from being victims of security threats. In this paper, we focus on security mechanisms that are based on Proof-Carrying Code (PCC) techniques. In a PCC system, a code producer sends a code along with its safety proof to the consumer. The consumer executes the code only if the proof is valid. Although PCC has been shown to be a useful security framework, it suffers from the sheer size of typical proofs -proofs of even small programs can be considerably large. In this paper, we propose an extended PCC framework (EPCC) in which, instead of the proof, a proof generator for the program in question is transmitted. This framework enables the execution of the proof generator and the recovery of the proof on the consumer's side in a secure manner using a newly created virtual machine called the VEP (Virtual Machine for Extended PCC).
Peters, Gjalt-Jorn Ygram; Ruiter, Robert A C; Kok, Gerjo
2013-05-01
Despite decades of research, consensus regarding the dynamics of fear appeals remains elusive. A meta-analysis was conducted that was designed to resolve this controversy. Publications that were included in previous meta-analyses were re-analysed, and a number of additional publications were located. The inclusion criteria were full factorial orthogonal manipulations of threat and efficacy, and measurement of behaviour as an outcome. Fixed and random effects models were used to compute mean effect size estimates. Meta-analysis of the six studies that satisfied the inclusion criteria clearly showed a significant interaction between threat and efficacy, such that threat only had an effect under high efficacy (d = 0.31), and efficacy only had an effect under high threat (d = 0.71). Inconsistency in results regarding the effectiveness of threatening communication can likely be attributed to flawed methodology. Proper tests of fear appeal theory yielded the theoretically hypothesised interaction effect. Threatening communication should exclusively be used when pilot studies indicate that an intervention successfully enhances efficacy.
Peters, Gjalt-Jorn Ygram; Ruiter, Robert A.C.; Kok, Gerjo
2013-01-01
Despite decades of research, consensus regarding the dynamics of fear appeals remains elusive. A meta-analysis was conducted that was designed to resolve this controversy. Publications that were included in previous meta-analyses were re-analysed, and a number of additional publications were located. The inclusion criteria were full factorial orthogonal manipulations of threat and efficacy, and measurement of behaviour as an outcome. Fixed and random effects models were used to compute mean effect size estimates. Meta-analysis of the six studies that satisfied the inclusion criteria clearly showed a significant interaction between threat and efficacy, such that threat only had an effect under high efficacy (d = 0.31), and efficacy only had an effect under high threat (d = 0.71). Inconsistency in results regarding the effectiveness of threatening communication can likely be attributed to flawed methodology. Proper tests of fear appeal theory yielded the theoretically hypothesised interaction effect. Threatening communication should exclusively be used when pilot studies indicate that an intervention successfully enhances efficacy. PMID:23772231
Initial Capabilities Documents: A 10-Year Retrospective of Tools, Methodologies, and Best Practices
2014-07-01
Nixon, J. (2010). Exploring SWOT analysis -where are we now? A review of academic research from the last decade. Journal of Strategy and Management, 3(3...analyze threats, etc.). Strengths, Weaknesses, Opportunities and Threats ( SWOT ) Analysis (Helms & Nixon, 2010) Analyzes internal (strengths...market share/total market pies to enhance analysis . Augments SWOT . Mostly pre-CBA; used to build portfolios; however, can be used in a CBA
Linking terrestrial and marine conservation planning and threats analysis.
Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth
2008-02-01
The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Velsko, Stephan; Bates, Thomas
Despite numerous calls for improvement, the U.S. biosurveillance enterprise remains a patchwork of uncoordinated systems that fail to take advantage of the rapid progress in information processing, communication, and analytics made in the past decade. By synthesizing components from the extensive biosurveillance literature, we propose a conceptual framework for a national biosurveillance architecture and provide suggestions for implementation. The framework differs from the current federal biosurveillance development pathway in that it is not focused on systems useful for “situational awareness,” but is instead focused on the long-term goal of having true warning capabilities. Therefore, a guiding design objective is themore » ability to digitally detect emerging threats that span jurisdictional boundaries, because attempting to solve the most challenging biosurveillance problem first provides the strongest foundation to meet simpler surveillance objectives. Core components of the vision are: (1) a whole-of-government approach to support currently disparate federal surveillance efforts that have a common data need, including those for food safety, vaccine and medical product safety, and infectious disease surveillance; (2) an information architecture that enables secure, national access to electronic health records, yet does not require that data be sent to a centralized location for surveillance analysis; (3) an inference architecture that leverages advances in ‘big data’ analytics and learning inference engines—a significant departure from the statistical process control paradigm that underpins nearly all current syndromic surveillance systems; and, (4) an organizational architecture with a governance model aimed at establishing national biosurveillance as a critical part of the U.S. national infrastructure. Although it will take many years to implement, and a national campaign of education and debate to acquire public buy-in for such a comprehensive system, the potential benefits warrant increased consideration within the U.S. government.« less
Velsko, Stephan; Bates, Thomas
2016-06-17
Despite numerous calls for improvement, the U.S. biosurveillance enterprise remains a patchwork of uncoordinated systems that fail to take advantage of the rapid progress in information processing, communication, and analytics made in the past decade. By synthesizing components from the extensive biosurveillance literature, we propose a conceptual framework for a national biosurveillance architecture and provide suggestions for implementation. The framework differs from the current federal biosurveillance development pathway in that it is not focused on systems useful for “situational awareness,” but is instead focused on the long-term goal of having true warning capabilities. Therefore, a guiding design objective is themore » ability to digitally detect emerging threats that span jurisdictional boundaries, because attempting to solve the most challenging biosurveillance problem first provides the strongest foundation to meet simpler surveillance objectives. Core components of the vision are: (1) a whole-of-government approach to support currently disparate federal surveillance efforts that have a common data need, including those for food safety, vaccine and medical product safety, and infectious disease surveillance; (2) an information architecture that enables secure, national access to electronic health records, yet does not require that data be sent to a centralized location for surveillance analysis; (3) an inference architecture that leverages advances in ‘big data’ analytics and learning inference engines—a significant departure from the statistical process control paradigm that underpins nearly all current syndromic surveillance systems; and, (4) an organizational architecture with a governance model aimed at establishing national biosurveillance as a critical part of the U.S. national infrastructure. Although it will take many years to implement, and a national campaign of education and debate to acquire public buy-in for such a comprehensive system, the potential benefits warrant increased consideration within the U.S. government.« less
Ng, V; Sargeant, J M
2016-05-01
Zoonoses pose a significant burden of illness in North America. Zoonoses represent an additional threat to public health because the natural reservoirs are often animals, particularly wildlife, thus eluding control efforts such as quarantine, vaccination and social distancing. As there are limited resources available, it is necessary to prioritize diseases in order to allocate resources to those posing the greatest public health threat. Many studies have attempted to prioritize zoonoses, but challenges exist. This study uses a quantitative approach, conjoint analysis (CA), to overcome some limitations of traditional disease prioritization exercises. We used CA to conduct a zoonoses prioritization study involving a range of human and animal health professionals across North America; these included epidemiologists, public health practitioners, research scientists, physicians, veterinarians, laboratory technicians and nurses. A total of 699 human health professionals (HHP) and 585 animal health professionals (AHP) participated in this study. We used CA to prioritize 62 zoonotic diseases using 21 criteria. Our findings suggest CA can be used to produce reasonable criteria scores for disease prioritization. The fitted models were satisfactory for both groups with a slightly better fit for AHP compared to HHP (84.4% certainty fit versus 83.6%). Human-related criteria were more influential for HHP in their decision to prioritize zoonoses, while animal-related criteria were more influential for AHP resulting in different disease priority lists. While the differences were not statistically significant, a difference of one or two ranks could be considered important for some individuals. A potential solution to address the varying opinions is discussed. The scientific framework for disease prioritization presented can be revised on a regular basis by updating disease criteria to reflect diseases as they evolve over time; such a framework is of value allowing diseases of highest impact to be identified routinely for resource allocation. © 2015 Blackwell Verlag GmbH.
NASA Astrophysics Data System (ADS)
Entsminger, J. R., II
From a sociocultural point of view, this qualitative case study explored how upper-level, female undergraduate engineering students perceived the possibility of or experience with stereotype threat as shaping their experiences. The study also investigated how these students explained their reasons for choosing their engineering major, the challenges they encountered in the major, and their reasons for persevering in spite of those challenges. Using Steele and Aronson's (1995) stereotype threat theory as a framework, and considering the documented underrepresentation of females in engineering, the study sought to examine how stereotype threat shaped the experiences of these students and if stereotype threat could be considered a valid reason for the underrepresentation. The study was conducted at a large, four-year public university. First, students in the College of Engineering and Engineering Technology completed the Participant Screening Survey. Based on responses from the survey, six female engineering students from the college were identified and invited to participate in the study. The participants came from the following majors: Electrical Engineering, Industrial and Systems Engineering, and Mechanical Engineering. After receiving the study consent letter and agreeing to participate, the students were involved in a 90-minute focus group meeting, a 45-minute one-on-one interview, and a 30-minute follow-up interview. After conducting the data collection methods, the data were then transcribed, analyzed, and coded for theme development. The themes that emerged coincided with each research question. The themes highlighted the complex interactions and experiences shared by the female engineering majors. The female students were enveloped in an environment where there existed an increased risk for activating stereotype threat. In addition, the female students described feeling pushed to prove to themselves and to others that the negative stereotype that 'females are bad at engineering' was untrue. The findings illustrated the need for systematic changes at the university level. Intervention recommendations were provided. In regards to female underrepresentation in science fields, including engineering, stereotype threat certainly had the potential to cause the female students to question themselves, their abilities, their choice of an academic major, and subsequently remove themselves from a hostile learning or working environment. Thus, educational institutions and workplace organizations are responsible for not only educating themselves regarding stereotype threat, but also for taking steps to alleviate the pernicious effects of stereotype threat.
Informal caregivers in hospitals: Opportunities and threats.
Amiresmaili, Mohammadreza; Emrani, Zahra
2018-05-20
High hospital costs are a challenge that health system face. Additionally, studies identified manpower deficiency as a problem in health system. Hospital is a place where patients with different physical and mental conditions come to. Their families and friends' companionship can facilitate this situation for them. This study illustrates the roles of informal caregivers in hospital. This is a phenomenological qualitative study. Data were gathered through semistructured interviews. We interviewed 22 informal caregivers and 9 nurse staffs from different departments of hospital. They were selected through purposeful and snowball sampling approach. The framework method was used for data analysis. We found 3 main themes including (a) roles of informal caregivers, (b) opportunities of presence of the informal caregivers in the hospital, and (c) threats of presence of informal caregivers. This study shows some roles for informal caregivers including mental supports, consultation, decision-making, and care roles. Concerning the shortage of manpower in Iran's hospitals, nurses have less time to take care of each patient; therefore, using informal caregivers as an implicit strategy to overcome nursing shortage and to reduce hospital costs seems to be beneficial. We suggest that an appropriate plan is necessary to make use of them for filling this gap to some extent, as well as providing training sessions and facilities for companions acting as informal caregivers. Copyright © 2018 John Wiley & Sons, Ltd.
Russian military in the year 2000. Master's thesis
DOE Office of Scientific and Technical Information (OSTI.GOV)
McIlmail, J.F.; Jaworski, J.L.
Through the use of content analysis, this paper attempts to paint a picture of the Russian military in the year 2000 and its impact on the US national security strategy. The research begins by defining the origin of Russian national security policy and how that translates into military policy and doctrine. A framework for evaluating Russian military doctrines is provided with a chronology of the military reform process and the related doctrinal reforms that has its birth in the 1987 announcement of a defensive-defense. Following from the doctrinal variant framework the new strategic missions of the 1992 draft military doctrinemore » are presented with an analysis that shows they are a clear departure from the past and truly represent a defensive-defense type doctrine. Additionally, a comparison is made with the current military reform ongoing in Russia with the historical precedent of the Russian military reform of 1924-25. A rough outline of the separate branches of the Russian military both present and future is provided based on the ongoing trends in the reform process. This thumbnail sketch of the Russian military then assists in the analysis and conclusion that even after a possible 50% cutback in US military spending, in the year 2000 the Russian military will not pose a threat to US national security. The major caveat to this conclusion is in the realm of nuclear weapons and this issue is therefore discussed in some length....Former Soviet Union, Russia, Commonwealth of Independent States (CIS), Conventional Forces in Europe treaty (CFE), European Security, New National Security Strategy, Nuclear Weapons, Nuclear Strategy.« less
Shackman, Alexander J.; Stockbridge, Melissa D.; Tillman, Rachael M.; Kaplan, Claire M.; Tromp, Do P. M.; Fox, Andrew S.; Gamer, Matthias
2016-01-01
When extreme, anxiety can become debilitating. Anxiety disorders, which often first emerge early in development, are common and challenging to treat, yet the neurocognitive mechanisms that confer increased risk have only recently begun to come into focus. Here we review recent work highlighting the importance of neural circuits centered on the amygdala. We begin by describing dispositional negativity, a core dimension of childhood temperament and adult personality and an important risk factor for the development of anxiety disorders and other kinds of stress-sensitive psychopathology. Converging lines of epidemiological, neurophysiological, and mechanistic evidence indicate that the amygdala supports stable individual differences in dispositional negativity across the lifespan and contributes to the etiology of anxiety disorders in adults and youth. Hyper-vigilance and attentional biases to threat are prominent features of the anxious phenotype and there is growing evidence that they contribute to the development of psychopathology. Anatomical studies show that the amygdala is a hub, poised to govern attention to threat via projections to sensory cortex and ascending neuromodulatory systems. Imaging and lesion studies demonstrate that the amygdala plays a key role in selecting and prioritizing the processing of threat-related cues. Collectively, these observations provide a neurobiologically-grounded framework for understanding the development and maintenance of anxiety disorders in adults and youth and set the stage for developing improved intervention strategies. PMID:27917284
From Manaus to Maputo: toward a public health and biodiversity framework.
Romanelli, Cristina; Corvalan, Carlos; Cooper, H David; Manga, Lucien; Maiero, Marina; Campbell-Lendrum, Diarmid
2014-09-01
The linkages between human health, biodiversity, ecosystems, and the life-supporting services that they provide are varied and complex. The traditional neglect of this nexus by policy-makers perpetuates threats posed to ecosystems with potentially critical impacts on global health. The Convention on Biological Diversity and the World Health Organization recently co-convened two regional workshops on these intricate but vital linkages. From discussions held with policy-makers and experts in the biodiversity and health sectors, spanning some 50 countries in Africa and the Americas, we derive a broad framework for the development of national and regional public health and biodiversity strategies relevant to strategic planning processes in the emerging post-2015 development context.
The Reemergence of the Arctic as a Strategic Location
2008-05-22
opportunities, threats ( SWOT ) analysis for each instrument. The paper will conclude with Chapter 3, which will draw on American foreign policy traditions to...identifies strengths, weaknesses, opportunities, and threats ( SWOT ). Diplomacy Strengths. Relationships. As seen in the political system...around Oulu in northern Finland. It includes companies such as Nokia , and provides 3,000 jobs.242 Threats. Spiral into a “Downward Transitional
Webber, Whitney M.; Li, Ya-Wei
2016-01-01
Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species’ demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key’s utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand overall patterns of ESA implementation. The scoring repeatability analysis shows promise, but indicates thorough training will be needed to ensure consistency. We propose that large conservation programs adopt our simple scoring system for threats and demography. By doing so, program administrators will have better information to monitor program effectiveness and guide their decisions. PMID:27478713
Malcom, Jacob W; Webber, Whitney M; Li, Ya-Wei
2016-01-01
Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species' demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key's utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand overall patterns of ESA implementation. The scoring repeatability analysis shows promise, but indicates thorough training will be needed to ensure consistency. We propose that large conservation programs adopt our simple scoring system for threats and demography. By doing so, program administrators will have better information to monitor program effectiveness and guide their decisions.
NASA Astrophysics Data System (ADS)
Most, N. N.; Kendig, D.; Wichman, K.; Pollack, N.; Ilagan, A.; Morisette, J. T.; Pedelty, J. A.; Tilmes, C.; Smith, J. A.; Pfister, R.; Schnase, J. L.; Stohgren, T. J.; Crosier, C.; Graham, J.; Newman, G.; Kalkhan, M. A.; Reich, R.
2004-12-01
The spread of invasive species is one of the most daunting environmental, economic, and human-health problems facing the United States and the World today. It is one of several grand challenge environmental problems being addressed by NASA's Science Mission Directorate through a national application partnership with the US Geological Survey. NASA and USGS are working together to develop a National Invasive Species Forecasting System (ISFS) for the management and control of invasive species on Department of Interior and adjacent lands. As part of this effort, we are using NASA's EOS Clearing House (ECHO) framework to create an Invasive Species Data Service (ISDS). The ISDS will be a networked service that integrates a suite of NASA remote sensing data providers with the ecological field data resources of the National Biological Information Infrastructure (NBII). Aggregated ISDS data will feed directly into ISFS analysis routines to produce landscape-scale predictive maps of species distributions. ISDS and the ECHO framework thus provide an efficient interface between existing NASA data systems and decision support systems that are the province of federal agencies and other national organizations. The effort significantly broadens the use of NASA data in managing the Nation's invasive species threat. In this talk, we will describe the NASA/USGS invasive species partnership, provide an overview of the Invasive Species Forecasting System, and show how we are using ECHO technologies as the middle-ware framework for a comprehensive Invasive Species Data Service.
Status and threats analysis for the Florida manatee (Trichechus manatus latirostris), 2012
Runge, Michael C.; Langtimm, Catherine A.; Martin, Julien; Fonnesbeck, Christopher J.
2015-01-01
The endangered West Indian manatee (Trichechus manatus), especially the Florida subspecies (T. m. latirostris), has been the focus of conservation efforts and extensive research since its listing under the Endangered Species Act. On the basis of the best information available as of December 2012, the threats facing the Florida manatee were determined to be less severe than previously thought, either because the conservation efforts have been successful, or because our knowledge of the demographic effects of those threats is increased, or both. Using the manatee Core Biological Model, we estimated the probability of the Florida manatee population on either the Atlantic or Gulf coast falling below 500 adults in the next 150 years to be 0.92 percent. The primary threats remain watercraft-related mortality and long-term loss of warm-water habitat. Since 2009, however, there have been a number of unusual events that have not yet been incorporated into this analysis, including several severely cold winters, a severe red-tide die off, and substantial loss of seagrass habitat in Brevard County, Fla. Further, the version of the Core Biological Model used in 2012 makes a number of assumptions that are under investigation. A revision of the Core Biological Model and an update of this quantitative threats analysis are underway as of 2015.
2012-12-01
and activity coordination (for example, SOC management ). 10. In Reference D the information sharing framework represents a hub & node model in... management , vulnerabilities, critical assets, threats, impacts on operations etc. UNCLASSIFIED UNCLASSIFIED 6 PART 3 - CYBER SITUATIONAL AWARENESS...limit the effect of cyber incidents. 23. Tasks of the SOC include: • System maintenance and management including applying the directed security
ERIC Educational Resources Information Center
Augustyniak, Kristine M.
2005-01-01
Professionals entered the 21st century with a heightened call to address school safety. Though notable contributions have been made to insure peaceful school communities through a wide range of primary and secondary prevention programs, research suggests that these programs are often an insufficient response to students who are at increased risk…
On the suppression of vaccination dissent.
Martin, Brian
2015-02-01
Dissenters from the dominant views about vaccination sometimes are subject to adverse actions, including abusive comment, threats, formal complaints,censorship, and de registration, a phenomenon that can be called suppression of dissent. Three types of cases are examined: scientists and physicians; a high-profile researcher; and a citizen campaigner. Comparing the methods used in these different types of cases provides a preliminary framework for understanding the dynamics of suppression in terms of vulnerabilities.
ERIC Educational Resources Information Center
Thomas, Antonio Lamar
2017-01-01
The relatively little amount of time that some college students spend reading their textbooks outside of the classroom presents a significant threat to their academic success. Using Prenksy's (2001) digital game-based learning (DGBL) principles and Astin's student involvement theory as frameworks, the purpose of this true experiment was to…
[Jihadi radicalisation, legal definitions and reference points].
Romano, Hélène; Picard, Frédéric
2017-10-01
Since the terrorist threat has become part of daily life in France, two terms are systematically used in the public debate: radicalisation and deradicalisation. It is essential to understand exactly what these words encompass, and to know the legal framework associated with them, in order to limit all sorts of interpretations which serve to add to the confusion related to the current context. Copyright © 2017. Published by Elsevier Masson SAS.
The Sovereign Citizen Movement: The Shifting Ideological Winds
2016-03-01
Identity Movement. It was primarily a movement embraced by right-wing Caucasians. Over time, the SCM has morphed from a primarily racialist platform to a...circumstances. Using social identity theory as a framework, what conclusions can be drawn regarding this change, and how can the government prepare for the...Sovereign Citizen Movement (SCM), SCM threat, SCM tactics, domestic terrorism, law enforcement, social identity theory, Aryan Nations, militia groups
Elizabeth E. Crone; Marilyn Marler; Dean E. Pearson
2009-01-01
Invasive species are one of the leading threats to biodiversity worldwide. Therefore, chemical herbicides are increasingly used to control invasive plants in natural and semi-natural areas. Little is known about the non-target impacts of these chemicals on native species. We conducted an experiment to test the demographic effects of the herbicide picloram on a native...
DOE Office of Scientific and Technical Information (OSTI.GOV)
George A. Beitel
2004-02-01
In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could providemore » a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.« less
Schlund, Michael W; Treacher, Kay; Preston, Oli; Magee, Sandy K; Richman, David M; Brewer, Adam T; Cameron, Gemma; Dymond, Simon
2017-01-01
Approach-avoidance paradigms create a competition between appetitive and aversive contingencies and are widely used in nonhuman research on anxiety. Here, we examined how instructions about threat and avoidance impact control by competing contingencies over human approach-avoidance behavior. Additionally, Experiment 1 examined the effects of threat magnitude (money loss amount) and avoidance cost (fixed ratio requirements), whereas Experiment 2 examined the effects of threat information (available, unavailable and inaccurate) on approach-avoidance. During the task, approach responding was modeled by reinforcing responding with money on a FR schedule. By performing an observing response, participants produced an escalating "threat meter". Instructions stated that the threat meter levels displayed the current probability of losing money, when in fact loss only occurred when the level reached the maximum. Instructions also stated pressing an avoidance button lowered the threat level. Overall, instructions produced cycles of approach and avoidance responding with transitions from approach to avoidance when threat was high and transitions back to approach after avoidance reduced threat. Experiment 1 revealed increasing avoidance cost, but not threat magnitude, shifted approach-avoidance transitions to higher threat levels and increased anxiety ratings, but did not influence the frequency of approach-avoidance cycles. Experiment 2 revealed when threat level information was available or absent earnings were high, but earnings decreased when inaccurate threat information was incompatible with contingencies. Our findings build on prior nonhuman and human approach-avoidance research by highlighting how instructed threat and avoidance can impact human AA behavior and self-reported anxiety. © 2017 Society for the Experimental Analysis of Behavior.
Theeboom, Tim; Van Vianen, Annelies E M; Beersma, Bianca
2017-01-01
Economic pressures on companies, technological developments, and less stable career paths pose potential threats to the well-being of employees (e.g., stress, burn-out) and require constant adaptation. In the light of these challenges, it is not surprising that employees often seek the support of a coach. The role of a coach is to foster change by facilitating a coachees' movement through a self-regulatory cycle with the ultimate aim of stimulating sustained well-being and functioning. While meta-analytic research indicates that coaching interventions can be effectively applied to assist employees in dealing with change, the current literature on coaching lacks solid theoretical frameworks that are needed to build a cumulative knowledge-base and to inspire evidence-based practice. In this conceptual analysis, we examine the coaching process through a temporal lens. By doing so, we provide an integrated theoretical framework: a temporal map of coaching. In this framework, we link seminal concepts in psychology to the coaching process, and describe which competencies of coachees are crucial in the different stages of change that coaching aims to bring about. During the preparatory contemplation stage, targeting coachees' awareness by enhancing their mindfulness and environmental receptiveness is important. During the contemplation stage, coachees' willingness and perceived ability to change are central competencies. We propose that coaches should therefore foster intrinsic goal orientation and self-efficacy during this stage. During the planning stage, coaches should focus on goal-setting and implementation intentions. Finally, during the maintenance/termination stage, stimulating coachees' reflection is especially important in order to help them to integrate their learning experiences. The framework delineated in this paper contributes to the understanding of coaching as a tool to assist employees in dealing with the challenges of an increasingly dynamic work-environment and yields concrete suggestions for future theory development and research on coaching.
Theeboom, Tim; Van Vianen, Annelies E. M.; Beersma, Bianca
2017-01-01
Economic pressures on companies, technological developments, and less stable career paths pose potential threats to the well-being of employees (e.g., stress, burn-out) and require constant adaptation. In the light of these challenges, it is not surprising that employees often seek the support of a coach. The role of a coach is to foster change by facilitating a coachees’ movement through a self-regulatory cycle with the ultimate aim of stimulating sustained well-being and functioning. While meta-analytic research indicates that coaching interventions can be effectively applied to assist employees in dealing with change, the current literature on coaching lacks solid theoretical frameworks that are needed to build a cumulative knowledge-base and to inspire evidence-based practice. In this conceptual analysis, we examine the coaching process through a temporal lens. By doing so, we provide an integrated theoretical framework: a temporal map of coaching. In this framework, we link seminal concepts in psychology to the coaching process, and describe which competencies of coachees are crucial in the different stages of change that coaching aims to bring about. During the preparatory contemplation stage, targeting coachees’ awareness by enhancing their mindfulness and environmental receptiveness is important. During the contemplation stage, coachees’ willingness and perceived ability to change are central competencies. We propose that coaches should therefore foster intrinsic goal orientation and self-efficacy during this stage. During the planning stage, coaches should focus on goal-setting and implementation intentions. Finally, during the maintenance/termination stage, stimulating coachees’ reflection is especially important in order to help them to integrate their learning experiences. The framework delineated in this paper contributes to the understanding of coaching as a tool to assist employees in dealing with the challenges of an increasingly dynamic work-environment and yields concrete suggestions for future theory development and research on coaching. PMID:28848470
Deriving a Framework for a Systems Approach to Agitated Patient Care in the Emergency Department.
Wong, Ambrose H; Ruppel, Halley; Crispino, Lauren J; Rosenberg, Alana; Iennaco, Joanne D; Vaca, Federico E
2018-05-01
The rising agitated patient population presenting to the emergency department (ED) has caused increasing safety threats for health care workers and patients. Development of evidence-based strategies has been limited by the lack of a structured framework to examine agitated patient care in the ED. In this study, a systems approach from the patient safety literature was used to derive a comprehensive theoretical framework for addressing ED patient agitation. A mixed-methods approach was used with ED staff members at an academic site and a community site of a regional health care network. Participants consisted of resident and attending physicians, physician assistants/nurse practitioners, nurses, technicians, and security officers. After a simulated agitated patient encounter to prime participants, uniprofessional and interprofessional focus groups were conducted, followed by a structured thematic analysis using a grounded theory approach. Quantitative data consisted of surveys of violence exposure and attitudes toward patient aggression and management. Data saturation was reached with 57 participants. Violence exposure was higher for technicians, nurses, and officers. Conflicting priorities and management challenges occurred due to four main interconnected elements: perceived complex patient motivations; a patient care paradox between professional duty and personal safety; discordant interprofessional dynamics mitigated by respect and trust; and logistical challenges impeding care delivery and long-term outcomes. Using a systems approach, five interconnected levels of ED agitated patient care delivery were identified: patient, staff, team, ED microsystem, and health care macrosystem. These care dimensions were synthesized to form a novel patient safety-based framework that can help guide future research, practice, and policy. Copyright © 2018 The Joint Commission. Published by Elsevier Inc. All rights reserved.
Integrated Modeling, Mapping, and Simulation (IMMS) Framework for Exercise and Response Planning
NASA Technical Reports Server (NTRS)
Mapar, Jalal; Hoette, Trisha; Mahrous, Karim; Pancerella, Carmen M.; Plantenga, Todd; Yang, Christine; Yang, Lynn; Hopmeier, Michael
2011-01-01
EmergenCy management personnel at federal, stale, and local levels can benefit from the increased situational awareness and operational efficiency afforded by simulation and modeling for emergency preparedness, including planning, training and exercises. To support this goal, the Department of Homeland Security's Science & Technology Directorate is funding the Integrated Modeling, Mapping, and Simulation (IMMS) program to create an integrating framework that brings together diverse models for use by the emergency response community. SUMMIT, one piece of the IMMS program, is the initial software framework that connects users such as emergency planners and exercise developers with modeling resources, bridging the gap in expertise and technical skills between these two communities. SUMMIT was recently deployed to support exercise planning for National Level Exercise 2010. Threat, casualty. infrastructure, and medical surge models were combined within SUMMIT to estimate health care resource requirements for the exercise ground truth.
Disease eradication and health systems development.
Melgaard, B.; Creese, A.; Aylward, B.; Olivé, J. M.; Maher, C.; Okwo-Bele, J. M.; Lee, J. W.
1998-01-01
This article provides a framework for the design of future eradication programmes so that the greatest benefit accrues to health systems development from the implementation of such programmes. The framework focuses on weak and fragile health systems and assumes that eradication leads to the cessation of the intervention required to eradicate the disease. Five major components of health systems are identified and key elements which are of particular relevance to eradication initiatives are defined. The dearth of documentation which can provide "lessons learned" in this area is illustrated with a brief review of the literature. Opportunities and threats, which can be addressed during the design of eradication programmes, are described and a number of recommendations are outlined. It is emphasized that this framework pertains to eradication programmes but may be useful in attempts to coordinate vertical and horizontal disease control activities for maximum mutual benefits. PMID:10063670
Renwick, Matthew J; Brogan, David M; Mossialos, Elias
2016-01-01
Despite the growing threat of antimicrobial resistance, pharmaceutical and biotechnology firms are reluctant to develop novel antibiotics because of a host of market failures. This problem is complicated by public health goals that demand antibiotic conservation and equitable patient access. Thus, an innovative incentive strategy is needed to encourage sustainable investment in antibiotics. This systematic review consolidates, classifies and critically assesses a total of 47 proposed incentives. Given the large number of possible strategies, a decision framework is presented to assist with the selection of incentives. This framework focuses on addressing market failures that result in limited investment, public health priorities regarding antibiotic stewardship and patient access, and implementation constraints and operational realities. The flexible nature of this framework allows policy makers to tailor an antibiotic incentive package that suits a country's health system structure and needs. PMID:26464014
A risk management approach to CAIS development
NASA Technical Reports Server (NTRS)
Hart, Hal; Kerner, Judy; Alden, Tony; Belz, Frank; Tadman, Frank
1986-01-01
The proposed DoD standard Common APSE Interface Set (CAIS) was developed as a framework set of interfaces that will support the transportability and interoperability of tools in the support environments of the future. While the current CAIS version is a promising start toward fulfilling those goals and current prototypes provide adequate testbeds for investigations in support of completing specifications for a full CAIS, there are many reasons why the proposed CAIS might fail to become a usable product and the foundation of next-generation (1990'S) project support environments such as NASA's Space Station software support environment. The most critical threats to the viability and acceptance of the CAIS include performance issues (especially in piggybacked implementations), transportability, and security requirements. To make the situation worse, the solution to some of these threats appears to be at conflict with the solutions to others.
I'm Still Me: Inspiration and Instruction from Individuals with Brain Cancer.
Piderman, Katherine M; Egginton, Jason S; Ingram, Cory; Dose, Ann Marie; Yoder, Timothy J; Lovejoy, Laura A; Swanson, Spence W; Hogg, James T; Lapid, Maria I; Jatoi, Aminah; Remtema, Megan S; Tata, Beba S; Breitkopf, Carmen Radecki
2017-01-01
Individuals with brain cancer face many challenges, including threats to cognition, personality, and sensory and motor functioning. These can alter one's sense of identity and result in despair. Chaplain-led spiritual interviews were conducted with 19 patients with brain cancer as part of a larger spiritual legacy intervention called "Hear My Voice." The majority was female (58%), married (68%) and had aggressive/advanced tumors (63%). Participants were 22-68 years of age and expressed the following religious affiliations: Protestant (42%), Catholic (21%), Muslim (5%), and none (32%). Framework analysis was applied to reduce and understand the interview data. Primary codes were relationships with: God or the spiritual, others, and self. Brain cancer was reported to deepen and enrich patients' commitment to these relationships. Struggle and grief were also revealed. Results suggest the continued vitality, growth and generativity of these participants and provide insight for chaplains and others on the medical team.
Lee, Bandy X; Kjaerulf, Finn; Turner, Shannon; Cohen, Larry; Donnelly, Peter D; Muggah, Robert; Davis, Rachel; Realini, Anna; Kieselbach, Berit; MacGregor, Lori Snyder; Waller, Irvin; Gordon, Rebecca; Moloney-Kitts, Michele; Lee, Grace; Gilligan, James
2016-09-01
The United Nations' 2030 Agenda for Sustainable Development recognizes violence as a threat to sustainability. To serve as a context, we provide an overview of the Sustainable Development Goals as they relate to violence prevention by including a summary of key documents informing violence prevention efforts by the World Health Organization (WHO) and Violence Prevention Alliance (VPA) partners. After consultation with the United Nations (UN) Inter-Agency Expert Group on Sustainable Development Goal Indicators (IAEG-SDG), we select specific targets and indicators, featuring them in a summary table. Using the diverse expertise of the authors, we assign attributes that characterize the focus and nature of these indicators. We hope that this will serve as a preliminary framework for understanding these accountability metrics. We include a brief analysis of the target indicators and how they relate to promising practices in violence prevention.
Ning, Jing; Chen, Yong; Piao, Jin
2017-07-01
Publication bias occurs when the published research results are systematically unrepresentative of the population of studies that have been conducted, and is a potential threat to meaningful meta-analysis. The Copas selection model provides a flexible framework for correcting estimates and offers considerable insight into the publication bias. However, maximizing the observed likelihood under the Copas selection model is challenging because the observed data contain very little information on the latent variable. In this article, we study a Copas-like selection model and propose an expectation-maximization (EM) algorithm for estimation based on the full likelihood. Empirical simulation studies show that the EM algorithm and its associated inferential procedure performs well and avoids the non-convergence problem when maximizing the observed likelihood. © The Author 2017. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Monnat, Shannon M
2010-01-01
This article investigates the individual and contextual roles of race on welfare sanctions: benefit cuts for failing to comply with work or other behavioral requirements under the Temporary Assistance for Needy Families program. Using six years of federal administrative data, I advance previous welfare research by providing a nationally representative analysis of participant-, county-, and state-level predictors of welfare sanctioning. Using theories of racial classification, racialized social systems, and racial threat as guiding frameworks, I find that black and Latina women are at a greater risk of being sanctioned than white women. Further, although odds of a sanction are slightly reduced for black women living in counties with greater percentages of blacks, the opposite holds for Latinas, who are at an increased risk of being sanctioned in counties with greater percentages of Latinos.
Informal Recyclers' Health Inequities in Vancouver, BC.
Wittmer, Josie; Parizeau, Kate
2018-01-01
We explore informal recyclers' perceptions and experiences of the social determinants of health in Vancouver, Canada, and investigate the factors that contribute to the environmental health inequities they experience. Based on in-depth interviews with 40 informal recyclers and 7 key informants, we used a social determinants of health framework to detail the health threats that informal recyclers associated with their work and the factors that influenced their access to health-related resources and services. Our analysis reveals that the structural factors influencing environmental health inequities included insufficient government resources for low-income urbanites; the potential for stigma, clientization, and discrimination at some health and social service providers; and the legal marginalization of informal recycling and associated activities. We conclude that Vancouver's informal recyclers experience inequitable access to health-related resources and services, and they are knowledgeable observers of the factors that influence their own health and well-being.
DE LUCIA, A.; PASTORE, V.; BRACCI LAUDIERO, L.; BUONISSIMO, I.; RICCI, G.
2016-01-01
SUMMARY Programmes for early childhood childhood hearing impairment identification allows to quickly start the appropriate hearing aid fitting and rehabilitation process; nevertheless, a large number of patients do not join the treatment program. The goal of this article is to present the results of a strategic review of the strengths, weaknesses, opportunities and threats connected with the audiologic/prosthetic/language follow-up process of children with bilateral permanent hearing impairment. Involving small children, the follow-up includes the involvement of specialised professionals of a multidisciplinary team and a complex and prolonged multi-faced management. Within the framework of the Italian Ministry of Health project CCM 2013 "Preventing Communication Disorders: a Regional Program for Early Identification, Intervention and Care of Hearing Impaired Children", the purpose of this analysis was to propose recommendations that can harmonise criteria for outcome evaluation and provide guidance on the most appropriate assessment methods to be used in the follow-up course of children with permanent hearing impairment. PMID:27054392
Hedger, Nicholas; Gray, Katie L H; Garner, Matthew; Adams, Wendy J
2016-09-01
Given capacity limits, only a subset of stimuli give rise to a conscious percept. Neurocognitive models suggest that humans have evolved mechanisms that operate without awareness and prioritize threatening stimuli over neutral stimuli in subsequent perception. In this meta-analysis, we review evidence for this 'standard hypothesis' emanating from 3 widely used, but rather different experimental paradigms that have been used to manipulate awareness. We found a small pooled threat-bias effect in the masked visual probe paradigm, a medium effect in the binocular rivalry paradigm and highly inconsistent effects in the breaking continuous flash suppression paradigm. Substantial heterogeneity was explained by the stimulus type: the only threat stimuli that were robustly prioritized across all 3 paradigms were fearful faces. Meta regression revealed that anxiety may modulate threat-biases, but only under specific presentation conditions. We also found that insufficiently rigorous awareness measures, inadequate control of response biases and low level confounds may undermine claims of genuine unconscious threat processing. Considering the data together, we suggest that uncritical acceptance of the standard hypothesis is premature: current behavioral evidence for threat-sensitive visual processing that operates without awareness is weak. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Motivational Basis of Personality Traits: A Meta-Analysis of Value-Personality Correlations.
Fischer, Ronald; Boer, Diana
2015-10-01
We investigated the relationships between personality traits and basic value dimensions. Furthermore, we developed novel country-level hypotheses predicting that contextual threat moderates value-personality trait relationships. We conducted a three-level v-known meta-analysis of correlations between Big Five traits and Schwartz's (1992) 10 values involving 9,935 participants from 14 countries. Variations in contextual threat (measured as resource threat, ecological threat, and restrictive social institutions) were used as country-level moderator variables. We found systematic relationships between Big Five traits and human values that varied across contexts. Overall, correlations between Openness traits and the Conservation value dimension and Agreeableness traits and the Transcendence value dimension were strongest across all samples. Correlations between values and all personality traits (except Extraversion) were weaker in contexts with greater financial, ecological, and social threats. In contrast, stronger personality-value links are typically found in contexts with low financial and ecological threats and more democratic institutions and permissive social context. These effects explained on average more than 10% of the variability in value-personality correlations. Our results provide strong support for systematic linkages between personality and broad value dimensions, but they also point out that these relations are shaped by contextual factors. © 2014 Wiley Periodicals, Inc.
The Bright Side of Threatened Narcissism: Improved Performance Following Ego Threat.
Nevicka, Barbora; Baas, Matthijs; Ten Velden, Femke S
2016-12-01
Narcissistic individuals have highly positive self-views and overestimate their abilities. Consequently, they tend to react aggressively whenever they receive information that does not match their high self-views (ego threat). We argue that focusing on aggression merely portrays a one-sided view of narcissistic individuals and the manner in which they counter ego threats. We propose that following ego threat, narcissism can also fuel performance. In four studies, we measured nonclinical narcissism and allocated Dutch undergraduate university students (N 1 = 175, N 2 = 142, N 3 = 159, N 4 = 174) to either an ego threat or a no ego threat condition. Ego threat involved negative feedback (Studies 1-2) or threat to uniqueness (Studies 3-4). We measured participants' intentions to complete a challenging task (Study 1), their creative performance (Studies 2-3), and their performance on an anagram task (Study 4). Across Studies 1-3, we consistently found that following ego threat, higher nonclinical narcissism was associated with greater willingness to perform tasks that enabled demonstration of abilities and enhanced creative performance. These results were confirmed using a meta-analysis. However, anagram performance was not enhanced following ego threat. We provide additional analyses that might help explain this. Our findings thus reveal a more positive side to the way narcissistic individuals manage threats to their self-image. © 2015 Wiley Periodicals, Inc.
NASA Astrophysics Data System (ADS)
Cui, Jia; Hong, Bei; Jiang, Xuepeng; Chen, Qinghua
2017-05-01
With the purpose of reinforcing correlation analysis of risk assessment threat factors, a dynamic assessment method of safety risks based on particle filtering is proposed, which takes threat analysis as the core. Based on the risk assessment standards, the method selects threat indicates, applies a particle filtering algorithm to calculate influencing weight of threat indications, and confirms information system risk levels by combining with state estimation theory. In order to improve the calculating efficiency of the particle filtering algorithm, the k-means cluster algorithm is introduced to the particle filtering algorithm. By clustering all particles, the author regards centroid as the representative to operate, so as to reduce calculated amount. The empirical experience indicates that the method can embody the relation of mutual dependence and influence in risk elements reasonably. Under the circumstance of limited information, it provides the scientific basis on fabricating a risk management control strategy.
Combined impacts of global changes on biodiversity across the USA
Bellard, C.; Leclerc, C.; Courchamp, F.
2015-01-01
Most studies of the effects of global changes on biodiversity focus on a single threat, but multiple threats lead to species extinction. We lack spatially explicit assessments of the intensity of multiple threats and their impacts on biodiversity. Here, we used a novel metric of cumulative threats and impacts to assess the consequences of multiple threats on 196 endemic species across the USA. We predict that large areas with high cumulative impact scores for amphibians, birds, mammals, and reptiles will be concentrated in the eastern part of the USA by the 2050 s and 2080 s. These high cumulative impact values are due mainly to the presence of invasive species, climate change, cropland and pasture areas; additionally, a significant proportion of endemic species are vulnerable to some of these threats where they occur. This analysis provides a useful means of identifying where conservation measures and monitoring programs that should consider multiple threats should be implemented in the future. PMID:26149694
Comparing the Climate Agendas of the Parties to the UN Framework Convention on Climate Change
NASA Astrophysics Data System (ADS)
Stephenson, S. R.; Oculi, N.
2016-12-01
Effective mitigation of and adaptation to climate change requires multilateral coordination of numerous political and scientific activities and priorities. Since its inception in 1992, the UN Framework Convention on Climate Change (UNFCCC) has sought a comprehensive international response to the climate threat, culminating most recently in December 2015 at COP 21. The Paris Agreement was lauded as a landmark step toward global climate action as it represented a consensus of 196 countries to limit global warming to 2° C above pre-industrial levels with an additional stated goal to "pursue efforts" to limit the increase to 1.5° C. However, taken in a vacuum, the global Agreement masks important differences among its signatory countries in capabilities and priorities for tackling climate change, and obscures pathways for place-specific scientific research and intervention. Here we present a quantitative content analysis of official UNFCCC documents including COP transcripts, meeting agendas, and mitigation commitments outlined in pledged Intended Nationally Determined Contributions (INDC) to reveal areas of alignment and divergence among UNFCCC stakeholders. Textual cluster analysis illustrates the relative salience of key climate-related discourses (e.g. vulnerability; loss and damage; decarbonization; technology transfer) in the agendas of negotiating parties, and the degree to which the interests of some parties are over- or under-represented in the final "consensus" agreement. Understanding these disparities, and their potential to promote cooperation and/or disagreement among stakeholders, will be critical to scientists' efforts to develop equitable and sustainable long-term climate solutions.
Two Years of International Cooperation on Conjunction Mitigation
NASA Astrophysics Data System (ADS)
Kelso, T. S.
2010-09-01
In an effort to mitigate the risks associated with satellite close approaches in the geostationary belt, several satellite operators came together in early 2008 to establish what is now known as the GEO Data Center. The GEO Data Center initially provided a framework for satellite operators to share orbital data for their fleets of satellites to be used to perform conjunction analysis and provide automated notification of close approaches via the SOCRATES-GEO system. After two years of operations, the GEO Data Center now has 14 members providing data for 186 satellites. Since the Iridium 33-Cosmos 2251 collision, a parallel system was set up with a LEO Data Center, which already has seven members providing data for 101 satellites. These data centers have already shown the significant benefit of sharing orbital data, particularly in terms of reducing positional uncertainty and, thereby, the number of false alarms. This paper will address the current framework for these efforts, highlighting how a service-oriented architecture is used to support orbital operations and increase efficiency of analysis and resolution of risk-mitigation tasks. It will show how the interactive work flow is used to quickly assess new maneuvers to determine whether they have successfully reduced the chances of a particular close approach without causing other close approaches elsewhere. It will also show how independent space situational awareness organizations can be employed to provide a more complete picture of the threat from nonparticipating satellites and the debris population.
Incorporating Social Determinants into a Groundwater Risk Framework
NASA Astrophysics Data System (ADS)
Simpson, M.; Allen, D. M.; Journeay, M.; Korteling, B.
2009-12-01
The remediation of polluted groundwater is often very costly, therefore water managers utilize various proactive measures, such as wellhead protection planning, to prevent contamination events. With limited available resources, it is essential to prioritize where these measures are introduced; systematic and integrated methodologies of assessing risk to groundwater can be utilized for this prioritization. To quantify the resistance of the physical system to pollution, Aquifer Vulnerability is commonly mapped for the area of interest. This information is useful for focusing monitoring efforts and identifying data gaps, but is a relative measure of contaminant risk. To more accurately assess the probability of contamination, an inventory of hazards can be integrated with intrinsic vulnerability of the physical system. This Threat indicator links land-use with chemicals and quantifies the risk based on the toxicity and environmental fate of these substances. Local knowledge of the quantity stored and likelihood of release can be utilized to further assess these threats. Both of these steps form part of an existing frameworks for assessing risk to groundwater. In this study, a groundwater risk framework is developed and tested in two study areas; Pender Island and the Lower Fraser Valley in British Columbia, Canada. Enhancements of a basic groundwater risk framework include not only incorporating points sources such as septic systems, landfills and fuel storage, but also various social determinants of risk. These social determinants include the Resistance of a community, which represents the planning and protection initiatives designed to safeguard the resource. These include items such as land-use planning that consider groundwater vulnerability and best management practices enforced by local governments. The ability to recover following an event is the Capacity of a community; indicators include the presence or absence of spill response plans, treatment systems or an alternative supply of water. The determinant of Loss quantifies the financial impact of this work. This indicator may be altered in future applications to include loss associated with human health and/or that stemming from a reduction in ecosystem health.
Neurocognitive inefficacy of the strategy process.
Klein, Harold E; D'Esposito, Mark
2007-11-01
The most widely used (and taught) protocols for strategic analysis-Strengths, Weaknesses, Opportunities, and Threats (SWOT) and Porter's (1980) Five Force Framework for industry analysis-have been found to be insufficient as stimuli for strategy creation or even as a basis for further strategy development. We approach this problem from a neurocognitive perspective. We see profound incompatibilities between the cognitive process-deductive reasoning-channeled into the collective mind of strategists within the formal planning process through its tools of strategic analysis (i.e., rational technologies) and the essentially inductive reasoning process actually needed to address ill-defined, complex strategic situations. Thus, strategic analysis protocols that may appear to be and, indeed, are entirely rational and logical are not interpretable as such at the neuronal substrate level where thinking takes place. The analytical structure (or propositional representation) of these tools results in a mental dead end, the phenomenon known in cognitive psychology as functional fixedness. The difficulty lies with the inability of the brain to make out meaningful (i.e., strategy-provoking) stimuli from the mental images (or depictive representations) generated by strategic analysis tools. We propose decreasing dependence on these tools and conducting further research employing brain imaging technology to explore complex data handling protocols with richer mental representation and greater potential for strategy creation.
Security threats categories in healthcare information systems.
Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini
2010-09-01
This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.
Ra: The Sun for Science and Humanity
NASA Technical Reports Server (NTRS)
1996-01-01
To guide the development of the Ra Strategic Framework, we defined scientific and applications objectives. For our primary areas of scientific interest, we choose the corona, the solar wind, the Sun's effect on the Earth, and solar theory and model development. For secondary areas of scientific interest, we selected sunspots, the solar constant, the Sun's gravitational field, helioseismology and the galactic cosmic rays. We stress the importance of stereoscopic imaging, observations at high spatial, spectral, and temporal resolutions, as well as of long duration measurements. Further exploration of the Sun's polar regions is also important, as shown already by the Ulysses mission. From an applications perspective, we adopted three broad objectives that would derive complementary inputs for the Strategic Framework. These were to identify and investigate: possible application spin-offs from science missions, possible solar-terrestrial missions dedicated to a particular application, and possible future applications that require technology development. The Sun can be viewed as both a source of resources and of threats. Our principal applications focus was that of threat mitigation, by examining ways to improve solar threat monitoring and early warning systems. We compared these objectives to the mission objectives of past, current, and planned international solar missions. Past missions (1962-1980) seem to have been focused on improvement of scientific knowledge, using multiple instrument spacecraft. A ten year gap followed this period, during which the results from previous missions were analyzed and solar study programmes were prepared in international organizations. Current missions (1990-1996) focus on particular topics such as the corona, solar flares, and coronal mass ejections. In planned missions, Sun/Earth interactions and environmental effects of solar activity are becoming more important. The corona is the centre of interest of almost all planned missions. It seems that no international long-term strategy has yet been adopted. For these plans the number of necessary future missions can be reduced and the onboard instrumentation can be optimized by performing a comparative analysis. The study of the corona must be done from different observing locations, orbits closer to the Sun, and by different means. The Cluster mission replacement is in progress; however, if the replacement is not implemented, the ISTP programme will fade after 1998. Furthermore, the physics of the Sun's interior should be emphasized more in the Mid- and Far-Term programmes. Finally, more emphasis should be placed on monitoring space weather and forecasting Sun/Earth interactions.
Evaluating and ranking the vulnerability of global marine ecosystems to anthropogenic threats.
Halpern, Benjamin S; Selkoe, Kimberly A; Micheli, Fiorenza; Kappel, Carrie V
2007-10-01
Marine ecosystems are threatened by a suite of anthropogenic stressors. Mitigating multiple threats is a daunting task, particularly when funding constraints limit the number of threats that can be addressed. Threats are typically assessed and prioritized via expert opinion workshops that often leave no record of the rationale for decisions, making it difficult to update recommendations with new information. We devised a transparent, repeatable, and modifiable method for collecting expert opinion that describes and documents how threats affect marine ecosystems. Experts were asked to assess the functional impact, scale, and frequency of a threat to an ecosystem; the resistance and recovery time of an ecosystem to a threat; and the certainty of these estimates. To quantify impacts of 38 distinct anthropogenic threats on 23 marine ecosystems, we surveyed 135 experts from 19 different countries. Survey results showed that all ecosystems are threatened by at least nine threats and that nine ecosystems are threatened by >90% of existing threats. The greatest threats (highest impact scores) were increasing sea temperature, demersal destructive fishing, and point-source organic pollution. Rocky reef, coral reef, hard-shelf, mangrove, and offshore epipelagic ecosystems were identified as the most threatened. These general results, however, may be partly influenced by the specific expertise and geography of respondents, and should be interpreted with caution. This approach to threat analysis can identify the greatest threats (globally or locally), most widespread threats, most (or least) sensitive ecosystems, most (or least) threatened ecosystems, and other metrics of conservation value. Additionally, it can be easily modified, updated as new data become available, and scaled to local or regional settings, which would facilitate informed and transparent conservation priority setting.
Mills, Joseph L; Conte, Michael S; Armstrong, David G; Pomposelli, Frank B; Schanzer, Andres; Sidawy, Anton N; Andros, George
2014-01-01
Critical limb ischemia, first defined in 1982, was intended to delineate a subgroup of patients with a threatened lower extremity primarily because of chronic ischemia. It was the intent of the original authors that patients with diabetes be excluded or analyzed separately. The Fontaine and Rutherford Systems have been used to classify risk of amputation and likelihood of benefit from revascularization by subcategorizing patients into two groups: ischemic rest pain and tissue loss. Due to demographic shifts over the last 40 years, especially a dramatic rise in the incidence of diabetes mellitus and rapidly expanding techniques of revascularization, it has become increasingly difficult to perform meaningful outcomes analysis for patients with threatened limbs using these existing classification systems. Particularly in patients with diabetes, limb threat is part of a broad disease spectrum. Perfusion is only one determinant of outcome; wound extent and the presence and severity of infection also greatly impact the threat to a limb. Therefore, the Society for Vascular Surgery Lower Extremity Guidelines Committee undertook the task of creating a new classification of the threatened lower extremity that reflects these important considerations. We term this new framework, the Society for Vascular Surgery Lower Extremity Threatened Limb Classification System. Risk stratification is based on three major factors that impact amputation risk and clinical management: Wound, Ischemia, and foot Infection (WIfI). The implementation of this classification system is intended to permit more meaningful analysis of outcomes for various forms of therapy in this challenging, but heterogeneous population. Copyright © 2014 Society for Vascular Surgery. Published by Mosby, Inc. All rights reserved.
The Danish health care system from a British perspective.
Hurst, Jeremy
2002-02-01
The organisation and financing of the Danish health care system was evaluated within a framework of a SWOT analysis (analysis of strengths, weakness, opportunities and threats) by a panel of five members with a background in health economics. The evaluation was based on reading an extensive amount of selected documents and literature on the Danish health care system, and a one-week visit to health care authorities, providers and key persons. The present paper includes the main findings by one of the panel members. The dominance of tax financing helps to achieve control over the level of health care expenditure, as well as securing equity in financing the services. The reliance on local government for financing and running health care has both advantages and disadvantages, and the split between county and municipal responsibility leads to problems of co-ordination. The remuneration of general practitioners by a mix of capitation payment and fee for services has the advantage of capping expenditure whilst leaving the GPs with an incentive to compete for patients by providing them with good services. The GP service is remarkably economical. The hospital sector displays much strength, but there seem to be problems with respect to: (i) perceived lack of resources and waiting lists; (ii) impersonal care, lack of continuity of care and failures in communication between patients and staff; (iii) management problems and sometimes demotivated staff. The relationship between patients and providers is facilitated by free access to GPs and absence of any charges for hospital treatment. The biggest threat is continuation of avoidable illness caused by poor health habits in the population. The biggest opportunity is to strengthen public health measures to tackle these poor health habits.
McLaughlin, Katie A.; Sheridan, Margaret A.; Alves, Sonia; Mendes, Wendy Berry
2014-01-01
OBJECTIVE Disruptions in stress response system development have been posited as mechanisms linking child maltreatment (CM) to psychopathology. Existing theories predict elevated sympathetic nervous system (SNS) reactivity following CM, but evidence for this is inconsistent. We present a novel framework for conceptualizing stress reactivity following CM using the biopsychosocial model of challenge and threat. We predicted that in the context of a social-evaluative stressor, maltreated adolescents would exhibit a threat pattern of reactivity, involving SNS activation paired with elevated vascular resistance and blunted cardiac output (CO) reactivity. METHODS A sample of 168 adolescents (mean age=14.9 years) participated. Recruitment targeted maltreated adolescents; 38.2% qualified as maltreated. Electrocardiogram, impedance cardiography, and blood pressure were acquired at rest and during an evaluated social stressor (Trier Social Stress Test). Pre-ejection period (PEP), CO, and total peripheral resistance (TPR) reactivity were computed during task preparation, speech-delivery, and verbal mental-arithmetic. Internalizing and externalizing symptoms were assessed. RESULTS Maltreatment was unrelated to PEP reactivity during preparation or speech, but maltreated adolescents had reduced PEP reactivity during math. Maltreatment exposure (F(1,145)=3.8-9.4, p=.053-<.001) and severity (β=−.10-.12, p=.030-.007) were associated with significantly reduced CO reactivity during all components of the stress-task and marginally associated with elevated TPR reactivity (F(1,145)=3.8-9.4, p=.053-<.001; β=.07-.11, p=.11-.009, respectively). Threat reactivity was negatively associated with externalizing symptoms. CONCLUSIONS Child maltreatment is associated with a dysregulated pattern of physiological reactivity consistent with theoretical conceptualizations of threat but not previously examined in relation to maltreatment, suggesting a more nuanced pattern of stress reactivity than predicted by current theoretical models. PMID:25170753
A Framework for Drought Risk Management
NASA Astrophysics Data System (ADS)
Apurv, T.; Cai, X.
2016-12-01
Drought is one of the most expensive natural disasters as it affects many sectors of the economy. The threat posed by droughts is expected to further increase due to increasing water demands fuelled by increasing population and also due to climate change in many regions. Management of the increasing drought risk requires shift from traditional crisis management approaches to long term strategic planning for reduction of drought risk. This study proposes a framework for management of long term drought risk. The framework uses the system based approach proposed by Tsakiris et al. (2013), in which a watershed is considered as a system and different water sources in the watershed (like groundwater, reservoirs, streams etc.) are considered as subsystems associated with certain water requirements of different sectors. Droughts are defined separately for each subsystem considering water availability and requirement. The percentile based drought indicator framework proposed by Steinemann et al. (2015) is used for defining drought for each subsystem, allowing the selection of thresholds, variables of interest, and time scale which are most relevant for stakeholders dependent on a particular subsystem. Future drought risk under different drought management strategies are assessed using hydrologic models that model both hydrologic and human components of a watershed. The robustness of a management strategy is assessed by simulating system response across a wide range of stochastically generated future climate scenarios. The framework is useful for operational drought management as it allows direct management of drought risks with consideration of different water sources and water users. Steinemann, A., Iacobellis, S.F., Cayan, D.R., (2015) "Developing and evaluating drought indicators for decision-making" J. Hydrometeor. 16 (4), 1793-1803 Tsakiris, G, Nalbantis, I, Vangelis, H, Verbeiren, B, Huysmans, M, Tychon, B, Jacquemin, I, Canters, F, Vanderhaegen, S, Engelen, G, Poelmans, L, De Becker, P, Batelaan, O, (2013) "A system-based paradigm of drought analysis for operational management" Water Resour Manag 27(15):5281-5297
Thomas E. Ingersoll; Brent J. Sewall; Sybill K. Amelon
2013-01-01
Bats are diverse and ecologically important, but are also subject to a suite of severe threats. Evidence for localized bat mortality from these threats is well-documented in some cases, but long-term changes in regional populations of bats remain poorly understood. Bat hibernation surveys provide an opportunity to improve understanding, but analysis is complicated by...
A Study of BYOD adoption from the lens of threat and coping appraisal of its security policy
NASA Astrophysics Data System (ADS)
Cho, Vincent; Ip, W. H.
2018-07-01
Why would employees adopt bring your own device (BYOD)? Would employees feel risk-taking to perform their work by using their own devices? Would peer pressure and company policy help encourage their employees to BYOD and how? Using the Technology Threat Avoidance Theory (TTAT), we hypothesize the intention of adopting BYOD is due to the accessing of security policy by threat and coping appraisal. Moreover, we predict perceived usefulness, perceived ease of use, social influence, organizational commitment and job security are essential for formulating the adoption intention. In this study, 450 random employees were surveyed on their adoption perception of BYOD in their respective companies. The results support most of our hypotheses. We uncover perceived cost and privacy protection within the TTAT framework reflect no significance while organizational commitment and job security posit the strongest influences on employees' BYOD adoption intention. This finding suggested that in order to roll out a successful and sustainable adoption intention on BYOD, organizations must consider measurements to build up employees' job security as well as generate a strong sense of organization commitment. Specifically, our analyses show adoption intention is also affected by gender, age, and education level.
Dhabhar, Firdaus S
2018-03-26
Our group has proposed that in contrast to chronic stress that can have harmful effects, the short-term (fight-or-flight) stress response (lasting for minutes to hours) is nature's fundamental survival mechanism that enhances protection and performance under conditions involving threat/challenge/opportunity. Short-term stress enhances innate/primary, adaptive/secondary, vaccine-induced, and anti-tumor immune responses, and post-surgical recovery. Mechanisms and mediators include stress hormones, dendritic cell, neutrophil, macrophage, and lymphocyte trafficking/function and local/systemic chemokine and cytokine production. Short-term stress may also enhance mental/cognitive and physical performance through effects on brain, musculo-skeletal, and cardiovascular function, reappraisal of threat/anxiety, and training-induced stress-optimization. Therefore, short-term stress psychology/physiology could be harnessed to enhance immuno-protection, as well as mental and physical performance. This review aims to provide a conceptual framework and targets for further investigation of mechanisms and conditions under which the protective/adaptive aspects of short-term stress/exercise can be optimized/harnessed, and for developing pharmacological/biobehavioral interventions to enhance health/healing, and mental/cognitive/physical performance. Copyright © 2018 Elsevier Inc. All rights reserved.
Using Swarming Agents for Scalable Security in Large Network Environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crouse, Michael; White, Jacob L.; Fulp, Errin W.
2011-09-23
The difficulty of securing computer infrastructures increases as they grow in size and complexity. Network-based security solutions such as IDS and firewalls cannot scale because of exponentially increasing computational costs inherent in detecting the rapidly growing number of threat signatures. Hostbased solutions like virus scanners and IDS suffer similar issues, and these are compounded when enterprises try to monitor these in a centralized manner. Swarm-based autonomous agent systems like digital ants and artificial immune systems can provide a scalable security solution for large network environments. The digital ants approach offers a biologically inspired design where each ant in the virtualmore » colony can detect atoms of evidence that may help identify a possible threat. By assembling the atomic evidences from different ant types the colony may detect the threat. This decentralized approach can require, on average, fewer computational resources than traditional centralized solutions; however there are limits to its scalability. This paper describes how dividing a large infrastructure into smaller managed enclaves allows the digital ant framework to effectively operate in larger environments. Experimental results will show that using smaller enclaves allows for more consistent distribution of agents and results in faster response times.« less
Stochastic model for threat assessment in multi-sensor defense system
NASA Astrophysics Data System (ADS)
Wang, Yongcheng; Wang, Hongfei; Jiang, Changsheng
2007-11-01
This paper puts forward a stochastic model for target detecting and tracking in multi-sensor defense systems and applies the Lanchester differential equations to threat assessment in combat. The two different modes of targets tracking and their respective Lanchester differential equations are analyzed and established. By use of these equations, we could briefly estimate the loss of each combat side and accordingly get the threat estimation results, given the situation analysis is accomplished.
Cyber Security: Critical Infrastructure Controls Assessment Framework
2011-05-01
the threats to and 3 • Patch and configuration management • Vulnerability and incident t 2 vulnerabilities • Recommendations to reduce 4 managemen 5... Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other...unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Purpose P id i t hrov e an overv ew on assessmen
2014-09-01
prophecies and statements contained in the King James Version of the Bible were applicable to current events and could be deciphered to predict the...Davidians maintained SDA traditions of being distrustful of both governmental authority and secularism while promoting a Bible -centric lifestyle.66 The group...extent possible. Through their unique religious practices, devotion to Bible study, and special diet, members maintained a regimented lifestyle that
Cognitive-emotional decision making (CEDM): a framework of patient medical decision making.
Power, Tara E; Swartzman, Leora C; Robinson, John W
2011-05-01
Assistance for patients faced with medical decisions has largely focussed on the clarification of information and personal values. Our aim is to draw on the decision research describing the role of emotion in combination with health behaviour models to provide a framework for conceptualizing patient decisions. A review of the psychological and medical decision making literature concerned with the role of emotion/affect in decision making and health behaviours. Emotion plays an influential role in decision making. Both current and anticipated emotions play a motivational role in choice. Amalgamating these findings with that of Leventhal's (1970) SRM provide a framework for thinking about the influence of emotion on a patient medical decision. Our framework suggests that a patient must cope with four sets of elements. The first two relate to the need to manage the cognitive and emotional aspects of the health threat. The second set relate to the management of the cognitive and emotional elements of the decision, itself. The framework provides a way for practitioners and researchers to frame thinking about a patient medical decision in order to assist the patient in clarifying decisional priorities. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Evaluation of the organization and financing of the Danish health care system.
Janssen, Richard
2002-02-01
The organization and financing of the Danish health care system was evaluated within a framework of a SWOT analysis (analysis of strengths, weaknesses, opportunities and threats) by a panel of five members with a background in health economics. The evaluation was based on the reading of an extensive range of documents and literature on the Danish health care system, and a 1-week visit to health care authorities, providers and key persons. The present paper describes the main findings of one of the panel members. A quality assessment approach is combined with the principles of a SWOT analysis to assess the main features of the Danish health care system. In addition, a public health perspective has been used in judging the coherence of the subsystems of the health systems. It is concluded that the macro-efficiency of the health care system could be increased by improving the cooperation between the subsystems. The relatively high mortality rates suggest that greater input into health education programs could significantly improve the health status of the Danish population. Finally, it is suggested that the steering power of the public board be strengthened by transferring ownership of health care institutions to other hands (privatization).
Ebenso, Bassey; Ayuba, Mainas
2010-06-01
This paper proposes a mechanism by which socio-economic rehabilitation (SER) reduces stigma in northern Nigeria following are-analysis of the transcripts of interviews conducted to evaluate the impact of SER on leprosy-related stigma. The evaluation combined quantitative questionnaire (P-scale) with qualitative interviews of 20 individuals affected by leprosy, five focus group discussions and 10 key informant interviews. From our data, we developed a leprosy-related stigma framework by integrating emerging themes with the construct of threat to group functioning to describe stigma processes experienced by people affected by leprosy in northern Nigeria. Findings revealed people affected by leprosy are less likely to be stigmatised because of leprosy impairments than for their incapacity to contribute to family/community finances. We also identified micro-credit loans and vocational training as elements of SER for reducing stigma through the mechanism of protecting individuals against the loss of social value, and by facilitating their continued engagement in daily social roles in the family/community. We propose that SER stimulates attitudinal change towards, and inclusion of people affected by leprosy by protecting individuals against the loss of social value and increasing their contributive capacity. We recommend further empirical testing of the proposed framework to ascertain its utility in other cultures.
Quantifying Anthropogenic Stress on Groundwater Resources.
Ashraf, Batool; AghaKouchak, Amir; Alizadeh, Amin; Mousavi Baygi, Mohammad; R Moftakhari, Hamed; Mirchi, Ali; Anjileli, Hassan; Madani, Kaveh
2017-10-10
This study explores a general framework for quantifying anthropogenic influences on groundwater budget based on normalized human outflow (h out ) and inflow (h in ). The framework is useful for sustainability assessment of groundwater systems and allows investigating the effects of different human water abstraction scenarios on the overall aquifer regime (e.g., depleted, natural flow-dominated, and human flow-dominated). We apply this approach to selected regions in the USA, Germany and Iran to evaluate the current aquifer regime. We subsequently present two scenarios of changes in human water withdrawals and return flow to the system (individually and combined). Results show that approximately one-third of the selected aquifers in the USA, and half of the selected aquifers in Iran are dominated by human activities, while the selected aquifers in Germany are natural flow-dominated. The scenario analysis results also show that reduced human withdrawals could help with regime change in some aquifers. For instance, in two of the selected USA aquifers, a decrease in anthropogenic influences by ~20% may change the condition of depleted regime to natural flow-dominated regime. We specifically highlight a trending threat to the sustainability of groundwater in northwest Iran and California, and the need for more careful assessment and monitoring practices as well as strict regulations to mitigate the negative impacts of groundwater overexploitation.
Osemek, Paweł; Kocik, Janusz; Paśnik, Krzysztof
2009-12-01
This article provides a short review about trends of developing current syndromic surveillance systems. To improve methods of early detection of natural or bioterrorism-related outbreaks, it has to be established a new way of epidemiological thinking, which uses innovative real-time surveillance systems. Syndromic surveillance has been created for an early detection, to monitor the temporo-spatial spread of an outbreak, and to provide prompt data for immediate analysis and feedback to public health authorities. It supports timely decision making process for countermeasure procedures. Framework of syndromic surveillance system requires a proper electronic infrastructure to be build up. Optimal syndrome definitions and data sources for continuing specific diseases outbreak surveillance have not been determined so far. Systems of interest might enhance collaboration among clinical providers, primary care providers, emergency services, information-systems professionals and public health agencies. However economic scope of this undertakings effectively limits ability to implement it in Polish public health service right now. Besides, syndromic surveillance cannot replace traditional public health surveillance with a post-factum epidemiological investigation and laboratory analysis. It can be a useful supplement.
The use of data mining by private health insurance companies and customers' privacy.
Al-Saggaf, Yeslam
2015-07-01
This article examines privacy threats arising from the use of data mining by private Australian health insurance companies. Qualitative interviews were conducted with key experts, and Australian governmental and nongovernmental websites relevant to private health insurance were searched. Using Rationale, a critical thinking tool, the themes and considerations elicited through this empirical approach were developed into an argument about the use of data mining by private health insurance companies. The argument is followed by an ethical analysis guided by classical philosophical theories-utilitarianism, Mill's harm principle, Kant's deontological theory, and Helen Nissenbaum's contextual integrity framework. Both the argument and the ethical analysis find the use of data mining by private health insurance companies in Australia to be unethical. Although private health insurance companies in Australia cannot use data mining for risk rating to cherry-pick customers and cannot use customers' personal information for unintended purposes, this article nonetheless concludes that the secondary use of customers' personal information and the absence of customers' consent still suggest that the use of data mining by private health insurance companies is wrong.
A data protection scheme for a remote vital signs monitoring healthcare service.
Gritzalis, D; Lambrinoudakis, C
2000-01-01
Personal and medical data processed by Healthcare Information Systems must be protected against unauthorized access, modification and withholding. Security measures should be selected to provide the required level of protection in a cost-efficient manner. This is only feasible if specific characteristics of the information system are examined on a basis of a risk analysis methodology. This paper presents the results of a risk analysis, based on the CRAMM methodology, for a healthcare organization offering a patient home-monitoring service through the transmission of vital signs, focusing on the identified security needs and the proposed countermeasures. The architectural and functional models of this service were utilized for identifying and valuating the system assets, the associated threats and vulnerabilities, as well as for assessing the impact on the patients and on the service provider, should the security of any of these assets is affected. A set of adequate organizational, administrative and technical countermeasures is described for the remote vital signs monitoring service, thus providing the healthcare organization with a data protection framework that can be utilized for the development of its own security plan.
Shamai, Michal
2003-10-01
This article describes and analyzes an intervention program with social workers living and working in a situation of uncertainty created by political violence such as war and terrorism. The author used a social constructionist perspective as a theoretical framework, emphasizing the effect of the social and political context in constructing the experience and a recognition of the personal and professional knowledge acquired in the daily experience. The author used qualitative methods to evaluate the process and outcome. The narrative-holistic analysis focused on reconstructing meaning and adapting it to the new situation, the main thrust of the program. From the thematic analysis four main themes emerged: (1) loss as a result of political violence; (2) meaning of strength and weakness in situations of political violence; (3) preparation for terrorist attacks; and (4) definition of a safe place. The outcome evaluation describes the meaning of this kind of training program to the participants. The specific context of the training program is discussed as well as possibilities of using it in different contexts.
Methodology for national risk analysis and prioritization of toxic industrial chemicals.
Taxell, Piia; Engström, Kerstin; Tuovila, Juha; Söderström, Martin; Kiljunen, Harri; Vanninen, Paula; Santonen, Tiina
2013-01-01
The identification of chemicals that pose the greatest threat to human health from incidental releases is a cornerstone in public health preparedness for chemical threats. The present study developed and applied a methodology for the risk analysis and prioritization of industrial chemicals to identify the most significant chemicals that pose a threat to public health in Finland. The prioritization criteria included acute and chronic health hazards, physicochemical and environmental hazards, national production and use quantities, the physicochemical properties of the substances, and the history of substance-related incidents. The presented methodology enabled a systematic review and prioritization of industrial chemicals for the purpose of national public health preparedness for chemical incidents.
Using computer simulations to facilitate conceptual understanding of electromagnetic induction
NASA Astrophysics Data System (ADS)
Lee, Yu-Fen
This study investigated the use of computer simulations to facilitate conceptual understanding in physics. The use of computer simulations in the present study was grounded in a conceptual framework drawn from findings related to the use of computer simulations in physics education. To achieve the goal of effective utilization of computers for physics education, I first reviewed studies pertaining to computer simulations in physics education categorized by three different learning frameworks and studies comparing the effects of different simulation environments. My intent was to identify the learning context and factors for successful use of computer simulations in past studies and to learn from the studies which did not obtain a significant result. Based on the analysis of reviewed literature, I proposed effective approaches to integrate computer simulations in physics education. These approaches are consistent with well established education principles such as those suggested by How People Learn (Bransford, Brown, Cocking, Donovan, & Pellegrino, 2000). The research based approaches to integrated computer simulations in physics education form a learning framework called Concept Learning with Computer Simulations (CLCS) in the current study. The second component of this study was to examine the CLCS learning framework empirically. The participants were recruited from a public high school in Beijing, China. All participating students were randomly assigned to two groups, the experimental (CLCS) group and the control (TRAD) group. Research based computer simulations developed by the physics education research group at University of Colorado at Boulder were used to tackle common conceptual difficulties in learning electromagnetic induction. While interacting with computer simulations, CLCS students were asked to answer reflective questions designed to stimulate qualitative reasoning and explanation. After receiving model reasoning online, students were asked to submit their revised answers electronically. Students in the TRAD group were not granted access to the CLCS material and followed their normal classroom routine. At the end of the study, both the CLCS and TRAD students took a post-test. Questions on the post-test were divided into "what" questions, "how" questions, and an open response question. Analysis of students' post-test performance showed mixed results. While the TRAD students scored higher on the "what" questions, the CLCS students scored higher on the "how" questions and the one open response questions. This result suggested that more TRAD students knew what kinds of conditions may or may not cause electromagnetic induction without understanding how electromagnetic induction works. Analysis of the CLCS students' learning also suggested that frequent disruption and technical trouble might pose threats to the effectiveness of the CLCS learning framework. Despite the mixed results of students' post-test performance, the CLCS learning framework revealed some limitations to promote conceptual understanding in physics. Improvement can be made by providing students with background knowledge necessary to understand model reasoning and incorporating the CLCS learning framework with other learning frameworks to promote integration of various physics concepts. In addition, the reflective questions in the CLCS learning framework may be refined to better address students' difficulties. Limitations of the study, as well as suggestions for future research, are also presented in this study.
Cumulative risk assessment for combined health effects from chemical and nonchemical stressors.
Sexton, Ken; Linder, Stephen H
2011-12-01
Cumulative risk assessment is a science policy tool for organizing and analyzing information to examine, characterize, and possibly quantify combined threats from multiple environmental stressors. We briefly survey the state of the art regarding cumulative risk assessment, emphasizing challenges and complexities of moving beyond the current focus on chemical mixtures to incorporate nonchemical stressors, such as poverty and discrimination, into the assessment paradigm. Theoretical frameworks for integrating nonchemical stressors into cumulative risk assessments are discussed, the impact of geospatial issues on interpreting results of statistical analyses is described, and four assessment methods are used to illustrate the diversity of current approaches. Prospects for future progress depend on adequate research support as well as development and verification of appropriate analytic frameworks.
Cumulative Risk Assessment for Combined Health Effects From Chemical and Nonchemical Stressors
Linder, Stephen H.
2011-01-01
Cumulative risk assessment is a science policy tool for organizing and analyzing information to examine, characterize, and possibly quantify combined threats from multiple environmental stressors. We briefly survey the state of the art regarding cumulative risk assessment, emphasizing challenges and complexities of moving beyond the current focus on chemical mixtures to incorporate nonchemical stressors, such as poverty and discrimination, into the assessment paradigm. Theoretical frameworks for integrating nonchemical stressors into cumulative risk assessments are discussed, the impact of geospatial issues on interpreting results of statistical analyses is described, and four assessment methods are used to illustrate the diversity of current approaches. Prospects for future progress depend on adequate research support as well as development and verification of appropriate analytic frameworks. PMID:21551386
Conceptual framework for drought phenotyping during molecular breeding.
Salekdeh, Ghasem Hosseini; Reynolds, Matthew; Bennett, John; Boyer, John
2009-09-01
Drought is a major threat to agricultural production and drought tolerance is a prime target for molecular approaches to crop improvement. To achieve meaningful results, these approaches must be linked with suitable phenotyping protocols at all stages, such as the screening of germplasm collections, mutant libraries, mapping populations, transgenic lines and breeding materials and the design of OMICS and quantitative trait loci (QTLs) experiments. Here we present a conceptual framework for molecular breeding for drought tolerance based on the Passioura equation of expressing yield as the product of water use (WU), water use efficiency (WUE) and harvest index (HI). We identify phenotyping protocols that address each of these factors, describe their key features and illustrate their integration with different molecular approaches.
Buehler, James W; Hopkins, Richard S; Overhage, J Marc; Sosin, Daniel M; Tong, Van
2004-05-07
The threat of terrorism and high-profile disease outbreaks has drawn attention to public health surveillance systems for early detection of outbreaks. State and local health departments are enhancing existing surveillance systems and developing new systems to better detect outbreaks through public health surveillance. However, information is limited about the usefulness of surveillance systems for outbreak detection or the best ways to support this function. This report supplements previous guidelines for evaluating public health surveillance systems. Use of this framework is intended to improve decision-making regarding the implementation of surveillance for outbreak detection. Use of a standardized evaluation methodology, including description of system design and operation, also will enhance the exchange of information regarding methods to improve early detection of outbreaks. The framework directs particular attention to the measurement of timeliness and validity for outbreak detection. The evaluation framework is designed to support assessment and description of all surveillance approaches to early detection, whether through traditional disease reporting, specialized analytic routines for aberration detection, or surveillance using early indicators of disease outbreaks, such as syndromic surveillance.
Interim Consequence Management Guidance for a Wide-Area Biological Attack
DOE Office of Scientific and Technical Information (OSTI.GOV)
Raber, Ellen; Kirvel, Robert; MacQueen, Don
2011-05-17
The Interagency Biological Restoration Demonstration (IBRD) program is a collaborative, interagency effort co-chaired by the Department of Homeland Security and Department of Defense aimed at improving the nation‘s ability to respond to and recover from a large-scale, wide-area, domestic attack involving the release of an environmentally persistent biological warfare agent. The program is focused on understanding interactions between the civilian and military sectors, and in building mutual support to carry out such remediations. This Interim Consequence Management Guidance document provides guidance for decisionmakers in executing activities required to respond to and recover from a biological incident affecting a wide urbanmore » area insofar as information is currently available. The spore-forming bacterium Bacillus anthracis is discussed as the biological agent of primary concern because it is the most difficult of known bioterrorism agents to inactivate and is considered to be one of the key threat agents. Most other biological threat agents are much easier to remediate, and in many cases, inactivation would occur naturally within days as a result of environmental exposure; however, the framework and operational questions that need to be addressed are expected to remain the same. The guidance in this document is applicable to (1) enclosed facilities, such as commercial, residential, and continental U.S. military facilities; (2) semi-enclosed facilities, such as subways and public transit facilities; (3) outdoor areas (both localized and wide area), such as building exteriors, streets, parks, and other open spaces; (4) drinking water facilities; and (5) drinking water sources. This document follows an interagency framework [Planning Guidance for Recovery Following Biological Incidents (DHS and EPA 2009)]—which considered Raber et al. (2002) in its development—but takes the framework to a more operational level and provides guidance at key action and decision points.« less
The main concern of burn survivors in Iran
Zamanzadeh, Vahid; Valizadeh, Lila; Lotfi, Mojgan; Salehi, Feridoon; Khalili, Assef
2016-01-01
Background: The present work was conducted to study the burn patients’ experiences to get an insight into their main concerns when they suffer the tragic event, recover from it, and adjust back in the society, so that better rehabilitation programs can be planned corresponding to their needs as well as to the needs of the society and the existing situations. Materials and Methods: In this qualitative study, 17 burn survivors were enrolled. Unstructured interviews were used for data collection. All the interviews were recorded, transcribed, and analyzed using qualitative content analysis method. Results: Based on the existing elements of the explicit textual meanings, two categories of threat and disturbance were formed. The category of threat was extracted from the following five subcategories: (a) Threat to physical life; (b) threat to the process of living; (c) psychological threat; (d) spiritual threat; and (e) social threat. The category of disturbance was extracted from the following three subcategories: (a) Sensory disturbance: Suffering pain; (b) self-concept disturbance; and (c) behavioral disturbance. Conclusions: Burn survivors experience severe pain, enduring and suffering in their daily activities after burn. Passing through these difficult trajectories is perceived as a threat and disturbance in self-integrity. PMID:27563326
The Effect of Stereotype Threat on Performance of a Rhythmic Motor Skill
Huber, Meghan E.; Seitchik, Allison E.; Brown, Adam J.; Sternad, Dagmar; Harkins, Stephen G.
2015-01-01
Many studies using cognitive tasks have found that stereotype threat, or concern about confirming a negative stereotype about one's group, debilitates performance. The few studies that documented similar effects on sensorimotor performance have used only relatively coarse measures to quantify performance. Three experiments tested the effect of stereotype threat on a rhythmic ball bouncing task, both at the novice and skilled level. Previous analysis of the task dynamics afforded more detailed quantification of the effect of threat on motor control. In this task, novices hit the ball with positive racket acceleration, indicative of unstable performance. With practice, they learn to stabilize error by changing their ball-racket impact from positive to negative acceleration. Results showed that for novices, stereotype threat potentiated hitting the ball with positive racket acceleration, leading to poorer performance of stigmatized females. However, when the threat manipulation was delivered after having acquired some skill, reflected by negative racket acceleration, the stigmatized females performed better. These findings are consistent with the mere effort account that argues that stereotype threat potentiates the most likely response on the given task. The study also demonstrates the value of identifying the control mechanisms through which stereotype threat has its effects on outcome measures. PMID:25706769
Douglas P. Peterson; Bruce E. Reiman; Jason B. Dunham; Kurt D. Fausch; Michael K. Young
2008-01-01
Native salmonid fishes often face simultaneous threats from habitat fragmentation and invasion by nonnative trout species. Unfortunately, management actions to address one may create or exacerbate the other. A consistent decision process would include a systematic analysis of when and where intentional use or removal of barriers is the most appropriate action. We...
Analysis of CSIRT/SOC Incidents and Continuous Monitoring of Threats
NASA Technical Reports Server (NTRS)
Wang, John; Ishisoko, Katsutoshi C.
2012-01-01
Security Operations Centers (SOC) contain a wealth of data which, if properly classified and tagged upfront, can yield a wealth of real-time information about your organizations IT Security posture, risks, and threats. These include answers to relevant and actionable questions such as: What are our biggest threats? Who is attacking us and what do they want? What controls are working or not working? How effective was the new technology we just implemented? What is our ROI?
Space Station Program threat and vulnerability analysis
NASA Technical Reports Server (NTRS)
Van Meter, Steven D.; Veatch, John D.
1987-01-01
An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.
RESPONDING TO THREATS AND INCIDENTS OF INTENTIONAL DRINKING WATER CONTAMINATION
All drinking water systems have some degree of vulnerability to contamination, and analysis shows that it is possible to contaminate drinking water at levels causing varying degrees of harm. Furthermore, experience indicates that the threat of contamination, overt or circumstant...