Common Sense Guide to Mitigating Insider Threats 4th Edition
2012-12-01
annual refresher training for all employees mandatory. Refresher training needs to cover all facets of your organization, not just information...some type of refresher training that may or may not directly relate to cyber threats. Some ideas for insider threat topics that could be incorporated...provided to users before using a system and through annual refreshers . Organizations should consult legal counsel before implementing any monitoring
Cornell, Dewey; Maeng, Jennifer L; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick
2018-06-01
Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat assessment teams distinguish serious from nonserious threats. The sample consisted of 1,865 threat assessment cases reported by 785 elementary, middle, and high schools. Students ranged from pre-K to Grade 12, including 74.4% male, 34.6% receiving special education services, 51.2% White, 30.2% Black, 6.8% Hispanic, and 2.7% Asian. Survey data were collected from school-based teams to measure student demographics, threat characteristics, and assessment results. Logistic regression indicated that threat assessment teams were more likely to identify a threat as serious if it was made by a student above the elementary grades (odds ratio 0.57; 95% lower and upper bound 0.42-0.78), a student receiving special education services (1.27; 1.00-1.60), involved battery (1.61; 1.20-2.15), homicide (1.40; 1.07-1.82), or weapon possession (4.41; 2.80-6.96), or targeted an administrator (3.55; 1.73-7.30). Student race and gender were not significantly associated with a serious threat determination. The odds ratio that a student would attempt to carry out a threat classified as serious was 12.48 (5.15-30.22). These results provide new information on the nature and prevalence of threats in schools using threat assessment that can guide further work to develop this emerging school safety practice. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
ERIC Educational Resources Information Center
Newman, Graeme R.
2005-01-01
This guide addresses the problem of bomb threats in schools, public or private, kindergarten through 12th grade. Colleges and universities are excluded because they generally differ from schools. The guide reviews the factors that increase the risk of bomb threats in schools and then identifies a series of questions that might assist departments…
ERIC Educational Resources Information Center
Ager, Alastair; Blake, Courtney; Stark, Lindsay; Daniel, Tsufit
2011-01-01
Objectives: The paper reviews the experiences of conducting child protection assessments across four humanitarian emergencies where violence and insecurity, directly or indirectly, posed a major threat to children. We seek to identify common themes emerging from these experiences and propose ways to guide the planning and implementation of…
Sensor-guided threat countermeasure system
Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.
2012-12-25
A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.
Threat captures attention but does not affect learning of contextual regularities.
Yamaguchi, Motonori; Harwood, Sarah L
2017-04-01
Some of the stimulus features that guide visual attention are abstract properties of objects such as potential threat to one's survival, whereas others are complex configurations such as visual contexts that are learned through past experiences. The present study investigated the two functions that guide visual attention, threat detection and learning of contextual regularities, in visual search. Search arrays contained images of threat and non-threat objects, and their locations were fixed on some trials but random on other trials. Although they were irrelevant to the visual search task, threat objects facilitated attention capture and impaired attention disengagement. Search time improved for fixed configurations more than for random configurations, reflecting learning of visual contexts. Nevertheless, threat detection had little influence on learning of the contextual regularities. The results suggest that factors guiding visual attention are different from factors that influence learning to guide visual attention.
Systematic planning of disconnection to enhance conservation success in a modified world.
Hermoso, Virgilio; Januchowski-Hartley, Stephanie R; Linke, Simon
2015-12-01
Maintaining spatial-temporal connectivity for conservation is necessary to allow the persistence of ecological processes and the biodiversity they sustain. However, conservation practice in human-modified environments can also benefit from prescribed disconnection through the implementation of barriers. Barriers, such as fences or dams, and buffer zones can be a cost-effective way of addressing threats caused by a globally connected world, such as the propagation of invasive species and diseases, creating refuge areas for native biodiversity and helping reduce economic losses caused by native wildlife or invasive species. Despite the global attention that disconnection has received, no clear framework exists to guide the allocation of barriers for conservation management. Here we propose that the implementation of barriers for conservation should be systematically planned, considering ecological trade-offs for multiple species (easing threats vs. interruption of ecosystem processes) and socio-economic cost-benefits (implementation cost vs. reduced human-wildlife conflicts), rather than using ad-hoc opportunistic criteria or accommodating conservation needs for individual species. Such a systematic approach is necessary to ensure both socially acceptable and ecologically effective use of disconnections as a conservation tool and ideally planned across different realms so co-benefits or trade-offs can be accounted for. However, any implementation of disconnection for conservation should be cautiously considered if uncertainty in effectiveness of the barrier and ecological impacts to other species are high. We also suggest the need for improved approaches to monitoring to learn from previous successes and failures. Our recommendations should guide the systematic evaluation and allocation of barriers to help enhance the value of this conservation tool in the face of increasing propagation of threats worldwide. However, new tools and collaborative frameworks across different realms are needed to help stakeholders make better informed decision. Copyright © 2015 Elsevier B.V. All rights reserved.
Terrorism: a public health threat with a trauma system response.
Jacobs, Lenworth M; Burns, Karyl J; Gross, Ronald I
2003-12-01
The threat of mass casualties and widespread infectious disease caused by terrorism is now a challenge for our government and public health system. Funds have been granted to the states by the Centers for Disease Control and Prevention and the Health Resources and Services Administration to establish bioterrorism preparedness and response capabilities. Hartford Hospital has been designated as a Center of Excellence for Bioterrorism Preparedness by the Commissioner of the Connecticut Department of Public Health. The Center of Excellence has implemented strategies to prepare for a possible bioterrorist attack. A unique model that combines epidemiology and traumatology is being used to guide the preparedness activities. Although the focus of the grant from the Connecticut Department of Public Health is bioterrorism, the application of the model can apply to preparation for all terrorist events. Implementation of strategies indicates that bioterrorism preparedness is well underway. Similar initiatives should be achievable by other trauma systems throughout the country. A Center of Excellence for Bioterrorism Preparedness in Connecticut is successfully modifying a trauma system to meet the challenge of a new public health threat, terrorism.
Commentary: evidence to guide gun violence prevention in America.
Webster, Daniel W
2015-03-18
Gun violence is a major threat to the public's health and safety in the United States. The articles in this volume's symposium on gun violence reveal the scope of the problem and new trends in mortality rates from gunfire. Leading scholars synthesize research evidence that demonstrates the ability of numerous policies and programs-each consistent with lessons learned from successful efforts to combat public health problems-to prevent gun violence. Each approach presents challenges to successful implementation. Future research should inform efforts to assess which approaches are most effective and how to implement evidence-based interventions most effectively.
Six challenges in modelling for public health policy.
Metcalf, C J E; Edmunds, W J; Lessler, J
2015-03-01
The World Health Organisation's definition of public health refers to all organized measures to prevent disease, promote health, and prolong life among the population as a whole (World Health Organization, 2014). Mathematical modelling plays an increasingly important role in helping to guide the most high impact and cost-effective means of achieving these goals. Public health programmes are usually implemented over a long period of time with broad benefits to many in the community. Clinical trials are seldom large enough to capture these effects. Observational data may be used to evaluate a programme after it is underway, but have limited value in helping to predict the future impact of a proposed policy. Furthermore, public health practitioners are often required to respond to new threats, for which there is little or no previous data on which to assess the threat. Computational and mathematical models can help to assess potential threats and impacts early in the process, and later aid in interpreting data from complex and multifactorial systems. As such, these models can be critical tools in guiding public health action. However, there are a number of challenges in achieving a successful interface between modelling and public health. Here, we discuss some of these challenges. Copyright © 2014 The Authors. Published by Elsevier B.V. All rights reserved.
Suspect/Counterfeit Items Information Guide for Subcontractors/Suppliers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tessmar, Nancy D.; Salazar, Michael J.
2012-09-18
Counterfeiting of industrial and commercial grade items is an international problem that places worker safety, program objectives, expensive equipment, and security at risk. In order to prevent the introduction of Suspect/Counterfeit Items (S/CI), this information sheet is being made available as a guide to assist in the implementation of S/CI awareness and controls, in conjunction with subcontractor's/supplier's quality assurance programs. When it comes to counterfeit goods, including industrial materials, items, and equipment, no market is immune. Some manufactures have been known to misrepresent their products and intentionally use inferior materials and processes to manufacture substandard items, whose properties can significantlymore » cart from established standards and specifications. These substandard items termed by the Department of Energy (DOE) as S/CI, pose immediate and potential threats to the safety of DOE and contractor workers, the public, and the environment. Failure of certain systems and processes caused by an S/CI could also have national security implications at Los Alamos National Laboratory (LANL). Nuclear Safety Rules (federal Laws), DOE Orders, and other regulations set forth requirements for DOE contractors to implement effective controls to assure that items and services meet specified requirements. This includes techniques to implement and thereby minimizing the potential threat of entry of S/CI to LANL. As a qualified supplier of goods or services to the LANL, your company will be required to establish and maintain effective controls to prevent the introduction of S/CI to LANL. This will require that your company warrant that all items (including their subassemblies, components, and parts) sold to LANL are genuine (i.e. not counterfeit), new, and unused, and conform to the requirements of the LANL purchase orders/contracts unless otherwise approved in writing to the Los Alamos National Security (LANS) contract administrator/procurements specialist.« less
Perimeter Barrier Selection Guide
DOT National Transportation Integrated Search
1989-05-01
This document provides a methodology to determine the magnitude of the threat from attack vehicles to the perimeter of a facility. The threat is determined by the penetration tolerance and the maximum speed attainable. After the threat is defined thi...
Countering MANPADS: study of new concepts and applications
NASA Astrophysics Data System (ADS)
Maltese, Dominique; Robineau, Jacques; Audren, Jean-Thierry; Aragones, Julien; Sailliot, Christophe
2006-05-01
The latest events of ground-to-air Man Portable Air Defense (MANPAD) attacks against aircraft have revealed a new threat both for military and civilian aircraft. Consequently, the implementation of Protecting systems (i.e. Directed InfraRed Counter Measure - DIRCM) in order to face IR guided missiles turns out to be now inevitable. In a near future, aircraft will have to possess detection, tracking, targeting and jamming capabilities to face single and multiple MANPAD threats fired in short-range scenarios from various environments (urban sites, landscape...). In this paper, a practical example of a DIRCM system under study at SAGEM DEFENSE & SECURITY company is presented. The self-protection solution includes built-in and automatic locking-on, tracking, identification and laser jamming capabilities, including defeat assessment. Target Designations are provided by a Missile Warning System. Multiple Target scenarios have been considered to design the system architecture. The article deals with current and future threats (IR seekers of different generations...), scenarios and platforms for system definition. Plus, it stresses on self-protection solutions based on laser jamming capability. Different strategies including target identification, multi band laser, active imagery are described. The self-protection system under study at SAGEM DEFENSE & SECURITY company is also a part of this chapter. Eventually, results of self-protection scenarios are provided for different MANPAD scenarios. Data have been obtained from a simulation software. The results highlight how the system reacts to incoming IR-guided missiles in short time scenarios.
ERIC Educational Resources Information Center
Cornell, Dewey; Maeng, Jennifer L.; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick
2018-01-01
Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat…
Threat Assessment Teams Target School Crisis
ERIC Educational Resources Information Center
Stover, Del
2005-01-01
In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…
New technology for early detection of health threats
NASA Astrophysics Data System (ADS)
Southern, Šárka O.; Lilienthal, Gerald W.
2008-04-01
Governmental agencies charged with protecting the health of the population and agriculture have several main strategic objectives including the detection of harmful agents, the identification of vulnerable biological targets, the prediction of health outcomes and the development of countermeasures. New technologies are urgently needed in several critical areas of bio-chemical defense: economical and minimally invasive biosensors for field use in humans and other species important for agriculture and infrastructure, universal analytical platforms for broad-based, early warnings of threats and technologies guiding the development of countermeasures. A new technology called Stress Response Profiling (SRP) was recently developed by the Gaia Medical Institute. SRP provides a universal analytical platform for monitoring health status based on measurements of physiological stress. The platform is implemented through handheld devices that can be used for noninvasive detection of early-stage health problems. This paper summarizes SRP features, advantages and potential benefits for critical areas of homeland defense.
Ice detection and classification on an aircraft wing with ultrasonic shear horizontal guided waves.
Gao, Huidong; Rose, Joseph L
2009-02-01
Ice accumulation on airfoils has been identified as a primary cause of many accidents in commercial and military aircraft. To improve aviation safety as well as reduce cost and environmental threats related to aircraft icing, sensitive, reliable, and aerodynamically compatible ice detection techniques are in great demand. Ultrasonic guided-wave-based techniques have been proved reliable for "go" and "no go" types of ice detection in some systems including the HALO system, in which the second author of this paper is a primary contributor. In this paper, we propose a new model that takes the ice layer into guided-wave modeling. Using this model, the thickness and type of ice formation can be determined from guided-wave signals. Five experimental schemes are also proposed in this paper based on some unique features identified from the guided- wave dispersion curves. A sample experiment is also presented in this paper, where a 1 mm thick glaze ice on a 2 mm aluminum plate is clearly detected. Quantitative match of the experiment data to theoretical prediction serves as a strong support for future implementation of other testing schemes proposed in this paper.
Misbah, Samreen; Mahboob, Usman
2017-01-01
The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of integrating the World Health Organization (WHO) patient safety curriculum into undergraduate medical education in Pakistan. A qualitative interpretive case study was conducted at Riphah International University, Islamabad, from October 2016 to June 2017. The study included 9 faculty members and 1 expert on patient safety. The interviews were audiotaped, and a thematic analysis of the transcripts was performed using NVivo software. Four themes were derived based on the need analysis model. The sub-themes derived from the collected data were arranged under the themes of strengths, weaknesses, opportunities, and threats, in accordance with the principles of SWOT analysis. The strengths identified were the need for a formal patient safety curriculum and its early integration into the undergraduate program. The weaknesses were faculty awareness and participation in development programs. The opportunities were an ongoing effort to develop an appropriate curriculum, to improve the current culture of healthcare, and to use the WHO curricular resource guide. The threats were attitudes towards patient safety in Pakistani culture, resistance to implementation from different levels, and the role of regulatory authorities. The theme of patient safety needs to be incorporated early into the formal medical education curriculum, with the main goals of striving to do no harm and seeing mistakes as opportunities to learn. Faculty development activities need to be organized, and faculty members should to be encouraged to participate in them. The lack of a patient safety culture was identified as the primary reason for resistance to this initiative at many levels. The WHO curriculum, amended according to local institutional culture, can be implemented appropriately with support from the corresponding regulatory bodies.
Assessing Student Threats: A Handbook for Implementing the Salem-Keizer System
ERIC Educational Resources Information Center
Van Dreal, John
2011-01-01
"Assessing Student Threats: A Handbook for Implementing the Salem-Keizer System" is a manual for the implementation of a threat assessment system that follows the recommendations of the Safe Schools Initiative and the prescriptive outline provided by the FBI. Written from an educator's perspective with contributing authors from law…
The Practice of Campus-Based Threat Assessment: An Overview
ERIC Educational Resources Information Center
Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.
2012-01-01
This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…
Army and Marine Corps Active Protection System (APS) Efforts
2016-08-23
with hard or soft kill capabilities to a variety of threats, including rocket -propelled grenades (RPGs) and anti-tank guided missiles (ATGMs). APS...of threats, including rocket -propelled grenades (RPGs) and anti-tank guided missiles (ATGMs). APS technologies are not new, and a number of nations...training. 1 RPGs are basically single man-portable, shoulder-fired, unguided rockets . RPGs have been widely proliferated but can be mitigated to a
CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6
2012-12-01
Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for
Three decades of MSM donor deferral policies. What have we learned?
Wilson, Kumanan; Atkinson, Katherine; Keelan, Jennifer
2014-01-01
In the early 1980s, donor deferrals targeting men who have sex with men (MSM) and other high-risk groups were implemented in response to the outbreak of HIV/AIDS. It has now been three decades since the implementation of these deferrals. We review the international experience with developing these policies, which involves combining scientific evidence with ethical and moral concerns and the challenge of moving from precautionary to risk management policies as scientific knowledge and technology evolves. We provide key lessons that can guide blood policymakers as they confront potential new threats to the safety of the blood system and also provide lessons to the wider public health community on how best to incorporate precaution into the policymaking process. Copyright © 2013 The Authors. Published by Elsevier Ltd.. All rights reserved.
Interventions for reducing extinction risk in chytridiomycosis-threatened amphibians.
Scheele, Ben C; Hunter, David A; Grogan, Laura F; Berger, Lee; Kolby, Jon E; McFadden, Michael S; Marantelli, Gerry; Skerratt, Lee F; Driscoll, Don A
2014-10-01
Wildlife diseases pose an increasing threat to biodiversity and are a major management challenge. A striking example of this threat is the emergence of chytridiomycosis. Despite diagnosis of chytridiomycosis as an important driver of global amphibian declines 15 years ago, researchers have yet to devise effective large-scale management responses other than biosecurity measures to mitigate disease spread and the establishment of disease-free captive assurance colonies prior to or during disease outbreaks. We examined the development of management actions that can be implemented after an epidemic in surviving populations. We developed a conceptual framework with clear interventions to guide experimental management and applied research so that further extinctions of amphibian species threatened by chytridiomycosis might be prevented. Within our framework, there are 2 management approaches: reducing Batrachochytrium dendrobatidis (the fungus that causes chytridiomycosis) in the environment or on amphibians and increasing the capacity of populations to persist despite increased mortality from disease. The latter approach emphasizes that mitigation does not necessarily need to focus on reducing disease-associated mortality. We propose promising management actions that can be implemented and tested based on current knowledge and that include habitat manipulation, antifungal treatments, animal translocation, bioaugmentation, head starting, and selection for resistance. Case studies where these strategies are being implemented will demonstrate their potential to save critically endangered species. © 2014 Society for Conservation Biology.
The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...
Stereotypes and the Achievement Gap: Stereotype Threat Prior to Test Taking
ERIC Educational Resources Information Center
Appel, Markus; Kronberger, Nicole
2012-01-01
Stereotype threat is known as a situational predicament that prevents members of negatively stereotyped groups to perform up to their full ability. This review shows that the detrimental influence of stereotype threat goes beyond test taking: It impairs stereotyped students to build abilities in the first place. Guided by current theory on…
The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...
The interim final Response Protocol Toolbox: Planning for and Responding to Contamination Threats to Drinking Water Systems is designed to help the water sector effectively and appropriately respond to intentional contamination threats and incidents. It was produced by EPA, buil...
1983-05-01
serve as inter- faces to provide a compatible hook-up. Recent advances in microprocessors are leaoing to the development of new techniques known as...killed. This sort of threat is new to warfare. Because of the lack of experience against such a threat, effective tactics have not been developed ...Recent developments have been on satellite-to-earth communications links, antijam capabilities, adaptive array antennas, and new equipment to exploit the
Cybulski, Pamela; Zantinge, Johanna; Abbott-McNeil, Deanna
2006-01-01
The purpose of this quality improvement initiative was to improve the utilization of continuous lateral rotation therapy (CLRT) in a nine-bed community hospital ICU within the context of a nurse-driven protocol. Nursing focus groups, analyzed using a strength, weakness, opportunity, threat (SWOT) approach, resulted in the implementation of four interventions over seven weeks. Change management strategies guided all aspects of the project. Results showed a modest increase in the utilization of CLRT. This initiative demonstrates that change management strategies may assist with the incorporation of technology into nursing practice by increasing empowerment and creating an attachment to and responsibility for outcomes.
Future land use threats to range-restricted fish species in the United States
Januchowski-Hartley, Stephanie R.; Holtz, Lauren A.; Martinuzzi, Sebastian; ...
2016-03-04
Land use change is one major threat to freshwater biodiversity, and land use change scenarios can help to assess threats from future land use change, thereby guiding proactive conservation decisions. Furthermore, our goal was to identify which range-restricted freshwater fish species are most likely to be affected by land use change and to determine where threats to these species from future land use change in the conterminous United States are most pronounced.
Future land use threats to range-restricted fish species in the United States
DOE Office of Scientific and Technical Information (OSTI.GOV)
Januchowski-Hartley, Stephanie R.; Holtz, Lauren A.; Martinuzzi, Sebastian
Land use change is one major threat to freshwater biodiversity, and land use change scenarios can help to assess threats from future land use change, thereby guiding proactive conservation decisions. Furthermore, our goal was to identify which range-restricted freshwater fish species are most likely to be affected by land use change and to determine where threats to these species from future land use change in the conterminous United States are most pronounced.
The ecology of human fear: survival optimization and the nervous system
Mobbs, Dean; Hagan, Cindy C.; Dalgleish, Tim; Silston, Brian; Prévost, Charlotte
2015-01-01
We propose a Survival Optimization System (SOS) to account for the strategies that humans and other animals use to defend against recurring and novel threats. The SOS attempts to merge ecological models that define a repertoire of contextually relevant threat induced survival behaviors with contemporary approaches to human affective science. We first propose that the goal of the nervous system is to reduce surprise and optimize actions by (i) predicting the sensory landscape by simulating possible encounters with threat and selecting the appropriate pre-encounter action and (ii) prevention strategies in which the organism manufactures safe environments. When a potential threat is encountered the (iii) threat orienting system is engaged to determine whether the organism ignores the stimulus or switches into a process of (iv) threat assessment, where the organism monitors the stimulus, weighs the threat value, predicts the actions of the threat, searches for safety, and guides behavioral actions crucial to directed escape. When under imminent attack, (v) defensive systems evoke fast reflexive indirect escape behaviors (i.e., fight or flight). This cascade of responses to threat of increasing magnitude are underwritten by an interconnected neural architecture that extends from cortical and hippocampal circuits, to attention, action and threat systems including the amygdala, striatum, and hard-wired defensive systems in the midbrain. The SOS also includes a modulatory feature consisting of cognitive appraisal systems that flexibly guide perception, risk and action. Moreover, personal and vicarious threat encounters fine-tune avoidance behaviors via model-based learning, with higher organisms bridging data to reduce face-to-face encounters with predators. Our model attempts to unify the divergent field of human affective science, proposing a highly integrated nervous system that has evolved to increase the organism's chances of survival. PMID:25852451
2017-01-01
Purpose The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of integrating the World Health Organization (WHO) patient safety curriculum into undergraduate medical education in Pakistan. Methods A qualitative interpretive case study was conducted at Riphah International University, Islamabad, from October 2016 to June 2017. The study included 9 faculty members and 1 expert on patient safety. The interviews were audiotaped, and a thematic analysis of the transcripts was performed using NVivo software. Results Four themes were derived based on the need analysis model. The sub-themes derived from the collected data were arranged under the themes of strengths, weaknesses, opportunities, and threats, in accordance with the principles of SWOT analysis. The strengths identified were the need for a formal patient safety curriculum and its early integration into the undergraduate program. The weaknesses were faculty awareness and participation in development programs. The opportunities were an ongoing effort to develop an appropriate curriculum, to improve the current culture of healthcare, and to use the WHO curricular resource guide. The threats were attitudes towards patient safety in Pakistani culture, resistance to implementation from different levels, and the role of regulatory authorities. Conclusion The theme of patient safety needs to be incorporated early into the formal medical education curriculum, with the main goals of striving to do no harm and seeing mistakes as opportunities to learn. Faculty development activities need to be organized, and faculty members should to be encouraged to participate in them. The lack of a patient safety culture was identified as the primary reason for resistance to this initiative at many levels. The WHO curriculum, amended according to local institutional culture, can be implemented appropriately with support from the corresponding regulatory bodies. PMID:29284217
Webber, Whitney M.; Li, Ya-Wei
2016-01-01
Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species’ demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key’s utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand overall patterns of ESA implementation. The scoring repeatability analysis shows promise, but indicates thorough training will be needed to ensure consistency. We propose that large conservation programs adopt our simple scoring system for threats and demography. By doing so, program administrators will have better information to monitor program effectiveness and guide their decisions. PMID:27478713
Malcom, Jacob W; Webber, Whitney M; Li, Ya-Wei
2016-01-01
Managers of large, complex wildlife conservation programs need information on the conservation status of each of many species to help strategically allocate limited resources. Oversimplifying status data, however, runs the risk of missing information essential to strategic allocation. Conservation status consists of two components, the status of threats a species faces and the species' demographic status. Neither component alone is sufficient to characterize conservation status. Here we present a simple key for scoring threat and demographic changes for species using detailed information provided in free-form textual descriptions of conservation status. This key is easy to use (simple), captures the two components of conservation status without the cost of more detailed measures (sufficient), and can be applied by different personnel to any taxon (consistent). To evaluate the key's utility, we performed two analyses. First, we scored the threat and demographic status of 37 species recently recommended for reclassification under the Endangered Species Act (ESA) and 15 control species, then compared our scores to two metrics used for decision-making and reports to Congress. Second, we scored the threat and demographic status of all non-plant ESA-listed species from Florida (54 spp.), and evaluated scoring repeatability for a subset of those. While the metrics reported by the U.S. Fish and Wildlife Service (FWS) are often consistent with our scores in the first analysis, the results highlight two problems with the oversimplified metrics. First, we show that both metrics can mask underlying demographic declines or threat increases; for example, ∼40% of species not recommended for reclassification had changes in threats or demography. Second, we show that neither metric is consistent with either threats or demography alone, but conflates the two. The second analysis illustrates how the scoring key can be applied to a substantial set of species to understand overall patterns of ESA implementation. The scoring repeatability analysis shows promise, but indicates thorough training will be needed to ensure consistency. We propose that large conservation programs adopt our simple scoring system for threats and demography. By doing so, program administrators will have better information to monitor program effectiveness and guide their decisions.
Child Health Champion Resource Guide.
ERIC Educational Resources Information Center
Environmental Protection Agency, Washington, DC. Office of Administrator.
This resource guide was developed as part of the U.S. Environmental Protection Agency's Child Health Champion Campaign, a program designed to empower local citizens and communities to take steps toward protecting their children from environmental health threats. The guide includes descriptions of 241 resources that may be of interest to…
Confronting Global Issues: A Multipurpose IR Simulation
ERIC Educational Resources Information Center
Shellman, Stephen M.; Turan, Kursad
2006-01-01
This article describes an international relations simulation that focuses on threats of transnational insurgent organizations, the future of the Iraqi regime, and the effect of globalization on foreign policies. It contains both the Simulation Director's Guide and the Participant's Guide. The guides explain the steps taken to run the simulation…
Countering MANPADS: study of new concepts and applications: part two
NASA Astrophysics Data System (ADS)
Maltese, Dominique; Vergnolle, Jean-François; Aragones, Julien; Renaudat, Mathieu
2007-04-01
The latest events of ground-to-air Man Portable Air Defense (MANPAD) attacks against aircraft have revealed a new threat both for military and civilian aircraft. Consequently, the implementation of protecting systems (i.e. Directed Infra Red Counter Measure - DIRCM) in order to face IR guided missiles turns out to be now inevitable. In a near future, aircraft will have to possess detection, tracking, identification, targeting and jamming capabilities to face MANPAD threats. Besides, Multiple Missiles attacks become more and more current scenarios to deal with. In this paper, a practical example of DIRCM systems under study at SAGEM DEFENSE & SECURITY Company is presented. The article is the continuation of a previous SPIE one. Self-protection solutions include built-in and automatic locking-on, tracking, identification and laser jamming capabilities, including defeat assessment. Target Designations are provided by a Missile Warning System. Targets scenarios including multiple threats are considered to design systems architectures. In a first step, the article reminds the context, current and future threats (IR seekers of different generations...), and scenarios for system definition. Then, it focuses on potential self-protection systems under study at SAGEM DEFENSE & SECURITY Company. Different strategies including target identification, multi band laser and active imagery have been previously studied in order to design DIRCM System solutions. Thus, results of self-protection scenarios are provided for different MANPAD scenarios to highlight key problems to solve. Data have been obtained from simulation software modeling full DIRCM systems architectures on technical and operational scenarios (parametric studies).
Ethics and public health emergencies: rationing vaccines.
Wynia, Matthew K
2006-01-01
There are three broad ethical issues related to handling public health emergencies. They are the three R's-rationing, restrictions and responsibilities. Recently, a severe shortage of annual influenza vaccine in the US, combined with the threat of pandemic flu, has provided an opportunity for policy makers to think about rationing in very concrete terms. Some lessons from annual flu vaccination likely will apply to pandemic vaccine distribution, but many preparatory decisions must be based on very rough estimates. What ethical principles should guide rationing decisions, what data should inform these decisions, how to revise decisions as new data emerge, and how to implement rationing decisions on the ground are all important considerations. In addition, ethicists might be able to help policy makers think through the importance of international cooperation in surmounting global rationing dilemmas and to accept the inevitable responsibilities of government in making and implementing rationing decisions.
Proactive Guide for the Threat of Terrorism in Schools.
ERIC Educational Resources Information Center
Texas School Safety Center, San Marcos.
Although American schools have not been targeted for terrorist activity, circumstances do warrant that schools adopt a heightened state of awareness. This guide addresses the potential for terrorist activity within the context of September 11, 2001, and the new reality America faces. A significant portion of the information in this guide was…
Computer Viruses and Related Threats: A Management Guide.
ERIC Educational Resources Information Center
Wack, John P.; Carnahan, Lisa J.
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
ERIC Educational Resources Information Center
Madensen, Tamara D.; Eck, John E.
2006-01-01
Alcohol-related riots among university students pose a significant problem for police agencies that serve college communities. The intensity of the disturbances may vary. However, the possible outcomes include property destruction and physical violence and are a serious threat to community and officer safety. This report provides a framework for…
Alien plant invasions and native plant extinctions: a six-threshold framework.
Downey, Paul O; Richardson, David M
2016-01-01
Biological invasions are widely acknowledged as a major threat to global biodiversity. Species from all major taxonomic groups have become invasive. The range of impacts of invasive taxa and the overall magnitude of the threat is increasing. Plants comprise the biggest and best-studied group of invasive species. There is a growing debate; however, regarding the nature of the alien plant threat-in particular whether the outcome is likely to be the widespread extinction of native plant species. The debate has raised questions on whether the threat posed by invasive plants to native plants has been overstated. We provide a conceptual framework to guide discussion on this topic, in which the threat posed by invasive plants is considered in the context of a progression from no impact through to extinction. We define six thresholds along the 'extinction trajectory', global extinction being the final threshold. Although there are no documented examples of either 'in the wild' (Threshold 5) or global extinctions (Threshold 6) of native plants that are attributable solely to plant invasions, there is evidence that native plants have crossed or breached other thresholds along the extinction trajectory due to the impacts associated with plant invasions. Several factors may be masking where native species are on the trajectory; these include a lack of appropriate data to accurately map the position of species on the trajectory, the timeframe required to definitively state that extinctions have occurred and management interventions. Such interventions, focussing mainly on Thresholds 1-3 (a declining population through to the local extinction of a population), are likely to alter the extinction trajectory of some species. The critical issue for conservation managers is the trend, because interventions must be implemented before extinctions occur. Thus the lack of evidence for extinctions attributable to plant invasions does not mean we should disregard the broader threat. Published by Oxford University Press on behalf of the Annals of Botany Company.
Schmitz, Anja; Grillon, Christian
2012-01-01
The threat of predictable and unpredictable aversive events was developed to assess short-duration (fear) and long-duration (anxiety) aversive states in humans. A typical experiment consists of three conditions: a safe condition (neutral (N)), during which participants are safe from aversive stimuli, and two threat conditions—one in which aversive events are administered predictably (P) (i.e., signaled by a threat cue), and one in which aversive stimuli are administered unpredictably (U). During the so-called NPU -threat test, ongoing change in aversive states is measured with the startle reflex. The NPU -threat test has been validated in pharmacological and clinical studies and can be implemented in children and adults. Similar procedures have been applied in animal models, making the NPU -threat test an ideal tool for translational research. The procedure is relatively short (35 min), simple to implement and generates consistent results with large effect sizes. PMID:22362158
EPA's Office of Research and Development and Office of Water/Water Security Division have jointly developed a Response Protocol Toolbox (RPTB) to address the complex, multi-faceted challenges of a water utility's planning and response to intentional contamination of drinking wate...
Strategies to Minimize the Effects of Information Security Threats on Business Performance
ERIC Educational Resources Information Center
Okoye, Stella Ifeyinwa
2017-01-01
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
ERIC Educational Resources Information Center
Juhnke, Gerald A.
2010-01-01
Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…
DOT National Transportation Integrated Search
1993-03-01
This report is the first of four volunes concerned with developing safety guidelines and specifications for high-speed : guided ground transportation (HSGGT) collision avoidance and accident survivability. The overall approach taken in this : study i...
DOT National Transportation Integrated Search
1993-03-01
This report is the first of four volumes concerned with developing safety guidelines and specifications for high-speed guided ground transportation (HSGGT) collision avoidance and accident survivability. The overall approach taken in this study is to...
Holographic radar imaging privacy techniques utilizing dual-frequency implementation
NASA Astrophysics Data System (ADS)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-01
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhance the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.
Holographic Radar Imaging Privacy Techniques Utilizing Dual-Frequency Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-18
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhancemore » the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.« less
Durso, Francis T; Ferguson, Ashley N; Kazi, Sadaf; Cunningham, Charlene; Ryan, Christina
2015-03-01
Part of the work of a critical care nurse is to manage the threats that arise that could impede efficient and effective job performance. Nurses manage threats by employing various strategies to keep performance high and workload manageable. We investigated strategic threat management by using the Threat-Strategy Interview. Threats frequently involved technology, staff, or organizational components. The threats were managed by a toolbox of multifaceted strategies, the most frequent of which involved staff-, treatment- (patient + technology), examination- (patient + clinician), and patient-oriented strategies. The profile of strategies for a particular threat often leveraged work facets similar to the work facet that characterized the threat. In such cases, the nurse's strategy was directed at eliminating the threat (not working around it). A description at both a domain invariant level - useful for understanding strategic threat management generally - and a description at an operational, specific level - useful for guiding interventions-- are presented. A structural description of the relationship among threats, strategies, and the cues that trigger them is presented in the form of an evidence accumulation framework of strategic threat management. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology.
Casad, Bettina J; Bryant, William J
2016-01-01
Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.
Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology
Casad, Bettina J.; Bryant, William J.
2016-01-01
Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace. PMID:26834681
Construction Carpentry. Secondary Schools. Curriculum Guide.
ERIC Educational Resources Information Center
Tellei, Patrick U.
This document is intended to help construction carpentry instructors in the State of Truk, Truk, Federated States of Micronesia, to prepare their senior high school students uniformly to design and build residential structures capable of withstanding typhoons. Because of the threat of typhoons, the carpentry curriculum contained in the guide has a…
Insects and their life cycle: Steps to take to assess threats
Alicia M. Bray; Jason B. Oliver
2013-01-01
This paper provides a brief overview of the importance of wood-boring insects to the forest nursery industry. Descriptions of the major insect groups are provided with special attention to the life stages that are most problematic within each group. Steps are provided to guide individuals to mitigate potential threats if a new insect is detected causing damage to trees...
Barrett, Jason R; French, P Edward
2013-01-01
The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.
Alien plant invasions and native plant extinctions: a six-threshold framework
Downey, Paul O.; Richardson, David M.
2016-01-01
Biological invasions are widely acknowledged as a major threat to global biodiversity. Species from all major taxonomic groups have become invasive. The range of impacts of invasive taxa and the overall magnitude of the threat is increasing. Plants comprise the biggest and best-studied group of invasive species. There is a growing debate; however, regarding the nature of the alien plant threat—in particular whether the outcome is likely to be the widespread extinction of native plant species. The debate has raised questions on whether the threat posed by invasive plants to native plants has been overstated. We provide a conceptual framework to guide discussion on this topic, in which the threat posed by invasive plants is considered in the context of a progression from no impact through to extinction. We define six thresholds along the ‘extinction trajectory’, global extinction being the final threshold. Although there are no documented examples of either ‘in the wild’ (Threshold 5) or global extinctions (Threshold 6) of native plants that are attributable solely to plant invasions, there is evidence that native plants have crossed or breached other thresholds along the extinction trajectory due to the impacts associated with plant invasions. Several factors may be masking where native species are on the trajectory; these include a lack of appropriate data to accurately map the position of species on the trajectory, the timeframe required to definitively state that extinctions have occurred and management interventions. Such interventions, focussing mainly on Thresholds 1–3 (a declining population through to the local extinction of a population), are likely to alter the extinction trajectory of some species. The critical issue for conservation managers is the trend, because interventions must be implemented before extinctions occur. Thus the lack of evidence for extinctions attributable to plant invasions does not mean we should disregard the broader threat. PMID:27422543
NASA Astrophysics Data System (ADS)
Gruber, Thomas; Grim, Larry; Fauth, Ryan; Tercha, Brian; Powell, Chris; Steinhardt, Kristin
2011-05-01
Large networks of disparate chemical/biological (C/B) sensors, MET sensors, and intelligence, surveillance, and reconnaissance (ISR) sensors reporting to various command/display locations can lead to conflicting threat information, questions of alarm confidence, and a confused situational awareness. Sensor netting algorithms (SNA) are being developed to resolve these conflicts and to report high confidence consensus threat map data products on a common operating picture (COP) display. A data fusion algorithm design was completed in a Phase I SBIR effort and development continues in the Phase II SBIR effort. The initial implementation and testing of the algorithm has produced some performance results. The algorithm accepts point and/or standoff sensor data, and event detection data (e.g., the location of an explosion) from various ISR sensors (e.g., acoustic, infrared cameras, etc.). These input data are preprocessed to assign estimated uncertainty to each incoming piece of data. The data are then sent to a weighted tomography process to obtain a consensus threat map, including estimated threat concentration level uncertainty. The threat map is then tested for consistency and the overall confidence for the map result is estimated. The map and confidence results are displayed on a COP. The benefits of a modular implementation of the algorithm and comparisons of fused / un-fused data results will be presented. The metrics for judging the sensor-netting algorithm performance are warning time, threat map accuracy (as compared to ground truth), false alarm rate, and false alarm rate v. reported threat confidence level.
ERIC Educational Resources Information Center
Lee, Seung Yong; Bates, Paul R.; Murray, Patrick S.; Martin, Wayne L.
2017-01-01
Threat and Error Management (TEM) training, endorsed and recommended by the International Civil Aviation Organisation (ICAO), was mandated in Australia with the aim of improving aviation safety. However, to date, there has been very limited, if any, formal post-implementation review, assessment or evaluation to examine the "after-state"…
AGU President's Message: Obama Administration's Commitment to Scientific Integrity
NASA Astrophysics Data System (ADS)
McPhaden, Michael J.
2011-01-01
In March 2009, President Barack Obama issued a memorandum on the subject of scientific integrity in which he stated emphatically, 'Science and the scientific process must inform and guide decisions of my Administration on a wide range of issues, including improvement of public health, protection of the environment, increased efficiency in the use of energy and other resources, mitigation of the threat of climate change, and protection of national security.” The president charged John Holdren, director of the Office of Science and Technology Policy (OSTP), with developing specific recommendations “for ensuring the highest level of integrity in all aspects of the executive branch's involvement with scientific and technological processes.” On Friday, 17 December, OSTP released federal department and agency guidelines for implementing the administration’s policies on scientific integrity.
R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems
NASA Technical Reports Server (NTRS)
Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.
2015-01-01
We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.
78 FR 34706 - Designation of Two (2) Entities Pursuant to Executive Order 13628 of October 9, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-10
... Implementation of Certain Sanctions Set Forth in the Iran Threat Reduction and Syria Human Rights Act of 2012 and Additional Sanctions With Respect to Iran.'' DATES: The designations by the Director of OFAC of the two (2... Executive Order 13628, ``Authorizing the Implementation of Certain Sanctions Set Forth in the Iran Threat...
Overview of Threats and Failure Models for Safety-Relevant Computer-Based Systems
NASA Technical Reports Server (NTRS)
Torres-Pomales, Wilfredo
2015-01-01
This document presents a high-level overview of the threats to safety-relevant computer-based systems, including (1) a description of the introduction and activation of physical and logical faults; (2) the propagation of their effects; and (3) function-level and component-level error and failure mode models. These models can be used in the definition of fault hypotheses (i.e., assumptions) for threat-risk mitigation strategies. This document is a contribution to a guide currently under development that is intended to provide a general technical foundation for designers and evaluators of safety-relevant systems.
A strategy for prioritizing threats and recovery actions for at-risk species.
Darst, Catherine R; Murphy, Philip J; Strout, Nathan W; Campbell, Steven P; Field, Kimberleigh J; Allison, Linda; Averill-Murray, Roy C
2013-03-01
Ensuring the persistence of at-risk species depends on implementing conservation actions that ameliorate threats. We developed and implemented a method to quantify the relative importance of threats and to prioritize recovery actions based on their potential to affect risk to Mojave desert tortoises (Gopherus agassizii). We used assessments of threat importance and elasticities of demographic rates from population matrix models to estimate the relative contributions of threats to overall increase in risk to the population. We found that urbanization, human access, military operations, disease, and illegal use of off highway vehicles are the most serious threats to the desert tortoise range-wide. These results suggest that, overall, recovery actions that decrease habitat loss, predation, and crushing will be most effective for recovery; specifically, we found that habitat restoration, topic-specific environmental education, and land acquisition are most likely to result in the greatest decrease in risk to the desert tortoise across its range. In addition, we have developed an application that manages the conceptual model and all supporting information and calculates threat severity and potential effectiveness of recovery actions. Our analytical approach provides an objective process for quantifying threats, prioritizing recovery actions, and developing monitoring metrics for those actions for adaptive management of any at-risk species.
Mueller, Sven C; Shechner, Tomer; Rosen, Dana; Nelson, Eric E; Pine, Daniel S; Ernst, Monique
2015-04-01
Pediatric anxiety disorders are among the most common psychiatric mental illnesses in children and adolescents, and are associated with abnormal cognitive control in emotional, particularly threat, contexts. In a series of studies using eye movement saccade tasks, we reported anxiety-related alterations in the interplay of inhibitory control with incentives, or with emotional distractors. The present study extends these findings to working memory (WM), and queries the interaction of spatial WM with emotional stimuli in pediatric clinical anxiety. Participants were 33 children/adolescents diagnosed with an anxiety disorder, and 22 age-matched healthy comparison youths. Participants completed a novel eye movement task, an affective variant of the memory-guided saccade task. This task assessed the influence of incidental threat on spatial WM processes during high and low cognitive load. Healthy but not anxious children/adolescents showed slowed saccade latencies during incidental threat in low-load but not high-load WM conditions. No other group effects emerged on saccade latency or accuracy. The current data suggest a differential pattern of how emotion interacts with cognitive control in healthy youth relative to anxious youth. These findings extend data from inhibitory processes, reported previously, to spatial WM in pediatric anxiety. © 2015 Wiley Periodicals, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-22
... DEPARTMENT OF DEFENSE Office of the Secretary Determination on Use of Cooperative Threat Reduction Funds in Pakistan and Afghanistan Under Section 1308 of the National Defense Authorization Act for... Threat Reduction (CTR) funds for the implementation of CTR programs in Pakistan and Afghanistan will...
Natural phenomena hazards design and evaluation criteria for Department of Energy Facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1996-01-01
The Department of Energy (DOE) has issued an Order 420.1 which establishes policy for its facilities in the event of natural phenomena hazards (NPH) along with associated NPH mitigation requirements. This DOE Standard gives design and evaluation criteria for NPH effects as guidance for implementing the NPH mitigation requirements of DOE Order 420.1 and the associated implementation Guides. These are intended to be consistent design and evaluation criteria for protection against natural phenomena hazards at DOE sites throughout the United States. The goal of these criteria is to assure that DOE facilities can withstand the effects of natural phenomena suchmore » as earthquakes, extreme winds, tornadoes, and flooding. These criteria apply to the design of new facilities and the evaluation of existing facilities. They may also be used for modification and upgrading of existing facilities as appropriate. The design and evaluation criteria presented herein control the level of conservatism introduced in the design/evaluation process such that earthquake, wind, and flood hazards are treated on a consistent basis. These criteria also employ a graded approach to ensure that the level of conservatism and rigor in design/evaluation is appropriate for facility characteristics such as importance, hazards to people on and off site, and threat to the environment. For each natural phenomena hazard covered, these criteria consist of the following: Performance Categories and target performance goals as specified in the DOE Order 420.1 NPH Implementation Guide, and DOE-STD-1 021; specified probability levels from which natural phenomena hazard loading on structures, equipment, and systems is developed; and design and evaluation procedures to evaluate response to NPH loads and criteria to assess whether or not computed response is permissible.« less
On selecting satellite conjunction filter parameters
NASA Astrophysics Data System (ADS)
Alfano, Salvatore; Finkleman, David
2014-06-01
This paper extends concepts of signal detection theory to predict the performance of conjunction screening techniques and guiding the selection of keepout and screening thresholds. The most efficient way to identify satellites likely to collide is to employ filters to identify orbiting pairs that should not come close enough over a prescribed time period to be considered hazardous. Such pairings can then be eliminated from further computation to accelerate overall processing time. Approximations inherent in filtering techniques include screening using only unperturbed Newtonian two body astrodynamics and uncertainties in orbit elements. Therefore, every filtering process is vulnerable to including objects that are not threats and excluding some that are threats, Type I and Type II errors. The approach in this paper guides selection of the best operating point for the filters suited to a user's tolerance for false alarms and unwarned threats. We demonstrate the approach using three archetypal filters with an initial three-day span, select filter parameters based on performance, and then test those parameters using eight historical snapshots of the space catalog. This work provides a mechanism for selecting filter parameters but the choices depend on the circumstances.
Medical group management: a marketing orientation.
Bopp, K D; Allcorn, S
1986-09-01
This article considers the pragmatic aspects of conducting a situation/marketing audit for group medical practices. This audit is a key component in the formulation of a competitive strategy and the development of a marketing program. Given are a series of questions that may be used by medical groups to guide assessment of the opportunities and threats present in the environment as well as the strengths and weaknesses of the organization in meeting the environmental challenges. Furthermore, the article provides a framework for thinking about strategy and the variables that should be considered and aligned to achieve effective implementation of strategy. Finally, the parameters are outlined for deciding on a marketing program: the mix of marketing tools (service design, distribution channels, pricing and promotion) that should be employed to offensively and/or defensively position the medical group in the competitive marketplace.
Child Health Champion Resource Guide (1999)
Descriptions of 241 resources for communities and citizens taking steps toward protecting their children from environmental health threats: Air, Contaminants, Education and Community Organization, Food, Health End Points, Indoor, Water, Other.
Sujansky, Walter V; Overhage, J Marc; Chang, Sophia; Frohlich, Jonah; Faus, Samuel A
2009-01-01
Electronic laboratory interfaces can significantly increase the value of ambulatory electronic health record (EHR) systems by providing laboratory result data automatically and in a computable form. However, many ambulatory EHRs cannot implement electronic laboratory interfaces despite the existence of messaging standards, such as Health Level 7, version 2 (HL7). Among several barriers to implementing laboratory interfaces is the extensive optionality within the HL7 message standard. This paper describes the rationale for and development of an HL7 implementation guide that seeks to eliminate most of the optionality inherent in HL7, but retain the information content required for reporting outpatient laboratory results. A work group of heterogeneous stakeholders developed the implementation guide based on a set of design principles that emphasized parsimony, practical requirements, and near-term adoption. The resulting implementation guide contains 93% fewer optional data elements than HL7. This guide was successfully implemented by 15 organizations during an initial testing phase and has been approved by the HL7 standards body as an implementation guide for outpatient laboratory reporting. Further testing is required to determine whether widespread adoption of the implementation guide by laboratories and EHR systems can facilitate the implementation of electronic laboratory interfaces.
Su, Fangli; Kaplan, David; Li, Lifeng; Li, Haifu; Song, Fei; Liu, Haisheng
2017-03-03
In many locations around the globe, large reservoir sustainability is threatened by land use change and direct pollution loading from the upstream watershed. However, the size and complexity of upstream basins makes the planning and implementation of watershed-scale pollution management a challenge. In this study, we established an evaluation system based on 17 factors, representing the potential point and non-point source pollutants and the environmental carrying capacity which are likely to affect the water quality in the Dahuofang Reservoir and watershed in northeastern China. We used entropy methods to rank 118 subwatersheds by their potential pollution threat and clustered subwatersheds according to the potential pollution type. Combining ranking and clustering analyses allowed us to suggest specific areas for prioritized watershed management (in particular, two subwatersheds with the greatest pollution potential) and to recommend the conservation of current practices in other less vulnerable locations (91 small watersheds with low pollution potential). Finally, we identified the factors most likely to influence the water quality of each of the 118 subwatersheds and suggested adaptive control measures for each location. These results provide a scientific basis for improving the watershed management and sustainability of the Dahuofang reservoir and a framework for identifying threats and prioritizing the management of watersheds of large reservoirs around the world.
Su, Fangli; Kaplan, David; Li, Lifeng; Li, Haifu; Song, Fei; Liu, Haisheng
2017-01-01
In many locations around the globe, large reservoir sustainability is threatened by land use change and direct pollution loading from the upstream watershed. However, the size and complexity of upstream basins makes the planning and implementation of watershed-scale pollution management a challenge. In this study, we established an evaluation system based on 17 factors, representing the potential point and non-point source pollutants and the environmental carrying capacity which are likely to affect the water quality in the Dahuofang Reservoir and watershed in northeastern China. We used entropy methods to rank 118 subwatersheds by their potential pollution threat and clustered subwatersheds according to the potential pollution type. Combining ranking and clustering analyses allowed us to suggest specific areas for prioritized watershed management (in particular, two subwatersheds with the greatest pollution potential) and to recommend the conservation of current practices in other less vulnerable locations (91 small watersheds with low pollution potential). Finally, we identified the factors most likely to influence the water quality of each of the 118 subwatersheds and suggested adaptive control measures for each location. These results provide a scientific basis for improving the watershed management and sustainability of the Dahuofang reservoir and a framework for identifying threats and prioritizing the management of watersheds of large reservoirs around the world. PMID:28273834
Raising environmental awareness through applied biochemistry laboratory experiments.
Salman Ashraf, S
2013-01-01
Our environment is under constant pressure and threat from various sources of pollution. Science students, in particular chemistry students, must not only be made aware of these issues, but also be taught that chemistry (and science) can provide solutions to such real-life issues. To this end, a newly developed biochemistry laboratory experiment is described that guides students to learn about the applicability of peroxidase enzymes to degrade organic dyes (as model pollutants) in simulated waste water. In addition to showing how enzymes can potentially be used for waste water remediation, various factors than can affect enzyme-based reactions such as pH, temperature, concentration of substrates/enzymes, and denaturants can also be tested. This "applied biotechnology" experiment was successfully implemented in an undergraduate biochemistry laboratory course to enhance students' learning of environmental issues as well important biochemistry concepts. Student survey confirmed that this laboratory experiment was successful in achieving the objectives of raising environmental awareness in students and illustrating the usefulness of chemistry in solving real-life problems. This experiment can be easily adopted in an introductory biochemistry laboratory course and taught as an inquiry-guided exercise. © 2013 by The International Union of Biochemistry and Molecular Biology.
Applying systems thinking to inform studies of wildlife trade in primates.
Blair, Mary E; Le, Minh D; Thạch, Hoàng M; Panariello, Anna; Vũ, Ngọc B; Birchette, Mark G; Sethi, Gautam; Sterling, Eleanor J
2017-11-01
Wildlife trade presents a major threat to primate populations, which are in demand from local to international scales for a variety of uses from food and traditional medicine to the exotic pet trade. We argue that an interdisciplinary framework to facilitate integration of socioeconomic, anthropological, and biological data across multiple spatial and temporal scales is essential to guide the study of wildlife trade dynamics and its impacts on primate populations. Here, we present a new way to design research on wildlife trade in primates using a systems thinking framework. We discuss how we constructed our framework, which follows a social-ecological system framework, to design an ongoing study of local, regional, and international slow loris (Nycticebus spp.) trade in Vietnam. We outline the process of iterative variable exploration and selection via this framework to inform study design. Our framework, guided by systems thinking, enables recognition of complexity in study design, from which the results can inform more holistic, site-appropriate, and effective trade management practices. We place our framework in the context of other approaches to studying wildlife trade and discuss options to address foreseeable challenges to implementing this new framework. © 2017 Wiley Periodicals, Inc.
ERIC Educational Resources Information Center
Kramer-Jefferson, Kathryn R.
2017-01-01
Effective in 2011, The Department of Justice implemented a change to the direct threat standard, which is part of Title II of the Americans with Disabilities Act. This change removed the threat of harm to self from the direct threat standard and potentially limits the actions that colleges can take when working with and responding to students who…
Video calls from lay bystanders to dispatch centers - risk assessment of information security.
Bolle, Stein R; Hasvold, Per; Henriksen, Eva
2011-09-30
Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.
Video calls from lay bystanders to dispatch centers - risk assessment of information security
2011-01-01
Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387
Sundqvist, Bo; Bengtsson, Ulrika Allard; Wisselink, Henk J; Peeters, Ben P H; van Rotterdam, Bart; Kampert, Evelien; Bereczky, Sándor; Johan Olsson, N G; Szekely Björndal, Asa; Zini, Sylvie; Allix, Sébastien; Knutsson, Rickard
2013-09-01
Laboratory response networks (LRNs) have been established for security reasons in several countries including the Netherlands, France, and Sweden. LRNs function in these countries as a preparedness measure for a coordinated diagnostic response capability in case of a bioterrorism incident or other biocrimes. Generally, these LRNs are organized on a national level. The EU project AniBioThreat has identified the need for an integrated European LRN to strengthen preparedness against animal bioterrorism. One task of the AniBioThreat project is to suggest a plan to implement laboratory biorisk management CWA 15793:2011 (CWA 15793), a management system built on the principle of continual improvement through the Plan-Do-Check-Act (PDCA) cycle. The implementation of CWA 15793 can facilitate trust and credibility in a future European LRN and is an assurance that the work done at the laboratories is performed in a structured way with continuous improvements. As a first step, a gap analysis was performed to establish the current compliance status of biosafety and laboratory biosecurity management with CWA 15793 in 5 AniBioThreat partner institutes in France (ANSES), the Netherlands (CVI and RIVM), and Sweden (SMI and SVA). All 5 partners are national and/or international laboratory reference institutes in the field of public or animal health and possess high-containment laboratories and animal facilities. The gap analysis showed that the participating institutes already have robust biorisk management programs in place, but several gaps were identified that need to be addressed. Despite differences between the participating institutes in their compliance status, these variations are not significant. Biorisk management exercises also have been identified as a useful tool to control compliance status and thereby implementation of CWA 15793. An exercise concerning an insider threat and loss of a biological agent was performed at SVA in the AniBioThreat project to evaluate implementation of the contingency plans and as an activity in the implementation process of CWA 15793. The outcome of the exercise was perceived as very useful, and improvements to enhance biorisk preparedness were identified. Gap analyses and exercises are important, useful activities to facilitate implementation of CWA 15793. The PDCA cycle will enforce a structured way to work, with continual improvements concerning biorisk management activities. Based on the activities in the AniBioThreat project, the following requirements are suggested to promote implementation: support from the top management of the organizations, knowledge about CWA 15793, a compliance audit checklist and gap analysis, training and exercises, networking in LRNs and other networks, and interinstitutional audits. Implementation of CWA 15793 at each institute would strengthen the European animal bioterrorism response capabilities by establishing a well-prepared LRN.
Eight habitats, 38 threats and 55 experts: Assessing ecological risk in a multi-use marine region
Jones, Alice R.; Deveney, Marty R.; Ward, Tim M.; Gillanders, Bronwyn M.
2017-01-01
Identifying the relative risk human activities pose to a habitat, and the ecosystem services they provide, can guide management prioritisation and resource allocation. Using a combination of expert elicitation to assess the probable effect of a threat and existing data to assess the level of threat exposure, we conducted a risk assessment for 38 human-mediated threats to eight marine habitats (totalling 304 threat-habitat combinations) in Spencer Gulf, Australia. We developed a score-based survey to collate expert opinion and assess the relative effect of each threat to each habitat, as well as a novel and independent measure of knowledge-based uncertainty. Fifty-five experts representing multiple sectors and institutions participated in the study, with 6 to 15 survey responses per habitat (n = 81 surveys). We identified key threats specific to each habitat; overall, climate change threats received the highest risk rankings, with nutrient discharge identified as a key local-scale stressor. Invasive species and most fishing-related threats, which are commonly identified as major threats to the marine environment, were ranked as low-tier threats to Spencer Gulf, emphasising the importance of regionally-relevant assessments. Further, we identified critical knowledge gaps and quantified uncertainty scores for each risk. Our approach will facilitate prioritisation of resource allocation in a region of increasing social, economic and environmental importance, and can be applied to marine regions where empirical data are lacking. PMID:28489912
Lustig, Avichai; Ketter-Katz, Hadas; Katzir, Gadi
2012-01-01
The common chameleon, Chamaeleo chameleon, is an arboreal lizard with highly independent, large-amplitude eye movements. In response to a moving threat, a chameleon on a perch responds with distinct avoidance movements that are expressed in its continuous positioning on the side of the perch distal to the threat. We analyzed body-exposure patterns during threat avoidance for evidence of lateralization, that is, asymmetry at the functional/behavioral levels. Chameleons were exposed to a threat approaching horizontally from the left or right, as they held onto a vertical pole that was either wider or narrower than the width of their head, providing, respectively, monocular or binocular viewing of the threat. We found two equal-sized sub-groups, each displaying lateralization of motor responses to a given direction of stimulus approach. Such an anti-symmetrical distribution of lateralization in a population may be indicative of situations in which organisms are regularly exposed to crucial stimuli from all spatial directions. This is because a bimodal distribution of responses to threat in a natural population will reduce the spatial advantage of predators. PMID:22685546
Lustig, Avichai; Ketter-Katz, Hadas; Katzir, Gadi
2012-01-01
The common chameleon, Chamaeleo chameleon, is an arboreal lizard with highly independent, large-amplitude eye movements. In response to a moving threat, a chameleon on a perch responds with distinct avoidance movements that are expressed in its continuous positioning on the side of the perch distal to the threat. We analyzed body-exposure patterns during threat avoidance for evidence of lateralization, that is, asymmetry at the functional/behavioral levels. Chameleons were exposed to a threat approaching horizontally from the left or right, as they held onto a vertical pole that was either wider or narrower than the width of their head, providing, respectively, monocular or binocular viewing of the threat. We found two equal-sized sub-groups, each displaying lateralization of motor responses to a given direction of stimulus approach. Such an anti-symmetrical distribution of lateralization in a population may be indicative of situations in which organisms are regularly exposed to crucial stimuli from all spatial directions. This is because a bimodal distribution of responses to threat in a natural population will reduce the spatial advantage of predators.
NASA Astrophysics Data System (ADS)
Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful
2017-09-01
Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.
Liu, Pei; Zhao, Fengqing; Zhang, Baoshan; Dang, Qingxiu
2017-10-03
Assuming that the principle of an active-self account holds true in real life, priming certain constructs could selectively activate a working self-concept, which in turn guides behavior. The current study involved two experiments that examined the relationships between stereotypic identity, working self-concept, and memory performance in older adults. Specifically, Study 1 tested whether a stereotype threat can affect older adults' working self-concept and memory performance. A modified Stroop color naming task and a separate recognition task showed that a stereotype threat prime altered the activation of the working self-concept and deteriorated the older adults' memory performance. Additionally, the working self-concept mediated the effect of stereotype threat on memory performance. Accordingly, we designed Study 2 to assess whether priming different identities can alter the working self-concept of the elderly and buffer the stereotype threat effect on memory performance. The results not only were the same as Study 1 but also revealed that activating multiple identities could mitigate the stereotype threat. These results support an active-self account and the efficacy of stereotype threat intervention. This intervention strategy may be able to be used in real situations to help the elderly alleviate stereotype threats and memory impairment.
42 CFR 423.160 - Standards for electronic prescribing.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Prescriber/Pharmacist Interface SCRIPT Standard, Implementation Guide, Version 8, Release 1, (Version 8.1... Prescriber/Pharmacist Interface SCRIPT Standard, Implementation Guide, Version 8, Release 1 (Version 8.1... Programs Prescriber/Pharmacist Interface SCRIPT Standard, Implementation Guide Version 8, Release 1...
Common Sense Guide to Mitigating Insider Threats, Fifth Edition
2016-12-01
background investigation on its employees. 6.4 Quick Wins and High -Impact Solutions 6.4.1 All Organizations Have all employees, contractors , and trusted...Studies 15 1.6 Quick Wins and High -Impact Solutions 16 1.6.1 All Organizations 16 1.7 Mapping to Standards 16 Practice 2: Develop a formalized insider...Threat Program 29 2.5 Case Studies 30 2.6 Quick Wins and High -Impact Solutions 31 2.6.1 All Organizations 31 2.6.2 Large Organizations 32 2.7
Khin, Hnin Su Su; Aung, Tin; Aung, Moe; Thi, Aung; Boxshall, Matt; White, Chris
2016-08-18
In 2012, alarmingly high rates of oral artemisinin monotherapy availability and use were detected along Eastern Myanmar, threatening efforts to halt the spread of artemisinin resistance in the Greater Mekong Subregion (GMS), and globally. The aim of this paper is to exemplify how the use of supply side evidence generated through the ACTwatch project shaped the artemisinin monotherapy replacement malaria (AMTR) project's design and interventions to rapidly displace oral artemisinin monotherapy with subsidized, quality-assured ACT in the private sector. The AMTR project was implemented as part of the Myanmar artemisinin resistance containment (MARC) framework along Eastern Myanmar. Guided by outlet survey and supply chain evidence, the project implemented a high-level subsidy, including negotiations with a main anti-malarial distributor, with the aim of squeezing oral artemisinin monotherapy out of the market through price competition and increased availability of quality-assured artemisinin-based combinations. This was complemented with a plethora of demand-creation activities targeting anti-malarial providers and consumers. Priority outlet types responsible for the distribution of oral artemisinin monotherapy were identified by the outlet survey, and this evidence was used to target the AMTR project's supporting interventions. The widespread availability and use of oral artemisinin monotherapy in Myanmar has been a serious threat to malaria control and elimination in the country and across the region. Practical anti-malarial market evidence was rapidly generated and used to inform private sector approaches to address these threats. The program design approach outlined in this paper is illustrative of the type of evidence generation and use that will be required to ensure effective containment of artemisinin drug resistance and progress toward regional and global malaria elimination goals.
Velsko, Stephan; Bates, Thomas
2016-01-01
Despite numerous calls for improvement, the US biosurveillance enterprise remains a patchwork of uncoordinated systems that fail to take advantage of the rapid progress in information processing, communication, and analytics made in the past decade. By synthesizing components from the extensive biosurveillance literature, we propose a conceptual framework for a national biosurveillance architecture and provide suggestions for implementation. The framework differs from the current federal biosurveillance development pathway in that it is not focused on systems useful for "situational awareness" but is instead focused on the long-term goal of having true warning capabilities. Therefore, a guiding design objective is the ability to digitally detect emerging threats that span jurisdictional boundaries, because attempting to solve the most challenging biosurveillance problem first provides the strongest foundation to meet simpler surveillance objectives. Core components of the vision are: (1) a whole-of-government approach to support currently disparate federal surveillance efforts that have a common data need, including those for food safety, vaccine and medical product safety, and infectious disease surveillance; (2) an information architecture that enables secure national access to electronic health records, yet does not require that data be sent to a centralized location for surveillance analysis; (3) an inference architecture that leverages advances in "big data" analytics and learning inference engines-a significant departure from the statistical process control paradigm that underpins nearly all current syndromic surveillance systems; and (4) an organizational architecture with a governance model aimed at establishing national biosurveillance as a critical part of the US national infrastructure. Although it will take many years to implement, and a national campaign of education and debate to acquire public buy-in for such a comprehensive system, the potential benefits warrant increased consideration by the US government.
Internet-Based Recording Service Solves Maintenance Reporting Problems.
ERIC Educational Resources Information Center
Noah, Marilyn
2001-01-01
Details the response to a health threat caused by illegal wastewater disposal in Wisconsin. Traces the identification of the problem, ordinances and policies adopted to guide the remedy, and subsequent monitoring of environmental quality. (DDR)
An advanced wide area chemical sensor testbed
NASA Astrophysics Data System (ADS)
Seeley, Juliette A.; Kelly, Michael; Wack, Edward; Ryan-Howard, Danette; Weidler, Darryl; O'Brien, Peter; Colonero, Curtis; Lakness, John; Patel, Paras
2005-11-01
In order to meet current and emerging needs for remote passive standoff detection of chemical agent threats, MIT Lincoln Laboratory has developed a Wide Area Chemical Sensor (WACS) testbed. A design study helped define the initial concept, guided by current standoff sensor mission requirements. Several variants of this initial design have since been proposed to target other applications within the defense community. The design relies on several enabling technologies required for successful implementation. The primary spectral component is a Wedged Interferometric Spectrometer (WIS) capable of imaging in the LWIR with spectral resolutions as narrow as 4 cm-1. A novel scanning optic will enhance the ability of this sensor to scan over large areas of concern with a compact, rugged design. In this paper, we shall discuss our design, development, and calibration process for this system as well as recent testbed measurements that validate the sensor concept.
Implementing an Information Security Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.
The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less
Optics detection and laser countermeasures on a combat vehicle
NASA Astrophysics Data System (ADS)
Sjöqvist, Lars; Allard, Lars; Pettersson, Magnus; Börjesson, Per; Lindskog, Nils; Bodin, Johan; Widén, Anders; Persson, Hâkan; Fredriksson, Jan; Edström, Sten
2016-10-01
Magnifying optical assemblies used for weapon guidance or rifle scopes may possess a threat for a combat vehicle and its personnel. Detection and localisation of optical threats is consequently of interest in military applications. Typically a laser system is used in optics detection, or optical augmentation, to interrogate a scene of interest to localise retroreflected laser radiation. One interesting approach for implementing optics detection on a combat vehicle is to use a continuous scanning scheme. In addition, optics detection can be combined with laser countermeasures, or a laser dazzling function, to efficiently counter an optical threat. An optics detection laser sensor demonstrator has been implemented on a combat vehicle. The sensor consists of a stabilised gimbal and was integrated together with a LEMUR remote electro-optical sight. A narrow laser slit is continuously scanned around the horizon to detect and locate optical threats. Detected threats are presented for the operator within the LEMUR presentation system, and by cueing a countermeasure laser installed in the LEMUR sensor housing threats can be defeated. Results obtained during a field demonstration of the optics detection sensor and the countermeasure laser will be presented. In addition, results obtained using a dual-channel optics detection system designed for false alarm reduction are also discussed.
Barriers to Implementing a Single Joint Combat Camouflage Uniform
2017-12-01
opportunities, threats (SWOT), and political, economic , social, and technological (PEST) analyses; examines the requirements and role of each of the...methodology applies strengths, weaknesses, opportunities, threats (SWOT), and political, economic , social, and technological (PEST) analyses...27 1. Political Factors ............................................................................27 2. Economic
An Optimal Mitigation Strategy Against the Asteroid Impact Threat with Short Warning Time
NASA Technical Reports Server (NTRS)
Wie, Bong; Barbee, Brent; Pitz, Alan; Kaplinger, Brian; Hawkins, Matt; Winkler, Tim; Premaratne, Pavithra; Vardaxis, George; Lyzhoft, Joshua; Zimmerman, Ben
2015-01-01
To develop an innovative yet practically implementable mitigation technique for the most probable impact threat of an asteroid or comet with short warning time (i.e., when we don't have sufficient warning times for a deflection mission).
Laser Threat Analysis System (LTAS)
NASA Astrophysics Data System (ADS)
Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.
2002-11-01
LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.
Airport Ground Access Planning Guide
DOT National Transportation Integrated Search
1980-07-01
Airport access has been identified by some airport authorities as a potential threat to the growth of aviation. In order to help airport planners and local authorities define the critical elements of an access problem and identify improvement project...
Naimoli, Joseph F; Saxena, Sweta; Hatt, Laurel E; Yarrow, Kristina M; White, Trenton M; Ifafore-Calfee, Temitayo
2018-01-01
In 2013, Hafner and Shiffman applied Kingdon's public policy process model to explain the emergence of global attention to health system strengthening (HSS). They questioned, however, HSS's sustainability on the global health policy agenda, citing various concerns. Guided by the Grindle and Thomas interactive model of policy implementation, we advance and elaborate a proposition: a confluence of developments will contribute to maintaining HSS's prominent place on the agenda until at least 2030. Those developments include (1) technical, managerial, financial, and political responses to unpredictable public health crises that imperil the routine functioning of health systems, such as the 2014-2015 Ebola virus disease (Ebola) epidemic in West Africa; (2) similar responses to non-crisis situations requiring fully engaged, robust health systems, such as the pursuit of the new Sustainable Development Goal for health (SDG3); and (3) increased availability of new knowledge about system change at macro, meso, and micro levels and its effects on people's health and well-being. To gauge the accuracy of our proposition, we carried out a speculative assessment of credible threats to our premise by discussing all of the Hafner-Shiffman concerns. We conclude that (1) the components of our proposition and other forces that have the potential to promote continuing attention to HSS are of sufficient strength to counteract these concerns, and (2) prospective monitoring of HSS agenda status and further research on agenda sustainability can increase confidence in our threat assessment. © The Author 2017. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Army Guide to Deployment Health: Health Threat Information and Countermeasures
2012-01-01
TITLE AND SUBTITLE Army Guide to Deployment Health 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR (S) 5d. PROJECT...duration of deployment, whichever is less (amount required may vary – confirm individual requirements with a health care provider, medical authority ...feeding rodents can contaminate food and they can spread serious life-threatening diseases such as Hantavirus or plague. ` do not allow trash or garbage
COLLABORATIVE GUIDE: A REEF MANAGER'S GUIDE TO ...
Innovative strategies to conserve the world's coral reefs are included in a new guide released today by NOAA, and the Australian Great Barrier Reef Marine Park Authority, with author contributions from a variety of international partners from government agencies, non-governmental organizations, and academic institutions. Referred to as A Reef Manager's Guide to Coral Bleaching, the guide will provide coral reef managers with the latest scientific information on the causes of coral bleaching and new management strategies for responding to this significant threat to coral reef ecosystems. Innovative strategies to conserve the world's coral reefs are included in a new guide released today by NOAA, and the Australian Great Barrier Reef Marine Park Authority, with author contributions from a variety of international partners from government agencies, non-governmental organizations, and academic institutions. Dr. Jordan West, of the National Center for Environmental Assessment, was a major contributor to the guide. Referred to as
Automatic generation of computable implementation guides from clinical information models.
Boscá, Diego; Maldonado, José Alberto; Moner, David; Robles, Montserrat
2015-06-01
Clinical information models are increasingly used to describe the contents of Electronic Health Records. Implementation guides are a common specification mechanism used to define such models. They contain, among other reference materials, all the constraints and rules that clinical information must obey. However, these implementation guides typically are oriented to human-readability, and thus cannot be processed by computers. As a consequence, they must be reinterpreted and transformed manually into an executable language such as Schematron or Object Constraint Language (OCL). This task can be difficult and error prone due to the big gap between both representations. The challenge is to develop a methodology for the specification of implementation guides in such a way that humans can read and understand easily and at the same time can be processed by computers. In this paper, we propose and describe a novel methodology that uses archetypes as basis for generation of implementation guides. We use archetypes to generate formal rules expressed in Natural Rule Language (NRL) and other reference materials usually included in implementation guides such as sample XML instances. We also generate Schematron rules from NRL rules to be used for the validation of data instances. We have implemented these methods in LinkEHR, an archetype editing platform, and exemplify our approach by generating NRL rules and implementation guides from EN ISO 13606, openEHR, and HL7 CDA archetypes. Copyright © 2015 Elsevier Inc. All rights reserved.
Combatting Stereotype Threat: College Math Classroom Interventions
ERIC Educational Resources Information Center
Pretty, Joelle
2017-01-01
This research provides new insight into stereotype threat by examining a real-world intervention in community college classrooms. Practitioners need information about which interventions work in authentic school settings to implement them and begin to bring educational equity to historically marginalized students. The experimental study examined…
Security Recommendations for mHealth Apps: Elaboration of a Developer's Guide.
Morera, Enrique Pérez; de la Torre Díez, Isabel; Garcia-Zapirain, Begoña; López-Coronado, Miguel; Arambarri, Jon
2016-06-01
Being the third fastest-growing app category behind games and utilities, mHealth apps are changing the healthcare model, as medicine today involves the data they compile and analyse, information known as Big Data. However, the majority of apps are lacking in security when gathering and dealing with the information, which becomes a serious problem. This article presents a guide regarding security solution, intended to be of great use for developers of mHealth apps. In August 2015 current mobile health apps were sought out in virtual stores such as Android Google Play, Apple iTunes App Store etc., in order to classify them in terms of usefulness. After this search, the most widespread weaknesses in the field of security in the development of these mobile apps were examined, based on sources such as the "OWASP Mobile Security Project, the initiative recently launched by the Office of Civil Rights (OCR), and other articles of scientific interest. An informative, elemental guide has been created for the development of mHealth apps. It includes information about elements of security and its implementation on different levels for all types of mobile health apps based on the data that each app manipulates, the associated calculated risk as a result of the likelihood of occurrence and the threat level resulting from its vulnerabilities - high level (apps for monitoring, diagnosis, treatment and care) from 6 ≤ 9, medium level (calculator, localizer and alarm) from 3 ≤ 6 and low level (informative and educational apps) from 0 ≤ 3. The guide aims to guarantee and facilitate security measures in the development of mobile health applications by programmers unconnected to the ITC and professional health areas.
Chambers, Jeanne C.; Maestas, Jeremy D.; Pyke, David A.; Boyd, Chad S.; Pellant, Mike; Wuenschel, Amarina
2017-01-01
Conservation of imperiled species often demands addressing a complex suite of threats that undermine species viability. Regulatory approaches, such as the US Endangered Species Act (1973), tend to focus on anthropogenic threats through adoption of policies and regulatory mechanisms. However, persistent ecosystem-based threats, such as invasive species and altered disturbance regimes, remain critical issues for most at-risk species considered to be conservation-reliant. We describe an approach for addressing persistent ecosystem threats to at-risk species based on ecological resilience and resistance concepts that is currently being used to conserve greater sage-grouse (Centrocercus urophasianus)and sagebrush ecosystems. The approach links biophysical indicators of ecosystem resilience and resistance with species-specific population and habitat requisites in a risk-based framework to identify priority areas for management and guide allocation of resources to manage persistent ecosystem-based threats. US federal land management and natural resource agencies have adopted this framework as a foundation for prioritizing sage-grouse conservation resources and determining effective restoration and management strategies. Because threats and strategies to address them cross-cut program areas, an integrated approach that includes wildland fire operations, postfire rehabilitation, fuels management, and habitat restoration is being used. We believe this approach is applicable to species conservation in other largely intact ecosystems with persistent, ecosystem-based threats.
ERIC Educational Resources Information Center
National Association of College and University Business Officers (NJ1), 2001
2001-01-01
This guide was prepared for public institution business officers as a supplement to the "Guide to Implementation of GASB Statement 54 on Basic Financial Statements--and Management's Discussion and Analysis--for State and Local Governments, published in April 2000 by the Governmental Accounting Standards Board (GASB) on GASB Statements 34 and 35.…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-01
... Request for Review of ACF Disaster Case Management Implementation Guide; Office of Human Services... in the Federal Register for comments on the ACF Disaster Case Management Implementation Guide, dated December 2009. Disaster case management is the process of organizing and providing a timely, coordinated...
Spot Rare Occurrences More Frequently by Lessening Inattentional Blindness
2013-04-29
with weapon slip through airport security , not hearing a siren when driving conditions are complicated by fog, or not seeing explosives on a truck...awareness of potential actual threats has been implemented in airport security for several years. The effectiveness of this Threat Image Projection
NASA Technical Reports Server (NTRS)
Wie, Bong; Barbee, Brent; Pitz, Alan; Kaplinger, Brian; Hawkins, Matt; Winkler, Tim; Premaratne, Pavithra; Vardaxis, George; Lyzhoft, Joshua; Zimmerman, Ben
2015-01-01
To develop an innovative yet practically implementable mitigation technique for the most probable impact threat of an asteroid or comet with short warning time(i.e., when we don't have sufficient warning times for a deflection mission)
Global Threats to Child Safety.
Mace, Sharon E
2016-02-01
Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. Copyright © 2016 Elsevier Inc. All rights reserved.
2007-04-23
The United States faces serious public health threats from the deliberate use of weapons of mass destruction (WMD)--chemical, biological, radiological, or nuclear (CBRN)--by hostile States or terrorists, and from naturally emerging infectious diseases that have a potential to cause illness on a scale that could adversely impact national security. Effective strategies to prevent, mitigate, and treat the consequences of CBRN threats is an integral component of our national security strategy. To that end, the United States must be able to rapidly develop, stockpile, and deploy effective medical countermeasures to protect the American people. The HHS Public Health Emergency Medical Countermeasures Enterprise (PHEMCE) has taken a holistic, end-to-end approach that considers multiple aspects of the medical countermeasures mission including research, development, acquisition, storage, maintenance, deployment, and guidance for utilization. Phase one of this approach established the HHS PHEMCE Strategy for Chemical, Biological, Radiological, and Nuclear Threats (HHS PHEMCE Strategy). The HHS PHEMCE Strategy, published in the Federal Register on March 20, 2007, described a framework of strategic policy goals and objectives for identifying medical countermeasure requirements and establishing priorities for medical countermeasure evaluation, development and acquisition. These strategic policy goals and objectives were used to establish the Four Pillars upon which this HHS Public Health Emergency Medical Countermeasures Enterprise Implementation Plan (HHS PHEMCE Implementation Plan) is based. The HHS PHEMCE Implementation Plan considers the full spectrum of medical countermeasures-related activities, including research, development, acquisition, storage/maintenance, deployment, and utilization. The HHS PHEMCE Implementation Plan is consistent with the President's Biodefense for the 21st Century and is aligned with the National Strategy for Medical Countermeasures against Weapons of Mass Destruction.
Analysis of CSIRT/SOC Incidents and Continuous Monitoring of Threats
NASA Technical Reports Server (NTRS)
Wang, John; Ishisoko, Katsutoshi C.
2012-01-01
Security Operations Centers (SOC) contain a wealth of data which, if properly classified and tagged upfront, can yield a wealth of real-time information about your organizations IT Security posture, risks, and threats. These include answers to relevant and actionable questions such as: What are our biggest threats? Who is attacking us and what do they want? What controls are working or not working? How effective was the new technology we just implemented? What is our ROI?
Information and the War against Terrorism, Part V: The Business Implications.
ERIC Educational Resources Information Center
Strickland, Lee S.
2002-01-01
Discussion of changes in business information protection since the September 11th terrorist attacks focuses on three planning goals: continuing to serve the customer in times of threat; implementing new communication paradigms; and establishing a comprehensive knowledge redundancy program. Considers threats other than terrorism, risk management…
8 CFR 208.18 - Implementation of the Convention Against Torture.
Code of Federal Regulations, 2010 CFR
2010-01-01
... actions authorized by law, including the death penalty, but do not include sanctions that defeat the... procedures calculated to disrupt profoundly the senses or the personality; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or...
8 CFR 208.18 - Implementation of the Convention Against Torture.
Code of Federal Regulations, 2012 CFR
2012-01-01
... actions authorized by law, including the death penalty, but do not include sanctions that defeat the... procedures calculated to disrupt profoundly the senses or the personality; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or...
8 CFR 208.18 - Implementation of the Convention Against Torture.
Code of Federal Regulations, 2013 CFR
2013-01-01
... actions authorized by law, including the death penalty, but do not include sanctions that defeat the... procedures calculated to disrupt profoundly the senses or the personality; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or...
8 CFR 208.18 - Implementation of the Convention Against Torture.
Code of Federal Regulations, 2014 CFR
2014-01-01
... actions authorized by law, including the death penalty, but do not include sanctions that defeat the... procedures calculated to disrupt profoundly the senses or the personality; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or...
8 CFR 1208.18 - Implementation of the Convention Against Torture.
Code of Federal Regulations, 2014 CFR
2014-01-01
... imposed sanctions and other enforcement actions authorized by law, including the death penalty, but do not...; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or suffering, or the administration or application of mind altering...
8 CFR 1208.18 - Implementation of the Convention Against Torture.
Code of Federal Regulations, 2013 CFR
2013-01-01
... imposed sanctions and other enforcement actions authorized by law, including the death penalty, but do not...; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or suffering, or the administration or application of mind altering...
8 CFR 1208.18 - Implementation of the Convention Against Torture.
Code of Federal Regulations, 2012 CFR
2012-01-01
... imposed sanctions and other enforcement actions authorized by law, including the death penalty, but do not...; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or suffering, or the administration or application of mind altering...
8 CFR 208.18 - Implementation of the Convention Against Torture.
Code of Federal Regulations, 2011 CFR
2011-01-01
... actions authorized by law, including the death penalty, but do not include sanctions that defeat the... procedures calculated to disrupt profoundly the senses or the personality; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or...
8 CFR 1208.18 - Implementation of the Convention Against Torture.
Code of Federal Regulations, 2010 CFR
2010-01-01
... imposed sanctions and other enforcement actions authorized by law, including the death penalty, but do not...; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or suffering, or the administration or application of mind altering...
8 CFR 1208.18 - Implementation of the Convention Against Torture.
Code of Federal Regulations, 2011 CFR
2011-01-01
... imposed sanctions and other enforcement actions authorized by law, including the death penalty, but do not...; (iii) The threat of imminent death; or (iv) The threat that another person will imminently be subjected to death, severe physical pain or suffering, or the administration or application of mind altering...
Nilsen, Etty R; Dugstad, Janne; Eide, Hilde; Gullslett, Monika Knudsen; Eide, Tom
2016-11-15
Industrialized and welfare societies are faced with vast challenges in the field of healthcare in the years to come. New technological opportunities and implementation of welfare technology through co-creation are considered part of the solution to this challenge. Resistance to new technology and resistance to change is, however, assumed to rise from employees, care receivers and next of kin. The purpose of this article is to identify and describe forms of resistance that emerged in five municipalities during a technology implementation project as part of the care for older people. This is a longitudinal, single-embedded case study with elements of action research, following an implementation of welfare technology in the municipal healthcare services. Participants included staff from the municipalities, a network of technology developers and a group of researchers. Data from interviews, focus groups and participatory observation were analysed. Resistance to co-creation and implementation was found in all groups of stakeholders, mirroring the complexity of the municipal context. Four main forms of resistance were identified: 1) organizational resistance, 2) cultural resistance, 3) technological resistance and 4) ethical resistance, each including several subforms. The resistance emerges from a variety of perceived threats, partly parallel to, partly across the four main forms of resistance, such as a) threats to stability and predictability (fear of change), b) threats to role and group identity (fear of losing power or control) and c) threats to basic healthcare values (fear of losing moral or professional integrity). The study refines the categorization of resistance to the implementation of welfare technology in healthcare settings. It identifies resistance categories, how resistance changes over time and suggests that resistance may play a productive role when the implementation is organized as a co-creation process. This indicates that the importance of organizational translation between professional cultures should not be underestimated, and supports research indicating that focus on co-initiation in the initial phase of implementation projects may help prevent different forms of resistance in complex co-creation processes.
Effects of threat management interactions on conservation priorities.
Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P
2015-12-01
Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.
AASHTO transportation asset management guide : a focus on implementation executive summary.
DOT National Transportation Integrated Search
2013-06-01
This AASHTO Transportation Asset Management Executive Summary serves as a companion to the AASHTO Transportation : Asset Management GuideA Focus on Implementation, which takes as a starting point the Transportation : Asset Management Guide publish...
Ecological and evolutionary approaches to managing honeybee disease.
Brosi, Berry J; Delaplane, Keith S; Boots, Michael; de Roode, Jacobus C
2017-09-01
Honeybee declines are a serious threat to global agricultural security and productivity. Although multiple factors contribute to these declines, parasites are a key driver. Disease problems in honeybees have intensified in recent years, despite increasing attention to addressing them. Here we argue that we must focus on the principles of disease ecology and evolution to understand disease dynamics, assess the severity of disease threats, and control these threats via honeybee management. We cover the ecological context of honeybee disease, including both host and parasite factors driving current transmission dynamics, and then discuss evolutionary dynamics including how beekeeping management practices may drive selection for more virulent parasites. We then outline how ecological and evolutionary principles can guide disease mitigation in honeybees, including several practical management suggestions for addressing short- and long-term disease dynamics and consequences.
Military Advice and Civil-Military Relations
2010-05-01
currying domestic favor and in times of low security threat, politicians often will promise cuts in military budgets while simultaneously “pursuing...lighter force was based on the lessons from the invasion of Afghanistan. In that conflict, precision guided weapons and unmanned aerial drones
Military Advice and Civil-Military Relations
2010-05-21
currying domestic favor and in times of low security threat, politicians often will promise cuts in military budgets while simultaneously “pursuing...lighter force was based on the lessons from the invasion of Afghanistan. In that conflict, precision guided weapons and unmanned aerial drones
Meuter, Renata F I; Lacherez, Philippe F
2016-03-01
We aimed to assess the impact of task demands and individual characteristics on threat detection in baggage screeners. Airport security staff work under time constraints to ensure optimal threat detection. Understanding the impact of individual characteristics and task demands on performance is vital to ensure accurate threat detection. We examined threat detection in baggage screeners as a function of event rate (i.e., number of bags per minute) and time on task across 4 months. We measured performance in terms of the accuracy of detection of Fictitious Threat Items (FTIs) randomly superimposed on X-ray images of real passenger bags. Analyses of the percentage of correct FTI identifications (hits) show that longer shifts with high baggage throughput result in worse threat detection. Importantly, these significant performance decrements emerge within the first 10 min of these busy screening shifts only. Longer shift lengths, especially when combined with high baggage throughput, increase the likelihood that threats go undetected. Shorter shift rotations, although perhaps difficult to implement during busy screening periods, would ensure more consistently high vigilance in baggage screeners and, therefore, optimal threat detection and passenger safety. © 2015, Human Factors and Ergonomics Society.
Crisis in the Philippines: A Threat to U.S. Interests.
ERIC Educational Resources Information Center
Gregor, A. James
The special relationship between the United States and the Philippines is chronicled, and the potential threats to that relationship are exposed and evaluated. Special attention is paid to imposition of martial law by Marcos from 1972-1981. The human rights of the Filipino people during martial law, development programs implemented by Marcos…
Creating Safer Campuses through Implementation of Threat-Assessment Teams: Are They Enough?
ERIC Educational Resources Information Center
Toppe, Michele L.
2017-01-01
According to higher education policy experts, "Campus threat assessment is not merely a recommendation, but an emerging standard of care." However, despite evidence of the emergence of this standard and the consistency of recommendations that comport with those made by the Virginia Tech Review Panel, college campuses continue to vary…
School Behavioral Threat Assessment and Management
ERIC Educational Resources Information Center
Louvar Reeves, Melissa A.; Brock, Stephen E.
2018-01-01
While schools are safer today than in years past, one act of school violence is one too many. Recent reports have conveyed the importance of schools developing and implementing protocols and procedures to prevent or mitigate school violence. To assist with this task, this article addresses behavioral threat assessment and management (BTAM) in the…
Benefits and Threats to Using Social Media for Presenting and Implementing Evidence.
Cook, Chad E; O'Connell, Neil E; Hall, Toby; George, Steven Z; Jull, Gwendolen; Wright, Alexis A; Girbés, Enrique Lluch; Lewis, Jeremy; Hancock, Mark
2018-01-01
As a potential high-yield tool for disseminating information that can reach many people, social media is transforming how clinicians, the public, and policy makers are educated and find new knowledge associated with research-related information. Social media is available to all who access the internet, reducing selected barriers to acquiring original source documents such as journal articles or books and potentially improving implementation-the process of formulating a conclusion and moving on that decision. The use of social media for evidence dissemination/implementation of research has both benefits and threats. It is the aim of this Viewpoint to provide a balanced view of each. J Orthop Sports Phys Ther 2018;48(1):3-7. doi:10.2519/jospt.2018.0601.
SARS: An Emerging Global Microbial Threat.
Hughes, James M.
2004-01-01
In March 2003, the Institute of Medicine published an update to its 1992 landmark report on emerging infections. The new report, Microbial Threats to Health: Emergence, Detection, and Response, describes the current spectrum of global microbial threats, factors affecting their emergence or resurgence, and measures that should be undertaken to effectively address them. Coincident with this publication came increasing reports of severe atypical pneumonia of unknown etiology among persons in southeast Asia. This new disease, designated severe acute respiratory syndrome (SARS), spread globally in a matter of weeks, infecting primarily close contacts of index patients (e.g., household members and healthcare workers caring for index patients) but also resulting in community transmission in some areas. An unprecedented worldwide collaborative effort was undertaken to determine the cause of the illness and implement prevention measures. A previously unrecognized coronavirus was identified as the causative agent, and health officials throughout the world struggled to implement measures to contain its spread, including isolation of suspect SARS cases and quarantine of exposed persons. The emergence of SARS is a timely reminder of the need to expect the unexpected and to ensure strong national and global public health partnerships when preparing for and responding to infectious diseases. Effectively addressing the threat of SARS will require enhanced global infectious disease surveillance, the development of rapid diagnostics, new therapies, and vaccines, implementation of aggressive evidence-based infection control strategies, and effective communication. Images Fig. 2 Fig. 3 PMID:17060979
ERIC Educational Resources Information Center
Therriault, Susan Bowles; Heppen, Jessica; O'Cummings, Mindee; Fryer, Lindsay; Johnson, Amy
2010-01-01
This Early Warning System (EWS) Implementation Guide is a supporting document for schools and districts that are implementing the National High School Center's Early Warning System (EWS) Tool v2.0. Developed by the National High School Center at the American Institutes for Research (AIR), the guide and tool support the establishment and…
Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats
1998-04-01
story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched
Combined impacts of global changes on biodiversity across the USA
Bellard, C.; Leclerc, C.; Courchamp, F.
2015-01-01
Most studies of the effects of global changes on biodiversity focus on a single threat, but multiple threats lead to species extinction. We lack spatially explicit assessments of the intensity of multiple threats and their impacts on biodiversity. Here, we used a novel metric of cumulative threats and impacts to assess the consequences of multiple threats on 196 endemic species across the USA. We predict that large areas with high cumulative impact scores for amphibians, birds, mammals, and reptiles will be concentrated in the eastern part of the USA by the 2050 s and 2080 s. These high cumulative impact values are due mainly to the presence of invasive species, climate change, cropland and pasture areas; additionally, a significant proportion of endemic species are vulnerable to some of these threats where they occur. This analysis provides a useful means of identifying where conservation measures and monitoring programs that should consider multiple threats should be implemented in the future. PMID:26149694
Striving for balance between family and work demands among Iranian nurses.
Lagerström, Monica; Josephson, Malin; Arsalani, Narges; Fallahi-Khoshknab, Masoud
2010-04-01
The study reported here explored Iranian nurses' experience of managing work and family roles. Grounded theory method guided the data collection and data analysis from both individual and focus group interviews. Five categories emerged: family role, working conditions, seeking support, perceiving dissatisfaction, and perceiving threats to health. The core concept that emerged was striving for balance between family and work demands. In the work-family role the Iranian nurses faced significant pressures, and they mostly relied on their own capabilities to create balance, often neglecting their own needs. This resulted in perceived dissatisfaction and health threats.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-01
... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Laboratory Animal Welfare: Adoption and Implementation of the Eighth Edition of the Guide for the Care and Use of Laboratory Animals... the Guide for the Care and Use of Laboratory Animals (Guide) and has determined to adopt the 8th...
ERIC Educational Resources Information Center
Washington Office of the State Superintendent of Public Instruction, Olympia. Div. of Vocational-Technical and Adult Education Services.
This guide for implementing performance-based curriculum is intended to teach students decision-making driving. Heavy emphasis is put on the tasks and concepts involving traffic flow tasks (interacting with other highway users) and the functions and factors that affect that interaction. It is a "90-hour" guide, that is, the average student needs…
Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abbott, Shannon
In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, andmore » proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.« less
ERIC Educational Resources Information Center
Enright, Margaret; Davidson, Tasha
These materials consist of: (1) a planning and implementation handbook designed to help Head Start managers better understand, plan, and implement a more comprehensive aproach to health education and health promotion--one that addresses local needs and tailors programs to the needs of the children, parents, and staff; and (2) a resource guide that…
Safe teleradiology: information assurance as project planning methodology.
Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2005-01-01
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.
NASA Astrophysics Data System (ADS)
Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.
2016-03-01
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.
Weis, Janne; Zoffmann, Vibeke; Egerod, Ingrid
2014-12-01
To evaluate and adjust systematic implementation of guided family-centred care in a neonatal intensive care unit. Family-centred care is valued in neonatal intensive care units internationally, but innovative strategies are needed to realise the principles. Guided family-centred care was developed to facilitate person-centred communication by bridging the gap between theory and practice in family-centred care. Main mechanisms of guided family-centred care are structured dialogue, reflection and person-centred communication. Qualitative and quantitative data were used to monitor participatory implementation of a systematic approach to training and certification of nurses delivering guided family-centred care. Systematic implementation of guided family-centred care included workshops, supervised delivery and certification. Evaluation and adjustment of nurse adherence to guided family-centred care was conducted by monitoring (1) knowledge, (2) delivery, (3) practice uptake and (4) certification. Implementation was improved by the development of a strategic framework and by adjusting the framework according to the real-life context of a busy neonatal care unit. Promoting practice uptake was initially underestimated, but nurse guided family-centred care training was improved by increasing the visibility of the study in the unit, demonstrating intervention progress to the nurses and assuring a sense of ownership among nurse leaders and nonguided-family-centred-care-trained nurses. An adjusted framework for guided family-centred care implementation was successful in overcoming barriers and promoting facilitators. Insights gained from our pioneering work might help nurses in a similar context to reach their goals of improving family-centred care. © 2014 John Wiley & Sons Ltd.
Ecological and evolutionary approaches to managing honey bee disease
Brosi, Berry J.; Delaplane, Keith S.; Boots, Michael; de Roode, Jacobus C.
2017-01-01
Honey bee declines are a serious threat to global agricultural security and productivity. While multiple factors contribute to these declines, parasites are a key driver. Disease problems in honey bees have intensified in recent years, despite increasing attention to addressing them. Here we argue that we must focus on the principles of disease ecology and evolution to understand disease dynamics, assess the severity of disease threats, and manage these threats via honey bee management. We cover the ecological context of honey bee disease, including both host and parasite factors driving current transmission dynamics, and then discuss evolutionary dynamics including how beekeeping management practices may drive selection for more virulent parasites. We then outline how ecological and evolutionary principles can guide disease mitigation in honey bees, including several practical management suggestions for addressing short- and long-term disease dynamics and consequences. PMID:29046562
Using a Learning Progression Framework to Assess and Evaluate Student Growth
ERIC Educational Resources Information Center
Briggs, Derek C.; Diaz-Bilello, Elena; Peck, Fred; Alzen, Jessica; Chattergoon, Rajendra; Johnson, Raymond
2015-01-01
This report describes the use of a Learning Progression Framework (LPF) to support the Student Learning Objectives (SLO) process. The report highlights a few common threats we currently see in the SLO process implemented at various states and districts, and offers the LPF as a possible solution for addressing these threats. This report was…
Cyber threats within civil aviation
NASA Astrophysics Data System (ADS)
Heitner, Kerri A.
Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.
Executives "Plug in" to Electronic Commerce
ERIC Educational Resources Information Center
Education & Training, 2002
2002-01-01
Describes a programme, developed by FT Knowledge and the Wharton School of the University of Pennsylvania, USA, to guide managers through the opportunities and threats presented by electronic commerce. Focuses on areas such as marketing, electronic retailing, pricing, product design, supply chain management and communication. Highlights how the…
Despair and Personal Power in the Nuclear Age.
ERIC Educational Resources Information Center
Macy, Joanna Rogers
This guide to personal empowerment provides 47 exercises for dealing with feelings of despair, isolation, and powerlessness associated with the growing threat of nuclear war, progressive destruction of the environment, and unprecedented human misery. The first of eight chapters describes psychological responses. to planetary perils and discusses…
A Resource Guide Identifying Technology Tools for Schools. Appendix
ERIC Educational Resources Information Center
Fox, Christine; Jones, Rachel
2009-01-01
SETDA and NASTID's "Technology Tools for Schools Resource Guide" provides definitions of key technology components and relevant examples, where appropriate as a glossary for educators. The guide also presents essential implementation and infrastructure considerations that decision makers should think about when implementing technology in schools.…
Guide of Ideas for Planning and Implementing Intergenerational Projects
ERIC Educational Resources Information Center
Pinto, Teresa Almeida; Marreel, Iris; Hatton-Yeo, Alan
2009-01-01
"Guide of Ideas for Planning and Implementing Intergenerational Projects," is for all professionals that are or wish to be enrolled in the development of intergenerational activities. This "Guide" is the main product of the Project MATES--Mainstreaming Intergenerational Solidarity, co-financed by the Lifelong Learning…
Security risks associated with radio frequency identification in medical environments.
Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio
2012-12-01
Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.
NASA Technical Reports Server (NTRS)
Spurce, Joseph P.; Hargrove, William; Ryan, Robert E.; Smooth, James C.; Prados, Don; McKellip, Rodney; Sader, Steven A.; Gasser, Jerry; May, George
2008-01-01
This viewgraph presentation reviews a project, the goal of which is to study the potential of MODIS data for monitoring historic gypsy moth defoliation. A NASA/USDA Forest Service (USFS) partnership was formed to perform the study. NASA is helping USFS to implement satellite data products into its emerging Forest Threat Early Warning System. The latter system is being developed by the USFS Eastern and Western Forest Threat Assessment Centers. The USFS Forest Threat Centers want to use MODIS time series data for regional monitoring of forest damage (e.g., defoliation) preferably in near real time. The study's methodology is described, and the results of the study are shown.
Paradis, Tiffany; St-Louis, Etienne; Landry, Tara; Poenaru, Dan
2018-02-21
The benefits of trauma registries have been well described. The crucial data they provide may guide injury prevention strategies, inform resource allocation, and support advocacy and policy. This has been shown to reduce trauma-related mortality in various settings. Trauma remains a leading cause of mortality in low- and middle-income countries (LMICs). However, the implementation of trauma registries in LMICs can be challenging due to lack of funding, specialized personnel, and infrastructure. This study explores strategies for successful trauma registry implementation in LMICs. The protocol was registered a priori (CRD42017058586). A peer-reviewed search strategy of multiple databases will be developed with a senior librarian. As per PRISMA guidelines, first screen of references based on abstract and title and subsequent full-text review will be conducted by two independent reviewers. Disagreements that cannot be resolved by discussion between reviewers shall be arbitrated by the principal investigator. Data extraction will be performed using a pre-defined data extraction sheet. Finally, bibliographies of included articles will be hand-searched. Studies of any design will be included if they describe or review development and implementation of a trauma registry in LMICs. No language or period restrictions will be applied. Summary statistics and qualitative meta-narrative analyses will be performed. The significant burden of trauma in LMIC environments presents unique challenges and limitations. Adapted strategies for deployment and maintenance of sustainable trauma registries are needed. Our methodology will systematically identify recommendations and strategies for successful trauma registry implementation in LMICs and describe threats and barriers to this endeavor. The protocol was registered on the PROSPERO international prospective register of systematic reviews ( CRD42017058586 ).
Expectancy and surprise predict neural and behavioral measures of attention to threatening stimuli
Browning, Michael; Harmer, Catherine J.
2012-01-01
Attention is preferentially deployed toward those stimuli which are threatening and those which are surprising. The current paper examines the intersection of these phenomena; how do expectations about the threatening nature of stimuli influence the deployment of attention? The predictions tested were that individuals would direct attention toward stimuli which were expected to be threatening (regardless of whether they were or not) and toward stimuli which were surprising. As anxiety has been associated with deficient control of attention to threat, it was additionally predicted that high levels of trait anxiety would be associated with deficits in the use of threat-expectation to guide attention. During fMRI scanning, 29 healthy volunteers completed a simple task in which threat-expectation was manipulated by altering the frequency with which fearful or neutral faces were presented. Individual estimates of threat-expectation and surprise were created using a Bayesian computational model. The degree to which the model derived estimates of threat-expectation and surprise were able to explain both a behavioral measure of attention to the faces and activity in the visual cortex and anterior attentional control areas was then tested. As predicted, increased threat-expectation and surprise were associated with increases in both the behavioral and neuroimaging measures of attention to the faces. Additionally, regions of the orbitofrontal cortex and left amygdala were found to covary with threat-expectation whereas anterior cingulate and lateral prefrontal cortices covaried with surprise. Individuals with higher levels of trait anxiety were less able to modify neuroimaging measures of attention in response to threat-expectation. These results suggest that continuously calculated estimates of the probability of threat may plausibly be used to influence the deployment of visual attention and that use of this information is perturbed in anxious individuals. PMID:21945791
Marketing Internships: A Planning and Implementation Guide.
ERIC Educational Resources Information Center
Faught, Suzanne G.
This planning and implementation guide is designed to assist marketing educators and others supportive of marketing education. It begins with definitions of vocabulary of related terminology and descriptions of the four models of internships presented in the guide: full-year, rotation-type format; 1-semester, rotation-type format; full-year format…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-09
... Collection; Comment Request; Implementation of Vessel Speed Restrictions To Reduce the Threat of Ship... implementing speed restrictions to reduce the incidence and severity of ship collisions with North Atlantic... document that a deviation from the 10-knot speed limit was necessary for safe maneuverability under certain...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-11
... Technology Research'' (``The Menlo Report'') for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT) Project AGENCY: Science and Technology Directorate, DHS. ACTION: Response...
EPA's National Homeland Security Research Center (Office of Research and Development) and Water Protection Task Force (Office of Water) have jointly developed a draft analytical guide that may be used by laboratories to plan for and provide support to a drinking water utility...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Velsko, Stephan; Bates, Thomas
Despite numerous calls for improvement, the U.S. biosurveillance enterprise remains a patchwork of uncoordinated systems that fail to take advantage of the rapid progress in information processing, communication, and analytics made in the past decade. By synthesizing components from the extensive biosurveillance literature, we propose a conceptual framework for a national biosurveillance architecture and provide suggestions for implementation. The framework differs from the current federal biosurveillance development pathway in that it is not focused on systems useful for “situational awareness,” but is instead focused on the long-term goal of having true warning capabilities. Therefore, a guiding design objective is themore » ability to digitally detect emerging threats that span jurisdictional boundaries, because attempting to solve the most challenging biosurveillance problem first provides the strongest foundation to meet simpler surveillance objectives. Core components of the vision are: (1) a whole-of-government approach to support currently disparate federal surveillance efforts that have a common data need, including those for food safety, vaccine and medical product safety, and infectious disease surveillance; (2) an information architecture that enables secure, national access to electronic health records, yet does not require that data be sent to a centralized location for surveillance analysis; (3) an inference architecture that leverages advances in ‘big data’ analytics and learning inference engines—a significant departure from the statistical process control paradigm that underpins nearly all current syndromic surveillance systems; and, (4) an organizational architecture with a governance model aimed at establishing national biosurveillance as a critical part of the U.S. national infrastructure. Although it will take many years to implement, and a national campaign of education and debate to acquire public buy-in for such a comprehensive system, the potential benefits warrant increased consideration within the U.S. government.« less
Velsko, Stephan; Bates, Thomas
2016-06-17
Despite numerous calls for improvement, the U.S. biosurveillance enterprise remains a patchwork of uncoordinated systems that fail to take advantage of the rapid progress in information processing, communication, and analytics made in the past decade. By synthesizing components from the extensive biosurveillance literature, we propose a conceptual framework for a national biosurveillance architecture and provide suggestions for implementation. The framework differs from the current federal biosurveillance development pathway in that it is not focused on systems useful for “situational awareness,” but is instead focused on the long-term goal of having true warning capabilities. Therefore, a guiding design objective is themore » ability to digitally detect emerging threats that span jurisdictional boundaries, because attempting to solve the most challenging biosurveillance problem first provides the strongest foundation to meet simpler surveillance objectives. Core components of the vision are: (1) a whole-of-government approach to support currently disparate federal surveillance efforts that have a common data need, including those for food safety, vaccine and medical product safety, and infectious disease surveillance; (2) an information architecture that enables secure, national access to electronic health records, yet does not require that data be sent to a centralized location for surveillance analysis; (3) an inference architecture that leverages advances in ‘big data’ analytics and learning inference engines—a significant departure from the statistical process control paradigm that underpins nearly all current syndromic surveillance systems; and, (4) an organizational architecture with a governance model aimed at establishing national biosurveillance as a critical part of the U.S. national infrastructure. Although it will take many years to implement, and a national campaign of education and debate to acquire public buy-in for such a comprehensive system, the potential benefits warrant increased consideration within the U.S. government.« less
Ager, Alastair; Blake, Courtney; Stark, Lindsay; Daniel, Tsufit
2011-12-01
The paper reviews the experiences of conducting child protection assessments across four humanitarian emergencies where violence and insecurity, directly or indirectly, posed a major threat to children. We seek to identify common themes emerging from these experiences and propose ways to guide the planning and implementation of assessments that effectively identify, and suggest means of response to, threats to children's rights and well-being in emergency settings. In the context of a field evaluation of an inter-agency resource kit, crisis settings where an inter-agency assessment of child protection had been considered in the period August 2008 to July 2010 were identified. Email correspondence, telephone-based structured interviews and documentary review collated information from child protection coordinating agencies from a total of twenty sites, the minority of which had proceeded to complete an assessment. This paper presents case studies of the experience in Georgia (following the conflict between Russian and Georgian forces in August 2008), Gaza (following the Israeli military incursion beginning in December 2008), Haiti (following the earthquake of January 2010), and Yemen (following the ceasefire agreement between the government and rebel forces in early 2010). CASE STUDY FINDINGS: In each setting the context of the humanitarian emergency is outlined. The processes of the planning (and, where appropriate, implementation) of the child protection assessment is described. Where available, the findings of the child protection assessment and their use in shaping interventions are summarized. Case studies document experience across humanitarian settings widely divergent in terms of the nature of the emergency, social-political context, and institutional capacity. Despite such differences, analysis suggests securing inter-agency coordination, preparation and capacity building, and means of ensuring timeliness of findings to be recurrent themes in the effective mobilization of an effective assessment able to inform programming. Copyright © 2011 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Kathman, Jacob D.; Wood, Reed M.
2011-01-01
How do third-party interventions affect the severity of mass killings? The authors theorize that episodes of mass killing are the consequence of two factors: (1) the threat perceptions of the perpetrators and (2) the cost of implementing genocidal policies relative to other alternatives. To reduce genocidal hostilities, interveners must address…
Mozaffar, Hajar; Cresswell, Kathrin M; Williams, Robin; Bates, David W; Sheikh, Aziz
2017-09-01
Hospital electronic prescribing (ePrescribing) systems offer a wide range of patient safety benefits. Like other hospital health information technology interventions, however, they may also introduce new areas of risk. Despite recent advances in identifying these risks, the development and use of ePrescribing systems is still leading to numerous unintended consequences, which may undermine improvement and threaten patient safety. These negative consequences need to be analysed in the design, implementation and use of these systems. We therefore aimed to understand the roots of these reported threats and identify candidate avoidance/mitigation strategies. We analysed a longitudinal, qualitative study of the implementation and adoption of ePrescribing systems in six English hospitals, each being conceptualised as a case study. Data included semistructured interviews, observations of implementation meetings and system use, and a collection of relevant documents. We analysed data first within and then across the case studies. Our dataset included 214 interviews, 24 observations and 18 documents. We developed a taxonomy of factors underlying unintended safety threats in: (1) suboptimal system design, including lack of support for complex medication administration regimens, lack of effective integration between different systems, and lack of effective automated decision support tools; (2) inappropriate use of systems-in particular, too much reliance on the system and introduction of workarounds; and (3) suboptimal implementation strategies resulting from partial roll-outs/dual systems and lack of appropriate training. We have identified a number of system and organisational strategies that could potentially avoid or reduce these risks. Imperfections in the design, implementation and use of ePrescribing systems can give rise to unintended consequences, including safety threats. Hospitals and suppliers need to implement short- and long-term strategies in terms of the technology and organisation to minimise the unintended safety risks. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-26
... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Implementation of the... Institutes of Health (NIH) is providing guidance to Public Health Service (PHS) awardee institutions on implementation of the revised International Guiding Principles for Biomedical Research Involving Animals...
Application of science-based restoration planning to a desert river system.
Laub, Brian G; Jimenez, Justin; Budy, Phaedra
2015-06-01
Persistence of many desert river species is threatened by a suite of impacts linked to water infrastructure projects that provide human water security where water is scarce. Many desert rivers have undergone regime shifts from spatially and temporally dynamic ecosystems to more stable systems dominated by homogenous physical habitat. Restoration of desert river systems could aid in biodiversity conservation, but poses formidable challenges due to multiple threats and the infeasibility of recovery to pre-development conditions. The challenges faced in restoring desert rivers can be addressed by incorporating scientific recommendations into restoration planning efforts at multiple stages, as demonstrated here through an example restoration project. In particular, use of a watershed-scale planning process can identify data gaps and irreversible constraints, which aid in developing achievable restoration goals and objectives. Site-prioritization focuses limited the resources for restoration on areas with the greatest potential to improve populations of target organisms. Investment in research to understand causes of degradation, coupled with adoption of a guiding vision is critical for identifying feasible restoration actions that can enhance river processes. Setting monitoring as a project goal, developing hypotheses for expected outcomes, and implementing restoration as an experimental design will facilitate adaptive management and learning from project implementation. Involvement of scientists and managers during all planning stages is critical for developing process-based restoration actions and an implementation plan to maximize learning. The planning process developed here provides a roadmap for use of scientific recommendations in future efforts to recover dynamic processes in imperiled riverine ecosystems.
Application of Science-Based Restoration Planning to a Desert River System
NASA Astrophysics Data System (ADS)
Laub, Brian G.; Jimenez, Justin; Budy, Phaedra
2015-06-01
Persistence of many desert river species is threatened by a suite of impacts linked to water infrastructure projects that provide human water security where water is scarce. Many desert rivers have undergone regime shifts from spatially and temporally dynamic ecosystems to more stable systems dominated by homogenous physical habitat. Restoration of desert river systems could aid in biodiversity conservation, but poses formidable challenges due to multiple threats and the infeasibility of recovery to pre-development conditions. The challenges faced in restoring desert rivers can be addressed by incorporating scientific recommendations into restoration planning efforts at multiple stages, as demonstrated here through an example restoration project. In particular, use of a watershed-scale planning process can identify data gaps and irreversible constraints, which aid in developing achievable restoration goals and objectives. Site-prioritization focuses limited the resources for restoration on areas with the greatest potential to improve populations of target organisms. Investment in research to understand causes of degradation, coupled with adoption of a guiding vision is critical for identifying feasible restoration actions that can enhance river processes. Setting monitoring as a project goal, developing hypotheses for expected outcomes, and implementing restoration as an experimental design will facilitate adaptive management and learning from project implementation. Involvement of scientists and managers during all planning stages is critical for developing process-based restoration actions and an implementation plan to maximize learning. The planning process developed here provides a roadmap for use of scientific recommendations in future efforts to recover dynamic processes in imperiled riverine ecosystems.
Application of science-based restoration planning to a desert river system
Laub, Brian G.; Jimenez, Justin; Budy, Phaedra
2015-01-01
Persistence of many desert river species is threatened by a suite of impacts linked to water infrastructure projects that provide human water security where water is scarce. Many desert rivers have undergone regime shifts from spatially and temporally dynamic ecosystems to more stable systems dominated by homogenous physical habitat. Restoration of desert river systems could aid in biodiversity conservation, but poses formidable challenges due to multiple threats and the infeasibility of recovery to pre-development conditions. The challenges faced in restoring desert rivers can be addressed by incorporating scientific recommendations into restoration planning efforts at multiple stages, as demonstrated here through an example restoration project. In particular, use of a watershed-scale planning process can identify data gaps and irreversible constraints, which aid in developing achievable restoration goals and objectives. Site-prioritization focuses limited the resources for restoration on areas with the greatest potential to improve populations of target organisms. Investment in research to understand causes of degradation, coupled with adoption of a guiding vision is critical for identifying feasible restoration actions that can enhance river processes. Setting monitoring as a project goal, developing hypotheses for expected outcomes, and implementing restoration as an experimental design will facilitate adaptive management and learning from project implementation. Involvement of scientists and managers during all planning stages is critical for developing process-based restoration actions and an implementation plan to maximize learning. The planning process developed here provides a roadmap for use of scientific recommendations in future efforts to recover dynamic processes in imperiled riverine ecosystems.
The unfulfilled promise of public health: déjà vu all over again.
Fee, Elizabeth; Brown, Theodore M
2002-01-01
Many complain about public health's weak infrastructure and poor capacity to respond to threats of bioterrorism. Such complaints are but the anxiety-heightened expression of a periodic rediscovery of the deficiencies and unfulfilled promise of U.S. public health. An overview of more than two centuries suggests that where we are now with public health has been shaped by our earlier, limited, and crisis-focused responses to changing disease threats. We have failed to sustain progress in any coherent manner. If we do not wish to repeat past mistakes, we should learn lessons from the past to guide us in the future.
NASA Technical Reports Server (NTRS)
Collier, Richard S.
1997-01-01
This report describes finite difference computer calculations for the Space Shuttle Launch Pad which predict lightning induced electric currents and electric and magnetic fields caused by a lightning strike to the Lightning Protection System caternary wire. Description of possible lightning threats to Shuttle Payload components together with specifications for protection of these components, result from the calculation of lightning induced electric and magnetic fields inside and outside the during a lightning event. These fields also induce currents and voltages on cables and circuits which may be connected to, or a part of, shuttle payload components. These currents and voltages are also calculated. These threat levels are intended as a guide for designers of payload equipment to specify any shielding and/or lightning protection mitigation which may be required for payload components which are in the process of preparation or being transferred into the Shuttle Orbiter.
Multisensor data fusion for IED threat detection
NASA Astrophysics Data System (ADS)
Mees, Wim; Heremans, Roel
2012-10-01
In this paper we present the multi-sensor registration and fusion algorithms that were developed for a force protection research project in order to detect threats against military patrol vehicles. The fusion is performed at object level, using a hierarchical evidence aggregation approach. It first uses expert domain knowledge about the features used to characterize the detected threats, that is implemented in the form of a fuzzy expert system. The next level consists in fusing intra-sensor and inter-sensor information. Here an ordered weighted averaging operator is used. The object level fusion between candidate threats that are detected asynchronously on a moving vehicle by sensors with different imaging geometries, requires an accurate sensor to world coordinate transformation. This image registration will also be discussed in this paper.
Schuetz, Philipp; Wirz, Yannick; Sager, Ramon; Christ-Crain, Mirjam; Stolz, Daiana; Tamm, Michael; Bouadma, Lila; Luyt, Charles E; Wolff, Michel; Chastre, Jean; Tubach, Florence; Kristoffersen, Kristina B; Burkhardt, Olaf; Welte, Tobias; Schroeder, Stefan; Nobre, Vandack; Wei, Long; Bucher, Heiner C; Annane, Djillali; Reinhart, Konrad; Falsey, Ann R; Branche, Angela; Damas, Pierre; Nijsten, Maarten; de Lange, Dylan W; Deliberato, Rodrigo O; Oliveira, Carolina F; Maravić-Stojković, Vera; Verduri, Alessia; Beghé, Bianca; Cao, Bin; Shehabi, Yahya; Jensen, Jens-Ulrik S; Corti, Caspar; van Oers, Jos A H; Beishuizen, Albertus; Girbes, Armand R J; de Jong, Evelien; Briel, Matthias; Mueller, Beat
2018-01-01
In February, 2017, the US Food and Drug Administration approved the blood infection marker procalcitonin for guiding antibiotic therapy in patients with acute respiratory infections. This meta-analysis of patient data from 26 randomised controlled trials was designed to assess safety of procalcitonin-guided treatment in patients with acute respiratory infections from different clinical settings. Based on a prespecified Cochrane protocol, we did a systematic literature search on the Cochrane Central Register of Controlled Trials, MEDLINE, and Embase, and pooled individual patient data from trials in which patients with respiratory infections were randomly assigned to receive antibiotics based on procalcitonin concentrations (procalcitonin-guided group) or control. The coprimary endpoints were 30-day mortality and setting-specific treatment failure. Secondary endpoints were antibiotic use, length of stay, and antibiotic side-effects. We identified 990 records from the literature search, of which 71 articles were assessed for eligibility after exclusion of 919 records. We collected data on 6708 patients from 26 eligible trials in 12 countries. Mortality at 30 days was significantly lower in procalcitonin-guided patients than in control patients (286 [9%] deaths in 3336 procalcitonin-guided patients vs 336 [10%] in 3372 controls; adjusted odds ratio [OR] 0·83 [95% CI 0·70 to 0·99], p=0·037). This mortality benefit was similar across subgroups by setting and type of infection (p interactions >0·05), although mortality was very low in primary care and in patients with acute bronchitis. Procalcitonin guidance was also associated with a 2·4-day reduction in antibiotic exposure (5·7 vs 8·1 days [95% CI -2·71 to -2·15], p<0·0001) and a reduction in antibiotic-related side-effects (16% vs 22%, adjusted OR 0·68 [95% CI 0·57 to 0·82], p<0·0001). Use of procalcitonin to guide antibiotic treatment in patients with acute respiratory infections reduces antibiotic exposure and side-effects, and improves survival. Widespread implementation of procalcitonin protocols in patients with acute respiratory infections thus has the potential to improve antibiotic management with positive effects on clinical outcomes and on the current threat of increasing antibiotic multiresistance. National Institute for Health Research. Copyright © 2018 Elsevier Ltd. All rights reserved.
Implementation Guide: Leading School Change
ERIC Educational Resources Information Center
Whitaker, Todd
2010-01-01
This two-part "Implementation Guide" will help to deepen your understanding and sharpen your ability to implement each of the strategies discussed in "Leading School Change: Nine Strategies to Bring Everybody on Board" (ED509821). Part One offers discussion questions and activities which focus on each of the nine strategies. They can be completed…
Food: Too Good to Waste Implementation Guide and Toolkit
The Food: Too Good to Waste (FTGTW) Implementation Guide and Toolkit is designed for community organizations, local governments, households and others interested in reducing wasteful household food management practices.
NASA Astrophysics Data System (ADS)
2002-09-01
This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.
ERIC Educational Resources Information Center
Highline Community Coll., Des Moines, WA.
This guide, which is intended primarily for school and college personnel interested in initiating or improving work-based learning, examines the development and implementation of work-based education programs in Washington. The following topics are discussed: the rationale for work-based learning (legislative and educational change information,…
ERIC Educational Resources Information Center
Pinto, Teresa Almeida; Marreel, Iris; Hatton-Yeo, Alan
2009-01-01
This version of "Guide of Ideas for Planning and Implementing Intergenerational Projects," written in Spanish, is for all professionals that are or wish to be enrolled in the development of intergenerational activities. This "Guide" is the main product of the Project MATES--Mainstreaming Intergenerational Solidarity,…
ERIC Educational Resources Information Center
Pinto, Teresa Almeida; Marreel, Iris; Hatton-Yeo, Alan
2009-01-01
This version of "Guide of Ideas for Planning and Implementing Intergenerational Projects," written in Portuguese, is for all professionals that are or wish to be enrolled in the development of intergenerational activities. This "Guide" is the main product of the Project MATES--Mainstreaming Intergenerational Solidarity,…
Scholl, Annika; Sassenrath, Claudia; Sassenberg, Kai
2015-01-01
Depending on their motivation, individuals prefer different group contexts for social interactions. The present research sought to provide more insight into this relationship. More specifically, we tested how challenge/threat and a promotion/prevention focus predict attraction to groups with high- or low-power. As such, we examined differential outcomes of threat and prevention focus as well as challenge and promotion focus that have often been regarded as closely related. According to regulatory focus, individuals should prefer groups that they expect to “feel right” for them to join: Low-power groups should be more attractive in a prevention (than a promotion) focus, as these groups suggest security-oriented strategies, which fit a prevention focus. High-power groups should be more attractive in a promotion (rather than a prevention) focus, as these groups are associated with promotion strategies fitting a promotion focus (Sassenberg et al., 2007). In contrast, under threat (vs. challenge), groups that allow individuals to restore their (perceived) lack of control should be preferred: Low-power groups should be less attractive under threat (than challenge) because they provide low resources which threatened individuals already perceive as insufficient and high-power groups might be more attractive under threat (than under challenge), because their high resources allow individuals to restore control. Two experiments (N = 140) supported these predictions. The attractiveness of a group often depends on the motivation to engage in what fits (i.e., prefer a group that feels right in the light of one’s regulatory focus). However, under threat the striving to restore control (i.e., prefer a group allowing them to change the status quo under threat vs. challenge) overrides the fit effect, which may in turn guide individuals’ behavior in social interactions. PMID:25904887
Evaluating anthropogenic threats to endangered killer whales to inform effective recovery plans.
Lacy, Robert C; Williams, Rob; Ashe, Erin; Balcomb Iii, Kenneth C; Brent, Lauren J N; Clark, Christopher W; Croft, Darren P; Giles, Deborah A; MacDuffee, Misty; Paquet, Paul C
2017-10-26
Understanding cumulative effects of multiple threats is key to guiding effective management to conserve endangered species. The critically endangered, Southern Resident killer whale population of the northeastern Pacific Ocean provides a data-rich case to explore anthropogenic threats on population viability. Primary threats include: limitation of preferred prey, Chinook salmon; anthropogenic noise and disturbance, which reduce foraging efficiency; and high levels of stored contaminants, including PCBs. We constructed a population viability analysis to explore possible demographic trajectories and the relative importance of anthropogenic stressors. The population is fragile, with no growth projected under current conditions, and decline expected if new or increased threats are imposed. Improvements in fecundity and calf survival are needed to reach a conservation objective of 2.3% annual population growth. Prey limitation is the most important factor affecting population growth. However, to meet recovery targets through prey management alone, Chinook abundance would have to be sustained near the highest levels since the 1970s. The most optimistic mitigation of noise and contaminants would make the difference between a declining and increasing population, but would be insufficient to reach recovery targets. Reducing acoustic disturbance by 50% combined with increasing Chinook by 15% would allow the population to reach 2.3% growth.
Counter-terrorism threat prediction architecture
NASA Astrophysics Data System (ADS)
Lehman, Lynn A.; Krause, Lee S.
2004-09-01
This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model adaptation (learning). The increasingly complex demands facing analysts evaluating activity threatening to the security of the United States make the family of agent-based data collection (fusion) a promising area. This paper will discuss a system to support the collection and evaluation of potential threat activity as well as an approach fro presentation of the information.
A forest manager's guide to butternut
Keith Woeste; Lenny Farlee; Michael Ostry; James McKenna; Sally Weeks
2009-01-01
Exotic insect pests and pathogens have dramatically reduced the quantity and quality of several trees species in North America. Butternut (Juglans cinerea L.) is one such species. This review discusses the identification of butternut, the current status of butternut, and the nature of the threats that influence its survival, all in the context of...
Goldspotted oak borer: Field identification guide
S. Hishinuma; T.W. Coleman; M.L. Flint; S.J. Seybold
2011-01-01
The goldspotted oak borer (GSOB), Agrilus auroguttatus (Coleoptera: Buprestidae), is a flatheaded borer new to California that poses a significant threat to oak trees. The pest is native to southeastern Arizona, although a related species occurs in southern Mexico and northern Guatemala. GSOB was first collected and identified in California in 2004 in San Diego County...
Negatively-Worded Multiple Choice Questions: An Avoidable Threat to Validity
ERIC Educational Resources Information Center
Chiavaroli, Neville
2017-01-01
Despite the majority of MCQ writing guides discouraging the use of negatively-worded multiple choice questions (NWQs), they continue to be regularly used both in locally produced examinations and commercially available questions. There are several reasons why the use of NWQs may prove resistant to sound pedagogical advice. Nevertheless, systematic…
Science, Technology and Society--An Authentic Exploration of IR Thermometers Application in Schools
ERIC Educational Resources Information Center
Tse, Isaac Pak Hoi; Leung, Winston Kwok Kuen; Chan, Shing Yi
2004-01-01
"Science, Technology and Society" was identified an essential strand in the new Science Education curriculum guide. Shortly after the severe acute respiratory syndrome (SARS) threat to Hong Kong technical dealers introduced Infrared non-contact thermometers as a solution for schools to measure body temperature for a large number of…
A Guide to School Vulnerability Assessments: Key Principles for Safe Schools
ERIC Educational Resources Information Center
Office of Safe and Drug-Free Schools, US Department of Education, 2008
2008-01-01
Crises affect schools across the country every day. While natural hazards such as tornadoes, floods, hurricanes, and earthquakes may be thought of more commonly as emergencies, schools are also at risk from other hazards such as school violence, infectious disease, and terrorist threats. Through the vulnerability assessment process, schools can…
Baumann, Ana A.; Domenech Rodríguez, Melanie M.; Amador, Nancy G.; Forgatch, Marion S.; Parra-Cardona, J. Rubén
2015-01-01
This article describes the process of cultural adaptation at the start of the implementation of the Parent Management Training intervention-Oregon model (PMTO) in Mexico City. The implementation process was guided by the model, and the cultural adaptation of PMTO was theoretically guided by the cultural adaptation process (CAP) model. During the process of the adaptation, we uncovered the potential for the CAP to be embedded in the implementation process, taking into account broader training and economic challenges and opportunities. We discuss how cultural adaptation and implementation processes are inextricably linked and iterative and how maintaining a collaborative relationship with the treatment developer has guided our work and has helped expand our research efforts, and how building human capital to implement PMTO in Mexico supported the implementation efforts of PMTO in other places in the United States. PMID:26052184
Baumann, Ana A; Domenech Rodríguez, Melanie M; Amador, Nancy G; Forgatch, Marion S; Parra-Cardona, J Rubén
2014-03-01
This article describes the process of cultural adaptation at the start of the implementation of the Parent Management Training intervention-Oregon model (PMTO) in Mexico City. The implementation process was guided by the model, and the cultural adaptation of PMTO was theoretically guided by the cultural adaptation process (CAP) model. During the process of the adaptation, we uncovered the potential for the CAP to be embedded in the implementation process, taking into account broader training and economic challenges and opportunities. We discuss how cultural adaptation and implementation processes are inextricably linked and iterative and how maintaining a collaborative relationship with the treatment developer has guided our work and has helped expand our research efforts, and how building human capital to implement PMTO in Mexico supported the implementation efforts of PMTO in other places in the United States.
Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing
2017-01-01
Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.
Green Revolving Funds: An Introductory Guide to Implementation & Management
ERIC Educational Resources Information Center
Indvik, Joe; Foley, Rob; Orlowski, Mark
2013-01-01
The goal of this introductory implementation guide is to provide practical guidance for designing, implementing, and managing a green revolving fund (GRF) at a college, university, or other institution. The GRF model is widespread in higher education, with at least 79 funds in operation in North America representing over $111 million in committed…
A New Age of Implementation: Guiding Principles for Implementing Performance Assessment Systems
ERIC Educational Resources Information Center
Chapin, Gary; Gagnon, Laurie; Hammonds, Virgel
2017-01-01
In an examination of the conditions required for the successful implementation of performance assessment, the authors draw on a range of personal experience and other insights to guide practitioners and policymakers. Building on the authentic assessment work of the Boston Pilot Schools (CCE 2004), in 2008 the Center for Collaborative Education…
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 13 2011-01-01 2009-01-01 true Development and Implementation of Natural Resource... Implementation of Natural Resource Management Guide 1. The State Director shall complete the natural resource... and the fulfillment of the requirements of paragraph 4. of this exhibit, the natural resource...
Implementation guide for monitoring work zone safety and mobility impacts
DOT National Transportation Integrated Search
2009-01-01
This implementation guide describes the conceptual framework, data requirements, and computational procedures for determining the safety and mobility impacts of work zones in Texas. Researchers designed the framework and procedures to assist district...
A model of service and training: threat assessment on a community college campus.
Mrad, David F; Hanigan, Antoni J S; Bateman, Joyce R
2015-02-01
Forensic psychological assessment for targeted violence is a growing area of practice and community need. These threat assessments are particularly challenging on community college campuses given the broad range of students and the limited internal resources. A collaborative model of partnership between a community college and the training clinic of a doctoral program in clinical psychology has been developed and implemented. The model provides needed service to the community college and rich training experiences for doctoral students in psychology. Implementation of similar partnerships in other settings may be limited by the training and experience of doctoral faculty and the openness of behavioral intervention teams to external participants.
Forum Guide to the Teacher-Student Data Link: A Technical Implementation Resource. NFES 2013-802
ERIC Educational Resources Information Center
National Forum on Education Statistics, 2013
2013-01-01
This document is intended to serve as a practical guide for implementing a teacher-student data link (TSDL) that supports a range of uses at the local, regional, and state levels. The guide addresses the considerations for linking teacher and student data from multiple perspectives, including governance, policies, data components, business rules,…
Fore, Jeffrey D; Sowa, Scott P; Galat, David L; Annis, Gust M; Diamond, David D; Rewa, Charles
2014-03-01
Managers can improve conservation of lotic systems over large geographies if they have tools to assess total watershed conditions for individual stream segments and can identify segments where conservation practices are most likely to be successful (i.e., primary management capacity). The goal of this research was to develop a suite of threat indices to help agriculture resource management agencies select and prioritize watersheds across Missouri River basin in which to implement agriculture conservation practices. We quantified watershed percentages or densities of 17 threat metrics that represent major sources of ecological stress to stream communities into five threat indices: agriculture, urban, point-source pollution, infrastructure, and all non-agriculture threats. We identified stream segments where agriculture management agencies had primary management capacity. Agriculture watershed condition differed by ecoregion and considerable local variation was observed among stream segments in ecoregions of high agriculture threats. Stream segments with high non-agriculture threats were most concentrated near urban areas, but showed high local variability. 60 % of stream segments in the basin were classified as under U.S. Department of Agriculture's Natural Resources Conservation Service (NRCS) primary management capacity and most segments were in regions of high agricultural threats. NRCS primary management capacity was locally variable which highlights the importance of assessing total watershed condition for multiple threats. Our threat indices can be used by agriculture resource management agencies to prioritize conservation actions and investments based on: (a) relative severity of all threats, (b) relative severity of agricultural threats, and (c) and degree of primary management capacity.
A global response roadmap to the asteroid impact threat: The NEOShield perspective
NASA Astrophysics Data System (ADS)
Perna, D.; Barucci, M. A.; Drube, L.; Falke, A.; Fulchignoni, M.; Harris, A. W.; Harris, A. W.; Kanuchova, Z.
2015-12-01
Besides being of great scientific interest, near-Earth objects represent a well-founded threat to life on our planet. Nonetheless, up to now there has been no concerted international plan on how to deal with the impact threat, and how to prepare and implement mitigation measures. The NEOShield project is funded by the European Commission to address such issues, to investigate the feasibility of techniques to prevent a potentially catastrophic impact on Earth by an asteroid or a comet, and to develop detailed designs of appropriate space missions to test deflection techniques. In this work we present and discuss the scientific and strategic aspects of the asteroid impact threat, highlighting the necessary steps so as to be ready to react to future hazardous objects.
Pearce-Higgins, James W.; Brown, Daniel J.; Douglas, David J.T.; Alves, José A.; Bellio, Mariagrazia; Bocher, Pierrick; Buchannan, Graeme M.; Clay, Robert P.; Conklin, Jesse R.; Crockford, Nicola; Dann, Peter; Elts, Jaanus; Friis, Christian; Fuller, Richard A.; Gill, Jennifer A.; Gosbell, Ken; Johnson, James A.; Marquez-Ferrando, Rocio; Masero, José A.; Melville, David S.; Millington, Spike; Minton, Clive; Mundkur, Taej; Nol, Erika; Pehlak, Hannes; Piersma, Theunis; Rogers, Danny I.; Ruthrauff, Daniel R.; Senner, Nathan R.; Nazeer Shah, Junid; Sheldon, Rob D.; Soloviev, Sergej A.; Tomkovich, Pavel S.; Verkuil, Yvonne I.
2017-01-01
The Numeniini is a tribe of 13 wader species (Scolopacidae, Charadriiformes) of which seven are Near Threatened or globally threatened, including two Critically Endangered. To help inform conservation management and policy responses, we present the results of an expert assessment of the threats that members of this taxonomic group face across migratory flyways. Most threats are increasing in intensity, particularly in non-breeding areas, where habitat loss resulting from residential and commercial development, aquaculture, mining, transport, disturbance, problematic invasive species, pollution and climate change were regarded as having the greatest detrimental impact. Fewer threats (mining, disturbance, problematic native species and climate change) were identified as widely affecting breeding areas. Numeniini populations face the greatest number of non-breeding threats in the East Asian-Australasian Flyway, especially those associated with coastal reclamation; related threats were also identified across the Central and Atlantic Americas, and East Atlantic flyways. Threats on the breeding grounds were greatest in Central and Atlantic Americas, East Atlantic and West Asian flyways. Three priority actions were associated with monitoring and research: to monitor breeding population trends (which for species breeding in remote areas may best be achieved through surveys at key non-breeding sites), to deploy tracking technologies to identify migratory connectivity, and to monitor land-cover change across breeding and non-breeding areas. Two priority actions were focused on conservation and policy responses: to identify and effectively protect key non-breeding sites across all flyways (particularly in the East Asian- Australasian Flyway), and to implement successful conservation interventions at a sufficient scale across human-dominated landscapes for species' recovery to be achieved. If implemented urgently, these measures in combination have the potential to alter the current population declines of many Numeniini species and provide a template for the conservation of other groups of threatened species.
Integrated corridor management : implementation guide and lessons learned.
DOT National Transportation Integrated Search
2012-02-01
This implementation guide is intended for use by adopters of integrated corridor management (ICM) approaches and strategies to address congestion and travel time reliability issues within specific travel corridors. It introduces the topic of ICM and ...
ERIC Educational Resources Information Center
Piet DeLaTorre, Christine
2011-01-01
It is clear that the tragic events at Virginia Tech and other institutions of higher education (IHEs) have brought threat assessment to the forefront of higher education literature and increased public concern for campus safety. IHEs have a profound duty to learn from the Virginia Tech tragedy and to recognize their responsibility in providing a…
Implementing the global health security agenda: lessons from global health and security programs.
Paranjape, Suman M; Franz, David R
2015-01-01
The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.
Urban Tree Risk Management:A Community Guide to Program Design and Implementation
Jill Pokorny; Joseph O' Brien; Richard Hauer; Gary Johnson; Jana Albers; Peter Bedker; Manfred Mielke
2003-01-01
Urban Tree Risk Management: A Community Guide to Program Design and Implementation is a fully illustrated, easy to read training manual written for community leaders, administrators, city foresters, parks and public works staff, and private tree care practitioners. The manual is designed to assist communities design, adopt and implement tree risk management programs,...
ERIC Educational Resources Information Center
Carver, John; Carver, Miriam Mayhew
This guide provides practical advice regarding implementation of the Policy Governance model for school boards. Chapter 1, "Setting the Stage," explores questions commonly raised by boards prior to implementation of the Policy Governance model. Chapter 2, "The Theoretical Foundation," reviews the key theoretical principles of…
Inzlicht, Michael; Kang, Sonia K
2010-09-01
Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).
Facial disfigurement stigma: a study of victims of domestic assaults with fire in India.
Furr, L Allen
2014-07-01
In India, the incidence of fire attacks on women has risen dramatically. Although studies and media accounts describe how and why these attacks occur, no research has investigated the lives of survivors. Qualitative analysis of the texts of two focus groups of women scarred by domestic attacks by fire reveals that these women are heavily stigmatized. Using Yang et al.'s theory that stigma is a response to perceived threats to values of everyday life and feminist theory as guides, the study identified two patterns of moral threat related to disfigurement: (a) Disfigurement challenges values and practices of women's family roles, and (b) disfigurement threatens normative religious sensibilities. © The Author(s) 2014.
Implementing Immediate Postpartum Long-Acting Reversible Contraception Programs.
Hofler, Lisa G; Cordes, Sarah; Cwiak, Carrie A; Goedken, Peggy; Jamieson, Denise J; Kottke, Melissa
2017-01-01
To understand the most important steps required to implement immediate postpartum long-acting reversible contraception (LARC) programs in different Georgia hospitals and the barriers to implementing such a program. This was a qualitative study. We interviewed 32 key personnel from 10 Georgia hospitals working to establish immediate postpartum LARC programs. Data were analyzed using directed qualitative content analysis principles. We used the Stages of Implementation to organize participant-identified key steps for immediate postpartum LARC into an implementation guide. We compared this guide to hospitals' implementation experiences. At the completion of the study, LARC was available for immediate postpartum placement at 7 of 10 study hospitals. Participants identified common themes for the implementation experience: team member identification and ongoing communication, payer preparedness challenges, interdependent department-specific tasks, and piloting with continuing improvements. Participants expressed a need for anticipatory guidance throughout the process. Key first steps to immediate postpartum LARC program implementation were identifying project champions, creating an implementation team that included all relevant departments, obtaining financial reassurance, and ensuring hospital administration awareness of the project. Potential barriers included lack of knowledge about immediate postpartum LARC, financial concerns, and competing clinical and administrative priorities. Hospitals that were successful at implementing immediate postpartum LARC programs did so by prioritizing clear communication and multidisciplinary teamwork. Although the implementation guide reflects a comprehensive assessment of the steps to implementing immediate postpartum LARC programs, not all hospitals required every step to succeed. Hospital teams report that implementing immediate postpartum LARC programs involves multiple departments and a number of important steps to consider. A stage-based approach to implementation, and a standardized guide detailing these steps, may provide the necessary structure for the complex process of implementing immediate postpartum LARC programs in the hospital setting.
A Guide for applying a revised version of the PARIHS framework for implementation
2011-01-01
Background Based on a critical synthesis of literature on use of the Promoting Action on Research Implementation in Health Services (PARIHS) framework, revisions and a companion Guide were developed by a group of researchers independent of the original PARIHS team. The purpose of the Guide is to enhance and optimize efforts of researchers using PARIHS in implementation trials and evaluations. Methods Authors used a planned, structured process to organize and synthesize critiques, discussions, and potential recommendations for refinements of the PARIHS framework arising from a systematic review. Using a templated form, each author independently recorded key components for each reviewed paper; that is, study definitions, perceived strengths/limitations of PARIHS, other observations regarding key issues and recommendations regarding needed refinements. After reaching consensus on these key components, the authors summarized the information and developed the Guide. Results A number of revisions, perceived as consistent with the PARIHS framework's general nature and intent, are proposed. The related Guide is composed of a set of reference tools, provided in Additional files. Its core content is built upon the basic elements of PARIHS and current implementation science. Conclusions We invite researchers using PARIHS for targeted evidence-based practice (EBP) implementations with a strong task-orientation to use this Guide as a companion and to apply the revised framework prospectively and comprehensively. Researchers also are encouraged to evaluate its use relative to perceived strengths and issues. Such evaluations and critical reflections regarding PARIHS and our Guide could thereby promote the framework's continued evolution. PMID:21878092
ERIC Educational Resources Information Center
Smith, Barbara J.; Fox, Lise; Dunlap, Glen; Strain, Phil; Trivette, Carol M.; Perez Binder, Denise; Bovey, Ted; McCullough, Katy; Blase, Karen
2015-01-01
This document is a guide for implementing widespread use of evidence-based practices for improving the outcomes for young children with or at-risk for delays or disabilities and their families. The evidence-based practices are selected practices from the Division for Early Childhood (DEC) Recommended Practices (RPs). The guide is written for…
Automating Risk Analysis of Software Design Models
Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P.
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance. PMID:25136688
Automating risk analysis of software design models.
Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.
22 CFR 103.3 - Requirement to provide a sample.
Code of Federal Regulations, 2011 CFR
2011-04-01
... IMPLEMENTATION OF THE CHEMICAL WEAPONS CONVENTION AND THE CHEMICAL WEAPONS CONVENTION IMPLEMENTATION ACT OF 1998... accordance with the applicable provisions contained in the Chemical Weapons Convention and the CWCIA. (d... for personal safety; (6) The taking of a sample does not pose a threat to the national security...
22 CFR 103.3 - Requirement to provide a sample.
Code of Federal Regulations, 2012 CFR
2012-04-01
... IMPLEMENTATION OF THE CHEMICAL WEAPONS CONVENTION AND THE CHEMICAL WEAPONS CONVENTION IMPLEMENTATION ACT OF 1998... accordance with the applicable provisions contained in the Chemical Weapons Convention and the CWCIA. (d... for personal safety; (6) The taking of a sample does not pose a threat to the national security...
Validity as Process: A Construct Driven Measure of Fidelity of Implementation
ERIC Educational Resources Information Center
Jones, Ryan Seth
2013-01-01
Estimates of fidelity of implementation are essential to interpret the effects of educational interventions in randomized controlled trials (RCTs). While random assignment protects against many threats to validity, and therefore provides the best approximation to a true counterfactual condition, it does not ensure that the treatment condition…
Summary of the stakeholders workshop to develop a National Volcano Early Warning System (NVEWS)
Guffanti, Marianne; Scott, William E.; Driedger, Carolyn L.; Ewert, John W.
2006-01-01
The importance of investing in monitoring, mitigation, and preparedness before natural hazards occur has been amply demonstrated by recent disasters such as the Indian Ocean Tsunami in December 2004 and Hurricane Katrina in August 2005. Playing catch-up with hazardous natural phenomena such as these limits our ability to work with public officials and the public to lessen adverse impacts. With respect to volcanic activity, the starting point of effective pre-event mitigation is monitoring capability sufficient to detect and diagnose precursory unrest so that communities at risk have reliable information and sufficient time to respond to hazards with which they may be confronted. Recognizing that many potentially dangerous U.S. volcanoes have inadequate or no ground-based monitoring, the U.S Geological Survey (USGS) Volcano Hazards Program (VHP) and partners recently evaluated U.S. volcano-monitoring capabilities and published 'An Assessment of Volcanic Threat and Monitoring Capabilities in the United States: Framework for a National Volcano Early Warning System (NVEWS).' Results of the NVEWS volcanic threat and monitoring assessment are being used to guide long-term improvements to the national volcano-monitoring infrastructure operated by the USGS and affiliated groups. The NVEWS report identified the need to convene a workshop of a broad group of stakeholders--such as representatives of emergency- and land-management agencies at the Federal, State, and local levels and the aviation sector--to solicit input about implementation of NVEWS and their specific information requirements. Accordingly, an NVEWS Stakeholders Workshop was held in Portland, Oregon, on 22-23 February 2006. A summary of the workshop is presented in this document.
Making Schools Safe for Students: Creating a Proactive School Safety Plan.
ERIC Educational Resources Information Center
Blauvelt, Peter D.
This guide offers strategies for creating a proactive school safety plan that encourages parents, teachers, principals, and students to take the initiative and identify threats to school safety. It emphasizes that schools must have an active plan that addresses fights, name calling, bullying, changes in kid's behaviors, and staff who have run out…
A Legal Guide to State Pension Reform. Education Sector Policy Briefs
ERIC Educational Resources Information Center
Herriot-Hatfield, Jennie; Monahan, Amy; Rosenberg, Sarah; Tucker, Bill
2012-01-01
Just 18 minutes before the midnight signing deadline on May 15, 2010, Minnesota state legislators breathed a sigh of relief. Their bipartisan pension reform legislation, which passed both chambers by large margins and aimed to help shore up a potentially failing pension system, had just escaped a veto threat. Under pressure from his Republican…
The Challenge in Higher Education: Confronting and Reducing Substance Abuse on Campus.
ERIC Educational Resources Information Center
US Department of Justice, 2004
2004-01-01
The Office of National Drug Control Policy put together this guide to give administrators at institutions of higher education a basic understanding of illegal drug use among the college population and to urge their support in ridding campuses of this threat. People start using drugs for many reasons including peer pressure, thrills, or in search…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
...'' (``Menlo Report'') for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT... be found at: http://www.cyber.st.dhs.gov/wp-content/uploads/2011/12/MenloPrinciplesCORE-20110915-r560...
From Belligerence to Peace: The Role of Civic Education.
ERIC Educational Resources Information Center
Benporath, Sigal R.
When a security threat and sense of instability befell the United States after the events of September 11, 2001, the familiar order of political priorities was upset. In a matter of days the American public discourse organized itself around the same principles that have guided the state of Israel for many years: security IN, education OUT.…
Field guide for mapping post-fire soil burn severity
Annette Parson; Peter R. Robichaud; Sarah A. Lewis; Carolyn Napper; Jess T. Clark
2010-01-01
Following wildfires in the United States, the U.S. Department of Agriculture and U.S. Department of the Interior mobilize Burned Area Emergency Response (BAER) teams to assess immediate post-fire watershed conditions. BAER teams must determine threats from flooding, soil erosion, and instability. Developing a postfire soil burn severity map is an important first step...
ERIC Educational Resources Information Center
Schubert, Sandra; Zelinsky, Benjamin
Designed for parents, this primer presents information on threats to children's health that can be found in every American home, including disinfectants, art supplies, pesticides, and toxins in food and drinking water. The primer also provides practical information on safe and environmentally friendly household cleaners and disinfectants, outlines…
Keshvari, Hamid; Haddadpoor, Asefeh; Taheri, Behjat; Nasri, Mehran; Aghdak, Pezhman
2014-10-01
Awareness of Outlook, objectives, benefits and impact of telemedicine technology that can promote services quality, reduce costs, increase access to Specialized and subspecialty services, and immediately guide the health system subconsciously to the introduction greater use of technology. Therefore, the aim of this study was to determine the strengths, weaknesses, opportunities and threats in the telemedicine strategic planning from the managers and experts perspective in the health department, Isfahan University of Medical Sciences, in order to take a step towards facilitating strategic planning and approaching the equity aim in health in the province. This is a descriptive-analytical study, that data collection was done cross-sectional. The study population was composed of all managers and certified experts at the health department in Isfahan university of Medical Sciences. The sample size was 60 patients according to inclusion criteria. Information was collected by interview method. Researcher attempted to use the structured and specific questionnaire Then were investigated the viewpoints of experts and managers about determinative factors (strengths, weaknesses, opportunities and threats) in the strategic planning telemedicine. Data were analyzed using descriptive statistics (frequency, mean) and software SPSS 19. Data analysis showed that change management (100%) and continuity of supply of credit (79/3%) were weakness point within the organization and strengths of the program were, identity and health telemedicine programs (100%), goals and aspirations of the current directors of the organization and its compliance with the goals of telemedicine (100%), human resources interested using computers in daily activities in peripheral levels (93/1%). Also organization in the field of IT professionals, had opportunities, and repayment specialist's rights by insurance organizations is a threat for it. According to the strengths, weaknesses, opportunities and threats points determined by managers and experts, and compare it with success and failure factors, which are defined by different researchers, it seems will be fail to implement of telemedicine in the province at present. But according to the strengths identified by managers and experts, there are a lot of potential for telemedicine in the province, and may be used, in relation to telemedicine projects, with a 3 or 5 year strategic plan, and taking steps to get closer to the equity aim in health.
German Language and Culture: 9-Year Program Guide to Implementation, Grades 4-5-6
ERIC Educational Resources Information Center
Alberta Education, 2008
2008-01-01
This implementation guide is intended to support the Grade 4 to Grade 6 portion of the German Language and Culture Nine-year Program (the program of studies). It was developed primarily for teachers, yet it includes information that may be useful for administrators and other stakeholders in their efforts to plan for and implement the new Chinese…
Punjabi Language and Culture: 9-Year Program Guide to Implementation, Grades 4-5-6
ERIC Educational Resources Information Center
Alberta Education, 2008
2008-01-01
This implementation guide is intended to support the Grade 4 to Grade 6 portion of the Punjabi Language and Culture Nine-Year Program (the program of studies.) It was developed primarily for teachers, yet it includes information that may be useful for administrators and other stakeholders in their efforts to plan for and implement the new Punjabi…
HEALTH CARE GUIDE TO POLLUTION PREVENTION IMPLEMENTATION THROUGH ENVIRONMENTAL MANAGEMENT SYSTEMS
The Health Care Guide to Pollution Prevention Implementation through Environmental Management Systems provides example EMS procedures and forms used in four ISO 14001 EMS certified hospitals. The latest revisions include more EMS hospital case studies, more compliance resources, ...
DOT National Transportation Integrated Search
2015-09-01
This implementation guide is intended for use by adopters of integrated corridor management (ICM) approaches and strategies to address congestion and travel time reliability issues within specific travel corridors. It introduces the topic of ICM and ...
NASA Astrophysics Data System (ADS)
Alfonso, Krystal; Elsalim, Mashal; King, Michael; Strellis, Dan; Gozani, Tsahi
2013-04-01
MCNPX simulations have been used to guide the development of a portable inspection system for narcotics, explosives, and special nuclear material (SNM) detection. The system seeks to address these threats to national security by utilizing a high-yield, compact neutron source to actively interrogate the threats and produce characteristic signatures that can then be detected by radiation detectors. The portability of the system enables rapid deployment and proximity to threats concealed in small spaces. Both dD and dT electronic neutron generators (ENG) were used to interrogate ammonium nitrate fuel oil (ANFO) and cocaine hydrochloride, and the detector response of NaI, CsI, and LaBr3 were compared. The effect of tungsten shielding on the neutron flux in the gamma ray detectors was investigated, while carbon, beryllium, and polyethylene ENG moderator materials were optimized by determining the reaction rate density in the threats. In order to benchmark the modeling results, experimental measurements are compared with MCNPX simulations. In addition, the efficiency and die-away time of a portable differential die-away analysis (DDAA) detector using 3He proportional counters for SNM detection has been determined.
Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cohen, Israel Dov; Mengesha, Wondwosen
2011-09-01
Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign andmore » threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.« less
Helping Parents Cope with Suicide Threats: An Approach Based on Nonviolent Resistance.
Omer, Haim; Dolberger, Dan Isaac
2015-09-01
Parent training in nonviolent resistance was adapted to deal with situations of suicide threat by children, adolescents, and young adults. The approach aims at reducing the risk potential and the mutual distress surrounding the threat-interaction. Parent training in nonviolent resistance has been shown to help parents move from helplessness to presence, from isolation to connectedness, from submission to resistance, from escalation to self-control, and from mutual distancing and hostility to care and support. Those emphases can be crucial for the diminution of suicide risk. Parents show good ability to implement the approach and report gains on various areas over and beyond the reduction in suicide threat. A particular advantage is that the method can be used also in cases where the young person threatening suicide is not willing to cooperate. © 2015 Family Process Institute.
ERIC Educational Resources Information Center
Office of Disability Employment Policy (DOL), Washington, DC.
This implementation guide is intended to assist educators in planning, establishing, building, and managing a High School/High Tech project for high school students with disabilities. The program is designed to develop career opportunities, provide activities that will spark an interest in high technology fields, and encourage students to pursue…
Ship Underwater Threat Response System (SUTRS): A Feasibility Study of Organic Mine Point-Defense
2012-09-01
by implementing and testing the design until a final product has been established that addresses (and has been traced throughout to) the...The assumptions used to evaluate those TPMs are as follows: • The threshold Probability of Success for the total system should be 90% survival...Threat Response System xviii TOA Table of Allowance TPM Technical Performance Measures TTP Tactics Techniques and Procedures U.S. United
NASA Astrophysics Data System (ADS)
Selkoe, K. A.; Halpern, B. S.; Ebert, C. M.; Franklin, E. C.; Selig, E. R.; Casey, K. S.; Bruno, J.; Toonen, R. J.
2009-09-01
Effective and comprehensive regional-scale marine conservation requires fine-grained data on the spatial patterns of threats and their overlap. To address this need for the Papahānaumokuākea Marine National Monument (Monument) in Hawaii, USA, spatial data on 14 recent anthropogenic threats specific to this region were gathered or created, including alien species, bottom fishing, lobster trap fishing, ship-based pollution, ship strike risks, marine debris, research diving, research equipment installation, research wildlife sacrifice, and several anthropogenic climate change threats i.e., increase in ultraviolet (UV) radiation, seawater acidification, the number of warm ocean temperature anomalies relevant to disease outbreaks and coral bleaching, and sea level rise. These data were combined with habitat maps and expert judgment on the vulnerability of different habitat types in the Monument to estimate spatial patterns of current cumulative impact at 1 ha (0.01 km2) resolution. Cumulative impact was greatest for shallow reef areas and peaked at Maro Reef, where 13 of the 14 threats overlapped in places. Ocean temperature variation associated with disease outbreaks was found to have the highest predicted impact overall, followed closely by other climate-related threats, none of which have easily tractable management solutions at the regional scale. High impact threats most tractable to regional management relate to ship traffic. Sensitivity analyses show that the results are robust to both data availability and quality. Managers can use these maps to (1) inform management and surveillance priorities based on the ranking of threats and their distributions, (2) guide permitting decisions based on cumulative impacts, and (3) choose areas to monitor for climate change effects. Furthermore, this regional analysis can serve as a case study for managers elsewhere interested in assessing and mapping region-specific cumulative human impacts.
DOT National Transportation Integrated Search
2012-09-01
Properties of concrete embodying materials typically used in Wisconsin paving projects were evaluated in support of future : implementation of the AASHTO Mechanistic-Empirical Pavement Design Guide (MEPDG). The primary concrete : properties studied w...
DOT National Transportation Integrated Search
2012-09-01
Properties of concrete embodying materials typically used in Wisconsin paving projects were evaluated in support of future : implementation of the AASHTO Mechanistic-Empirical Pavement Design Guide (MEPDG). The primary concrete : properties studied w...
Commuter choice primer : an employer's guide to implementing effective commuter choice programs
DOT National Transportation Integrated Search
2003-01-01
The Commuter Choice Primer is intended to be a concise, user-friendly reference guide for employers and transportation professionals to developing and implementing worksite commuter choice programs. It is available on-line in both HTML and PDF format...
Aviation Maintenance Technology. General. Curriculum Implementation Guide.
ERIC Educational Resources Information Center
Moore, John, Jr.; And Others
This curriculum implementation guide is a scope and sequence for the general section of a course in aviation maintenance technology. The course materials were prepared through a cooperative effort of airframe and powerplant mechanics, general aviation industry representatives, Federal Aviation Administration representatives, and vocational…
Heuristic automation for decluttering tactical displays.
St John, Mark; Smallman, Harvey S; Manes, Daniel I; Feher, Bela A; Morrison, Jeffrey G
2005-01-01
Tactical displays can quickly become cluttered with large numbers of symbols that can compromise effective monitoring. Here, we studied how heuristic automation can aid users by intelligently "decluttering" the display. In a realistic simulated naval air defense task, 27 experienced U.S. Navy users monitored a cluttered airspace and executed defensive responses against significant threats. An algorithm continuously evaluated aircraft for their levels of threat and decluttered the less threatening ones by dimming their symbols. Users appropriately distrusted and spot-checked the automation's assessments, and decluttering had very little effect on which aircraft were judged as significantly threatening. Nonetheless, decluttering improved the timeliness of responses to threatening aircraft by 25% as compared with a baseline display with no decluttering; it was especially beneficial for threats in more peripheral locations, and 25 of 27 participants preferred decluttering. Heuristic automation, when properly designed to guide users' attention by decluttering less important objects, may prove valuable in many cluttered monitoring situations, including air traffic management, crisis team management, and tactical situation awareness in general.
Exposure Levels for Chemical Threat Compounds; Information to Facilitate Chemical Incident Response
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hauschild, Veronique; Watson, Annetta Paule
2013-01-01
Exposure Standards, Limits and Guidelines for Chemical Threat Compunds ABSTRACT Exposure criteria for chemical warfare (CW) agents and certain toxic industrial chemicals (TICs) used as CW agents (such as chlorine fill in an improvised explosive device) have been developed for protection of the civilian general public, civilian employees in chemical agent processing facilities and deployed military populations. In addition, compound-specific concentrations have been developed to serve as how clean is clean enough clearance criteria guiding facility recovery following chemical terrorist or other hazardous release events. Such criteria are also useful to verify compound absence, identify containment boundaries and expedite facilitymore » recovery following chemical threat release. There is no single right value or concentration appropriate for all chemical hazard control applications. It is acknowledged that locating and comparing the many sources of CW agent and TIC exposure criteria has not been previously well-defined. This paper summarizes many of these estimates and assembles critical documentation regarding their derivation and use.« less
Ziegler, Rene; Schlett, Christian; Aydinli, Arzu
2013-08-01
The present research examined when happy individuals' processing of a counterattitudinal message is guided by mood-congruent expectancies versus hedonic considerations. Recipients in positive, neutral, or negative mood read a strong or weak counterattitudinal message which either contained a threat to attitudinal freedom or did not contain such a threat. As expected, a freedom-threatening counterattitudinal message was more mood threatening than a counterattitudinal message not threatening freedom. Furthermore, as predicted by the mood-congruent expectancies approach, people in positive mood processed a nonthreatening counterattitudinal message more thoroughly than people in negative mood. Message processing in neutral mood lay in between. In contrast, as predicted by the hedonic-contingency view, a threatening counterattitudinal message was processed less thoroughly in positive mood than in neutral mood. In negative mood, processing of a threatening counterattitudinal message was as low as in positive mood. These findings suggest that message processing is determined by mood congruency unless hedonic considerations override expectancy-based processing inclinations.
Organizational Health Literacy: Review of Theories, Frameworks, Guides, and Implementation Issues
Bonneville, Luc; Bouchard, Louise
2018-01-01
Organizational health literacy is described as an organization-wide effort to transform organization and delivery of care and services to make it easier for people to navigate, understand, and use information and services to take care of their health. Several health literacy guides have been developed to assist healthcare organizations with this effort, but their content has not been systematically reviewed to understand the scope and practical implications of this transformation. The objective of this study was to review (1) theories and frameworks that inform the concept of organizational health literacy, (2) the attributes of organizational health literacy as described in the guides, (3) the evidence for the effectiveness of the guides, and (4) the barriers and facilitators to implementing organizational health literacy. Drawing on a metanarrative review method, 48 publications were reviewed, of which 15 dealt with the theories and operational frameworks, 20 presented health literacy guides, and 13 addressed guided implementation of organizational health literacy. Seven theories and 9 operational frameworks have been identified. Six health literacy dimensions and 9 quality-improvement characteristics were reviewed for each health literacy guide. Evidence about the effectiveness of health literacy guides is limited at this time, but experiences with the guides were positive. Thirteen key barriers (conceived also as facilitators) were identified. Further development of organizational health literacy requires a strong and a clear connection between its vision and operationalization as an implementation strategy to patient-centered care. For many organizations, becoming health literate will require multiple, simultaneous, and radical changes. Organizational health literacy has to make sense from clinical and financial perspectives in order for organizations to embark on such transformative journey. PMID:29569968
Organizational Health Literacy: Review of Theories, Frameworks, Guides, and Implementation Issues.
Farmanova, Elina; Bonneville, Luc; Bouchard, Louise
2018-01-01
Organizational health literacy is described as an organization-wide effort to transform organization and delivery of care and services to make it easier for people to navigate, understand, and use information and services to take care of their health. Several health literacy guides have been developed to assist healthcare organizations with this effort, but their content has not been systematically reviewed to understand the scope and practical implications of this transformation. The objective of this study was to review (1) theories and frameworks that inform the concept of organizational health literacy, (2) the attributes of organizational health literacy as described in the guides, (3) the evidence for the effectiveness of the guides, and (4) the barriers and facilitators to implementing organizational health literacy. Drawing on a metanarrative review method, 48 publications were reviewed, of which 15 dealt with the theories and operational frameworks, 20 presented health literacy guides, and 13 addressed guided implementation of organizational health literacy. Seven theories and 9 operational frameworks have been identified. Six health literacy dimensions and 9 quality-improvement characteristics were reviewed for each health literacy guide. Evidence about the effectiveness of health literacy guides is limited at this time, but experiences with the guides were positive. Thirteen key barriers (conceived also as facilitators) were identified. Further development of organizational health literacy requires a strong and a clear connection between its vision and operationalization as an implementation strategy to patient-centered care. For many organizations, becoming health literate will require multiple, simultaneous, and radical changes. Organizational health literacy has to make sense from clinical and financial perspectives in order for organizations to embark on such transformative journey.
Kindt, Roeland; Loo, Judy; Schmidt, Marco; Bognounou, Fidèle; Da, Sié Sylvestre; Diallo, Ousmane Boukary; Ganaba, Souleymane; Gnoumou, Assan; Lompo, Djingdia; Lykke, Anne Mette; Mbayngone, Elisée; Nacoulma, Blandine Marie Ivette; Ouedraogo, Moussa; Ouédraogo, Oumarou; Parkouda, Charles; Porembski, Stefan; Savadogo, Patrice; Thiombiano, Adjima; Zerbo, Guibien; Vinceti, Barbara
2017-01-01
Over the last decades agroforestry parklands in Burkina Faso have come under increasing demographic as well as climatic pressures, which are threatening indigenous tree species that contribute substantially to income generation and nutrition in rural households. Analyzing the threats as well as the species vulnerability to them is fundamental for priority setting in conservation planning. Guided by literature and local experts we selected 16 important food tree species (Acacia macrostachya, Acacia senegal, Adansonia digitata, Annona senegalensis, Balanites aegyptiaca, Bombax costatum, Boscia senegalensis, Detarium microcarpum, Lannea microcarpa, Parkia biglobosa, Sclerocarya birrea, Strychnos spinosa, Tamarindus indica, Vitellaria paradoxa, Ximenia americana, Ziziphus mauritiana) and six key threats to them (overexploitation, overgrazing, fire, cotton production, mining and climate change). We developed a species-specific and spatially explicit approach combining freely accessible datasets, species distribution models (SDMs), climate models and expert survey results to predict, at fine scale, where these threats are likely to have the greatest impact. We find that all species face serious threats throughout much of their distribution in Burkina Faso and that climate change is predicted to be the most prevalent threat in the long term, whereas overexploitation and cotton production are the most important short-term threats. Tree populations growing in areas designated as ‘highly threatened’ due to climate change should be used as seed sources for ex situ conservation and planting in areas where future climate is predicting suitable habitats. Assisted regeneration is suggested for populations in areas where suitable habitat under future climate conditions coincides with high threat levels due to short-term threats. In the case of Vitellaria paradoxa, we suggest collecting seed along the northern margins of its distribution and considering assisted regeneration in the central part where the current threat level is high due to overexploitation. In the same way, population-specific recommendations can be derived from the individual and combined threat maps of the other 15 food tree species. The approach can be easily transferred to other countries and can be used to analyze general and species specific threats at finer and more local as well as at broader (continental) scales in order to plan more selective and efficient conservation actions in time. The concept can be applied anywhere as long as appropriate spatial data are available as well as knowledgeable experts. PMID:28880962
Gaisberger, Hannes; Kindt, Roeland; Loo, Judy; Schmidt, Marco; Bognounou, Fidèle; Da, Sié Sylvestre; Diallo, Ousmane Boukary; Ganaba, Souleymane; Gnoumou, Assan; Lompo, Djingdia; Lykke, Anne Mette; Mbayngone, Elisée; Nacoulma, Blandine Marie Ivette; Ouedraogo, Moussa; Ouédraogo, Oumarou; Parkouda, Charles; Porembski, Stefan; Savadogo, Patrice; Thiombiano, Adjima; Zerbo, Guibien; Vinceti, Barbara
2017-01-01
Over the last decades agroforestry parklands in Burkina Faso have come under increasing demographic as well as climatic pressures, which are threatening indigenous tree species that contribute substantially to income generation and nutrition in rural households. Analyzing the threats as well as the species vulnerability to them is fundamental for priority setting in conservation planning. Guided by literature and local experts we selected 16 important food tree species (Acacia macrostachya, Acacia senegal, Adansonia digitata, Annona senegalensis, Balanites aegyptiaca, Bombax costatum, Boscia senegalensis, Detarium microcarpum, Lannea microcarpa, Parkia biglobosa, Sclerocarya birrea, Strychnos spinosa, Tamarindus indica, Vitellaria paradoxa, Ximenia americana, Ziziphus mauritiana) and six key threats to them (overexploitation, overgrazing, fire, cotton production, mining and climate change). We developed a species-specific and spatially explicit approach combining freely accessible datasets, species distribution models (SDMs), climate models and expert survey results to predict, at fine scale, where these threats are likely to have the greatest impact. We find that all species face serious threats throughout much of their distribution in Burkina Faso and that climate change is predicted to be the most prevalent threat in the long term, whereas overexploitation and cotton production are the most important short-term threats. Tree populations growing in areas designated as 'highly threatened' due to climate change should be used as seed sources for ex situ conservation and planting in areas where future climate is predicting suitable habitats. Assisted regeneration is suggested for populations in areas where suitable habitat under future climate conditions coincides with high threat levels due to short-term threats. In the case of Vitellaria paradoxa, we suggest collecting seed along the northern margins of its distribution and considering assisted regeneration in the central part where the current threat level is high due to overexploitation. In the same way, population-specific recommendations can be derived from the individual and combined threat maps of the other 15 food tree species. The approach can be easily transferred to other countries and can be used to analyze general and species specific threats at finer and more local as well as at broader (continental) scales in order to plan more selective and efficient conservation actions in time. The concept can be applied anywhere as long as appropriate spatial data are available as well as knowledgeable experts.
[Tuberculosis and refusal of treatment: resorting to legislation on serious health threats].
Bouvet, R; Le Gueut, M
2013-06-01
Clinicians are regularly confronted with the question of refusal of treatment from patients with tuberculosis. For several years, the French public health authorities have been studying the possibility of compelling treatment or isolation, but no plan has been implemented even though European and American experiences have shown the effectiveness of restrictive measures. Neither the statutory exceptions to the principle of consent to medical treatment nor the conditions of implementation of "required care" allow legally binding measures against patients refusing care or isolation. The legislation on serious health threats has recently been applied to the situation of a refusal of treatment in the context of tuberculosis. It allowed the patient to be ordered to observe prescribed care and the possibility of forced isolation in the event of breach of this order. The legislation on serious health threats is a response to the question of refusal of treatment from patients with tuberculosis. However the opinion of the legal authority as to its necessity and proportionality to the risk remains unknown. Copyright © 2013 SPLF. Published by Elsevier Masson SAS. All rights reserved.
77 FR 14265 - To Implement the United States-Korea Free Trade Agreement
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-09
... threat thereof to a domestic industry producing certain textile or apparel articles. 9. Executive Order... apparel goods. 8. Subtitle C of title III of the Implementation Act authorizes the President to take... exclusion of certain textile and apparel goods from the customs territory of the United States and to direct...
DOT National Transportation Integrated Search
2014-02-01
The GDOT is preparing for implementation of the Mechanistic-Empirical Pavement Design : Guide (MEPDG). As part of this preparation, a statewide traffic load spectra program is being : developed for gathering truck axle loading data. This final report...
Selected Technology Lab Activities Implementation Guide.
ERIC Educational Resources Information Center
Portland Public Schools, OR.
These materials supplement state guides for junior high or middle school technology education programs. The materials show instructors how to implement 81 hours of new technology-related activities into existing programs. Introductory materials include a rationale, philosophy, and goals for technology education. Areas of instruction are as…
National Skill Standards Implementation Guide.
ERIC Educational Resources Information Center
National Vocational Technical Education Foundation, Washington, DC.
This guide was developed to encourage state policy makers and local school boards to implement the national skill standards formulated by the National Institute for Automotive Service Excellence (ASE) and the National Automotive Technician Education Foundation (NATEF) in high schools, technical schools, and technical and community colleges.…
Johnson-Turbes, Ashani
2015-01-01
Purpose We describe how the Persuasive Health Message (PHM) framework was used to guide the formative evaluation informing development of messages and materials used in a community-based multi-media campaign intended to motivate low-income African American women to obtain low- or no-cost mammograms through the CDC’s National Breast and Cervical Cancer Early Detection Program. Methods Seventy-eight African American women were recruited for eight focus groups that discussed breast cancer screening. The moderator guide was developed in accordance with the PHM framework and solicited information on perceived threat and efficacy, cues, salient beliefs and referents, and barriers to self-efficacy. Results We created persuasive messages to emphasize that African American women are susceptible to the threat of breast cancer, but that their personal action in obtaining regular mammograms may lead to early detection, subsequent treatment, and reduced cancer mortality. The messages addressed concerns of self-efficacy by emphasizing that uninsured women can also obtain high-quality low- or no-cost mammograms. In an attempt to combat the sentiment that breast cancer is a death sentence, the messages indicated that breast cancer can be successfully treated, especially when detected early. Conclusions The PHM framework consists of three steps: (1) determine information about threat and efficacy; (2) develop an audience profile; and (3) construct a persuasive message. It offered our team easy-to-follow, flexible steps to create a persuasive and effective campaign promoting awareness and use of mammogram screening among low-income African American women. PMID:25724414
Within-subject neural reactivity to reward and threat is inverted in young adolescents.
Thomason, M E; Marusak, H A
2017-07-01
As children mature, they become increasingly independent and less reliant on caregiver support. Changes in brain systems are likely to stimulate and guide this process. One mechanistic hypothesis suggests that changes in neural systems that process reward and threat support the increase in exploratory behavior observed in the transition to adolescence. This study examines the basic tenets of this hypothesis by performing functional magnetic resonance imaging (fMRI) during well-established reward and threat processing tasks in 40 children and adolescents, aged 9-15 years. fMRI responses in the striatum and amygdala are fit to a model predicting that striatal reward and amygdala threat-responses will be unrelated in younger participants (aged 9-12 years), while older participants (aged 13-15 years) will differentially engage these structures. Our data are consistent with this model. Activity in the striatum and amygdala are comparable in younger children, but in older children, they are inversely related; those more responsive to reward show a reduced threat-response. Analyses testing age as a continuous variable yield consistent results. In addition, the proportion of threat to reward-response relates to self-reported approach behavior in older but not younger youth, exposing behavioral relevance in the relative level of activity in these structures. Results are consistent with the notion that both individual and developmental differences drive reward-seeking behavior in adolescence. While these response patterns may serve adaptive functions in the shift to independence, skew in these systems may relate to increased rates of emotional psychopathology and risk-taking observed in adolescence.
Sittig, Dean F; Salimi, Mandana; Aiyagari, Ranjit; Banas, Colin; Clay, Brian; Gibson, Kathryn A; Goel, Ashutosh; Hines, Robert; Longhurst, Christopher A; Mishra, Vimal; Sirajuddin, Anwar M; Satterly, Tyler; Singh, Hardeep
2018-04-26
The Safety Assurance Factors for EHR Resilience (SAFER) guides were released in 2014 to help health systems conduct proactive risk assessment of electronic health record (EHR)- safety related policies, processes, procedures, and configurations. The extent to which SAFER recommendations are followed is unknown. We conducted risk assessments of 8 organizations of varying size, complexity, EHR, and EHR adoption maturity. Each organization self-assessed adherence to all 140 unique SAFER recommendations contained within 9 guides (range 10-29 recommendations per guide). In each guide, recommendations were organized into 3 broad domains: "safe health IT" (total 45 recommendations); "using health IT safely" (total 80 recommendations); and "monitoring health IT" (total 15 recommendations). The 8 sites fully implemented 25 of 140 (18%) SAFER recommendations. Mean number of "fully implemented" recommendations per guide ranged from 94% (System Interfaces-18 recommendations) to 63% (Clinical Communication-12 recommendations). Adherence was higher for "safe health IT" domain (82.1%) vs "using health IT safely" (72.5%) and "monitoring health IT" (67.3%). Despite availability of recommendations on how to improve use of EHRs, most recommendations were not fully implemented. New national policy initiatives are needed to stimulate implementation of these best practices.
EMPHASIS™/Nevada CABANA User Guide Version 2.1.2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Turner, C. David; Bohnhoff, William J.; Powell, Jennifer L.
2017-11-15
The CABle ANAlysis (CABANA) portion of the EMPHASIS™ suite is designed specifically for the simulation of cable SGEMP. The code can be used to evaluate the response of a specific cable design to threat or to compare and minimize the relative response of difference designs. This document provides user-specific information to facilitate the application of the code to cables of interest.
America, the Soviets and Nuclear Arms: Looking to the Future. Teacher's Resource Book.
ERIC Educational Resources Information Center
Berger, Karl; And Others
This curriculum project focuses on U.S.-Soviet relations and the choices that U.S. citizens face today in addressing the Soviet Union and the threat of nuclear war. This book is intended as a resource guide to accompany a 22-minute video presentation and student text that are part of the "Four Futures" curriculum. The resource book…
ERIC Educational Resources Information Center
Hill, Lori Diane
2012-01-01
Preparing high school students to skillfully and successfully navigate the pathway to college is a growing concern among researchers and policymakers. This issue has raised important questions about what urban school districts can do to build capacity among their high schools to guide students and families toward successful college transitions.…
Asymmetric Attention: Visualizing the Uncertain Threat
2010-03-01
memory . This is supportive of earlier research by Engle (2002) suggesting that executive attention and working memory capacity are...explored by Engle (2002). Engle’s findings suggest that attention or the executive function and working memory actually entail the same mental process ...recognition, and action. These skills orient and guide the Soldier in operational settings from the basic perceptual process at the attentiveness stage
Choices & Careers; Free to Choose: Just for You. Book III and Leaders Guide.
ERIC Educational Resources Information Center
Finley, Cathaleen
Because bearing a child as a teenager presents a threat to a young American Indian woman's health, her education, her financial independence, her freedom to choose, and her ability to develop her potential, this unit on sexuality deals with the following: (1) sexuality as it affects one's life; (2) history of birth control; (3) matriarchal…
Population and geographic range dynamics: implications for conservation planning
Mace, Georgina M.; Collen, Ben; Fuller, Richard A.; Boakes, Elizabeth H.
2010-01-01
Continuing downward trends in the population sizes of many species, in the conservation status of threatened species, and in the quality, extent and connectedness of habitats are of increasing concern. Identifying the attributes of declining populations will help predict how biodiversity will be impacted and guide conservation actions. However, the drivers of biodiversity declines have changed over time and average trends in abundance or distributional change hide significant variation among species. While some populations are declining rapidly, the majority remain relatively stable and others are increasing. Here we dissect out some of the changing drivers of population and geographic range change, and identify biological and geographical correlates of winners and losers in two large datasets covering local population sizes of vertebrates since 1970 and the distributions of Galliform birds over the last two centuries. We find weak evidence for ecological and biological traits being predictors of local decline in range or abundance, but stronger evidence for the role of local anthropogenic threats and environmental change. An improved understanding of the dynamics of threat processes and how they may affect different species will help to guide better conservation planning in a continuously changing world. PMID:20980321
Saudi Arabias Implementation of Soft Power Policy to Confront Irans Obvious Threats
2015-12-01
OBVIOUS THREATS Abdullah Khuliyf A. Alanazi Colonel, Saudi Arabia National Guard B.S., King Khalid Military College, 1993 Submitted in partial...inevitably growing power, particularly in the Persian Gulf, and throughout the Middle East. Such a situation advocates utilizing soft power as a new...www.educause.edu/ir/library/ pdf /ffpiu043. pdf , 34. 2 Giulio Gallarotti and Isam Yahia Al-Filali, “Saudi Arabia’s Soft Power.” International Studies 49
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-01
... Programs (NCPDP) Prescriber/ Pharmacist Interface SCRIPT standard, Implementation Guide, Version 10... Prescriber/Pharmacist Interface SCRIPT standard, Version 8, Release 1 and its equivalent NCPDP Prescriber/Pharmacist Interface SCRIPT Implementation Guide, Version 8, Release 1 (hereinafter referred to as the...
ERIC Educational Resources Information Center
Borelli, Michael L.
This document details the administrative issues associated with guiding a school district through its metrication efforts. Issues regarding staff development, curriculum development, and the acquisition of instructional resources are considered. Alternative solutions are offered. Finally, an overall implementation strategy is discussed with…
Creation and Implementation of a Workforce Development Pipeline Program at MSFC
NASA Technical Reports Server (NTRS)
Hix, Billy
2003-01-01
Within the context of NASA's Education Programs, this Workforce Development Pipeline guide describes the goals and objectives of MSFC's Workforce Development Pipeline Program as well as the principles and strategies for guiding implementation. It is designed to support the initiatives described in the NASA Implementation Plan for Education, 1999-2003 (EP-1998-12-383-HQ) and represents the vision of the members of the Education Programs office at MSFC. This document: 1) Outlines NASA s Contribution to National Priorities; 2) Sets the context for the Workforce Development Pipeline Program; 3) Describes Workforce Development Pipeline Program Strategies; 4) Articulates the Workforce Development Pipeline Program Goals and Aims; 5) List the actions to build a unified approach; 6) Outlines the Workforce Development Pipeline Programs guiding Principles; and 7) The results of implementation.
75 FR 60133 - Detroit Area Maritime Security Committee (AMSC); Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-29
... (threats, vulnerabilities, and consequences); Determining mitigation strategies and implementation methods... consequences and vulnerabilities, how they may change over time, and what additional mitigation strategies can...
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
Japanese Language and Culture: 10-3Y, 20-3Y, 30-3Y. 3-Year Program Guide to Implementation
ERIC Educational Resources Information Center
Alberta Education, 2009
2009-01-01
This guide to implementation is intended to support the Japanese Language and Culture 10-3Y, 20-3Y, 30-3Y Program of Studies. It was developed primarily for teachers, yet it includes information that may be useful for administrators and other stakeholders in their efforts to plan for and implement the new Japanese program of studies. Familiarity…
Individually Guided Education (IGE) Program. 1973-1974 Evaluation Report.
ERIC Educational Resources Information Center
Austin Independent School District, TX. Office of Research and Evaluation.
This report presents data gathered during the 1973-74 school year on the Austin Independent School District (Austin, Texas) implementation of the Individually Guided Education Program (IGE). Classroom observation indicates on the whole that the 11 schools identified as IGE exhibit greater degrees of implementation of characteristics associated…
A Planning Guide for Instructional Networks, Part I.
ERIC Educational Resources Information Center
Daly, Kevin F.
1994-01-01
Discusses three phases in implementing a master plan for a school-based local area network (LAN): (1) network software selection; (2) hardware selection, network topology, and site preparation; and (3) implementation time table. Sample planning and specification worksheets and a list of planning guides are included. (Contains six references.) (KRN)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-22
...-Basis Hurricane and Hurricane Missiles AGENCY: Nuclear Regulatory Commission. ACTION: Proposed interim...-ISG-024, ``Implementation of Regulatory Guide 1.221 on Design-Basis Hurricane and Hurricane Missiles....221, ``Design-Basis Hurricane and Hurricane Missiles for Nuclear Power Plants.'' DATES: Submit...
Implementing the Metric System in Agricultural Occupations. Metric Implementation Guide.
ERIC Educational Resources Information Center
Gilmore, Hal M.; And Others
Addressed to the agricultural education teacher, this guide is intended to provide appropriate information, viewpoints, and attitudes regarding the metric system and to make suggestions regarding presentation of the material in the classroom. An introductory section on teaching suggestions emphasizes the need for a "think metric" approach made up…
Implementing the Metric System in Health Occupations. Metric Implementation Guide.
ERIC Educational Resources Information Center
Banks, Wilson P.; And Others
Addressed to the health occupations education teacher, this guide is intended to provide appropriate information, viewpoints, and attitudes regarding the metric system and to make suggestions regarding presentation of the material in the classroom. An introductory section on teaching suggestions emphasizes the need for a "think metric" approach…
Standards Based Reform. Abbott Implementation Resource Guide
ERIC Educational Resources Information Center
Passantino, Claire; Kenyon, Susan
2004-01-01
The goal of this guide is to provide information, support and practical tools that may help educators design, implement, and evaluate their school's standards-based education program. In order to work, a comprehensive, standards-based educational program must, by definition, be the organizing structure upon which the school program operates.…
Guiding Preservice Teachers to Adapt Mathematics Word Problems through Interactions with ELLs
ERIC Educational Resources Information Center
Kurz, Terri L.; Gómez, Conrado; Jimenez-Silva, Margarita
2017-01-01
In this article, the authors present a framework for guiding elementary preservice teachers in adapting mathematics word problems to better meet English language learners' (ELLs) needs. They analyze preservice teachers' ELL adaptations implemented in a one-on-one setting. Through qualitative methods, four themes regarding implemented adaptations…
DOT National Transportation Integrated Search
2013-03-01
This is the final report of the Part 1 (HMA Mixture Characterization) of the Preparation for Implementation of the Mechanistic-Empirical Pavement Design Guide in Michigan project. The main objectives of the Part 1 were (i) to conduct a literatu...
Foreign Languages: A Guide to Curriculum Development [Revision].
ERIC Educational Resources Information Center
Connecticut State Board of Education, Hartford.
The guide is designed to help school district planners develop and implement suitable foreign language curricula. Focusing on programs in grades K-12, it provides an overview of current philosophies, objectives, methods, and materials in foreign language education; illustrates how these may be implemented in a sequential foreign language program…
Implementing LibGuides 2: An Academic Case Study
ERIC Educational Resources Information Center
Duncan, Vicky; Lucky, Shannon; McLean, Jaclyn
2015-01-01
Since 1997, the University of Saskatchewan Library has used "subject pages" to highlight key library resources. When Springshare announced it was launching LibGuides v2, a project team was assembled to transition a mixture of locally produced guides and guides created with the original LibGuides v1 software. This article synthesizes best…
Selected considerations of implementation of the GNSS
NASA Astrophysics Data System (ADS)
Cwiklak, Janusz; Fellner, Andrzej; Fellner, Radoslaw; Jafernik, Henryk; Sledzinski, Janusz
2014-05-01
The article describes analysis of the safety and risk for the implementation of precise approach procedures (Localizer Performance and Vertical Guidance - LPV) with GNSS sensor at airports in Warsaw and Katowice. There were used some techniques of the identification of threats (inducing controlled flight into terrain, landing accident, mid-air collision) and evaluations methods based on Fault Tree Analysis, probability of the risk, safety risk evaluation matrix and Functional Hazard Assesment. Also safety goals were determined. Research led to determine probabilities of appearing of threats, as well as allow compare them with regard to the ILS. As a result of conducting the Preliminary System Safety Assessment (PSSA), there were defined requirements essential to reach the required level of the safety. It is worth to underline, that quantitative requirements were defined using FTA.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gaertner, John P.; Teagarden, Grant A.
2006-07-01
In response to increased interest in risk-informed decision making regarding terrorism, EPRI and ERIN Engineering were selected by U.S. DHS and ASME to develop and demonstrate the RAMCAP method for nuclear power plant (NPP) risk assessment. The objective is to characterize plant-specific NPP risk for risk management opportunities and to provide consistent information for DHS decision making. This paper is an update of this project presented at the American Nuclear Society (ANS) International Topical Meeting on Probabilistic Safety Analysis (PSA05) in September, 2005. The method uses a characterization of risk as a function of Consequence, Vulnerability, and Threat. For eachmore » site, worst case scenarios are developed for each of sixteen benchmark threats. Nuclear RAMCAP hypothesizes that the intent of the perpetrator is to cause offsite radiological consequences. Specific targets are the reactor core, the spent fuel pool, and nuclear spent fuel in a dry storage facility (ISFSI). Results for each scenario are presented as conditional risk for financial loss, early fatalities and early injuries. Expected consequences for each scenario are quantified, while vulnerability is estimated on a relative likelihood scale. Insights for other societal risks are provided. Although threat frequencies are not provided, target attractiveness and threat deterrence are estimated. To assure efficiency, completeness, and consistency; results are documented using standard RAMCAP Evaluator software. Trial applications were successfully performed at four plant sites. Implementation at all other U.S. commercial sites is underway, supported by the Nuclear Sector Coordinating Council (NSCC). Insights from RAMCAP results at 23 U.S. plants completed to date have been compiled and presented to the NSCC. Results are site-specific. Physical security barriers, an armed security force, preparedness for design-basis threats, rugged design against natural hazards, multiple barriers between fuel and environment, accident mitigation capability, severe accident management procedures, and offsite emergency plans are risk-beneficial against all threat types. (authors)« less
Why Don't We Ask? A Complementary Method for Assessing the Status of Great Apes
Meijaard, Erik; Mengersen, Kerrie; Buchori, Damayanti; Nurcahyo, Anton; Ancrenaz, Marc; Wich, Serge; Atmoko, Sri Suci Utami; Tjiu, Albertus; Prasetyo, Didik; Nardiyono; Hadiprakarsa, Yokyok; Christy, Lenny; Wells, Jessie; Albar, Guillaume; Marshall, Andrew J.
2011-01-01
Species conservation is difficult. Threats to species are typically high and immediate. Effective solutions for counteracting these threats, however, require synthesis of high quality evidence, appropriately targeted activities, typically costly implementation, and rapid re-evaluation and adaptation. Conservation management can be ineffective if there is insufficient understanding of the complex ecological, political, socio-cultural, and economic factors that underlie conservation threats. When information about these factors is incomplete, conservation managers may be unaware of the most urgent threats or unable to envision all consequences of potential management strategies. Conservation research aims to address the gap between what is known and what knowledge is needed for effective conservation. Such research, however, generally addresses a subset of the factors that underlie conservation threats, producing a limited, simplistic, and often biased view of complex, real world situations. A combination of approaches is required to provide the complete picture necessary to engage in effective conservation. Orangutan conservation (Pongo spp.) offers an example: standard conservation assessments employ survey methods that focus on ecological variables, but do not usually address the socio-cultural factors that underlie threats. Here, we evaluate a complementary survey method based on interviews of nearly 7,000 people in 687 villages in Kalimantan, Indonesia. We address areas of potential methodological weakness in such surveys, including sampling and questionnaire design, respondent biases, statistical analyses, and sensitivity of resultant inferences. We show that interview-based surveys can provide cost-effective and statistically robust methods to better understand poorly known populations of species that are relatively easily identified by local people. Such surveys provide reasonably reliable estimates of relative presence and relative encounter rates of such species, as well as quantifying the main factors that threaten them. We recommend more extensive use of carefully designed and implemented interview surveys, in conjunction with more traditional field methods. PMID:21483859
Atkins, Lou; Francis, Jill; Islam, Rafat; O'Connor, Denise; Patey, Andrea; Ivers, Noah; Foy, Robbie; Duncan, Eilidh M; Colquhoun, Heather; Grimshaw, Jeremy M; Lawton, Rebecca; Michie, Susan
2017-06-21
Implementing new practices requires changes in the behaviour of relevant actors, and this is facilitated by understanding of the determinants of current and desired behaviours. The Theoretical Domains Framework (TDF) was developed by a collaboration of behavioural scientists and implementation researchers who identified theories relevant to implementation and grouped constructs from these theories into domains. The collaboration aimed to provide a comprehensive, theory-informed approach to identify determinants of behaviour. The first version was published in 2005, and a subsequent version following a validation exercise was published in 2012. This guide offers practical guidance for those who wish to apply the TDF to assess implementation problems and support intervention design. It presents a brief rationale for using a theoretical approach to investigate and address implementation problems, summarises the TDF and its development, and describes how to apply the TDF to achieve implementation objectives. Examples from the implementation research literature are presented to illustrate relevant methods and practical considerations. Researchers from Canada, the UK and Australia attended a 3-day meeting in December 2012 to build an international collaboration among researchers and decision-makers interested in the advancing use of the TDF. The participants were experienced in using the TDF to assess implementation problems, design interventions, and/or understand change processes. This guide is an output of the meeting and also draws on the authors' collective experience. Examples from the implementation research literature judged by authors to be representative of specific applications of the TDF are included in this guide. We explain and illustrate methods, with a focus on qualitative approaches, for selecting and specifying target behaviours key to implementation, selecting the study design, deciding the sampling strategy, developing study materials, collecting and analysing data, and reporting findings of TDF-based studies. Areas for development include methods for triangulating data, e.g. from interviews, questionnaires and observation and methods for designing interventions based on TDF-based problem analysis. We offer this guide to the implementation community to assist in the application of the TDF to achieve implementation objectives. Benefits of using the TDF include the provision of a theoretical basis for implementation studies, good coverage of potential reasons for slow diffusion of evidence into practice and a method for progressing from theory-based investigation to intervention.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-15
... of October 9, 2012, ``Authorizing the Implementation of Certain Sanctions Set Forth in the Iran Threat Reduction and Syria Human Rights Act of 2012 and Additional Sanctions With Respect to Iran... issued Executive Order 13628, ``Authorizing the Implementation of Certain Sanctions Set Forth in the Iran...
33 CFR 103.310 - Responsibilities of the Area Maritime Security (AMS) Committee.
Code of Federal Regulations, 2010 CFR
2010-07-01
... (threats, vulnerabilities, and consequences); (3) Determine mitigation strategies and implementation... consequences and vulnerabilities, how they may change over time, and what additional mitigation strategies can...
Internet Protocol Implementation Guide.
1982-08-01
RD-R153 624 INTERNET PROTOCOL IMPLEMENTATION GIDE(U) SRI 1/2 INTERNATIONAL MENLO PARK CA NETWORK INFORMATION CENTER AUG 82 DCA2e-83-C-8e25 N... INTERNET PROTOCOL S IMPLEMENTATION GUIDE August 1982 DTICFL. !.ECTE .-" MAY 1 31985 ;z B Q.. Network Information Center SRI International Menlo Park...this is more information than the receiving Internet * module needs. The specified procedure is to take the return route recorded in the first
DDN (Defense Data Network) Protocol Implementations and Vendors Guide,
1988-02-01
TELNET) TCP/IP on an ethernet network. The program simulates a Hayes modem through the serial port. BWFTP is a thorough implementation of the FTP...25 IMP interface at VV from 19.2 Kbps to 56K bps. The IP, ICMP, TCP, Telnet. FFP and SMTP protocols are implemented along with R-Utxities...WANs. microcomputers, dataswitches. minicomputers. "black boxes" and modems . DOCUMENTATION: Software System Overview, Generic X.25 Porting Guide
Practical Approaches for Achieving Integrated Behavioral Health Care in Primary Care Settings
Ratzliff, Anna; Phillips, Kathryn E.; Sugarman, Jonathan R.; Unützer, Jürgen; Wagner, Edward H.
2016-01-01
Behavioral health problems are common, yet most patients do not receive effective treatment in primary care settings. Despite availability of effective models for integrating behavioral health care in primary care settings, uptake has been slow. The Behavioral Health Integration Implementation Guide provides practical guidance for adapting and implementing effective integrated behavioral health care into patient-centered medical homes. The authors gathered input from stakeholders involved in behavioral health integration efforts: safety net providers, subject matter experts in primary care and behavioral health, a behavioral health patient and peer specialist, and state and national policy makers. Stakeholder input informed development of the Behavioral Health Integration Implementation Guide and the GROW Pathway Planning Worksheet. The Behavioral Health Integration Implementation Guide is model neutral and allows organizations to take meaningful steps toward providing integrated care that achieves access and accountability. PMID:26698163
Practical Approaches for Achieving Integrated Behavioral Health Care in Primary Care Settings.
Ratzliff, Anna; Phillips, Kathryn E; Sugarman, Jonathan R; Unützer, Jürgen; Wagner, Edward H
Behavioral health problems are common, yet most patients do not receive effective treatment in primary care settings. Despite availability of effective models for integrating behavioral health care in primary care settings, uptake has been slow. The Behavioral Health Integration Implementation Guide provides practical guidance for adapting and implementing effective integrated behavioral health care into patient-centered medical homes. The authors gathered input from stakeholders involved in behavioral health integration efforts: safety net providers, subject matter experts in primary care and behavioral health, a behavioral health patient and peer specialist, and state and national policy makers. Stakeholder input informed development of the Behavioral Health Integration Implementation Guide and the GROW Pathway Planning Worksheet. The Behavioral Health Integration Implementation Guide is model neutral and allows organizations to take meaningful steps toward providing integrated care that achieves access and accountability.
Davies, Patrick T; Martin, Meredith J; Sturge-Apple, Melissa L; Ripple, Michael T; Cicchetti, Dante
2016-10-01
Two studies tested hypotheses about the distinctive psychological consequences of children's patterns of responding to interparental conflict. In Study 1, 174 preschool children (M = 4.0 years) and their mothers participated in a cross-sectional design. In Study 2, 243 preschool children (M = 4.6 years) and their parents participated in 2 annual measurement occasions. Across both studies, multiple informants assessed children's psychological functioning. Guided by the reformulated version of emotional security theory, behavioral observations of children's coping with interparental conflict assessed their tendencies to exhibit 4 patterns based on their function in defusing threat: secure (i.e., efficiently address direct instances of threat), mobilizing (i.e., react to potential threat and social opportunities), dominant (i.e., directly defeat threat), and demobilizing (i.e., reduce salience as a target of hostility). As hypothesized, each profile predicted unique patterns of adjustment. Greater security was associated with lower levels of internalizing and externalizing symptoms and greater social competence, whereas higher dominance was associated with externalizing problems and extraversion. In contrast, mobilizing patterns of reactivity predicted more problems with self-regulation, internalizing symptoms, externalizing difficulties, but also greater extraversion. Finally, higher levels of demobilizing reactivity were linked with greater internalizing problems and lower extraversion but also better self-regulation. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Davies, Patrick T.; Martin, Meredith J.; Sturge-Apple, Melissa L.; Ripple, Michael T.; Cicchetti, Dante
2016-01-01
Two studies tested hypotheses about the distinctive psychological consequences of children’s patterns of responding to interparental conflict. In Study 1, 174 preschool children (M = 4.0 years) and their mothers participated in a cross-sectional design. In Study 2, 243 preschool children (M = 4.6 years) and their parents participated in two annual measurement occasions. Across both studies, multiple informants assessed children’s psychological functioning. Guided by the reformulated version of emotional security theory, behavioral observations of children’s coping with interparental conflict assessed their tendencies to exhibit four patterns based on their function in defusing threat: secure (i.e., efficiently address direct instances of threat), mobilizing (i.e., react to potential threat and social opportunities), dominant (i.e., directly defeat threat), and demobilizing (i.e., reduce salience as a target of hostility). As hypothesized, each profile predicted unique patterns of adjustment. Greater security was associated with lower levels of internalizing and externalizing symptoms and greater social competence, whereas higher dominance was associated with externalizing problems and extraversion. In contrast, mobilizing patterns of reactivity predicted more problems with self-regulation, internalizing symptoms, externalizing difficulties, but also greater extraversion. Finally, higher levels of demobilizing reactivity were linked with greater internalizing problems and lower extraversion but also better self-regulation. PMID:27598256
Nordgreen, Tine; Gjestad, Rolf; Andersson, Gerhard; Carlbring, Per; Havik, Odd E
2018-01-01
Panic disorder is a common mental disorder. Guided Internet-based cognitive behavioural therapy (Guided Internet-based cognitive behaviour therapy (ICBT)) is a promising approach to reach more people in need of help. In the present effectiveness study, we investigated the outcome of guided ICBT for panic disorder after implementation in routine care. A total of 124 patients were included in the study, of which 114 started the treatment. Large within-group effect sizes were observed on the primary panic disorder symptoms (post-treatment: d = 1.24; 6-month follow-up: d = 1.39) and moderate and large effects on secondary panic disorder symptoms and depressive symptoms at post-treatment and follow-up (d = .55-1.13). More than half (56.1%) of the patients who started treatment recovered or improved at post-treatment. Among treatment takers (completed at least five of the nine modules), 69.9% recovered or improved. The effectiveness reported in the present trial is in line with previous effectiveness and efficacy trials of guided ICBT for panic disorder. This provides additional support for guided ICBT as a treatment alternative in routine care.
Monitoring Style of Coping with Cancer Related Threats: A Review of the Literature
Miller, Suzanne M.
2014-01-01
Building on the Cognitive-Social Health Information-Processing model, this paper provides a theoretically guided review of monitoring (i.e., attend to and amplify) cancer-related threats. Specifically, the goals of the review are to examine whether individuals high on monitoring are characterized by specific cognitive, affective, and behavioral responses to cancer-related health threats than individuals low on monitoring and the implications of these cognitive-affective responses for patient-centered outcomes, including patient-physician communication, decision-making and the development of interventions to promote adherence and adjustment. A total of 74 reports were found, based on 63 studies, 13 of which were intervention studies. The results suggest that although individuals high on monitoring are more knowledgeable about health threats, they are less satisfied with the information provided. Further, they tend to be characterized by greater perceived risk, more negative beliefs, and greater value of health-related information and experience more negative affective outcomes. Finally, individuals high on monitoring tend to be more demanding of the health providers in terms of desire for more information and emotional support, are more assertive during decision-making discussions, and subsequently experience more decisional regret. Psychoeducational interventions improve outcomes when the level and type of information provided is consistent with the individual's monitoring style and the demands of the specific health threat. Implications for patient-centered outcomes, in terms of tailoring of interventions, patient-provider communication, and decision-making, are discussed. PMID:24488543
Volume-holographic memory for laser threat discrimination
NASA Astrophysics Data System (ADS)
Delong, Mark L.; Duncan, Bradley D.; Parker, Jack H., Jr.
1996-10-01
Using conventional volume-holographic angle multiplexing in an Fe:LiNbO3 crystal, we have developed a compact laser threat discriminator, intended for aircraft integration, that optically detects laser spatial coherence and angle of arrival while simultaneously rejecting incoherent background sources, such as the Sun. The device is intended for a specific type of psychophysical laser attack against U.S. Air Force pilots, namely, third-world-country exploitation of inexpensive and powerful cw Ar-ion or doubled Nd:YAG lasers in the visible spectrum to blind or disorient U.S. pilots. The component does not solve the general tactical laser weapon situation, which includes identifying precision-guided munitions, range finders, and lidar systems that use pulsed infrared lasers. These are fundamentally different threats requiring different detector solutions. The device incorporates a sequence of highly redundant, simple black-and-white warning patterns that are keyed to be reconstructed as the incident laser threat, playing the role of an uncooperative probe beam, changes angle with respect to the crystal. The device tracks both azimuth and elevation, using a nonconventional hologram viewing system. Recording and playback conditions are simplified because nonzero cross talk is a desirable feature of this discriminator, inasmuch as our application requires a nonzero probability of detection for arbitrary directions of arrival within the sensor's field of view. The device can exploit phase-matched grating trade-off with probe-beam wavelength, accommodating wavelength-tunable threats, while still maintaining high direction-of-arrival tracking accuracy. .
Monitoring style of coping with cancer related threats: a review of the literature.
Roussi, Pagona; Miller, Suzanne M
2014-10-01
Building on the Cognitive-Social Health Information-Processing model, this paper provides a theoretically guided review of monitoring (i.e., attend to and amplify) cancer-related threats. Specifically, the goals of the review are to examine whether individuals high on monitoring are characterized by specific cognitive, affective, and behavioral responses to cancer-related health threats than individuals low on monitoring and the implications of these cognitive-affective responses for patient-centered outcomes, including patient-physician communication, decision-making and the development of interventions to promote adherence and adjustment. A total of 74 reports were found, based on 63 studies, 13 of which were intervention studies. The results suggest that although individuals high on monitoring are more knowledgeable about health threats, they are less satisfied with the information provided. Further, they tend to be characterized by greater perceived risk, more negative beliefs, and greater value of health-related information and experience more negative affective outcomes. Finally, individuals high on monitoring tend to be more demanding of the health providers in terms of desire for more information and emotional support, are more assertive during decision-making discussions, and subsequently experience more decisional regret. Psychoeducational interventions improve outcomes when the level and type of information provided is consistent with the individual's monitoring style and the demands of the specific health threat. Implications for patient-centered outcomes, in terms of tailoring of interventions, patient-provider communication, and decision-making, are discussed.
Charles Flower; Jeremie Fant; Sean Hoban; Kathleen Knight; Laura Steger; Elijah Aubihl; Miquel Gonzalez-Meler; Stephen Forry; Andrea Hille; Alejandro Royo
2018-01-01
Forest resources face numerous threats that require costly management. Hence, there is an increasing need for data-informed strategies to guide conservation practices. The introduction of the emerald ash borer to North America has caused rapid declines in ash populations (Fraxinus spp. L.). Natural resource managers are faced with a choice of...
Mission Assurance, Threat Alert, Disaster Resiliency and Response (MATADRR) Product Reference Guide
2014-06-01
communication systems customized for military , government, healthcare, higher education and commercial organizations. The AtHoc solutions automate the end...how to develop an integrated operational picture across the local, state and military environment where they operate. Considerations such as the...services are used to support sound decision making in disaster response and civil- military humanitarian assistance operations, as well as in disaster
ERIC Educational Resources Information Center
DiGiulio, Robert
This book provides K-12 teachers with concrete, step-by-step guidance on how to improve student behavior through positive classroom management. It explains how to take control of the classroom, offering an alternative to threats, rewards, and punishments. The book is divided into an introduction and three sections with seven chapters. The…
Biological and Chemical Impact to Educational Facilities.
ERIC Educational Resources Information Center
Manicone, Santo
2002-01-01
Discusses preparing an educational facility to address the threat of biological or chemical terrorism, including understanding the potential impact, implementing information and communication systems, and improving medical surveillance and awareness. (EV)
Final Technical Report. Project Boeing SGS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bell, Thomas E.
Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less
Project S.P.I.C.E.: Special Partnership in Career Education. Guide to Program Implementation.
ERIC Educational Resources Information Center
Emerson, Debby H.; And Others
The implementation guide to Project SPICE (Special Partnership in Career Education) - a curriculum designed to develop and demonstrate effective methods and techniques for providing career education experiences for educable mentally handicapped (EMH) students (ages 11-to-13 years) is provided. A description of the program focuses on program…
Implementation of Process Oriented Guided Inquiry Learning (POGIL) in Engineering
ERIC Educational Resources Information Center
Douglas, Elliot P.; Chiu, Chu-Chuan
2013-01-01
This paper describes implementation and testing of an active learning, team-based pedagogical approach to instruction in engineering. This pedagogy has been termed Process Oriented Guided Inquiry Learning (POGIL), and is based upon the learning cycle model. Rather than sitting in traditional lectures, students work in teams to complete worksheets…
ERIC Educational Resources Information Center
Banks, Wilson P.; And Others
Addressed to the personal and public service occupations teacher, this guide is intended to provide appropriate information, viewpoints, and attitudes regarding the metric system and to make suggestions regarding presentation of the material in the classroom. An introductory section on teaching suggestions emphasizes the need for a "think metric"…
Implementing the Metric System in Business Occupations. Metric Implementation Guide.
ERIC Educational Resources Information Center
Retzer, Kenneth A.; And Others
Addressed to the business education teacher, this guide is intended to provide appropriate information, viewpoints, and attitudes regarding the metric system and to make suggestions regarding presentation of the material in the classroom. An introductory section on teaching suggestions emphasizes the need for a "think metric" approach made up of…
Implementing the Metric System in Industrial Occupations. Metric Implementation Guide.
ERIC Educational Resources Information Center
Retzer, Kenneth A.
Addressed to the industrial education teacher, this guide is intended to provide appropriate information, viewpoints, and attitudes regarding the metric system and to make suggestions regarding presentation of the material in the classroom. An introductory section on teaching suggestions emphasizes the need for a "think metric" approach made up of…
Implementing Guided Pathways: Early Insights from the AACC Pathways Colleges. Executive Summary
ERIC Educational Resources Information Center
Jenkins, Davis; Lahr, Hana; Fink, John
2017-01-01
This summary is a digest of key findings from "Implementing Guided Pathways: Early Insights From the AACC Pathways Colleges," a report based on Community College Research Center's (CCRC's) research on the 30 colleges involved in the American Association of Community Colleges' (AACC) Pathways Project. The research presented in this report…
Implementing Strategic Change: A Practical Guide for Business.
ERIC Educational Resources Information Center
Grundy, Tony
This book is designed to serve as a practical guide to planning and managing change within a business, and as a text for graduate business students studying change strategies. It focuses on the rationale for change, managing the change process, tools for change, creating a strategic vision for change, and checklists for implementing strategic…
This guide provides information and recommendations that should be useful for planning, implementing, maintaining, and enforcing institutional controls (ICs) for Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA, or Superfund); Brownfields; federal facility; underground storage tank (UST); and Resource Conservation and Recovery Act (RCRA) site cleanups.
A Guide to Selecting Results and Indicators: Implementing Results-Based Budgeting.
ERIC Educational Resources Information Center
Melaville, Atelia I.
Many efforts to implement a results-based framework for public programs have been marred by confusion about terms and basic definitions, and difficulty in identifying appropriate results and performance measures. This guide is intended to help planners identifying program results and indicators and tie them to an established planning, budgeting,…
Implementing Multiage Education: A Practical Guide.
ERIC Educational Resources Information Center
Kasten, Wendy C.; Lolli, Elizabeth Monce
Noting that multiage education continues to receive a great deal of interest as educators, legislators, and parents seek to find ways to improve educational experiences for all children, this book takes readers by the hand and guides them as they move from exploring the concept of multiage to the actual stages of implementation. As is consistent…
A Guide for Monitoring District Implementation of Educator Evaluation Systems. REL 2015-069
ERIC Educational Resources Information Center
Cherasaro, Trudy; Yanoski, David; Swackhamer, Lyn
2015-01-01
This guide was developed to provide guidance to states or districts wishing to monitor implementation of educator evaluation systems. It describes a three-step process: develop state guidelines for educator evaluation systems; develop data collection methods; and determine adherence criteria and review data against criteria. The process was…
HSM implementation guide for managers.
DOT National Transportation Integrated Search
2011-09-01
This guide is intended for managers of departments of transportation (DOT) charged with leading and managing agency programs impacting the project development process and safety programs. This guide is based on lessons learned from early adopters of ...
Intra-seasonal risk of agriculturally-relevant weather extremes in West African Sudan Savanna
NASA Astrophysics Data System (ADS)
Boansi, David; Tambo, Justice A.; Müller, Marc
2018-01-01
Using household survey data and historical daily climate data for 29 communities across Upper East Ghana and Southwest Burkina Faso, we document climatic conditions deemed major threat to farming in the West African Sudan Savanna and assess risks posed by such conditions over the period 1997-2014. Based on farmers' perception, it is found that drought, low rainfall, intense precipitation, flooding, erratic rainfall pattern, extremely high temperatures, delayed rains, and early cessation of rains are the major threats farmers face. Using first-order Markov chain model and relevant indices for monitoring weather extremes, it is discovered that climatic risk is a general inherent attribute of the rainy season in the study area. Due to recent changes in onset of rains and length of the rainy season, some farmers have either resorted to early planting of drought-hardy crops, late planting of drought-sensitive crops, or spreading of planting across the first 3 months of the season to moderate harm. Each of these planting decisions however has some risk implications. The months of May, June, and October are found to be more susceptible to relatively longer duration of dry and hot spells, while July, August, and September are found to be more susceptible to intense precipitation and flooding. To moderate harm from anticipated weather extremes, farmers need to adjust their cropping calendar, adopt appropriate crop varieties, and implement soil and water management practices. For policy makers and other stakeholders, we recommend the supply of timely and accurate weather forecasts to guide farmers in their seasonal cropping decisions and investment in/installation of low cost irrigation facilities to enhance the practice of supplemental irrigation.
Thrasher, James F.; Swayampakala, Kamala; Borland, Ron; Nagelhout, Gera; Yong, Hua-Hie; Hammond, David; Bansal-Travers, Maansi; Thompson, Mary; Hardin, James
2016-01-01
ABSTRACT Guided by the extended parallel process model (EPPM) and reactance theory, this study examined the relationship between efficacy beliefs, reactance, and adult smokers’ responses to pictorial health warning labels (HWL) on cigarette packaging, including whether efficacy beliefs or reactance modify the relationship between HWL responses and subsequent smoking cessation behavior. Four waves of data were analyzed from prospective cohorts of smokers in Australia and Canada (n = 7,120 observations) over a period of time after implementation of more prominent, pictorial HWLs. Three types of HWL responses were studied: psychological threat responses (i.e., thinking about risks from smoking), forgoing cigarettes due to HWLs, and avoiding HWLs. The results from Generalized Estimating Equation models indicated that stronger efficacy beliefs and lower trait reactance were significantly associated with greater psychological threat responses to HWLs. Similar results were found for models predicting forgoing behavior, although response efficacy was inversely associated with it. Only response efficacy was significantly associated with avoiding HWLs, showing a positive relationship. Higher self-efficacy and stronger responses to HWLs, no matter the type, were associated with attempting to quit in the follow-up period; reactance was unassociated. No statistically significant interactions were found. These results suggest that stronger efficacy beliefs and lower trait reactance are associated with some stronger responses to fear-arousing HWL responses; however, these HWL responses appear no less likely to lead to cessation attempts among smokers with different levels of self-efficacy to quit, of response efficacy beliefs, or of trait reactance against attempts to control their behavior. PMID:27135826
2013-06-03
associated Program design: Kenya . and written project with improved I) Generic model should be adaptable documentation. diagnosis or treatment. to local...potential for and threats to development through an unsustainable and 3) Gaps in evaluation in area of building sustainable to performance -based...implementation in developing countries by building a framework that will identify key elements in this process and serve as guidance to implementers. This study
A Guide to Curriculum Development in Social Studies.
ERIC Educational Resources Information Center
Connecticut State Dept. of Education, Hartford.
The purpose of this guide is to assist curriculum planners in local school districts as they develop and implement their own programs of study. The guide is written for several audiences, including: boards of education; district, school, and departmental administrators; curriculum committees; and classroom teachers. The guide begins with a brief…
DOT National Transportation Integrated Search
2011-07-01
Current pavement design based on the AASHTO Design Guide uses an empirical approach from the results of the AASHO Road Test conducted in 1958. To address some of the limitations of the original design guide, AASHTO developed a new guide: Mechanistic ...
New Jersey Industrial Arts Education Safety Guide.
ERIC Educational Resources Information Center
Kobylarz, Joseph D.; Olender, Francis B.
This guide was developed to assist the teacher in planning, implementing, revising, or improving safety instruction in industrial arts classes in New Jersey, and has as its theme, "Safety Is Everyone's Responsibility." The guide is organized in seven major sections. The first section explains the purpose of the guide, outlines the…
Lock, J; de Bekker-Grob, E W; Urhan, G; Peters, M; Meijer, K; Brons, P; van der Meer, F J M; Driessens, M H E; Collins, P W; Fijnvandraat, K; Leebeek, F W G; Cnossen, M H
2016-01-01
Patients', parents' and providers' preferences with regard to medical innovations may have a major impact on their implementation. To evaluate barriers and facilitators for individualized pharmacokinetic (PK)-guided dosing of prophylaxis in haemophilia patients, parents of young patients, and treating professionals by discrete choice experiment (DCE) questionnaire. The study population consisted of patients with haemophilia currently or previously on prophylactic treatment with factor concentrate (n = 114), parents of patients aged 12-18 years (n = 19) and haemophilia professionals (n = 91). DCE data analysis was performed, taking preference heterogeneity into account. Overall, patients and parents, and especially professionals were inclined to opt for PK-guided dosing of prophylaxis. In addition, if bleeding was consequently reduced, more frequent infusions were acceptable. However, daily dosing remained an important barrier for all involved. 'Reduction of costs for society' was a facilitator for implementation in all groups. To achieve implementation of individualized PK-guided dosing of prophylaxis in haemophilia, reduction of bleeding risk and reduction of costs for society should be actively discussed as they are motivating for implementation; daily dosing is still reported to be a barrier for all groups. The knowledge of these preferences will enlarge support for this innovation, and aid in the drafting of implementable guidelines and information brochures for patients, parents and professionals. © 2015 John Wiley & Sons Ltd.
2014-01-01
Background The potential of clinical practice guidelines has not been realized due to inconsistent adoption in clinical practice. Optimising intrinsic characteristics of guidelines (e.g., its wording and format) that are associated with uptake (as perceived by their end users) may have potential. Using findings from a realist review on guideline uptake and consultation with experts in guideline development, we designed a conceptual version of a future tool called Guideline Implementability Tool (GUIDE-IT). The tool will aim to involve family physicians in the guideline development process by providing a process to assess draft guideline recommendations. This feedback will then be given back to developers to consider when finalizing the recommendations. As guideline characteristics are best assessed by end-users, the objectives of the current study were to explore how family physicians perceive guideline implementability, and to determine what components should comprise the final GUIDE-IT prototype. Methods We conducted a qualitative study with family physicians inToronto, Ontario. Two experienced investigators conducted one-hour interviews with family physicians using a semi-structured interview guide to 1) elicit feedback on perceptions on guideline implementability; 2) to generate a discussion in response to three draft recommendations; and 3) to provide feedback on the conceptual GUIDE-IT. Sessions were audio taped and transcribed verbatim. Data collection and analysis were guided by content analyses. Results 20 family physicians participated. They perceived guideline uptake according to facilitators and barriers across 6 categories of guideline implementability (format, content, language, usability, development, and the practice environment). Participants’ feedback on 3 draft guideline recommendations were grouped according to guideline perception, cognition, and agreement. When asked to comment on GUIDE-IT, most respondents believed that the tool would be useful, but urged to involve “regular” or community family physicians in the process, and suggested that an online system would be the most efficient way to deliver it. Conclusions Our study identified facilitators and barriers of guideline implementability from the perspective of community and academic family physicians that will be used to build our GUIDE-IT prototype. Our findings build on current knowledge by showing that family physicians perceive guideline uptake mostly according to factors that are in the control of guideline developers. PMID:24476491
Exploring Crisis Management in U.S. Small Businesses
NASA Astrophysics Data System (ADS)
Williams, Jon
As a critical infrastructure, the US electricity grid supplies electricity to 340 million people within eight separate regions. The power infrastructure is vulnerable to many types of disasters capable of severing supplies of electricity. The impact on the employees and communities when small- and medium-size enterprises are shut down due to disasters can be severe. The purpose of the quantitative comparative study was to explore small- and medium-size enterprises crisis management strategies in the case of power infrastructure vulnerabilities. Perceptions of small business leaders were probed about crisis management planning relevant to three secondary factors: prior experience of crises, threat perceptions, and planning self-efficacy. Participants completed an adapted questionnaire instrument based on a five-point Likert scale for six sub-factors including resilience through planning, financial impact, operational crisis management, the perfect storm, the aftermath of survival, and atrophy. The instrument also measured three additional factors to include, prior experience of crises, threat perceptions, and planning self-efficacy, across seven types of crises. The results of this study indicated that of the 276 respondents, 104 had no crisis plans, but 172 did have crisis plans. Of those who had implemented crisis plans, 19% had specific provisions to address power outages or attacks on the electrical grid. Of the respondents who had not planned for power outages nor experienced significant losses of power, a statistically significant number acknowledged an external threat to their business. The majority of respondents indicated that long-term planning was related to resilience; however, the migration of crisis understanding into the planning process or implementation was not implemented. This heightened awareness of potential crises without the corresponding development and implementation of mitigation crisis plans requires additional research to understand drivers effecting the decision making process with crisis managers.
Plotnikoff, Ronald C; Rhodes, Ryan E; Trinh, Linda
2009-11-01
The purpose of this study was to examine the Protection Motivation Theory (PMT) to predict physical activity (PA) behaviour in a large, population-based sample of adults. One thousand six hundred and two randomly selected individuals completed two telephone interviews over two consecutive six-month periods assessing PMT constructs. PMT explained 35 per cent and 20 per cent of the variance in intention and behaviour respectively. Coping cognitions as moderators of threat explained 1 per cent of the variance in intention and behaviour. Age and gender as moderators of threat did not provide additional variance in the models. We conclude that salient PMT predictors (e.g. self-efficacy) may guide the development of effective PA interventions in the general population.
Van de Velde, Stijn; Roshanov, Pavel; Kortteisto, Tiina; Kunnamo, Ilkka; Aertgeerts, Bert; Vandvik, Per Olav; Flottorp, Signe
2016-03-05
A computerised clinical decision support system (CCDSS) is a technology that uses patient-specific data to provide relevant medical knowledge at the point of care. It is considered to be an important quality improvement intervention, and the implementation of CCDSS is growing substantially. However, the significant investments do not consistently result in value for money due to content, context, system and implementation issues. The Guideline Implementation with Decision Support (GUIDES) project aims to improve the impact of CCDSS through optimised implementation based on high-quality evidence-based recommendations. To achieve this, we will develop tools that address the factors that determine successful CCDSS implementation. We will develop the GUIDES tools in four steps, using the methods and results of the Tailored Implementation for Chronic Diseases (TICD) project as a starting point: (1) a review of research evidence and frameworks on the determinants of implementing recommendations using CCDSS; (2) a synthesis of a comprehensive framework for the identified determinants; (3) the development of tools for use of the framework and (4) pilot testing the utility of the tools through the development of a tailored CCDSS intervention in Norway, Belgium and Finland. We selected the conservative management of knee osteoarthritis as a prototype condition for the pilot. During the process, the authors will collaborate with an international expert group to provide input and feedback on the tools. This project will provide guidance and tools on methods of identifying implementation determinants and selecting strategies to implement evidence-based recommendations through CCDSS. We will make the GUIDES tools available to CCDSS developers, implementers, researchers, funders, clinicians, managers, educators, and policymakers internationally. The tools and recommendations will be generic, which makes them scalable to a large spectrum of conditions. Ultimately, the better implementation of CCDSS may lead to better-informed decisions and improved care and patient outcomes for a wide range of conditions. PROSPERO, CRD42016033738.
The information protection level assessment system implementation
NASA Astrophysics Data System (ADS)
Trapeznikov, E. V.
2018-04-01
Currently, the threat of various attacks increases significantly as automated systems become more widespread. On the basis of the conducted analysis the information protection level assessment system establishing objective was identified. The paper presents the information protection level assessment software implementation in the information system by applying the programming language C #. In conclusions the software features are identified and experimental results are represented.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-19
... FGD Systems During Downtime as a Function of PSD,'' from Edward E. Reich to G.T. Helms and January 28... in the index, some information is not publicly available, e.g., CBI or other information whose... alternatives. g. Explain your views as clearly as possible, avoiding the use of profanity or personal threats...
The cognitive architecture of anxiety-like behavioral inhibition.
Bach, Dominik R
2017-01-01
The combination of reward and potential threat is termed approach/avoidance conflict and elicits specific behaviors, including passive avoidance and behavioral inhibition (BI). Anxiety-relieving drugs reduce these behaviors, and a rich psychological literature has addressed how personality traits dominated by BI predispose for anxiety disorders. Yet, a formal understanding of the cognitive inference and planning processes underlying anxiety-like BI is lacking. Here, we present and empirically test such formalization in the terminology of reinforcement learning. We capitalize on a human computer game in which participants collect sequentially appearing monetary tokens while under threat of virtual "predation." First, we demonstrate that humans modulate BI according to experienced consequences. This suggests an instrumental implementation of BI generation rather than a Pavlovian mechanism that is agnostic about action outcomes. Second, an internal model that would make BI adaptive is expressed in an independent task that involves no threat. The existence of such internal model is a necessary condition to conclude that BI is under model-based control. These findings relate a plethora of human and nonhuman observations on BI to reinforcement learning theory, and crucially constrain the quest for its neural implementation. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Resilience of Cyber Systems with Over- and Underregulation.
Gisladottir, Viktoria; Ganin, Alexander A; Keisler, Jeffrey M; Kepner, Jeremy; Linkov, Igor
2017-09-01
Recent cyber attacks provide evidence of increased threats to our critical systems and infrastructure. A common reaction to a new threat is to harden the system by adding new rules and regulations. As federal and state governments request new procedures to follow, each of their organizations implements their own cyber defense strategies. This unintentionally increases time and effort that employees spend on training and policy implementation and decreases the time and latitude to perform critical job functions, thus raising overall levels of stress. People's performance under stress, coupled with an overabundance of information, results in even more vulnerabilities for adversaries to exploit. In this article, we embed a simple regulatory model that accounts for cybersecurity human factors and an organization's regulatory environment in a model of a corporate cyber network under attack. The resulting model demonstrates the effect of under- and overregulation on an organization's resilience with respect to insider threats. Currently, there is a tendency to use ad-hoc approaches to account for human factors rather than to incorporate them into cyber resilience modeling. It is clear that using a systematic approach utilizing behavioral science, which already exists in cyber resilience assessment, would provide a more holistic view for decisionmakers. © 2016 Society for Risk Analysis.
DOT National Transportation Integrated Search
2011-09-01
"This guide focuses on identifying HSM training currently available to state and local agencies who are considering implementation of the HSM. The objectives of the training guide are to: : Identify key focus groups that can be used as a basis fo...
An approach for identification of unknown viruses using sequencing-by-hybridization.
Katoski, Sarah E; Meyer, Hermann; Ibrahim, Sofi
2015-09-01
Accurate identification of biological threat agents, especially RNA viruses, in clinical or environmental samples can be challenging because the concentration of viral genomic material in a given sample is usually low, viral genomic RNA is liable to degradation, and RNA viruses are extremely diverse. A two-tiered approach was used for initial identification, then full genomic characterization of 199 RNA viruses belonging to virus families Arenaviridae, Bunyaviridae, Filoviridae, Flaviviridae, and Togaviridae. A Sequencing-by-hybridization (SBH) microarray was used to tentatively identify a viral pathogen then, the identity is confirmed by guided next-generation sequencing (NGS). After optimization and evaluation of the SBH and NGS methodologies with various virus species and strains, the approach was used to test the ability to identify viruses in blinded samples. The SBH correctly identified two Ebola viruses in the blinded samples within 24 hr, and by using guided amplicon sequencing with 454 GS FLX, the identities of the viruses in both samples were confirmed. SBH provides at relatively low-cost screening of biological samples against a panel of viral pathogens that can be custom-designed on a microarray. Once the identity of virus is deduced from the highest hybridization signal on the SBH microarray, guided (amplicon) NGS sequencing can be used not only to confirm the identity of the virus but also to provide further information about the strain or isolate, including a potential genetic manipulation. This approach can be useful in situations where natural or deliberate biological threat incidents might occur and a rapid response is required. © 2015 Wiley Periodicals, Inc.
Automated fault-management in a simulated spaceflight micro-world
NASA Technical Reports Server (NTRS)
Lorenz, Bernd; Di Nocera, Francesco; Rottger, Stefan; Parasuraman, Raja
2002-01-01
BACKGROUND: As human spaceflight missions extend in duration and distance from Earth, a self-sufficient crew will bear far greater onboard responsibility and authority for mission success. This will increase the need for automated fault management (FM). Human factors issues in the use of such systems include maintenance of cognitive skill, situational awareness (SA), trust in automation, and workload. This study examine the human performance consequences of operator use of intelligent FM support in interaction with an autonomous, space-related, atmospheric control system. METHODS: An expert system representing a model-base reasoning agent supported operators at a low level of automation (LOA) by a computerized fault finding guide, at a medium LOA by an automated diagnosis and recovery advisory, and at a high LOA by automate diagnosis and recovery implementation, subject to operator approval or veto. Ten percent of the experimental trials involved complete failure of FM support. RESULTS: Benefits of automation were reflected in more accurate diagnoses, shorter fault identification time, and reduced subjective operator workload. Unexpectedly, fault identification times deteriorated more at the medium than at the high LOA during automation failure. Analyses of information sampling behavior showed that offloading operators from recovery implementation during reliable automation enabled operators at high LOA to engage in fault assessment activities CONCLUSIONS: The potential threat to SA imposed by high-level automation, in which decision advisories are automatically generated, need not inevitably be counteracted by choosing a lower LOA. Instead, freeing operator cognitive resources by automatic implementation of recover plans at a higher LOA can promote better fault comprehension, so long as the automation interface is designed to support efficient information sampling.
Strategic Plan for the Spanish Academy of Dermatology and Venerology (AEDV): FuturAEDV 2013-2017.
Ribera Pibernat, M; Moreno Jiménez, J C; Valcuende Cavero, F; Soto de Delás, J; Vázquez Veiga, H; Lázaro Ochaíta, P; Giménez Arnau, A
2014-09-01
The Spanish Academy of Dermatology and Venereology (AEDV) has decided that a Strategic Plan is needed to help the association adapt to new circumstances and anticipate future developments. 1) To position the AEDV as a medical association that can exert an influence in everything related to dermatology. 2) To contribute to the development of the specialty, strengthening the prestige and reputation of dermatology and dermatologists. 3) To establish a model for operating and strategic thinking that can be handed on to successive Boards of Directors and will enable the Academy to identify future challenges. The approach used to develop the Strategic Plan was as follows: analysis of trends in the health care system; assessment of the current situation of AEDV and of dermatology in general through an internal analysis based on surveys and interviews with academics; analysis of strengths, weaknesses, opportunities, and threats; preparation of a mission statement; and identification, development, and implementation of a strategy map prioritizing strategic lines of action. The strategy map set out 16 general goals grouped into 4 main topics (achieving the vision, internal and external customers, internal processes, and innovation) and detailed in an action plan with 19 initiatives, each with specific actions. The plan will be monitored by the Strategic Plan Monitoring Committee, which is made up of the members of the Standing Committee and the chairs of the 9 Technical Committees responsible for implementing the initiatives. The Functional Plan should guide the management of AEDV until 2017, and its implementation will enable the association to contribute to the development and prestige of the specialty and position itself as a reference in terms of its functional model. Copyright © 2014 Elsevier España, S.L.U. y AEDV. All rights reserved.
Are you ready? Crisis leadership in a hyper-VUCA environment.
Alkhaldi, Khaldoon H; Austin, Meredith L; Cura, Boris A; Dantzler, Darrell; Holland, Leslie; Maples, David L; Quarrelles, Jamie C; Weinkle, Robert K; Marcus, Leonard J
2017-01-01
The current hyper-volatile, -uncertain, -complex, and -ambiguous (VUCA) threat environment demands a more cohesive support structure for crisis leaders who may be faced with crises of increasing magnitude and frequency and, in some instances, multiple crisis events simultaneously. The project team investigates the perceptions of crisis leaders regarding establishing a crisis leader advisor position for crisis leaders to benefit from their experience while prosecuting crisis response activities. The team linked hyper-VUCA crises, crisis response frameworks, meta-leadership, crisis leader attributes, and advisor attributes. The overall goal of the project is to increase the ability of the crisis leaders to more effectively and efficiently navigate crisis events resulting in more efficient and effective response and recovery. Three research questions were developed to assess the following: thoughts of integrating a crisis leader advisor position; development of a crisis leader advisor certification program; and attributes of crisis leader advisors. A qualitative research methodology using a phenomenological approach was employed. Forty-one participants were purposefully selected and administered a short, online survey consisting of 11 questions. Data were analyzed using percentage analysis, weighted sums, and inductive thematic analysis. The project team found an overwhelming support for the crisis leader advisor position and the crisis leader advisor certification program. Additionally, experience and trustworthiness ranked among the top sought after attributes of a crisis leader advisor. The team recommendations included (1) implement a crisis leaders advisor guide/framework; (2) create a formal crisis leader advisor position in national incident management system; (3) implement a crisis leader advisor certification framework; (4) benchmark established advisor programs; and (5) implement a framework to match leaders and advisors.
Are you ready? Crisis leadership in a hyper-VUCA environment.
Alkhaldi, Khaldoon H; Austin, Meredith L; Cura, Boris A; Dantzler, Darrell; Holland, Leslie; Maples, David L; Quarrelles, Jamie C; Weinkle, Robert K; Marcus, Leonard J
The current hyper-volatile, -uncertain, -complex, and -ambiguous (VUCA) threat environment demands a more cohesive support structure for crisis leaders who may be faced with crises of increasing magnitude and frequency and, in some instances, multiple crisis events simultaneously. The project team investigates the perceptions of crisis leaders regarding establishing a crisis leader advisor position for crisis leaders to benefit from their experience while prosecuting crisis response activities. The team linked hyper-VUCA crises, crisis response frameworks, meta-leadership, crisis leader attributes, and advisor attributes. The overall goal of the project is to increase the ability of the crisis leaders to more effectively and efficiently navigate crisis events resulting in more efficient and effective response and recovery. Three research questions were developed to assess the following: thoughts of integrating a crisis leader advisor position; development of a crisis leader advisor certification program; and attributes of crisis leader advisors. A qualitative research methodology using a phenomenological approach was employed. Forty-one participants were purposefully selected and administered a short, on-line survey consisting of 11 questions. Data were analyzed using percentage analysis, weighted sums, and inductive thematic analysis. The project team found an overwhelming support for the crisis leader advisor position and the crisis leader advisor certification program. Additionally, experience and trustworthiness ranked among the top sought after attributes of a crisis leader advisor. The team recommendations included (1) implement a crisis leaders advisor guide/framework; (2) create a formal crisis leader advisor position in national incident management system; (3) implement a crisis leader advisor certification framework; (4) benchmark established advisor programs; and (5) implement a framework to match leaders and advisors.
Are you ready? Crisis leadership in a hyper-VUCA environment.
Alkhaldi, Khaldoon H; Austin, Meredith L; Cura, Boris A; Dantzler, Darrell; Holland, Leslie; Maples, David L; Quarrelles, Jamie C; Weinkle, Robert K; Marcus, Leonard J
The current hyper-volatile, -uncertain, -complex, and -ambiguous (VUCA) threat environment demands a more cohesive support structure for crisis leaders who may be faced with crises of increasing magnitude and frequency and, in some instances, multiple crisis events simultaneously. The project team investigates the perceptions of crisis leaders regarding establishing a crisis leader advisor position for crisis leaders to benefit from their experience while prosecuting crisis response activities. The team linked hyper-VUCA crises, crisis response frameworks, meta-leadership, crisis leader attributes, and advisor attributes. The overall goal of the project is to increase the ability of the crisis leaders to more effectively and efficiently navigate crisis events resulting in more efficient and effective response and recovery. Three research questions were developed to assess the following: thoughts of integrating a crisis leader advisor position; development of a crisis leader advisor certification program; and attributes of crisis leader advisors. A qualitative research methodology using a phenomenological approach was employed. Forty-one participants were purposefully selected and administered a short, on-line survey consisting of 11 questions. Data were analyzed using percentage analysis,weighted sums, and inductive thematic analysis. The project team found an overwhelming support for the crisis leader advisor position and the crisis leader advisor certification program. Additionally, experience and trustworthiness ranked among the top sought after attributes of a crisis leader advisor. The team recommendations included (1) implement a crisis leaders advisor guide/framework; (2) create a formal crisis leader advisor position in national incident management system; (3) implement a crisis leader advisor certification framework; (4) benchmark established advisor programs; and (5) implement a framework to match leaders and advisors.
CDC Vital Signs: Making Health Care Safer
... safety efforts happening across the state. Health care facility CEOs/administrators can: Implement systems to alert receiving ... Germs spread between patients and across health care facilities. Antibiotic resistance is a threat. Nightmare germs called ...
Posid, Joseph M.; Popovic, Tanja
2012-01-01
Public health readiness has increased at all jurisdictional levels because of increased sensitivity to threats. Since 2001, with billions of dollars invested to bolster the public health system’s capacity, the public expects that public health will identify the etiology of and respond to events more rapidly. However, when etiologies are unknown at the onset of the investigation but interventions must be implemented, public health practitioners must benefit from past investigations’ lessons to strengthen preparedness for emerging threats. We have identified such potentially actionable lessons learned from historically important public health events that occurred primarily as syndromes for which the etiological agent initially was unknown. Ongoing analysis of investigations can advance our capability to recognize and investigate syndromes and other problems and implement the most appropriate interventions. PMID:22571706
Anxiety promotes memory for mood-congruent faces but does not alter loss aversion
Charpentier, Caroline J.; Hindocha, Chandni; Roiser, Jonathan P.; Robinson, Oliver J.
2016-01-01
Pathological anxiety is associated with disrupted cognitive processing, including working memory and decision-making. In healthy individuals, experimentally-induced state anxiety or high trait anxiety often results in the deployment of adaptive harm-avoidant behaviours. However, how these processes affect cognition is largely unknown. To investigate this question, we implemented a translational within-subjects anxiety induction, threat of shock, in healthy participants reporting a wide range of trait anxiety scores. Participants completed a gambling task, embedded within an emotional working memory task, with some blocks under unpredictable threat and others safe from shock. Relative to the safe condition, threat of shock improved recall of threat-congruent (fearful) face location, especially in highly trait anxious participants. This suggests that threat boosts working memory for mood-congruent stimuli in vulnerable individuals, mirroring memory biases in clinical anxiety. By contrast, Bayesian analysis indicated that gambling decisions were better explained by models that did not include threat or treat anxiety, suggesting that: (i) higher-level executive functions are robust to these anxiety manipulations; and (ii) decreased risk-taking may be specific to pathological anxiety. These findings provide insight into the complex interactions between trait anxiety, acute state anxiety and cognition, and may help understand the cognitive mechanisms underlying adaptive anxiety. PMID:27098489
Anxiety promotes memory for mood-congruent faces but does not alter loss aversion.
Charpentier, Caroline J; Hindocha, Chandni; Roiser, Jonathan P; Robinson, Oliver J
2016-04-21
Pathological anxiety is associated with disrupted cognitive processing, including working memory and decision-making. In healthy individuals, experimentally-induced state anxiety or high trait anxiety often results in the deployment of adaptive harm-avoidant behaviours. However, how these processes affect cognition is largely unknown. To investigate this question, we implemented a translational within-subjects anxiety induction, threat of shock, in healthy participants reporting a wide range of trait anxiety scores. Participants completed a gambling task, embedded within an emotional working memory task, with some blocks under unpredictable threat and others safe from shock. Relative to the safe condition, threat of shock improved recall of threat-congruent (fearful) face location, especially in highly trait anxious participants. This suggests that threat boosts working memory for mood-congruent stimuli in vulnerable individuals, mirroring memory biases in clinical anxiety. By contrast, Bayesian analysis indicated that gambling decisions were better explained by models that did not include threat or treat anxiety, suggesting that: (i) higher-level executive functions are robust to these anxiety manipulations; and (ii) decreased risk-taking may be specific to pathological anxiety. These findings provide insight into the complex interactions between trait anxiety, acute state anxiety and cognition, and may help understand the cognitive mechanisms underlying adaptive anxiety.
One health security: an important component of the global health security agenda.
Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle
2014-01-01
The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.
Waage, J K; Mumford, J D
2008-02-27
The prevention and control of new pest and disease introductions is an agricultural challenge which is attracting growing public interest. This interest is in part driven by an impression that the threat is increasing, but there has been little analysis of the changing rates of biosecurity threat, and existing evidence is equivocal. Traditional biosecurity systems for animals and plants differ substantially but are beginning to converge. Bio-economic modelling of risk will be a valuable tool in guiding the allocation of limited resources for biosecurity. The future of prevention and management systems will be strongly influenced by new technology and the growing role of the private sector. Overall, today's biosecurity systems are challenged by changing national priorities regarding trade, by new concerns about environmental effects of biological invasions and by the question 'who pays?'. Tomorrow's systems may need to be quite different to be effective. We suggest three changes: an integration of plant and animal biosecurity around a common, proactive, risk-based approach; a greater focus on international cooperation to deal with threats at source; and a commitment to refocus biosecurity on building resilience to invasion into agroecosystems rather than building walls around them.
von Krogh, Gunn; Nåden, Dagfinn
2008-04-01
To describe and discuss theoretical and methodological issues of implementation of a nursing services documentation model comprising NANDA nursing diagnoses, Nursing Intervention Classification and Nursing Outcome Classification terminologies. The model is developed for electronic patient record and was implemented in a psychiatric hospital on an organizational level and on five test wards in 2001-2005. The theory of Rogers guided the process of innovation, whereas the implementation procedure of McCloskey and Bulecheck combined with adult learning principals guided the test site implementation. The test wards managed in different degrees to adopt the model. Two wards succeeded fully, including a ward with high percentage of staff with interdisciplinary background. Better planning regarding the impact of the organization's innovative aptitude, the innovation strategies and the use of differentiated methods regarding the clinician's individual premises for learning nursing terminologies might have enhanced the adoption to the model. To better understand the nature of barriers and the importance of careful planning regarding the implementation of electronic patient record elements in nursing care services, focusing on nursing terminologies. Further to indicate how a theory and specific procedure can be used to guide the process of implementation throughout the different levels of management.
Towards a successful clinical implementation of fluorescence-guided surgery.
Snoeks, T J A; van Driel, P B A A; Keereweer, S; Aime, S; Brindle, K M; van Dam, G M; Löwik, C W G M; Ntziachristos, V; Vahrmeijer, A L
2014-04-01
During the European Molecular Imaging Meeting (EMIM) 2013, the fluorescence-guided surgery study group held its inaugural session to discuss the clinical implementation of fluorescence-guided surgery. The general aim of this study group is to discuss and identify the steps required to successfully and safely bring intraoperative fluorescence imaging to the clinics. The focus group intends to use synergies between interested groups as a tool to address regulatory and implementation hurdles in Europe and operates within the intraoperative focus group of the World Molecular Imaging Society (WMIS) that promotes the same interests at the WMIS level. The major topics on the critical path of implementation identified within the study group were quality controls and standards for ensuring accurate imaging and the ability to compare results from different studies, regulatory affairs, and strategies to increase awareness among physicians, regulators, insurance companies, and a broader audience. These hurdles, and the possible actions discussed to overcome them, are summarized in this report. Furthermore, a number of recommendations for the future shape of the fluorescence-guided study group are discussed. A main driving conclusion remains that intraoperative imaging has great clinical potential and that many of the solutions required are best addressed with the community working together to optimally promote and accelerate the clinical implementation of fluorescence imaging towards improving surgical procedures.
ERIC Educational Resources Information Center
Cheung, Derek
2011-01-01
One of the characteristics of teaching chemistry through inquiry is that teachers need to encourage students to design their experimental procedures. Although the benefits of inquiry teaching are well documented in the literature, few teachers implement it in schools. The purpose of this study was to develop a guided-inquiry scale (GIS) to measure…
ERIC Educational Resources Information Center
Dodge, Diane Trister; And Others
This guide is designed for early childhood educators who are helping their staffs implement the Creative Curriculum for Early Childhood, a curriculum that is based on child development theory and is developmentally appropriate for preschool and kindergarten children. A carefully organized and rich environment serves as the focus of this…
ERIC Educational Resources Information Center
Cotter, Barbara
Intended to aid administrators and users of social services in establishing information systems, this comprehensive guide to the design of such systems identifies the elements, effective strategies, and potential pitfalls involved in their planning, implementation, and utilization. Detailed discussions of management strategies for system…
Implementing the Child Care and Development Block Grant Reauthorization: A Guide for States
ERIC Educational Resources Information Center
Matthews, Hannah; Schulman, Karen; Vogtman, Julie; Johnson-Staub, Christine; Blank, Helen
2015-01-01
In November 2014, with broad bipartisan support, Congress reauthorized CCDBG [Child Care and Development Block Grant] (the major federal child care program) for the first time since 1996. The new law strengthens CCDBG's dual role as a major early childhood education program and a work support for low-income families. This implementation guide is…
Implementing "Abbott v. Burke": A Guide to the 2006 K-12 Abbott Regulations
ERIC Educational Resources Information Center
Education Law Center, 2005
2005-01-01
Except for school construction, there is no legislation to guide implementation of the programs and reforms ordered by the New Jersey Supreme Court in the landmark "Abbott v. Burke" case. Instead, in its 1998 "Abbott V decision," the Supreme Court directed the Commissioner of Education to provide standards and procedures to…
Career Development via Counselor/Teacher Teams; Guide for Implementation.
ERIC Educational Resources Information Center
Royal Oak City School District, MI.
The career development modules of the implementation guide, designed by counselor/teacher teams in Royal Oak, Michigan for junior high students, are intended to be used as a working copy for counselor/teacher teams. Career education concepts of self-awareness, assessment, and decision-making are correlated with the broad questions of: Who am I?…
ERIC Educational Resources Information Center
Commission des Communautes Europeennes (Luxembourg).
In 1992, the Council of European Community Member States adopted the Childcare Recommendation, describing the elements of effective childcare systems, to assist in the development of public policy to help parents reconcile work and family roles. This guide provides detailed suggestions for implementing these elements. Following an introduction…
ERIC Educational Resources Information Center
Knight, Jeanne; And Others
This guide provides assistance to New Mexico school districts in implementing a state-sponsored teacher performance evaluation plan (Provision III of the New Mexico Staff Accountability Plan, adopted by the State Board of Education). This plan involves five basic procedures: (1) determine specific definitions of the six essential teaching…
Cultural Diversity and the ADA. Implementing the Americans with Disabilities Act.
ERIC Educational Resources Information Center
Bruyere, Susanne M.; Hoying, Joyce
One of a series of guides on implementing the Americans with Disabilities Act (ADA), this guide focuses on cultural diversity and the ADA. First, the major components of the ADA are summarized. This is followed by discussion of employer considerations in addressing cultural diversity issues and implications of the ADA, such as diversity…
2012-01-01
Background Adults with anxiety show biased categorization and avoidance of threats. Such biases may emerge through complex interplay between genetics and environments, occurring early in life. Research on threat biases in children has focuses on a restricted range of biases, with insufficient focus on genetic and environmental origins. Here, we explore differences between children with and without anxiety problems in under-studied areas of threat bias. We focused both on associations with anxious phenotype and the underlying gene-environmental correlates for two specific processes: the categorisation of threat faces and avoidance learning. Method Two-hundred and fifty 10-year old MZ and DZ twin pairs (500 individuals) completed tasks assessing accuracy in the labelling of threatening facial expressions and in the acquisition of avoidant responses to a card associated with a masked threatening face. To assess whether participants met criteria for an anxiety disorder, parents of twins completed a self-guided computerized version of the Development and Well-being Assessment (DAWBA). Comparison of MZ and DZ twin correlations using model-fitting were used to compute estimates of genetic, shared and non-shared environmental effects. Results Of the 500 twins assessed, 25 (5%) met diagnostic criteria for a current anxiety disorder. Children with anxiety disorders were more accurate in their ability to recognize disgust faces than those without anxiety disorders, but were commensurate on identifying other threatening face emotions (angry, fearful, sad). Children with anxiety disorders but also more strongly avoided selecting a conditioned stimulus than non-anxious children. While recognition of socially threatening faces was moderately heritable, avoidant responses were heavily influenced by the non-shared environment. Conclusion These data add to other findings on threat biases in anxious children. Specifically, we found biases in the labelling of some negative-valence faces and in the acquisition of avoidant responses. While non-shared environmental effects explained all of the variance on threat avoidance, some of this may be due to measurement error. PMID:22788754
A guide for HOT lane development
DOT National Transportation Integrated Search
2002-12-01
This guide is intended to be a comprehensive source of collective experience gained from the nations current and implemented high occupancy toll (HOT) lane projects. The guide presents a wide range of information on HOT lanes and is intended to as...
Van Dyke, Melissa K; Naoom, Sandra F
2016-01-01
Evidence-based approaches only benefit individuals when fully and effectively implemented. Since funding and monitoring alone will not ensure the full and effective implementation of effective strategies, state agencies have the opportunity to assess and modify current roles, functions, and policies to align with the requirements of evidence-based strategies. Based on a growing body of knowledge to guide effective implementation processes, state agencies, or designated partner organizations, can develop the capacity, mechanisms, and infrastructure to effectively implement evidence-based strategies. This article describes a framework that can guide this process. Informed by the literature and shaped by "real-world experience," the Active Implementation Frameworks provide a stage-matched approach to purposeful, active, and effective implementation.
The Polychromatic Laser Guide Star: the ELP-OA demonstrator at Observatoire de Haute Provence
NASA Astrophysics Data System (ADS)
Foy, R.; Chatagnat, M.; Dubet, D.; Éric, P.; Eysseric, J.; Foy, F.-C.; Fusco, T.; Girard, J.; Laloge, A.; Le van Suu, A.; Messaoudi, B.; Perruchot, S.; Richaud, P.; Richaud, Y.; Rondeau, X.; Tallon, M.; Thiébaut, É.; Boër, M.
2007-07-01
The correction of the tilt for adaptive optics devices from the only laser guide star can be done with the polychromatic laser guide star. We report the progress of the first demonstrator of the implementation of this concept, at Observatoire de Haute-Provence. We review the last steps of the feasibility studies, the optimization of the laser parameters, and the studies of the implementation at the OHP 1.52m telescope, including the beam propagation to the lasers room to the mesosphere and the algorithms for tip-tilt measurements.
Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.
2014-01-01
We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210
Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C
2013-07-01
We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.
Critical Viewing: Stimulant to Critical Thinking. Teacher's Guide.
ERIC Educational Resources Information Center
O'Reilly, Kevin; Splaine, John
The purpose of this guide is to implement the teaching of "Critical Viewing: Stimulant to Critical Thinking," a guide for students. Part one of the guide is an overview of the organization, methodologies, and evaluation procedures used in "Critical Viewing." Suggestions and activities for teaching the six chapters in "Critical Viewing" are given…
Heavy Equipment. Trade and Industrial Education Trade Preparatory Training Guide.
ERIC Educational Resources Information Center
Nebraska State Dept. of Education, Lincoln. Div. of Vocational Education.
One of a series of curriculum guides prepared for the building occupations cluster of the construction/fabrication occupational group, this guide identifies the essentials of the heavy equipment trade as recommended by the successful heavy equipment operator. An instructional program based upon the implementation of the guide is expected to…
Science Curriculum Guide. Grade 8. Bulletin 1989, No. 78.
ERIC Educational Resources Information Center
Alabama State Dept. of Education, Montgomery.
The purpose of this curriculum guide is to help teachers implement the Alabama Course of Study: Science. The major emphasis of the guide is to provide student-oriented, hands-on activities that engage students in "sciencing" behaviors. This guide has two major components, the table of contents and the activities. The table of contents…
Air Conditioning. Trade and Industrial Education Trade Preparatory Training Guide.
ERIC Educational Resources Information Center
Nebraska State Dept. of Education, Lincoln. Div. of Vocational Education.
One of a series of curriculum guides prepared for the building occupations cluster of the construction/fabrication occupational group, this guide identifies the essentials of the air conditioning trade as recommended by the successful air conditioner. An instructional program based upon the implementation of the guide is expected to prepare a…
Machine Shop. Trade and Industrial Education Trade Preparatory Training Guide.
ERIC Educational Resources Information Center
Nebraska State Dept. of Education, Lincoln. Div. of Vocational Education.
One of a series of curriculum guides prepared for the metal occupations cluster of the construction/fabrication occupational group, this guide identifies the essentials of the machinist trade as recommended by the successful machinist. An instructional program based upon the implementation of this guide is expected to prepare a student to…
Managing the Office Environment. Instructor's Guide. Student Activity Packet. Office Occupations.
ERIC Educational Resources Information Center
Johnson, Diane E.
This training package, one in a series of instructional modules consisting of an instructor's guide and a student activity packet, deals with managing the office environment. Included in the instructor's guide are general directions for implementing the presentation; a detailed guide for teaching the lesson that includes performance objectives,…
Science Curriculum Guide. Kindergarten. Bulletin 1989, No. 70.
ERIC Educational Resources Information Center
Alabama State Dept. of Education, Montgomery.
The purpose of this curriculum guide is to help teachers implement the Alabama Course of Study: Science. The major emphasis of the guide is to provide student-oriented, hands-on activities that engage students in "sciencing" behaviors. This guide has two major components, the table of contents and the activities. The table of contents…
ERIC Educational Resources Information Center
Nebraska State Dept. of Education, Lincoln. Div. of Vocational Education.
One of a series of curriculum guides prepared for the electricity/electronics occupations cluster, this guide identifies the essentials of the communication and industrial electronics trade as recommended by the successful electrical servicemen. An instructional program based upon the implementation of the guide is expected to prepare a student to…
Science Curriculum Guide. Grade 5. Bulletin 1989, No. 75.
ERIC Educational Resources Information Center
Alabama State Dept. of Education, Montgomery.
The purpose of this curriculum guide is to help teachers implement the Alabama Course of Study: Science. The major emphasis of the guide is to provide student-oriented, hands-on activities that engage students in "sciencing" behaviors. This guide has two major components, the table of contents and the activities. The table of contents…
Masonry. Trade and Industrial Education Trade Preparatory Training Guide.
ERIC Educational Resources Information Center
Nebraska State Dept. of Education, Lincoln. Div. of Vocational Education.
One of a series of curriculum guides prepared for the building occupations cluster of the construction/fabrication occupational group, this guide identifies the essentials of the masonry trade as recommended by the successful mason. An instructional program based upon the implementation of the guide is expected to prepare a student to adequately…
Graphic Arts. Trade and Industrial Education Trade Preparatory Training Guide.
ERIC Educational Resources Information Center
Nebraska State Dept. of Education, Lincoln. Div. of Vocational Education.
One of a series of curriculum guides prepared for the graphic communications occupations cluster, this guide identifies the essentials of the graphic arts trade as recommended by the successful printers. An instructional program based upon the implementation of the guide is expected to prepare a student to adequately perform entry level tasks…
Welding and Cutting. Trade and Industrial Education Trade Preparatory Training Guide.
ERIC Educational Resources Information Center
Nebraska State Dept. of Education, Lincoln. Div. of Vocational Education.
One of a series of curriculum guides prepared for the metals occupations cluster of the construction/fabrication occupational group, this guide identifies the essentials of the welding and cutting trade as recommended by successful welders. An instructional program based upon the implementation of the guide is expected to prepare a student to…
Science Curriculum Guide. Grade 2. Bulletin 1989, No. 72.
ERIC Educational Resources Information Center
Alabama State Dept. of Education, Montgomery.
The purpose of this curriculum guide is to help teachers implement the Alabama Course of Study: Science. The major emphasis of the guide is to provide student-oriented, hands-on activities that engage students in "sciencing" behaviors. This guide has to major components, the table of contents and the activities. The table of contents…
Science Curriculum Guide. Grade 1. Bulletin 1989, No. 71.
ERIC Educational Resources Information Center
Alabama State Dept. of Education, Montgomery.
The purpose of this curriculum guide is to help teachers implement the Alabama Course of Study: Science. The major emphasis of the guide is to provide student-oriented, hands-on activities that engage students in "sciencing" behaviors. This guide has to major components, the table of contents and the activities. The table of contents…
Science Curriculum Guide. Grade 3. Bulletin 1989, No. 73.
ERIC Educational Resources Information Center
Alabama State Dept. of Education, Montgomery.
The purpose of this curriculum guide is to help teachers implement the Alabama Course of Study: Science. The major emphasis of the guide is to provide student-oriented, hands-on activities that engage students in "sciencing" behaviors. This guide has two major components, the table of contents and the activities. The table of contents…
Radiological Defense. Planning and Operations Guide. Revised.
ERIC Educational Resources Information Center
Office of Civil Defense (DOD), Washington, DC.
This guide is a reprint of published and draft materials from the Federal Civil Defense Guide. This guide is intended to assist the student in planning, developing, implementing and operating a local, county, or state radiological defense (RADEF) system. The state and local radiological defense program objectives are to create an effective and…
Ultrasonic nonlinear guided wave inspection of microscopic damage in a composite structure
NASA Astrophysics Data System (ADS)
Zhang, Li; Borigo, Cody; Owens, Steven; Lissenden, Clifford; Rose, Joseph; Hakoda, Chris
2017-02-01
Sudden structural failure is a severe safety threat to many types of military and industrial composite structures. Because sudden structural failure may occur in a composite structure shortly after macroscale damage initiates, reliable early diagnosis of microdamage formation in the composite structure is critical to ensure safe operation and to reduce maintenance costs. Ultrasonic guided waves have been widely used for long-range defect detection in various structures. When guided waves are generated under certain excitation conditions, in addition to the traditional linear wave mode (known as the fundamental harmonic wave mode), a number of nonlinear higher-order harmonic wave modes are also be generated. Research shows that the nonlinear parameters of a higher-order harmonic wave mode could have excellent sensitivity to microstructural changes in a material. In this work, we successfully employed a nonlinear guided wave structural health monitoring (SHM) method to detect microscopic impact damage in a 32-layer carbon/epoxy fiber-reinforced composite plate. Our effort has demonstrated that, utilizing appropriate transducer design, equipment, excitation signals, and signal processing techniques, nonlinear guided wave parameter measurements can be reliably used to monitor microdamage initiation and growth in composite structures.
Droning On: American Strategic Myopia Toward Unmanned Aerial Systems
2013-12-01
torpedo, nicknamed the “Bug.”3 This system consisted of pre-set pneumatic and electrical controls that stabilized and guided it toward...race their homemade drones around Mount Damavand.88 These competitions and DIY efforts provide short-term innovation of unmanned technologies. This...an even greater threat to the homeland comes from homegrown or lone wolf actor’s possession of unmanned technology. DIY kits aid in building drones
Improvised Incendiary Devices: Risk Assessment, Threats, Vulnerabilities and Consequences
2006-09-01
terrorism, Baird substitutes “the unlawful use of force and violence ” with “the use of incendiary attacks” to intimidate or coerce a government, the...targeting of noncombatants; political motivation; violence with 35 ALF/ELF, Arson Around with Auntie A.L.F: Your Guide for Putting the Heat on Animal...contends that future pyro-terrorist attacks will lean toward unrestrained violence for maximum psychological impact and challenge the conventional
Hybrid Threat Center of Gravity Analysis: Cutting the Gordian Knot
2016-04-04
water avoids the heights … so an army avoids strengths and strikes weakness … water has no constant form.”1 - Sun Tzu Hybrid warfare is a topic...1 Sun Tzu , The Art of War, (Oxford University Press, London, 1963), 101. 2 Alba Iulia...and Boyer, Matthew. Vulnerability Assessment Method Pocket Guide: A Tool for Center of Gravity Analysis. RAND, 2014. Tzu , Sun . The Art of War
SWOT analysis in Sina Trauma and Surgery Research Center.
Salamati, Payman; ashraf Eghbali, Ali; Zarghampour, Manijeh
2014-01-01
The present study was conducted with the aim of identifying and evaluating the internal and external factors, affecting the Sina Trauma and Surgery Research Center, affiliated to Tehran University of Medical Sciences and propose some of related strategies to senior managers. We used a combined quantitative and qualitative methodology. Our study population consisted of personnel (18 individuals) at Sina Trauma and Surgery Research Center. Data-collection tools were the group discussions and the questionnaires. Data were analyzed with descriptive statistics and SWOT (Strength, Weakness, Opportunities and Threats) analysis. 18 individuals participated in sessions, consisting of 8 women (44.4%) and 10 men (55.6%). The final scores were 2.45 for internal factors (strength-weakness) and 2.17 for external factors (opportunities-threats). In this study, we proposed 36 strategies (10 weakness-threat strategies, 10 weakness-opportunity strategies, 7 strength-threat strategies, and 9 strength-opportunity strategies). The current status of Sina Trauma and Surgery Research Center is threatened weak. We recommend the center to implement the proposed strategies.
31 CFR 561.803 - Consultations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Consultations. In implementing sections 104 and 104A of the Comprehensive Iran Sanctions, Accountability, and Divestment Act of 2010 (Pub. L. 111-195) (22 U.S.C. 8501-8551), as amended by the Iran Threat Reduction and...
31 CFR 561.803 - Consultations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Consultations. In implementing sections 104 and 104A of the Comprehensive Iran Sanctions, Accountability, and Divestment Act of 2010 (Pub. L. 111-195) (22 U.S.C. 8501-8551), as amended by the Iran Threat Reduction and...
Aviation Security: A Case for Risk-Based Passenger Screening
2011-12-01
5 3. Threat Uncertainty ..............................................................................7 4. Increased Risk and Cost ...Airport Checkpoints .....................................131 ix 2. Technology Integration and Implementation Costs .....................131 3...Background Investigations and Sustaining Program Costs ........133 D. AREAS FOR FUTURE RESEARCH
Routine road maintenance water quality and habitat guide : best management practices
DOT National Transportation Integrated Search
2009-01-01
Since June 9, 1999 the Oregon Department of Transportation (ODOT) has implemented the Routine Road Maintenance: Water Quality and Habitat Guide Best Management Practices (the Guide), and is considered the cornerstone of the ODOT'd Office of Maintenan...
Basic Commercial Art. Florida Vocational Program Guide.
ERIC Educational Resources Information Center
University of South Florida, Tampa. Dept. of Adult and Vocational Education.
This document includes a vocational program guide and Career Merit Achievement Plan (Career MAP) for secondary and postsecondary basic commercial art programs. The guide contains the following sections: occupational description; program content (curriculum framework and student performance standards); program implementation (student admission…
Commercial Art. Florida Vocational Program Guide.
ERIC Educational Resources Information Center
University of South Florida, Tampa. Dept. of Adult and Vocational Education.
This document contains a vocational program guide and Career Merit Achievement Plan (Career MAP) for secondary and postsecondary commercial art. The guide contains the following sections: occupational description; program content (curriculum framework and student performance standards); program implementation (student admission criteria,…
2012-08-01
additional threats and errors in the corresponding form. Make sure your handwriting is legible. Keep a n ope n mind, eve n if you feel pe ople are doing...observation form. Write on additional threats and errors. Make sure your handwriting is legible. On a piece of bla nk pa per, you m ay want to m...to see a briefing report on this round of LOSA in a month. The report does not contain any identifiable information. In fact, it does not say
Richard J. Pringle; Lee K. Cerveny; Gordon A. Bradley
2015-01-01
The loss of open space was declared one of the âfour threats to the health of our nationâs forestsâ by former USDA Forest Service Chief Dale Bosworth in 2004. Since then, the agencywide Open Space Conservation Strategy (OSCS) was released and the âfour threatsâ were incorporated into the agencyâs National Strategic Plan. These actions indicate that the OSCS is in the...
[Biological research and security institutes].
Darsie, G; Falczuk, A J; Bergmann, I E
2006-04-01
The threat of using biological material for ago-bioterrorist ends has risen in recent years, which means that research and diagnostic laboratories, biological agent banks and other institutions authorised to carry out scientific activities have had to implement biosafety and biosecurity measures to counter the threat, while carrying out activities to help prevent and monitor the accidental or intentional introduction of exotic animal diseases. This article briefly sets outthe basic components of biosafety and biosecurity, as well as recommendations on organisational strategies to consider in laboratories that support agro-bioterrorist surveillance and prevention programs.
ERIC Educational Resources Information Center
Secret, Mary; Abell, Melissa L.; Berlin, Trey
2011-01-01
The authors present a set of guiding principles and strategies to facilitate the collaborative efforts of social work researchers and practitioners as they initiate, design, and implement outcome evaluations of human service interventions and programs. Beginning with an exploration of the interpersonal barriers to practice-research collaborations,…
Florida First Start Program: Program Planning and Implementation Guide.
ERIC Educational Resources Information Center
Florida State Dept. of Education, Tallahassee. Office of Early Intervention and School Readiness.
This guide is designed to facilitate the implementation of the Florida First Start (FFS) program, created to help at-risk children from birth to 3 years of age have the best possible start in life and to support parents in their roles as their children's first teachers. Emphasis is on providing early, high-quality education and support services.…
Youth-Reaching-Youth Implementation Guide: A Peer Program for Alcohol and Other Drug Use Prevention.
ERIC Educational Resources Information Center
Dietz, Patricia M.; And Others
This guide was designed to encourage and assist groups to incorporate youth into their alcohol and other drug prevention and education programs. It provides a step-by-step approach to planning and implementing a program in which young people make a significant contribution to reducing or preventing alcohol and other drug use among youth in…
ERIC Educational Resources Information Center
Dickson, Mary B.
One of a series of guides on implementing the Americans with Disabilities Act (ADA), this guide focuses on employment considerations for people who have diabetes. First, the condition of diabetes mellitus, both Types I and II, is briefly explained. Next, the relationship of diabetes to the ADA is examined, including the definition of a disability…
THE CLEAN ENERGY-ENVIRONMENT GUIDE TO ACTION ...
The Guide to Action identifies and describes sixteen clean energy policies and strategies that are delivering economic and environmental results for states. For each policy, the Guide describes: Objectives and benefits of the policy; Examples of states that have implemented the policy; Responsibilities of key players at the state level, including typical roles of the main stakeholders; Opportunities to coordinate implementation with other federal and state policies, partnerships and technical assistance resources; Best practices for policy design, implementation, and evaluation, including state examples; Action steps for states to take when adopting or modifying their clean energy policies, based on existing state experiences; Resources for additional information on individual state policies, legislative and regulatory language, and analytical tools and methods. States participating in the Clean Energy-Environment State Partnership Program will use the Guide to Action to: Develop their own Clean Energy-Environment Action Plan that is appropriate to their state; Identify the roles and responsibilities of key decision-makers, such as environmental regulators, state legislatures, public utility commissioners, and state energy offices; Access and apply technical assistance resources, models, and tools available for state-specific analyses and program implementation; and Learn from each other as they develop their own clean energy programs and policies.
Does stereotype threat affect women in academic medicine?
Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly
2012-04-01
Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.
Does Stereotype Threat Affect Women in Academic Medicine?
Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly
2012-01-01
Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794
Strategic implementation of integrated water resources management in Mozambique: An A’WOT analysis
NASA Astrophysics Data System (ADS)
Gallego-Ayala, Jordi; Juízo, Dinis
The Integrated Water Resources Management (IWRM) paradigm has become an important framework in development and management of water resources. Many countries in the Southern Africa region have begun water sector reforms to align the sector with the IWRM concepts. In 2007 the Mozambican Government started to update the policy and the legal framework of the water sector to foster the application of IWRM concept as a basis for achieving sustainable development. However the steps towards the implementation of this national framework are still in preparation. This research aims to identify and establish a priority ranking of the fundamental factors likely to affect the outcome of the IWRM reforms in Mozambique. This study uses the hybrid multi-criteria decision method A’WOT, a methodology coined by Kurttila et al. (2000). This method relies on the combination of the Strengths, Weaknesses, Opportunities, and Threats (SWOT) technique and the Analytic Hierarchy Process (AHP) technique. Using this procedure it is possible to identify and rank the factors affecting the functioning of a system. The key factors affecting the implementation of the IWRM, analysed in this study, were identified through an expert group discussion. These factors have been grouped into different categories of SWOT. Subsequently, the AHP methodology was applied to obtain the relative importance of each factor captured in the SWOT analysis; to this end the authors interviewed a panel of water resources management experts and practitioners. As a result, of this study and the application of the A’WOT methodology, the research identified and ranked the fundamental factors for the success of the IWRM strategy in Mozambique. The results of this study suggest that in Mozambique a planning strategy for the implementation of the IWRM should be guided mainly by combination of interventions in factors falling under opportunity and weakness SWOT groups.
Three tenets for secure cyber-physical system design and assessment
NASA Astrophysics Data System (ADS)
Hughes, Jeff; Cybenko, George
2014-06-01
This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.
Kamarulzaman, A; Saifuddeen, S M
2010-03-01
Although drugs are haram and therefore prohibited in Islam, illicit drug use is widespread in many Islamic countries throughout the world. In the last several years increased prevalence of this problem has been observed in many of these countries which has in turn led to increasing injecting drug use driven HIV/AIDS epidemic across the Islamic world. Whilst some countries have recently responded to the threat through the implementation of harm reduction programmes, many others have been slow to respond. In Islam, The Quran and the Prophetic traditions or the Sunnah are the central sources of references for the laws and principles that guide the Muslims' way of life and by which policies and guidelines for responses including that of contemporary social and health problems can be derived. The preservation and protection of the dignity of man, and steering mankind away from harm and destruction are central to the teachings of Islam. When viewed through the Islamic principles of the preservation and protection of the faith, life, intellect, progeny and wealth, harm reduction programmes are permissible and in fact provide a practical solution to a problem that could result in far greater damage to the society at large if left unaddressed. Copyright (c) 2009. Published by Elsevier B.V.
Preparing for disasters: education and management strategies explored.
Alfred, Danita; Chilton, Jenifer; Connor, Della; Deal, Belinda; Fountain, Rebecca; Hensarling, Janice; Klotz, Linda
2015-01-01
During the last half of the 20th century, the focus of nursing changed from home and field to high-tech clinics and hospitals. Nursing in the absence of technology due to man-made or natural disasters almost disappeared from the curriculum of many nursing schools. Numerous disaster events and threats in the early 21st century caused educators and practitioners to increase the emphasis on disaster nursing and those principles that guide the nurse's practice in response to disasters. This article chronicles tools used by nurse educators to integrate disaster nursing into the didactic and clinical experiences of baccalaureate nursing students. We represent two nursing schools about 90 miles apart that collaborated to provide students with practical application of disaster nursing concepts. Part 1: An educational journey toward disaster nursing competencies: A curriculum in action provides an overview of the curricular tools used to insure adequate coverage of disaster nursing concepts across the curriculum. Part 2: Collaborative learning in Community Health Nursing for emergency preparedness relates the steps taken to plan, implement, and evaluate two different collaborative disaster simulation events. In this manuscript we have attempted transparency so that others can learn from our successes and our failures. Copyright © 2014 Elsevier Ltd. All rights reserved.
Grand, James A
2017-02-01
Stereotype threat describes a situation in which individuals are faced with the risk of upholding a negative stereotype about their subgroup based on their actions. Empirical work in this area has primarily examined the impact of negative stereotypes on performance for threatened individuals. However, this body of research seldom acknowledges that performance is a function of learning-which may also be impaired by pervasive group stereotypes. This study presents evidence from a 3-day self-guided training program demonstrating that stereotype threat impairs acquisition of cognitive learning outcomes for females facing a negative group stereotype. Using hierarchical Bayesian modeling, results revealed that stereotyped females demonstrated poorer declarative knowledge acquisition, spent less time reflecting on learning activities, and developed less efficiently organized knowledge structures compared with females in a control condition. Findings from a Bayesian mediation model also suggested that despite stereotyped individuals "working harder" to perform well, their underachievement was largely attributable to failures in learning to "work smarter." Building upon these empirical results, a computational model and computer simulation is also presented to demonstrate the practical significance of stereotype-induced impairments to learning on the development of an organization's human capital resources and capabilities. The simulation results show that even the presence of small effects of stereotype threat during learning/training have the potential to exert a significant negative impact on an organization's performance potential. Implications for future research and practice examining stereotype threat during learning are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Training for Certification: Trainer's Guide.
ERIC Educational Resources Information Center
Mississippi State Univ., State College. Cooperative Extension Service.
This Cooperative Extension Service publication from Mississippi State University is a teacher's guide for a private pesticide applicator certification training program. This guide is designed for use by county extension agents. Contents include: (1) a suggested training schedule; (2) stepwise instructions for implementation of the private…
DOT National Transportation Integrated Search
1996-12-01
This resource guide provides a list of references with annotations, including many how to guides, for use by local jurisdictions, developers, transit operators and citizens groups that are interested in planning, designing, reviewing and implementing...
ERIC Educational Resources Information Center
Alberta Dept. of Education, Edmonton. Language Services Branch.
Intended to aid teachers in charge of implementing drama programs, this guide (in French) is to be employed in conjunction with the "1992 Second Cycle Secondary Drama Program of Studies" (Alberta, Canada). The guide's sections are as follows: (1) Introduction; (2) L'Adolescent; (3) Securite (discussing both emotional and physical…
49 CFR Appendix C to Part 222 - Guide to Establishing Quiet Zones
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 4 2010-10-01 2010-10-01 false Guide to Establishing Quiet Zones C Appendix C to.... 222, App. C Appendix C to Part 222—Guide to Establishing Quiet Zones Introduction This Guide to... without implementation of additional safety measures at any crossings in the quiet zone; or c. Additional...
Originating Conferences and Credit Courses. Using WOI Satellite Transmission. A Basic Guide.
ERIC Educational Resources Information Center
Stinehart, Kathleen; And Others
This guide was developed to help administrators and educators plan and implement videoconferences and credit courses using the Iowa State University studios (WOI). In a short narrative format, the guide leads the reader through the videoconference or course process. The guide is organized in three sections. The first section presents an overview…
Quanbeck, Andrew; Brown, Randall T; E Zgierska, Aleksandra; A Johnson, Roberta; Robinson, James M; Jacobson, Nora
2016-01-27
Adoption of evidence-based practices takes place at a glacial place in healthcare. This research will pilot test an innovative implementation strategy - systems consultation -intended to speed the adoption of evidence-based practice in primary care. The strategy is based on tenets of systems engineering and has been extensively tested in addiction treatment. Three innovations have been included in the strategy - translation of a clinical practice guideline into a checklist-based implementation guide, the use of physician peer coaches ('systems consultants') to help clinics implement the guide, and a focus on reducing variation in practices across prescribers and clinics. The implementation strategy will be applied to improving opioid prescribing practices in primary care, which may help ultimately mitigate the increasing prevalence of opioid abuse and addiction. The pilot test will compare four intervention clinics to four control clinics in a matched-pairs design. A leading clinical guideline for opioid prescribing has been translated into a checklist-based implementation guide in a systematic process that involved experts who wrote the guideline in consultation with implementation experts and primary care physicians. Two physicians with expertise in family and addiction medicine are serving as the systems consultants. Each systems consultant will guide two intervention clinics, using two site visits and follow-up communication by phone and email, to implement the translated guideline. Mixed methods will be used to test the feasibility, acceptability, and preliminary effectiveness of the implementation strategy in an evaluation that meets standards for 'fully developed use' of the RE-AIM framework (Reach, Effectiveness, Adoption, Implementation, Maintenance). The clinic will be the primary unit of analysis. The systems consultation implementation strategy is intended to generalize to the adoption of other clinical guidelines. This pilot test is intended to prepare for a large randomized clinical trial that will test the strategy against other implementation strategies, such as audit/feedback and academic detailing, used to close the gap between knowledge and practice. The systems consultation approach has the potential to shorten the famously long time it takes to implement evidence-based practices and clinical guidelines in healthcare.
ERIC Educational Resources Information Center
Robinson, Julie; Kim, Don
2010-01-01
This article compares three self-developed subject guides and one commercial online subject guide (LibGuides) to provide information to other institutions which have a plan or are in the process of developing a plan to implement similar services to support online, distance and traditional education. This is a comparison of the current subject…
Hayward, Matt W
2009-12-01
Thorough evaluation has made the International Union for Conservation of Nature (IUCN) Red List the most widely used and accepted authority on the conservation status of biodiversity. Although the system used to determine risk of extinction is rigorously and objectively applied, the list of threatening processes affecting a species is far more subjectively determined and has not had adequate review. I reviewed the threats listed in the IUCN Red List for randomly selected groups within the three most threatened orders of mammals: Artiodactyla, Carnivora, and Primates. These groups are taxonomically related and often ecologically similar, so I expected they would suffer relatively similar threats. Hominoid primates and all other terrestrial fauna faced similar threats, except for bovine artiodactyls and large, predatory carnivores, which faced significantly different threats. Although the status of bovines and hominoids and the number of threats affecting them were correlated, this was not the case for large carnivores. Most notable, however, was the great variation in the threats affecting individual members of each group. For example, the endangered European bison (Bison bonasus) has no threatening processes listed for it, and the lion (Panthera leo) is the only large predator listed as threatened with extinction by civil war. Some threatening processes appear spurious for the conservation of the species, whereas other seemingly important factors are not recorded as threats. The subjective nature of listing threatening processes, via expert opinion, results in substantial biases that may be allayed by independent peer review, use of technical manuals, consensus among multiple assessors, incorporation of probability modeling via decision-tree analysis, and adequate coordination among evaluators. The primary focus should be on species-level threats rather than population-level threats because the IUCN Red List is a global assessment and smaller-scale threats are more appropriate for national status assessments. Until conservationists agree on the threats affecting species and their relative importance, conservation action and success will be hampered by scattering scarce resources too widely and often by implementing conflicting strategies.
Zhang, Yuan; Yu, Hongbo; Yin, Yunlu; Zhou, Xiaolin
2016-08-31
Although economic theories suggest that punishment threat is crucial for maintaining social norms, counterexamples are noted in which punishment threat hinders norm compliance. Such discrepancy may arise from the intention behind the threat: unintentionally introduced punishment threat facilitates, whereas intentionally introduced punishment threat hinders, norm compliance. Here, we combined a dictator game and fMRI to investigate how intention modulates the effect of punishment threat on norm compliance and the neural substrates of this modulation. We also investigated whether this modulation can be influenced by brain stimulation. Human participants divided an amount of money between themselves and a partner. The partner (intentionally) or a computer program (unintentionally) decided to retain or waive the right to punish the participant upon selfish distribution. Compared with the unintentional condition, participants allocated more when the partner intentionally waived the power of punishment, but less when the partner retained such power. The right lateral orbitofrontal cortex (rLOFC) showed higher activation when the partner waived compared with when the computer waived or when the partner retained the power. The functional connectivity between the rLOFC and the brain network associated with intention/mentalizing processing was predictive of the allocation difference induced by intention. Moreover, inhibition or activation of the rLOFC by brain stimulation decreased or increased, respectively, the participants' reliance on the partner's intention during monetary allocation. These findings demonstrate that the perceived intention of punishment threat plays a crucial role in norm compliance and that the LOFC is casually involved in the implementation of intention-based cooperative decisions. Does punishment threat facilitate or hinder norm enforcement? So far, cognitive neuroscience research offers equivocal evidence. By directly manipulating the intention behind punishment threat, we demonstrate that intention modulates the effectiveness of punishment threat. Moreover, we show that inhibition or activation of the right lateral orbitofrontal cortex (rLOFC) decreased or increased the effect of punishment threat in the intentional context, but not in the unintentional context, suggesting the casual involvement of the rLOFC in intention-based cooperative decisions. Copyright © 2016 the authors 0270-6474/16/369217-10$15.00/0.
Source technology as the foundation for modern infra-red counter measures (IRCM)
NASA Astrophysics Data System (ADS)
Grasso, Robert J.
2010-10-01
Protection of military aircraft from IR guided threats is paramount to ensure the survivability of aircrews, platforms, and to ensure mission success. At the foundation of all IRCM systems is the source; that component that provides the in-band radiant energy required for threat defeat. As such, source technology has evolved with IRCM technology to encompass the evolving systems architectures that encompass IRCM: 1) "Hot Brick" omni-directional sources; 2) arc lamps, and; 3) lasers. Lasers, as IRCM sources continue to evolve to meet the challenges of ever-evolving threats, superior techniques, economy of installation, and superior source technology. Lasers represent the single greatest advance in IRCM source technology and continue to evolve to meet ever more sophisticated threats. And have been used with great effect in all modern IRCM systems; evolving from frequency doubled CO2 lasers, to solid state lasers with OPOs, to semiconductor lasers including Quantum Cascade Lasers (QCLs); these last devices represent the latest advance in IRCM source technology offering all-band coverage, architectural simplicity, and economy of scale. While QCLs represent the latest advance in IRCM laser technology, fiber lasers show much promise in addressing multi-band operation as well as the ability to be coherently combined to achieve even greater output capability. Also, ultra-short pulse lasers are evolving to become practical for IRCM applications. Stay tuned ......
Hamm, Alfons O; Richter, Jan; Pané-Farré, Christiane; Westphal, Dorte; Wittchen, Hans-Ulrich; Vossbeck-Elsebusch, Anna N; Gerlach, Alexander L; Gloster, Andrew T; Ströhle, Andreas; Lang, Thomas; Kircher, Tilo; Gerdes, Antje B M; Alpers, Georg W; Reif, Andreas; Deckert, Jürgen
2016-03-01
In the current review, we reconceptualize a categorical diagnosis-panic disorder and agoraphobia-in terms of two constructs within the domain "negative valence systems" suggested by the Research Domain Criteria initiative. Panic attacks are considered as abrupt and intense fear responses to acute threat arising from inside the body, while anxious apprehension refers to anxiety responses to potential harm and more distant or uncertain threat. Taking a dimensional view, panic disorder with agoraphobia is defined with the threat-imminence model stating that defensive responses are dynamically organized along the dimension of the proximity of the threat. We tested this model within a large group of patients with panic disorder and agoraphobia (N = 369 and N = 124 in a replication sample) and found evidence that panic attacks are indeed instances of circa strike defense. This component of the defensive reactivity was related to genetic modulators within the serotonergic system. In contrast, anxious apprehension-characterized by attentive freezing during postencounter defense-was related to general distress and depressive mood, as well as to genetic modulations within the hypothalamic-pituitary-adrenal (HPA) axis. Patients with a strong behavioral tendency for active and passive avoidance responded better to exposure treatment if the therapist guides the patient through the exposure exercises. © 2016 Society for Psychophysiological Research.
Conway, Christopher C.; Starr, Lisa R.; Espejo, Emmanuel P.; Brennan, Patricia A.; Hammen, Constance
2016-01-01
Biased stress appraisals critically relate to the origins and temporal course of many—perhaps most—forms of psychopathology. We hypothesized that aberrant stress appraisals are linked directly to latent internalizing and externalizing traits that, in turn, predispose to multiple disorders. A high-risk community sample of 815 adolescents underwent semistructured interviews to assess clinical disorders and naturalistic stressors at ages 15 and 20. Participants and blind rating teams separately evaluated the threat associated with acute stressors occurring in the past year, and an appraisal bias index (i.e., discrepancy between subjective and team-rated threat) was generated. A two-factor (Internalizing and Externalizing) latent variable model provided an excellent fit to the diagnostic correlations. After adjusting for the covariation between the factors, adolescents’ threat overestimation prospectively predicted higher standing on Internalizing, whereas threat underestimation prospectively predicted elevations on Externalizing. Cross-sectional analyses replicated this pattern in early adulthood. Appraisals were not related to the residual portions of any diagnosis in the latent variable model, suggesting that the transdiagnostic dimensions mediated the connections between stress appraisal bias and disorder entities. We discuss implications for enhancing the efficiency of emerging research on the stress response and speculate how these findings, if replicated, might guide refinements to psychological treatments for stress-linked disorders. PMID:27819469
Dissemination and use of a participatory ergonomics guide for workplaces.
Van Eerd, Dwayne; King, Trevor; Keown, Kiera; Slack, Tesha; Cole, Donald C; Irvin, Emma; Amick, Benjamin C; Bigelow, Philip
2016-06-01
Musculoskeletal disorders (MSDs) result in lost-time injury claims and lost productivity worldwide, placing a substantial burden on workers and workplaces. Participatory ergonomics (PE) is a popular approach to reducing MSDs; however, there are challenges to implementing PE programmes. Using evidence to overcome challenges may be helpful but the impacts of doing so are unknown. We sought to disseminate an evidence-based PE tool and to describe its use. An easy-to-use, evidence-based PE Guide was disseminated to workplace parties, who were surveyed about using the tool. The greatest barrier to using the tool was a lack of time. Reported tool use included for training purposes, sharing and integrating the tool into existing programmes. New actions related to tool use included training, defining team responsibilities and suggesting programme implementation steps. Evidence-based tools could help ergonomists overcome some challenges involved in implementing injury reduction programmes such as PE. Practitioner Summary Practitioners experience challenges implementing programmes to reduce the burden of MSDs in workplaces. Implementing participatory interventions requires multiple workplace parties to be 'on-board'. Disseminating and using evidence-based guides may help to overcome these challenges. Using evidence-based tools may help ergonomics practitioners implement PE programmes.
75 FR 67585 - Continuation of the National Emergency With Respect to Sudan
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-02
... President determined that the conflict in Sudan's Darfur region posed an unusual and extraordinary threat to... respect to the national emergency and to implement the Darfur Peace and Accountability Act of 2006 (Public...
77 FR 66357 - Continuation of the National Emergency With Respect to Sudan
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-02
... in Sudan's Darfur region posed an unusual and extraordinary threat to the national security and... emergency and to implement the Darfur Peace and Accountability Act of 2006 (Public Law 109-344). Because the...
3 CFR - Continuation of the National Emergency With Respect to Sudan
Code of Federal Regulations, 2010 CFR
2010-01-01
... in Sudan's Darfur region posed an unusual and extraordinary threat to the national security and... emergency and to implement the Darfur Peace and Accountability Act of 2006 (Public Law 109-344). Because the...
78 FR 65865 - Continuation of the National Emergency With Respect to Sudan
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-01
... in Sudan's Darfur region posed an unusual and extraordinary threat to the national security and... emergency and to implement the Darfur Peace and Accountability Act of 2006 (Public Law 109-344). Because the...
33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Officer must brief all vessel personnel of identified threats, emphasize reporting procedures, and stress... limited to: (1) Arrangements to ensure that the vessel can be towed or moved if deemed necessary by the...
33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Officer must brief all vessel personnel of identified threats, emphasize reporting procedures, and stress... limited to: (1) Arrangements to ensure that the vessel can be towed or moved if deemed necessary by the...
33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Officer must brief all vessel personnel of identified threats, emphasize reporting procedures, and stress... limited to: (1) Arrangements to ensure that the vessel can be towed or moved if deemed necessary by the...
33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Officer must brief all vessel personnel of identified threats, emphasize reporting procedures, and stress... limited to: (1) Arrangements to ensure that the vessel can be towed or moved if deemed necessary by the...
33 CFR 105.230 - Maritime Security (MARSEC) Level coordination and implementation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... part for the MARSEC Level in effect for the port. (b) When notified of an increase in the MARSEC Level... personnel about identified threats, and emphasize reporting procedures and stress the need for increased...
33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... MARSEC Level in effect for the port or the OCS facility. (b) When notified of an increase in the MARSEC... Officer must brief all vessel personnel of identified threats, emphasize reporting procedures, and stress...
Khalsa, Hari-Mandir K; Denes, Attila C; M Pasini-Hill, Diane; Santelli, Jeffrey C; Baldessarini, Ross J
2018-02-01
This study examined the implementation of crisis intervention teams by law enforcement agencies in Colorado. Rates of Special Weapons and Tactics (SWAT) use, arrests, use of force, and injuries were assessed during 6,353 incidents involving individuals experiencing a mental health crisis. Relationships among original complaint, psychiatric illness, substance abuse, violence risk, and disposition of crisis calls were analyzed. Rates of SWAT use (<1%), injuries (<1%), arrests (<5%), and use of force (<5%) were low. The relative risk of transfer to treatment (versus no transfer) was significantly higher for incidents involving psychiatric illness, suicide threat or attempt, weapons, substance abuse, and violence potential. Use of force or SWAT, arrests, and injuries were infrequent. Suicide risk, psychiatric illness and substance abuse, even in the presence of a weapon or violence threat, increased the odds of transfer to treatment, whereas suicide risk lowered the odds of transfer to jail.
Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K
2013-08-09
Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.
The Effectiveness of Guided Inquiry-based Learning Material on Students’ Science Literacy Skills
NASA Astrophysics Data System (ADS)
Aulia, E. V.; Poedjiastoeti, S.; Agustini, R.
2018-01-01
The purpose of this research is to describe the effectiveness of guided inquiry-based learning material to improve students’ science literacy skills on solubility and solubility product concepts. This study used Research and Development (R&D) design and was implemented to the 11th graders of Muhammadiyah 4 Senior High School Surabaya in 2016/2017 academic year with one group pre-test and post-test design. The data collection techniques used were validation, observation, test, and questionnaire. The results of this research showed that the students’ science literacy skills are different after implementation of guided inquiry-based learning material. The guided inquiry-based learning material is effective to improve students’ science literacy skills on solubility and solubility product concepts by getting N-gain score with medium and high category. This improvement caused by the developed learning material such as lesson plan, student worksheet, and science literacy skill tests were categorized as valid and very valid. In addition, each of the learning phases in lesson plan has been well implemented. Therefore, it can be concluded that the guided inquiry-based learning material are effective to improve students’ science literacy skills on solubility and solubility product concepts in senior high school.
Goldin, Philippe R.; Manber, Tali; Hakimi, Shabnam; Canli, Turhan; Gross, James J.
2014-01-01
Context Social anxiety disorder is thought to involve emotional hyper-reactivity, cognitive distortions, and ineffective emotion regulation. While the neural bases of emotional reactivity to social stimuli have been described, the neural bases of emotional reactivity and cognitive regulation during social and physical threat, and their relationship to social anxiety symptom severity, have yet to be investigated. Objective This study investigated behavioral and neural correlates of emotional reactivity and cognitive regulation in patients and controls during processing of social and physical threat stimuli. Design Participants were trained to implement cognitive-linguistic regulation of emotional reactivity induced by social (harsh facial expressions) and physical (violent scenes) threat while undergoing functional magnetic resonance imaging and providing behavioral ratings of negative emotion experience. Setting Academic psychology department. Participants 15 adults with social anxiety disorder and 17 demographically-matched healthy controls. Main Outcome Measures Blood oxygen level dependent signal and negative emotion ratings. Results Behaviorally, patients reported greater negative emotion than controls during social and physical threat, but showed equivalent reduction in negative emotion following cognitive regulation. Neurally, viewing social threat resulted in greater emotion-related neural responses in patients than controls, with social anxiety symptom severity related to activity in a network of emotion and attention processing regions in patients only. Viewing physical threat produced no between-group differences. Regulation during social threat resulted in greater cognitive and attention regulation-related brain activation in controls compared to patients. Regulation during physical threat produced greater cognitive control-related response (i.e., right DLPFC) in patients compared to controls. Conclusions Compared to controls, patients demonstrated exaggerated negative emotion reactivity and reduced cognitive regulation related neural activation, specifically for social threat stimuli. These findings help to elucidate potential neural mechanisms of emotion regulation that might serve as biomarkers for interventions for social anxiety disorder. PMID:19188539
Hirshfield, Kim M.; Tolkunov, Denis; Zhong, Hua; Ali, Siraj M.; Stein, Mark N.; Murphy, Susan; Vig, Hetal; Vazquez, Alexei; Glod, John; Moss, Rebecca A.; Belyi, Vladimir; Chan, Chang S.; Chen, Suzie; Goodell, Lauri; Foran, David; Yelensky, Roman; Palma, Norma A.; Sun, James X.; Miller, Vincent A.; Stephens, Philip J.; Ross, Jeffrey S.; Kaufman, Howard; Poplin, Elizabeth; Mehnert, Janice; Tan, Antoinette R.; Bertino, Joseph R.; Aisner, Joseph; DiPaola, Robert S.
2016-01-01
Background. The frequency with which targeted tumor sequencing results will lead to implemented change in care is unclear. Prospective assessment of the feasibility and limitations of using genomic sequencing is critically important. Methods. A prospective clinical study was conducted on 100 patients with diverse-histology, rare, or poor-prognosis cancers to evaluate the clinical actionability of a Clinical Laboratory Improvement Amendments (CLIA)-certified, comprehensive genomic profiling assay (FoundationOne), using formalin-fixed, paraffin-embedded tumors. The primary objectives were to assess utility, feasibility, and limitations of genomic sequencing for genomically guided therapy or other clinical purpose in the setting of a multidisciplinary molecular tumor board. Results. Of the tumors from the 92 patients with sufficient tissue, 88 (96%) had at least one genomic alteration (average 3.6, range 0–10). Commonly altered pathways included p53 (46%), RAS/RAF/MAPK (rat sarcoma; rapidly accelerated fibrosarcoma; mitogen-activated protein kinase) (45%), receptor tyrosine kinases/ligand (44%), PI3K/AKT/mTOR (phosphatidylinositol-4,5-bisphosphate 3-kinase; protein kinase B; mammalian target of rapamycin) (35%), transcription factors/regulators (31%), and cell cycle regulators (30%). Many low frequency but potentially actionable alterations were identified in diverse histologies. Use of comprehensive profiling led to implementable clinical action in 35% of tumors with genomic alterations, including genomically guided therapy, diagnostic modification, and trigger for germline genetic testing. Conclusion. Use of targeted next-generation sequencing in the setting of an institutional molecular tumor board led to implementable clinical action in more than one third of patients with rare and poor-prognosis cancers. Major barriers to implementation of genomically guided therapy were clinical status of the patient and drug access. Early and serial sequencing in the clinical course and expanded access to genomically guided early-phase clinical trials and targeted agents may increase actionability. Implications for Practice: Identification of key factors that facilitate use of genomic tumor testing results and implementation of genomically guided therapy may lead to enhanced benefit for patients with rare or difficult to treat cancers. Clinical use of a targeted next-generation sequencing assay in the setting of an institutional molecular tumor board led to implementable clinical action in over one third of patients with rare and poor prognosis cancers. The major barriers to implementation of genomically guided therapy were clinical status of the patient and drug access both on trial and off label. Approaches to increase actionability include early and serial sequencing in the clinical course and expanded access to genomically guided early phase clinical trials and targeted agents. PMID:27566247
Hospitality Management. Florida Vocational Program Guide.
ERIC Educational Resources Information Center
Florida State Univ., Tallahassee. Center for Instructional Development and Services.
This program guide is intended for the implementation of a hospitality management program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, describes jobs under the program, and includes a curriculum framework and student performance standards for…
Curriculum Guide Construction Cluster.
ERIC Educational Resources Information Center
Kline, Ken
As part of a model construction cluster curriculum development project, this guide was developed and implemented in the Beaverton (Oregon) School District. The curriculum guide contains 16 units covering the following topics: introduction to construction jobs; safety and first aid; blueprint readings; basic mathematics; site work; framing; roofing…
Communication Electronics. Florida Vocational Program Guide.
ERIC Educational Resources Information Center
University of South Florida, Tampa. Dept. of Adult and Vocational Education.
This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a communication electronics (communications technician) program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under the…
Ada Implementation Guide. Software Engineering With Ada. Volume 1
1994-04-01
Staff, Department ofDefense Dictionary of Military and Associated Terms, Washington, D.C., 1989. STARS McDonal , C., and S . Redwine, *STARS Glossary: A...ADýA28 357> offj I Volume I I SI I t Ada Implementation II Guide 5 Software Engineering With AdaI I S DTIC QUALITY INSPECTED S 5 April 1994 g " 94...and Abbreviations ...................... I I N p a S I I I i I Libt of F4g u OW Tahl Figures 2-1 DON Directives and Instructions for Implementing Public
DOE Office of Scientific and Technical Information (OSTI.GOV)
Franklin, Lyndsey; Pirrung, Megan A.; Blaha, Leslie M.
Cyber network analysts follow complex processes in their investigations of potential threats to their network. Much research is dedicated to providing automated tool support in the effort to make their tasks more efficient, accurate, and timely. This tool support comes in a variety of implementations from machine learning algorithms that monitor streams of data to visual analytic environments for exploring rich and noisy data sets. Cyber analysts, however, often speak of a need for tools which help them merge the data they already have and help them establish appropriate baselines against which to compare potential anomalies. Furthermore, existing threat modelsmore » that cyber analysts regularly use to structure their investigation are not often leveraged in support tools. We report on our work with cyber analysts to understand they analytic process and how one such model, the MITRE ATT&CK Matrix [32], is used to structure their analytic thinking. We present our efforts to map specific data needed by analysts into the threat model to inform our eventual visualization designs. We examine data mapping for gaps where the threat model is under-supported by either data or tools. We discuss these gaps as potential design spaces for future research efforts. We also discuss the design of a prototype tool that combines machine-learning and visualization components to support cyber analysts working with this threat model.« less
Threat and error management for anesthesiologists: a predictive risk taxonomy
Ruskin, Keith J.; Stiegler, Marjorie P.; Park, Kellie; Guffey, Patrick; Kurup, Viji; Chidester, Thomas
2015-01-01
Purpose of review Patient care in the operating room is a dynamic interaction that requires cooperation among team members and reliance upon sophisticated technology. Most human factors research in medicine has been focused on analyzing errors and implementing system-wide changes to prevent them from recurring. We describe a set of techniques that has been used successfully by the aviation industry to analyze errors and adverse events and explain how these techniques can be applied to patient care. Recent findings Threat and error management (TEM) describes adverse events in terms of risks or challenges that are present in an operational environment (threats) and the actions of specific personnel that potentiate or exacerbate those threats (errors). TEM is a technique widely used in aviation, and can be adapted for the use in a medical setting to predict high-risk situations and prevent errors in the perioperative period. A threat taxonomy is a novel way of classifying and predicting the hazards that can occur in the operating room. TEM can be used to identify error-producing situations, analyze adverse events, and design training scenarios. Summary TEM offers a multifaceted strategy for identifying hazards, reducing errors, and training physicians. A threat taxonomy may improve analysis of critical events with subsequent development of specific interventions, and may also serve as a framework for training programs in risk mitigation. PMID:24113268
ERIC Educational Resources Information Center
Vocational Curriculum Resource Center of Maine, Fairfield.
This curriculum addendum was developed to offer suggestions and strategies to change mindsets and remove barriers in order to pave the way for a gender-equitable, technically trained work force beginning at the elementary and middle school levels. The guide contains 73 strategies, a variety of examples of how they can be implemented, and a large…
Assessments in the Global Peace Operations Initiative: A Systems Engineering Approach
2014-06-01
police unit GCC GPOI Coordination Committee GIG GPOI Implementation Guide GPOI Global Peace Operations Initiative GRC GPOI Regional Committee G8...degree necessary to build a coherent assessments framework. The GPOI Implementation Guide ( GIG ) begins by alluding to what the program intended to...elements and associated interactions fully observed and understood. Using the U.S. economy as an example, Driscoll (2011) illustrates the common
ERIC Educational Resources Information Center
Odneal, Becky; Carter, Gregory; Hull, Lisa Suzanne; Roling, Tim
2013-01-01
This product development report addresses the components for an operations manual, which will serve as a guide for school districts pursuing or implementing a four-day school week. The product will provide school districts with a resource to address their needs, questions, and concerns around all aspects of the transition to a four-day school…
ERIC Educational Resources Information Center
Johnsen, Susan K., Ed.
2012-01-01
The new Pre-K-Grade 12 Gifted Education Programming Standards should be part of every school district's repertoire of standards to ensure that the learning needs of advanced students are being met. "NAGC Pre-K-Grade 12 Gifted Education Programming Standards: A Guide to Planning and Implementing High-Quality Services" details six standards that…
Air Superiority by the Numbers: Cutting Combat Air Forces in a Time of Uncertainty
2014-06-01
5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) School of Advanced Air And Space Studies,,Air University,,Maxwell Air...iii ACKNOWLEDGMENTS I would first like to thank the men and women whom I have had the...interdiction role. Finally, in the midst of a growing Soviet radar-guided surface-to-air threat, “Skunk Works ” developed the first stealth attack
Bolts from Orion: Destroying Mobile Surface-to-Air Missile Systems with Lethal Autonomous Aircraft
2016-07-01
era SAMs that had been upgraded by Ukrainian contractors . During the operation, Russian aircraft’s 10 electronic countermeasures could not...main SEAD asset is the F-16 CJ equipped with the HARM targeting system ( HTS ). The HTS can autonomously locate and identify threat radars and pass...targeting information to the HARMs before launch. The HTS can also provide targeting 13 information to global positioning system (GPS) guided
ARGOS - the Laser Star Adaptive Optics for LBT
NASA Astrophysics Data System (ADS)
Rabien, S.; Barl, L.; Beckmann, U.; Blümchen, T.; Bonaglia, M.; Borelli, J. L.; Brynnel, J.; Busoni, L.; Carbonaro, L.; Conot, C.; Davies, R.; Deysenroth, M.; Durney, O.; Elberich, M.; Esposito, S.; Gasho, V.; Gässler, W.; Gemperlein, H.; Genzel, R.; Green, R.; Haug, M.; Lloyd Hart, M.; Hubbard, P.; Kanneganti, S.; Kulas, M.; Noenickx, J.; Peter, D.; Quirrenbach, A.; Rademacher, M.; Rix, H. W.; Salinari, P.; Schwab, C.; Storm, J.; Strüder, L.; Thiel, M.; Weigelt, G.; Ziegleder, J.; Orban de Xivry, G.
2011-09-01
We will present the design and status of ARGOS - the Laser Guide Star adaptive optics facility for the Large Binocular Telescope. By projecting a constellation of multiple laser guide stars above each of the 8.4m primary mirrors of the LBT, ARGOS in its ground layer mode will enable a wide field adaptive optics correction for multi object spectroscopy. ARGOS implements high power pulsed green lasers and makes use of Rayleigh scattering for the guide star creation. The geometric relations of this setup in guide star height vs. primary diameter are quite comparable to an ELT with sodium guide stars. The use of LBT's adaptive secondary mirror, gated wavefront sensors, a prime focus calibration system and the laser constellation shows several aspects that may be used as pathfinding technology for the planned ELTs. In already planned upgrade steps with a hybrid Sodium-Rayleigh combination ARGOS will enable MCAO and MOAO implementations at LBT allowing unique astronomical observations.
Hunter, Bradley; Bunkall, Larry D.; Holmes, Edward B.
2009-01-01
Since the implementation of workers' compensation, accurately and consistently rating impairment has been a concern for the employee and employer, as well as rating physicians. In an attempt to standardize and classify impairments, the American Medical Association (AMA) publishes the AMA Guides ("Guides"), and recently published its 6th edition of the AMA Guides. Common critiques of the AMA Guides 6th edition are that they are too complex, lacking in evidence-based methods, and rarely yield consistent ratings. Many states mandate use of some edition of the AMA Guides, but few states are adopting the current edition due to the increasing difficulty and frustration with their implementation. A clearer, simpler approach is needed. Some states have begun to develop their own supplemental guides to combat problems in complexity and validity. Likewise studies in Korea show that past methods for rating impairment are outdated and inconsistent, and call for measures to adapt current methods to Korea's specific needs. The Utah Supplemental Guides to the AMA Guides have been effective in increasing consistency in rating impairment. It is estimated that litigation of permanent impairment has fallen below 1% and Utah is now one of the least costly states for obtaining workers' compensation insurance, while maintaining a medical fee schedule above the national average. Utah's guides serve as a model for national or international impairment guides. PMID:19503678
North Dakota Industrial Arts Teachers Handbook. Energy/Power Curriculum Guide, Level I.
ERIC Educational Resources Information Center
Mugan, Don
This handbook provides teachers with support material to more fully implement the North Dakota Energy and Power Curriculum Guide, Level I. It first presents the body of knowledge for Energy/Power Technology as taken from the curriculum guide. The guide is then addressed unit by unit, topic by topic. These seven units are covered: Energy/Power…
Insider Threats: DOD Should Improve Information Sharing and Oversight to Protect U.S. Installations
2015-07-01
violence toward others in the workplace , DOD closed the recommendation as implemented by issuing a policy on workplace violence prevention and response in...examination of recommendations resulting from the Fort Hood independent review related to workplace violence and focused on the military services...and (3) implemented recommendations from the official reviews of the 2009 Fort Hood and 2013 Washington Navy Yard shootings. GAO reviewed official
Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J.; Linke, Simon
2015-01-01
Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms. PMID:26020794
Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J; Linke, Simon
2015-01-01
Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms.
NASA Astrophysics Data System (ADS)
Syadzili, A. F.; Soetjipto; Tukiran
2018-01-01
This research aims to produce physics learning materials in Indonesian high school using guided inquiry with cognitive conflict strategy to drill students’ creative thinking skills in a static fluid learning. This development research used 4D model with one group pre-test and post-test design implemented in the eleventh grade students in the second semester of 2016/2017 academic year. The data were collected by validation sheets, questionnaires, tests and observations, while data analysis techniques is descriptive quantitative analysis. This research obtained several findings, they are : the learning material developed had an average validity score with very valid category. The lesson plan can be implemented very well. The students’ responses toward the learning process were very possitive with the students’ interest to follow the learning. Creative thinking skills of student before the implementation of product was inadequate, then it is very creative after product was implemented. The impacts of the research suggest that guided inquiry may stimulate the students to think creatifly.
ERIC Educational Resources Information Center
Swanson, John L.
1979-01-01
The publication of a "counseling directory" and "consumer's guide" is a new approach that can be used to respond to the current professional issues of professional disclosure and consumer protection. Reviews the purposes, format, and content of both the directory and guide. (Author)
DOT National Transportation Integrated Search
2006-04-01
STATEMENT OF NEED: In the preceding Unlighted Overhead Guide Sign Feasibility Study, it was determined that the lighting of overhead : guide signs on freeways could be eliminated if white micro-prismatic Type VII or Type IX legends were used on : gre...
Solar Energy Installers Curriculum Guides. Book I.
ERIC Educational Resources Information Center
Walker, Gene C.
This first volume of a comprehensive curriculum guide for the heating-ventilation-air conditioning-refrigeration-solar student is designed to assist high school area vocational centers or community college instructors in the implementation and operation of comfort training programs. Following an introductory section, the guide provides job…
A Guide to Curriculum Planning in Foreign Language.
ERIC Educational Resources Information Center
Wisconsin State Dept. of Public Instruction, Madison.
A guide designed to help local curriculum planners develop and implement curriculums to provide all students with equal access to foreign languages provides an overview of current philosophies, objectives, methods, materials, and equipment and a guide to sequential program development, articulation, and evaluation. An introductory section…
Computer Electronics. Florida Vocational Program Guide.
ERIC Educational Resources Information Center
University of South Florida, Tampa. Dept. of Adult and Vocational Education.
This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a computer electronics technology (computer service technician) program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under…
Cluster Guide. Accounting Occupations.
ERIC Educational Resources Information Center
Beaverton School District 48, OR.
Based on a recent task inventory of key occupations in the accounting cluster taken in the Portland, Oregon, area, this curriculum guide is intended to assist administrators and teachers in the design and implementation of high school accounting cluster programs. The guide is divided into four major sections: program organization and…
External Corrosion Direct Assessment for Unique Threats to Underground Pipelines
DOT National Transportation Integrated Search
2007-11-01
External corrosion direct assessment process (ECDA) implemented in accordance with the NACE Recommended Practice RP0502-02 relies on above ground DA techniques to prioritize locations at risk for corrosion. Two special cases warrant special considera...
Research and management priorities for Hawaiian forest birds
Paxton, Eben H.; Laut, Megan; Vetter, John P.; Kendall, Steve J.
2018-01-01
Hawai‘i's forest birds face a number of conservation challenges that, if unaddressed, will likely lead to the extinction of multiple species in the coming decades. Threats include habitat loss, invasive plants, non-native predators, and introduced diseases. Climate change is predicted to increase the geographic extent and intensity of these threats, adding urgency to implementation of tractable conservation strategies. We present a set of actionable research and management approaches, identified by conservation practitioners in Hawai'i, that will be critical for the conservation of Hawaiian forest birds in the coming years. We also summarize recent progress on these conservation priorities. The threats facing Hawai‘i's forest birds are not unique to Hawai‘i, and successful conservation strategies developed in Hawai‘i can serve as a model for other imperiled communities around the world, especially on islands.
Lydon, John E; Menzies-Toman, Danielle; Burton, Kimberly; Bell, Chris
2008-07-01
In 7 experiments, the causal effects of the availability of an attractive alternative (AA) relationship partner on current relationship thoughts and intentions were tested using confederates, mental simulations, and virtual reality. Men behaved consistent with traditional relationship-commitment theories, showing decreased willingness to tolerate their partner's transgressions after the availability of an AA was made salient. However, consistent with a motivated cognition approach to commitment and work on relational self-construals, women increased their tolerance when presented with the relationship threat of an alternative. Word-fragment and lexical decision data suggested that AAs may activate threat for women, and their ability to dampen threat accessibility is associated with prorelationship responses. Finally, this "if relationship is threatened, then defend the relationship" contingency was induced in men with an implementation intention induction.
Detecting insider activity using enhanced directory virtualization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shin, Dongwan; Claycomb, William R.
2010-07-01
Insider threats often target authentication and access control systems, which are frequently based on directory services. Detecting these threats is challenging, because malicious users with the technical ability to modify these structures often have sufficient knowledge and expertise to conceal unauthorized activity. The use of directory virtualization to monitor various systems across an enterprise can be a valuable tool for detecting insider activity. The addition of a policy engine to directory virtualization services enhances monitoring capabilities by allowing greater flexibility in analyzing changes for malicious intent. The resulting architecture is a system-based approach, where the relationships and dependencies between datamore » sources and directory services are used to detect an insider threat, rather than simply relying on point solutions. This paper presents such an architecture in detail, including a description of implementation results.« less
Liquids and homemade explosive detection
NASA Astrophysics Data System (ADS)
Ellenbogen, Michael; Bijjani, Richard
2009-05-01
Excerpt from the US Transportation Security Agency website: "The ban on liquids, aerosols and gels was implemented on August 10 after a terrorist plot was foiled. Since then, experts from around the government, including the FBI and our national labs have analyzed the information we now have and have conducted extensive explosives testing to get a better understanding of this specific threat." In order to lift the ban and ease the burden on the flying public, Reveal began an extensive effort in close collaboration with the US and several other governments to help identify these threats. This effort resulted in the successful development and testing of an automated explosive detection system capable of resolving these threats with a high probability of detection and a low false alarm rate. We will present here some of the methodology and approach we took to address this problem.
Implementation of a Medication Reconciliation Assistive Technology: A Qualitative Analysis
Wright, Theodore B.; Adams, Kathleen; Church, Victoria L.; Ferraro, Mimi; Ragland, Scott; Sayers, Anthony; Tallett, Stephanie; Lovejoy, Travis; Ash, Joan; Holahan, Patricia J.; Lesselroth, Blake J.
2017-01-01
Objective: To aid the implementation of a medication reconciliation process within a hybrid primary-specialty care setting by using qualitative techniques to describe the climate of implementation and provide guidance for future projects. Methods: Guided by McMullen et al’s Rapid Assessment Process1, we performed semi-structured interviews prior to and iteratively throughout the implementation. Interviews were coded and analyzed using grounded theory2 and cross-examined for validity. Results: We identified five barriers and five facilitators that impacted the implementation. Facilitators identified were process alignment with user values, and motivation and clinical champions fostered by the implementation team rather than the administration. Barriers included a perceived limited capacity for change, diverging priorities, and inconsistencies in process standards and role definitions. Discussion: A more complete, qualitative understanding of existing barriers and facilitators helps to guide critical decisions on the design and implementation of a successful medication reconciliation process. PMID:29854251
A successful model to learn and implement ultrasound-guided venous catheterization in apheresis.
Gopalasingam, Nigopan; Thomsen, Anna-Marie Eller; Folkersen, Lars; Juhl-Olsen, Peter; Sloth, Erik
2017-12-01
Apheresis treatments can be performed with peripheral venous catheters (PVC), although central venous catheters (CVC) are inserted when PVCs fail or patient with history of difficult vascular access prior to the apheresis. Ultrasound guidance for PVC has shown promising results in other settings. To investigate if ultrasound guidance for PVC could be implemented among apheresis nurses. Second, how implementation of ultrasound guidance affected the number of CVCs used for apheresis per patient. Apheresis nurses completed a systematic training program for ultrasound-guided vascular access. All independent catheterizations were registered during the implementation stage. The number of CVCs in the pre- and postimplementation stages of the ultrasound guidance was compared. Six nurses completed the training program within a median of 48 days (range 38-83 days). In 77 patients, 485 independent ultrasound-guided PVC placements were performed during the implementation stage. All apheresis treatments (485/485) were accomplished using PVCs without requiring CVC as rescue. During the preimplementation stage, 125 of 273 (45.8%) procedures required a CVC for completion of apheresis procedures; during the postimplementation stage only 30 of 227 (13.2%) procedures required a CVC (p < 0.001). In the postimplementation stage, no CVCs were placed as rescue caused by failed PVCs but were only placed for patients where the ultrasound machine was unavailable. It indicates an effective success rate of 100% for ultrasound-guided PVC use. This study showed that ultrasound guidance could be implemented among apheresis nurses as a routine tool eliminating the need of CVC as a rescue. © 2017 Wiley Periodicals, Inc.
Career Education Community Resource Guide.
ERIC Educational Resources Information Center
D'Lugin, Victor; And Others
This guide, developed by the State Project to Implement Career Education (SPICE) in New York, is intended to serve as a model to assist teachers, guidance counselors, administrators, and project staff in using business and community resources in career education programs. The first section of the guide contains information on ways of updating and…
Basic Gasoline Engine Mechanics. Florida Vocational Program Guide.
ERIC Educational Resources Information Center
University of South Florida, Tampa. Dept. of Adult and Vocational Education.
This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a basic gasoline engine mechanics program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under the program, and includes a…
California Outdoor School Curriculum Guide.
ERIC Educational Resources Information Center
Stoner, Darleen K.; And Others
This curriculum guide seeks to contribute vision to the values and goals of outdoor education and to show their relevance to all curricular areas. Direction is provided for developing and implementing a dynamic curriculum in outdoor education. The guide is divided into three sections. Section I addresses the informational needs of administrators…
Guided Reading in Inclusive Middle Years Classrooms
ERIC Educational Resources Information Center
Lyons, Wanda; Thompson, Scott Anthony
2012-01-01
Teachers in inclusive classrooms are challenged to provide reading instruction for students with a wide range of instructional levels. This article reports on the implementation of guided reading in four middle years inclusive classrooms, the impact on student engagement and reading progress, and teacher perspectives on the guided reading…
Masonry. Teacher's Guide. Competency Based Education Curriculum.
ERIC Educational Resources Information Center
Long, Diana
This teacher's guide is designed to accompany the competency based masonry student materials (see note). It is intended for use as a reference and aid in implementing the curriculum. The guide includes these sections: Identification and Validation of Job Titles and Competencies, Functions of the Developmental Committee, Program Organization…
Solar Energy Installers Curriculum Guides. Book II.
ERIC Educational Resources Information Center
Walker, Gene C.
This second volume of a comprehensive curriculum guide for the heating-ventilation-air conditioning-refrigeration-solar student is designed to assist high school area vocational centers or community college instructors in the implementation and operation of comfort training programs. The guide is comprised of ten units of instruction within three…
Biotechnology: Applications in Agriculture. Instructor Guide [and] Student Reference.
ERIC Educational Resources Information Center
Nevils, Aaron
This curriculum guide incorporates the needed components to aid agriculture teachers in the implementation of the Vocational Instructional Management System in biotechnology: applications in agriculture. The guide begins with a list of the competencies/objectives found in the six units; list of references and materials; list of materials and…
Workplace Literacy Development Guide for Employers.
ERIC Educational Resources Information Center
Seattle-King County Private Industry Council, Seattle, WA.
Developed to assist employers in implementing a company-sponsored, on-site workplace literacy program for their employees, this guide is the result of experiences gained by the Seattle-King County, Washington, Private Industry Council, its partner agencies, and participating local employers. The guide contains sections on the following stages in…
Consumer Electronic Product Servicing. Florida Vocational Program Guide.
ERIC Educational Resources Information Center
University of South Florida, Tampa. Dept. of Adult and Vocational Education.
This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a consumer electronic product servicing program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under the program, and includes…
Computer Integrated Manufacturing. Florida Vocational Program Guide.
ERIC Educational Resources Information Center
University of South Florida, Tampa. Dept. of Adult and Vocational Education.
This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a computer-integrated manufacturing program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under the program, and includes a…
Computer Engineering Technology. Florida Vocational Program Guide.
ERIC Educational Resources Information Center
University of South Florida, Tampa. Dept. of Adult and Vocational Education.
This packet contains a program guide and Career Merit Achievement Plan (Career MAP) for the implementation of a computer engineering technology program in Florida secondary and postsecondary schools. The program guide describes the program content and structure, provides a program description, lists job titles under the program, and includes a…
Agribusiness Sales, Marketing, and Management. Instructor Guide [and] Student Reference.
ERIC Educational Resources Information Center
Schneiderheinze, Ronald; Wood, Christina
This curriculum guide incorporates the needed components to aid agriculture teachers in the implementation of the Vocational Instructional Management System in agribusiness sales, marketing, and management. The guide begins with a list of the competencies/objectives found in the nine units; list of references and materials; teaching calendar; and…
Hispanic/Latino Natural Support Systems. CSAP Implementation Guide.
ERIC Educational Resources Information Center
Acosta, Annie; Hamel, Vicki
This guide is intended to share knowledge about the Hispanic/Latino community with Center for Substance Abuse Prevention (CSAP) grant recipients and to help them develop effective prevention services responsive to the communities they serve. The guide: (1) highlights specific characteristics of the Hispanic and Latino communities that affect…
Japanese Language and Culture 10-20-30: Guide to Implementation.
ERIC Educational Resources Information Center
Alberta Learning, Edmonton (Canada). Curriculum Standards Branch.
This teacher's guide provides an innovative program of studies for teaching Japanese at the secondary level, featuring a content-based curriculum, an integrated approach, results (outcomes)-based orientation, and the use of language for effective interaction. This guide provides teachers with suggestions for designing and planning a Japanese…
A Principal's Guide to Reading Recovery.
ERIC Educational Resources Information Center
Smith-Burke, M. Trika; Pinnell, Gay Su; Jackson, Mary; Wey, Susan; Askew, Billie J.; Hambright-Brown, Eloise
This guide, requested by principals across the nation, is intended to help them successfully implement Reading Recovery in their schools. The guide is organized by topics that experienced principals have said are important to ongoing program operation. To help access information quickly, a detailed table of contents is provided, as well as an…
Industrial Mechanics Occupational Cluster Guide.
ERIC Educational Resources Information Center
Bishop, Frank
This guide, developed by the Oregon Department of Education, is intended to assist the vocational teacher in designing and implementing a cluster program in industrial mechanics. It suggests teaching ideas and is aimed at high school students, as well as those wishing to enter community college, university, or apprenticeship programs. The guide is…
The threat of nuclear war: Some responses
Marcattilio, A. J. M.; Nevin, John A.
1986-01-01
The possibility of nuclear holocaust threatens the very existence of the world community. Biologists, earth scientists, educators, lawyers, philosophers, physicists, physicians, and social scientists have addressed the problem from their special perspectives, and have had substantial impact on the public. Behavior analysts, however, have not as a whole contributed a great deal to the goal of preventing nuclear catastrophe. We argue that the threat of nuclear war is primarily a behavioral problem, and present an analysis of that problem. In addition, we address the difficulty of implementing behavioral interventions that would contribute to the survival of the World. PMID:22478648
Simplifying applications software for vision guided robot implementation
NASA Technical Reports Server (NTRS)
Duncheon, Charlie
1994-01-01
A simple approach to robot applications software is described. The idea is to use commercially available software and hardware wherever possible to minimize system costs, schedules and risks. The U.S. has been slow in the adaptation of robots and flexible automation compared to the fluorishing growth of robot implementation in Japan. The U.S. can benefit from this approach because of a more flexible array of vision guided robot technologies.
ERIC Educational Resources Information Center
Greenberger, Debbie; Anselmi, Robert
This guide explains how to design and implement financial work supports in order to improve family and child well-being. The information provided draws heavily from the study of these three programs that increased employment and earnings while improving employment stability, boosting income, and reducing poverty: Minnesota Family Investment…
Global research priorities to mitigate plastic pollution impacts on marine wildlife
Vegter, Amanda C.; Barletta, Mário; Beck, Cathy A.; Borrero, Jose C.; Burton, Harry; Campbell, Marnie L.; Costa, Monica F.; Eriksen, Marcus; Eriksson, Cecilia; Estrades, Andres; Gilardi, Kirsten V.; Hardesty, Britta D.; do Sul, Juliana A. Ivar; Lavers, Jennifer L.; Lazar, Bojan; Lebreton, Laurent; Nichols, Wallace J.; Ribic, Christine A.; Ryan, Peter G.; Schuyler, Qamar A.; Smith, Stephen D. A.; Takada, Hideshige; Townsend, Kathy A.; Wabnitz, Colette C. C.; Wilcox, Chris; Young, Lindsay C.; Hamann, Mark
2014-01-01
Marine wildlife faces a growing number of threats across the globe, and the survival of many species and populations will be dependent on conservation action. One threat in particular that has emerged over the last 4 decades is the pollution of oceanic and coastal habitats with plastic debris. The increased occurrence of plastics in marine ecosystems mirrors the increased prevalence of plastics in society, and reflects the high durability and persistence of plastics in the environment. In an effort to guide future research and assist mitigation approaches to marine conservation, we have generated a list of 16 priority research questions based on the expert opinions of 26 researchers from around the world, whose research expertise spans several disciplines, and covers each of the world’s oceans and the taxa most at risk from plastic pollution. This paper highlights a growing concern related to threats posed to marine wildlife from microplastics and fragmented debris, the need for data at scales relevant to management, and the urgent need to develop interdisciplinary research and management partnerships to limit the release of plastics into the environment and curb the future impacts of plastic pollution.
Zhang, Hongbo; Liu, Guanshan; Timko, Michael P; Li, Jiana; Wang, Wenjing; Ma, Haoran
2014-10-21
Water quality is under increasing threat from industrial and natural sources of pollutants. Here, we present our findings about a pollution incident involving the tap water of Chongqing City in China. In recent years, Solanaceae plants grown in greenhouses in this city have displayed symptoms of cupped, strappy leaves. These symptoms resembled those caused by chlorinated auxinic herbicides. We have determined that these symptoms were caused by the tap water used for irrigation. Using a bioactivity-guided fractionation method, we isolated a substance with corresponding auxinic activity from the tap water. The substance was named "solanicide" because of its strong bioactivity against Solanaceae plants. Further investigation revealed that the solanicide in the water system of Chongqing City is derived from the Jialing River, a major tributary of the Yangtze River. Therefore, it is also present in the Yangtze River downstream of Chongqing after the inflow of the Jialing River. Biological analyses indicated that solanicide is functionally similar to, but distinct from, other known chlorinated auxinic herbicides. Chemical assays further showed that solanicide structurally differs from those compounds. This study has highlighted a water pollution threat to the Yangtze River and its floodplain ecosystem.
ERIC Educational Resources Information Center
Kosanovich, Marcia; Foorman, Barbara
2016-01-01
The Regional Educational Laboratory (REL) Southeast developed a Professional Learning Community (PLC) Facilitators Guide to support educators in the implementation of recommendations from the What Works Clearinghouse's. The practice guide focuses on the foundational reading skills that enable students to read words, relate those words to their…
NASA Technical Reports Server (NTRS)
Pawloski, James H.; Aviles, Jorge; Myers, Ralph; Parris, Joshua; Corley, Bryan; Hehn, Garrett; Pascucci, Joseph
2016-01-01
This paper describes the specific problem of collision threat to GPM and risk to ISS CubeSat deployment and the process that was implemented to keep both missions safe from collision and maximize their project goals.
Combating terrorism : threat and risk assessments can help prioritize and target program investments
DOT National Transportation Integrated Search
1998-04-01
The Defense Against Weapons of Mass Destruction Act of 1996 established the Nunn-Lugar-Domenici (NLD) domestic preparedness program. The General Accounting Office (GAO) was requested to review implementation of the NLD program. Specifically, the GAO ...
DOT National Transportation Integrated Search
2002-06-01
Today, transportation agencies are beginning to address the need for threat and vulnerability assessments, and re-examine how existing emergency management plans will be implemented during a homeland security emergency or alert. Travel information is...
Marler, Thomas E.; Lindström, Anders J.
2017-01-01
ABSTRACT Conservation agencies charged with care of threatened plant species should be governed by the concepts that conservation actions should do no harm. Adaptive management research progresses in imperfect situations due to incomplete knowledge. Interpreting new experimental or observational evidence for inclusion in conservation plans should first consider the big picture by identifying collateral quandaries before scaling up the approach to large-scale implementation. We discuss a case study of Cycas micronesica conservation activities on the island of Guam. The use of large stem cuttings has been shown to be a viable approach for rescuing trees from planned construction sites. However, this artificial means of producing transplants exhibits shortcomings, some of which may add new threats to the existing plant population. Moreover, devoting funds for use of the new technique in tree rescue projects does not address the primary threats that have led to listing under the United States Endangered Species Act (ESA). Transplanted trees will likely succumb to those ubiquitous threats shortly after the completion of a successful rescue project. Alternatively, investing conservation funds into mitigation of the primary threats could lead to removal of the species from the ESA. PMID:29260802
Surveillance of antibiotic resistance
Johnson, Alan P.
2015-01-01
Surveillance involves the collection and analysis of data for the detection and monitoring of threats to public health. Surveillance should also inform as to the epidemiology of the threat and its burden in the population. A further key component of surveillance is the timely feedback of data to stakeholders with a view to generating action aimed at reducing or preventing the public health threat being monitored. Surveillance of antibiotic resistance involves the collection of antibiotic susceptibility test results undertaken by microbiology laboratories on bacteria isolated from clinical samples sent for investigation. Correlation of these data with demographic and clinical data for the patient populations from whom the pathogens were isolated gives insight into the underlying epidemiology and facilitates the formulation of rational interventions aimed at reducing the burden of resistance. This article describes a range of surveillance activities that have been undertaken in the UK over a number of years, together with current interventions being implemented. These activities are not only of national importance but form part of the international response to the global threat posed by antibiotic resistance. PMID:25918439
TANDI: threat assessment of network data and information
NASA Astrophysics Data System (ADS)
Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises
2006-04-01
Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.
The guided-mode resonance biosensor: principles, technology, and implementation
NASA Astrophysics Data System (ADS)
Magnusson, Robert; Lee, Kyu J.; Hemmati, Hafez; Ko, Yeong Hwan; Wenner, Brett R.; Allen, Jeffery W.; Allen, Monica S.; Gimlin, Susanne; Weidanz, Debra Wawro
2018-02-01
The guided-mode resonance (GMR) sensor operates with quasi-guided modes induced in periodic films. The resonance is enabled by 1D or 2D nanopatterns that are expeditiously fabricated. Optical sensors are needed in many fields including medical diagnostics, chemical analyses, and environmental monitoring. Inducing resonance in multiple modes enables extraction of complete bioreaction information including the biolayer thickness, biolayer refractive index, and any change in the refractive index in the background buffer solution. Thus, we refer to this version of the GMR sensor as the complete biosensor. We address the fundamentals, state of technological development, and implementation of this basic sensor modality.
Prioritizing Land and Sea Conservation Investments to Protect Coral Reefs
Klein, Carissa J.; Ban, Natalie C.; Halpern, Benjamin S.; Beger, Maria; Game, Edward T.; Grantham, Hedley S.; Green, Alison; Klein, Travis J.; Kininmonth, Stuart; Treml, Eric; Wilson, Kerrie; Possingham, Hugh P.
2010-01-01
Background Coral reefs have exceptional biodiversity, support the livelihoods of millions of people, and are threatened by multiple human activities on land (e.g. farming) and in the sea (e.g. overfishing). Most conservation efforts occur at local scales and, when effective, can increase the resilience of coral reefs to global threats such as climate change (e.g. warming water and ocean acidification). Limited resources for conservation require that we efficiently prioritize where and how to best sustain coral reef ecosystems. Methodology/Principal Findings Here we develop the first prioritization approach that can guide regional-scale conservation investments in land- and sea-based conservation actions that cost-effectively mitigate threats to coral reefs, and apply it to the Coral Triangle, an area of significant global attention and funding. Using information on threats to marine ecosystems, effectiveness of management actions at abating threats, and the management and opportunity costs of actions, we calculate the rate of return on investment in two conservation actions in sixteen ecoregions. We discover that marine conservation almost always trumps terrestrial conservation within any ecoregion, but terrestrial conservation in one ecoregion can be a better investment than marine conservation in another. We show how these results could be used to allocate a limited budget for conservation and compare them to priorities based on individual criteria. Conclusions/Significance Previous prioritization approaches do not consider both land and sea-based threats or the socioeconomic costs of conserving coral reefs. A simple and transparent approach like ours is essential to support effective coral reef conservation decisions in a large and diverse region like the Coral Triangle, but can be applied at any scale and to other marine ecosystems. PMID:20814570
Prioritizing land and sea conservation investments to protect coral reefs.
Klein, Carissa J; Ban, Natalie C; Halpern, Benjamin S; Beger, Maria; Game, Edward T; Grantham, Hedley S; Green, Alison; Klein, Travis J; Kininmonth, Stuart; Treml, Eric; Wilson, Kerrie; Possingham, Hugh P
2010-08-30
Coral reefs have exceptional biodiversity, support the livelihoods of millions of people, and are threatened by multiple human activities on land (e.g. farming) and in the sea (e.g. overfishing). Most conservation efforts occur at local scales and, when effective, can increase the resilience of coral reefs to global threats such as climate change (e.g. warming water and ocean acidification). Limited resources for conservation require that we efficiently prioritize where and how to best sustain coral reef ecosystems. Here we develop the first prioritization approach that can guide regional-scale conservation investments in land- and sea-based conservation actions that cost-effectively mitigate threats to coral reefs, and apply it to the Coral Triangle, an area of significant global attention and funding. Using information on threats to marine ecosystems, effectiveness of management actions at abating threats, and the management and opportunity costs of actions, we calculate the rate of return on investment in two conservation actions in sixteen ecoregions. We discover that marine conservation almost always trumps terrestrial conservation within any ecoregion, but terrestrial conservation in one ecoregion can be a better investment than marine conservation in another. We show how these results could be used to allocate a limited budget for conservation and compare them to priorities based on individual criteria. Previous prioritization approaches do not consider both land and sea-based threats or the socioeconomic costs of conserving coral reefs. A simple and transparent approach like ours is essential to support effective coral reef conservation decisions in a large and diverse region like the Coral Triangle, but can be applied at any scale and to other marine ecosystems.
Explosive and chemical threat detection by surface-enhanced Raman scattering: a review.
Hakonen, Aron; Andersson, Per Ola; Stenbæk Schmidt, Michael; Rindzevicius, Tomas; Käll, Mikael
2015-09-17
Acts of terror and warfare threats are challenging tasks for defense agencies around the world and of growing importance to security conscious policy makers and the general public. Explosives and chemical warfare agents are two of the major concerns in this context, as illustrated by the recent Boston Marathon bombing and nerve gas attacks on civilians in the Middle East. To prevent such tragic disasters, security personnel must be able to find, identify and deactivate the threats at multiple locations and levels. This involves major technical and practical challenges, such as detection of ultra-low quantities of hazardous compounds at remote locations for anti-terror purposes and monitoring of environmental sanitation of dumped or left behind toxic substances and explosives. Surface-enhanced Raman scattering (SERS) is one of todays most interesting and rapidly developing methods for label-free ultrasensitive vibrational "fingerprinting" of a variety of molecular compounds. Performance highlights include attomolar detection of TNT and DNT explosives, a sensitivity that few, if any, other technique can compete with. Moreover, instrumentation needed for SERS analysis are becoming progressively better, smaller and cheaper, and can today be acquired for a retail price close to 10,000 US$. This contribution aims to give a comprehensive overview of SERS as a technique for detection of explosives and chemical threats. We discuss the prospects of SERS becoming a major tool for convenient in-situ threat identification and we summarize existing SERS detection methods and substrates with particular focus on ultra-sensitive real-time detection. General concepts, detection capabilities and perspectives are discussed in order to guide potential users of the technique for homeland security and anti-warfare purposes. Copyright © 2015 Elsevier B.V. All rights reserved.
Ecosystem Risk Assessment Using the Comprehensive Assessment of Risk to Ecosystems (CARE) Tool
NASA Astrophysics Data System (ADS)
Battista, W.; Fujita, R.; Karr, K.
2016-12-01
Effective Ecosystem Based Management requires a localized understanding of the health and functioning of a given system as well as of the various factors that may threaten the ongoing ability of the system to support the provision of valued services. Several risk assessment models are available that can provide a scientific basis for understanding these factors and for guiding management action, but these models focus mainly on single species and evaluate only the impacts of fishing in detail. We have developed a new ecosystem risk assessment model - the Comprehensive Assessment of Risk to Ecosystems (CARE) - that allows analysts to consider the cumulative impact of multiple threats, interactions among multiple threats that may result in synergistic or antagonistic impacts, and the impacts of a suite of threats on whole-ecosystem productivity and functioning, as well as on specific ecosystem services. The CARE model was designed to be completed in as little as two hours, and uses local and expert knowledge where data are lacking. The CARE tool can be used to evaluate risks facing a single site; to compare multiple sites for the suitability or necessity of different management options; or to evaluate the effects of a proposed management action aimed at reducing one or more risks. This analysis can help users identify which threats are the most important at a given site, and therefore where limited management resources should be targeted. CARE can be applied to virtually any system, and can be modified as knowledge is gained or to better match different site characteristics. CARE builds on previous ecosystem risk assessment tools to provide a comprehensive assessment of fishing and non-fishing threats that can be used to inform environmental management decisions across a broad range of systems.
Ecosystem Risk Assessment Using the Comprehensive Assessment of Risk to Ecosystems (CARE) Tool
NASA Astrophysics Data System (ADS)
Battista, W.; Fujita, R.; Karr, K.
2016-02-01
Effective Ecosystem Based Management requires a localized understanding of the health and functioning of a given system as well as of the various factors that may threaten the ongoing ability of the system to support the provision of valued services. Several risk assessment models are available that can provide a scientific basis for understanding these factors and for guiding management action, but these models focus mainly on single species and evaluate only the impacts of fishing in detail. We have developed a new ecosystem risk assessment model - the Comprehensive Assessment of Risk to Ecosystems (CARE) - that allows analysts to consider the cumulative impact of multiple threats, interactions among multiple threats that may result in synergistic or antagonistic impacts, and the impacts of a suite of threats on whole-ecosystem productivity and functioning, as well as on specific ecosystem services. The CARE model was designed to be completed in as little as two hours, and uses local and expert knowledge where data are lacking. The CARE tool can be used to evaluate risks facing a single site; to compare multiple sites for the suitability or necessity of different management options; or to evaluate the effects of a proposed management action aimed at reducing one or more risks. This analysis can help users identify which threats are the most important at a given site, and therefore where limited management resources should be targeted. CARE can be applied to virtually any system, and can be modified as knowledge is gained or to better match different site characteristics. CARE builds on previous ecosystem risk assessment tools to provide a comprehensive assessment of fishing and non-fishing threats that can be used to inform environmental management decisions across a broad range of systems.
A horizon scan of future threats and opportunities for pollinators and pollination.
Brown, Mark J F; Dicks, Lynn V; Paxton, Robert J; Baldock, Katherine C R; Barron, Andrew B; Chauzat, Marie-Pierre; Freitas, Breno M; Goulson, Dave; Jepsen, Sarina; Kremen, Claire; Li, Jilian; Neumann, Peter; Pattemore, David E; Potts, Simon G; Schweiger, Oliver; Seymour, Colleen L; Stout, Jane C
2016-01-01
Background. Pollinators, which provide the agriculturally and ecologically essential service of pollination, are under threat at a global scale. Habitat loss and homogenisation, pesticides, parasites and pathogens, invasive species, and climate change have been identified as past and current threats to pollinators. Actions to mitigate these threats, e.g., agri-environment schemes and pesticide-use moratoriums, exist, but have largely been applied post-hoc. However, future sustainability of pollinators and the service they provide requires anticipation of potential threats and opportunities before they occur, enabling timely implementation of policy and practice to prevent, rather than mitigate, further pollinator declines. Methods.Using a horizon scanning approach we identified issues that are likely to impact pollinators, either positively or negatively, over the coming three decades. Results.Our analysis highlights six high priority, and nine secondary issues. High priorities are: (1) corporate control of global agriculture, (2) novel systemic pesticides, (3) novel RNA viruses, (4) the development of new managed pollinators, (5) more frequent heatwaves and drought under climate change, and (6) the potential positive impact of reduced chemical use on pollinators in non-agricultural settings. Discussion. While current pollinator management approaches are largely driven by mitigating past impacts, we present opportunities for pre-emptive practice, legislation, and policy to sustainably manage pollinators for future generations.
A horizon scan of future threats and opportunities for pollinators and pollination
Dicks, Lynn V.; Paxton, Robert J.; Baldock, Katherine C.R.; Barron, Andrew B.; Chauzat, Marie-Pierre; Freitas, Breno M.; Goulson, Dave; Jepsen, Sarina; Kremen, Claire; Li, Jilian; Neumann, Peter; Pattemore, David E.; Potts, Simon G.; Schweiger, Oliver; Seymour, Colleen L.; Stout, Jane C.
2016-01-01
Background. Pollinators, which provide the agriculturally and ecologically essential service of pollination, are under threat at a global scale. Habitat loss and homogenisation, pesticides, parasites and pathogens, invasive species, and climate change have been identified as past and current threats to pollinators. Actions to mitigate these threats, e.g., agri-environment schemes and pesticide-use moratoriums, exist, but have largely been applied post-hoc. However, future sustainability of pollinators and the service they provide requires anticipation of potential threats and opportunities before they occur, enabling timely implementation of policy and practice to prevent, rather than mitigate, further pollinator declines. Methods.Using a horizon scanning approach we identified issues that are likely to impact pollinators, either positively or negatively, over the coming three decades. Results.Our analysis highlights six high priority, and nine secondary issues. High priorities are: (1) corporate control of global agriculture, (2) novel systemic pesticides, (3) novel RNA viruses, (4) the development of new managed pollinators, (5) more frequent heatwaves and drought under climate change, and (6) the potential positive impact of reduced chemical use on pollinators in non-agricultural settings. Discussion. While current pollinator management approaches are largely driven by mitigating past impacts, we present opportunities for pre-emptive practice, legislation, and policy to sustainably manage pollinators for future generations. PMID:27602260
Maas-Hebner, Kathleen G.; Schreck, Carl B.; Hughes, Robert M.; Yeakley, Alan; Molina, Nancy
2016-01-01
We discuss the importance of addressing diffuse threats to long-term species and habitat viability in fish conservation and recovery planning. In the Pacific Northwest, USA, salmonid management plans have typically focused on degraded freshwater habitat, dams, fish passage, harvest rates, and hatchery releases. However, such plans inadequately address threats related to human population and economic growth, intra- and interspecific competition, and changes in climate, ocean, and estuarine conditions. Based on reviews conducted on eight conservation and/or recovery plans, we found that though threats resulting from such changes are difficult to model and/or predict, they are especially important for wide-ranging diadromous species. Adaptive management is also a critical but often inadequately constructed component of those plans. Adaptive management should be designed to respond to evolving knowledge about the fish and their supporting ecosystems; if done properly, it should help improve conservation efforts by decreasing uncertainty regarding known and diffuse threats. We conclude with a general call for environmental managers and planners to reinvigorate the adaptive management process in future management plans, including more explicitly identifying critical uncertainties, implementing monitoring programs to reduce those uncertainties, and explicitly stating what management actions will occur when pre-identified trigger points are reached.
Mechanistic-empirical Pavement Design Guide Implementation
DOT National Transportation Integrated Search
2010-06-01
The recently introduced Mechanistic-Empirical Pavement Design Guide (MEPDG) and associated computer software provides a state-of-practice mechanistic-empirical highway pavement design methodology. The MEPDG methodology is based on pavement responses ...
Safety Assurance Factors for Electronic Health Record Resilience (SAFER): study protocol
2013-01-01
Background Implementation and use of electronic health records (EHRs) could lead to potential improvements in quality of care. However, the use of EHRs also introduces unique and often unexpected patient safety risks. Proactive assessment of risks and vulnerabilities can help address potential EHR-related safety hazards before harm occurs; however, current risk assessment methods are underdeveloped. The overall objective of this project is to develop and validate proactive assessment tools to ensure that EHR-enabled clinical work systems are safe and effective. Methods/Design This work is conceptually grounded in an 8-dimension model of safe and effective health information technology use. Our first aim is to develop self-assessment guides that can be used by health care institutions to evaluate certain high-risk components of their EHR-enabled clinical work systems. We will solicit input from subject matter experts and relevant stakeholders to develop guides focused on 9 specific risk areas and will subsequently pilot test the guides with individuals representative of likely users. The second aim will be to examine the utility of the self-assessment guides by beta testing the guides at selected facilities and conducting on-site evaluations. Our multidisciplinary team will use a variety of methods to assess the content validity and perceived usefulness of the guides, including interviews, naturalistic observations, and document analysis. The anticipated output of this work will be a series of self-administered EHR safety assessment guides with clear, actionable, checklist-type items. Discussion Proactive assessment of patient safety risks increases the resiliency of health care organizations to unanticipated hazards of EHR use. The resulting products and lessons learned from the development of the assessment guides are expected to be helpful to organizations that are beginning the EHR selection and implementation process as well as those that have already implemented EHRs. Findings from our project, currently underway, will inform future efforts to validate and implement tools that can be used by health care organizations to improve the safety of EHR-enabled clinical work systems. PMID:23587208
The Environmental Assessment and Management (TEAM) Guide: New Mexico Supplement
2010-03-01
dace, Phoxinus erythrogaster (j) Colorado pikeminnow, Ptychocheilus lucius (k) loach minnow, Tiaroga cobitis 5-13 Natural Resources Management...writing by the Department, off-site at a readily available location. ST.4.38.NM. Corrective actions must be ta ken u pon a release involving a...cause a public nuisance or threat to human health, safety and welfare, or the environment. Verify th at when c ontaminated s oil is ta ken o ff s ite
Epidemiologic Responses to Anthrax Outbreaks: A Review of Field Investigations, 1950–2001
Bales, Michael E.; Brachman, Philip S.; Kaufmann, Arnold F.; Klatsky, Peter C.; Ashford, David A.
2002-01-01
We used unpublished reports, published manuscripts, and communication with investigators to identify and summarize 49 anthrax-related epidemiologic field investigations conducted by the Centers for Disease Control and Prevention from 1950 to August 2001. Of 41 investigations in which Bacillus anthracis caused human or animal disease, 24 were in agricultural settings, 11 in textile mills, and 6 in other settings. Among the other investigations, two focused on building decontamination, one was a response to bioterrorism threats, and five involved other causes. Knowledge gained in these investigations helped guide the public health response to the October 2001 intentional release of B. anthracis, especially by addressing the management of anthrax threats, prevention of occupational anthrax, use of antibiotic prophylaxis in exposed persons, use of vaccination, spread of B. anthracis spores in aerosols, clinical diagnostic and laboratory confirmation methods, techniques for environmental sampling of exposed surfaces, and methods for decontaminating buildings. PMID:12396934
Martin, Meredith J; Davies, Patrick T; MacNeill, Leigha A
2014-04-29
Navigating the ubiquitous conflict, competition, and complex group dynamics of the peer group is a pivotal developmental task of childhood. Difficulty negotiating these challenges represents a substantial source of risk for psychopathology. Evolutionary developmental psychology offers a unique perspective with the potential to reorganize the way we think about the role of peer relationships in shaping how children cope with the everyday challenges of establishing a social niche. To address this gap, we utilize the ethological reformulation of the emotional security theory as a guide to developing an evolutionary framework for advancing an understanding of the defense strategies children use to manage antagonistic peer relationships and protect themselves from interpersonal threat (Davies and Sturge-Apple, 2007). In this way, we hope to illustrate the value of an evolutionary developmental lens in generating unique theoretical insight and novel research directions into the role of peer relationships in the development of psychopathology.
Siffert, Andrea; Schwarz, Beate
2011-01-01
Guided by the emotional security hypothesis and the cognitive-contextual framework, the authors investigated whether the associations between negative parental conflict resolution styles and children's internalizing and externalizing problems were mediated by children's appraisals of threat and self-blame and their emotion regulation. Participants were 192 Swiss 2-parent families with children aged 9-12 years (M age = 10.62 years, SD = 0.41 years). Structural equation modeling was used to test the empirical validity of the theoretical model. Results indicated that children's maladaptive emotion regulation mediated the association between negative parental conflict resolution styles and children's internalizing as well as externalizing problems. Whereas perceived threat was related only to children's internalizing problems, self-blame did not mediate the links between negative parental conflict resolution styles and children's adjustment. Implications for understanding the mechanisms by which exposure to interparental conflict could lead to children's maladjustment and limitations of the study are discussed.
Brouwers, Melissa C; Makarski, Julie; Kastner, Monika; Hayden, Leigh; Bhattacharyya, Onil
2015-03-15
Practice guideline (PG) implementability refers to PG features that promote their use. While there are tools and resources to promote PG implementability, none are based on an evidence-informed and multidisciplinary perspective. Our objectives were to (i) create a comprehensive and evidence-informed model of PG implementability, (ii) seek support for the model from the international PG community, (iii) map existing implementability tools on to the model, (iv) prioritize areas for further investigation, and (v) describe how the model can be used by PG developers, users, and researchers. A mixed methods approach was used. Using our completed realist review of the literature of seven different disciplines as the foundation, an iterative consensus process was used to create the beta version of the model. This was followed by (i) a survey of international stakeholders (guideline developers and users) to gather feedback and to refine the model, (ii) a content analysis comparing the model to existing PG tools, and (iii) a strategy to prioritize areas of the model for further research by members of the research team. The Guideline Implementability for Decision Excellence Model (GUIDE-M) is comprised of 3 core tactics, 7 domains, 9 subdomains, 44 attributes, and 40 subattributes and elements. Feedback on the beta version was received from 248 stakeholders from 34 countries. The model was rated as logical, relevant, and appropriate. Seven PG tools were selected and compared to the GUIDE-M: very few tools targeted the Contextualization and Deliberations domain. Also, fewer of the tools addressed PG appraisal than PG development and reporting functions. These findings informed the research priorities identified by the team. The GUIDE-M provides an evidence-informed international and multidisciplinary conceptualization of PG implementability. The model can be used by PG developers to help them create more implementable recommendations, by clinicians and other users to help them be better consumers of PGs, and by the research community to identify priorities for further investigation.