WorldWideScience

Sample records for based threat evaluation

  1. A Category Based Threat Evaluation Model Using Platform Kinematics Data

    Directory of Open Access Journals (Sweden)

    Mustafa Çöçelli

    2017-08-01

    Full Text Available Command and control (C2 systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to military people. However, C2 systems could be deprived of valuable data source due to the absence of capable equipment. This situation has a bad unfavorable influence on the quality of tactical picture in front of C2 operators. In this paper, we study on the threat evaluation model that take into account these deficiencies. Our method extracts threat level of various targets mostly from their kinematics in two dimensional space. In the meantime, classification of entities around battlefield is unavailable. Only, category of targets are determined as a result of sensors process, which is the information of whether entities belong to air or surface environment. Hereby, threat evaluation model is consist of three fundamental steps that runs on entities belongs to different environment separately: the extraction of threat assessment cues, threat selection based on Bayesian Inference and the calculation of threat assessment rating. We have evaluated performance of proposed model by simulating a set of synthetic scenarios.

  2. How Ego-threats Facilitate Contracts Based on Subjective Evaluations

    DEFF Research Database (Denmark)

    Sebald, Alexander; Walzl, Markus

    We show that individuals' desire to protect their self-esteem against ego-threatening feedback can mitigate moral hazard in environments with purely subjective performance evaluations. In line with evidence from social psychology we assume that agents' react aggressively to evaluations by the pri......We show that individuals' desire to protect their self-esteem against ego-threatening feedback can mitigate moral hazard in environments with purely subjective performance evaluations. In line with evidence from social psychology we assume that agents' react aggressively to evaluations...

  3. Real-time threat evaluation in a ground based air defence environment

    Directory of Open Access Journals (Sweden)

    JN Roux

    2008-06-01

    Full Text Available In a military environment a ground based air defence operator is required to evaluate the tactical situation in real-time and protect Defended Assets (DAs on the ground against aerial threats by assigning available Weapon Systems (WSs to engage enemy aircraft. Since this aerial environment requires rapid operational planning and decision making in stress situations, the associated responsibilities are typically divided between a number of operators and computerized systems that aid these operators during the decision making processes. One such a Decision Support System (DSS, a threat evaluation and weapon assignment system, assigns threat values to aircraft (with respect to DAs in real-time and uses these values to propose possible engagements of observed enemy aircraft by anti-aircraft WSs. In this paper a design of the threat evaluation part of such a DSS is put forward. The design follows the structured approach suggested in [Roux JN & van Vuuren JH, 2007, Threat evaluation and weapon assignment decision support: A review of the state of the art, ORiON, 23(2, pp. 151-187], phasing in a suite of increasingly complex qualitative and quantitative model components as more (reliable data become available.

  4. Web-based IP telephony penetration system evaluating level of protection from attacks and threats

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2011-01-01

    This article deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. SIP is being widely used in building VoIP networks. Unlike the traditional telephone networks VoIP networks does not have a closed communication which makes communication medium vulnerable to all kinds of attacks from the in truders. The SIP server is a key component of VoIP infrastr...

  5. Real-time threat evaluation in a ground based air defence ...

    African Journals Online (AJOL)

    manned aerial vehicles [17, 29], unmanned combat aerial vehicles [48] and .... including a suite of TE models which may be implemented on three levels of increasing ... The complexity surrounding the analysis of a system threat category ...... and a maintenance process), as well as the data flow between these processes.

  6. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  7. Evaluation of Potential Biological Threats in Ukraine

    International Nuclear Information System (INIS)

    Pozdnyakova, L.; Slavina, N.; Pozdnyakov, S.

    2007-01-01

    Dilating of biological threats spectrum, EDI diffusion opportunities and routes, unpredictability of outbreaks connected with connatural, technogenic, terrorist factors determines constant monitoring and readiness for operative BPA indication and identification. Scientific analytical approach of existing and probable regional bio-threats evaluation is necessary for adequate readiness system creation and maintenance of medical counteraction tactics to probable biological threats. Basing on the international experience, we carry out analysis of a situation present in Ukraine and routes for the decisions. The basic directions are: - Evaluation of a reality for EDI penetration from abroad and presence of conditions for their further diffusion inside the country. - Revealing of presence and definition of connatural EDI foci biocenoses features and BPAs. - Appropriate level of biological safety and physical protection of bio-laboratories and pathogens collections maintenance. - Gene/molecular and phenotypical definition of EDI circulating strains. - Creation of the circulating EDI gene/ phenotypic characteristics regional data bank. - Ranging of EDI actual for area. - Introduction of GPT, mathematical modeling and forecasting for tactics development in case of technogenic accidents and connatural outbreaks. - Methodical basis and equipment improvement for BPA system indication for well-timed identification of natural, or modified agent. - Education and training The international cooperation in maintenance of biosafety and bioprotection within the framework of scientific programs, grants, exchange of experience, introduction of international standards and rules are among basic factors in the decision for creating system national biosafety for countries not included in EU and the NATO. (author)

  8. Security Evaluation of the Cyber Networks under Advanced Persistent Threats

    NARCIS (Netherlands)

    Yang, L.; Li, Pengdeng; Yang, Xiaofan; Tang, Yuan Yan

    2017-01-01

    Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose, a dynamic model capturing the APT-based

  9. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  10. Threat evaluation and weapon assignment decision support: A ...

    African Journals Online (AJOL)

    ... stands within the context of a ground based air defence system (GBADS) at the turn of the twenty first century. However, much of the contents of the paper maye generalized to military environments other than a GBADS one. Keywords: Threat evaluation, weapon assignment, decision support. ORiON Vol. 23 (2) 2007: pp.

  11. Where Local and National Evaluators Meet: Unintended Threats to Ethical Evaluation Practice

    Science.gov (United States)

    Rodi, Michael S.; Paget, Kathleen D.

    2007-01-01

    The ethical work of program evaluators is based on a covenant of honesty and transparency among stakeholders. Yet even under the most favorable evaluation conditions, threats to ethical standards exist and muddle that covenant. Unfortunately, ethical issues associated with different evaluation structures and contracting arrangements have received…

  12. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation

  13. Physical threat and self-evaluative emotions in smoking cessation

    NARCIS (Netherlands)

    Dijkstra, A; Den Dijker, L

    Negative self-evaluative emotions (e.g., feeling dissatisfied with oneself, feeling stupid) are considered to indicate a threat to the self that can be caused by an external physical threat (e.g., smoking). A sample of 363 smokers was tested twice, with an interval of 8 months. Prospective analyses

  14. Evaluative threat and ambulatory blood pressure: cardiovascular effects of social stress in daily experience.

    Science.gov (United States)

    Smith, Timothy W; Birmingham, Wendy; Uchino, Bert N

    2012-11-01

    Physiological effects of social evaluation are central in models of psychosocial influences on physical health. Experimental manipulations of evaluative threat evoke substantial cardiovascular and neuroendocrine responses in laboratory studies, but only preliminary evidence is available regarding naturally occurring evaluative threats in daily life. In such nonexperimental ambulatory studies, it is essential to distinguish effects of evaluative threat from related constructs known to alter stress, such as ability perceptions and concerns about appearance. 94 married, working couples (mean age 29.2 years) completed a 1-day (8 a.m. to 10 p.m.) ambulatory blood pressure protocol with random interval-contingent measurements using a Suntech monitor and Palm Pilot-based measures of control variables and momentary experiences of social-evaluative threat, concerns about appearance, and perceived ability. In hierarchical analyses for couples and multiple measurement occasions (Proc Mixed; SAS) and controlling individual differences (BMI, age, income) and potential confounds (e.g., posture, activity), higher reports of social-evaluative threat were associated with higher concurrent systolic (estimate = .87, SE = .34) and diastolic blood pressure (estimate = 1.06; SE = .26), both p social-evaluative threat remained significant when perceived ability and appearance concerns were controlled. Naturally occurring social-evaluative threat during daily activity is associated with increased systolic and diastolic blood pressure. Given associations between ambulatory blood pressure and risk of cardiovascular disease, the findings support conceptual models of threats to the social self as a potentially important influence on physical health.

  15. Puerto Rico Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's study,...

  16. USVI Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's study,...

  17. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  18. Ose evaluation of delay systems in a high threat environment

    International Nuclear Information System (INIS)

    Rich, B.L.; Cook, B.G.

    1988-01-01

    The Office of Security Evaluations (OSE) has in place an Evaluation Program to assist the Department of Energy (DOE) Headquarters and operations office managers by assessing specific elements of protection programs and informing the managers of common strengths and weaknesses of these elements. This information is provided so that sufficient and cost effective protection programs are maintained or enhanced. The subject of this paper is the evaluation of delay systems in the high-threat environment defined for sensitive DOE security interests such as special nuclear materials, nuclear weapons, and related classified devices and information

  19. Technology transfer - insider protection workshop (Safeguards Evaluation Method - Insider Threat)

    International Nuclear Information System (INIS)

    Strait, R.S.; Renis, T.A.

    1986-01-01

    The Safeguards Evaluation Method - Insider Threat, developed by Lawrence Livermore National Laboratory, is a field-applicable tool to evaluate facility safeguards against theft or diversion of special nuclear material (SNM) by nonviolent insiders. To ensure successful transfer of this technology from the laboratory to DOE field offices and contractors, LLNL developed a three-part package. The package includes a workbook, user-friendly microcomputer software, and a three-day training program. The workbook guides an evaluation team through the Safeguards Evaluation Method and provides forms for gathering data. The microcomputer software assists in the evaluation of safeguards effectiveness. The software is designed for safeguards analysts with no previous computer experience. It runs on an IBM Personal Computer or any compatible machine. The three-day training program is called the Insider Protection Workshop. The workshop students learn how to use the workbook and the computer software to assess insider vulnerabilities and to evaluate the benefits and costs of potential improvements. These activities increase the students' appreciation of the insider threat. The workshop format is informal and interactive, employing four different instruction modes: classroom presentations, small-group sessions, a practical exercise, and ''hands-on'' analysis using microcomputers. This approach to technology transfer has been successful: over 100 safeguards planners and analysts have been trained in the method, and it is being used at facilities through the DOE complex

  20. Model Based Analysis of Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Han, Tingting; Kammueller, Florian

    2016-01-01

    In order to detect malicious insider attacks it is important to model and analyse infrastructures and policies of organisations and the insiders acting within them. We extend formal approaches that allow modelling such scenarios by quantitative aspects to enable a precise analysis of security...... designs. Our framework enables evaluating the risks of an insider attack to happen quantitatively. The framework first identifies an insider's intention to perform an inside attack, using Bayesian networks, and in a second phase computes the probability of success for an inside attack by this actor, using...

  1. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  2. The role of perceived threat during emergency department cardiac evaluation and the age-posttraumatic stress disorder link.

    Science.gov (United States)

    Meli, Laura; Kautz, Marin; Julian, Jacob; Edmondson, Donald; Sumner, Jennifer A

    2018-06-01

    Evaluation for acute coronary syndrome (ACS) can trigger posttraumatic stress symptoms (PSS). Research suggests that younger, versus older, individuals may be at elevated risk for PSS after ACS evaluation. It has been proposed that younger individuals may be at greater risk because they perceive the suspected ACS event as more threatening than their older counterparts; however, this has yet to be tested. We examined whether perceived threat during ACS evaluation mediated the association between age and PSS after ACS evaluation in an observational cohort study of patients presenting to the emergency department (ED) with suspected ACS. Demographics and perceived threat were assessed in the ED. PSS were measured upon inpatient transfer or by phone 3 days later. The analytic sample comprised 871 adult participants. Multiple linear regression was used to examine (1) associations of age and perceived threat with PSS and (2) whether perceived threat mediated the association. Bootstrapping with percentile-based confidence intervals (CIs) was used to test the indirect effect. Each year of age was associated with lower PSS (b = - 0.12, p age was associated with lower perceived threat during ACS evaluation (b = - 0.05, p age differences in PSS development risk and the potential impact of age on threat perceptions may help inform ED treatment.

  3. Evaluation of water quality threats to the endangered Okaloosa darter (Etheostoma okaloosae) in East Turkey Creek on Eglin Air Force Base.

    Science.gov (United States)

    Weil, R E; Spade, D J; Knoebl, I; Hemming, J M; Tongue, M L; Szabo, N J; Kroll, K J; Tate, W B; Denslow, N D

    2012-04-01

    The threatened Okaloosa darter (Etheostoma okaloosae) is found almost exclusively on the Eglin Air Force Base in the Choctawhatchee Bay watershed of Florida. Portions of this limited habitat are threatened with soil erosion, altered hydrology, and impaired water quality. In the present study, general water quality parameters (i.e., dissolved oxygen, specific conductance, pH, temperature, relative turbidity, and primary productivity) were characterized in East Turkey Creek, which is a body of water potentially impacted by treated wastewater sprayfields, and Long Creek, an adjacent reference stream that does not border the sprayfields. Water quality was assessed during a 30-day exposure using passive samplers for both non-polar and polar effluent parameters. Because the Okaloosa darter was listed as endangered at the time of sampling we chose a closely related species from the same creeks, the sailfin shiner (Pteronotropis hypseleotris) in which to measure metal body burdens. Additionally, fathead minnows (Pimephales promelas) were used for microarray analysis on gonad and liver tissues after 48 h exposures to water collected from the two creeks and brought into the laboratory. Waters from all sites, including reference sites, affected the expression of genes related to various biological processes including transcription and translation, cell cycle control, metabolism, and signaling pathways, suggesting that the sum of anthropogenic compounds in the site waters may cause a generalized stress response in both liver and testis, an effect that could be related to the generally low populations of the Okaloosa darter. Furthermore, effects of site waters on fish gene expression may be related to the impact of human activities other than the wastewater sprayfields, as nearby areas are closed to the public for military testing, training, and administrative activities and due to ordnance contamination. Copyright © 2012 Elsevier B.V. All rights reserved.

  4. Identification of threats using linguistics-based knowledge extraction.

    Energy Technology Data Exchange (ETDEWEB)

    Chew, Peter A.

    2008-09-01

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe

  5. Construction of Index System Based on Advanced Persistent Threat

    Directory of Open Access Journals (Sweden)

    Lin Jia

    2017-01-01

    Full Text Available With the proliferation of advanced persistent threat (APT, APT attack effect evaluation is playing an increasingly important role in cyberspace. As one of the hot issues of network security, the evaluation to its attack effect can quantify the harm caused by APT. Then according to the evaluation results, we can derive specific measures to the network attack. At present, a lot of work has done in the network attack effect evaluation index system. However, a significant barrier to the development of APT attack effect evaluation is that the existing index system is either from the point of view of the network security situation, or for a single attack weapons to customize. In this paper, an evaluation index system is proposed through analysing the features of APT. Through this index system, we can not only quantify APT attack effect, but also visually observe the APT ability from various angles. Then, we use the analytic hierarchy process (AHP to model the evaluation process and calculate the weight of each indicator. Finally, the Ukrainian Power Outages is taken as an example to validate the proposed index system. The experimental results verify the effectiveness of the index system.

  6. Vision-based threat detection in dynamic environments.

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, Jeffrey J.

    2007-08-01

    This report addresses the development of automated video-screening technology to assist security forces in protecting our homeland against terrorist threats. A prevailing threat is the covert placement of bombs inside crowded public facilities. Although video-surveillance systems are increasingly common, current systems cannot detect the placement of bombs. It is also unlikely that security personnel could detect a bomb or its placement by observing video from surveillance cameras. The problems lie in the large number of cameras required to monitor large areas, the limited number of security personnel employed to protect these areas, and the intense diligence required to effectively screen live video from even a single camera. Different from existing video-detection systems designed to operate in nearly static environments, we are developing technology to detect changes in the background of dynamic environments: environments where motion and human activities are persistent over long periods. Our goal is to quickly detect background changes, even if the background is visible to the camera less than 5 percent of the time and possibly never free from foreground activity. Our approach employs statistical scene models based on mixture densities. We hypothesized that the background component of the mixture has a small variance compared to foreground components. Experiments demonstrate this hypothesis is true under a wide variety of operating conditions. A major focus involved the development of robust background estimation techniques that exploit this property. We desire estimation algorithms that can rapidly produce accurate background estimates and detection algorithms that can reliably detect background changes with minimal nuisance alarms. Another goal is to recognize unusual activities or foreground conditions that could signal an attack (e.g., large numbers of running people, people falling to the floor, etc.). Detection of background changes and/or unusual

  7. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  8. Modeling and Security Threat Assessments of Data Processed in Cloud Based Information Systems

    Directory of Open Access Journals (Sweden)

    Darya Sergeevna Simonenkova

    2016-03-01

    Full Text Available The subject of the research is modeling and security threat assessments of data processed in cloud based information systems (CBIS. This method allow to determine the current security threats of CBIS, state of the system in which vulnerabilities exists, level of possible violators, security properties and to generate recommendations for neutralizing security threats of CBIS.

  9. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  10. The Practice of Campus-Based Threat Assessment: An Overview

    Science.gov (United States)

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  11. A general enhancement of autonomic and cortisol responses during social evaluative threat

    NARCIS (Netherlands)

    van den Bosch, J.A.; de Geus, E.J.C.; Carroll, D.; Goedhart, A.D.; Anane, L.A.; van Zanten, J.J.; Helmerhorst, E.J.; Edwards, K.M.

    2009-01-01

    Objective: To examine the Social Self Preservation Theory, which predicts that stressors involving social evaluative threat (SET) characteristically activate the hypothalamic-pituitary-adrenal (HPA) axis. The idea that distinct psychosocial factors may underlie specific patterns of neuroendocrine

  12. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  13. Security Measurement for Unknown Threats Based on Attack Preferences

    Directory of Open Access Journals (Sweden)

    Lihua Yin

    2018-01-01

    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  14. Autonomic Nervous System Responses to Hearing-Related Demand and Evaluative Threat.

    Science.gov (United States)

    Mackersie, Carol L; Kearney, Lucia

    2017-10-12

    This paper consists of 2 parts. The purpose of Part 1 was to review the potential influence of internal (person-related) factors on listening effort. The purpose of Part 2 was to present, in support of Part 1, preliminary data illustrating the interactive effects of an external factor (task demand) and an internal factor (evaluative threat) on autonomic nervous system measures. For Part 1, we provided a brief narrative review of motivation and stress as modulators of listening effort. For Part 2, we described preliminary data from a study using a repeated-measures (2 × 2) design involving manipulations of task demand (high, low) and evaluative threat (high, low). The low-demand task consisted of repetition of sentences from a narrative. The high-demand task consisted of answering questions about the narrative, requiring both comprehension and recall. During the high evaluative threat condition, participants were filmed and told that their video recordings would be evaluated by a panel of experts. During the low evaluative threat condition, no filming occurred; participants were instructed to "do your best." Skin conductance (sympathetic nervous system activity) and heart rate variability (HRV, parasympathetic activity) were measured during the listening tasks. The HRV measure was the root mean square of successive differences of adjacent interbeat intervals. Twelve adults with hearing loss participated. Skin conductance increased and HRV decreased relative to baseline (no task) for all listening conditions. Skin conductance increased significantly with an increase in evaluative threat, but only for the more demanding task. There was no significant change in HRV in response to increasing evaluative threat or task demand. Listening effort may be influenced by factors other than task difficulty, as reviewed in Part 1. This idea is supported by the preliminary data indicating that the sympathetic nervous system response to task demand is modulated by social evaluative

  15. Evaluating Threats in Multinational Marine Ecosystems: A Coast Salish First Nations and Tribal Perspective.

    Directory of Open Access Journals (Sweden)

    Joseph K Gaydos

    Full Text Available Despite the merit of managing natural resources on the scale of ecosystems, evaluating threats and managing risk in ecosystems that span multiple countries or jurisdictions can be challenging. This requires each government involved to consider actions in concert with actions being taken in other countries by co-managing entities. Multiple proposed fossil fuel-related and port development projects in the Salish Sea, a 16,925 km2 inland sea shared by Washington State (USA, British Columbia (Canada, and Indigenous Coast Salish governments, have the potential to increase marine vessel traffic and negatively impact natural resources. There is no legal mandate or management mechanism requiring a comprehensive review of the potential cumulative impacts of these development activities throughout the Salish Sea and across the international border. This project identifies ongoing and proposed energy-related development projects that will increase marine vessel traffic in the Salish Sea and evaluates the threats each project poses to natural resources important to the Coast Salish. While recognizing that Coast Salish traditions identify all species as important and connected, we used expert elicitation to identify 50 species upon which we could evaluate impact. These species were chosen because Coast Salish depend upon them heavily for harvest revenue or as a staple food source, they were particularly culturally or spiritually significant, or they were historically part of Coast Salish lifeways. We identified six development projects, each of which had three potential impacts (pressures associated with increased marine vessel traffic: oil spill, vessel noise and vessel strike. Projects varied in their potential for localized impacts (pressures including shoreline development, harbor oil spill, pipeline spill, coal dust accumulation and nearshore LNG explosion. Based on available published data, impact for each pressure/species interaction was rated as

  16. Reactivity to unpredictable threat as a treatment target for fear-based anxiety disorders.

    Science.gov (United States)

    Gorka, S M; Lieberman, L; Klumpp, H; Kinney, K L; Kennedy, A E; Ajilore, O; Francis, J; Duffecy, J; Craske, M G; Nathan, J; Langenecker, S; Shankman, S A; Phan, K L

    2017-10-01

    Heightened reactivity to unpredictable threat (U-threat) is a core individual difference factor underlying fear-based psychopathology. Little is known, however, about whether reactivity to U-threat is a stable marker of fear-based psychopathology or if it is malleable to treatment. The aim of the current study was to address this question by examining differences in reactivity to U-threat within patients before and after 12-weeks of selective serotonin reuptake inhibitors (SSRIs) or cognitive-behavioral therapy (CBT). Participants included patients with principal fear (n = 22) and distress/misery disorders (n = 29), and a group of healthy controls (n = 21) assessed 12-weeks apart. A well-validated threat-of-shock task was used to probe reactivity to predictable (P-) and U-threat and startle eyeblink magnitude was recorded as an index of defensive responding. Across both assessments, individuals with fear-based disorders displayed greater startle magnitude to U-threat relative to healthy controls and distress/misery patients (who did not differ). From pre- to post-treatment, startle magnitude during U-threat decreased only within the fear patients who received CBT. Moreover, within fear patients, the magnitude of decline in startle to U-threat correlated with the magnitude of decline in fear symptoms. For the healthy controls, startle to U-threat across the two time points was highly reliable and stable. Together, these results indicate that startle to U-threat characterizes fear disorder patients and is malleable to treatment with CBT but not SSRIs within fear patients. Startle to U-threat may therefore reflect an objective, psychophysiological indicator of fear disorder status and CBT treatment response.

  17. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    Vine, Edward

    1997-01-01

    Utilities have become concerned that their competitors will desire access to energy-related data--including energy-efficiency data collected by utilities from their energy- efficiency programs--that they may regard as proprietary or confidential. In the future, disputes about confidentiality may focus more on costs and market information (as well as energy use and load data) than on energy-efficiency data per se. So far, the discussion has been limited to ratepayer-funded data. Consequently, many utilities are now requesting that the data (including evaluation data) they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to harm the evaluation community that depends on the free flow of information for improving the practice of evaluation as well as for disseminating the lessons learned from particular program evaluations. Confidentiality will also have significant policy implications. In response to these concerns, in late 1995 and early 1996, we conducted a survey of state public utility commissions (PUCs) in the U.S. to assess: (1) the relative importance of the issue of confidential data in the regulatory arena; (2) the regulatory response to utility requests for confidentiality (e.g., formal policies, guidelines, rules and procedures, and decisions); and (3) the type of data filed as confidential with PUCS. We focus on the first two objectives of this study. In addition to our interviews, we reviewed selected state statutes, judicial and PUC decisions, rules and procedures, protective orders, and interim policy documents. Evaluators need to understand the context of confidentiality as well as the response of the regulatory commissions to confidentiality, because evaluators will need to adapt to a new environment where energy-related data and information may be harder to obtain and distribute. We propose that regulators conduct the following activities as soon as possible: 1. Assess

  18. Preliminary Evaluation of Moniliformin as a Potential Threat for Teleosts

    Directory of Open Access Journals (Sweden)

    Rui Goncalves

    2018-01-01

    Full Text Available Aquaculture feed manufacturers and producers increasingly recognize the importance of mycotoxins, which contaminate plant-based meals used in compound aquafeeds, and their potential to negatively impact production. Though data on the worldwide occurrence of legislated mycotoxins e.g., trichothecenes and zearalenone (ZEN are well documented, relatively little information is available regarding other mycotoxins also produced by Fusarium, notably moniliformin (MON. Given that MON is known to affect the survival, growth, skeletal formation and bone mineralization in terrestrial species, its widespread occurrence on maize and maize by-products typically used in aquaculture makes it relevant to study these parameters in teleost fish. In the present work we have tested the effect of MON exposure on survival, bone development and mineralization using zebrafish (Danio rerio as a model species and fish derived osteo-chondroprogenitor cell line for in vitro studies. Moniliformin exposure did not decrease bone mineralization in zebrafish larvae or extracellular matrix mineralization in the mineralogenic cell line VSa13. Here, the minimal in vitro cytotoxicity concentration was found to be 1000 µg L−1 MON. Incidence of deformities was also not altered by MON at the concentration tested (450 µg L−1 although larval growth was affected, as shown by a decrease in the standard length of exposed specimens at 20 days post fertilization. Survival decreased significantly in larvae exposed to MON concentrations higher than 900 μg L−1. Influence of MON on survival and growth might be relevant for aquaculture industry. As MON is a water-soluble mycotoxin, its leaching from feed is highly probable, so MON assimilation into the surrounding aqueous environment should also be considered. Tested levels in fish larvae are within the reported occurrence levels of MON in commercial feed and plant meals.

  19. Study on a Threat-Countermeasure Model Based on International Standard Information

    Directory of Open Access Journals (Sweden)

    Guillermo Horacio Ramirez Caceres

    2008-12-01

    Full Text Available Many international standards exist in the field of IT security. This research is based on the ISO/IEC 15408, 15446, 19791, 13335 and 17799 standards. In this paper, we propose a knowledge base comprising a threat countermeasure model based on international standards for identifying and specifying threats which affect IT environments. In addition, the proposed knowledge base system aims at fusing similar security control policies and objectives in order to create effective security guidelines for specific IT environments. As a result, a knowledge base of security objectives was developed on the basis of the relationships inside the standards as well as the relationships between different standards. In addition, a web application was developed which displays details about the most common threats to information systems, and for each threat presents a set of related security control policies from different international standards, including ISO/IEC 27002.

  20. Identifying Threats Using Graph-based Anomaly Detection

    Science.gov (United States)

    Eberle, William; Holder, Lawrence; Cook, Diane

    Much of the data collected during the monitoring of cyber and other infrastructures is structural in nature, consisting of various types of entities and relationships between them. The detection of threatening anomalies in such data is crucial to protecting these infrastructures. We present an approach to detecting anomalies in a graph-based representation of such data that explicitly represents these entities and relationships. The approach consists of first finding normative patterns in the data using graph-based data mining and then searching for small, unexpected deviations to these normative patterns, assuming illicit behavior tries to mimic legitimate, normative behavior. The approach is evaluated using several synthetic and real-world datasets. Results show that the approach has high truepositive rates, low false-positive rates, and is capable of detecting complex structural anomalies in real-world domains including email communications, cellphone calls and network traffic.

  1. Evaluating and ranking threats to the long-term persistence of polar bears

    Science.gov (United States)

    Atwood, Todd C.; Marcot, Bruce G.; Douglas, David C.; Amstrup, Steven C.; Rode, Karyn D.; Durner, George M.; Bromaghin, Jeffrey F.

    2015-01-01

    The polar bear (Ursus maritimus) was listed as a globally threatened species under the U.S. Endangered Species Act (ESA) in 2008, mostly due to the significant threat to their future population viability from rapidly declining Arctic sea ice. A core mandate of the ESA is the development of a recovery plan that identifies steps to maintain viable populations of a listed species. A substantive evaluation of the relative influence of putative threats to population persistence is helpful to recovery planning. Because management actions must often be taken in the face of substantial information gaps, a formalized evaluation hypothesizing potential stressors and their relationships with population persistence can improve identification of relevant conservation actions. To this end, we updated a Bayesian network model previously used to forecast the future status of polar bears worldwide. We used new information on actual and predicted sea ice loss and polar bear responses to evaluate the relative influence of plausible threats and their mitigation through management actions on the persistence of polar bears in four ecoregions. We found that polar bear outcomes worsened over time through the end of the century under both stabilized and unabated greenhouse gas (GHG) emission pathways. Under the unabated pathway (i.e., RCP 8.5), the time it took for polar bear populations in two of four ecoregions to reach a dominant probability of greatly decreased was hastened by about 25 years. Under the stabilized GHG emission pathway (i.e., RCP 4.5), where GHG emissions peak around the year 2040, the polar bear population in the Archipelago Ecoregion of High Arctic Canada never reached a dominant probability of greatly decreased, reinforcing earlier suggestions of this ecoregion’s potential to serve as a long-term refugium. The most influential drivers of adverse polar bear outcomes were declines to overall sea ice conditions and to the marine prey base. Improved sea ice conditions

  2. Social evaluative threat with verbal performance feedback alters neuroendocrine response to stress.

    Science.gov (United States)

    Phan, Jenny M; Schneider, Ekaterina; Peres, Jeremy; Miocevic, Olga; Meyer, Vanessa; Shirtcliff, Elizabeth A

    2017-11-01

    Laboratory stress tasks such as the Trier Social Stress Test (TSST) have provided a key piece to the puzzle for how psychosocial stress impacts the hypothalamic-pituitary-adrenal axis, other stress-responsive biomarkers, and ultimately wellbeing. These tasks are thought to work through biopsychosocial processes, specifically social evaluative threat and the uncontrollability heighten situational demands. The present study integrated an experimental modification to the design of the TSST to probe whether additional social evaluative threat, via negative verbal feedback about speech performance, can further alter stress reactivity in 63 men and women. This TSST study confirmed previous findings related to stress reactivity and stress recovery but extended this literature in several ways. First, we showed that additional social evaluative threat components, mid-task following the speech portion of the TSST, were still capable of enhancing the psychosocial stressor. Second, we considered stress-reactive hormones beyond cortisol to include dehydroepiandrosterone (DHEA) and testosterone, and found these hormones were also stress-responsive, and their release was coupled with one another. Third, we explored whether gain- and loss-framing incentive instructions, meant to influence performance motivation by enhancing the personal relevance of task performance, impacted hormonal reactivity. Results showed that each hormone was stress reactive and further had different responses to the modified TSST compared to the original TSST. Beyond the utility of showing how the TSST can be modified with heightened social evaluative threat and incentive-framing instructions, this study informs about how these three stress-responsive hormones have differential responses to the demands of a challenge and a stressor. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Evaluating Strategies for Achieving Global Collective Action on Transnational Health Threats and Social Inequalities

    OpenAIRE

    Hoffman, Steven Justin

    2015-01-01

    This dissertation presents three studies that evaluate different strategies for addressing transnational health threats and social inequalities that depend upon or would benefit from global collective action. Each draws upon different academic disciplines, methods and epistemological traditions. Chapter 1 assesses the role of international law in addressing global health challenges, specifically examining when, how and why global health treaties may be helpful. Evidence from 90 quantitati...

  4. Descriptive Analysis and Strategic Options to Defeat Commodity-Based Threat Financing Methodologies Related to Gold

    Science.gov (United States)

    2015-09-01

    auditing firms. 14. SUBJECT TERMS Counter threat finance, commodity-based money laundering , terrorist financing, social network analysis, bright...51 2. Asia/Pacific Group on Money Laundering ................................52 3. Caribbean Financial Action Task Force...53 4. Eurasian Group on Combating Money Laundering and Financing of Terrorism

  5. The dark side of the sublime: Distinguishing a threat-based variant of awe.

    Science.gov (United States)

    Gordon, Amie M; Stellar, Jennifer E; Anderson, Craig L; McNeil, Galen D; Loew, Daniel; Keltner, Dacher

    2017-08-01

    Theoretical conceptualizations of awe suggest this emotion can be more positive or negative depending on specific appraisal processes. However, the emergent scientific study of awe rarely emphasizes its negative side, classifying it instead as a positive emotion. In the present research we tested whether there is a more negative variant of awe that arises in response to vast, complex stimuli that are threatening (e.g., tornadoes, terrorist attack, wrathful god). We discovered people do experience this type of awe with regularity (Studies 1 & 4) and that it differs from other variants of awe in terms of its underlying appraisals, subjective experience, physiological correlates, and consequences for well-being. Specifically, threat-based awe experiences were appraised as lower in self-control and certainty and higher in situational control than other awe experiences, and were characterized by greater feelings of fear (Studies 2a & 2b). Threat-based awe was associated with physiological indicators of increased sympathetic autonomic arousal, whereas positive awe was associated with indicators of increased parasympathetic arousal (Study 3). Positive awe experiences in daily life (Study 4) and in the lab (Study 5) led to greater momentary well-being (compared with no awe experience), whereas threat-based awe experiences did not. This effect was partially mediated by increased feelings of powerlessness during threat-based awe experiences. Together, these findings highlight a darker side of awe. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. Responsibility/Threat Overestimation Moderates the Relationship Between Contamination-Based Disgust and Obsessive-Compulsive Concerns About Sexual Orientation.

    Science.gov (United States)

    Ching, Terence H W; Williams, Monnica T; Siev, Jedidiah; Olatunji, Bunmi O

    2018-05-01

    Disgust has been shown to perform a "disease-avoidance" function in contamination fears. However, no studies have examined the relevance of disgust to obsessive-compulsive (OC) concerns about sexual orientation (e.g., fear of one's sexual orientation transforming against one's will, and compulsive avoidance of same-sex and/or gay or lesbian individuals to prevent that from happening). Therefore, we investigated whether the specific domain of contamination-based disgust (i.e., evoked by the perceived threat of transmission of essences between individuals) predicted OC concerns about sexual orientation, and whether this effect was moderated/amplified by obsessive beliefs, in evaluation of a "sexual orientation transformation-avoidance" function. We recruited 283 self-identified heterosexual college students (152 females, 131 males; mean age = 20.88 years, SD = 3.19) who completed three measures assessing disgust, obsessive beliefs, and OC concerns about sexual orientation. Results showed that contamination-based disgust (β = .17), responsibility/threat overestimation beliefs (β = .15), and their interaction (β = .17) each uniquely predicted OC concerns about sexual orientation, ts = 2.22, 2.50, and 2.90, ps contamination-based disgust accompanied by strong responsibility/threat overestimation beliefs predicted more severe OC concerns about sexual orientation, β = .48, t = 3.24, p contamination-based disgust, and exacerbated by responsibility/threat overestimation beliefs. Treatment for OC concerns about sexual orientation should target such beliefs.

  7. Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Brown, Christopher R.; Ferryman, Thomas A.

    2013-10-01

    In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they can be assessed. A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. A complementary Personality Factor modeling approach was developed based on analysis to derive relevant personality characteristics from word use. Several implementations of the psychosocial model were evaluated by comparing their agreement with judgments of human resources and management professionals; the personality factor modeling approach was examined using email samples. If implemented in an operational setting, these models should be part of a set of management tools for employee assessment to identify employees who pose a greater insider threat.

  8. Distinguishing stereotype threat from priming effects : On the role of the social self and threat-based concerns (Retracted article. See vol. 104, pg. 196, 2013)

    NARCIS (Netherlands)

    Marx, David M.; Stapel, Diederik A.

    It has been argued that priming negative stereotypic traits is sufficient to cause stereotype threat. The present research challenges this assumption by highlighting the role of the social self and targets' concerns about confirming a negative group-based stereotype. Specifically, in 3 experiments

  9. Physiological and emotional responses to subjective social evaluative threat in daily life.

    Science.gov (United States)

    Lehman, Barbara J; Cane, Arianna C; Tallon, Shannon J; Smith, Stephanie F

    2015-01-01

    This study examined concurrent and delayed emotional and cardiovascular correlates of naturally occurring experiences with subjective social evaluative threat (SSET) and tested whether individual differences in social interaction anxiety moderated those associations. Sixty-eight participants wore ambulatory blood pressure monitors for three days. Following each blood pressure reading, participants reported on SSET and negative emotions, yielding 1770 momentary measures. Multilevel modeling suggested that reports of greater SSET uniquely predicted elevations in anxiety and embarrassment, with elevations in anxiety, embarrassment, and shame extending to the hour following SSET. Reports of concurrent and previous-hour SSET also predicted cardiovascular elevations. Linkages between SSET and anxiety and shame, but not cardiovascular measures, were moderated by social interaction anxiety. Those higher in social interaction anxiety showed especially strong associations between SSET and both concurrent and delayed anxiety and greater delayed shame. This research suggests an important role for anxiety, embarrassment, and shame as emotional consequences of naturally occurring evaluative threat, especially for those who are more socially anxious. Further, this work replicates other naturalistic studies that have documented increased blood pressure at times of SSET and extends that work by documenting cardiovascular responses into the following hour.

  10. Community structure analysis of rejection sensitive personality profiles: A common neural response to social evaluative threat?

    Science.gov (United States)

    Kortink, Elise D; Weeda, Wouter D; Crowley, Michael J; Gunther Moor, Bregtje; van der Molen, Melle J W

    2018-06-01

    Monitoring social threat is essential for maintaining healthy social relationships, and recent studies suggest a neural alarm system that governs our response to social rejection. Frontal-midline theta (4-8 Hz) oscillatory power might act as a neural correlate of this system by being sensitive to unexpected social rejection. Here, we examined whether frontal-midline theta is modulated by individual differences in personality constructs sensitive to social disconnection. In addition, we examined the sensitivity of feedback-related brain potentials (i.e., the feedback-related negativity and P3) to social feedback. Sixty-five undergraduate female participants (mean age = 19.69 years) participated in the Social Judgment Paradigm, a fictitious peer-evaluation task in which participants provided expectancies about being liked/disliked by peer strangers. Thereafter, they received feedback signaling social acceptance/rejection. A community structure analysis was employed to delineate personality profiles in our data. Results provided evidence of two subgroups: one group scored high on attachment-related anxiety and fear of negative evaluation, whereas the other group scored high on attachment-related avoidance and low on fear of negative evaluation. In both groups, unexpected rejection feedback yielded a significant increase in theta power. The feedback-related negativity was sensitive to unexpected feedback, regardless of valence, and was largest for unexpected rejection feedback. The feedback-related P3 was significantly enhanced in response to expected social acceptance feedback. Together, these findings confirm the sensitivity of frontal midline theta oscillations to the processing of social threat, and suggest that this alleged neural alarm system behaves similarly in individuals that differ in personality constructs relevant to social evaluation.

  11. Avoidance temperament and social-evaluative threat in college students' math performance: a mediation model of math and test anxiety.

    Science.gov (United States)

    Liew, Jeffrey; Lench, Heather C; Kao, Grace; Yeh, Yu-Chen; Kwok, Oi-man

    2014-01-01

    Standardized testing has become a common form of student evaluation with high stakes, and limited research exists on understanding the roles of students' personality traits and social-evaluative threat on their academic performance. This study examined the roles of avoidance temperament (i.e., fear and behavioral inhibition) and evaluative threat (i.e., fear of failure and being viewed as unintelligent) in standardized math test and course grades in college students. Undergraduate students (N=184) from a large public university were assessed on temperamental fear and behavioral inhibition. They were then given 15 minutes to complete a standardized math test. After the test, students provided data on evaluative threat and their math performance (scores on standardized college entrance exam and average grades in college math courses). Results indicate that avoidance temperament was linked to social-evaluative threat and low standardized math test scores. Furthermore, evaluative threat mediated the influence of avoidance temperament on both types of math performance. Results have educational and clinical implications, particularly for students at risk for test anxiety and underperformance. Interventions targeting emotion regulation and stress management skills may help individuals reduce their math and test anxieties.

  12. A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

    OpenAIRE

    Li Qiang; Yang Ze-Ming; Liu Bao-Xu; Jiang Zheng-Wei

    2016-01-01

    With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain a...

  13. On the early detection of threats in the real world based on open-source information on the internet

    NARCIS (Netherlands)

    Bouma, H.; Rajadell Rojas, O.; Worm, D.T.H.; Versloot, C.A.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activities of persons on the internet. Internet surveillance aims to detect threats in an early stage and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time

  14. Law enforcers recognition level emerging threats based on physical appearance and behavior signs the enemy

    Directory of Open Access Journals (Sweden)

    R.M. Radzievskiy

    2015-02-01

    Full Text Available Purpose: examine the effectiveness of the training method of differential approach to the choice of means of influence on the action of law enforcers opponent with different levels of aggressiveness. Material : the experiment involved 15 students of the Kyiv National Academy of Internal Affairs and the 15 employees of the State Guard of Ukraine. Results : presented curriculum for special physical and tactical training. The program details the conceptual apparatus of THREATS and DANGERS manifestations of different levels of aggressiveness opponent (case analysis of its motor behavior. The study participants underwent 7 day course focused training. The basis of the course is an advanced theoretical base. The base is aimed at developing knowledge and skills of employees in determining the level of danger. Including threats from testing and modeling episodes of extreme situations the options cadets. Conclusions : In the simulated collision situations with aggressive opponent to the students significantly improved the adequacy of the response to the threat of execution time and within the legal grounds. Recognition was determined by the level of aggressiveness manifest manners enemy, his emotions, motivation, motor behavior, positional arrangement for 2 - 3 seconds. The program contributed to the development of qualities: attention, orientation, perception, motor lead.

  15. A Study on OS Selection Using ANP Based Choquet Integral in Terms of Cyber Threats

    OpenAIRE

    Goztepe, Kerim

    2016-01-01

    Critical systems are today exposed to new kinds of security threats. Cyber security is determine with cyberspace safe from threats, it is called cyber-threats. Cyber-threats is applied the malicious use of information and communication technologies or the behaviour of attackers. Because of the importance of cyber threats, operating system (OS) selection is a critical decision that can significantly affect future competitiveness and performance of an organization. It is increasingly valuable i...

  16. Development, Evaluation, and Future Directions of the Virginia Student Threat Assessment Guidelines

    Science.gov (United States)

    Cornell, Dewey; Allen, Korrie

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed in response to studies of school shootings conducted by the U.S. Federal Bureau of Investigation, U.S. Secret Service, and U.S. Department of Education that recommended schools should adopt a threat assessment approach to prevent targeted violence. This article reviews the…

  17. Use of Vertically Integrated Ice in WRF-Based Forecasts of Lightning Threat

    Science.gov (United States)

    McCaul, E. W., jr.; Goodman, S. J.

    2008-01-01

    Previously reported methods of forecasting lightning threat using fields of graupel flux from WRF simulations are extended to include the simulated field of vertically integrated ice within storms. Although the ice integral shows less temporal variability than graupel flux, it provides more areal coverage, and can thus be used to create a lightning forecast that better matches the areal coverage of the lightning threat found in observations of flash extent density. A blended lightning forecast threat can be constructed that retains much of the desirable temporal sensitivity of the graupel flux method, while also incorporating the coverage benefits of the ice integral method. The graupel flux and ice integral fields contributing to the blended forecast are calibrated against observed lightning flash origin density data, based on Lightning Mapping Array observations from a series of case studies chosen to cover a wide range of flash rate conditions. Linear curve fits that pass through the origin are found to be statistically robust for the calibration procedures.

  18. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    Science.gov (United States)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  19. Instantaneous threat detection based on a semantic representation of activities, zones and trajectories

    NARCIS (Netherlands)

    Burghouts, G.J; Schutte, K; Hove, R.J.M. ten; Broek, S.P. van den; Baan, J.; Rajadell, O.; Huis, J.R. van; Rest, J.H.C. van; Hanckmann, P.; Bouma, H.; Sanroma, G.; Evans, M.; Ferryman, J.

    2014-01-01

    Threat detection is a challenging problem, because threats appear in many variations and differences to normal behaviour can be very subtle. In this paper, we consider threats on a parking lot, where theft of a truck’s cargo occurs. The theft takes place in very different forms, in the midst of many

  20. Defense against Insider Threat: a Framework for Gathering Goal-based Requirements

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Eck, Pascal; Pernici, B; Gulla, J.A.

    2007-01-01

    Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. Despite their importance, insider threats are still not

  1. Subjective Performance Evaluations, Self-esteem, and Ego-threats in Principal-agent Relations

    DEFF Research Database (Denmark)

    Sebald, Alexander Christopher; Walzl, Markus

    find that agents sanction whenever the feedback of principals is below their subjective self-evaluations even if the agents' payoff is independent of the principals' feedback. Based on our experimental analysis we propose a principal-agent model with subjective performance evaluations that accommodates...

  2. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    Science.gov (United States)

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  3. Data and software tools for gamma radiation spectral threat detection and nuclide identification algorithm development and evaluation

    International Nuclear Information System (INIS)

    Portnoy, David; Fisher, Brian; Phifer, Daniel

    2015-01-01

    The detection of radiological and nuclear threats is extremely important to national security. The federal government is spending significant resources developing new detection systems and attempting to increase the performance of existing ones. The detection of illicit radionuclides that may pose a radiological or nuclear threat is a challenging problem complicated by benign radiation sources (e.g., cat litter and medical treatments), shielding, and large variations in background radiation. Although there is a growing acceptance within the community that concentrating efforts on algorithm development (independent of the specifics of fully assembled systems) has the potential for significant overall system performance gains, there are two major hindrances to advancements in gamma spectral analysis algorithms under the current paradigm: access to data and common performance metrics along with baseline performance measures. Because many of the signatures collected during performance measurement campaigns are classified, dissemination to algorithm developers is extremely limited. This leaves developers no choice but to collect their own data if they are lucky enough to have access to material and sensors. This is often combined with their own definition of metrics for measuring performance. These two conditions make it all but impossible for developers and external reviewers to make meaningful comparisons between algorithms. Without meaningful comparisons, performance advancements become very hard to achieve and (more importantly) recognize. The objective of this work is to overcome these obstacles by developing and freely distributing real and synthetically generated gamma-spectra data sets as well as software tools for performance evaluation with associated performance baselines to national labs, academic institutions, government agencies, and industry. At present, datasets for two tracks, or application domains, have been developed: one that includes temporal

  4. Data and software tools for gamma radiation spectral threat detection and nuclide identification algorithm development and evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Portnoy, David; Fisher, Brian; Phifer, Daniel

    2015-06-01

    The detection of radiological and nuclear threats is extremely important to national security. The federal government is spending significant resources developing new detection systems and attempting to increase the performance of existing ones. The detection of illicit radionuclides that may pose a radiological or nuclear threat is a challenging problem complicated by benign radiation sources (e.g., cat litter and medical treatments), shielding, and large variations in background radiation. Although there is a growing acceptance within the community that concentrating efforts on algorithm development (independent of the specifics of fully assembled systems) has the potential for significant overall system performance gains, there are two major hindrances to advancements in gamma spectral analysis algorithms under the current paradigm: access to data and common performance metrics along with baseline performance measures. Because many of the signatures collected during performance measurement campaigns are classified, dissemination to algorithm developers is extremely limited. This leaves developers no choice but to collect their own data if they are lucky enough to have access to material and sensors. This is often combined with their own definition of metrics for measuring performance. These two conditions make it all but impossible for developers and external reviewers to make meaningful comparisons between algorithms. Without meaningful comparisons, performance advancements become very hard to achieve and (more importantly) recognize. The objective of this work is to overcome these obstacles by developing and freely distributing real and synthetically generated gamma-spectra data sets as well as software tools for performance evaluation with associated performance baselines to national labs, academic institutions, government agencies, and industry. At present, datasets for two tracks, or application domains, have been developed: one that includes temporal

  5. Forests on the edge: evaluating contributions of and threats to America's private forest lands

    Science.gov (United States)

    Mark Hatfield; Ronald E. McRoberts; Dacia M. Meneguzzo; Mike Dechter; < i> et al< /i>

    2007-01-01

    The Forests on the Edge project, sponsored by the U.S. Department of Agriculture Forest Service, uses geographic information systems to construct and analyze maps depicting ecological, social, and economic contributions of America's private forest lands and threats to those contributions. Watersheds across the conterminous United States are ranked relative to the...

  6. User's manual of a computer code for seismic hazard evaluation for assessing the threat to a facility by fault model. SHEAT-FM

    International Nuclear Information System (INIS)

    Sugino, Hideharu; Onizawa, Kunio; Suzuki, Masahide

    2005-09-01

    To establish the reliability evaluation method for aged structural component, we developed a probabilistic seismic hazard evaluation code SHEAT-FM (Seismic Hazard Evaluation for Assessing the Threat to a facility site - Fault Model) using a seismic motion prediction method based on fault model. In order to improve the seismic hazard evaluation, this code takes the latest knowledge in the field of earthquake engineering into account. For example, the code involves a group delay time of observed records and an update process model of active fault. This report describes the user's guide of SHEAT-FM, including the outline of the seismic hazard evaluation, specification of input data, sample problem for a model site, system information and execution method. (author)

  7. Defense against Insider Threat: a Framework for Gathering Goal-based Requirements

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Eck, Pascal

    2006-01-01

    Insider threat is becoming comparable to outsider threat in frequency of security events. This is a very worrying situation, as insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. As a result, organizations can suffer financial losses

  8. Effects of social comparison direction, threat, and self-esteem on affect, self-evaluation, and expected success.

    Science.gov (United States)

    Aspinwall, L G; Taylor, S E

    1993-05-01

    Two studies explored the conditions under which social comparisons are used to manage negative affect and naturalistic threats. Study 1 examined induced mood and dispositional self-esteem as determinants of affective responses to upward and downward comparisons. Consistent with a mood repair prediction, only low-self-esteem Ss in whom a negative mood had been induced reported improved mood after exposure to downward comparison information. Study 2 examined the impact of naturalistic threats on responses to comparison information. Relative to a no-comparison baseline, low-self-esteem Ss who had experienced a recent academic setback reported more favorable self-evaluations and greater expectations of future success in college after exposure to downward comparison information. These results remained significant after controlling statistically for general distress. Implications for downward comparison theory are discussed.

  9. The Ego-Defensive Role of Legitimacy: How Threat-Based Justifications Protect the Self-Esteem of Discriminators.

    Science.gov (United States)

    Pereira, Cicero Roberto; Álvaro, José Luis; Vala, Jorge

    2018-05-01

    This article analyzes the ego-defensive role played by legitimation, by examining the hypothesis that threat-based justifications attenuate the negative effect on an individual's self-esteem caused by his or her becoming aware of his or her own discriminatory behavior. Across three studies (including a pilot experiment), participants who were led to believe that they had acted in a discriminatory way experienced a decrease in their self-esteem. In Study 1 ( N = 116), this effect was nullified when discrimination was justified by either symbolic or realistic threat perceptions. Study 2 ( N = 250) replicated this pattern of results and went further by showing that discrimination affects self-esteem only in more egalitarian individuals, whereas for those less egalitarian, it affects their social image. According to the ego-defensive role of legitimation, a meta-analytical integration of the results confirmed that the influence of discrimination in depressing self-esteem is moderated by threat-based justifications.

  10. Invited Article: Threats to physician autonomy in a performance-based reimbursement system.

    Science.gov (United States)

    Larriviere, Daniel G; Bernat, James L

    2008-06-10

    Physician autonomy is currently threatened by the external application of pay for performance standards and required conformity to practice guidelines. This phenomenon is being driven by concerns over the economic viability of increasing per capita health care expenditures without a concomitant rise in favorable health outcomes and by the unjustified marked variations among physicians' practice patterns. Proponents contend that altering the reimbursement system to encourage physicians to make choices based upon the best available evidence would be one way to ensure better outcomes per health care dollar spent. Although physician autonomy is most easily justified when decisions are made by appealing to the best available evidence, incentivizing decision-making risks sacrificing physician autonomy to political and social forces if the limitations of evidence-based medicine are not respected. Any reimbursement system designed to encourage physicians to utilize the best available evidence by providing financial incentives must recognize physicians who try to play to the numbers as well as physicians who refuse to follow the best available evidence if doing so would conflict with good medicine or patient preferences. By designing, promulgating, and updating evidence-based clinical practice guidelines, medical specialty societies can limit threats to physician autonomy while improving medical practice.

  11. Coping with Self-Threat and the Evaluation of Self-Related Traits: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Andreas Hoefler

    Full Text Available A positive view of oneself is important for a healthy lifestyle. Self-protection mechanisms such as suppressing negative self-related information help us to maintain a positive view of ourselves. This is of special relevance when, for instance, a negative test result threatens our positive self-view. To date, it is not clear which brain areas support self-protective mechanisms under self-threat. In the present functional magnetic resonance imaging (fMRI study the participants (N = 46 received a (negative vs. positive performance test feedback before entering the scanner. In the scanner, the participants were instructed to ascribe personality traits either to themselves or to a famous other. Our results showed that participants responded slower to negative self-related traits compared to positive self-related traits. High self-esteem individuals responded slower to negative traits compared to low self-esteem individuals following a self-threat. This indicates that high self-esteem individuals engage more in self-enhancing strategies after a threat by inhibiting negative self-related information more successfully than low self-esteem individuals. This behavioral pattern was mirrored in the fMRI data as dACC correlated positively with trait self-esteem. Generally, ACC activation was attenuated under threat when participants evaluated self-relevant traits and even more for negative self-related traits. We also found that activation in the ACC was negatively correlated with response times, indicating that greater activation of the ACC is linked to better access (faster response to positive self-related traits and to impaired access (slower response to negative self-related traits. These results confirm the ACC function as important in managing threatened self-worth but indicate differences in trait self-esteem levels. The fMRI analyses also revealed a decrease in activation within the left Hippocampus and the right thalamus under threat. This

  12. Coping with Self-Threat and the Evaluation of Self-Related Traits: An fMRI Study

    Science.gov (United States)

    Corcoran, Katja; Ebner, Franz

    2015-01-01

    A positive view of oneself is important for a healthy lifestyle. Self-protection mechanisms such as suppressing negative self-related information help us to maintain a positive view of ourselves. This is of special relevance when, for instance, a negative test result threatens our positive self-view. To date, it is not clear which brain areas support self-protective mechanisms under self-threat. In the present functional magnetic resonance imaging (fMRI) study the participants (N = 46) received a (negative vs. positive) performance test feedback before entering the scanner. In the scanner, the participants were instructed to ascribe personality traits either to themselves or to a famous other. Our results showed that participants responded slower to negative self-related traits compared to positive self-related traits. High self-esteem individuals responded slower to negative traits compared to low self-esteem individuals following a self-threat. This indicates that high self-esteem individuals engage more in self-enhancing strategies after a threat by inhibiting negative self-related information more successfully than low self-esteem individuals. This behavioral pattern was mirrored in the fMRI data as dACC correlated positively with trait self-esteem. Generally, ACC activation was attenuated under threat when participants evaluated self-relevant traits and even more for negative self-related traits. We also found that activation in the ACC was negatively correlated with response times, indicating that greater activation of the ACC is linked to better access (faster response) to positive self-related traits and to impaired access (slower response) to negative self-related traits. These results confirm the ACC function as important in managing threatened self-worth but indicate differences in trait self-esteem levels. The fMRI analyses also revealed a decrease in activation within the left Hippocampus and the right thalamus under threat. This indicates that a down

  13. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  14. A reproductive threat-based model of evolved sex differences in jealousy.

    Science.gov (United States)

    Sagarin, Brad J; Becker, D Vaughn; Guadagno, Rosanna E; Wilkinson, Wayne W; Nicastle, Lionel D

    2012-08-10

    Although heterosexual women and men consistently demonstrate sex differences in jealousy, these differences disappear among lesbians and gay men as well as among heterosexual women and men contemplating same-sex infidelities (infidelities in which the partner and rival are the same sex). Synthesizing these past findings, the present paper offers a reproductive threat-based model of evolved sex differences in jealousy that predicts that the sexes will differ only when the jealous perceivers' reproductive outcomes are differentially at risk. This model is supported by data from a web-based study in which lesbians, gay men, bisexual women and men, and heterosexual women and men responded to a hypothetical infidelity scenario with the sex of the rival randomly determined. After reading the scenario, participants indicated which type of infidelity (sexual versus emotional) would cause greater distress. Consistent with predictions, heterosexual women and men showed a sex difference when contemplating opposite-sex infidelities but not when contemplating same-sex infidelities, whereas lesbians and gay men showed no sex difference regardless of whether the infidelity was opposite-sex or same-sex.

  15. A Reproductive Threat-Based Model of Evolved Sex Differences in Jealousy

    Directory of Open Access Journals (Sweden)

    Brad J. Sagarin

    2012-07-01

    Full Text Available Although heterosexual women and men consistently demonstrate sex differences in jealousy, these differences disappear among lesbians and gay men as well as among heterosexual women and men contemplating same-sex infidelities (infidelities in which the partner and rival are the same sex. Synthesizing these past findings, the present paper offers a reproductive threat-based model of evolved sex differences in jealousy that predicts that the sexes will differ only when the jealous perceivers' reproductive outcomes are differentially at risk. This model is supported by data from a web-based study in which lesbians, gay men, bisexual women and men, and heterosexual women and men responded to a hypothetical infidelity scenario with the sex of the rival randomly determined. After reading the scenario, participants indicated which type of infidelity (sexual versus emotional would cause greater distress. Consistent with predictions, heterosexual women and men showed a sex difference when contemplating opposite-sex infidelities but not when contemplating same-sex infidelities, whereas lesbians and gay men showed no sex difference regardless of whether the infidelity was opposite-sex or same-sex.

  16. An Agent-Based Intervention to Assist Drivers Under Stereotype Threat: Effects of In-Vehicle Agents' Attributional Error Feedback.

    Science.gov (United States)

    Joo, Yeon Kyoung; Lee-Won, Roselyn J

    2016-10-01

    For members of a group negatively stereotyped in a domain, making mistakes can aggravate the influence of stereotype threat because negative stereotypes often blame target individuals and attribute the outcome to their lack of ability. Virtual agents offering real-time error feedback may influence performance under stereotype threat by shaping the performers' attributional perception of errors they commit. We explored this possibility with female drivers, considering the prevalence of the "women-are-bad-drivers" stereotype. Specifically, we investigated how in-vehicle voice agents offering error feedback based on responsibility attribution (internal vs. external) and outcome attribution (ability vs. effort) influence female drivers' performance under stereotype threat. In addressing this question, we conducted an experiment in a virtual driving simulation environment that provided moment-to-moment error feedback messages. Participants performed a challenging driving task and made mistakes preprogrammed to occur. Results showed that the agent's error feedback with outcome attribution moderated the stereotype threat effect on driving performance. Participants under stereotype threat had a smaller number of collisions when the errors were attributed to effort than to ability. In addition, outcome attribution feedback moderated the effect of responsibility attribution on driving performance. Implications of these findings are discussed.

  17. The bases of development of systems of control and protection information from internal threats

    Directory of Open Access Journals (Sweden)

    Валерий Евгеньевич Жужжалов

    2013-12-01

    Full Text Available The present article is devoted to the analysis of information security in the conditions of high-growth hi-tech means of information processing and information security development of systems from internal threats.

  18. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  19. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  20. Physical Protection System Design Analysis against Insider Threat based on Game Theoretic Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kyo-Nam; Suh, Young-A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of); Schneider, Erich [The University of Texas, Austin (United States)

    2015-05-15

    This study explores the use of game-theoretic modeling of physical protection analysis by incorporating the implications of an insider threat. The defender-adversary interaction along with the inclusion of an insider is demonstrated using a simplified test case problem at an experimental fast reactor system. Non-detection probability and travel time are used as a baseline of physical protection parameters in this model. As one of the key features of the model is its ability to choose among security upgrades given the constraints of a budget, the study also performed cost benefit analysis for security upgrades options. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three types of adversary paths assisted by the insider and derived the largest insider threat in terms of the budget for security upgrades. More work needs to be done to incorporate complex dimensions of insider threats, which include but are not limited to: a more realistic mapping of insider threat, accounting for information asymmetry between the adversary, insider, and defenders, and assignment of more pragmatic parameter values.

  1. Physical Protection System Design Analysis against Insider Threat based on Game Theoretic Modeling

    International Nuclear Information System (INIS)

    Kim, Kyo-Nam; Suh, Young-A; Yim, Man-Sung; Schneider, Erich

    2015-01-01

    This study explores the use of game-theoretic modeling of physical protection analysis by incorporating the implications of an insider threat. The defender-adversary interaction along with the inclusion of an insider is demonstrated using a simplified test case problem at an experimental fast reactor system. Non-detection probability and travel time are used as a baseline of physical protection parameters in this model. As one of the key features of the model is its ability to choose among security upgrades given the constraints of a budget, the study also performed cost benefit analysis for security upgrades options. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three types of adversary paths assisted by the insider and derived the largest insider threat in terms of the budget for security upgrades. More work needs to be done to incorporate complex dimensions of insider threats, which include but are not limited to: a more realistic mapping of insider threat, accounting for information asymmetry between the adversary, insider, and defenders, and assignment of more pragmatic parameter values

  2. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  3. A methodology for the evaluation of the turbine jet engine fragment threat to generic air transportable containers

    International Nuclear Information System (INIS)

    Harding, D.C.; Pierce, J.D.

    1993-06-01

    Uncontained, high-energy gas turbine engine fragments are a potential threat to air-transportable containers carried aboard jet aircraft. The threat to a generic example container is evaluated by probability analyses and penetration testing to demonstrate the methodology to be used in the evaluation of a specific container/aircraft/engine combination. Fragment/container impact probability is the product of the uncontained fragment release rate and the geometric probability that a container is in the path of this fragment. The probability of a high-energy rotor burst fragment from four generic aircraft engines striking one of the containment vessels aboard a transport aircraft is approximately 1.2 x 10 -9 strikes/hour. Finite element penetration analyses and tests can be performed to identify specific fragments which have the potential to penetrate a generic or specific containment vessel. The relatively low probability of engine fragment/container impacts is primarily due to the low release rate of uncontained, hazardous jet engine fragments

  4. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  5. Helping Parents Cope with Suicide Threats: An Approach Based on Nonviolent Resistance.

    Science.gov (United States)

    Omer, Haim; Dolberger, Dan Isaac

    2015-09-01

    Parent training in nonviolent resistance was adapted to deal with situations of suicide threat by children, adolescents, and young adults. The approach aims at reducing the risk potential and the mutual distress surrounding the threat-interaction. Parent training in nonviolent resistance has been shown to help parents move from helplessness to presence, from isolation to connectedness, from submission to resistance, from escalation to self-control, and from mutual distancing and hostility to care and support. Those emphases can be crucial for the diminution of suicide risk. Parents show good ability to implement the approach and report gains on various areas over and beyond the reduction in suicide threat. A particular advantage is that the method can be used also in cases where the young person threatening suicide is not willing to cooperate. © 2015 Family Process Institute.

  6. Vulnerability of Water Resources under Climate and Land Use Change: Evaluation of Present and Future Threats for Austria

    Science.gov (United States)

    Nachtnebel, Hans-Peter; Wesemann, Johannes; Herrnegger, Mathew; Senoner, Tobias; Schulz, Karsten

    2015-04-01

    vulnerability were developed. A comparison with existing data (River Basin Management Plan and Groundwater Chemistry Regulation) shows a good agreement between the elaborated maps and observations for the present state. The Overall Vulnerability is very low and low for most parts of Austria, especially in the forested alpine region. Bigger cities like Vienna, Graz and Linz show medium vulnerabilities, due to the high water demand and low ecosystem services. Only in the north-eastern and south-eastern part of the country some water supply associations with high and very high overall vulnerability exist. Groundwater recharge is quite small in these regions and the water quality is limited due to intense agriculture and possible threats through landfills. The developed framework allows an evaluation of water quantity and quality vulnerabilities for large scales for the present and the future. Including ecosystem services and gross value added an overall vulnerability can be determined.

  7. Comparison of Efficacy and Threat Perception Processes in Predicting Smoking among University Students Based on Extended Parallel Process Model

    Directory of Open Access Journals (Sweden)

    S. Bashirian

    2014-04-01

    Full Text Available Introduction & Objective: The survey of smoking as the most toxic, common and cheapest ad-diction, and its psychological and demographic variables especially among the youth who are efficient and constructive individuals of the society is of great importance. This study was performed to compare efficacy and threat perception in predicting cigarette smoking among university students based on Expended Parallel Process Model (EPPM. Material & Methods: This cross sectional descriptive study was carried out on 700 college stu-dents of Hamadan recruited with a stratified sampling method. The participants completed a self-administered questionnaire including demographic characteristics, smoking status and EPPM Data analysis was done with the SPSS software (version 16, using t-test, one way ANOVA, Pierson correlation and logistic regression methods. Results: The average scores of threat and efficacy perception were 39.7 and 38.6, respectively. The prevalence of cigarette smoking among participants was 27.1 percent. Also, there were significant differences between the average score of efficacy perception and age, gender, his-tory of drug abuse and dwelling of students (P<0.05. Efficacy and threat perception both predicted student cigarette smoking. Conclusions: Cognitive mediating process of threat perception was a more powerful predictor of cigarette smoking as an unsafe behavior. Therefore, increasing self efficacy and response efficacy of university students aimed at facilitating the acceptance of safe behavior could be note-worthy as a principle in education. (Sci J Hamadan Univ Med Sci 2014; 21 (1:58-65

  8. Standoff Methods for the Detection of Threat Agents: A Review of Several Promising Laser-Based Techniques

    Directory of Open Access Journals (Sweden)

    J. Bruce Johnson

    2014-01-01

    Full Text Available Detection of explosives, explosive precursors, or other threat agents presents a number of technological challenges for optical sensing methods. Certainly detecting trace levels of threat agents against a complex background is chief among these challenges; however, the related issues of multiple target distances (from standoff to proximity and sampling time scales (from passive mines to rapid rate of march convoy protection for different applications make it unlikely that a single technique will be ideal for all sensing situations. A number of methods for spanning the range of optical sensor technologies exist which, when integrated, could produce a fused sensor system possessing a high level of sensitivity to threat agents and a moderate standoff real-time capability appropriate for portal screening of personnel or vehicles. In this work, we focus on several promising, and potentially synergistic, laser-based methods for sensing threat agents. For each method, we have briefly outlined the technique and report on the current level of capability.

  9. Evaluating the response of complex systems to environmental threats: the Σ II method

    International Nuclear Information System (INIS)

    Corynen, G.C.

    1983-05-01

    The Σ II method was developed to model and compute the probabilistic performance of systems that operate in a threatening environment. Although we emphasize the vulnerability of complex systems to earthquakes and to electromagnetic threats such as EMP (electromagnetic pulse), the method applies in general to most large-scale systems or networks that are embedded in a potentially harmful environment. Other methods exist for obtaining system vulnerability, but their complexity increases exponentially as the size of systems is increased. The complexity of the Σ II method is polynomial, and accurate solutions are now possible for problems for which current methods require the use of rough statistical bounds, confidence statements, and other approximations. For super-large problems, where the costs of precise answers may be prohibitive, a desired accuracy can be specified, and the Σ II algorithms will halt when that accuracy has been reached. We summarize the results of a theoretical complexity analysis - which is reported elsewhere - and validate the theory with computer experiments conducted both on worst-case academic problems and on more reasonable problems occurring in practice. Finally, we compare our method with the exact methods of Abraham and Nakazawa, and with current bounding methods, and we demonstrate the computational efficiency and accuracy of Σ II

  10. A Feasibility Study on Detection of Insider Threats based on Human Bio-signals

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    The insider threat means that trusted workers in an organization might carry out harmful acts from the negligent use of classified data to potentially sabotage the workplace. Surveys and studies conducted over the last decade have consistently shown the critical nature of the insider threats problem, in both government and private sectors. The shortcomings of existing systems, such as mental self-assessment and peer review, are very subjective, biased-assessments and employed infrequently. To overcome these limitations, this study investigates the feasibility of detecting and predicting an insider threat by using human biodata, from smart wearable devices. This paper showed the feasibility of predicting and detecting insider threats using EEG, GSR and ECG signals. In the section 2.1, two research hypotheses were established to identify the significant difference on EEG, GSR and ECG signals when the subject decided bad action and is the placed in deceit situation. These hypotheses were tested using two kinds of pilot experiments in the form of input (stimulus) and output (checking response of physiological signals and reaction time)

  11. Screening-level exposure-based prioritization to identify potential POPs, vPvBs and planetary boundary threats among Arctic contaminants

    Directory of Open Access Journals (Sweden)

    Efstathios Reppas-Chrysovitsinos

    2017-06-01

    Full Text Available A report that reviews Arctic contaminants that are not currently regulated as persistent organic pollutants (POPs under international treaties was recently published by the Arctic Monitoring and Assessment Programme (AMAP. We evaluated 464 individual chemicals mentioned in the AMAP report according to hazard profiles for POPs, very persistent and very bioaccumulative (vPvB chemicals, and two novel and distinct hazard profiles we derived from the planetary boundary threat framework. The two planetary boundary threat profiles assign high priority to chemicals that will be mobile and poorly reversible environmental contaminants. Utilizing persistence as a proxy for poor reversibility, we defined two exposure-based hazard profiles; airborne persistent contaminants (APCs and waterborne persistent contaminants (WPCs that are potential planetary boundary threats. We used in silico estimates of physicochemical properties and multimedia models to calculate hazard metrics for persistence, bioaccumulation and long-range transport potential, then we synthesized this information into four exposure-based hazard scores of the potential of each AMAP chemical to fit each of the POP, vPvB, APC and WPC exposure-based hazard profiles. As an alternative to adopting a “bright line” score that represented cause for concern, we scored the AMAP chemicals by benchmarking against a reference set of 148 known and relatively well-studied contaminants and expressed their exposure-based hazard scores as percentile ranks against the scores of the reference set chemicals. Our results show that scores in the four exposure-based hazard profiles provide complementary information about the potential environmental exposure-based hazards of the AMAP chemicals. Our POP, vPvB, APC and WPC exposure-based hazard scores identify high priority chemicals for further study from among the AMAP contaminants.

  12. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  13. Stereotype Threat among Students with Disabilities: The Importance of The Evaluative Context on Their Cognitive Performance

    Science.gov (United States)

    Desombre, Caroline; Anegmar, Souad; Delelis, Gérald

    2018-01-01

    This study investigated the hypothesis that cognitive performance of students with physical disabilities may be influenced by the evaluators' identity. Students with or without a physical disability completed a logic test and were informed that they would be evaluated by students from their own group (ingroup condition) or from an other group…

  14. Gender-, Race-, and Income-Based Stereotype Threat: The Effects of Multiple Stigmatized Aspects of Identity on Math Performance and Working Memory Function

    Science.gov (United States)

    Tine, Michele; Gotlieb, Rebecca

    2013-01-01

    This study compared the relative impact of gender-, race-, and income-based stereotype threat and examined if individuals with multiple stigmatized aspects of identity experience a larger stereotype threat effect on math performance and working memory function than people with one stigmatized aspect of identity. Seventy-one college students of the…

  15. Transferring x-ray based automated threat detection between scanners with different energies and resolution

    Science.gov (United States)

    Caldwell, M.; Ransley, M.; Rogers, T. W.; Griffin, L. D.

    2017-10-01

    A significant obstacle to developing high performance Deep Learning algorithms for Automated Threat Detection (ATD) in security X-ray imagery, is the difficulty of obtaining large training datasets. In our previous work, we circumvented this problem for ATD in cargo containers, using Threat Image Projection and data augmentation. In this work, we investigate whether data scarcity for other modalities, such as parcels and baggage, can be ameliorated by transforming data from one domain so that it approximates the appearance of another. We present an ontology of ATD datasets to assess where transfer learning may be applied. We define frameworks for transfer at the training and testing stages, and compare the results for both methods against ATD where a common data source is used for training and testing. Our results show very poor transfer, which we attribute to the difficulty of accurately matching the blur and contrast characteristics of different scanners.

  16. A value- and expectancy-based approach to understanding residents' intended response to a wildfire threat

    DEFF Research Database (Denmark)

    McNeill, Ilona M.; Dunlop, Patrick D.; Skinner, Timothy C.

    2016-01-01

    To motivate residents to evacuate early in case of a wildfire threat, it is important to know what factors underlie their response-related decision-making. The current paper examines the role of the value and expectancy tied to potential outcomes of defending vs evacuating on awareness...... or wait and see. These findings have important implications for strategies to influence residents' response-related decision-making....

  17. Ultrasensitive microchip based on smart microgel for real-time online detection of trace threat analytes.

    Science.gov (United States)

    Lin, Shuo; Wang, Wei; Ju, Xiao-Jie; Xie, Rui; Liu, Zhuang; Yu, Hai-Rong; Zhang, Chuan; Chu, Liang-Yin

    2016-02-23

    Real-time online detection of trace threat analytes is critical for global sustainability, whereas the key challenge is how to efficiently convert and amplify analyte signals into simple readouts. Here we report an ultrasensitive microfluidic platform incorporated with smart microgel for real-time online detection of trace threat analytes. The microgel can swell responding to specific stimulus in flowing solution, resulting in efficient conversion of the stimulus signal into significantly amplified signal of flow-rate change; thus highly sensitive, fast, and selective detection can be achieved. We demonstrate this by incorporating ion-recognizable microgel for detecting trace Pb(2+), and connecting our platform with pipelines of tap water and wastewater for real-time online Pb(2+) detection to achieve timely pollution warning and terminating. This work provides a generalizable platform for incorporating myriad stimuli-responsive microgels to achieve ever-better performance for real-time online detection of various trace threat molecules, and may expand the scope of applications of detection techniques.

  18. A Threat- and Efficacy-Based Framework to Understand Confidence in Vaccines among the Public Health Workforce

    Directory of Open Access Journals (Sweden)

    Lainie Rutkow

    2013-04-01

    Full Text Available The Extended Parallel Process Model (EPPM is an established threat- and efficacy-based behavioral framework for understanding health behaviors in the face of uncertain risk. A growing body of research has applied this model to understand these behaviors among the public health workforce. In this manuscript, we aim to explore the application of this framework to the public health workforce, with a novel focus on their confidence in vaccines and perceptions of vaccine injury compensation mechanisms. We characterize specific connections between EPPM’s threat and efficacy dimensions and relevant vaccine policy frameworks and highlight how these connections can usefully inform training interventions for public health workers to enhance their confidence in these vaccine policy measures.

  19. Evaluating the effectiveness of protected areas for maintaining biodiversity, securing habitats, and reducing threats

    DEFF Research Database (Denmark)

    Geldmann, Jonas

    of this thesis has been to evaluate the performance and effectiveness of protected area in securing biodiversity, by evaluating their ability to either improve conservation responses, the state of biodiversity, or alternatively to reduce the human pressures responsible for the loss of biodiversity. The scope......Protected areas are amongst the most important conservation responses to halt the loss of biodiversity and cover more than 12.7% of the terrestrial surface of earth. Likewise, protected areas are an important political instrument and a key component of the Convention for Biological Diversity (CBD......); seeking to protect at least 17% of the terrestrial surface and 10% of the coastal and marine areas by 2020. Protected areas are expected to deliver on many different objectives covering biodiversity, climate change mitigation, local livelihood, and cultural & esthetic values. Within each...

  20. Trait mindfulness modulates neuroendocrine and affective responses to social evaluative threat.

    Science.gov (United States)

    Brown, Kirk Warren; Weinstein, Netta; Creswell, J David

    2012-12-01

    Individual differences in mindfulness have been associated with numerous self-report indicators of stress, but research has not examined how mindfulness may buffer neuroendocrine and psychological stress responses under controlled laboratory conditions. The present study investigated the role of trait mindfulness in buffering cortisol and affective responses to a social evaluative stress challenge versus a control task. Participants completed measures of trait mindfulness, perceived stress, anxiety, and fear of negative evaluation before being randomized to complete the Trier Social Stress Test (TSST; Kirschbaum et al., 1993) or a control task. At points throughout the session, participants provided five saliva samples to assess cortisol response patterns, and completed four self-report measures of anxiety and negative affect to assess psychological responses. In accord with hypotheses, higher trait mindfulness predicted lower cortisol responses to the TSST, relative to the control task, as well as lower anxiety and negative affect. These relations remained significant when controlling for the role of other variables that predicted cortisol and affective responses. The findings suggest that trait mindfulness modulates cortisol and affective responses to an acute social stressor. Further research is needed to understand the neural pathways through which mindfulness impacts these responses. Copyright © 2012 Elsevier Ltd. All rights reserved.

  1. Evaluation of laser-induced breakdown spectroscopy analysis potential for addressing radiological threats from a distance

    International Nuclear Information System (INIS)

    Gaona, I.; Serrano, J.; Moros, J.; Laserna, J.J.

    2014-01-01

    Although radioactive materials are nowadays valuable tools in nearly all fields of modern science and technology, the dangers stemming from the uncontrolled use of ionizing radiation are more than evident. Since preparedness is a key issue to face the risks of a radiation dispersal event, development of rapid and efficient monitoring technologies to control the contamination caused by radioactive materials is of crucial interest. Laser-induced breakdown spectroscopy (LIBS) exhibits appealing features for this application. This research focuses on the assessment of LIBS potential for the in-situ fingerprinting and identification of radioactive material surrogates from a safe distance. LIBS selectivity and sensitivity to detect a variety of radioactive surrogates, namely 59 Co, 88 Sr, 130 Ba, 133 Cs, 193 Ir and 238 U, on the surface of common urban materials at a distance of 30 m have been evaluated. The performance of the technique for nuclear forensics has been also studied on different model scenarios. Findings have revealed the difficulties to detect and to identify the analytes depending on the surface being interrogated. However, as demonstrated, LIBS shows potential enough for prompt and accurate gathering of essential evidence at a number of sites after the release, either accidental or intentional, of radioactive material. The capability of standoff analysis confers to LIBS unique advantages in terms of fast and safe inspection of forensic scenarios. The identity of the radioactive surrogates is easily assigned from a distance and the sensitivity to their detection is in the range of a few hundreds of ng per square centimeter. - Highlights: • Distant identification of radioactive surrogates on urban surfaces has been proved. • LIBS sensitivity to distant detection of radioactive surrogates has been checked. • Influences of the atmosphere on emission signals have been ascertained. • Usage of standoff LIBS for identifying forensic evidences has been

  2. Evaluation of laser-induced breakdown spectroscopy analysis potential for addressing radiological threats from a distance

    Energy Technology Data Exchange (ETDEWEB)

    Gaona, I.; Serrano, J.; Moros, J.; Laserna, J.J., E-mail: laserna@uma.es

    2014-06-01

    Although radioactive materials are nowadays valuable tools in nearly all fields of modern science and technology, the dangers stemming from the uncontrolled use of ionizing radiation are more than evident. Since preparedness is a key issue to face the risks of a radiation dispersal event, development of rapid and efficient monitoring technologies to control the contamination caused by radioactive materials is of crucial interest. Laser-induced breakdown spectroscopy (LIBS) exhibits appealing features for this application. This research focuses on the assessment of LIBS potential for the in-situ fingerprinting and identification of radioactive material surrogates from a safe distance. LIBS selectivity and sensitivity to detect a variety of radioactive surrogates, namely {sup 59}Co, {sup 88}Sr, {sup 130}Ba, {sup 133}Cs, {sup 193}Ir and {sup 238}U, on the surface of common urban materials at a distance of 30 m have been evaluated. The performance of the technique for nuclear forensics has been also studied on different model scenarios. Findings have revealed the difficulties to detect and to identify the analytes depending on the surface being interrogated. However, as demonstrated, LIBS shows potential enough for prompt and accurate gathering of essential evidence at a number of sites after the release, either accidental or intentional, of radioactive material. The capability of standoff analysis confers to LIBS unique advantages in terms of fast and safe inspection of forensic scenarios. The identity of the radioactive surrogates is easily assigned from a distance and the sensitivity to their detection is in the range of a few hundreds of ng per square centimeter. - Highlights: • Distant identification of radioactive surrogates on urban surfaces has been proved. • LIBS sensitivity to distant detection of radioactive surrogates has been checked. • Influences of the atmosphere on emission signals have been ascertained. • Usage of standoff LIBS for identifying

  3. Model to Counter the Threats in the Data Transmission System PLC-based Technology with the Use of Petri Nets

    Directory of Open Access Journals (Sweden)

    A. A. Balaev

    2010-06-01

    Full Text Available In the article the most important aspects of information security technology Power Line Communica tions, namely the provision of conditions accessibility and integrity, are considered. It is shown that these aspects of the PLC-Technology has some internal “potential” counter, at least, such a widespread threat to both natural disturbances and/or artificial origin. The possibility of such an implementation using the simplified mathematical model of the PLC-based technologies of the theory of Petri nets is presented.

  4. A review and meta-analysis of age-based stereotype threat: negative stereotypes, not facts, do the damage.

    Science.gov (United States)

    Lamont, Ruth A; Swift, Hannah J; Abrams, Dominic

    2015-03-01

    Stereotype threat effects arise when an individual feels at risk of confirming a negative stereotype about their group and consequently underperforms on stereotype relevant tasks (Steele, 2010). Among older people, underperformance across cognitive and physical tasks is hypothesized to result from age-based stereotype threat (ABST) because of negative age-stereotypes regarding older adults' competence. The present review and meta-analyses examine 22 published and 10 unpublished articles, including 82 effect sizes (N = 3882) investigating ABST on older people's (Mage = 69.5) performance. The analysis revealed a significant small-to-medium effect of ABST (d = .28) and important moderators of the effect size. Specifically, older adults are more vulnerable to ABST when (a) stereotype-based rather than fact-based manipulations are used (d = .52); (b) when performance is tested using cognitive measures (d = .36); and (c) occurs reliably when the dependent variable is measured proximally to the manipulation. The review raises important theoretical and methodological issues, and areas for future research. (c) 2015 APA, all rights reserved).

  5. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  6. Evaluation of coping resources and self-esteem as moderators of the relationship between threat appraisals and avoidance of activities after traumatic brain injury.

    Science.gov (United States)

    Riley, Gerard A; Dennis, Rebecca K; Powell, Theresa

    2010-12-01

    It is not uncommon for people after a traumatic brain injury (TBI) to develop anxieties about possible negative outcomes (i.e., threat appraisals) in relation to participating in valued activities. Some respond to this anxiety by avoiding the activities, but others maintain their participation. The present study investigated two factors that may help explain this variation across individuals in their response to threat appraisals - self-esteem and the evaluation of coping resources. Forty-one individuals with a TBI completed the Avoidance and Threat Appraisals Questionnaire, the Rosenberg Self-Esteem Scale and the Coping Resources Questionnaire. The study's hypotheses were supported: Those low in self-esteem, and those with a negative evaluation of their ability to cope with the TBI, were significantly more likely to respond to threat appraisals with avoidance. Those whose injury was more recent and those whose injury was the result of an assault were also more likely to respond with avoidance. The theoretical and therapeutic implications of these results are discussed.

  7. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  8. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  9. Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats

    Energy Technology Data Exchange (ETDEWEB)

    Mills, Richard T [ORNL; Hoffman, Forrest M [ORNL; Kumar, Jitendra [ORNL; HargroveJr., William Walter [USDA Forest Service

    2011-01-01

    We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The approaches explored here are based on k-means cluster analysis of this massive data set, which provides a basis for defining the bounds of the expected or normal phenological patterns that indicate healthy vegetation at a given geographic location. We briefly describe the computational approaches we have used to make cluster analysis of such massive data sets feasible, describe approaches we have explored for distinguishing between normal and abnormal phenology, and present some examples in which we have applied these approaches to identify various forest disturbances in the CONUS.

  10. Integration of population genetic structure and plant response to climate change: sustaining genetic resources through evaluation of projected threats

    Science.gov (United States)

    Bryce A. Richardson; Marcus V. Warwell; Mee-Sook Kim; Ned B. Klopfenstein; Geral I. McDonald

    2010-01-01

    To assess threats or predict responses to disturbances, or both, it is essential to recognize and characterize the population structures of forest species in relation to changing environments. Appropriate management of these genetic resources in the future will require (1) understanding the existing genetic diversity/variation and population structure of forest trees...

  11. Migrants and emerging public health issues in a globalized world: threats, risks and challenges, an evidence-based framework.

    Science.gov (United States)

    Gushulak, Bd; Weekers, J; Macpherson, Dw

    2009-01-01

    International population mobility is an underlying factor in the emergence of public health threats and risks that must be managed globally. These risks are often related, but not limited, to transmissible pathogens. Mobile populations can link zones of disease emergence to lowprevalence or nonendemic areas through rapid or high-volume international movements, or both. Against this background of human movement, other global processes such as economics, trade, transportation, environment and climate change, as well as civil security influence the health impacts of disease emergence. Concurrently, global information systems, together with regulatory frameworks for disease surveillance and reporting, affect organizational and public awareness of events of potential public health significance. International regulations directed at disease mitigation and control have not kept pace with the growing challenges associated with the volume, speed, diversity, and disparity of modern patterns of human movement. The thesis that human population mobility is itself a major determinant of global public health is supported in this article by review of the published literature from the perspective of determinants of health (such as genetics/biology, behavior, environment, and socioeconomics), population-based disease prevalence differences, existing national and international health policies and regulations, as well as inter-regional shifts in population demographics and health outcomes. This paper highlights some of the emerging threats and risks to public health, identifies gaps in existing frameworks to manage health issues associated with migration, and suggests changes in approach to population mobility, globalization, and public health. The proposed integrated approach includes a broad spectrum of stakeholders ranging from individual health-care providers to policy makers and international organizations that are primarily involved in global health management, or are influenced

  12. Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering

    Science.gov (United States)

    Kerzhner, Aleksandr; Pomerantz, Marc; Tan, Kymie; Campuzano, Brian; Dinkel, Kevin; Pecharich, Jeremy; Nguyen, Viet; Steele, Robert; Johnson, Bryan

    2015-01-01

    The spectre of cyber attacks on aerospace systems can no longer be ignored given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attack invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system where the goal of the defensive response is to preserve critical mission objectives in the presence of adversarial activity. In this paper, a structured approach for modeling aerospace systems is described. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group's Systems Modeling Language to represent the system being analyzed and also utilize model transformations to change relevant aspects of the model into specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. Two different example analysis types are demonstrated in this paper: a graph-based propagation analysis based on edge labels, and a graph-based propagation analysis based on node labels.

  13. Theory-Based Stakeholder Evaluation

    Science.gov (United States)

    Hansen, Morten Balle; Vedung, Evert

    2010-01-01

    This article introduces a new approach to program theory evaluation called theory-based stakeholder evaluation or the TSE model for short. Most theory-based approaches are program theory driven and some are stakeholder oriented as well. Practically, all of the latter fuse the program perceptions of the various stakeholder groups into one unitary…

  14. Mammals on the EDGE: conservation priorities based on threat and phylogeny.

    Directory of Open Access Journals (Sweden)

    Nick J B Isaac

    2007-03-01

    Full Text Available Conservation priority setting based on phylogenetic diversity has frequently been proposed but rarely implemented. Here, we define a simple index that measures the contribution made by different species to phylogenetic diversity and show how the index might contribute towards species-based conservation priorities. We describe procedures to control for missing species, incomplete phylogenetic resolution and uncertainty in node ages that make it possible to apply the method in poorly known clades. We also show that the index is independent of clade size in phylogenies of more than 100 species, indicating that scores from unrelated taxonomic groups are likely to be comparable. Similar scores are returned under two different species concepts, suggesting that the index is robust to taxonomic changes. The approach is applied to a near-complete species-level phylogeny of the Mammalia to generate a global priority list incorporating both phylogenetic diversity and extinction risk. The 100 highest-ranking species represent a high proportion of total mammalian diversity and include many species not usually recognised as conservation priorities. Many species that are both evolutionarily distinct and globally endangered (EDGE species do not benefit from existing conservation projects or protected areas. The results suggest that global conservation priorities may have to be reassessed in order to prevent a disproportionately large amount of mammalian evolutionary history becoming extinct in the near future.

  15. Protecting computer-based medical devices: defending against viruses and other threats.

    Science.gov (United States)

    2005-07-01

    The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.

  16. Inducing Attitude Change toward Online Gaming among Adolescent Players Based on Dissonance Theory: The Role of Threats and Justification of Effort

    Science.gov (United States)

    Wan, Chin-Sheng; Chiou, Wen-Bin

    2010-01-01

    The negative impact of online gaming on adolescents has received much attention. The question of how to reduce their pathological use of online gaming is a critical issue. Based on the concept of external justification in dissonance theory, this experimental study aimed to examine whether severity of threat and justification of effort would impact…

  17. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  18. Model description and evaluation of the mark-recapture survival model used to parameterize the 2012 status and threats analysis for the Florida manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Langtimm, Catherine A.; Kendall, William L.; Beck, Cathy A.; Kochman, Howard I.; Teague, Amy L.; Meigs-Friend, Gaia; Peñaloza, Claudia L.

    2016-11-30

    This report provides supporting details and evidence for the rationale, validity and efficacy of a new mark-recapture model, the Barker Robust Design, to estimate regional manatee survival rates used to parameterize several components of the 2012 version of the Manatee Core Biological Model (CBM) and Threats Analysis (TA).  The CBM and TA provide scientific analyses on population viability of the Florida manatee subspecies (Trichechus manatus latirostris) for U.S. Fish and Wildlife Service’s 5-year reviews of the status of the species as listed under the Endangered Species Act.  The model evaluation is presented in a standardized reporting framework, modified from the TRACE (TRAnsparent and Comprehensive model Evaluation) protocol first introduced for environmental threat analyses.  We identify this new protocol as TRACE-MANATEE SURVIVAL and this model evaluation specifically as TRACE-MANATEE SURVIVAL, Barker RD version 1. The longer-term objectives of the manatee standard reporting format are to (1) communicate to resource managers consistent evaluation information over sequential modeling efforts; (2) build understanding and expertise on the structure and function of the models; (3) document changes in model structures and applications in response to evolving management objectives, new biological and ecological knowledge, and new statistical advances; and (4) provide greater transparency for management and research review.

  19. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  20. Development of a bead-based Luminex assay using lipopolysaccharide specific monoclonal antibodies to detect biological threats from Brucella species.

    Science.gov (United States)

    Silbereisen, Angelika; Tamborrini, Marco; Wittwer, Matthias; Schürch, Nadia; Pluschke, Gerd

    2015-10-05

    Brucella, a Gram-negative bacterium, is classified as a potential bioterrorism agent mainly due to the low dose needed to cause infection and the ability to transmit the bacteria via aerosols. Goats/sheep, cattle, pigs, dogs, sheep and rodents are infected by B. melitensis, B. abortus, B. suis, B. canis, B. ovis and B. neotomae, respectively, the six classical Brucella species. Most human cases are caused by B. melitensis and B. abortus. Our aim was to specifically detect Brucellae with 'smooth' lipopolysaccharide (LPS) using a highly sensitive monoclonal antibody (mAb) based immunological assay. To complement molecular detection systems for potential bioterror agents, as required by international biodefense regulations, sets of mAbs were generated by B cell hybridoma technology and used to develop immunological assays. The combination of mAbs most suitable for an antigen capture assay format was identified and an immunoassay using the Luminex xMAP technology was developed. MAbs specific for the LPS O-antigen of Brucella spp. were generated by immunising mice with inactivated B. melitensis or B. abortus cells. Most mAbs recognised both B. melitensis and B. abortus and antigen binding was not impeded by inactivation of the bacterial cells by γ irradiation, formalin or heat treatment, a step required to analyse the samples immunologically under biosafety level two conditions. The Luminex assay recognised all tested Brucella species with 'smooth' LPS with detection limits of 2×10(2) to 8×10(4) cells per mL, depending on the species tested. Milk samples spiked with Brucella spp. cells were identified successfully using the Luminex assay. In addition, the bead-based immunoassay was integrated into a multiplex format, allowing for simultaneous, rapid and specific detection of Brucella spp., Bacillus anthracis, Francisella tularensis and Yersinia pestis within a single sample. Overall, the robust Luminex assay should allow detection of Brucella spp. in both natural

  1. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  2. Threats to Mediterranean rangelands: a case study based on the views of citizens in the Viotia prefecture, Greece.

    Science.gov (United States)

    Kyriazopoulos, Apostolos P; Arabatzis, Garyfallos; Abraham, Eleni M; Parissi, Zoi M

    2013-11-15

    Rangelands in Greece constitute a very important natural resource as they occupy 40% of the total surface. Not only is their forage production essential for the development of extensive livestock farming, but also they play a key role in outdoor recreational activities, protection from erosion, provision of water supplies and biodiversity conservation. However, land use changes, inappropriate management and wildfires threaten their existence. The research was conducted among the citizens of Viotia prefecture, an area close to Athens, Greece, using personal interviews with a structured questionnaire in 2008. The aim was to record citizens' opinions regarding the threats to rangelands. The results suggest that the main threats as perceived by the respondents, are land use changes especially for urban development, and wildfires. The application of cluster analysis highlighted the differentiation among the respondents in ranking these threats. The more ecologically aware citizens recognised that mismanagement, abandonment and agriculture also threaten rangelands. These threats can have a considerable impact on the lives of the local people. Policy makers and managers should take the opinions of local citizens into consideration, and engage them in decision making so that sustainable management policies could be applied. Copyright © 2013 Elsevier Ltd. All rights reserved.

  3. Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats

    Science.gov (United States)

    Richard Trans Mills; Forrest M Hoffman; Jitendra Kumar; William W. Hargrove

    2011-01-01

    We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The...

  4. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  5. MTA Computer Based Evaluation System.

    Science.gov (United States)

    Brenner, Lisa P.; And Others

    The MTA PLATO-based evaluation system, which has been implemented by a consortium of schools of medical technology, is designed to be general-purpose, modular, data-driven, and interactive, and to accommodate other national and local item banks. The system provides a comprehensive interactive item-banking system in conjunction with online student…

  6. How do people with persecutory delusions evaluate threat in a controlled social environment? A qualitative study using virtual reality.

    Science.gov (United States)

    Fornells-Ambrojo, Miriam; Freeman, Daniel; Slater, Mel; Swapp, David; Antley, Angus; Barker, Chris

    2015-01-01

    Environmental factors have been associated with psychosis but there is little qualitative research looking at how the ongoing interaction between individual and environment maintains psychotic symptoms. The current study investigates how people with persecutory delusions interpret events in a virtual neutral social environment using qualitative methodology. 20 participants with persecutory delusions and 20 controls entered a virtual underground train containing neutral characters. Under these circumstances, people with persecutory delusions reported similar levels of paranoia as non-clinical participants. The transcripts of a post-virtual reality interview of the first 10 participants in each group were analysed. Thematic analyses of interviews focusing on the decision making process associated with attributing intentions of computer-generated characters revealed 11 themes grouped in 3 main categories (evidence in favour of paranoid appraisals, evidence against paranoid appraisals, other behaviour). People with current persecutory delusions are able to use a range of similar strategies to healthy volunteers when making judgements about potential threat in a neutral environment that does not elicit anxiety, but they are less likely than controls to engage in active hypothesis-testing and instead favour experiencing "affect" as evidence of persecutory intention.

  7. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  8. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  9. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    ); the utilization of the international statement of threat by states, organizations, and sites in developing their own statement of threat, recognition of vulnerabilities, and creation of threat based design (concepts) for the implementation of security measures; an approach to the acquisition of resources to provide for the realization of internationally accepted security measures. (author)

  10. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  11. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  12. Perceived threat of violence and exposure to physical violence against foreign-born women: a Swedish population-based study.

    Science.gov (United States)

    Fernbrant, Cecilia; Essén, Birgitta; Ostergren, Per-Olof; Cantor-Graae, Elizabeth

    2011-01-01

    Violence against women is an increasing global phenomenon. Little is known about violence against foreign-born women, despite a possible increased concentration of risk factors in this group. This study investigated prevalence of perceived threat of violence and exposure to physical violence and its relation to country of birth among women (18-64 years) residing in southern Sweden, using data obtained from the 2004 Public Health Survey in Scania, Sweden. Foreign-born women reported significantly higher rates of both perceived threat of violence and exposure to physical violence compared with Swedish-born women. Foreign-born women exposed to violence originated primarily from middle/low-income countries (versus high-income countries). The risk of perceived threat of violence remained significantly increased among foreign-born even after further adjustment for potential confounders, such as marital status and disposable income. After similar adjustment, increased exposure to physical violence was no longer significantly related to foreign-born status, but instead was largely attributable to marital status and low levels of disposable income. Foreign-born women, however, had a greater risk of physical violence in the home than Swedish-born women, and violence in the home was the most frequently reported setting for violence exposure among foreign-born women. Migration may confer an increased risk of interpersonal violence against women. Although the underlying causes of this increased risk are unknown, a complex set of factors may be involved, including socioeconomic disadvantage. Copyright © 2011 Jacobs Institute of Women's Health. Published by Elsevier Inc. All rights reserved.

  13. Children's Threats: When Are They Serious?

    Science.gov (United States)

    ... mental illness, such as depression, mania, psychosis, or bipolar disorder use of alcohol or illicit drugs disciplinary problems ... mental health professional with experience evaluating children and adolescents. Evaluation of any serious threat must be done ...

  14. IT safety in production data networks (PDN). Tracking, evaluation and elimination of safety threats; IT-Sicherheit in Produktionsnetzen (PDN). Aufspueren, einschaetzen und beseitigen von Sicherheitsbedrohungen

    Energy Technology Data Exchange (ETDEWEB)

    Neider, Ulrich [DETACK GmbH, Ludwigsburg (Germany)

    2013-03-01

    This contribution reports on the threats of production data networks. Within the context of the IT security, the risks of production data networks are not only based on a possible contamination by computer viruses. The author of this contribution increases awareness of dangers to whose production systems are faced. The author also presents a phase model from his own consulting practice in order to increase the safety of production data systems by implementation of a safety control. This phase model consists of the six following steps: (a) Stock taking of the state of the art; (b) Determination of the target (development of a safety concept); (c) Creation of an IT safety policy; (d) Application of IT safety policy; (e) Audit of the results (IT safety audit); (f) Regular safety tests.

  15. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  16. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  17. Development of a risk-ranking framework to evaluate potential high-threat microorganisms, toxins, and chemicals in food.

    Science.gov (United States)

    Newsome, R; Tran, N; Paoli, G M; Jaykus, L A; Tompkin, B; Miliotis, M; Ruthman, T; Hartnett, E; Busta, F F; Petersen, B; Shank, F; McEntire, J; Hotchkiss, J; Wagner, M; Schaffner, D W

    2009-03-01

    Through a cooperative agreement with the U.S. Food and Drug Administration, the Institute of Food Technologists developed a risk-ranking framework prototype to enable comparison of microbiological and chemical hazards in foods and to assist policy makers, risk managers, risk analysts, and others in determining the relative public health impact of specific hazard-food combinations. The prototype is a bottom-up system based on assumptions that incorporate expert opinion/insight with a number of exposure and hazard-related risk criteria variables, which are propagated forward with food intake data to produce risk-ranking determinations. The prototype produces a semi-quantitative comparative assessment of food safety hazards and the impacts of hazard control measures. For a specific hazard-food combination the prototype can produce a single metric: a final risk value expressed as annual pseudo-disability adjusted life years (pDALY). The pDALY is a harmonization of the very different dose-response relationships observed for chemicals and microbes. The prototype was developed on 2 platforms, a web-based user interface and an Analytica(R) model (Lumina Decision Systems, Los Gatos, Calif., U.S.A.). Comprising visual basic language, the web-based platform facilitates data input and allows use concurrently from multiple locations. The Analytica model facilitates visualization of the logic flow, interrelationship of input and output variables, and calculations/algorithms comprising the prototype. A variety of sortable risk-ranking reports and summary information can be generated for hazard-food pairs, showing hazard and dose-response assumptions and data, per capita consumption by population group, and annual p-DALY.

  18. The Threat of Uncertainty: Why Using Traditional Approaches for Evaluating Spacecraft Reliability are Insufficient for Future Human Mars Missions

    Science.gov (United States)

    Stromgren, Chel; Goodliff, Kandyce; Cirillo, William; Owens, Andrew

    2016-01-01

    Through the Evolvable Mars Campaign (EMC) study, the National Aeronautics and Space Administration (NASA) continues to evaluate potential approaches for sending humans beyond low Earth orbit (LEO). A key aspect of these missions is the strategy that is employed to maintain and repair the spacecraft systems, ensuring that they continue to function and support the crew. Long duration missions beyond LEO present unique and severe maintainability challenges due to a variety of factors, including: limited to no opportunities for resupply, the distance from Earth, mass and volume constraints of spacecraft, high sensitivity of transportation element designs to variation in mass, the lack of abort opportunities to Earth, limited hardware heritage information, and the operation of human-rated systems in a radiation environment with little to no experience. The current approach to maintainability, as implemented on ISS, which includes a large number of spares pre-positioned on ISS, a larger supply sitting on Earth waiting to be flown to ISS, and an on demand delivery of logistics from Earth, is not feasible for future deep space human missions. For missions beyond LEO, significant modifications to the maintainability approach will be required.Through the EMC evaluations, several key findings related to the reliability and safety of the Mars spacecraft have been made. The nature of random and induced failures presents significant issues for deep space missions. Because spare parts cannot be flown as needed for Mars missions, all required spares must be flown with the mission or pre-positioned. These spares must cover all anticipated failure modes and provide a level of overall reliability and safety that is satisfactory for human missions. This will require a large amount of mass and volume be dedicated to storage and transport of spares for the mission. Further, there is, and will continue to be, a significant amount of uncertainty regarding failure rates for spacecraft

  19. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  20. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  1. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  2. Cortisol responses to psychosocial stress predict depression trajectories: social-evaluative threat and prior depressive episodes as moderators.

    Science.gov (United States)

    Morris, Matthew C; Rao, Uma; Garber, Judy

    2012-12-20

    Alterations of hypothalamic-pituitary-adrenal (HPA) function are well-established in adults with current depression. HPA alterations may persist into remission and confer increased risk for recurrence. A modified version of the Trier Social Stress Test (TSST) was administered at baseline to 32 young adults with remitted major depressive disorder and 36 never-depressed controls. Participants were randomly assigned to either a 'high-stress' condition involving social evaluation or a 'low-stress' control condition. Cortisol concentrations were measured in saliva samples throughout the TSST. Participants were assessed again after 6 months for the occurrence of stressful life events and depressive symptoms/disorders during the follow-up period. Participants who exhibited enhanced cortisol reactivity in the low-stress condition showed increases in depressive symptoms over follow-up, after controlling for stressful life events during the follow-up period. Anticipatory stress cortisol and cortisol reactivity each interacted with history of depressive episodes to predict depression trajectories. The single TSST administration limits conclusions about whether alterations of cortisol reactivity represent trait-like vulnerability factors or consequences ("scars') of past depression. These results extend previous findings on stress sensitivity in depression and suggest that altered HPA function during remission could reflect an endophenotype for vulnerability to depression recurrence. Findings support interactive models of risk for depression recurrence implicating HPA function, depression history, and sensitivity to minor stressors. Results may have implications for interventions that match treatment approaches to profiles of HPA function. Copyright © 2012 Elsevier B.V. All rights reserved.

  3. Fuzzy Similarity Measures Approach in Benchmarking Taxonomies of Threats against SMEs in Developing Economies

    DEFF Research Database (Denmark)

    Yeboah-Boateng, Ezer Osei

    2013-01-01

    There are various threats that militate against SMEs in developing economies. However, most SMEs fall on the conservative “TV News Effect” of most-publicized cyber-threats or incidences, with disproportionate mitigation measures. This paper endeavors to establish a taxonomy of threat agents to fill...... in the void. Various fuzzy similarity measures based on multi-attribute decision-making techniques have been employed in the evaluation. The taxonomy offers a panoramic view of cyber-threats in assessing mission-critical assets, and serves as a benchmark for initiating appropriate mitigation strategies. SMEs...... in developing economies were strategically interviewed for their expert opinions on various business and security metrics. The study established that natural disasters, which are perennial in most developing economies, are the most critical cyber-threat agent, whilst social engineering is the least critical...

  4. Changes in automatic threat processing precede and predict clinical changes with exposure-based cognitive-behavior therapy for panic disorder.

    Science.gov (United States)

    Reinecke, Andrea; Waldenmaier, Lara; Cooper, Myra J; Harmer, Catherine J

    2013-06-01

    Cognitive behavioral therapy (CBT) is an effective treatment for emotional disorders such as anxiety or depression, but the mechanisms underlying successful intervention are far from understood. Although it has been a long-held view that psychopharmacological approaches work by directly targeting automatic emotional information processing in the brain, it is usually postulated that psychological treatments affect these processes only over time, through changes in more conscious thought cycles. This study explored the role of early changes in emotional information processing in CBT action. Twenty-eight untreated patients with panic disorder were randomized to a single session of exposure-based CBT or waiting group. Emotional information processing was measured on the day after intervention with an attentional visual probe task, and clinical symptoms were assessed on the day after intervention and at 4-week follow-up. Vigilance for threat information was decreased in the treated group, compared with the waiting group, the day after intervention, before reductions in clinical symptoms. The magnitude of this early effect on threat vigilance predicted therapeutic response after 4 weeks. Cognitive behavioral therapy rapidly affects automatic processing, and these early effects are predictive of later therapeutic change. Such results suggest very fast action on automatic processes mediating threat sensitivity, and they provide an early marker of treatment response. Furthermore, these findings challenge the notion that psychological treatments work directly on conscious thought processes before automatic information processing and imply a greater similarity between early effects of pharmacological and psychological treatments for anxiety than previously thought. Copyright © 2013 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  5. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  6. Evaluating diffraction-based overlay

    Science.gov (United States)

    Li, Jie; Tan, Asher; Jung, JinWoo; Goelzer, Gary; Smith, Nigel; Hu, Jiangtao; Ham, Boo-Hyun; Kwak, Min-Cheol; Kim, Cheol-Hong; Nam, Suk-Woo

    2012-03-01

    We evaluate diffraction-based overlay (DBO) metrology using two test wafers. The test wafers have different film stacks designed to test the quality of DBO data under a range of film conditions. We present DBO results using traditional empirical approach (eDBO). eDBO relies on linear response of the reflectance with respect to the overlay displacement within a small range. It requires specially designed targets that consist of multiple pads with programmed shifts. It offers convenience of quick recipe setup since there is no need to establish a model. We measure five DBO targets designed with different pitches and programmed shifts. The correlations of five eDBO targets and the correlation of eDBO to image-based overlay are excellent. The targets of 800nm and 600nm pitches have better dynamic precision than targets of 400nm pitch, which agrees with simulated results on signal/noise ratio. 3σ of less than 0.1nm is achieved for both wafers using the best configured targets. We further investigate the linearity assumption of eDBO algorithm. Simulation results indicate that as the pitch of DBO targets gets smaller, the nonlinearity error, i.e., the error in the overlay measurement results caused by deviation from ideal linear response, becomes bigger. We propose a nonlinearity correction (NLC) by including higher order terms in the optical response. The new algorithm with NLC improves measurement consistency for DBO targets of same pitch but different programmed shift, due to improved accuracy. The results from targets with different pitches, however, are improved marginally, indicating the presence of other error sources.

  7. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  8. Training organizational supervisors to detect and prevent cyber insider threats: two approaches

    Directory of Open Access Journals (Sweden)

    Dee H. Andrews

    2013-05-01

    Full Text Available Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instructional approaches for this training challenge – optimal path modelling and a competency-based approach. The paper concludes by discussing challenges of evaluating training for seldom occurring real world phenomena, like detecting a cyber-insider threat.

  9. Military Expenditure, Threats, and Growth

    OpenAIRE

    Aizenman, Joshua; Glick, Reuven

    2003-01-01

    This paper clarifies one of the puzzling results of the economic growth literature: the impact of military expenditure is frequently found to be non-significant or negative, yet most countries spend a large fraction of their GDP on defense and the military. We start by empirical evaluation of the non- linear interactions between military expenditure, external threats, corruption, and other relevant controls. While growth falls with higher levels of military spending, given the values of the o...

  10. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    Science.gov (United States)

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of

  11. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  12. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  13. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  14. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  15. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  16. Guidelines for reporting evaluations based on observational methodology.

    Science.gov (United States)

    Portell, Mariona; Anguera, M Teresa; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana

    2015-01-01

    Observational methodology is one of the most suitable research designs for evaluating fidelity of implementation, especially in complex interventions. However, the conduct and reporting of observational studies is hampered by the absence of specific guidelines, such as those that exist for other evaluation designs. This lack of specific guidance poses a threat to the quality and transparency of these studies and also constitutes a considerable publication hurdle. The aim of this study thus was to draw up a set of proposed guidelines for reporting evaluations based on observational methodology. The guidelines were developed by triangulating three sources of information: observational studies performed in different fields by experts in observational methodology, reporting guidelines for general studies and studies with similar designs to observational studies, and proposals from experts in observational methodology at scientific meetings. We produced a list of guidelines grouped into three domains: intervention and expected outcomes, methods, and results. The result is a useful, carefully crafted set of simple guidelines for conducting and reporting observational studies in the field of program evaluation.

  17. A novel two-stage evaluation system based on a Group-G1 approach to identify appropriate emergency treatment technology schemes in sudden water source pollution accidents.

    Science.gov (United States)

    Qu, Jianhua; Meng, Xianlin; Hu, Qi; You, Hong

    2016-02-01

    Sudden water source pollution resulting from hazardous materials has gradually become a major threat to the safety of the urban water supply. Over the past years, various treatment techniques have been proposed for the removal of the pollutants to minimize the threat of such pollutions. Given the diversity of techniques available, the current challenge is how to scientifically select the most desirable alternative for different threat degrees. Therefore, a novel two-stage evaluation system was developed based on a circulation-correction improved Group-G1 method to determine the optimal emergency treatment technology scheme, considering the areas of contaminant elimination in both drinking water sources and water treatment plants. In stage 1, the threat degree caused by the pollution was predicted using a threat evaluation index system and was subdivided into four levels. Then, a technique evaluation index system containing four sets of criteria weights was constructed in stage 2 to obtain the optimum treatment schemes corresponding to the different threat levels. The applicability of the established evaluation system was tested by a practical cadmium-contaminated accident that occurred in 2012. The results show this system capable of facilitating scientific analysis in the evaluation and selection of emergency treatment technologies for drinking water source security.

  18. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  19. 49 CFR 1515.5 - Appeal of Initial Determination of Threat Assessment based on criminal conviction, immigration...

    Science.gov (United States)

    2010-10-01

    ... Assessment based on criminal conviction, immigration status, or mental capacity. 1515.5 Section 1515.5... criminal conviction, immigration status, or mental capacity. (a) Scope. This section applies to applicants... the immigration status requirements as described in 49 CFR 1572.105. (3) TSA has determined that an...

  20. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  1. [Motivations and barriers of chilean children; threats or opportunities for the implementation of 2013 food based dietary guidelines].

    Science.gov (United States)

    Olivares, Sonia; Zacarías, Isabel; González, Carmen Gloria

    2014-08-01

    Implementation of the updated Food Based Dietary Guidelines (FBDG) for the Chilean population requires the design of innovative strategies and effective. To determine motivations and barriers for children and mothers of preschool-age children to follow new FBDG messages, aiming to identify challenges and opportunities for designing effective communication and implementation strategies. A qualitative study based on 12 focus groups of 9 to 13 age children and 6 focus groups of mothers of preschool-age children, living in the north, central and south regions of the country, to analyze their reaction to each one of the 2013 FBDG messages. Answers of children and mothers did not show differences by gender (in the case of the children) or region of the country. Results show the most frequent and representative comments regarding each message. Challenges to reducing the consumption of foods high in energy, fat, sugar and salt include advertisements and plentiful supply and low prices for these types of foods, both in the school environment and on the street. Opportunities identified included the advertisement of fruits, vegetables and dairy products to promote their consumption, as well as the coming implementation of Law 20.606, which is expected to be an effective way to support this initiative. The results of this study show that the design of strategies based on values, desires and needs of different groups will contribute to optimizing the implementation of the 2013 Chilean FBDG. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  2. Characterizing hospital workers' willingness to report to duty in an influenza pandemic through threat- and efficacy-based assessment

    Directory of Open Access Journals (Sweden)

    Catlett Christina L

    2010-07-01

    Full Text Available Abstract Background Hospital-based providers' willingness to report to work during an influenza pandemic is a critical yet under-studied phenomenon. Witte's Extended Parallel Process Model (EPPM has been shown to be useful for understanding adaptive behavior of public health workers to an unknown risk, and thus offers a framework for examining scenario-specific willingness to respond among hospital staff. Methods We administered an anonymous online EPPM-based survey about attitudes/beliefs toward emergency response, to all 18,612 employees of the Johns Hopkins Hospital from January to March 2009. Surveys were completed by 3426 employees (18.4%, approximately one third of whom were health professionals. Results Demographic and professional distribution of respondents was similar to all hospital staff. Overall, more than one-in-four (28% hospital workers indicated they were not willing to respond to an influenza pandemic scenario if asked but not required to do so. Only an additional 10% were willing if required. One-third (32% of participants reported they would be unwilling to respond in the event of a more severe pandemic influenza scenario. These response rates were consistent across different departments, and were one-third lower among nurses as compared with physicians. Respondents who were hesitant to agree to work additional hours when required were 17 times less likely to respond during a pandemic if asked. Sixty percent of the workers perceived their peers as likely to report to work in such an emergency, and were ten times more likely than others to do so themselves. Hospital employees with a perception of high efficacy had 5.8 times higher declared rates of willingness to respond to an influenza pandemic. Conclusions Significant gaps exist in hospital workers' willingness to respond, and the EPPM is a useful framework to assess these gaps. Several attitudinal indicators can help to identify hospital employees unlikely to respond. The

  3. Revenue-based cost assignment: a potent but hidden threat to the survival of the multispecialty medical practice.

    Science.gov (United States)

    Cooper, Robin; Kramer, Theresa R

    2010-03-01

    To demonstrate detrimental effects of revenue-based cost assignment (RBCA) in clinical practice and to compare that system with activity-based costing (ABC). Four cost-allocation methods including RBCA were applied to a comprehensive ophthalmology practice using typical accounting methods. Data were obtained by a survey of practitioners or practices and/or extracted from decision support and practice management systems. Inaccuracies and distortions in reported costs were enumerated. Accounting scenario analysis was used to predict resultant provider and managerial decisions. A sampling survey was used to analyze other specialties. ABC was applied to the practice. RBCA causes procedures with higher profitability to appear less profitable and those with lower profitability to appear more profitable. The distortion in reported costs, in medical settings, is often sufficient to incentivize providers with higher profitability to exit a practice and those with lower profitability to remain in it. The departure of providers causes the residual practice profits to decline. These detrimental effects occur in many subspecialties, which suggests a national effect on health care. ABC allocation can reduce cost distortions and eliminate detrimental effects. RBCA leads to fragmentation of health care and a reduction in the profitability of multispecialty practices. Its use may slow the updating of reimbursement and help eliminate low-profitability specialties.

  4. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  5. Clinical evaluation of the BioFire FilmArray® BioThreat-E test for the diagnosis of Ebola Virus Disease in Guinea.

    Science.gov (United States)

    Gay-Andrieu, Françoise; Magassouba, N'Fally; Picot, Valentina; Phillips, Cynthia L; Peyrefitte, Christophe N; Dacosta, Brigitte; Doré, Ahmadou; Kourouma, Fode; Ligeon-Ligeonnet, Véronique; Gauby, Corentin; Longuet, Christophe; Scullion, Matt; Faye, Ousmane; Machuron, Jean Louis; Miller, Mark

    2017-07-01

    The recent West Africa Ebola outbreak highlighted the need to provide access to rapid, safe and reliable Ebola Virus Disease diagnostics. The objective of this field study was to assess the clinical performance of the FilmArray ® BioThreat-E test for the detection of Ebola Zaïre virus in whole blood in symptomatic patients suspected of Ebola Virus Disease in Conakry (Guinea) from March to July 2015. The BioThreat-E test was compared to the two RT-PCRs, using serum, implemented at Donka Hospital in the emergency context: an in-house developed quantitative one-step RT-PCR adapted from the Weidmann technique, and the RealStar ® Filovirus RT-PCR Kit 1.0 (Altona-Diagnostics). We also assessed the performance of this assay in noninvasive specimens (urine and saliva) to detect infected patients. Of 135 patients enrolled and eligible for performance assessment on whole blood, the sensitivity was 95.7% [95% CI: 85.5-99.5] and specificity 100% [95% CI: 95.9-100]. Of the 37 symptomatic infected patients able to provide saliva and/or urine samples, 34 of the 35 saliva samples and all 3 of the urine samples were positive with the BioThreat-E test. This study showed that the FilmArray BioThreat-E test performs comparably to conventional molecular tests under field conditions, providing results and interpretation in approximately 1h. Due to its operational characteristics, it can be easily deployed in the field during an epidemic and could also be a useful tool for post-outbreak surveillance. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  7. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  8. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  9. Rainwater Harvesting-based Safe Water Access in Diarrhea-endemic Coastal Communities of Bangladesh under Threats of Climate Change

    Science.gov (United States)

    Akanda, A. S.; Redwan, A. M.; Ali, M. A.; Alam, M.; Jutla, A.; Colwell, R. R.

    2014-12-01

    feasibility and optimum scales and designs of rainwater-harvesting schemes in areas under changing precipitation patterns and coastal sea-level rise. We present preliminary results based on changing rainfall patterns, water budget analysis, and rainwater harvesting potential.

  10. Building Assessment Survey and Evaluation Data (BASE)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Building Assessment Survey and Evaluation (BASE) study was a five year study to characterize determinants of indoor air quality and occupant perceptions in...

  11. Performance-Based Evaluation and School Librarians

    Science.gov (United States)

    Church, Audrey P.

    2015-01-01

    Evaluation of instructional personnel is standard procedure in our Pre-K-12 public schools, and its purpose is to document educator effectiveness. With Race to the Top and No Child Left Behind waivers, states are required to implement performance-based evaluations that demonstrate student academic progress. This three-year study describes the…

  12. performance-based approach to design and evaluation of nuclear security systems for Brazilian nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Tavares, Renato L. A.; Filho, Josélio S. M., E-mail: renato.tavares@cnen.gov.br, E-mail: joselio@cnen.gov.br [Comissão Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Diretoria de Radioproteção e Segurança Nuclear. Divisão de Normas e Segurança Física; Fontes, Gladson S.; Fiel, J.C.B., E-mail: gsfontes@hotmail.com, E-mail: fiel@ime.eb.br [Instituto Militar de Engenharia (SE-7/IME), Rio de Janeiro, RJ (Brazil). Seção de Engenharia Nuclear

    2017-07-01

    This study presents an application of a performance-based approach to definition of requirements, design and evaluation of physical protection systems for nuclear facilities. Such approach considers a probabilistic analysis of the threat, equipment, systems and response forces used to prevent, dissuade and detain malicious acts against the integrity of facilities and the nuclear materials inside them. Nowadays, in the context of Brazilian nuclear facilities licensing, a mostly prescriptive approach is adopted, which despite having advantages such as simplified inspections and homogeneous regulatory requisites amid different fuel cycle facility types, does not consider evolution, dynamism and capacities of external or internal threats to facilities and to Brazilian Nuclear Program itself, neither provides metrics to evaluate system performance facing such threats. In order to preserve actual plans and systems confidentiality, a facility hypothetical model is created, including a research reactor and a waste storage facility. It is expected that the methodology and results obtained in this study serve in the future as a basis to Brazilian nuclear operators, in elaboration process of their Physical Protection Plans, which must comply with future regulation CNEN-NN 2.01, a revision of CNEN-NE 2.01, once that regulation will include performance requisites. (author)

  13. performance-based approach to design and evaluation of nuclear security systems for Brazilian nuclear facilities

    International Nuclear Information System (INIS)

    Tavares, Renato L. A.; Filho, Josélio S. M.; Fontes, Gladson S.; Fiel, J.C.B.

    2017-01-01

    This study presents an application of a performance-based approach to definition of requirements, design and evaluation of physical protection systems for nuclear facilities. Such approach considers a probabilistic analysis of the threat, equipment, systems and response forces used to prevent, dissuade and detain malicious acts against the integrity of facilities and the nuclear materials inside them. Nowadays, in the context of Brazilian nuclear facilities licensing, a mostly prescriptive approach is adopted, which despite having advantages such as simplified inspections and homogeneous regulatory requisites amid different fuel cycle facility types, does not consider evolution, dynamism and capacities of external or internal threats to facilities and to Brazilian Nuclear Program itself, neither provides metrics to evaluate system performance facing such threats. In order to preserve actual plans and systems confidentiality, a facility hypothetical model is created, including a research reactor and a waste storage facility. It is expected that the methodology and results obtained in this study serve in the future as a basis to Brazilian nuclear operators, in elaboration process of their Physical Protection Plans, which must comply with future regulation CNEN-NN 2.01, a revision of CNEN-NE 2.01, once that regulation will include performance requisites. (author)

  14. Risk-based Regulatory Evaluation Program methodology

    International Nuclear Information System (INIS)

    DuCharme, A.R.; Sanders, G.A.; Carlson, D.D.; Asselin, S.V.

    1987-01-01

    The objectives of this DOE-supported Regulatory Evaluation Progrwam are to analyze and evaluate the safety importance and economic significance of existing regulatory guidance in order to assist in the improvement of the regulatory process for current generation and future design reactors. A risk-based cost-benefit methodology was developed to evaluate the safety benefit and cost of specific regulations or Standard Review Plan sections. Risk-based methods can be used in lieu of or in combination with deterministic methods in developing regulatory requirements and reaching regulatory decisions

  15. Threatened freshwater and terrestrial molluscs (Mollusca, Gastropoda et Bivalvia of Santa Catarina State, Southern Brazil: check list and evaluation of regional threats

    Directory of Open Access Journals (Sweden)

    2011-06-01

    Full Text Available A total of nineteen continental native mollusc species are confirmed for the Santa Catarina State (SC(organized in ten Genera and seven Families, one aquatic Prosobranchia/Caenogastropoda (Ampullariidae,six Pulmonata terrestrial gastropods (one Ellobiidae, three Megalobulimidae and two micro-snails –Charopidae and Streptaxidae and twelve freshwater mussels (eight Mycetopodidae and four Hyriidae. Thesespecies are designated by the International Union for Conservation of the Nature – IUCN as follows: seven as"Vulnerable", six "In Danger" and six “Without Category Established”. The general regional threats that thesespecies are subjected to are briefly analyzed.

  16. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available ? Acting on opportunity Taking revenge for perceived injustice Making a statement Doing competitor s bidding Seeing themselves as a future competition INSIDER THREATS | Combating it! Darshan Lakha 7 5 January 2017 General Investigations...! Darshan Lakha 11 5 January 2017 Monitor user actions Use auditing to monitor access to files Examine cached Web files Monitor Web access at the firewall Monitor incoming and outgoing e-mail messages Control what software employees can install...

  17. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  18. Financial Derivatives (Based on Two Supports Evaluation

    Directory of Open Access Journals (Sweden)

    Tiberiu Socaciu

    2016-07-01

    Full Text Available In this paper we build a PDE like Black-Scholes equation in hypothesis of a financial derivative that is dependent on two supports (usual is dependent only on one support, like amoption based on gold, when national currency has a great float.Keywords: Financial derivatives, derivatives evaluation, derivatives based on two supports, extended Itō like lemma.

  19. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    International Nuclear Information System (INIS)

    Koh, Moonsung; Jung, Myungtak

    2015-01-01

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities

  20. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Jung, Myungtak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities.

  1. Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions

    OpenAIRE

    Kray, Laura J.; Shirako, Aiwa

    2009-01-01

    This chapter explores stereotype threat in organizational contexts. Building on the understanding that stereotype threat involves concerns about confirming a negative stereotype about one’s group, we begin by elucidating the scope of potential stereotype threat effects in organizations. We first examine the ubiquity of evaluations in organizations, which are at the heart of stereotype threat. Next we specify the potential psychological consequences of stereotype threat on targeted individua...

  2. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  3. Mobile based optical form evaluation system

    Directory of Open Access Journals (Sweden)

    Asım Sinan YÜKSEL

    2016-05-01

    Full Text Available Optical forms that contain multiple-choice answers are widely used both for electing students and evaluating student achievements in education systems in our country and worldwide. Optical forms are evaluated by employing optical mark recognition techniques through optical readers. High cost of these machines, limited access to them, long waiting time for evaluation results make the process hard for educationists working in cities or countries. In this study, a mobile application was developed for the educationists who own mobile phones or tablets for the purpose of evaluating students' answer sheets quickly and independent of location and optical readers. Optical form recognition, reading and evaluation processes are done on the image of student's answer sheet that is taken with the mobile phone or tablet of educationist. The Android based mobile application that we developed has a user-friendly interface, high success rate and is the first of our knowledge application that operates on mobile platforms in this field.

  4. Conventional and New Ways of Governing Forest Threats: A Study of Stakeholder Coherence in Sweden

    Science.gov (United States)

    Eriksson, Louise

    2018-01-01

    Based on a framework for analyzing stakeholder coherence horizontally and vertically, the present study examined the governance of forest threats in Sweden. Opinions of forest risk governance in stakeholder groups with and without a connection to private forestry were compared ( n = 2496) and the opinions were analyzed in relation to current governance practices. More specifically, forest threat appraisals, trust in the Swedish Forest Agency (SFA), and the acceptability of forest risk policy measures directed at private forest owners were assessed. Results revealed an overall coherence between different stakeholders in this context. However, the groups differed in, for example, the acceptability of the hypothetical regulative measure aiming to reduce damages threatening the forest long-term (e.g., climate change). Furthermore, an extensive use of advice for a fee may challenge particularly the internal, but also the external, legitimacy of forest risk governance. The forest owner stakeholder group showed lower threat appraisals when evaluating threat to one's own forest rather than to the Swedish forest, except regarding browsing by animals. Regulations were not disapproved of in any of the stakeholder groups, although the forest owner group generally displayed higher acceptability of encouraging measures compared to the general public. Trust in the SFA was furthermore confirmed as an important driver of policy acceptability, and higher threat appraisals of novel threats, such as climate change and fire, resulted in a higher acceptability of measures less central or new in this context. The value of analyzing stakeholder coherence for natural resource management and governance is discussed.

  5. Conventional and New Ways of Governing Forest Threats: A Study of Stakeholder Coherence in Sweden.

    Science.gov (United States)

    Eriksson, Louise

    2018-01-01

    Based on a framework for analyzing stakeholder coherence horizontally and vertically, the present study examined the governance of forest threats in Sweden. Opinions of forest risk governance in stakeholder groups with and without a connection to private forestry were compared (n = 2496) and the opinions were analyzed in relation to current governance practices. More specifically, forest threat appraisals, trust in the Swedish Forest Agency (SFA), and the acceptability of forest risk policy measures directed at private forest owners were assessed. Results revealed an overall coherence between different stakeholders in this context. However, the groups differed in, for example, the acceptability of the hypothetical regulative measure aiming to reduce damages threatening the forest long-term (e.g., climate change). Furthermore, an extensive use of advice for a fee may challenge particularly the internal, but also the external, legitimacy of forest risk governance. The forest owner stakeholder group showed lower threat appraisals when evaluating threat to one's own forest rather than to the Swedish forest, except regarding browsing by animals. Regulations were not disapproved of in any of the stakeholder groups, although the forest owner group generally displayed higher acceptability of encouraging measures compared to the general public. Trust in the SFA was furthermore confirmed as an important driver of policy acceptability, and higher threat appraisals of novel threats, such as climate change and fire, resulted in a higher acceptability of measures less central or new in this context. The value of analyzing stakeholder coherence for natural resource management and governance is discussed.

  6. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  7. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  8. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    In 1945 the United Nations was founded with one major goal in mind, and I quote, 'to save succeeding generations from the scourge of war.' The founders noted that twice in the 20th Century major wars had brought 'untold sorrow to mankind.' Since its founding, 191 nations have joined the UN. We have no other place where all nations can work together for peace, a place where we can use verbal conflict rather than armed conflict to solve problems. And often, the UN, with US support, has provided armed force to help ensure the peace. The entire planet now faces global challenges including ensuring bio-diversity and ending the destruction of thousands of species; reversing the depletion of fishing stocks; controlling ocean dumping; preventing ozone depletion; halting global warming; controlling and eliminating terrorism and weapons of mass destruction; fighting pandemic diseases; ending the tragedy of crushing poverty and lack of clean drinking water; and addressing crises arising from failed States. No nation or even a small group of nations can succeed in addressing these issues alone. The United Nations is based on political insights that have led to successful governance principles and enhanced the wealth of nations. These values include market freedoms, religious liberty, an independent judiciary, government transparency and accountability, democracy, and a high level of respect for civil liberties and human rights. They have evolved into nearly universal goals and norms. The countries that have adhered to these principles are the most secure and healthy. The United Nations is guided by such countries, and simultaneously provides the only viable forum for the expression of the aspirations of the poor and the weak. The establishment of international norms of conduct is where idealism informs realism. We are called to nothing less than moral leadership. When moral leadership is coupled with power, it galvanizes the world. Moral leadership requires living up to one

  9. Maintenance evaluation using risk based criteria

    International Nuclear Information System (INIS)

    Torres Valle, A.

    1996-01-01

    The maintenance evaluation is currently performed by using economic and, in some case, technical equipment failure criteria, however this is done to a specific equipment level. In general, when statistics are used the analysis for maintenance optimization are made isolated and whit a post mortem character; The integration provided by mean of Probabilistic Safety assessment (PSA) together with the possibilities of its applications, allow for evaluation of maintenance on the basis of broader scope criteria in regard to those traditionally used. The evaluate maintenance using risk based criteria, is necessary to follow a dynamic and systematic approach, in studying the maintenance strategy, to allow for updating the initial probabilistic models, for including operational changes that often take place during operation of complex facilities. This paper proposes a dynamic evaluation system of maintenance task. The system is illustrated by means of a practical example

  10. Can experience overcome stereotypes in times of terror threat?

    Directory of Open Access Journals (Sweden)

    Mirya R. Holman

    2017-02-01

    Full Text Available Research on evaluations of leaders has frequently found that female leaders receive lower ratings in times of national security crisis. However, less is known about countervailing factors. We contend that partisanship and leadership experience in relevant domains are two factors that can counteract the negative effects of terrorist threat on evaluations of female political leaders. To test this expectation, we implemented a national study in 2012 containing terrorist threat and non-threat conditions, and then asked participants to evaluate political leaders. The results show that Republican leaders, including women, are unaffected by terrorist threat; in contrast, Democratic leaders are punished during times of terrorist threat, but this negative effect is smaller for then-Secretary of State Hillary Clinton compared to Nancy Pelosi, who lacks similar experience. In short, Republican partisanship is a strong countervailing factor, while leadership experience in national security more modestly countervails.

  11. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  12. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  13. Theory-Based Evaluation Meets Ambiguity

    DEFF Research Database (Denmark)

    Dahler-Larsen, Peter

    2017-01-01

    As theory-based evaluation (TBE) engages in situations where multiple stakeholders help develop complex program theory about dynamic phenomena in politically contested settings, it becomes difficult to develop and use program theory without ambiguity. The purpose of this article is to explore...... ambiguity as a fruitful perspective that helps TBE face current challenges. Literatures in organization theory and political theory are consulted in order to cultivate the concept of ambiguity. Janus variables (which work in two ways) and other ambiguous aspects of program theories are classified...... and exemplified. Stances towards ambiguity are considered, as are concrete steps that TBE evaluators can take to identify and deal with ambiguity in TBE....

  14. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  15. A Boosting Algorithm Based Method to Predict Cyber-Threats Situation of Power Information Network%采用Boosting方法预测电力信息网络的威胁态势

    Institute of Scientific and Technical Information of China (English)

    徐茹枝; 王婧; 朱少敏; 许瑞辉

    2013-01-01

    The prediction of cyber-threats situation can effectively reflect the macroscopic security situation of power information network in the future time. To realize the accurate prediction of cyber-threats situation, an AdaBoosting algorithm based cyber-threats situation prediction method for information network is proposed. In the proposed method, the values of cyber-threats situation are used to describe the macroscopic security situation of power information network, and the prediction of macroscopic security situation is abstracted to a regression problem, and then the regression problem is solved by AdaBoosting algorithm. Firstly, using the sliding time window a time series sample set is constructed by cyber-threats situation values;then the sample set is input into AdaBoosting algorithm to be trained to obtain a regression analysis model;finally the prediction of cyber-threats situation is completed by the regression analysis model. Finally, the effectiveness of the proposed method is verified by results of replication experiments based on field data.%威胁态势预测可以有效反映电力信息网络在未来时刻的宏观安全状况。为实现威胁态势的精确预测,提出一种基于AdaBoosting方法的网络威胁态势预测方法。该方法采用威胁态势值描述电力信息网络的宏观安全态势,并将威胁态势值的预测抽象为回归问题,进而利用AdaBoosting方法求解。该方法先利用滑动时间窗口将威胁态势值构造成时间序列样本集,再将样本集输入到AdaBoosting方法中训练,以得到回归分析模型,并利用该模型完成威胁态势预测。最后基于现场数据的验证性实验证明了所提方法的有效性。

  16. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  17. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  18. Gauging U.S. Emergency Medical Services workers' willingness to respond to pandemic influenza using a threat- and efficacy-based assessment framework.

    Directory of Open Access Journals (Sweden)

    Daniel J Barnett

    2010-03-01

    Full Text Available Emergency Medical Services workers' willingness to report to duty in an influenza pandemic is essential to healthcare system surge amidst a global threat. Application of Witte's Extended Parallel Process Model (EPPM has shown utility for revealing influences of perceived threat and efficacy on non-EMS public health providers' willingness to respond in an influenza pandemic. We thus propose using an EPPM-informed assessment of EMS workers' perspectives toward fulfilling their influenza pandemic response roles.We administered an EPPM-informed snapshot survey about attitudes and beliefs toward pandemic influenza response, to a nationally representative, stratified random sample of 1,537 U.S. EMS workers from May-June 2009 (overall response rate: 49%. Of the 586 respondents who met inclusion criteria (currently active EMS providers in primarily EMS response roles, 12% indicated they would not voluntarily report to duty in a pandemic influenza emergency if asked, 7% if required. A majority (52% indicated their unwillingness to report to work if risk of disease transmission to family existed. Confidence in personal safety at work (OR = 3.3 and a high threat/high efficacy ("concerned and confident" EPPM profile (OR = 4.7 distinguished those who were more likely to voluntarily report to duty. Although 96% of EMS workers indicated that they would probably or definitely report to work if they were guaranteed a pandemic influenza vaccine, only 59% had received an influenza immunization in the preceding 12 months.EMS workers' response willingness gaps pose a substantial challenge to prehospital surge capacity in an influenza pandemic. "Concerned and confident" EMS workers are more than four times as likely to fulfill pandemic influenza response expectations. Confidence in workplace safety is a positively influential modifier of their response willingness. These findings can inform insights into interventions for enhancing EMS workers' willingness to respond

  19. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  20. An evaluation of web-based information.

    Science.gov (United States)

    Murphy, Rebecca; Frost, Susie; Webster, Peter; Schmidt, Ulrike

    2004-03-01

    To evaluate the quality of web-based information on the treatment of eating disorders and to investigate potential indicators of content quality. Two search engines were queried to obtain 15 commonly accessed websites about eating disorders. Two reviewers evaluated the characteristics, quality of content, and accountability of the sites. Intercorrelations between variables were calculated. The overall quality of the sites was poor based on the outcome measures used. All quality of content measures correlated with a measure of accountability (Silberg, W.M., Lundberg, G.D., & Mussachio, R.A., 1993). There is a lack of quality information on the treatment of eating disorders on the web. Although accountability criteria may be useful indicators of content quality, there is a need to investigate whether these can be usefully applied to other mental health areas. Copyright 2004 by Wiley Periodicals, Inc. Int J Eat Disord 35: 145-154, 2004.

  1. TANDI: threat assessment of network data and information

    Science.gov (United States)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  2. Astrology Pseudoscience and a Discussion About Its Threats to Society

    Directory of Open Access Journals (Sweden)

    Tevfik UYAR

    2016-05-01

    Full Text Available Astrology, a pseudoscience, is highly popular in Turkey. Astrologers, who are its practitioners, produce discourses in the scientific field at the media and at their own platforms. Furthermore, it is possible to find some instances of astrology related activities in Turkish universities. In this article, demarcation of science from pseudoscience and the pseudoscientific status of astrology were discussed in a first place. Next, threats of astrological discourse within economic, educational and medical fields and their threats to society were expressed with some examples. Instances of the astrological activities within higher education institutions, such as an astrology-based master degree thesis, the astrology certificate programs, and an astrology column in an official medical school magazine were evaluated, and it was put forward that they contributed to increase the level of threat and it was also claimed that the existence of astrological activities in the universities contradicts the main purpose and principles of the higher education. In conclusion, some regulatory actions like the implementation of the scientific literacy and demarcation problem to each level of educational curriculum, a general policy for excluding the pseudoscience from higher education institutions and a recommended health warning at the top of the astrology were suggested.

  3. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  4. Biological Threats Detection Technologies

    International Nuclear Information System (INIS)

    Bartoszcze, M.

    2007-01-01

    Among many decisive factors, which can have the influence on the possibility of decreases the results of use biological agents should be mentioned obligatory: rapid detection and identification of biological factor used, the proper preventive treatment and the medical management. The aims of identification: to identify the factor used, to estimate the area of contamination, to evaluate the possible countermeasure efforts (antibiotics, disinfectants) and to assess the effectiveness of the decontamination efforts (decontamination of the persons, equipment, buildings, environment etc.). The objects of identification are: bacteria and bacteria's spores, viruses, toxins and genetically modified factors. The present technologies are divided into: based on PCR techniques (ABI PRISM, APSIS, BIOVERIS, RAPID), immuno (BADD, RAMP, SMART) PCR and immuno techniques (APDS, LUMINEX) and others (BDS2, LUNASCAN, MALDI). The selected technologies assigned to field conditions, mobile and stationary laboratories will be presented.(author)

  5. UNIX-based operating systems robustness evaluation

    Science.gov (United States)

    Chang, Yu-Ming

    1996-01-01

    Robust operating systems are required for reliable computing. Techniques for robustness evaluation of operating systems not only enhance the understanding of the reliability of computer systems, but also provide valuable feed- back to system designers. This thesis presents results from robustness evaluation experiments on five UNIX-based operating systems, which include Digital Equipment's OSF/l, Hewlett Packard's HP-UX, Sun Microsystems' Solaris and SunOS, and Silicon Graphics' IRIX. Three sets of experiments were performed. The methodology for evaluation tested (1) the exception handling mechanism, (2) system resource management, and (3) system capacity under high workload stress. An exception generator was used to evaluate the exception handling mechanism of the operating systems. Results included exit status of the exception generator and the system state. Resource management techniques used by individual operating systems were tested using programs designed to usurp system resources such as physical memory and process slots. Finally, the workload stress testing evaluated the effect of the workload on system performance by running a synthetic workload and recording the response time of local and remote user requests. Moderate to severe performance degradations were observed on the systems under stress.

  6. Ontology Based Quality Evaluation for Spatial Data

    Science.gov (United States)

    Yılmaz, C.; Cömert, Ç.

    2015-08-01

    Many institutions will be providing data to the National Spatial Data Infrastructure (NSDI). Current technical background of the NSDI is based on syntactic web services. It is expected that this will be replaced by semantic web services. The quality of the data provided is important in terms of the decision-making process and the accuracy of transactions. Therefore, the data quality needs to be tested. This topic has been neglected in Turkey. Data quality control for NSDI may be done by private or public "data accreditation" institutions. A methodology is required for data quality evaluation. There are studies for data quality including ISO standards, academic studies and software to evaluate spatial data quality. ISO 19157 standard defines the data quality elements. Proprietary software such as, 1Spatial's 1Validate and ESRI's Data Reviewer offers quality evaluation based on their own classification of rules. Commonly, rule based approaches are used for geospatial data quality check. In this study, we look for the technical components to devise and implement a rule based approach with ontologies using free and open source software in semantic web context. Semantic web uses ontologies to deliver well-defined web resources and make them accessible to end-users and processes. We have created an ontology conforming to the geospatial data and defined some sample rules to show how to test data with respect to data quality elements including; attribute, topo-semantic and geometrical consistency using free and open source software. To test data against rules, sample GeoSPARQL queries are created, associated with specifications.

  7. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    NARCIS (Netherlands)

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  8. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  9. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  10. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  11. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  12. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  13. Laboratory and field based evaluation of chromatography ...

    Science.gov (United States)

    The Monitor for AeRosols and GAses in ambient air (MARGA) is an on-line ion-chromatography-based instrument designed for speciation of the inorganic gas and aerosol ammonium-nitrate-sulfate system. Previous work to characterize the performance of the MARGA has been primarily based on field comparison to other measurement methods to evaluate accuracy. While such studies are useful, the underlying reasons for disagreement among methods are not always clear. This study examines aspects of MARGA accuracy and precision specifically related to automated chromatography analysis. Using laboratory standards, analytical accuracy, precision, and method detection limits derived from the MARGA chromatography software are compared to an alternative software package (Chromeleon, Thermo Scientific Dionex). Field measurements are used to further evaluate instrument performance, including the MARGA’s use of an internal LiBr standard to control accuracy. Using gas/aerosol ratios and aerosol neutralization state as a case study, the impact of chromatography on measurement error is assessed. The new generation of on-line chromatography-based gas and particle measurement systems have many advantages, including simultaneous analysis of multiple pollutants. The Monitor for Aerosols and Gases in Ambient Air (MARGA) is such an instrument that is used in North America, Europe, and Asia for atmospheric process studies as well as routine monitoring. While the instrument has been evaluat

  14. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  15. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  16. Credit risk evaluation based on social media.

    Science.gov (United States)

    Yang, Yang; Gu, Jing; Zhou, Zongfang

    2016-07-01

    Social media has been playing an increasingly important role in the sharing of individuals' opinions on many financial issues, including credit risk in investment decisions. This paper analyzes whether these opinions, which are transmitted through social media, can accurately predict enterprises' future credit risk. We consider financial statements oriented evaluation results based on logit and probit approaches as the benchmarks. We then conduct textual analysis to retrieve both posts and their corresponding commentaries published on two of the most popular social media platforms for financial investors in China. Professional advice from financial analysts is also investigated in this paper. We surprisingly find that the opinions extracted from both posts and commentaries surpass opinions of analysts in terms of credit risk prediction. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  18. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  19. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  20. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  1. 'I'm Black and I'm Proud': A Majority Ecological Context Protects Affective Aspects of Black Identity Under Stereotype Threat.

    Science.gov (United States)

    Oliver, Andre'; Andemeskel, Ghilamichael; King, Carlise R; Wallace, Lyndsey; McDougal, Serie; Monteiro, Kenneth P; Ben-Zeev, Avi

    2017-12-01

    We provide evidence that stereotype threat, a phenomenon that causes stigmatized individuals to experience group-based evaluative concerns (Steele in Am Psychol 52:613-629, 1997; Whistling Vivaldi and other clues to how stereotypes affect us, W.W. Norton, New York, 2010), impacts affective aspects of Black identity as a function of majority versus minority ecological contexts. Black/African-American students, enrolled in either Africana Studies (Black ecological majority) or Psychology (Black ecological minority), completed private and public regard subscales from the Multidimensional Inventory of Black Identity (Sellers et al. in Pers Soc Psychol Rev 2:18-39, 1998) at baseline (Time 1) and after being randomly assigned to a stereotype threat or no-threat/control condition (Time 2). In threat, participants were introduced to a 'puzzle' task as diagnostic of intellectual abilities, whereas in no-threat the same task was introduced as culture fair, such that people from different racial/ethnic groups had performed similarly on this task in the past. In Psychology, students under threat exhibited a simultaneous decrease and increase in private and public regard, respectively, a pattern shown in the literature to be associated with discrimination-based distress and lesser well-being in Black ecological minority environments. In contrast, Africana Studies students' racial identity under threat remained intact. We discuss the protective effects of Africana Studies on racial identity and implications for educational reform.

  2. Perceived Threat and Corroboration: Key Factors That Improve a Predictive Model of Trust in Internet-based Health Information and Advice

    Science.gov (United States)

    Harris, Peter R; Briggs, Pam

    2011-01-01

    Background How do people decide which sites to use when seeking health advice online? We can assume, from related work in e-commerce, that general design factors known to affect trust in the site are important, but in this paper we also address the impact of factors specific to the health domain. Objective The current study aimed to (1) assess the factorial structure of a general measure of Web trust, (2) model how the resultant factors predicted trust in, and readiness to act on, the advice found on health-related websites, and (3) test whether adding variables from social cognition models to capture elements of the response to threatening, online health-risk information enhanced the prediction of these outcomes. Methods Participants were asked to recall a site they had used to search for health-related information and to think of that site when answering an online questionnaire. The questionnaire consisted of a general Web trust questionnaire plus items assessing appraisals of the site, including threat appraisals, information checking, and corroboration. It was promoted on the hungersite.com website. The URL was distributed via Yahoo and local print media. We assessed the factorial structure of the measures using principal components analysis and modeled how well they predicted the outcome measures using structural equation modeling (SEM) with EQS software. Results We report an analysis of the responses of participants who searched for health advice for themselves (N = 561). Analysis of the general Web trust questionnaire revealed 4 factors: information quality, personalization, impartiality, and credible design. In the final SEM model, information quality and impartiality were direct predictors of trust. However, variables specific to eHealth (perceived threat, coping, and corroboration) added substantially to the ability of the model to predict variance in trust and readiness to act on advice on the site. The final model achieved a satisfactory fit: χ2 5 = 10

  3. Evaluation of the threat of marine CO2 leakage-associated acidification on the toxicity of sediment metals to juvenile bivalves

    International Nuclear Information System (INIS)

    Basallote, M. Dolores; Rodríguez-Romero, Araceli; De Orte, Manoela R.; Del Valls, T. Ángel; Riba, Inmaculada

    2015-01-01

    Highlights: • Short-term tests using juveniles of bivalves to study the effects of CO 2 dissolved. • CO 2 causes effects if the threshold concentration of the organism is overlapped. • Flows of escaped CO 2 would affect the geochemical composition of sediment–seawater. • CO 2 -induced acidification would affect differently to marine sediment toxicity. - Abstract: The effects of the acidification associated with CO 2 leakage from sub-seabed geological storage was studied by the evaluation of the short-term effects of CO 2 -induced acidification on juveniles of the bivalve Ruditapes philippinarum. Laboratory scale experiments were performed using a CO 2 -bubbling system designed to conduct ecotoxicological assays. The organisms were exposed for 10 days to elutriates of sediments collected in different littoral areas that were subjected to various pH treatments (pH 7.1, 6.6, 6.1). The acute pH-associated effects on the bivalves were observed, and the dissolved metals in the elutriates were measured. The median toxic effect pH was calculated, which ranged from 6.33 to 6.45. The amount of dissolved Zn in the sediment elutriates increased in parallel with the pH reductions and was correlated with the proton concentrations. The pH, the pCO 2 and the dissolved metal concentrations (Zn and Fe) were linked with the mortality of the exposed bivalves

  4. The sound of danger: threat sensitivity to predator vocalizations, alarm calls, and novelty in gulls.

    Directory of Open Access Journals (Sweden)

    Sarah A MacLean

    Full Text Available The threat sensitivity hypothesis predicts that organisms will evaluate the relative danger of and respond differentially to varying degrees of predation threat. Doing so allows potential prey to balance the costs and benefits of anti-predator behaviors. Threat sensitivity has undergone limited testing in the auditory modality, and the relative threat level of auditory cues from different sources is difficult to infer across populations when variables such as background risk and experience are not properly controlled. We experimentally exposed a single population of two sympatric gull species to auditory stimuli representing a range of potential threats in order to compare the relative threat of heterospecific alarm calls, conspecific alarms calls, predator vocalizations, and novel auditory cues. Gulls were able to discriminate among a diverse set of threat indicators and respond in a graded manner commensurate with the level of threat. Vocalizations of two potential predators, the human voice and bald eagle call, differed in their threat level compared to each other and to alarm calls. Conspecific alarm calls were more threatening than heterospecfic alarm calls to the larger great black-backed gull, but the smaller herring gull weighed both equally. A novel cue elicited a response intermediate between known threats and a known non-threat in herring gulls, but not great black-backed gulls. Our results show that the relative threat level of auditory cues from different sources is highly species-dependent, and that caution should be exercised when comparing graded and threshold threat sensitive responses.

  5. Evaluation of the threat of marine CO{sub 2} leakage-associated acidification on the toxicity of sediment metals to juvenile bivalves

    Energy Technology Data Exchange (ETDEWEB)

    Basallote, M. Dolores, E-mail: dolores.basallote@uca.es [Cátedra UNESCO/UNITWIN WiCop, Departamento de Química-Física, Facultad de Ciencias del Mar y Ambientales, Universidad de Cádiz, Polígono Río San Pedro s/n, 11510 Puerto Real, Cádiz (Spain); Rodríguez-Romero, Araceli [Departamento de Ecología y Gestión Costera, Instituto de Ciencias Marinas de Andalucía (CSIC), Campus Río San Pedro, 11510 Puerto Real, Cádiz (Spain); De Orte, Manoela R.; Del Valls, T. Ángel; Riba, Inmaculada [Cátedra UNESCO/UNITWIN WiCop, Departamento de Química-Física, Facultad de Ciencias del Mar y Ambientales, Universidad de Cádiz, Polígono Río San Pedro s/n, 11510 Puerto Real, Cádiz (Spain)

    2015-09-15

    Highlights: • Short-term tests using juveniles of bivalves to study the effects of CO{sub 2} dissolved. • CO{sub 2} causes effects if the threshold concentration of the organism is overlapped. • Flows of escaped CO{sub 2} would affect the geochemical composition of sediment–seawater. • CO{sub 2}-induced acidification would affect differently to marine sediment toxicity. - Abstract: The effects of the acidification associated with CO{sub 2} leakage from sub-seabed geological storage was studied by the evaluation of the short-term effects of CO{sub 2}-induced acidification on juveniles of the bivalve Ruditapes philippinarum. Laboratory scale experiments were performed using a CO{sub 2}-bubbling system designed to conduct ecotoxicological assays. The organisms were exposed for 10 days to elutriates of sediments collected in different littoral areas that were subjected to various pH treatments (pH 7.1, 6.6, 6.1). The acute pH-associated effects on the bivalves were observed, and the dissolved metals in the elutriates were measured. The median toxic effect pH was calculated, which ranged from 6.33 to 6.45. The amount of dissolved Zn in the sediment elutriates increased in parallel with the pH reductions and was correlated with the proton concentrations. The pH, the pCO{sub 2} and the dissolved metal concentrations (Zn and Fe) were linked with the mortality of the exposed bivalves.

  6. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  7. Clinical evaluation based on cost-effectiveness

    International Nuclear Information System (INIS)

    Inoue, Takehiro; Inoue, Toshihiko

    1998-01-01

    We carried out two Phase III clinical trials using high dose rate (HDR) remote afterloading brachytherapy unit. We evaluated the clinical results based not only on the medical but also the economical standpoint. The first trial is the Phase III trial for cervical cancer treated with HDR or medium dose rate (MDR) intracavitary radiotherapy. The second one is the Phase III trial for tongue cancer treated with HDR or low dose rate (LDR) interstitial radiation. For cervical cancer, the survival rate of patients treated with HDR brachytherapy is the some as for LDR brachytherapy. The average total cost of treatment for the HDR group was 1.47 million yen, while that for the MDR group was 1.58 million yen. The average total admission days was 63. For tongue cancer, the local control rate of the HDR group is almost the same as that of the LDR groups. The average total cost for the HDR group was 780 thousand yen, and that for the LDR group was 830 thousand yen. The average total admission days was 34. According to the cost-effectiveness, HDR brachytherapy for cervical cancer has the same result as MDR, and HDR brachytherapy for tongue cancer has the same result as LDR. However, HDR can be treated without admission for patients who live near the hospital. HDR can be applied for these patients with less expense. We must be aware of not only the medical results but also the cost-effectiveness. (author)

  8. Research on the Optimization of Air Route in Air-interception Based on Threat Situation%基于态势威胁的歼击机截击航路优化方法研究

    Institute of Scientific and Technical Information of China (English)

    李俊; 林云; 韩玉龙; 章世峰; 王兆军

    2016-01-01

    针对如何设计截击空战中的接敌阶段的航路问题,提出基于扩大对敌威胁因子的航路设计算法。根据双方飞机性能与挂载武器性能,改进了飞机的机动模型和威胁因子模型,将截击过程分成若干时间段,建立相对态势威胁与飞机机动策略之间的函数关系,得出每个时间段内对敌威胁最大的策略,视为在该时间段内的最优策略,将每个时间段内做出最优策略后的飞机所在坐标连续记录,即为截击飞机的最优航路。最后对随机假想的初始态势利用 MATLAB 软件进行仿真计算,结果表明:利用该算法可以得到歼击机在截击接敌段的最优航路。%According to the problem that how to design the air route when get approach in air‐interception ,this paper puts forward an algorithm to design air route based on increasing the threat factor to enemy .The battleplane’s mobility model and threat factor model are improved according to the ability of battleplane and airborne weapons system of two side .The time for air‐interception is cut to many little parts ,and a relationship between the threat factor and the battleplane’s mobility strategy in every part are built up to get a best mobility strategy for increasing the threat factor ,recording the coordinate of the battleplane after doing the best strategy continuously ,to get a best air route in target approach of air‐interception .At last ,an example is given to simulate with Matlab ,get an optimized air route in target approach of air‐interception.

  9. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  10. Precision toxicology based on single cell sequencing: an evolving trend in toxicological evaluations and mechanism exploration.

    Science.gov (United States)

    Zhang, Boyang; Huang, Kunlun; Zhu, Liye; Luo, Yunbo; Xu, Wentao

    2017-07-01

    In this review, we introduce a new concept, precision toxicology: the mode of action of chemical- or drug-induced toxicity can be sensitively and specifically investigated by isolating a small group of cells or even a single cell with typical phenotype of interest followed by a single cell sequencing-based analysis. Precision toxicology can contribute to the better detection of subtle intracellular changes in response to exogenous substrates, and thus help researchers find solutions to control or relieve the toxicological effects that are serious threats to human health. We give examples for single cell isolation and recommend laser capture microdissection for in vivo studies and flow cytometric sorting for in vitro studies. In addition, we introduce the procedures for single cell sequencing and describe the expected application of these techniques to toxicological evaluations and mechanism exploration, which we believe will become a trend in toxicology.

  11. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  12. Combining Internal and External Evaluation: A Case for School-Based Evaluation.

    Science.gov (United States)

    Nevo, David

    1994-01-01

    School-based evaluation, the focus of this article, is conceived of as neither a synonym for internal evaluation nor an antonym for external evaluation, but as a combination that is examined through a review of recent research. A school-based evaluation in Israel illustrates combining these approaches in a complementary way. (SLD)

  13. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  14. Familiarity Threat Arguement Revisited

    DEFF Research Database (Denmark)

    Warming-Rasmussen, Bent; Aschauer, Ewald

    2013-01-01

    Abstract: Trust between auditors and their clients is commonly thought to threaten auditors’ professional skepticism and thus compromise audit quality, although a systematic review of auditing literature provides an ambiguous picture. We close this gap by investigating the impact of auditors’ trust...... in their clients on the clients’ perceptions of their auditors’ professional skepticism. Further, we investigate the impact of auditor /audit firm tenure, non-audit services (NAS) and auditors’ confidence in their clients. We employ a two-study design. First, in a qualitative study conducted among auditors...... and clients, we identify their subjective theories of trust and discuss them against the backdrop of recent trust research to develop four hypotheses. In the second study, the hypotheses are tested in an OLS regression based on data from 218 auditor-client dyads in Germany. Then, our interpretations...

  15. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  16. Decentralised bioenergy systems: A review of opportunities and threats

    International Nuclear Information System (INIS)

    Mangoyana, Robert B.; Smith, Timothy F.

    2011-01-01

    Decentralised bioenergy systems are receiving increasing attention due to the potential ability to support local development, create local employment, and contribute to climate change mitigation. These issues, along with other bioenergy sustainability issues, are reviewed through eighteen international case studies with the objective of identifying opportunities and threats to decentralised bioenergy systems. The case studies were selected based on feedstock type, bioenergy type, production capacity, synergistic alliances, ownership structure and physical locations. This variation was used to provide a basis for evaluating opportunities and threats from different contexts. Commercial viability remains the primary concern for the sustainability of decentralised bioenergy systems. There are, however, opportunities for compounding benefits through integrating small scale decentralised bioenergy systems with other production systems. Integrated production, including closed loop models, allow waste materials from one process to be used as inputs in other production processes, and thereby increasing economic, social and environmental outcomes. Synergistic opportunities along the bioenergy production chain, which include feedstock production, bioenergy marketing and distribution could also be exploited by communities and other investors to minimise decentralised production risk. - Research Highlights: → Small scale decentralised bioenergy production is a potentially sustainable energy system. →Economic viability limits small scale decentralised bioenergy production. → Synergistic alliances along the bioenergy production chain could enhance viability.

  17. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  18. Phishing - A Growing Threat to E-Commerce

    OpenAIRE

    Banday, M. Tariq; Qadri, Jameel A.

    2011-01-01

    In today's business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing - a constantly growing and evolving threat to Internet based commercial transactions. Various phishing approaches that include vishing, spear phishng, pharming, keyl...

  19. Entry Threat and Entry Deterrence: The Timing of Broadband Rollout

    OpenAIRE

    Mo Xiao; Peter F. Orazem

    2007-01-01

    Past empirical literature provides strong evidence that competition increases when new firms enter a market. However, rarely have economists been able to examine how competition changes with the threat of entry. This paper uses the evolution of the zip code level market structure of facilities-based broadband providers from 1999 to 2004 to investigate how a firm adjusts its entry strategy when facing the threat of additional entrants. We identify the potential entrant into a local market as t...

  20. Software Requirement Specifications For ASocial Media Threat Assessment Tool

    Science.gov (United States)

    2017-12-01

    media means a much higher volume of threats than before, which taxes law enforcement’s ability to investigate each one. Complicating the investigation...Obtaining the identity of a Twitter account holder requires court paperwork based on probable cause or exigent circumstances. Second, social media...instant connectivity of social media means a much higher number of threats than before, which taxes law enforcement’s ability to investigate each one

  1. Evaluation of asphalt treated permeable base.

    Science.gov (United States)

    2013-12-01

    III : Tec : hnical : Report Documentation Page : 1. Report No. : 2. Government Accession : No. : 3. Recipient's Catalog No : . : 201 : 3 : - : 09 : - : - : - : - : - : - : 4. Title and Subtitle : 5. Report Date : Evaluation of Asphalt Treated Permeab...

  2. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  3. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  4. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  5. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  6. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  7. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  8. Bomb Threats Taking Financial Toll

    Science.gov (United States)

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  9. Modeling threat assessments of water supply systems using markov latent effects methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Consuelo Juanita

    2006-12-01

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  10. PSA-based evaluation and rating of operational events

    International Nuclear Information System (INIS)

    Gomez Cobo, A.

    1997-01-01

    The presentation discusses the PSA-based evaluation and rating of operational events, including the following: historical background, procedures for event evaluation using PSA, use of PSA for event rating, current activities

  11. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  12. Building a community-based culture of evaluation.

    Science.gov (United States)

    Janzen, Rich; Ochocka, Joanna; Turner, Leanne; Cook, Tabitha; Franklin, Michelle; Deichert, Debbie

    2017-12-01

    In this article we argue for a community-based approach as a means of promoting a culture of evaluation. We do this by linking two bodies of knowledge - the 70-year theoretical tradition of community-based research and the trans-discipline of program evaluation - that are seldom intersected within the evaluation capacity building literature. We use the three hallmarks of a community-based research approach (community-determined; equitable participation; action and change) as a conceptual lens to reflect on a case example of an evaluation capacity building program led by the Ontario Brian Institute. This program involved two community-based groups (Epilepsy Southwestern Ontarioand the South West Alzheimer Society Alliance) who were supported by evaluators from the Centre for Community Based Research to conduct their own internal evaluation. The article provides an overview of a community-based research approach and its link to evaluation. It then describes the featured evaluation capacity building initiative, including reflections by the participating organizations themselves. We end by discussing lessons learned and their implications for future evaluation capacity building. Our main argument is that organizations that strive towards a community-based approach to evaluation are well placed to build and sustain a culture of evaluation. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Development of a semi-quantitative risk assessment model for evaluating environmental threat posed by the three first EU watch-list pharmaceuticals to urban wastewater treatment plants: An Irish case study.

    Science.gov (United States)

    Tahar, Alexandre; Tiedeken, Erin Jo; Clifford, Eoghan; Cummins, Enda; Rowan, Neil

    2017-12-15

    Contamination of receiving waters with pharmaceutical compounds is of pressing concern. This constitutes the first study to report on the development of a semi-quantitative risk assessment (RA) model for evaluating the environmental threat posed by three EU watch list pharmaceutical compounds namely, diclofenac, 17-beta-estradiol and 17-alpha-ethinylestradiol, to aquatic ecosystems using Irish data as a case study. This RA model adopts the Irish Environmental Protection Agency Source-Pathway-Receptor concept to define relevant parameters for calculating low, medium or high risk score for each agglomeration of wastewater treatment plant (WWTP), which include catchment, treatments, operational and management factors. This RA model may potentially be used on a national scale to (i) identify WWTPs that pose a particular risk as regards releasing disproportionally high levels of these pharmaceutical compounds, and (ii) help identify priority locations for introducing or upgrading control measures (e.g. tertiary treatment, source reduction). To assess risks for these substances of emerging concern, the model was applied to 16 urban WWTPs located in different regions in Ireland that were scored for the three different compounds and ranked as low, medium or high risk. As a validation proxy, this case study used limited monitoring data recorded at some these plants receiving waters. It is envisaged that this semi-quantitative RA approach may aid other EU countries investigate and screen for potential risks where limited measured or predicted environmental pollutant concentrations and/or hydrological data are available. This model is semi-quantitative, as other factors such as influence of climate change and drug usage or prescription data will need to be considered in a future point for estimating and predicting risks. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Rutting based evaluation of asphalt mixes

    International Nuclear Information System (INIS)

    Khan, K.M.

    2012-01-01

    Pavement rutting is one of the most common and destructive pavement distresses being observed in flexible pavements, which is primarily due to a-x-le loads that exceed legal limit and high ambient temperatures, and also poor mix design is one of the cause of rutting. The drastic increase in traffic volume during last few decades has resulted in premature pavement fillers of almost the whole road structure in Pakistan. In this scenario it is the time to investigate this problem and propose appropriate solution. Physical properties of aggregates and bitumen were evaluated in the laboratory. Mechanical Properties of three mixes. i.e., Marshall, Super pave and Stone Mastic Asphalt (SMA) were evaluated by performing creep test. indirect tensile test and dynamic modulus in order to compare the performance of mixes under prevailing load and environmental conditions of Pakistan. The study revealed that Super pave mixes performed better than Marshall and SMA. (author)

  15. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  16. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  17. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  18. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  19. Evaluation bases for calculation methods in radioecology

    International Nuclear Information System (INIS)

    Bleck-Neuhaus, J.; Boikat, U.; Franke, B.; Hinrichsen, K.; Hoepfner, U.; Ratka, R.; Steinhilber-Schwab, B.; Teufel, D.; Urbach, M.

    1982-03-01

    The seven contributions in this book deal with the state and problems of radioecology. In particular it analyses: The propagation of radioactive materials in the atmosphere, the transfer of radioactive substances from the soil into plants, respectively from animal feed into meat, the exposure pathways for, and high-risk groups of the population, the uncertainties and the band width of the ingestion factor, as well as the treatment of questions of radioecology in practice. The calculation model is assessed and the difficulty evaluated of laying down data in the general calculation basis. (DG) [de

  20. Evaluating Web-Based Learning Systems

    Science.gov (United States)

    Pergola, Teresa M.; Walters, L. Melissa

    2011-01-01

    Accounting educators continuously seek ways to effectively integrate instructional technology into accounting coursework as a means to facilitate active learning environments and address the technology-driven learning preferences of the current generation of students. Most accounting textbook publishers now provide interactive, web-based learning…

  1. Triacylglycerol-based fuels: An evaluation

    Science.gov (United States)

    A variety of feedstocks exist and several processes have been developed to produce alternative diesel fuels from triacylglycerol-based materials, such as plant and algal oils as well as animal fats and used cooking oils. Biodiesel is obtained by transesterifying a triacylglycerol feedstock with an a...

  2. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  4. Is energy cropping in Europe compatible with biodiversity? – Opportunities and threats to biodiversity from land-based production of biomass for bioenergy purposes

    NARCIS (Netherlands)

    Pedroli, G.B.M.; Elbersen, B.S.; Frederiksen, P.; Grandin, U.; Heikkilä, R.; Krogh, P.H.; Izakovicová, Z.; Johansen, A.; Meiresonne, L.; Spijker, J.H.

    2013-01-01

    Based on literature and six country studies (Belgium, Denmark, Finland, Netherlands, Sweden, Slovakia) this paper discusses the compatibility of the EU 2020 targets for renewable energy with conservation of biodiversity. We conclude that increased demand for biomass for bioenergy purposes may lead

  5. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  6. Usability Evaluation of a Web-Based Learning System

    Science.gov (United States)

    Nguyen, Thao

    2012-01-01

    The paper proposes a contingent, learner-centred usability evaluation method and a prototype tool of such systems. This is a new usability evaluation method for web-based learning systems using a set of empirically-supported usability factors and can be done effectively with limited resources. During the evaluation process, the method allows for…

  7. Usage-Based Collection Evaluation with a Curricular Focus

    Science.gov (United States)

    Kohn, Karen C.

    2013-01-01

    Systematic evaluation of a library's collection can be a useful tool for collection development. After reviewing three evaluation methods and their usefulness for our small academic library, I undertook a usage-based evaluation, focusing on narrow segments of our collection that served specific undergraduate courses. For each section, I collected…

  8. Image feature extraction based on the camouflage effectiveness evaluation

    Science.gov (United States)

    Yuan, Xin; Lv, Xuliang; Li, Ling; Wang, Xinzhu; Zhang, Zhi

    2018-04-01

    The key step of camouflage effectiveness evaluation is how to combine the human visual physiological features, psychological features to select effectively evaluation indexes. Based on the predecessors' camo comprehensive evaluation method, this paper chooses the suitable indexes combining with the image quality awareness, and optimizes those indexes combining with human subjective perception. Thus, it perfects the theory of index extraction.

  9. Scaling range sizes to threats for robust predictions of risks to biodiversity.

    Science.gov (United States)

    Keith, David A; Akçakaya, H Resit; Murray, Nicholas J

    2018-04-01

    Assessments of risk to biodiversity often rely on spatial distributions of species and ecosystems. Range-size metrics used extensively in these assessments, such as area of occupancy (AOO), are sensitive to measurement scale, prompting proposals to measure them at finer scales or at different scales based on the shape of the distribution or ecological characteristics of the biota. Despite its dominant role in red-list assessments for decades, appropriate spatial scales of AOO for predicting risks of species' extinction or ecosystem collapse remain untested and contentious. There are no quantitative evaluations of the scale-sensitivity of AOO as a predictor of risks, the relationship between optimal AOO scale and threat scale, or the effect of grid uncertainty. We used stochastic simulation models to explore risks to ecosystems and species with clustered, dispersed, and linear distribution patterns subject to regimes of threat events with different frequency and spatial extent. Area of occupancy was an accurate predictor of risk (0.81<|r|<0.98) and performed optimally when measured with grid cells 0.1-1.0 times the largest plausible area threatened by an event. Contrary to previous assertions, estimates of AOO at these relatively coarse scales were better predictors of risk than finer-scale estimates of AOO (e.g., when measurement cells are <1% of the area of the largest threat). The optimal scale depended on the spatial scales of threats more than the shape or size of biotic distributions. Although we found appreciable potential for grid-measurement errors, current IUCN guidelines for estimating AOO neutralize geometric uncertainty and incorporate effective scaling procedures for assessing risks posed by landscape-scale threats to species and ecosystems. © 2017 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  10. Bioimpedance measurement based evaluation of wound healing.

    Science.gov (United States)

    Kekonen, Atte; Bergelin, Mikael; Eriksson, Jan-Erik; Vaalasti, Annikki; Ylänen, Heimo; Viik, Jari

    2017-06-22

    Our group has developed a bipolar bioimpedance measurement-based method for determining the state of wound healing. The objective of this study was to assess the capability of the method. To assess the performance of the method, we arranged a follow-up study of four acute wounds. The wounds were measured using the method and photographed throughout the healing process. Initially the bioimpedance of the wounds was significantly lower than the impedance of the undamaged skin, used as a baseline. Gradually, as healing progressed, the wound impedance increased and finally reached the impedance of the undamaged skin. The clinical appearance of the wounds examined in this study corresponded well with the parameters derived from the bioimpedance data. Hard-to-heal wounds are a significant and growing socioeconomic burden, especially in the developed countries, due to aging populations and to the increasing prevalence of various lifestyle related diseases. The assessment and the monitoring of chronic wounds are mainly based on visual inspection by medical professionals. The dressings covering the wound must be removed before assessment; this may disturb the wound healing process and significantly increases the work effort of the medical staff. There is a need for an objective and quantitative method for determining the status of a wound without removing the wound dressings. This study provided evidence of the capability of the bioimpedance based method for assessing the wound status. In the future measurements with the method should be extended to concern hard-to-heal wounds.

  11. Research on software behavior trust based on hierarchy evaluation

    Science.gov (United States)

    Long, Ke; Xu, Haishui

    2017-08-01

    In view of the correlation software behavior, we evaluate software behavior credibility from two levels of control flow and data flow. In control flow level, method of the software behavior of trace based on support vector machine (SVM) is proposed. In data flow level, behavioral evidence evaluation based on fuzzy decision analysis method is put forward.

  12. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  13. Evaluating Computer-Based Assessment in a Risk-Based Model

    Science.gov (United States)

    Zakrzewski, Stan; Steven, Christine; Ricketts, Chris

    2009-01-01

    There are three purposes for evaluation: evaluation for action to aid the decision making process, evaluation for understanding to further enhance enlightenment and evaluation for control to ensure compliance to standards. This article argues that the primary function of evaluation in the "Catherine Wheel" computer-based assessment (CBA)…

  14. Complementary methods to plan pedestrian evacuation of the French Riviera's beaches in case of tsunami threat: graph- and multi-agent-based modelling

    Directory of Open Access Journals (Sweden)

    A. Sahal

    2013-07-01

    Full Text Available Small amplitude tsunamis have impacted the French Mediterranean shore (French Riviera in the past centuries. Some caused casualties; others only generated economic losses. While the North Atlantic and Mediterranean tsunami warning system is being tested and is almost operational, no awareness and preparedness measure is being implemented at a local scale. Evacuation is to be considered along the French Riviera, but no plan exists within communities. We show that various approaches can provide local stakeholders with evacuation capacities assessments to develop adapted evacuation plans through the case study of the Cannes–Antibes region. The complementarity between large- and small-scale approaches is demonstrated with the use of macro-simulators (graph-based and micro-simulators (multi-agent-based to select shelter points and choose evacuation routes for pedestrians located on the beach. The first one allows automatically selecting shelter points and measuring and mapping their accessibility. The second one shows potential congestion issues during pedestrian evacuations, and provides leads for the improvement of urban environment. Temporal accessibility to shelters is compared to potential local and distal tsunami travel times, showing a 40 min deficit for an adequate crisis management in the first scenario, and a 30 min surplus for the second one.

  15. Complementary methods to plan pedestrian evacuation of the French Riviera's beaches in case of tsunami threat: graph- and multi-agent-based modelling

    Science.gov (United States)

    Sahal, A.; Leone, F.; Péroche, M.

    2013-07-01

    Small amplitude tsunamis have impacted the French Mediterranean shore (French Riviera) in the past centuries. Some caused casualties; others only generated economic losses. While the North Atlantic and Mediterranean tsunami warning system is being tested and is almost operational, no awareness and preparedness measure is being implemented at a local scale. Evacuation is to be considered along the French Riviera, but no plan exists within communities. We show that various approaches can provide local stakeholders with evacuation capacities assessments to develop adapted evacuation plans through the case study of the Cannes-Antibes region. The complementarity between large- and small-scale approaches is demonstrated with the use of macro-simulators (graph-based) and micro-simulators (multi-agent-based) to select shelter points and choose evacuation routes for pedestrians located on the beach. The first one allows automatically selecting shelter points and measuring and mapping their accessibility. The second one shows potential congestion issues during pedestrian evacuations, and provides leads for the improvement of urban environment. Temporal accessibility to shelters is compared to potential local and distal tsunami travel times, showing a 40 min deficit for an adequate crisis management in the first scenario, and a 30 min surplus for the second one.

  16. Entropy Evaluation Based on Value Validity

    Directory of Open Access Journals (Sweden)

    Tarald O. Kvålseth

    2014-09-01

    Full Text Available Besides its importance in statistical physics and information theory, the Boltzmann-Shannon entropy S has become one of the most widely used and misused summary measures of various attributes (characteristics in diverse fields of study. It has also been the subject of extensive and perhaps excessive generalizations. This paper introduces the concept and criteria for value validity as a means of determining if an entropy takes on values that reasonably reflect the attribute being measured and that permit different types of comparisons to be made for different probability distributions. While neither S nor its relative entropy equivalent S* meet the value-validity conditions, certain power functions of S and S* do to a considerable extent. No parametric generalization offers any advantage over S in this regard. A measure based on Euclidean distances between probability distributions is introduced as a potential entropy that does comply fully with the value-validity requirements and its statistical inference procedure is discussed.

  17. Does by-catch pose a threat for the conservation of seabird populations in the southern Ionian Sea (eastern Mediterranean? A questionnaire based survey of local fisheries

    Directory of Open Access Journals (Sweden)

    G. KARRIS

    2013-09-01

    Full Text Available A significant number of studies worldwide have shown that incidental catches (by-catch of seabirds in fishing gear might pose a considerable risk for the conservation of their populations. Nevertheless reliable data on by-catch rates of seabirds in European marine ecosystems are patchy and need to be improved. This study constitutes a first attempt at the evaluation of by-catch rates in the southern Ionian Sea. Data were obtained by distributing a specific questionnaire to the fishers of Zakynthos Island. 150 professional fishers (representing 90% of the local fishing fleet participated in the research, and were interviewed during July-December 2010. The information collected showed that commercial longline and (to a lesser extent gillnet fishery gears caused incidental catches mostly of Scopoli’s Shearwater and Mediterranean Shag. The temporal analysis of the incidental bird mortality showed that seabirds were more susceptible to be trapped in fishery gears set around sunrise during spring and summer whereas spatial analysis of by-catch data indicated variations in the number of seabirds caught in different fishery areas.

  18. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  19. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  20. Energy Rebound as a Potential Threat to a Low-Carbon Future: Findings from a New Exergy-Based National-Level Rebound Approach

    Directory of Open Access Journals (Sweden)

    Paul E. Brockway

    2017-01-01

    Full Text Available 150 years ago, Stanley Jevons introduced the concept of energy rebound: that anticipated energy efficiency savings may be “taken back” by behavioural responses. This is an important issue today because, if energy rebound is significant, this would hamper the effectiveness of energy efficiency policies aimed at reducing energy use and associated carbon emissions. However, empirical studies which estimate national energy rebound are rare and, perhaps as a result, rebound is largely ignored in energy-economy models and associated policy. A significant difficulty lies in the components of energy rebound assessed in empirical studies: most examine direct and indirect rebound in the static economy, excluding potentially significant rebound of the longer term structural response of the national economy. In response, we develop a novel exergy-based approach to estimate national energy rebound for the UK and US (1980–2010 and China (1981–2010. Exergy—as “available energy”—allows a consistent, thermodynamic-based metric for national-level energy efficiency. We find large energy rebound in China, suggesting that improvements in China’s energy efficiency may be associated with increased energy consumption (“backfire”. Conversely, we find much lower (partial energy rebound for the case of the UK and US. These findings support the hypothesis that producer-sided economies (such as China may exhibit large energy rebound, reducing the effectiveness of energy efficiency, unless other policy measures (e.g., carbon taxes are implemented. It also raises the prospect we need to deploy renewable energy sources faster than currently planned, if (due to rebound energy efficiency policies cannot deliver the scale of energy reduction envisaged to meet climate targets.

  1. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  2. Anxiety and Threat-Related Attention: Cognitive-Motivational Framework and Treatment.

    Science.gov (United States)

    Mogg, Karin; Bradley, Brendan P

    2018-03-01

    Research in experimental psychopathology and cognitive theories of anxiety highlight threat-related attention biases (ABs) and underpin the development of a computer-delivered treatment for anxiety disorders: attention-bias modification (ABM) training. Variable effects of ABM training on anxiety and ABs generate conflicting research recommendations, novel ABM training procedures, and theoretical controversy. This article summarises an updated cognitive-motivational framework, integrating proposals from cognitive models of anxiety and attention, as well as evidence of ABs. Interactions between motivational salience-driven and goal-directed influences on multiple cognitive processes (e.g., stimulus evaluation, inhibition, switching, orienting) underlie anxiety and the variable manifestations of ABs (orienting towards and away from threat; threat-distractor interference). This theoretical analysis also considers ABM training as cognitive skill training, describes a conceptual framework for evaluating/developing novel ABM training procedures, and complements network-based research on reciprocal anxiety-cognition relationships. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.

  3. Time Series UAV Image-Based Point Clouds for Landslide Progression Evaluation Applications.

    Science.gov (United States)

    Al-Rawabdeh, Abdulla; Moussa, Adel; Foroutan, Marzieh; El-Sheimy, Naser; Habib, Ayman

    2017-10-18

    Landslides are major and constantly changing threats to urban landscapes and infrastructure. It is essential to detect and capture landslide changes regularly. Traditional methods for monitoring landslides are time-consuming, costly, dangerous, and the quality and quantity of the data is sometimes unable to meet the necessary requirements of geotechnical projects. This motivates the development of more automatic and efficient remote sensing approaches for landslide progression evaluation. Automatic change detection involving low-altitude unmanned aerial vehicle image-based point clouds, although proven, is relatively unexplored, and little research has been done in terms of accounting for volumetric changes. In this study, a methodology for automatically deriving change displacement rates, in a horizontal direction based on comparisons between extracted landslide scarps from multiple time periods, has been developed. Compared with the iterative closest projected point (ICPP) registration method, the developed method takes full advantage of automated geometric measuring, leading to fast processing. The proposed approach easily processes a large number of images from different epochs and enables the creation of registered image-based point clouds without the use of extensive ground control point information or further processing such as interpretation and image correlation. The produced results are promising for use in the field of landslide research.

  4. A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Claudio S. Malavenda

    2014-01-01

    Full Text Available This article presents a novel approach to the analysis of wireless sensor networks (WSN security, based on the regulations intended for wireless communication devices. Starting from the analysis and classification of attacks, countermeasures, and available protocols, we present the current state on secure communication stacks for embedded systems. The regulation analysis is based on civil EN 50150 and MIL STD-188-220, both applicable to WSN communications. Afterwards, starting from a list of known WSN attacks, we use a correspondence table to match WSN attacks with countermeasures required by regulations. This approach allows us to produce a precise security evaluation and classification methodology for WSN protocols. The results show that current protocols do not present a complete coverage of security issues. While this conclusion is already known for many WSN protocols, to the best of our knowledge this is the first time a complete methodology is proposed to base this assertion. Moreover, by using the proposed methodology, we are able to precisely identify the exposed threats for each WSN protocol under analysis.

  5. New threats to academic freedom.

    Science.gov (United States)

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  6. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  7. The threat of nuclear war

    International Nuclear Information System (INIS)

    1985-01-01

    This report aims to describe the present threat of nuclear war, with particular reference to New Zealand, and the increasing concern felt by many scientists, from a scientific viewpoint but in non-technical language. It surveys what is known about nuclear weapons and the consequences of their use, and attention is drawn to the importance of penetrating the language and examining the assumptions made in the propaganda about n uclear deterrence . The tasks involved in maintaining the present peace and attempting to establish an agreed disarmament is examined. The report pays particular attention to the roles of scientists in these endeavours

  8. A simple strategy to reduce stereotype threat for orthopedic residents.

    Science.gov (United States)

    Gomez, Everlyne; Wright, James G

    2014-04-01

    Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR.

  9. Research on Livable Community Evaluation Based on GIS

    Science.gov (United States)

    Yin, Zhangcai; Wu, Yang; Jin, Zhanghaonan; Zhang, Xu

    2018-01-01

    Community is the basic unit of the city. Research on livable community could provide a bottom-up research path for the realization of livable city. Livability is the total factor affecting the quality of community life. In this paper, livable community evaluation indexes are evaluated based on GIS and fuzzy comprehensive evaluation method. Then the sum-index and sub-index of community livability are both calculated. And community livable evaluation index system is constructed based on the platform of GIS. This study provides theoretical support for the construction and management of livable communities, so as to guide the development and optimization of city.

  10. Evaluation of computer-based ultrasonic inservice inspection systems

    International Nuclear Information System (INIS)

    Harris, R.V. Jr.; Angel, L.J.; Doctor, S.R.; Park, W.R.; Schuster, G.J.; Taylor, T.T.

    1994-03-01

    This report presents the principles, practices, terminology, and technology of computer-based ultrasonic testing for inservice inspection (UT/ISI) of nuclear power plants, with extensive use of drawings, diagrams, and LTT images. The presentation is technical but assumes limited specific knowledge of ultrasonics or computers. The report is divided into 9 sections covering conventional LTT, computer-based LTT, and evaluation methodology. Conventional LTT topics include coordinate axes, scanning, instrument operation, RF and video signals, and A-, B-, and C-scans. Computer-based topics include sampling, digitization, signal analysis, image presentation, SAFI, ultrasonic holography, transducer arrays, and data interpretation. An evaluation methodology for computer-based LTT/ISI systems is presented, including questions, detailed procedures, and test block designs. Brief evaluations of several computer-based LTT/ISI systems are given; supplementary volumes will provide detailed evaluations of selected systems

  11. Rapid Assessment of Protected area Pressures and Threats in ...

    African Journals Online (AJOL)

    Regular evaluation of protected area operations can enable policy makers develop strategic responses to pervasive management problems. Pressures and threats in seven National Parks of the National Park Service (NPS) were therefore assessed using the Rapid Assessment and Prioritization of Protected Area ...

  12. Collective Study On Security Threats In VOIP Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Zulkifl Hasan

    2017-01-01

    Full Text Available The Collective study will critically evaluate the voice over internet protocol VOIP Security threats issues amp challenges in the communication over the network the solution provided by different vendors. Authors will be discussing all security issues different protocols but main focus will be on SIP protocol its implementation and vendors VOIP security system.

  13. Evaluation of current state of amplification-based DDoS attacks

    NARCIS (Netherlands)

    Bohte, Edgar; Stamatogiannakis, Manolis; Bos, Herbert

    2018-01-01

    Amplification-based DDoS attacks are still a big threat to the availability of the internet. In quite some time there is no new paper published that gave an update on the current state of amplification DDoS attacks, taken into consideration it was a huge problem a few years ago. We performed

  14. Detector evaluation for improved situational awareness: Receiver operator characteristic curve based

    NARCIS (Netherlands)

    Wuijckhuijse, A.L. van; Nieuwenhuizen, M.S.

    2016-01-01

    In military and civilian operations good situational awareness is a prerequisite to make proper decisions. The situational awareness is among others based upon intelligence, threat analysis and detection, altogether element of the so-called DIM (detection, identification, monitoring) system. In case

  15. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    Science.gov (United States)

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  16. Frequently updated noise threat maps created with use of supercomputing grid

    Directory of Open Access Journals (Sweden)

    Szczodrak Maciej

    2014-09-01

    Full Text Available An innovative supercomputing grid services devoted to noise threat evaluation were presented. The services described in this paper concern two issues, first is related to the noise mapping, while the second one focuses on assessment of the noise dose and its influence on the human hearing system. The discussed serviceswere developed within the PL-Grid Plus Infrastructure which accumulates Polish academic supercomputer centers. Selected experimental results achieved by the usage of the services proposed were presented. The assessment of the environmental noise threats includes creation of the noise maps using either ofline or online data, acquired through a grid of the monitoring stations. A concept of estimation of the source model parameters based on the measured sound level for the purpose of creating frequently updated noise maps was presented. Connecting the noise mapping grid service with a distributed sensor network enables to automatically update noise maps for a specified time period. Moreover, a unique attribute of the developed software is the estimation of the auditory effects evoked by the exposure to noise. The estimation method uses a modified psychoacoustic model of hearing and is based on the calculated noise level values and on the given exposure period. Potential use scenarios of the grid services for research or educational purpose were introduced. Presentation of the results of predicted hearing threshold shift caused by exposure to excessive noise can raise the public awareness of the noise threats.

  17. Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model

    Directory of Open Access Journals (Sweden)

    Zehui Wu

    2017-01-01

    Full Text Available SDN-based controller, which is responsible for the configuration and management of the network, is the core of Software-Defined Networks. Current methods, which focus on the secure mechanism, use qualitative analysis to estimate the security of controllers, leading to inaccurate results frequently. In this paper, we employ a quantitative approach to overcome the above shortage. Under the analysis of the controller threat model we give the formal model results of the APIs, the protocol interfaces, and the data items of controller and further provide our Threat/Effort quantitative calculation model. With the help of Threat/Effort model, we are able to compare not only the security of different versions of the same kind controller but also different kinds of controllers and provide a basis for controller selection and secure development. We evaluated our approach in four widely used SDN-based controllers which are POX, OpenDaylight, Floodlight, and Ryu. The test, which shows the similarity outcomes with the traditional qualitative analysis, demonstrates that with our approach we are able to get the specific security values of different controllers and presents more accurate results.

  18. Assessment of wind erosion threat for soils in cadastral area of Hajske

    International Nuclear Information System (INIS)

    Muchova, Z.; Stredanska, A.

    2008-01-01

    This contribution illustrates the application of methods of erosion threat assessment in lan adaptation projects. Calculations of the soil erosion index of particular soil blocks are demonstrated for the cadastral area of Hajske. Two methods for assessment of erosion threat have been applied. First the assessment based on the ecological soil-quality units (ESQU) has been performed. Next, the Pasak method for a detailed analysis of the soil erosion threat was applied. Both of the mentioned approaches are recommended for the land adaption projects. Based on the results, the soil blocks have been ranked by their soil erosion threat. (authors)

  19. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  20. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  1. Stereotype Threat and College Academic Performance: A Latent Variables Approach*

    Science.gov (United States)

    Owens, Jayanti; Massey, Douglas S.

    2013-01-01

    Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using summed indicators and predicted relationships modeled using ordinary least squares. Using the National Longitudinal Survey of Freshman, this study overcomes previous methodological shortcomings by developing a latent construct model of stereotype threat. Theoretical constructs and equations are estimated simultaneously from multiple indicators, yielding a more reliable, valid, and parsimonious test of key propositions. Findings additionally support the view that social stigma can indeed have strong negative effects on the academic performance of pejoratively stereotyped racial-minority group members, not only in laboratory settings, but also in the real world. PMID:23950616

  2. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  3. Evaluating energy saving system of data centers based on AHP and fuzzy comprehensive evaluation model

    Science.gov (United States)

    Jiang, Yingni

    2018-03-01

    Due to the high energy consumption of communication, energy saving of data centers must be enforced. But the lack of evaluation mechanisms has restrained the process on energy saving construction of data centers. In this paper, energy saving evaluation index system of data centers was constructed on the basis of clarifying the influence factors. Based on the evaluation index system, analytical hierarchy process was used to determine the weights of the evaluation indexes. Subsequently, a three-grade fuzzy comprehensive evaluation model was constructed to evaluate the energy saving system of data centers.

  4. If it bleeds, it leads: separating threat from mere negativity.

    Science.gov (United States)

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  5. Camera formation and more, but what comes next? an analysis of volcanic threat of Nisyros island, Greece

    International Nuclear Information System (INIS)

    Winson, A; Kinvig, H; Gottsmann, J; Partington, E; Geyer, A

    2008-01-01

    We present an analysis of volcanic threat of Nisyros island (Greece) based on a catalogue of questions compiled for the USGS National Volcano Early Warning System (NVEWS). We find that the score puts Nisyros in the league of volcanoes posing a very high threat. US volcanoes with a comparable threat level include Mt. St. Helens, Augustine and the Long Valley caldera.

  6. Camera formation and more, but what comes next? an analysis of volcanic threat of Nisyros island, Greece

    Energy Technology Data Exchange (ETDEWEB)

    Winson, A; Kinvig, H; Gottsmann, J; Partington, E; Geyer, A [Department of Earth Sciences, University of Bristol (United Kingdom)

    2008-10-01

    We present an analysis of volcanic threat of Nisyros island (Greece) based on a catalogue of questions compiled for the USGS National Volcano Early Warning System (NVEWS). We find that the score puts Nisyros in the league of volcanoes posing a very high threat. US volcanoes with a comparable threat level include Mt. St. Helens, Augustine and the Long Valley caldera.

  7. Conceptualizing threats to tobacco control from international economic agreements: the Brazilian experience.

    Science.gov (United States)

    Drope, Jeffrey; McGrady, Benn; Bialous, Stella Aguinaga; Lencucha, Raphael; Silva, Vera Luiza da Costa E

    2017-10-19

    Using the results of dozens of interviews with key actors involved in tobacco control policymaking, we examine these actors' perceptions of threats to tobacco control policy efforts from international economic policies on trade and investment. We also evaluate, from a legal perspective, the genuine threats that exist or potential challenges that economic policies may pose to the Brazilian government's public health efforts. We find that most actors did not perceive these economic policies as a major threat to tobacco control. Objectively, we found that some threats do exist. For example, Brazil's attempt to ban most tobacco additives and flavorings continues to met resistance at the World Trade Organization.

  8. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  9. Smartphone-based evaluations of clinical placements—a useful complement to web-based evaluation tools

    Directory of Open Access Journals (Sweden)

    Jesper Hessius

    2015-11-01

    Full Text Available Purpose: Web-based questionnaires are currently the standard method for course evaluations. The high rate of smartphone adoption in Sweden makes possible a range of new uses, including course evaluation. This study examines the potential advantages and disadvantages of using a smartphone app as a complement to web-based course evaluationsystems. Methods: An iPhone app for course evaluations was developed and interfaced to an existing web-based tool. Evaluations submitted using the app were compared with those submitted using the web between August 2012 and June 2013, at the Faculty of Medicine at Uppsala University, Sweden. Results: At the time of the study, 49% of the students were judged to own iPhones. Over the course of the study, 3,340 evaluations were submitted, of which 22.8% were submitted using the app. The median of mean scores in the submitted evaluations was 4.50 for the app (with an interquartile range of 3.70-5.20 and 4.60 (3.70-5.20 for the web (P=0.24. The proportion of evaluations that included a free-text comment was 50.5% for the app and 49.9% for the web (P=0.80. Conclusion: An app introduced as a complement to a web-based course evaluation system met with rapid adoption. We found no difference in the frequency of free-text comments or in the evaluation scores. Apps appear to be promising tools for course evaluations. web-based course evaluation system met with rapid adoption. We found no difference in the frequency of free-text comments or in the evaluation scores. Apps appear to be promising tools for course evaluations.

  10. Smartphone-based evaluations of clinical placements-a useful complement to web-based evaluation tools.

    Science.gov (United States)

    Hessius, Jesper; Johansson, Jakob

    2015-01-01

    Web-based questionnaires are currently the standard method for course evaluations. The high rate of smartphone adoption in Sweden makes possible a range of new uses, including course evaluation. This study examines the potential advantages and disadvantages of using a smartphone app as a complement to web-based course evaluationsystems. An iPhone app for course evaluations was developed and interfaced to an existing web-based tool. Evaluations submitted using the app were compared with those submitted using the web between August 2012 and June 2013, at the Faculty of Medicine at Uppsala University, Sweden. At the time of the study, 49% of the students were judged to own iPhones. Over the course of the study, 3,340 evaluations were submitted, of which 22.8% were submitted using the app. The median of mean scores in the submitted evaluations was 4.50 for the app (with an interquartile range of 3.70-5.20) and 4.60 (3.70-5.20) for the web (P=0.24). The proportion of evaluations that included a free-text comment was 50.5% for the app and 49.9% for the web (P=0.80). An app introduced as a complement to a web-based course evaluation system met with rapid adoption. We found no difference in the frequency of free-text comments or in the evaluation scores. Apps appear to be promising tools for course evaluations. web-based course evaluation system met with rapid adoption. We found no difference in the frequency of free-text comments or in the evaluation scores. Apps appear to be promising tools for course evaluations.

  11. Evaluation Of Enzyme Immobilization Methods For Paper-based Devices-a Glucose Oxidase Study

    OpenAIRE

    Nery; Emilia Witkowska; Kubota; Lauro T.

    2016-01-01

    Paper-based sensors gained almost explosive attention during the last few years. A large number of systems, often destined to resource limited settings is based on enzymatic reactions. Choice of an adequate immobilization method could significantly prolong the shelf-life of such sensors, especially in applications, where exposure to high temperatures during storage and transport is more than a threat. We are seeking to compare a variety of immobilization methods based on different phenomena (...

  12. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  13. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  14. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  15. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  16. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    Science.gov (United States)

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  17. Multivariate Methods Based Soft Measurement for Wine Quality Evaluation

    Directory of Open Access Journals (Sweden)

    Shen Yin

    2014-01-01

    a decision. However, since the physicochemical indexes of wine can to some extent reflect the quality of wine, the multivariate statistical methods based soft measure can help the oenologist in wine evaluation.

  18. Views of the state customs committee of Russian Federation to system approach to threat evaluation and development of a national system of counteraction of the illicit trafficking of nuclear and/or radioactive materials (nuclear facility - territory - border)

    International Nuclear Information System (INIS)

    Vasiliev, I.; Kravchenko, N.; Babich, D.

    2002-01-01

    Full text: It is well known that until recently the efforts of the national structures and international organizations were focused on nuclear objects to provide conditions preventing non-proliferation of nuclear materials. However, various countries possess plenty of radioactive materials (nuclear and other kind of radioactive materials) used in different areas (medicine, crack detection, oil and gas production, mining, science, etc.). Those materials are used and stored within the objects, which lack a strict monitoring system of non-proliferation control. Therefore, for every country three areas of threat of illicit trafficking of radioactive materials (ITRM) can be pointed out: an object containing radioactive materials, the territory of the country, the border. Each area must have the bodies responsible for ITRM prevention, which are appointed by the national legislation. Within the first area: competent body in the field of atomic power application; owners of enterprises (not only state structures); the structure of the Ministry of Defense; police; intelligence services. Within the second area: police; intelligence services. Within the third area: customs; border guards. Analyzing possible threat of ITRM within these three interrelated areas, one can specify a number of specific threats for each responsibility area: at an object, on the territory of the country, at the border. (author)

  19. Process Evaluation in Corrections-Based Substance Abuse Treatment.

    Science.gov (United States)

    Wolk, James L.; Hartmann, David J.

    1996-01-01

    Argues that process evaluation is needed to validate prison-based substance abuse treatment effectiveness. Five groups--inmates, treatment staff, prison staff, prison administration, and the parole board--should be a part of this process evaluation. Discusses these five groups relative to three stages of development of substance abuse treatment in…

  20. Evaluating potentialities and constrains of Problem Based Learning curriculum

    DEFF Research Database (Denmark)

    Guerra, Aida

    2013-01-01

    This paper presents a research design to evaluate Problem Based Learning (PBL) curriculum potentialities and constrains for future changes. PBL literature lacks examples of how to evaluate and analyse established PBL learning environments to address new challenges posed. The research design......) in the curriculum and a mean to choose cases for further case study (third phase)....

  1. A simulator-based approach to evaluating optical trackers

    NARCIS (Netherlands)

    Smit, F.A.; Liere, van R.

    2009-01-01

    We describe a software framework to evaluate the performance of model-based optical trackers in virtual environments. The framework can be used to evaluate and compare the performance of different trackers under various conditions, to study the effects of varying intrinsic and extrinsic camera

  2. How to Reach Evidence-Based Usability Evaluation Methods

    NARCIS (Netherlands)

    Marcilly, Romaric; Peute, Linda

    2017-01-01

    This paper discusses how and why to build evidence-based knowledge on usability evaluation methods. At each step of building evidence, requisites and difficulties to achieve it are highlighted. Specifically, the paper presents how usability evaluation studies should be designed to allow capitalizing

  3. Chemical and organoleptic evaluation of Moi-moi based on ...

    African Journals Online (AJOL)

    Chemical and organoleptic evaluation of Moi-moi based on fermented wateryam, Cocoyam, plantain, African yam bean, cowpea, pigeon pea and corn flours. ... The nutrient content of the moi-moi and its organoleptic properties were evaluated using standard procedures. ... http://dx.doi.org/10.4314/jbi.v5i1.30421.

  4. Disarming the Threat to Feminist Identification: An Application of Personal Construct Theory to Measurement and Intervention

    Science.gov (United States)

    Moradi, Bonnie; Martin, Annelise; Brewster, Melanie E.

    2012-01-01

    Many individuals endorse feminist values but do not identify as feminist. The present set of studies tests the concept of threat, grounded in G. A. Kelly's personal construct theory of personality, as a potential factor in feminist nonidentification. Study 1 introduces the theoretically grounded "Feminist Threat Index" and evaluates its…

  5. Network Monitoring for Web-Based Threats

    Science.gov (United States)

    2011-02-01

    Using the HTP Package [49] 52 Figure 5-42: SQL Injection Using the CXTSYS Package [49] 52 Figure 5-43: Bypassing the PL/SQL Exclusion List with...forced browsing28 [19]. This method consists of simply manually submitting different HTTP requests. An attacker will often submit requests involving... manually modifying the orderID field could give the attacker access to another order that he or she should not have access to, as shown in Figure 4-7

  6. Threat Based Risk Assessment for Enterprise Networks

    Science.gov (United States)

    2016-02-15

    devastating insider attacks, Edward Snowden exfiltrated 1.7 million documents from the National Security Agency [1]. That same year, the security company...Weller-Fahy, and Tamara Yu. References 1. G. Greenwald, No Place to Hide: Edward Snowden , the NSA, and the U.S. Surveillance State. London: Hamish

  7. Brillouin Spectroscopy Data Base for Biological Threats

    National Research Council Canada - National Science Library

    Rubel, Glenn

    2003-01-01

    .... Brillouin scattering from DNA, ovalbumen, the Bacillus spores globigii and thuringiensis were measured to determine the feasibility of biological material discrimination using Brillouin scattering...

  8. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  9. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  10. Managing threats from emerging technologies: can safeguards show the way?

    International Nuclear Information System (INIS)

    Leffer, Teri N.

    2014-01-01

    The system of international nuclear safeguards implemented by the International Atomic Energy Agency (IAEA) is primarily a means of verification of states’ commitments under various legal instruments, principally the Nuclear Non‑Proliferation Treaty (NPT), to utilize controlled nuclear fission for peaceful purposes only. However, the safeguards system can also be seen as a mechanism through which states acted to reduce the threat posed by a new technology that had a transformative impact on existing national security paradigms when it emerged in the twentieth century. In the twenty‑first century, new technologies with equally profound national security implications are emerging. These include biotechnology and synthetic biology, nano technology, information technology, cognitive science, robotics and artificial intelligence. Throughout its history, the safeguards system has evolved to accommodate new technologies, new undertakings and new threats. Because multiple emerging technologies now constitute potential national security threats, it is appropriate to consider whether and how the lessons and successes of the safeguards system, including its capacity to evolve in response to changing requirements, could be leveraged to mitigate the threat posed by these new technologies. This paper addresses the possibility of re‑imagining safeguards in a way that makes them applicable to a broader range of technology‑based threats without compromising their effectiveness for their original purpose.

  11. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches. © 2014 Society for Conservation Biology.

  12. Global threat reduction initiative (GTRI)

    International Nuclear Information System (INIS)

    Chamberlain, Travis

    2009-01-01

    The Global Threat Reduction Initiative (GTRI) is a vital part of the global efforts to combat nuclear terrorism. GTRI's unique mission to reduce and protect vulnerable nuclear and radiological material located at civilian sites both in the United States and abroad directly addresses recommendations of the bipartisan 9/11 Commission. GTRI efforts are focused on the first line of defense, namely securing or removing vulnerable nuclear and radiological material at the source. The international community has promulgated guidance on the best practice on the technical and administrative aspects of radiological source security, and the GTRI seeks to provide technical assistance to national bodies and individual facilities to adopt this best practice. This presentation will discuss security concepts that are implemented by the GTRI in cooperation with the Australian Nuclear Science and Technology Organization's Regional Security of Radioactive Sources Project. (author)

  13. Real threat of nuclear smuggling

    International Nuclear Information System (INIS)

    Williams, P.; Woessner, P.N.

    1996-01-01

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  14. On the experience of feeling powerful: perceived power moderates the effect of stereotype threat on women's math performance.

    Science.gov (United States)

    Van Loo, Katie J; Rydell, Robert J

    2013-03-01

    This research examined whether feeling powerful can eliminate the deleterious effect of stereotype threat (i.e., concerns about confirming a negative self-relevant stereotype) on women's math performance. In Experiments 1 and 2, priming women with high power buffered them from reduced math performance in response to stereotype threat instructions, whereas women in the low and control power conditions showed poorer math performance in response to threat. Experiment 3 found that working memory capacity is one mechanism through which power moderates the effect of threat on women's math performance. In the low and control power conditions, women showed reduced working memory capacity in response to stereotype threat, accounting for threat's effect on performance. In contrast, women in the high power condition did not show reductions in working memory capacity or math performance in response to threat. This work demonstrates that perceived power moderates stereotype threat-based performance effects and explains why this occurs.

  15. [Reconstituting evaluation methods based on both qualitative and quantitative paradigms].

    Science.gov (United States)

    Miyata, Hiroaki; Okubo, Suguru; Yoshie, Satoru; Kai, Ichiro

    2011-01-01

    Debate about the relationship between quantitative and qualitative paradigms is often muddled and confusing and the clutter of terms and arguments has resulted in the concepts becoming obscure and unrecognizable. In this study we conducted content analysis regarding evaluation methods of qualitative healthcare research. We extracted descriptions on four types of evaluation paradigm (validity/credibility, reliability/credibility, objectivity/confirmability, and generalizability/transferability), and classified them into subcategories. In quantitative research, there has been many evaluation methods based on qualitative paradigms, and vice versa. Thus, it might not be useful to consider evaluation methods of qualitative paradigm are isolated from those of quantitative methods. Choosing practical evaluation methods based on the situation and prior conditions of each study is an important approach for researchers.

  16. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  17. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  18. An Evaluation of PET Based on Longitudinal Data.

    Science.gov (United States)

    Mandeville, Garrett K.

    Although teacher inservice programs based on Madeline Hunter's Program for Effective Teaching (PET) have become very popular in U.S. schools, there is little evidence that the Hunter model ultimately results in increased student achievement. This longitudinal study attempts to evaluate the effects of Hunter-based staff development programs on…

  19. Process Evaluation for a Prison-based Substance Abuse Program.

    Science.gov (United States)

    Staton, Michele; Leukefeld, Carl; Logan, T. K.; Purvis, Rick

    2000-01-01

    Presents findings from a process evaluation conducted in a prison-based substance abuse program in Kentucky. Discusses key components in the program, including a detailed program description, modifications in planned treatment strategies, program documentation, and perspectives of staff and clients. Findings suggest that prison-based programs have…

  20. Evaluation of an Internet, Stage-Based Physical Activity Intervention.

    Science.gov (United States)

    Hager, Ronald L.; Hardy, Aaron; Aldana, Steven G.; George, James D.

    2002-01-01

    Evaluated the impact of online, stage-based materials on exercise behavior and stage of readiness to change. College faculty participated in stage-based, action-message, or control groups. Occupational and leisure activity, 7-day physical activity, exercise self-efficacy, and stage of readiness to change were assessed at baseline and 6 weeks.…

  1. benzoic acid Schiff base and evaluation as corrosion

    African Journals Online (AJOL)

    user

    acid Schiff base and evaluation as corrosion inhibitor of steel in 2.0 M H2SO4. *. 1. ECHEM .... adopted for this experiment was in accordance with .... Table 4: Kinetic data for mild steel corrosion in 2M H2SO4 containing SBDAB from weight loss measurement. inhibitor .... and anti-bacterial activity of Schiff base derived.

  2. Formulation and Evaluation of Microspheres Based on Gelatin ...

    African Journals Online (AJOL)

    Formulation and Evaluation of Microspheres Based on Gelatin-Mucin Admixtures for the Rectal Delivery of Cefuroxime Sodium. K C Ofokansi, M U Adikwu. Abstract. Purpose: Swellable microspheres based on polymers or their admixtures are frequently employed as drug delivery systems to achieve a controlled release ...

  3. Existential and psychological problems connected with Threat Predicting Process

    Directory of Open Access Journals (Sweden)

    Mamcarz Piotr

    2014-01-01

    Full Text Available The aim of the article is to present a very important phenomenon affecting human integrity and homeostasis that is Threat Prediction Process. This process can be defined as “experiencing apprehension concerning results of potential/ actual dangers,” (Mamcarz, 2015 oscillating in terminological area of anxiety, fear, stress, restlessness. Moreover, it highlights a cognitive process distinctive for listed phenomenon’s. The process accompanied with technological and organization changes increases number of health problems affecting many populations. Hard work conditions; changing life style; or many social and political threats have influence on people’s quality of life that are even greater and more dangerous than physical and psychological factors, which, in turn, have much more consequences for human normal functioning. The present article is based on chosen case studies of a qualitative analysis of threat prediction process

  4. Are needs to manage uncertainty and threat associated with political conservatism or ideological extremity?

    Science.gov (United States)

    Jost, John T; Napier, Jaime L; Thorisdottir, Hulda; Gosling, Samuel D; Palfai, Tibor P; Ostafin, Brian

    2007-07-01

    Three studies are conducted to assess the uncertainty- threat model of political conservatism, which posits that psychological needs to manage uncertainty and threat are associated with political orientation. Results from structural equation models provide consistent support for the hypothesis that uncertainty avoidance (e.g., need for order, intolerance of ambiguity, and lack of openness to experience) and threat management (e.g., death anxiety, system threat, and perceptions of a dangerous world) each contributes independently to conservatism (vs. liberalism). No support is obtained for alternative models, which predict that uncertainty and threat management are associated with ideological extremism or extreme forms of conservatism only. Study 3 also reveals that resistance to change fully mediates the association between uncertainty avoidance and conservatism, whereas opposition to equality partially mediates the association between threat and conservatism. Implications for understanding the epistemic and existential bases of political orientation are discussed.

  5. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  6. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  7. Threats and opportunities for post-closure development in dolomitic ...

    African Journals Online (AJOL)

    Mining-related impacts such as large-scale land degradation associated with dewatering of karstic aquifers and widespread pollution of surface water and groundwater systems are discussed. Based on this, potential threats and opportunities for post-mining scenarios are identified in a series of 3 papers. Part 1 of this series ...

  8. Laser Remediation of Threats Posed by Small Orbital Debris

    Science.gov (United States)

    Fork, Richard L.; Rogers, Jan R.; Hovater, Mary A.

    2012-01-01

    The continually increasing amount of orbital debris in near Earth space poses an increasing challenge to space situational awareness. Recent collisions of spacecraft caused abrupt increases in the density of both large and small debris in near Earth space. An especially challenging class of threats is that due to the increasing density of small (1 mm to 10 cm dimension) orbital debris. This small debris poses a serious threat since: (1) The high velocity enables even millimeter dimension debris to cause serious damage to vulnerable areas of space assets, e.g., detector windows; (2) The small size and large number of debris elements prevent adequate detection and cataloguing. We have identified solutions to this threat in the form of novel laser systems and novel ways of using these laser systems. While implementation of the solutions we identify is challenging we find approaches offering threat mitigation within time frames and at costs of practical interest. We base our analysis on the unique combination of coherent light specifically structured in both space and time and applied in novel ways entirely within the vacuum of space to deorbiting small debris. We compare and contrast laser based small debris removal strategies using ground based laser systems with strategies using space based laser systems. We find laser systems located and used entirely within space offer essential and decisive advantages over groundbased laser systems.

  9. MILITARY TRADE UNIONS: A THREAT TO NATIONAL SECURITY ...

    African Journals Online (AJOL)

    sacrificed at the altar of soldiers' constitutional rights to form and join trade unions .... includes a rights-based culture, a rise in individualism, a change in the acceptance of ... military leadership with the military unions that poses the greatest threat to civil– ... 10 European Organisation of Military Associations, available at ...

  10. OWL2 benchmarking for the evaluation of knowledge based systems.

    Directory of Open Access Journals (Sweden)

    Sher Afgun Khan

    Full Text Available OWL2 semantics are becoming increasingly popular for the real domain applications like Gene engineering and health MIS. The present work identifies the research gap that negligible attention has been paid to the performance evaluation of Knowledge Base Systems (KBS using OWL2 semantics. To fulfil this identified research gap, an OWL2 benchmark for the evaluation of KBS is proposed. The proposed benchmark addresses the foundational blocks of an ontology benchmark i.e. data schema, workload and performance metrics. The proposed benchmark is tested on memory based, file based, relational database and graph based KBS for performance and scalability measures. The results show that the proposed benchmark is able to evaluate the behaviour of different state of the art KBS on OWL2 semantics. On the basis of the results, the end users (i.e. domain expert would be able to select a suitable KBS appropriate for his domain.

  11. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends and describes NNSA’s integrated threat reduction strategy.

  12. Research on Performance Evaluation by IDSS Based on AHP

    Directory of Open Access Journals (Sweden)

    Tang Xuelian

    2013-03-01

    Full Text Available Talent resource is the primary resource. There are two sides as the starting point and foothold in this paper. One is how to evaluate the performance of science and technology talents flow by IDSS (Intelligence Decision Supporting System. Another is how to guide the innovation work of science and technology according to the evaluation results. The evaluation index on performance system has hierarchical structure. So AHP (Analytic Hierarchy Process is applied to evaluate the performance. Evaluation model is established and illustrated by the cases in this paper. It can be seen that the flow of performance is influenced by the growth rate of important scientific and technological achievements. Furthermore, some constructive suggestions are given based on the results of evaluation.

  13. Protecting National Critical Infrastructure against Radiological Threat

    International Nuclear Information System (INIS)

    Yaar, I.; Halevy, I.; Berenstein, Z.; Sharon, A.

    2014-01-01

    responder equipped with a radiation detector or a dosimeter. The main impact of such a radiological attack is the contamination of a large areaxxxii. The size of the contaminated area depends on the type and activity of the radioactive material, on the type and geometry of the dispersion device, on the micro-meteorology conditions and on the cross contamination caused by the movement of people inside the contaminated areaxxxiii. Two experimental programs, G reen Field x xxiv (GF) and R ed House x xxv (RH) were recently conducted in Israel in order to increase the preparedness for a RDD event. The GF program aimed at evaluating the consequences of an outdoor and an indoor explosion of an RDD device; while the RH program aimed at evaluating the outcome of a silent dispersion of a radioactive material inside a building. Based on the results of these two experimental programs, the consequences of a possible RDD attack or a silent indoor dispersion of a radioactive material will be given and the necessary preventative steps that can be taken in order to secure NCI's against these threats will be specified

  14. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  15. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  16. Indicators of implicit and explicit social anxiety influence threat-related interpretive bias as a function of working memory capacity

    Directory of Open Access Journals (Sweden)

    Elske eSalemink

    2013-05-01

    Full Text Available Interpretive biases play a crucial role in anxiety disorders. The aim of the current study was to examine factors that determine the relative strength of threat-related interpretive biases that are characteristic of individuals high in social anxiety. Different (dual process models argue that both implicit and explicit processes determine information processing biases and behaviour, and that their impact is moderated by the availability of executive resources such as working memory capacity (WMC. Based on these models, we expected indicators of implicit social anxiety to predict threat-related interpretive bias in individuals low, but not high in WMC. Indicators of explicit social anxiety should predict threat-related interpretive bias in individuals high, but not low in WMC. As expected, WMC moderated the impact of implicit social anxiety on threat-related interpretive bias, although the simple slope for individuals low in WMC was not statistically significant. The hypotheses regarding explicit social anxiety (with fear of negative evaluation used as an indicator were fully supported. The clinical implications of these findings are discussed.

  17. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  18. Data Base on Peer Evaluation of Research in the Netherlands - PER-Base - 1993-2013

    NARCIS (Netherlands)

    van Drooge, L.; de Jong, S.; Faber, M.; Westerheijden, D.

    2013-01-01

    PER-Base contains information on institutional research evaluation in the Netherlands. It covers results from evaluations with the 'Vereniging van Samenwerkende Nederlandse Universiteiten' - VSNU 1993, VSNU 1994 and VSNU 1998 protocols as well as the 'Standard Evaluation Protocol' - SEP 2003-2009

  19. Evaluating Emulation-based Models of Distributed Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Stephen T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cyber Initiatives; Gabert, Kasimir G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cyber Initiatives; Tarman, Thomas D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Emulytics Initiatives

    2017-08-01

    Emulation-based models of distributed computing systems are collections of virtual ma- chines, virtual networks, and other emulation components configured to stand in for oper- ational systems when performing experimental science, training, analysis of design alterna- tives, test and evaluation, or idea generation. As with any tool, we should carefully evaluate whether our uses of emulation-based models are appropriate and justified. Otherwise, we run the risk of using a model incorrectly and creating meaningless results. The variety of uses of emulation-based models each have their own goals and deserve thoughtful evaluation. In this paper, we enumerate some of these uses and describe approaches that one can take to build an evidence-based case that a use of an emulation-based model is credible. Predictive uses of emulation-based models, where we expect a model to tell us something true about the real world, set the bar especially high and the principal evaluation method, called validation , is comensurately rigorous. We spend the majority of our time describing and demonstrating the validation of a simple predictive model using a well-established methodology inherited from decades of development in the compuational science and engineering community.

  20. Research on Air Quality Evaluation based on Principal Component Analysis

    Science.gov (United States)

    Wang, Xing; Wang, Zilin; Guo, Min; Chen, Wei; Zhang, Huan

    2018-01-01

    Economic growth has led to environmental capacity decline and the deterioration of air quality. Air quality evaluation as a fundamental of environmental monitoring and air pollution control has become increasingly important. Based on the principal component analysis (PCA), this paper evaluates the air quality of a large city in Beijing-Tianjin-Hebei Area in recent 10 years and identifies influencing factors, in order to provide reference to air quality management and air pollution control.

  1. A study of combined evaluation of suppliers based on correlation

    Directory of Open Access Journals (Sweden)

    Heting Qiu

    2013-03-01

    Full Text Available Purpose: The Selection of logistics service providers is an important issue in supply chain management. But different evaluation methods may lead to different results, which could cause inconsistent conclusions. This paper makes use of a new perspective to combine with a variety of methods to eliminate the deviation of different single evaluation methods. Design/methodology/approach: This paper expounds the application of the combined evaluation method based on correlation. Entropy method, factor analysis, grey colligation evaluation and AHP have been used for research. Findings: According to the evaluate result, the ranking of suppliers obtained by each method have obvious differences. The result shows that combined evaluation method can eliminate the deviation of different single evaluation methods. Originality/value: The combined evaluation method makes up for the defects of single evaluation methods and obtains a result that is more stable and creditable with smaller deviation. This study can provide the enterprise leaders with more scientific method to select their cooperative companies. 

  2. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  3. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  4. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  5. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  6. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  7. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  8. Evaluation as institution: a contractarian argument for needs-based economic evaluation.

    Science.gov (United States)

    Rogowski, Wolf H

    2018-06-13

    There is a gap between health economic evaluation methods and the value judgments of coverage decision makers, at least in Germany. Measuring preference satisfaction has been claimed to be inappropriate for allocating health care resources, e.g. because it disregards medical need. The existing methods oriented at medical need have been claimed to disregard non-consequentialist fairness concerns. The aim of this article is to propose a new, contractarian argument for justifying needs-based economic evaluation. It is based on consent rather than maximization of some impersonal unit of value to accommodate the fairness concerns. This conceptual paper draws upon contractarian ethics and constitution economics to show how economic evaluation can be viewed as an institution to overcome societal conflicts in the allocation of scarce health care resources. For this, the problem of allocating scarce health care resources in a society is reconstructed as a social dilemma. Both disadvantaged patients and affluent healthy individuals can be argued to share interests in a societal contract to provide technologies which ameliorate medical need, based on progressive funding. The use of needs-based economic evaluation methods for coverage determination can be interpreted as institutions for conflict resolution as far as they use consented criteria to ensure the social contract's sustainability and avoid implicit rationing or unaffordable contribution rates. This justifies the use of needs-based evaluation methods by Pareto-superiority and consent (rather than by some needs-based value function per se). The view of economic evaluation presented here may help account for fairness concerns in the further development of evaluation methods. This is because it directs the attention away from determining some unit of value to be maximized towards determining those persons who are most likely not to consent and meeting their concerns. Following this direction in methods development is

  9. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  10. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  11. Analytical evaluation of computer-based decision aids

    International Nuclear Information System (INIS)

    Kisner, R.A.

    1985-01-01

    This paper introduces a method for evaluating decision aids for nuclear power plant operators. The method involves a two-stage process of classification and analytical evaluation of display form and content. The classification scheme relates each specific aid to one or more general decision-making tasks. Evaluation then proceeds using a normative top-down design process based on the classification scheme by determining or deducing how various design issues associated with this process were resolved by the designer. The result is an assessment of the ''understandability'' of the aid as well as identification of the training and display features necessary to ensure understandability. 7 refs., 4 figs., 1 tab

  12. A online credit evaluation method based on AHP and SPA

    Science.gov (United States)

    Xu, Yingtao; Zhang, Ying

    2009-07-01

    Online credit evaluation is the foundation for the establishment of trust and for the management of risk between buyers and sellers in e-commerce. In this paper, a new credit evaluation method based on the analytic hierarchy process (AHP) and the set pair analysis (SPA) is presented to determine the credibility of the electronic commerce participants. It solves some of the drawbacks found in classical credit evaluation methods and broadens the scope of current approaches. Both qualitative and quantitative indicators are considered in the proposed method, then a overall credit score is achieved from the optimal perspective. In the end, a case analysis of China Garment Network is provided for illustrative purposes.

  13. Pharmacology Goes Concept-Based: Course Design, Implementation, and Evaluation.

    Science.gov (United States)

    Lanz, Amelia; Davis, Rebecca G

    Although concept-based curricula are frequently discussed in the nursing education literature, little information exists to guide the development of a concept-based pharmacology course. Traditionally, nursing pharmacology courses are taught with an emphasis on drug class where a prototype drug serves as an exemplar. When transitioning pharmacology to a concept-based course, special considerations are in order. How can educators successfully integrate essential pharmacological content into a curriculum structured around nursing concepts? This article presents one approach to the design and implementation of a concept-based undergraduate pharmacology course. Planning methods, supportive teaching strategies, and course evaluation procedures are discussed.

  14. Designing and Evaluating Conative Game-Based Learning Scenarios

    DEFF Research Database (Denmark)

    Schønau-Fog, Henrik

    2014-01-01

    It is an essential prerequisite to design for motivation in game-based learning applications, tools and activities. However, how is it possible to design and evaluate motivational game-based learning scenarios in a systematic process-oriented manner based on conation and player engagement? While...... of ‘continuation desire’ such as interfacing with the scenario, exploration and socialising. This paper aims to combine the concepts of Player Engagement, Conation and Continuation Desire by focusing on the conative aspects which are the essential drivers for the desire to continue any learning activity......-based learning scenarios....

  15. Evaluation of complex community-based childhood obesity prevention interventions.

    Science.gov (United States)

    Karacabeyli, D; Allender, S; Pinkney, S; Amed, S

    2018-05-16

    Multi-setting, multi-component community-based interventions have shown promise in preventing childhood obesity; however, evaluation of these complex interventions remains a challenge. The objective of the study is to systematically review published methodological approaches to outcome evaluation for multi-setting community-based childhood obesity prevention interventions and synthesize a set of pragmatic recommendations. MEDLINE, CINAHL and PsycINFO were searched from inception to 6 July 2017. Papers were included if the intervention targeted children ≤18 years, engaged at least two community sectors and described their outcome evaluation methodology. A single reviewer conducted title and abstract scans, full article review and data abstraction. Directed content analysis was performed by three reviewers to identify prevailing themes. Thirty-three studies were included, and of these, 26 employed a quasi-experimental design; the remaining were randomized control trials. Body mass index was the most commonly measured outcome, followed by health behaviour change and psychosocial outcomes. Six themes emerged, highlighting advantages and disadvantages of active vs. passive consent, quasi-experimental vs. randomized control trials, longitudinal vs. repeat cross-sectional designs and the roles of process evaluation and methodological flexibility in evaluating complex interventions. Selection of study designs and outcome measures compatible with community infrastructure, accompanied by process evaluation, may facilitate successful outcome evaluation. © 2018 World Obesity Federation.

  16. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  17. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism.

  18. ITAC, an insider threat assessment computer program

    International Nuclear Information System (INIS)

    Eggers, R.F.; Giese, E.W.

    1988-01-01

    The insider threat assessment computer program, ITAC, is used to evaluate the vulnerability of nuclear material processing facilities to theft of special nuclear material by one or more authorized insider adversaries. The program includes two main parts: one is used to determine the timeliness of nuclear material accounting tests for loss of special nuclear material, and the other determines pathway aggregate detection probabilities for physical protection systems and material control procedures that could detect the theft. Useful features of ITAC include its ability to (1) evaluate and quantify the timeliness of material accounting tests, (2) analyze branching systems of physical pathways and adversary strategies, (3) analyze trickle or abrupt theft situations for combinations of insiders, (4) accept input probabilities and times in the form of ranges rather than discrete points, and (5) simulate input data using Monte Carlo methods to produce statistically distributed aggregate delay times and detection probabilities. The ITAC program was developed by the Security Applications Center of Westinghouse Hanford Comapny and Boeing Computer Services, Richland, WA

  19. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  20. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  1. Chronic illness in the workplace: stigma, identity threat and strain.

    Science.gov (United States)

    McGonagle, Alyssa K; Barnes-Farrell, Janet L

    2014-10-01

    Chronic illness affects a large and growing number of workers in the United States and globally. Stigmatization (devaluation) at work based on chronic illness may be stressful for individuals and therefore may lead to negative psychological consequences (i.e. strains). In order to better understand stressful experiences of stigma for workers with chronic illnesses, a model of stigma-related identity threat (perceptions that one is at risk of being treated negatively at work because of chronic illness) was tested on a sample of 203 working adults with chronic illnesses. The following variables related to workers' perceptions of chronic illness-related identity threat: workers' boundary flexibility (flexibility in managing their work and life), their meta-perceptions of devaluation (perceptions of others' devaluation of them based on illness) and their job self-efficacy (feelings of confidence related to performing their job). In turn, perceptions of identity threat related to both feelings of psychological strain and (lower levels of) perceived work ability. Surprisingly, neither stigma centrality (how fundamental illness is to one's identity) nor supervisor support related to workers' identity threat perceptions. Copyright © 2013 John Wiley & Sons, Ltd.

  2. Classification and Quality Evaluation of Tobacco Leaves Based on Image Processing and Fuzzy Comprehensive Evaluation

    Science.gov (United States)

    Zhang, Fan; Zhang, Xinhong

    2011-01-01

    Most of classification, quality evaluation or grading of the flue-cured tobacco leaves are manually operated, which relies on the judgmental experience of experts, and inevitably limited by personal, physical and environmental factors. The classification and the quality evaluation are therefore subjective and experientially based. In this paper, an automatic classification method of tobacco leaves based on the digital image processing and the fuzzy sets theory is presented. A grading system based on image processing techniques was developed for automatically inspecting and grading flue-cured tobacco leaves. This system uses machine vision for the extraction and analysis of color, size, shape and surface texture. Fuzzy comprehensive evaluation provides a high level of confidence in decision making based on the fuzzy logic. The neural network is used to estimate and forecast the membership function of the features of tobacco leaves in the fuzzy sets. The experimental results of the two-level fuzzy comprehensive evaluation (FCE) show that the accuracy rate of classification is about 94% for the trained tobacco leaves, and the accuracy rate of the non-trained tobacco leaves is about 72%. We believe that the fuzzy comprehensive evaluation is a viable way for the automatic classification and quality evaluation of the tobacco leaves. PMID:22163744

  3. Evaluating evaluation as a communication process. What role for formative evaluation in ICT-based knowledge acquisition?

    Directory of Open Access Journals (Sweden)

    USEILLE Philippe

    2005-10-01

    Full Text Available This article examines how formative evaluation as a communication process contributes to knowledge acquisition in using ICT (Information and Communication Technologies. Previous studies, especially in the field of education and training, have shown that formative evaluation plays a crucial part in the learning process because it contributes to learning to learn. Through formative evaluation, the learner becomes aware of errors and can adjust learning strategies to the situation. In addition, formative evaluation provides the teaching side with significant and useful information. Consequently, ICT researches have developed a wide range of solutions for this specific purpose. It is however difficult to check the efficiency of these tools by considering the effects of ICT in the knowledge acquisition process. I suggest that formative evaluation includes also a communication system that has an effect on the learning process. This study tackles the issue by proposing an alternative approach to formative evaluation that considers it as both a learning and a communication process. The study is based on SADT (Structure Analysis and Design Technique that provides a suitable description for the whole complex communication process. It allows a rigorous understanding and identification of the variables of evaluation as a communication process in order to take care of an ICT frame. Finally, this article outlines a multidisciplinary method to evaluate formative evaluation by focusing on the validity facets of the communication process. Keywords: formative evaluation, communication process, validity criteria, ICT training context.

  4. Using satellite imagery to evaluate land-based camouflage assets

    CSIR Research Space (South Africa)

    Baumbach, J

    2006-02-01

    Full Text Available to Evaluate Land-based Camouflage Assets J BAUMBACH, M LUBBE CSIR Defence, Peace, Safety and security, PO Box 395, Pretoria, 0001, South Africa Email: jbaumbac@csir.co.za ABSTRACT A camouflage field trial experiment was conducted. For the experiment... analysis, change detection, un-supervised classification, supervised classification and object based classification. RESULTS The following table shows a summary of the different targets, and whether it was detected ( ) or not detected (x), using...

  5. Current Status of the Cyber Threat Assessment for Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Doo [KINAC, Daejeon (Korea, Republic of)

    2016-05-15

    In December 2014, unknown hackers hacked internal documents sourced from Korea Hydro and Nuclear Power (KHNP) and those electronic documents were posted five times on a Social Network Service (SNS). The data included personal profiles, flow charts, manuals and blueprints for installing pipes in the nuclear power plant. Although the data were not critical to operation or sabotage of the plant, it threatened people and caused social unrest in Korea and neighboring countries. In December 2015, cyber attack on power grid caused a blackout for hundreds of thousands of people in Ukraine. The power outage was caused by a sophisticated attack using destructive malware called 'BlackEnergy'. Cyber attacks are reality in today's world and critical infrastructures are increasingly targeted. Critical infrastructures, such as the nuclear power plant, need to be proactive and protect the nuclear materials, assets and facilities from potential cyber attacks. The threat assessment document and its detailed procedure are confidential for the State. Nevertheless, it is easy to find cooperation on assessing and evaluating the threats of nuclear materials and facilities with other government departments or agencies including the national police. The NSSC and KINAC also cooperated with the National Intelligence Service (NIS) and National Security Research Institute (NSR). However, robust cyber threat assessment system and regular consultative group should be established with domestic and overseas organization including NIS, NSR, the National Police Agency and the military force to protect and ensure to safety of people, public and environment from rapidly changing and upgrading cyber threats.

  6. Current Status of the Cyber Threat Assessment for Nuclear Facilities

    International Nuclear Information System (INIS)

    Kim, Hyun Doo

    2016-01-01

    In December 2014, unknown hackers hacked internal documents sourced from Korea Hydro and Nuclear Power (KHNP) and those electronic documents were posted five times on a Social Network Service (SNS). The data included personal profiles, flow charts, manuals and blueprints for installing pipes in the nuclear power plant. Although the data were not critical to operation or sabotage of the plant, it threatened people and caused social unrest in Korea and neighboring countries. In December 2015, cyber attack on power grid caused a blackout for hundreds of thousands of people in Ukraine. The power outage was caused by a sophisticated attack using destructive malware called 'BlackEnergy'. Cyber attacks are reality in today's world and critical infrastructures are increasingly targeted. Critical infrastructures, such as the nuclear power plant, need to be proactive and protect the nuclear materials, assets and facilities from potential cyber attacks. The threat assessment document and its detailed procedure are confidential for the State. Nevertheless, it is easy to find cooperation on assessing and evaluating the threats of nuclear materials and facilities with other government departments or agencies including the national police. The NSSC and KINAC also cooperated with the National Intelligence Service (NIS) and National Security Research Institute (NSR). However, robust cyber threat assessment system and regular consultative group should be established with domestic and overseas organization including NIS, NSR, the National Police Agency and the military force to protect and ensure to safety of people, public and environment from rapidly changing and upgrading cyber threats

  7. Radiobiologically based treatment plan evaluation for prostate seed implants

    Directory of Open Access Journals (Sweden)

    Sotirios Stathakis

    2011-07-01

    Full Text Available Purpose: Accurate prostate low dose-rate brachytherapy treatment plan evaluation is important for future care decisions. Presently, an evaluation is based on dosimetric quantifiers for the tumor and organs at risk. However, these do not account for effects of varying dose-rate, tumor repopulation and other biological effects. In this work, incorporation of the biological response is used to obtain more clinically relevant treatment plan evaluation.Material and methods: Eleven patients were evaluated. Each patient received a 145 Gy implant. Iodine-125 seeds were used and the treatment plans were created on the Prowess system. Based on CT images the post-implant plan was created. In the post-plan, the tumor, urethra, bladder and rectum were contoured. The biologically effective dose was used to determine the tumor control probability and the normal tissue complication probabilities for the urethra, bladder, rectum and surrounding tissue. Results: The average tumor control probability and complication probabilities for the urethra, bladder, rectum and surrounding tissue were 99%, 29%, 0%, 12% and 6%, respectively. These measures provide a simpler means for evaluation and since they include radiobiological factors, they provide more reliable estimation of the treatment outcome. Conclusions: The goal of this work was to create more clinically relevant prostate seed-implant evaluation by incorporating radiobiological measures. This resulted in a simpler descriptor of treatment plan quality and was consistent with patient outcomes.

  8. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    Science.gov (United States)

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  9. Performance evaluation of self-breakdown-based single-gap ...

    Indian Academy of Sciences (India)

    gap plasma cathode electron (PCE) gun (5–20 kV/50–160 A) in argon, gas atmosphere and its performance evaluation based on particle-in-cell (PIC) simulation code `OOPIC-Pro'.The PCE-Gun works in conducting phase (low energy, high ...

  10. Inspection Based Evaluation of a Danish Road Bridge

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle

    In this paper it is shown how an inspection-based evaluation of a Danish road bridge may be performed using the BRIDGE1 and BRIDGE2 bridge management systems produced within the EC-supported research programme "Assessment of Performance and Optimal Strategies for Inspection and Maintenance...

  11. Symptoms-Based Evaluation of Iron Deficiency Anemia in Students ...

    African Journals Online (AJOL)

    Original Research Article. Symptoms-Based ... cravings, 22.33 % (46); and angular stomatitis 18.97 % (39). ... [6]. Pregnancy fallouts in an overall surplus iron constraint is about 1000 mg [7]. .... Evaluation of the Health-related Quality of Life of.

  12. Evaluation of polymer based third order nonlinear integrated optics devices

    NARCIS (Netherlands)

    Driessen, A.; Hoekstra, Hugo; Blom, F.C.; Horst, F.; Horst, F.; Krijnen, Gijsbertus J.M.; van Schoot, J.B.P.; van Schoot, J.B.P.; Lambeck, Paul; Popma, T.J.A.; Diemeer, Mart

    Nonlinear polymers are promising materials for high speed active integrated optics devices. In this paper we evaluate the perspectives polymer based nonlinear optical devices can offer. Special attention is directed to the materials aspects. In our experimental work we applied mainly Akzo Nobel DANS

  13. Farmer evaluation of dried banana based products | Pekke | African ...

    African Journals Online (AJOL)

    A farmer participatory evaluation of dried banana based products was conducted in various districts of Uganda. Bananas were dried using a tunnel solar dryer developed by Post Harvest Handling and Storage project (PHHS) of Kawanda Post-harvest Programme and improved by the National Banana Research ...

  14. Evaluation of Palm Oil-Based Paracetamol Suppositories by ...

    African Journals Online (AJOL)

    Methods: The suppository base was prepared by mixing hydrogenated palm oil and palm kernel ... DSC can be used to predict drug release in paracetamol suppository formulations. Keywords: Palm oil, Liquefaction time, Paracetamol, Suppositories, Thermal analysis. ..... Drug Evaluation & Research (CDER), Food and.

  15. Evaluation of a Spiritually Based Child Maltreatment Prevention Training Program

    Science.gov (United States)

    Baker, Louisa K.; Rigazio-DiGilio, Sandra A.

    2013-01-01

    The authors empirically evaluated a spiritually based 1-day child maltreatment training program. Pretest, posttest, and follow-up results indicated that participants' recognition of hypothetical maltreatment did not increase after training. Furthermore, although participants decreased their use of items known to dissuade decisions to report, they…

  16. Evaluation of computer-based library services at Kenneth Dike ...

    African Journals Online (AJOL)

    This study evaluated computer-based library services/routines at Kenneth Dike Library, University of Ibadan. Four research questions were developed and answered. A survey research design was adopted; using questionnaire as the instrument for data collection. A total of 200 respondents randomly selected from 10 ...

  17. Evaluation of Topical Gel Bases Formulated with Various Essential ...

    African Journals Online (AJOL)

    Evaluation of Topical Gel Bases Formulated with Various Essential Oils for Antibacterial Activity against Methicillin- Resistant Staphylococcus Aureus. ... Lemon grass and thyme oils were chosen for further studies, including analysis of their composition by gas chromatography–mass spectrometry (GC/MS). Gels were ...

  18. EVALUATION OF SIFT AND SURF FOR VISION BASED LOCALIZATION

    Directory of Open Access Journals (Sweden)

    X. Qu

    2016-06-01

    Full Text Available Vision based localization is widely investigated for the autonomous navigation and robotics. One of the basic steps of vision based localization is the extraction of interest points in images that are captured by the embedded camera. In this paper, SIFT and SURF extractors were chosen to evaluate their performance in localization. Four street view image sequences captured by a mobile mapping system, were used for the evaluation and both SIFT and SURF were tested on different image scales. Besides, the impact of the interest point distribution was also studied. We evaluated the performances from for aspects: repeatability, precision, accuracy and runtime. The local bundle adjustment method was applied to refine the pose parameters and the 3D coordinates of tie points. According to the results of our experiments, SIFT was more reliable than SURF. Apart from this, both the accuracy and the efficiency of localization can be improved if the distribution of feature points are well constrained for SIFT.

  19. Port performance evaluation tool based on microsimulation model

    Directory of Open Access Journals (Sweden)

    Tsavalista Burhani Jzolanda

    2017-01-01

    Full Text Available As port performance is becoming correlative to national competitiveness, the issue of port performance evaluation has significantly raised. Port performances can simply be indicated by port service levels to the ship (e.g., throughput, waiting for berthing etc., as well as the utilization level of equipment and facilities within a certain period. The performances evaluation then can be used as a tool to develop related policies for improving the port’s performance to be more effective and efficient. However, the evaluation is frequently conducted based on deterministic approach, which hardly captures the nature variations of port parameters. Therefore, this paper presents a stochastic microsimulation model for investigating the impacts of port parameter variations to the port performances. The variations are derived from actual data in order to provide more realistic results. The model is further developed using MATLAB and Simulink based on the queuing theory.

  20. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  1. Computer-Based Tools for Evaluating Graphical User Interfaces

    Science.gov (United States)

    Moore, Loretta A.

    1997-01-01

    The user interface is the component of a software system that connects two very complex system: humans and computers. Each of these two systems impose certain requirements on the final product. The user is the judge of the usability and utility of the system; the computer software and hardware are the tools with which the interface is constructed. Mistakes are sometimes made in designing and developing user interfaces because the designers and developers have limited knowledge about human performance (e.g., problem solving, decision making, planning, and reasoning). Even those trained in user interface design make mistakes because they are unable to address all of the known requirements and constraints on design. Evaluation of the user inter-face is therefore a critical phase of the user interface development process. Evaluation should not be considered the final phase of design; but it should be part of an iterative design cycle with the output of evaluation being feed back into design. The goal of this research was to develop a set of computer-based tools for objectively evaluating graphical user interfaces. The research was organized into three phases. The first phase resulted in the development of an embedded evaluation tool which evaluates the usability of a graphical user interface based on a user's performance. An expert system to assist in the design and evaluation of user interfaces based upon rules and guidelines was developed during the second phase. During the final phase of the research an automatic layout tool to be used in the initial design of graphical inter- faces was developed. The research was coordinated with NASA Marshall Space Flight Center's Mission Operations Laboratory's efforts in developing onboard payload display specifications for the Space Station.

  2. Ergonomic evaluation model of operational room based on team performance

    Directory of Open Access Journals (Sweden)

    YANG Zhiyi

    2017-05-01

    Full Text Available A theoretical calculation model based on the ergonomic evaluation of team performance was proposed in order to carry out the ergonomic evaluation of the layout design schemes of the action station in a multitasking operational room. This model was constructed in order to calculate and compare the theoretical value of team performance in multiple layout schemes by considering such substantial influential factors as frequency of communication, distance, angle, importance, human cognitive characteristics and so on. An experiment was finally conducted to verify the proposed model under the criteria of completion time and accuracy rating. As illustrated by the experiment results,the proposed approach is conductive to the prediction and ergonomic evaluation of the layout design schemes of the action station during early design stages,and provides a new theoretical method for the ergonomic evaluation,selection and optimization design of layout design schemes.

  3. Evaluation-Function-based Model-free Adaptive Fuzzy Control

    Directory of Open Access Journals (Sweden)

    Agus Naba

    2016-12-01

    Full Text Available Designs of adaptive fuzzy controllers (AFC are commonly based on the Lyapunov approach, which requires a known model of the controlled plant. They need to consider a Lyapunov function candidate as an evaluation function to be minimized. In this study these drawbacks were handled by designing a model-free adaptive fuzzy controller (MFAFC using an approximate evaluation function defined in terms of the current state, the next state, and the control action. MFAFC considers the approximate evaluation function as an evaluative control performance measure similar to the state-action value function in reinforcement learning. The simulation results of applying MFAFC to the inverted pendulum benchmark verified the proposed scheme’s efficacy.

  4. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  5. A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats

    International Nuclear Information System (INIS)

    Nelson, K.; Sokkappa, P.

    2008-01-01

    This report describes an approach for generating a simulated population of plausible nuclear threat radiation signatures spanning a range of variability that could be encountered by radiation detection systems. In this approach, we develop a statistical model for generating random instances of smuggled nuclear material. The model is based on physics principles and bounding cases rather than on intelligence information or actual threat device designs. For this initial stage of work, we focus on random models using fissile material and do not address scenarios using non-fissile materials. The model has several uses. It may be used as a component in a radiation detection system performance simulation to generate threat samples for injection studies. It may also be used to generate a threat population to be used for training classification algorithms. In addition, we intend to use this model to generate an unclassified 'benchmark' threat population that can be openly shared with other organizations, including vendors, for use in radiation detection systems performance studies and algorithm development and evaluation activities. We assume that a quantity of fissile material is being smuggled into the country for final assembly and that shielding may have been placed around the fissile material. In terms of radiation signature, a nuclear weapon is basically a quantity of fissile material surrounded by various layers of shielding. Thus, our model of smuggled material is expected to span the space of potential nuclear weapon signatures as well. For computational efficiency, we use a generic 1-dimensional spherical model consisting of a fissile material core surrounded by various layers of shielding. The shielding layers and their configuration are defined such that the model can represent the potential range of attenuation and scattering that might occur. The materials in each layer and the associated parameters are selected from probability distributions that span the

  6. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  7. Privacy Threats and Practical Solutions for Genetic Risk Tests

    OpenAIRE

    Barman, Ludovic; El Graini, Mohammed-Taha; Raisaro, Jean Louis; Ayday, Erman; Hubaux, Jean-Pierre

    2015-01-01

    Recently, several solutions have been proposed to address the complex challenge of protecting individuals’ genetic data during personalized medicine tests. In this short paper, we analyze different privacy threats and propose simple countermeasures for the generic architecture mainly used in the literature. In particular, we present and evaluate a new practical solution against a critical attack of a malicious medical center trying to actively infer raw genetic information of patients.

  8. EVALUATING HUMAN CAPITAL IN A KNOWLEDGE – BASED APPROACH

    Directory of Open Access Journals (Sweden)

    Emanoil MUSCALU

    2014-04-01

    Full Text Available The widespread enthusiasm for a knowledge-based approach to understanding the nature of a business and the possible basis for sustained competitive advantage have renewed interest in human capital evaluation or measurement. While many attempts have been made to develop methods for measuring intellectual capital, none have been widely adopted in the business world. In the knowledge-based organizations, and generally, in the information society, human capital is recognized as the fundamental factor of overall progress, and experts agree that long-term investment in human capital has strong drive-propagation effects at the individual, organizational, national and global level. In this paper, we consider that a knowledge-based approach can offer new possibilities and answers to illustrate the importance of evaluation the human capital and knowledge assets by consistently generating added value in the business world.

  9. Status threat, not economic hardship, explains the 2016 presidential vote.

    Science.gov (United States)

    Mutz, Diana C

    2018-05-08

    This study evaluates evidence pertaining to popular narratives explaining the American public's support for Donald J. Trump in the 2016 presidential election. First, using unique representative probability samples of the American public, tracking the same individuals from 2012 to 2016, I examine the "left behind" thesis (that is, the theory that those who lost jobs or experienced stagnant wages due to the loss of manufacturing jobs punished the incumbent party for their economic misfortunes). Second, I consider the possibility that status threat felt by the dwindling proportion of traditionally high-status Americans (i.e., whites, Christians, and men) as well as by those who perceive America's global dominance as threatened combined to increase support for the candidate who emphasized reestablishing status hierarchies of the past. Results do not support an interpretation of the election based on pocketbook economic concerns. Instead, the shorter relative distance of people's own views from the Republican candidate on trade and China corresponded to greater mass support for Trump in 2016 relative to Mitt Romney in 2012. Candidate preferences in 2016 reflected increasing anxiety among high-status groups rather than complaints about past treatment among low-status groups. Both growing domestic racial diversity and globalization contributed to a sense that white Americans are under siege by these engines of change. Copyright © 2018 the Author(s). Published by PNAS.

  10. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  11. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  12. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Directory of Open Access Journals (Sweden)

    Lindberg Nina

    2012-12-01

    Full Text Available Abstract Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic.

  13. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Science.gov (United States)

    2012-01-01

    Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic. PMID:23241433

  14. Criteria to evaluate SAT-based training programs

    International Nuclear Information System (INIS)

    Arjona, O.; Venegas, M.; Rodriguez, L.; Lopez, M.

    1997-01-01

    This paper present some coefficients of error obtained to evaluate the quality of the design development and implementation of SAT-based personnel training programs. With the attainment of these coefficients, with the use of the GESAT system, is facilitated the continuos evaluation of training programs and the main deficiencies in the design, development and implementation of training programs are obtained, through the comparison between the program features and their standards or wanted features and doing an statistics analysis of the data kept in the GESAT system

  15. Optimization evaluation of cutting technology based on mechanical parts

    Science.gov (United States)

    Wang, Yu

    2018-04-01

    The relationship between the mechanical manufacturing process and the carbon emission is studied on the basis of the process of the mechanical manufacturing process. The formula of carbon emission calculation suitable for mechanical manufacturing process is derived. Based on this, a green evaluation method for cold machining process of mechanical parts is proposed. The application verification and data analysis of the proposed evaluation method are carried out by an example. The results show that there is a great relationship between the mechanical manufacturing process data and carbon emissions.

  16. Interfacing a biosurveillance portal and an international network of institutional analysts to detect biological threats.

    Science.gov (United States)

    Riccardo, Flavia; Shigematsu, Mika; Chow, Catherine; McKnight, C Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray

    2014-01-01

    The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an

  17. Development of Weeds Density Evaluation System Based on RGB Sensor

    Science.gov (United States)

    Solahudin, M.; Slamet, W.; Wahyu, W.

    2018-05-01

    Weeds are plant competitors which potentially reduce the yields due to competition for sunlight, water and soil nutrients. Recently, for chemical-based weed control, site-specific weed management that accommodates spatial and temporal diversity of weeds attack in determining the appropriate dose of herbicide based on Variable Rate Technology (VRT) is preferable than traditional approach with single dose herbicide application. In such application, determination of the level of weed density is an important task. Several methods have been studied to evaluate the density of weed attack. The objective of this study is to develop a system that is able to evaluate weed density based on RGB (Red, Green, and Blue) sensors. RGB sensor was used to acquire the RGB values of the surface of the field. An artificial neural network (ANN) model was then used for determining the weed density. In this study the ANN model was trained with 280 training data (70%), 60 validation data (15%), and 60 testing data (15%). Based on the field test, using the proposed method the weed density could be evaluated with an accuracy of 83.75%.

  18. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  19. [Inferential evaluation of intimacy based on observation of interpersonal communication].

    Science.gov (United States)

    Kimura, Masanori

    2015-06-01

    How do people inferentially evaluate others' levels of intimacy with friends? We examined the inferential evaluation of intimacy based on the observation of interpersonal communication. In Experiment 1, participants (N = 41) responded to questions after observing conversations between friends. Results indicated that participants inferentially evaluated not only goodness of communication, but also intimacy between friends, using an expressivity heuristic approach. In Experiment 2, we investigated how inferential evaluation of intimacy was affected by prior information about relationships and by individual differences in face-to-face interactional ability. Participants (N = 64) were divided into prior- and no-prior-information groups and all performed the same task as in Experiment 1. Additionally, their interactional ability was assessed. In the prior-information group, individual differences had no effect on inferential evaluation of intimacy. On the other hand, in the no-prior-information group, face-to-face interactional ability partially influenced evaluations of intimacy. Finally, we discuss the fact that to understand one's social environment, it is important to observe others' interpersonal communications.

  20. Evaluation of Evidence-based Nursing Pain Management Practice.

    Science.gov (United States)

    Song, Wenjia; Eaton, Linda H; Gordon, Debra B; Hoyle, Christine; Doorenbos, Ardith Z

    2015-08-01

    It is important to ensure that cancer pain management is based on the best evidence. Nursing evidence-based pain management can be examined through an evaluation of pain documentation. The aim of this study was to modify and test an evaluation tool for nursing cancer pain documentation, and describe the frequency and quality of nursing pain documentation in one oncology unit via the electronic medical system. A descriptive cross-sectional design was used for this study at an oncology unit of an academic medical center in the Pacific Northwest. Medical records were examined for 37 adults hospitalized during April and May 2013. Nursing pain documentations (N = 230) were reviewed using an evaluation tool modified from the Cancer Pain Practice Index to consist of 13 evidence-based pain management indicators, including pain assessment, care plan, pharmacologic and nonpharmacologic interventions, monitoring and treatment of analgesic side effects, communication with physicians, and patient education. Individual nursing documentation was assigned a score ranging from 0 (worst possible) to 13 (best possible), to reflect the delivery of evidence-based pain management. The participating nurses documented 90% of the recommended evidence-based pain management indicators. Documentation was suboptimal for pain reassessment, pharmacologic interventions, and bowel regimen. The study results provide implications for enhancing electronic medical record design and highlight a need for future research to understand the reasons for suboptimal nursing documentation of cancer pain management. For the future use of the data evaluation tool, we recommend additional modifications according to study settings. Copyright © 2015 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  1. The Climate Change Education Evidence Base: Lessons Learned from NOAA's Monitoring and Evaluation Framework Implementation

    Science.gov (United States)

    Baek, J.

    2012-12-01

    effort has provided some shared understanding and general guidance, there is still a lack of guidance to make decisions at any level of the community. A recent memorandum from the Office of Management and Budget provides more specific guidance around the generation and utilization of evidence. For example, the amount of funding awarded through grants should be weighted by the level of the evidence supporting a proposed project. As the field of climate change education establishes an evidence base, study designs should address a greater number of internal validity threats through comparison groups and reliable common measures. In addition, OMB invites agencies to develop systematic measurement of costs and costs per outcome. A growing evidence base, one that includes data that includes costs and even monetizes benefits, can inform decisions based on the strongest returns on investments within a portfolio. This paper will provide examples from NOAA's Monitoring and Evaluation Framework Implementation project that illustrate how NOAA is facing these challenges. This is intended to inform climate change educators, evaluators, and researchers in ways to integrate evaluation into the management of their programs while providing insight across the portfolio.

  2. Distracted by the Unthought – Suppression and Reappraisal of Mind Wandering under Stereotype Threat

    Science.gov (United States)

    Schuster, Carolin; Martiny, Sarah E.; Schmader, Toni

    2015-01-01

    Previous research has found that subtle reminders of negative stereotypes about one’s group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women’s math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women’s performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants’ math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss

  3. Distracted by the Unthought - Suppression and Reappraisal of Mind Wandering under Stereotype Threat.

    Science.gov (United States)

    Schuster, Carolin; Martiny, Sarah E; Schmader, Toni

    2015-01-01

    Previous research has found that subtle reminders of negative stereotypes about one's group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women's math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women's performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants' math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss implications for

  4. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    Science.gov (United States)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  5. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers

    OpenAIRE

    Carey, R. N.; Sarma, K. M.

    2016-01-01

    BACKGROUND: Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These 'threat appeals' feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. METHODS: To address limitati...

  6. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers

    OpenAIRE

    Rachel N. Carey; Kiran M. Sarma

    2016-01-01

    Background Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These ?threat appeals? feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. Methods To address limitations...

  7. Development, Use and Maintenance of the Design Basis Threat. Implementing Guide (Arabic Edition)

    International Nuclear Information System (INIS)

    2009-01-01

    In response to a resolution by the IAEA General Conference in September 2002, the IAEA adopted an integrated approach to protection against nuclear terrorism. This approach coordinates IAEA activities concerned with physical protection of nuclear material and nuclear installations, nuclear material accountancy, detection of and response to trafficking in nuclear and other radioactive material, the security of radioactive sources, security in the transport of nuclear and other radioactive material, emergency response and emergency preparedness in Member States and at the IAEA, and promotion of adherence by States to relevant international instruments. The IAEA also helps to identify threats and vulnerability related to the security of nuclear and other radioactive material. However, it is the responsibility of the States to provide for the physical protection of nuclear and other radioactive material and associated facilities, to ensure the security of such material in transport, and to combat illicit trafficking and the inadvertent movement of radioactive material. Physical protection systems are intended to prevent unacceptable consequences arising from malicious activities. The more serious the consequences, the more important it is to have a high degree of confidence that physical protection will be effective as planned. The need for a high level of confidence in the effectiveness of physical protection has long been recognized by those concerned about nuclear material and nuclear facilities. Nuclear material and facilities have the potential for a variety of unacceptable radiological and proliferation consequences if subjected to a malicious act. The highest level of confidence in physical protection demands a close correlation between protective measures and the threat. This approach is firmly grounded in the fundamental principle that physical protection of nuclear assets under the jurisdiction of a State should be based on the State's evaluation of the

  8. Development, use and maintenance of the design basis threat. Implementing guide

    International Nuclear Information System (INIS)

    2009-01-01

    In response to a resolution by the IAEA General Conference in September 2002, the IAEA adopted an integrated approach to protection against nuclear terrorism. This approach coordinates IAEA activities concerned with physical protection of nuclear material and nuclear installations, nuclear material accountancy, detection of and response to trafficking in nuclear and other radioactive material, the security of radioactive sources, security in the transport of nuclear and other radioactive material, emergency response and emergency preparedness in Member States and at the IAEA, and promotion of adherence by States to relevant international instruments. The IAEA also helps to identify threats and vulnerability related to the security of nuclear and other radioactive material. However, it is the responsibility of the States to provide for the physical protection of nuclear and other radioactive material and associated facilities, to ensure the security of such material in transport, and to combat illicit trafficking and the inadvertent movement of radioactive material. Physical protection systems are intended to prevent unacceptable consequences arising from malicious activities. The more serious the consequences, the more important it is to have a high degree of confidence that physical protection will be effective as planned. The need for a high level of confidence in the effectiveness of physical protection has long been recognized by those concerned about nuclear material and nuclear facilities. Nuclear material and facilities have the potential for a variety of unacceptable radiological and proliferation consequences if subjected to a malicious act. The highest level of confidence in physical protection demands a close correlation between protective measures and the threat. This approach is firmly grounded in the fundamental principle that physical protection of nuclear assets under the jurisdiction of a State should be based on the State's evaluation of the

  9. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke

  10. Crowdsourcing for children : exploring threats and opportunities

    NARCIS (Netherlands)

    de Wit, J.M.S.; Manojlovic, S.; Gavrilo, K.; Khan, J.V.; Hansson, K.; Aitamurto, T.; Ludwig, T.; Gupta, N.; Muller, M.

    2016-01-01

    Children are increasingly being engaged in product development, but they have yet to be introduced to the concept of crowdsourcing. Several opportunities and threats when designing a crowdsourcing platform specifically for children are proposed as topics for further discussion.

  11. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  12. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  13. Terrorism: Current and Long Term Threats

    National Research Council Canada - National Science Library

    Jenkins, Brian

    2001-01-01

    Despite the high level of anxiety the American people are currently experiencing, we may still not fully comprehend the seriousness of the current and near-term threats we confront or the longer-term...

  14. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... Form Controls Cancel Submit Search The CDC Antibiotic / Antimicrobial Resistance Note: Javascript is disabled or is not ... please visit this page: About CDC.gov . Antibiotic / Antimicrobial Resistance About Antimicrobial Resistance Biggest Threats Emerging Drug ...

  15. Emerging influenza virus: A global threat

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    Emerging influenza virus: A global threat. 475. J. Biosci. ... pathogens and are of major global health concern. Recently, ..... cases among persons in 14 countries in Asia, the Middle ... of influenza, investment in pandemic vaccine research and.

  16. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    Hartmann, Patrick; Apaolaza, Vanessa; D'Souza, Clare; Echebarria, Carmen; Barrutia, Jose M.

    2013-01-01

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  17. An LG-graph-based early evaluation of segmented images

    International Nuclear Information System (INIS)

    Tsitsoulis, Athanasios; Bourbakis, Nikolaos

    2012-01-01

    Image segmentation is one of the first important parts of image analysis and understanding. Evaluation of image segmentation, however, is a very difficult task, mainly because it requires human intervention and interpretation. In this work, we propose a blind reference evaluation scheme based on regional local–global (RLG) graphs, which aims at measuring the amount and distribution of detail in images produced by segmentation algorithms. The main idea derives from the field of image understanding, where image segmentation is often used as a tool for scene interpretation and object recognition. Evaluation here derives from summarization of the structural information content and not from the assessment of performance after comparisons with a golden standard. Results show measurements for segmented images acquired from three segmentation algorithms, applied on different types of images (human faces/bodies, natural environments and structures (buildings)). (paper)

  18. Performance evaluation of the insurance companies based on AHP

    Science.gov (United States)

    Lu, Manhong; Zhu, Kunping

    2018-04-01

    With the entry of foreign capital, China's insurance industry is under increasing pressure of competition. The performance of a company is the external manifestation of its comprehensive strength. Therefore, the establishment of a scientific evaluation system is of practical significance for the insurance companies. In this paper, based on the financial and non-financial indicators of the companies, the performance evaluation system is constructed by means of the analytic hierarchy process (AHP). In the system, the weights of the indicators which represent the impact on the performance of the companies will be calculated by the process. The evaluation system is beneficial for the companies to realize their own strengths and weaknesses, so as to take steps to enhance the core competitiveness of the companies.

  19. Monte Carlo evaluation of derivative-based global sensitivity measures

    Energy Technology Data Exchange (ETDEWEB)

    Kucherenko, S. [Centre for Process Systems Engineering, Imperial College London, London SW7 2AZ (United Kingdom)], E-mail: s.kucherenko@ic.ac.uk; Rodriguez-Fernandez, M. [Process Engineering Group, Instituto de Investigaciones Marinas, Spanish Council for Scientific Research (C.S.I.C.), C/ Eduardo Cabello, 6, 36208 Vigo (Spain); Pantelides, C.; Shah, N. [Centre for Process Systems Engineering, Imperial College London, London SW7 2AZ (United Kingdom)

    2009-07-15

    A novel approach for evaluation of derivative-based global sensitivity measures (DGSM) is presented. It is compared with the Morris and the Sobol' sensitivity indices methods. It is shown that there is a link between DGSM and Sobol' sensitivity indices. DGSM are very easy to implement and evaluate numerically. The computational time required for numerical evaluation of DGSM is many orders of magnitude lower than that for estimation of the Sobol' sensitivity indices. It is also lower than that for the Morris method. Efficiencies of Monte Carlo (MC) and quasi-Monte Carlo (QMC) sampling methods for calculation of DGSM are compared. It is shown that the superiority of QMC over MC depends on the problem's effective dimension, which can also be estimated using DGSM.

  20. Monte Carlo evaluation of derivative-based global sensitivity measures

    International Nuclear Information System (INIS)

    Kucherenko, S.; Rodriguez-Fernandez, M.; Pantelides, C.; Shah, N.

    2009-01-01

    A novel approach for evaluation of derivative-based global sensitivity measures (DGSM) is presented. It is compared with the Morris and the Sobol' sensitivity indices methods. It is shown that there is a link between DGSM and Sobol' sensitivity indices. DGSM are very easy to implement and evaluate numerically. The computational time required for numerical evaluation of DGSM is many orders of magnitude lower than that for estimation of the Sobol' sensitivity indices. It is also lower than that for the Morris method. Efficiencies of Monte Carlo (MC) and quasi-Monte Carlo (QMC) sampling methods for calculation of DGSM are compared. It is shown that the superiority of QMC over MC depends on the problem's effective dimension, which can also be estimated using DGSM.

  1. Evaluating task-based syllabus for EFL learners

    Directory of Open Access Journals (Sweden)

    Luu, Hoang Mai

    2013-01-01

    Full Text Available This research is an evaluation of the effectiveness of task-based syllabus on EFL learners’ language competence at a private university in Vietnam educational context. This research resorts to questionnaire survey, semi-structured interview, and pretest and posttest as instruments for data collection. The research findings revealed that a strength of the current task-based syllabus is the match between lesson topics and students’ expectations. However, the syllabus still created difficulties for students including insufficient vocabulary, unfamiliar structures, and lack of life knowledge. The effect of teaching with task-based syllabus on students’ language performance is also reflected through a significant difference in mean scores between the pretest and the posttest. This research provides an insight into the effectiveness of English teaching through task-based syllabus at a private university in Vietnam setting. It implies to teachers that they need to be sustainable change catalysts for more interesting syllabus for learners

  2. An evaluation of the hemiplegic subject based on the Bobath approach. Part II: The evaluation protocol.

    Science.gov (United States)

    Corriveau, H; Guarna, F; Dutil, E; Riley, E; Arsenault, A B; Drouin, G

    1988-01-01

    A protocol of evaluation of the hemiplegic patient based on the Bobath approach to treatment is presented. Six parameters are evaluated: sensorium, muscle tone, reflex activity, active movement, postural reactions and pain. The first and last of these are included because of their possible effects on the motor recovery process of the hemiplegic patient. The other four are directly borrowed from the Bobath modality of treatment. For each of these parameters, the procedures are given for its evaluation along with its respective rating scales. These scales are of an ordinal nature ranging from 0 to 3. It is suggested that this new evaluation protocol is fully compatible with the therapeutic modality developed by Bobath and as well is adequate to quantify patient progress in the principle aspects treated by this well used rehabilitation approach.

  3. Reliability evaluation of microgrid considering incentive-based demand response

    Science.gov (United States)

    Huang, Ting-Cheng; Zhang, Yong-Jun

    2017-07-01

    Incentive-based demand response (IBDR) can guide customers to adjust their behaviour of electricity and curtail load actively. Meanwhile, distributed generation (DG) and energy storage system (ESS) can provide time for the implementation of IBDR. The paper focus on the reliability evaluation of microgrid considering IBDR. Firstly, the mechanism of IBDR and its impact on power supply reliability are analysed. Secondly, the IBDR dispatch model considering customer’s comprehensive assessment and the customer response model are developed. Thirdly, the reliability evaluation method considering IBDR based on Monte Carlo simulation is proposed. Finally, the validity of the above models and method is studied through numerical tests on modified RBTS Bus6 test system. Simulation results demonstrated that IBDR can improve the reliability of microgrid.

  4. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  5. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  6. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  7. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  8. Threat driven modeling framework using petri nets for e-learning system.

    Science.gov (United States)

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  9. Model-based efficiency evaluation of combine harvester traction drives

    Directory of Open Access Journals (Sweden)

    Steffen Häberle

    2015-08-01

    Full Text Available As part of the research the drive train of the combine harvesters is investigated in detail. The focus on load and power distribution, energy consumption and usage distribution are explicitly explored on two test machines. Based on the lessons learned during field operations, model-based studies of energy saving potential in the traction train of combine harvesters can now be quantified. Beyond that the virtual machine trial provides an opportunity to compare innovative drivetrain architectures and control solutions under reproducible conditions. As a result, an evaluation method is presented and generically used to draw comparisons under local representative operating conditions.

  10. Exergoeconomic evaluation of a KRW-based IGCC power plant

    International Nuclear Information System (INIS)

    Tsatsavonis, G.; Lin, L.; TawFik, T.; Gallaspy, D.T.

    1991-01-01

    This paper reports on a study supported by the US Department of Energy, in which several design configurations of Kellogg-Rust-Westinghouse (KRW)-based Integrated Gasification-Combined-Cycle (IGCC) power plants were developed. One of these configurations was analyzed from the exergoeconomic (thermoeconomic) viewpoint. The detailed exergoeconomic evaluation identified several changes for improving the cost effectiveness of this IGCC design configuration. Based on the cost information supplied by the M.W. Kellogg Company, an attempt was made to calculate the economically optimal exergetic efficiency for some of the most important plant components. This information is currently used in plant optimization studies

  11. An academic program for experience-based seismic evaluation

    International Nuclear Information System (INIS)

    Nix, S.J.; Meyer, W.; Clemence, S.P.

    1990-01-01

    The authors have been involved in a project, sponsored by the Niagara Mohawk Power Corporation, to develop knowledge-based expert systems to aid in the implementation of the Seismic Qualification Utility Group (SQUG) approach for the seismic qualification of equipment in operating nuclear power plants. This approach, being founded on the use of engineering judgment in the application of prior earthquake experience data, requires comprehensive training. There seems to be general consensus that the experience-based approach is a more cost-effective means of qualifying nuclear power plant equipment when compared to the more traditional analytical methods. The experience-based approach has a number of potential applications in civil engineering, including bridge evaluation and design, seismic adequacy of general structures, foundation design, and water and wastewater treatment plant design and operation. The objective of this paper is to outline an academic curriculum, at the master's level, to educate structural engineers to use and further develop the experience-based approach for seismic evaluation. In the long term, this could lead to the development of academic programs in experience-based assessment and design for a wide range of applications in maintaining the nation's infrastructure

  12. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  13. COMPARISON AND EVALUATION OF CLUSTER BASED IMAGE SEGMENTATION TECHNIQUES

    OpenAIRE

    Hetangi D. Mehta*, Daxa Vekariya, Pratixa Badelia

    2017-01-01

    Image segmentation is the classification of an image into different groups. Numerous algorithms using different approaches have been proposed for image segmentation. A major challenge in segmentation evaluation comes from the fundamental conflict between generality and objectivity. A review is done on different types of clustering methods used for image segmentation. Also a methodology is proposed to classify and quantify different clustering algorithms based on their consistency in different...

  14. Optimized data evaluation for k0-based NAA

    International Nuclear Information System (INIS)

    Van Sluijs, R.; Bossus, D.A.W.

    1999-01-01

    k 0 -NAA allows the simultaneous analysis of up-to 67 elements. The k 0 method is based on calculations using a special library instead of measuring standards. For an efficient use of the method, the calculations and resulting raw data require optimized evaluation procedures. In this paper two efficient procedures for nuclide identification and gamma interference correction are outlined. For a fast computation of the source-detector efficiency and coincidence correction factors the matrix interpolation technique is introduced. (author)

  15. Analyzing Cyber-Physical Threats on Robotic Platforms.

    Science.gov (United States)

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  16. Analyzing Cyber-Physical Threats on Robotic Platforms †

    Science.gov (United States)

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  17. Analyzing Cyber-Physical Threats on Robotic Platforms

    Directory of Open Access Journals (Sweden)

    Khalil M. Ahmad Yousef

    2018-05-01

    Full Text Available Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  18. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  19. Al-Qaida threats and strategies : the religious justification for targeting the international energy economy

    Energy Technology Data Exchange (ETDEWEB)

    Williams, J.F.

    2008-03-15

    Methods of analyzing threats generated by terrorists against the energy industry were discussed. Threat was defined as the product of an adversary's capability, intent, and authority to engage a target using a specific attack mode. The paper argued that robust models for threat must demonstrate a cultural awareness of the adversary in question. The study used an al-Qaida attack to develop and critique the religious justification offered by Salafi-Jihadi religious scholars for attacking the energy industry. The importance of the fatawa's religious authority was evaluated, and cultural drivers for al-Qaida were explored in relation to the threat model. An assessment of past terrorist acts against energy industry infrastructure was conducted. Various relevant fatawa issued by religious scholars were discussed. Socio-political and religious attributes of the al-Qaida movement were outlined using the Combating Terrorism Center's militant ideology atlas. The threat equation was expanded to include authority and cultural influences. The threat model was developed by assigning information to bins of capability, intent, and authority in order to assess and evaluate data. The Kalman filter technique was used to determine threat drivers. 98 refs., 20 figs.

  20. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  1. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    Science.gov (United States)

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Countermeasure Availability, and Ease of Detection. Reproducibility of scoring data was assessed by examining the standard deviations (SD) of mean scores. Our results were unexpected. Several familiar biothreat diseases such as anthrax and tularemia were judged, by our experts, to be less threatening than many others owing to a number of factors including ease of detection, lack of communicability, and the ready availability of countermeasures. Conversely, several toxins were judged by experts to have very high potential as threat agents owing, in part, to their reliability, virulence, and a lack of available countermeasures. Agreement among experts, as determined by lower SD about a mean score, was greater for more familiar threats. Our study was designed to provide a concise and east-to-apply set of criteria that could be used by NATO nations to evaluate emerging infectious disease threats with respect to their weaponization potential. Our results were unexpected. We believe that a lack of appropriate weighting factors may explain these results and suggest that future studies weigh each of the 12 proposed criteria based on the intended use of the assessment data and other situational factors. We believe that the greatest value of our study lies in a codification of the attributes of a biological weapon. © Association of Military Surgeons of the United States 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  2. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  3. Color image definition evaluation method based on deep learning method

    Science.gov (United States)

    Liu, Di; Li, YingChun

    2018-01-01

    In order to evaluate different blurring levels of color image and improve the method of image definition evaluation, this paper proposed a method based on the depth learning framework and BP neural network classification model, and presents a non-reference color image clarity evaluation method. Firstly, using VGG16 net as the feature extractor to extract 4,096 dimensions features of the images, then the extracted features and labeled images are employed in BP neural network to train. And finally achieve the color image definition evaluation. The method in this paper are experimented by using images from the CSIQ database. The images are blurred at different levels. There are 4,000 images after the processing. Dividing the 4,000 images into three categories, each category represents a blur level. 300 out of 400 high-dimensional features are trained in VGG16 net and BP neural network, and the rest of 100 samples are tested. The experimental results show that the method can take full advantage of the learning and characterization capability of deep learning. Referring to the current shortcomings of the major existing image clarity evaluation methods, which manually design and extract features. The method in this paper can extract the images features automatically, and has got excellent image quality classification accuracy for the test data set. The accuracy rate is 96%. Moreover, the predicted quality levels of original color images are similar to the perception of the human visual system.

  4. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  5. Comparative assessment of PIV-based pressure evaluation techniques applied to a transonic base flow

    NARCIS (Netherlands)

    Blinde, P; Michaelis, D; van Oudheusden, B.W.; Weiss, P.E.; de Kat, R.; Laskari, A.; Jeon, Y.J.; David, L; Schanz, D; Huhn, F.; Gesemann, S; Novara, M.; McPhaden, C.; Neeteson, N.; Rival, D.; Schneiders, J.F.G.; Schrijer, F.F.J.

    2016-01-01

    A test case for PIV-based pressure evaluation techniques has been developed by constructing a simulated experiment from a ZDES simulation for an axisymmetric base flow at Mach 0.7. The test case comprises sequences of four subsequent particle images (representing multi-pulse data) as well as

  6. Zika Virus: An Emerging Global Health Threat

    Directory of Open Access Journals (Sweden)

    Rahul Mittal

    2017-12-01

    Full Text Available Zika virus (ZIKV is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV, and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease.

  7. Nuclear threat. A clear and present danger

    International Nuclear Information System (INIS)

    Kikuchi, Masahiro; Nakagome, Yoshihiro

    2005-01-01

    It was disappointed at the discussion in the review conference of the NPT held in 2005. The fact may be caused by the estrangement between the international urgent issues related to the non-proliferation and the effectiveness of archaic measures through the NPT. However, it should not be recognized that the international obligation and worth of NPT has been gone. The NPT referred the typical international situation under the cold war era. Although several permanent issues of the nuclear non-proliferation exist in current discussions, the activities relevant to the NPT may not be effect against newly unstable situations after the September 11th of 2001. Urgent challenges to be taken are that we must strictly analyze the interventions between 'the clear and present danger' of our world and the nuclear herms, and must take appropriate actions toward them without influences from previous international situations that might be subsisted in current international treaties and agreements. This paper identified the features of nuclear threats based on the four categories and examined the possibilities of nuclear terrorism from previous facts with the inductive inference. The results identified the possibility of nuclear facility attack and of radioactive materials theft by the Polico-Religious Groups and others are stood out. The authors would suggest the important of urgent recognition to establish the certain security system against nuclear terrorism. (author)

  8. Zika Virus: An Emerging Global Health Threat

    Science.gov (United States)

    Mittal, Rahul; Nguyen, Desiree; Debs, Luca H.; Patel, Amit P.; Liu, George; Jhaveri, Vasanti M.; S. Kay, Sae-In; Mittal, Jeenu; Bandstra, Emmalee S.; Younis, Ramzi T.; Chapagain, Prem; Jayaweera, Dushyantha T.; Liu, Xue Zhong

    2017-01-01

    Zika virus (ZIKV) is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS) and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV), and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease. PMID:29276699

  9. Risk Evaluation of Railway Coal Transportation Network Based on Multi Level Grey Evaluation Model

    Science.gov (United States)

    Niu, Wei; Wang, Xifu

    2018-01-01

    The railway transport mode is currently the most important way of coal transportation, and now China’s railway coal transportation network has become increasingly perfect, but there is still insufficient capacity, some lines close to saturation and other issues. In this paper, the theory and method of risk assessment, analytic hierarchy process and multi-level gray evaluation model are applied to the risk evaluation of coal railway transportation network in China. Based on the example analysis of Shanxi railway coal transportation network, to improve the internal structure and the competitiveness of the market.

  10. The evaluation of a web-based incident reporting system.

    Science.gov (United States)

    Kuo, Ya-Hui; Lee, Ting-Ting; Mills, Mary Etta; Lin, Kuan-Chia

    2012-07-01

    A Web-based reporting system is essential to report incident events anonymously and confidentially. The purpose of this study was to evaluate a Web-based reporting system in Taiwan. User satisfaction and impact of system use were evaluated through a survey answered by 249 nurses. Incident events reported in paper and electronic systems were collected for comparison purposes. Study variables included system user satisfaction, willingness to report, number of reports, severity of the events, and efficiency of the reporting process. Results revealed that senior nurses were less willing to report events, nurses on internal medicine units had higher satisfaction than others, and lowest satisfaction was related to the time it took to file a report. In addition, the Web-based reporting system was used more often than the paper system. The percentages of events reported were significantly higher in the Web-based system in laboratory, environment/device, and incidents occurring in other units, whereas the proportions of reports involving bedsores and dislocation of endotracheal tubes were decreased. Finally, moderate injury event reporting decreased, whereas minor or minimal injury event reporting increased. The study recommends that the data entry process be simplified and the network system be improved to increase user satisfaction and reporting rates.

  11. Deterministic and fuzzy-based methods to evaluate community resilience

    Science.gov (United States)

    Kammouh, Omar; Noori, Ali Zamani; Taurino, Veronica; Mahin, Stephen A.; Cimellaro, Gian Paolo

    2018-04-01

    Community resilience is becoming a growing concern for authorities and decision makers. This paper introduces two indicator-based methods to evaluate the resilience of communities based on the PEOPLES framework. PEOPLES is a multi-layered framework that defines community resilience using seven dimensions. Each of the dimensions is described through a set of resilience indicators collected from literature and they are linked to a measure allowing the analytical computation of the indicator's performance. The first method proposed in this paper requires data on previous disasters as an input and returns as output a performance function for each indicator and a performance function for the whole community. The second method exploits a knowledge-based fuzzy modeling for its implementation. This method allows a quantitative evaluation of the PEOPLES indicators using descriptive knowledge rather than deterministic data including the uncertainty involved in the analysis. The output of the fuzzy-based method is a resilience index for each indicator as well as a resilience index for the community. The paper also introduces an open source online tool in which the first method is implemented. A case study illustrating the application of the first method and the usage of the tool is also provided in the paper.

  12. Evaluation of a case-based urology learning program.

    Science.gov (United States)

    Mishra, Kirtishri; Snow-Lisy, Devon C; Ross, Jonathan; Goldfarb, David A; Goldman, Howard; Campbell, Steven C

    2013-12-01

    To address the challenges that today's trainees encounter, such as information overload and reduced immersion in the field, and recognizing their preference for novel educational resources, an electronic case-based urology learning program was developed. Each case was designed to illustrate the basic principles of the disease process and the fundamentals of evaluation and management using the Socratic method, recapitulating a prototypical patient encounter. A 21-question survey was developed after review of published reports of classroom and clinical learning environment surveys. The target group was 2 pilot urology training programs (the Cleveland Clinic and University Hospitals-Case Medical Center). The responses were entirely anonymous. A total of 32 trainees participated (8 fellows and 24 residents), representing a 53% response rate. Most trainees (79%) were able to process cases within an average of ≤ 10 minutes. Of the trainees, 91% reported referring back to particular cases for patient care, to review for examinations, or for studying. Most trainees believed a case-based urology learning program would be a potentially important resource for clinical practice (69%) and for preparing for the in-service (63%) or board (69%) examinations. Most trainees believed the program met its goals of illustrating the basics principles of the disease process (88%), outlining the fundamentals of evaluation and management (94%), and improving the trainees' knowledge base (91%). An electronic case-based urology learning program is feasible and useful and stimulates learning at all trainee levels. Copyright © 2013 Elsevier Inc. All rights reserved.

  13. Efficient p-value evaluation for resampling-based tests

    KAUST Repository

    Yu, K.

    2011-01-05

    The resampling-based test, which often relies on permutation or bootstrap procedures, has been widely used for statistical hypothesis testing when the asymptotic distribution of the test statistic is unavailable or unreliable. It requires repeated calculations of the test statistic on a large number of simulated data sets for its significance level assessment, and thus it could become very computationally intensive. Here, we propose an efficient p-value evaluation procedure by adapting the stochastic approximation Markov chain Monte Carlo algorithm. The new procedure can be used easily for estimating the p-value for any resampling-based test. We show through numeric simulations that the proposed procedure can be 100-500 000 times as efficient (in term of computing time) as the standard resampling-based procedure when evaluating a test statistic with a small p-value (e.g. less than 10( - 6)). With its computational burden reduced by this proposed procedure, the versatile resampling-based test would become computationally feasible for a much wider range of applications. We demonstrate the application of the new method by applying it to a large-scale genetic association study of prostate cancer.

  14. Simulation-based decision support for evaluating operational plans

    Directory of Open Access Journals (Sweden)

    Johan Schubert

    2015-12-01

    Full Text Available In this article, we describe simulation-based decision support techniques for evaluation of operational plans within effects-based planning. Using a decision support tool, developers of operational plans are able to evaluate thousands of alternative plans against possible courses of events and decide which of these plans are capable of achieving a desired end state. The objective of this study is to examine the potential of a decision support system that helps operational analysts understand the consequences of numerous alternative plans through simulation and evaluation. Operational plans are described in the effects-based approach to operations concept as a set of actions and effects. For each action, we examine several different alternative ways to perform the action. We use a representation where a plan consists of several actions that should be performed. Each action may be performed in one of several different alternative ways. Together these action alternatives make up all possible plan instances, which are represented as a tree of action alternatives that may be searched for the most effective sequence of alternative actions. As a test case, we use an expeditionary operation with a plan of 43 actions and several alternatives for these actions, as well as a scenario of 40 group actors. Decision support for planners is provided by several methods that analyze the impact of a plan on the 40 actors, e.g., by visualizing time series of plan performance. Detailed decision support for finding the most influential actions of a plan is presented by using sensitivity analysis and regression tree analysis. Finally, a decision maker may use the tool to determine the boundaries of an operation that it must not move beyond without risk of drastic failure. The significant contribution of this study is the presentation of an integrated approach for evaluation of operational plans.

  15. At a global scale, do climate change threatened species also face a greater number of non-climatic threats?

    Directory of Open Access Journals (Sweden)

    Lucas B. Fortini

    2017-07-01

    Full Text Available For many species the threats of climate change occur in a context of multiple existing threats. Given the current focus of global change ecology in identifying and understanding species vulnerable to climate change, we performed a global analysis to characterize the multi-threat context for species threatened by climate change. Utilizing 30,053 species from the International Union for Conservation of Nature’s (IUCN Red List of Threatened Species, we sought to evaluate if species threatened by climate change are more likely threatened by a greater number of non-climatic threats than species not threatened by climate change. Our results show that species threatened by climate change are generally impacted by 21% more non-climatic threats than species not threatened by climate change. Across all species, this pattern is related to IUCN risk status, where endangered species threatened by climate change face 33% more non-climatic threats than endangered species not threatened by climate change. With the clear challenges of assessing current and projected impacts of climate change on species and ecosystems, research often requires reductionist approaches that result in downplaying this multi-threat context. This cautionary note bears relevance beyond climate change threatened species as we also found other (but not all anthropogenic threats are also similarly associated with more threats. Our findings serve as a reminder that ecological research should seriously consider these potential threat interactions, especially for species under elevated conservation concern.

  16. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    Science.gov (United States)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  17. Performance evaluation of nursing students following competency-based education.

    Science.gov (United States)

    Fan, Jun-Yu; Wang, Yu Hsin; Chao, Li Fen; Jane, Sui-Whi; Hsu, Li-Ling

    2015-01-01

    Competency-based education is known to improve the match between educational performance and employment opportunities. This study examined the effects of competency-based education on the learning outcomes of undergraduate nursing students. The study used a quasi-experimental design. A convenience sample of 312 second-year undergraduate nursing students from northern and southern Taiwan participated in the study. The experimental group (n=163) received competency-based education and the control group received traditional instruction (n=149) in a medical-surgical nursing course. Outcome measures included students' scores on the Objective Structured Clinical Examination, Self-Evaluated Core Competencies Scale, Metacognitive Inventory for Nursing Students questionnaire, and academic performance. Students who received competency-based education had significantly higher academic performance in the medical-surgical nursing course and practicum than did the control group. Required core competencies and metacognitive abilities improved significantly in the competency-based education group as compared to the control group after adjusting for covariates. Competency-based education is worth implementing and may close the gap between education and the ever-changing work environment. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Advances in complex reservoir evaluation based on geophysical well logs

    Energy Technology Data Exchange (ETDEWEB)

    Fertl, W.H.; Sinha, A.K. (Western Atlas International, Inc., Houston, TX (USA)); McDougall, J.G. (Western Atlas Canada Ltd., Calgary, AB (Canada))

    1988-09-01

    The matrix of reservoirs having complex lithologies, cause different density, neutron, and acoustic responses. Therefore the lithologies and effective porosity of reservoirs can be determined by using various crossplot techniques on data collected from two of these logs. The Complex Reservoir Analysis program (CRA) computes lithology, porosity, water saturation and relative permeabilities in formations with interbedded limestone, dolomite, and anhydrite. Porosity options include crossplot and individual log response techniques. Corrections for light hydrocarbons were applied. In solving for porosity and mineral volumes, sand, limestone, dolomite, and anhydrite lines were defined on either density/neutron or neutron/acoustic crossplots. Four additional mineral lines were specified. Incorporation of Pe data from the Z-Densilog provided a significant advance in evaluating complex reservoirs via the Z-CRA analysis. The classic reservoir evaluation program CLASS, was used to perform both minerals and shaly evaluation based on density, neutron, resistivity, and natural gamma ray spectral measurements. Computations included total and effective porosities, fluid saturation distribution based on the Wasman-Smits model, productivity indices, and volume and distribution of clay minerals. Additional computed formation parameters included log-derived cation exchange capacity and hydrogen index of dry clay matrix to determine the type and amount of smectite, illite and chlorite/kaolinite present. Canadian field experiences was used to illustrate and support the techniques described. 11 refs., 11 figs., 6 tabs.

  19. Evaluation of upper limb muscle fatigue based on surface electromyography.

    Science.gov (United States)

    Zhou, Qianxiang; Chen, Yuhong; Ma, Chao; Zheng, Xiaohui

    2011-10-01

    Fatigue is believed to be a major contributory factor to occupational injuries in machine operators. The development of accurate and usable techniques to measure operator fatigue is therefore important. In this study, we used a novel method based on surface electromyography (sEMG) of the biceps brachii and the Borg scale to evaluate local muscle fatigue in the upper limb after isometric muscle action. Thirteen young males performed isometric actions with the upper limb at different force levels. sEMG activities of the biceps brachii were recorded during the actions. Borg scales were used to evaluate the subjective sensation of local fatigue of the biceps brachii after the actions. sEMG activities were analyzed using the one-third band octave method, and an equation to determine the degree of fatigue was derived based on the relationship between the variable and the Borg scale. The results showed that the relationship could be expressed by a conic curve, and could be used to evaluate muscle fatigue during machine operation.

  20. Shifting the evaluative gaze: Community-based program evaluation in the homeless sector

    Directory of Open Access Journals (Sweden)

    Bruce Wallace

    2015-09-01

    Full Text Available Homelessness is a growing social issue that is a consequence of structural inequities and contributor to the development of health inequities. Community-based research (CBR has been proposed as an effective research strategy for addressing health equities and promoting social justice through participatory processes. The purpose of this article is to examine the application of CBR principles and practices in the homeless sector and the implications for the production of knowledge and social change to address homelessness. Drawing on our experiences as researchers and service providers, we reflect on the significant successes and challenges associated with using CBR in the homelessness sector. In our discussion we emphasise insights, challenges and lessons learned from a community-university partnership that focused on an evaluation of a transitional shelter program in a large urban centre where housing is expensive and often unavailable. Keywords: Homelessness, housing, transitional housing, transitional shelter, program evaluation, community-based research

  1. Forecasting Lightning Threat using Cloud-resolving Model Simulations

    Science.gov (United States)

    McCaul, E. W., Jr.; Goodman, S. J.; LaCasse, K. M.; Cecil, D. J.

    2009-01-01

    As numerical forecasts capable of resolving individual convective clouds become more common, it is of interest to see if quantitative forecasts of lightning flash rate density are possible, based on fields computed by the numerical model. Previous observational research has shown robust relationships between observed lightning flash rates and inferred updraft and large precipitation ice fields in the mixed phase regions of storms, and that these relationships might allow simulated fields to serve as proxies for lightning flash rate density. It is shown in this paper that two simple proxy fields do indeed provide reasonable and cost-effective bases for creating time-evolving maps of predicted lightning flash rate density, judging from a series of diverse simulation case study events in North Alabama for which Lightning Mapping Array data provide ground truth. One method is based on the product of upward velocity and the mixing ratio of precipitating ice hydrometeors, modeled as graupel only, in the mixed phase region of storms at the -15\\dgc\\ level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domainwide statistics of the peak values of simulated flash rate proxy fields against domainwide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. A blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Weather Research and Forecast Model simulations of selected North Alabama cases show that this model can distinguish the general character and intensity of most convective events, and that the proposed methods show promise as a means of generating

  2. Comprehensive evaluation of Shahid Motahari Educational Festival during 2008-2013 based on CIPP Evaluation Model

    Directory of Open Access Journals (Sweden)

    SN Hosseini

    2014-09-01

    Full Text Available Introduction: Education quality improvement is one of the main goals of higher education. In this regard, has been provided various solutions such as holding educational Shahid Motahari annual festivals, in order to appreciate of educational process, development and innovation educational processes and procedures, preparation of calibration standards and processes of accrediting educational. The aim of this study was to comprehensive evaluating of educational Shahid Motahari festival during six periods (2008-2013 based on CIPP evaluation model. Method : This cross-sectional study was conducted among the 473 faculty members include deputies and administrators educational, administrators and faculty members of medical education development centers, members of the scientific committee and faculty member’s participants in Shahid Motahari festival from 42 universities medical sciences of Iran. Data collection based on self-report writing questionnaires. Data were analyzed by SPSS version 20 at α=0.05 significant level. Results: The subjects reported 75.13%, 65.33%, 64.5%, and 59.21 % of receivable scores of process, context, input and product, respectively. In addition, there was a direct and significant correlation between all domains . Conclusion : According to the study findings, in the evaluation and correlation of domains models, we can explicitly how to holding festivals was appropriate and the main reason for the poor evaluation in product domain is related to the problems in input and product domains.

  3. Research on image complexity evaluation method based on color information

    Science.gov (United States)

    Wang, Hao; Duan, Jin; Han, Xue-hui; Xiao, Bo

    2017-11-01

    In order to evaluate the complexity of a color image more effectively and find the connection between image complexity and image information, this paper presents a method to compute the complexity of image based on color information.Under the complexity ,the theoretical analysis first divides the complexity from the subjective level, divides into three levels: low complexity, medium complexity and high complexity, and then carries on the image feature extraction, finally establishes the function between the complexity value and the color characteristic model. The experimental results show that this kind of evaluation method can objectively reconstruct the complexity of the image from the image feature research. The experimental results obtained by the method of this paper are in good agreement with the results of human visual perception complexity,Color image complexity has a certain reference value.

  4. Evaluation of an app-based stress protocol

    Directory of Open Access Journals (Sweden)

    Noeh Claudius

    2016-09-01

    Full Text Available Stress is a major influence on the quality of life in our fast-moving society. This paper describes a standardized and contemporary protocol that is capable of inducing moderate psychological stress in a laboratory setting. Furthermore, it evaluates its effects on physiological biomarkers. The protocol called “THM-Stresstest” mainly consists of a rest period (30 min, an app-based stress test under the surveillance of an audience (4 min and a regeneration period (32 min. We investigated 12 subjects to evaluate the developed protocol. We could show significant changes in heart rate variability, electromyography, electro dermal activity and salivary cortisol and α-amylase. From this data we conclude that the THM-Stresstest can serve as a psychobiological tool for provoking responses in the cardiovascular-, the endocrine and exocrine system as well as the sympathetic part of the central nervous system.

  5. Exploration of Urban Spatial Planning Evaluation Based on Humanland Harmony

    Science.gov (United States)

    Hu, X. S.; Ma, Q. R.; Liang, W. Q.; Wang, C. X.; Xiong, X. Q.; Han, X. H.

    2017-09-01

    This study puts forward a new concept, "population urbanization level forecast - driving factor analysis - urban spatial planning analysis" for achieving efficient and intensive development of urbanization considering human-land harmony. We analyzed big data for national economic and social development, studied the development trends of population urbanization and its influencing factors using the grey system model in Chengmai county of Hainan province, China. In turn, we calculated the population of Chengmai coming years based on the forecasting urbanization rate and the corresponding amount of urban construction land, and evaluated the urban spatial planning with GIS spatial analysis method in the study area. The result shows that the proposed concept is feasible for evaluation of urban spatial planning, and is meaningful for guiding the rational distribution of urban space, controlling the scale of development, improving the quality of urbanization and thus promoting highly-efficient and intensive use of limited land resource.

  6. Neurally based measurement and evaluation of environmental noise

    CERN Document Server

    Soeta, Yoshiharu

    2015-01-01

    This book deals with methods of measurement and evaluation of environmental noise based on an auditory neural and brain-oriented model. The model consists of the autocorrelation function (ACF) and the interaural cross-correlation function (IACF) mechanisms for signals arriving at the two ear entrances. Even when the sound pressure level of a noise is only about 35 dBA, people may feel annoyed due to the aspects of sound quality. These aspects can be formulated by the factors extracted from the ACF and IACF. Several examples of measuring environmental noise—from outdoor noise such as that of aircraft, traffic, and trains, and indoor noise such as caused by floor impact, toilets, and air-conditioning—are demonstrated. According to the noise measurement and evaluation, applications for sound design are discussed. This book provides an excellent resource for students, researchers, and practitioners in a wide range of fields, such as the automotive, railway, and electronics industries, and soundscape, architec...

  7. Performance Evaluation of Air-Based Heat Rejection Systems

    Directory of Open Access Journals (Sweden)

    Hannes Fugmann

    2015-01-01

    Full Text Available On the basis of the Number of Transfer Units (NTU method a functional relation between electric power for fans/pumps and effectiveness in dry coolers and wet cooling towers is developed. Based on this relation, a graphical presentation method of monitoring and simulation data of heat rejection units is introduced. The functional relation allows evaluating the thermodynamic performance of differently sized heat rejection units and comparing performance among them. The method is used to evaluate monitoring data of dry coolers of different solar cooling field projects. The novelty of this approach is that performance rating is not limited by a design point or standardized operating conditions of the heat exchanger, but is realizable under flexible conditions.

  8. Performance Evaluation of a Biometric System Based on Acoustic Images

    Science.gov (United States)

    Izquierdo-Fuente, Alberto; del Val, Lara; Jiménez, María I.; Villacorta, Juan J.

    2011-01-01

    An acoustic electronic scanning array for acquiring images from a person using a biometric application is developed. Based on pulse-echo techniques, multifrequency acoustic images are obtained for a set of positions of a person (front, front with arms outstretched, back and side). Two Uniform Linear Arrays (ULA) with 15 λ/2-equispaced sensors have been employed, using different spatial apertures in order to reduce sidelobe levels. Working frequencies have been designed on the basis of the main lobe width, the grating lobe levels and the frequency responses of people and sensors. For a case-study with 10 people, the acoustic profiles, formed by all images acquired, are evaluated and compared in a mean square error sense. Finally, system performance, using False Match Rate (FMR)/False Non-Match Rate (FNMR) parameters and the Receiver Operating Characteristic (ROC) curve, is evaluated. On the basis of the obtained results, this system could be used for biometric applications. PMID:22163708

  9. Performance Evaluation of a Biometric System Based on Acoustic Images

    Directory of Open Access Journals (Sweden)

    Juan J. Villacorta

    2011-10-01

    Full Text Available An acoustic electronic scanning array for acquiring images from a person using a biometric application is developed. Based on pulse-echo techniques, multifrequency acoustic images are obtained for a set of positions of a person (front, front with arms outstretched, back and side. Two Uniform Linear Arrays (ULA with 15 l/2-equispaced sensors have been employed, using different spatial apertures in order to reduce sidelobe levels. Working frequencies have been designed on the basis of the main lobe width, the grating lobe levels and the frequency responses of people and sensors. For a case-study with 10 people, the acoustic profiles, formed by all images acquired, are evaluated and compared in a mean square error sense. Finally, system performance, using False Match Rate (FMR/False Non-Match Rate (FNMR parameters and the Receiver Operating Characteristic (ROC curve, is evaluated. On the basis of the obtained results, this system could be used for biometric applications.

  10. Abalone Muscle Texture Evaluation and Prediction Based on TPA Experiment

    Directory of Open Access Journals (Sweden)

    Jiaxu Dong

    2017-01-01

    Full Text Available The effects of different heat treatments on abalones’ texture properties and sensory characteristics were studied. Thermal processing of abalone muscle was analyzed to determine the optimal heat treatment condition based on fuzzy evaluation. The results showed that heat treatment at 85°C for 1 hour had certain desirable effects on the properties of the abalone meat. Specifically, a back propagation (BP neural network was introduced to predict the equations of statistically significant sensory hardness, springiness, and smell using the texture data gained through TPA (texture profile analysis experiments as input and sensory evaluation data as the desired output. The final outcome was that the predictability was proved to be satisfactory, with an average error of 6.93%.

  11. Module-based quality system functionality evaluation in production logistics

    Energy Technology Data Exchange (ETDEWEB)

    Khabbazi, M.R.; Wikander, J.; Onori, M.; Maffei, A.; Chen, D.

    2016-07-01

    This paper addresses a comprehensive modeling and functionality evaluation of a module-based quality system in production logistics at the highest domain abstract level of business processes. All domain quality business processes and quality data transactions are modeled using BPMN and UML tools and standards at the business process and data modeling. A modular web-based prototype is developed to evaluate the models addressing the quality information system functionality requirements and modularity in production logistics through data scenarios and data queries. Using the object-oriented technique in design at the highest domain level, the proposed models are subject further development in the lower levels for the implementing case. The models are specifically able to manipulate all quality operations including remedy and control in a lot-based make-to-order production logistics system as an individual module. Due to the specification of system as domain design structure, all proposed BPMs, data models, and the actual database prototype are seen referential if not a solution as a practical “to-be” quality business process re-engineering template. This paper sets out to provide an explanatory approach using different practical technique at modeling steps as well as the prototype implementation. (Author)

  12. Bio-Based Adhesives and Evaluation for Wood Composites Application

    Directory of Open Access Journals (Sweden)

    Fatemeh Ferdosian

    2017-02-01

    Full Text Available There has been a rapid growth in research and innovation of bio-based adhesives in the engineered wood product industry. This article reviews the recent research published over the last few decades on the synthesis of bio-adhesives derived from such renewable resources as lignin, starch, and plant proteins. The chemical structure of these biopolymers is described and discussed to highlight the active functional groups that are used in the synthesis of bio-adhesives. The potentials and drawbacks of each biomass are then discussed in detail; some methods have been suggested to modify their chemical structures and to improve their properties including water resistance and bonding strength for their ultimate application as wood adhesives. Moreover, this article includes discussion of techniques commonly used for evaluating the petroleum-based wood adhesives in terms of mechanical properties and penetration behavior, which are expected to be more widely applied to bio-based wood adhesives to better evaluate their prospect for wood composites application.

  13. Evaluating conducting network based transparent electrodes from geometrical considerations

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Ankush [Chemistry and Physics of Materials Unit, Jawaharlal Nehru Centre for Advanced Scientific Research, 560064 Bangalore (India); Kulkarni, G. U., E-mail: guk@cens.res.in [Centre for Nano and Soft Matter Sciences, 560013 Bangalore (India)

    2016-01-07

    Conducting nanowire networks have been developed as viable alternative to existing indium tin oxide based transparent electrode (TE). The nature of electrical conduction and process optimization for electrodes have gained much from the theoretical models based on percolation transport using Monte Carlo approach and applying Kirchhoff's law on individual junctions and loops. While most of the literature work pertaining to theoretical analysis is focussed on networks obtained from conducting rods (mostly considering only junction resistance), hardly any attention has been paid to those made using template based methods, wherein the structure of network is neither similar to network obtained from conducting rods nor similar to well periodic geometry. Here, we have attempted an analytical treatment based on geometrical arguments and applied image analysis on practical networks to gain deeper insight into conducting networked structure particularly in relation to sheet resistance and transmittance. Many literature examples reporting networks with straight or curvilinear wires with distributions in wire width and length have been analysed by treating the networks as two dimensional graphs and evaluating the sheet resistance based on wire density and wire width. The sheet resistance values from our analysis compare well with the experimental values. Our analysis on various examples has revealed that low sheet resistance is achieved with high wire density and compactness with straight rather than curvilinear wires and with narrower wire width distribution. Similarly, higher transmittance for given sheet resistance is possible with narrower wire width but of higher thickness, minimal curvilinearity, and maximum connectivity. For the purpose of evaluating active fraction of the network, the algorithm was made to distinguish and quantify current carrying backbone regions as against regions containing only dangling or isolated wires. The treatment can be helpful in

  14. Evaluating conducting network based transparent electrodes from geometrical considerations

    International Nuclear Information System (INIS)

    Kumar, Ankush; Kulkarni, G. U.

    2016-01-01

    Conducting nanowire networks have been developed as viable alternative to existing indium tin oxide based transparent electrode (TE). The nature of electrical conduction and process optimization for electrodes have gained much from the theoretical models based on percolation transport using Monte Carlo approach and applying Kirchhoff's law on individual junctions and loops. While most of the literature work pertaining to theoretical analysis is focussed on networks obtained from conducting rods (mostly considering only junction resistance), hardly any attention has been paid to those made using template based methods, wherein the structure of network is neither similar to network obtained from conducting rods nor similar to well periodic geometry. Here, we have attempted an analytical treatment based on geometrical arguments and applied image analysis on practical networks to gain deeper insight into conducting networked structure particularly in relation to sheet resistance and transmittance. Many literature examples reporting networks with straight or curvilinear wires with distributions in wire width and length have been analysed by treating the networks as two dimensional graphs and evaluating the sheet resistance based on wire density and wire width. The sheet resistance values from our analysis compare well with the experimental values. Our analysis on various examples has revealed that low sheet resistance is achieved with high wire density and compactness with straight rather than curvilinear wires and with narrower wire width distribution. Similarly, higher transmittance for given sheet resistance is possible with narrower wire width but of higher thickness, minimal curvilinearity, and maximum connectivity. For the purpose of evaluating active fraction of the network, the algorithm was made to distinguish and quantify current carrying backbone regions as against regions containing only dangling or isolated wires. The treatment can be helpful in

  15. Evaluation of a commercial biologically based IMRT treatment planning system

    International Nuclear Information System (INIS)

    Semenenko, Vladimir A.; Reitz, Bodo; Day, Ellen; Qi, X. Sharon; Miften, Moyed; Li, X. Allen

    2008-01-01

    A new inverse treatment planning system (TPS) for external beam radiation therapy with high energy photons is commercially available that utilizes both dose-volume-based cost functions and a selection of cost functions which are based on biological models. The purpose of this work is to evaluate quality of intensity-modulated radiation therapy (IMRT) plans resulting from the use of biological cost functions in comparison to plans designed using a traditional TPS employing dose-volume-based optimization. Treatment planning was performed independently at two institutions. For six cancer patients, including head and neck (one case from each institution), prostate, brain, liver, and rectal cases, segmental multileaf collimator IMRT plans were designed using biological cost functions and compared with clinically used dose-based plans for the same patients. Dose-volume histograms and dosimetric indices, such as minimum, maximum, and mean dose, were extracted and compared between the two types of treatment plans. Comparisons of the generalized equivalent uniform dose (EUD), a previously proposed plan quality index (fEUD), target conformity and heterogeneity indices, and the number of segments and monitor units were also performed. The most prominent feature of the biologically based plans was better sparing of organs at risk (OARs). When all plans from both institutions were combined, the biologically based plans resulted in smaller EUD values for 26 out of 33 OARs by an average of 5.6 Gy (range 0.24 to 15 Gy). Owing to more efficient beam segmentation and leaf sequencing tools implemented in the biologically based TPS compared to the dose-based TPS, an estimated treatment delivery time was shorter in most (five out of six) cases with some plans showing up to 50% reduction. The biologically based plans were generally characterized by a smaller conformity index, but greater heterogeneity index compared to the dose-based plans. Overall, compared to plans based on dose

  16. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  17. Defending against the Advanced Persistent Threat: An Optimal Control Approach

    Directory of Open Access Journals (Sweden)

    Pengdeng Li

    2018-01-01

    Full Text Available The new cyberattack pattern of advanced persistent threat (APT has posed a serious threat to modern society. This paper addresses the APT defense problem, that is, the problem of how to effectively defend against an APT campaign. Based on a novel APT attack-defense model, the effectiveness of an APT defense strategy is quantified. Thereby, the APT defense problem is modeled as an optimal control problem, in which an optimal control stands for a most effective APT defense strategy. The existence of an optimal control is proved, and an optimality system is derived. Consequently, an optimal control can be figured out by solving the optimality system. Some examples of the optimal control are given. Finally, the influence of some factors on the effectiveness of an optimal control is examined through computer experiments. These findings help organizations to work out policies of defending against APTs.

  18. The Evidence-Based Evaluation of Iron Deficiency Anemia.

    Science.gov (United States)

    Hempel, Eliana V; Bollard, Edward R

    2016-09-01

    Anemia is a prevalent disease with multiple possible etiologies and resultant complications. Iron deficiency anemia is a common cause of anemia and is typically due to insufficient intake, poor absorption, or overt or occult blood loss. Distinguishing iron deficiency from other causes of anemia is integral to initiating the appropriate treatment. In addition, identifying the underlying cause of iron deficiency is also necessary to help guide management of these patients. We review the key components to an evidence-based, cost-conscious evaluation of suspected iron deficiency anemia. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. Dissolution Threats and Legislative Bargaining

    DEFF Research Database (Denmark)

    Becher, Michael; Christiansen, Flemming Juul

    2015-01-01

    Chief executives in many parliamentary democracies have the power to dissolve the legislature. Despite a well-developed literature on the endogenous timing of parliamentary elections, political scientists know remarkably little about the strategic use of dissolution power to influence policymaking....... To address this gap, we propose and empirically evaluate a theoretical model of legislative bargaining in the shadow of executive dissolution power. The model implies that the chief executive's public support and legislative strength, as well as the time until the next constitutionally mandated election...

  20. Managing the Aviation Insider Threat

    Science.gov (United States)

    2010-12-01

    World Airport NSAS National Strategy for Aviation Security OIS Office of Intelligence SIDA Security Identification Display Area STA Security...Security of the secured area”, 1542.205, “Security of the security identification display area ( SIDA )”, and 1542.209, “Fingerprint-based criminal