WorldWideScience

Sample records for based threat evaluation

  1. A Category Based Threat Evaluation Model Using Platform Kinematics Data

    Directory of Open Access Journals (Sweden)

    Mustafa Çöçelli

    2017-08-01

    Full Text Available Command and control (C2 systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to military people. However, C2 systems could be deprived of valuable data source due to the absence of capable equipment. This situation has a bad unfavorable influence on the quality of tactical picture in front of C2 operators. In this paper, we study on the threat evaluation model that take into account these deficiencies. Our method extracts threat level of various targets mostly from their kinematics in two dimensional space. In the meantime, classification of entities around battlefield is unavailable. Only, category of targets are determined as a result of sensors process, which is the information of whether entities belong to air or surface environment. Hereby, threat evaluation model is consist of three fundamental steps that runs on entities belongs to different environment separately: the extraction of threat assessment cues, threat selection based on Bayesian Inference and the calculation of threat assessment rating. We have evaluated performance of proposed model by simulating a set of synthetic scenarios.

  2. How Ego-threats Facilitate Contracts Based on Subjective Evaluations

    DEFF Research Database (Denmark)

    Sebald, Alexander; Walzl, Markus

    We show that individuals' desire to protect their self-esteem against ego-threatening feedback can mitigate moral hazard in environments with purely subjective performance evaluations. In line with evidence from social psychology we assume that agents' react aggressively to evaluations by the pri......We show that individuals' desire to protect their self-esteem against ego-threatening feedback can mitigate moral hazard in environments with purely subjective performance evaluations. In line with evidence from social psychology we assume that agents' react aggressively to evaluations...... by the principal which do not coincide with their own positive self-perceptions and thereby generate costs of conflict for the principal. We identify conditions for a positive welfare effect of increasing costs of conflict or increasing sensitivity to ego-threats, and a negative welfare effect of a more...

  3. Real-time threat evaluation in a ground based air defence environment

    Directory of Open Access Journals (Sweden)

    JN Roux

    2008-06-01

    Full Text Available In a military environment a ground based air defence operator is required to evaluate the tactical situation in real-time and protect Defended Assets (DAs on the ground against aerial threats by assigning available Weapon Systems (WSs to engage enemy aircraft. Since this aerial environment requires rapid operational planning and decision making in stress situations, the associated responsibilities are typically divided between a number of operators and computerized systems that aid these operators during the decision making processes. One such a Decision Support System (DSS, a threat evaluation and weapon assignment system, assigns threat values to aircraft (with respect to DAs in real-time and uses these values to propose possible engagements of observed enemy aircraft by anti-aircraft WSs. In this paper a design of the threat evaluation part of such a DSS is put forward. The design follows the structured approach suggested in [Roux JN & van Vuuren JH, 2007, Threat evaluation and weapon assignment decision support: A review of the state of the art, ORiON, 23(2, pp. 151-187], phasing in a suite of increasingly complex qualitative and quantitative model components as more (reliable data become available.

  4. Real-time threat evaluation in a ground based air defence ...

    African Journals Online (AJOL)

    In a military environment a ground based air defence operator is required to evaluate the tactical situation in real-time and protect Defended Assets (DAs) on the ground against aerial threats by assigning available Weapon Systems (WSs) to engage enemy aircraft. Since this aerial environment requires rapid operational ...

  5. Web-based IP telephony penetration system evaluating level of protection from attacks and threats

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2011-01-01

    This article deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. SIP is being widely used in building VoIP networks. Unlike the traditional telephone networks VoIP networks does not have a closed communication which makes communication medium vulnerable to all kinds of attacks from the in truders. The SIP server is a key component of VoIP infrastr...

  6. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  7. Evaluation of Potential Biological Threats in Ukraine

    International Nuclear Information System (INIS)

    Pozdnyakova, L.; Slavina, N.; Pozdnyakov, S.

    2007-01-01

    Dilating of biological threats spectrum, EDI diffusion opportunities and routes, unpredictability of outbreaks connected with connatural, technogenic, terrorist factors determines constant monitoring and readiness for operative BPA indication and identification. Scientific analytical approach of existing and probable regional bio-threats evaluation is necessary for adequate readiness system creation and maintenance of medical counteraction tactics to probable biological threats. Basing on the international experience, we carry out analysis of a situation present in Ukraine and routes for the decisions. The basic directions are: - Evaluation of a reality for EDI penetration from abroad and presence of conditions for their further diffusion inside the country. - Revealing of presence and definition of connatural EDI foci biocenoses features and BPAs. - Appropriate level of biological safety and physical protection of bio-laboratories and pathogens collections maintenance. - Gene/molecular and phenotypical definition of EDI circulating strains. - Creation of the circulating EDI gene/ phenotypic characteristics regional data bank. - Ranging of EDI actual for area. - Introduction of GPT, mathematical modeling and forecasting for tactics development in case of technogenic accidents and connatural outbreaks. - Methodical basis and equipment improvement for BPA system indication for well-timed identification of natural, or modified agent. - Education and training The international cooperation in maintenance of biosafety and bioprotection within the framework of scientific programs, grants, exchange of experience, introduction of international standards and rules are among basic factors in the decision for creating system national biosafety for countries not included in EU and the NATO. (author)

  8. Security Evaluation of the Cyber Networks under Advanced Persistent Threats

    NARCIS (Netherlands)

    Yang, L.; Li, Pengdeng; Yang, Xiaofan; Tang, Yuan Yan

    2017-01-01

    Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose, a dynamic model capturing the APT-based

  9. Threat evaluation and weapon assignment decision support: A ...

    African Journals Online (AJOL)

    ... stands within the context of a ground based air defence system (GBADS) at the turn of the twenty first century. However, much of the contents of the paper maye generalized to military environments other than a GBADS one. Keywords: Threat evaluation, weapon assignment, decision support. ORiON Vol. 23 (2) 2007: pp.

  10. Where Local and National Evaluators Meet: Unintended Threats to Ethical Evaluation Practice

    Science.gov (United States)

    Rodi, Michael S.; Paget, Kathleen D.

    2007-01-01

    The ethical work of program evaluators is based on a covenant of honesty and transparency among stakeholders. Yet even under the most favorable evaluation conditions, threats to ethical standards exist and muddle that covenant. Unfortunately, ethical issues associated with different evaluation structures and contracting arrangements have received…

  11. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation

  12. Evaluative threat and ambulatory blood pressure: cardiovascular effects of social stress in daily experience.

    Science.gov (United States)

    Smith, Timothy W; Birmingham, Wendy; Uchino, Bert N

    2012-11-01

    Physiological effects of social evaluation are central in models of psychosocial influences on physical health. Experimental manipulations of evaluative threat evoke substantial cardiovascular and neuroendocrine responses in laboratory studies, but only preliminary evidence is available regarding naturally occurring evaluative threats in daily life. In such nonexperimental ambulatory studies, it is essential to distinguish effects of evaluative threat from related constructs known to alter stress, such as ability perceptions and concerns about appearance. 94 married, working couples (mean age 29.2 years) completed a 1-day (8 a.m. to 10 p.m.) ambulatory blood pressure protocol with random interval-contingent measurements using a Suntech monitor and Palm Pilot-based measures of control variables and momentary experiences of social-evaluative threat, concerns about appearance, and perceived ability. In hierarchical analyses for couples and multiple measurement occasions (Proc Mixed; SAS) and controlling individual differences (BMI, age, income) and potential confounds (e.g., posture, activity), higher reports of social-evaluative threat were associated with higher concurrent systolic (estimate = .87, SE = .34) and diastolic blood pressure (estimate = 1.06; SE = .26), both p social-evaluative threat remained significant when perceived ability and appearance concerns were controlled. Naturally occurring social-evaluative threat during daily activity is associated with increased systolic and diastolic blood pressure. Given associations between ambulatory blood pressure and risk of cardiovascular disease, the findings support conceptual models of threats to the social self as a potentially important influence on physical health.

  13. INCOMMANDS TDP: Measures of Performance for the Threat Evaluation Capability

    Science.gov (United States)

    2009-12-01

    remedy this situation. It aims at developing and demonstrating advanced threat evaluation and combat power management decision support concepts for...complémentaires aux mesures d’exactitude. En plus de ces mesures de performance, l’analyse de sensibilité est examinée pour évaluer si des changements ...5 2.4 Combat power management (CPM

  14. USVI Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's study,...

  15. Puerto Rico Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's study,...

  16. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  17. Ose evaluation of delay systems in a high threat environment

    International Nuclear Information System (INIS)

    Rich, B.L.; Cook, B.G.

    1988-01-01

    The Office of Security Evaluations (OSE) has in place an Evaluation Program to assist the Department of Energy (DOE) Headquarters and operations office managers by assessing specific elements of protection programs and informing the managers of common strengths and weaknesses of these elements. This information is provided so that sufficient and cost effective protection programs are maintained or enhanced. The subject of this paper is the evaluation of delay systems in the high-threat environment defined for sensitive DOE security interests such as special nuclear materials, nuclear weapons, and related classified devices and information

  18. Radon transform based automatic metal artefacts generation for 3D threat image projection

    Science.gov (United States)

    Megherbi, Najla; Breckon, Toby P.; Flitton, Greg T.; Mouton, Andre

    2013-10-01

    Threat Image Projection (TIP) plays an important role in aviation security. In order to evaluate human security screeners in determining threats, TIP systems project images of realistic threat items into the images of the passenger baggage being scanned. In this proof of concept paper, we propose a 3D TIP method which can be integrated within new 3D Computed Tomography (CT) screening systems. In order to make the threat items appear as if they were genuinely located in the scanned bag, appropriate CT metal artefacts are generated in the resulting TIP images according to the scan orientation, the passenger bag content and the material of the inserted threat items. This process is performed in the projection domain using a novel methodology based on the Radon Transform. The obtained results using challenging 3D CT baggage images are very promising in terms of plausibility and realism.

  19. Technology transfer - insider protection workshop (Safeguards Evaluation Method - Insider Threat)

    International Nuclear Information System (INIS)

    Strait, R.S.; Renis, T.A.

    1986-01-01

    The Safeguards Evaluation Method - Insider Threat, developed by Lawrence Livermore National Laboratory, is a field-applicable tool to evaluate facility safeguards against theft or diversion of special nuclear material (SNM) by nonviolent insiders. To ensure successful transfer of this technology from the laboratory to DOE field offices and contractors, LLNL developed a three-part package. The package includes a workbook, user-friendly microcomputer software, and a three-day training program. The workbook guides an evaluation team through the Safeguards Evaluation Method and provides forms for gathering data. The microcomputer software assists in the evaluation of safeguards effectiveness. The software is designed for safeguards analysts with no previous computer experience. It runs on an IBM Personal Computer or any compatible machine. The three-day training program is called the Insider Protection Workshop. The workshop students learn how to use the workbook and the computer software to assess insider vulnerabilities and to evaluate the benefits and costs of potential improvements. These activities increase the students' appreciation of the insider threat. The workshop format is informal and interactive, employing four different instruction modes: classroom presentations, small-group sessions, a practical exercise, and ''hands-on'' analysis using microcomputers. This approach to technology transfer has been successful: over 100 safeguards planners and analysts have been trained in the method, and it is being used at facilities through the DOE complex

  20. Perceived threat to national values in evaluating stereotyped immigrants.

    Science.gov (United States)

    Tsukamoto, Saori; Fiske, Susan T

    2018-01-01

    The present research examined the psychological reasons behind Americans' (un)willingness to accept immigrants. Participants read a scenario depicting immigrant groups allegedly expected to arrive in the United States and evaluated how much the immigrants would influence two types of American national values: civic values (e.g., political ideology) and ethnic values (e.g., shared culture and customs). Across three studies, competitive immigrant groups were stereotyped to be untrustworthy and perceived to threaten American civic values, but not ethnic values. Value threat then mediated the predicted competition-prejudice relationship in Study 3. Perceived vulnerability of in-group boundary might specify one motivated cause of derogating immigrants.

  1. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  2. Overview of Threats and Failure Models for Safety-Relevant Computer-Based Systems

    Science.gov (United States)

    Torres-Pomales, Wilfredo

    2015-01-01

    This document presents a high-level overview of the threats to safety-relevant computer-based systems, including (1) a description of the introduction and activation of physical and logical faults; (2) the propagation of their effects; and (3) function-level and component-level error and failure mode models. These models can be used in the definition of fault hypotheses (i.e., assumptions) for threat-risk mitigation strategies. This document is a contribution to a guide currently under development that is intended to provide a general technical foundation for designers and evaluators of safety-relevant systems.

  3. The role of perceived threat during emergency department cardiac evaluation and the age-posttraumatic stress disorder link.

    Science.gov (United States)

    Meli, Laura; Kautz, Marin; Julian, Jacob; Edmondson, Donald; Sumner, Jennifer A

    2017-11-29

    Evaluation for acute coronary syndrome (ACS) can trigger posttraumatic stress symptoms (PSS). Research suggests that younger, versus older, individuals may be at elevated risk for PSS after ACS evaluation. It has been proposed that younger individuals may be at greater risk because they perceive the suspected ACS event as more threatening than their older counterparts; however, this has yet to be tested. We examined whether perceived threat during ACS evaluation mediated the association between age and PSS after ACS evaluation in an observational cohort study of patients presenting to the emergency department (ED) with suspected ACS. Demographics and perceived threat were assessed in the ED. PSS were measured upon inpatient transfer or by phone 3 days later. The analytic sample comprised 871 adult participants. Multiple linear regression was used to examine (1) associations of age and perceived threat with PSS and (2) whether perceived threat mediated the association. Bootstrapping with percentile-based confidence intervals (CIs) was used to test the indirect effect. Each year of age was associated with lower PSS (b = - 0.12, p PSS (b = 0.94, p PSS after ACS evaluation, and elevated perceived threat partially mediated this association. Understanding age differences in PSS development risk and the potential impact of age on threat perceptions may help inform ED treatment.

  4. Identification of threats using linguistics-based knowledge extraction.

    Energy Technology Data Exchange (ETDEWEB)

    Chew, Peter A.

    2008-09-01

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe

  5. Construction of Index System Based on Advanced Persistent Threat

    Directory of Open Access Journals (Sweden)

    Lin Jia

    2017-01-01

    Full Text Available With the proliferation of advanced persistent threat (APT, APT attack effect evaluation is playing an increasingly important role in cyberspace. As one of the hot issues of network security, the evaluation to its attack effect can quantify the harm caused by APT. Then according to the evaluation results, we can derive specific measures to the network attack. At present, a lot of work has done in the network attack effect evaluation index system. However, a significant barrier to the development of APT attack effect evaluation is that the existing index system is either from the point of view of the network security situation, or for a single attack weapons to customize. In this paper, an evaluation index system is proposed through analysing the features of APT. Through this index system, we can not only quantify APT attack effect, but also visually observe the APT ability from various angles. Then, we use the analytic hierarchy process (AHP to model the evaluation process and calculate the weight of each indicator. Finally, the Ukrainian Power Outages is taken as an example to validate the proposed index system. The experimental results verify the effectiveness of the index system.

  6. Vision-based threat detection in dynamic environments.

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, Jeffrey J.

    2007-08-01

    This report addresses the development of automated video-screening technology to assist security forces in protecting our homeland against terrorist threats. A prevailing threat is the covert placement of bombs inside crowded public facilities. Although video-surveillance systems are increasingly common, current systems cannot detect the placement of bombs. It is also unlikely that security personnel could detect a bomb or its placement by observing video from surveillance cameras. The problems lie in the large number of cameras required to monitor large areas, the limited number of security personnel employed to protect these areas, and the intense diligence required to effectively screen live video from even a single camera. Different from existing video-detection systems designed to operate in nearly static environments, we are developing technology to detect changes in the background of dynamic environments: environments where motion and human activities are persistent over long periods. Our goal is to quickly detect background changes, even if the background is visible to the camera less than 5 percent of the time and possibly never free from foreground activity. Our approach employs statistical scene models based on mixture densities. We hypothesized that the background component of the mixture has a small variance compared to foreground components. Experiments demonstrate this hypothesis is true under a wide variety of operating conditions. A major focus involved the development of robust background estimation techniques that exploit this property. We desire estimation algorithms that can rapidly produce accurate background estimates and detection algorithms that can reliably detect background changes with minimal nuisance alarms. Another goal is to recognize unusual activities or foreground conditions that could signal an attack (e.g., large numbers of running people, people falling to the floor, etc.). Detection of background changes and/or unusual

  7. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  8. Modeling and Security Threat Assessments of Data Processed in Cloud Based Information Systems

    Directory of Open Access Journals (Sweden)

    Darya Sergeevna Simonenkova

    2016-03-01

    Full Text Available The subject of the research is modeling and security threat assessments of data processed in cloud based information systems (CBIS. This method allow to determine the current security threats of CBIS, state of the system in which vulnerabilities exists, level of possible violators, security properties and to generate recommendations for neutralizing security threats of CBIS.

  9. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  10. A general enhancement of autonomic and cortisol responses during social evaluative threat

    NARCIS (Netherlands)

    van den Bosch, J.A.; de Geus, E.J.C.; Carroll, D.; Goedhart, A.D.; Anane, L.A.; van Zanten, J.J.; Helmerhorst, E.J.; Edwards, K.M.

    2009-01-01

    Objective: To examine the Social Self Preservation Theory, which predicts that stressors involving social evaluative threat (SET) characteristically activate the hypothalamic-pituitary-adrenal (HPA) axis. The idea that distinct psychosocial factors may underlie specific patterns of neuroendocrine

  11. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  12. Study of Threat Scenario Reconstruction based on Multiple Correlation

    Science.gov (United States)

    Yuan, Xuejun; Du, Jing; Qin, Futong; Zhou, Yunyan

    2017-10-01

    The emergence of intrusion detection technology has solved many network attack problems, ensuring the safety of computer systems. However, because of the isolated output alarm information, large amount of data, and mixed events, it is difficult for the managers to understand the deep logic relationship between the alarm information, thus they cannot deduce the attacker’s true intentions. This paper presents a method of online threat scene reconstruction to handle the alarm information, which reconstructs of the threat scene. For testing, the standard data set is used.

  13. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    Vine, Edward

    1997-01-01

    Utilities have become concerned that their competitors will desire access to energy-related data--including energy-efficiency data collected by utilities from their energy- efficiency programs--that they may regard as proprietary or confidential. In the future, disputes about confidentiality may focus more on costs and market information (as well as energy use and load data) than on energy-efficiency data per se. So far, the discussion has been limited to ratepayer-funded data. Consequently, many utilities are now requesting that the data (including evaluation data) they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to harm the evaluation community that depends on the free flow of information for improving the practice of evaluation as well as for disseminating the lessons learned from particular program evaluations. Confidentiality will also have significant policy implications. In response to these concerns, in late 1995 and early 1996, we conducted a survey of state public utility commissions (PUCs) in the U.S. to assess: (1) the relative importance of the issue of confidential data in the regulatory arena; (2) the regulatory response to utility requests for confidentiality (e.g., formal policies, guidelines, rules and procedures, and decisions); and (3) the type of data filed as confidential with PUCS. We focus on the first two objectives of this study. In addition to our interviews, we reviewed selected state statutes, judicial and PUC decisions, rules and procedures, protective orders, and interim policy documents. Evaluators need to understand the context of confidentiality as well as the response of the regulatory commissions to confidentiality, because evaluators will need to adapt to a new environment where energy-related data and information may be harder to obtain and distribute. We propose that regulators conduct the following activities as soon as possible: 1. Assess

  14. An outcome-based learning model to identify emerging threats : experimental and simulation results.

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F.; Decision and Information Sciences; SNL; Univ. at Albany

    2007-01-01

    The authors present experimental and simulation results of an outcome-based learning model as it applies to the identification of emerging threats. This model integrates judgment, decision making, and learning theories to provide an integrated framework for the behavioral study of emerging threats.

  15. Maritime Improvised Explosive Devices: A Threat Based Technology Study

    Science.gov (United States)

    2015-06-12

    applied throughout this thesis is a sequential qualitative–qualitative–quantitative method, from a primarily postmodern perspective. A postmodern ...other research and explanations, which claim to be valid and universal truths. The advantage of 32 a postmodern perspective with a qualitative...to counter the threat. The postmodern approach allows the researcher to dismantle normal ways of thinking, and distance oneself from an approach with

  16. Resilience Evaluation of Demand Response as Spinning Reserve under Cyber-Physical Threats

    Directory of Open Access Journals (Sweden)

    Anas AlMajali

    2016-12-01

    Full Text Available In the future, automated demand response mechanisms will be used as spinning reserve. Demand response in the smart grid must be resilient to cyber-physical threats. In this paper, we evaluate the resilience of demand response when used as spinning reserve in the presence of cyber-physical threats. We quantify this evaluation by correlating the stability of the system in the presence of attacks measured by system frequency (Hz and attack level measured by the amount of load (MW that responds to the demand response event. The results demonstrate the importance of anticipating the dependability of demand response before it can be relied upon as spinning reserve.

  17. Evaluating and ranking threats to the long-term persistence of polar bears

    Science.gov (United States)

    Atwood, Todd C.; Marcot, Bruce G.; Douglas, David C.; Amstrup, Steven C.; Rode, Karyn D.; Durner, George M.; Bromaghin, Jeffrey F.

    2015-01-01

    The polar bear (Ursus maritimus) was listed as a globally threatened species under the U.S. Endangered Species Act (ESA) in 2008, mostly due to the significant threat to their future population viability from rapidly declining Arctic sea ice. A core mandate of the ESA is the development of a recovery plan that identifies steps to maintain viable populations of a listed species. A substantive evaluation of the relative influence of putative threats to population persistence is helpful to recovery planning. Because management actions must often be taken in the face of substantial information gaps, a formalized evaluation hypothesizing potential stressors and their relationships with population persistence can improve identification of relevant conservation actions. To this end, we updated a Bayesian network model previously used to forecast the future status of polar bears worldwide. We used new information on actual and predicted sea ice loss and polar bear responses to evaluate the relative influence of plausible threats and their mitigation through management actions on the persistence of polar bears in four ecoregions. We found that polar bear outcomes worsened over time through the end of the century under both stabilized and unabated greenhouse gas (GHG) emission pathways. Under the unabated pathway (i.e., RCP 8.5), the time it took for polar bear populations in two of four ecoregions to reach a dominant probability of greatly decreased was hastened by about 25 years. Under the stabilized GHG emission pathway (i.e., RCP 4.5), where GHG emissions peak around the year 2040, the polar bear population in the Archipelago Ecoregion of High Arctic Canada never reached a dominant probability of greatly decreased, reinforcing earlier suggestions of this ecoregion’s potential to serve as a long-term refugium. The most influential drivers of adverse polar bear outcomes were declines to overall sea ice conditions and to the marine prey base. Improved sea ice conditions

  18. Social evaluative threat with verbal performance feedback alters neuroendocrine response to stress.

    Science.gov (United States)

    Phan, Jenny M; Schneider, Ekaterina; Peres, Jeremy; Miocevic, Olga; Meyer, Vanessa; Shirtcliff, Elizabeth A

    2017-11-01

    Laboratory stress tasks such as the Trier Social Stress Test (TSST) have provided a key piece to the puzzle for how psychosocial stress impacts the hypothalamic-pituitary-adrenal axis, other stress-responsive biomarkers, and ultimately wellbeing. These tasks are thought to work through biopsychosocial processes, specifically social evaluative threat and the uncontrollability heighten situational demands. The present study integrated an experimental modification to the design of the TSST to probe whether additional social evaluative threat, via negative verbal feedback about speech performance, can further alter stress reactivity in 63 men and women. This TSST study confirmed previous findings related to stress reactivity and stress recovery but extended this literature in several ways. First, we showed that additional social evaluative threat components, mid-task following the speech portion of the TSST, were still capable of enhancing the psychosocial stressor. Second, we considered stress-reactive hormones beyond cortisol to include dehydroepiandrosterone (DHEA) and testosterone, and found these hormones were also stress-responsive, and their release was coupled with one another. Third, we explored whether gain- and loss-framing incentive instructions, meant to influence performance motivation by enhancing the personal relevance of task performance, impacted hormonal reactivity. Results showed that each hormone was stress reactive and further had different responses to the modified TSST compared to the original TSST. Beyond the utility of showing how the TSST can be modified with heightened social evaluative threat and incentive-framing instructions, this study informs about how these three stress-responsive hormones have differential responses to the demands of a challenge and a stressor. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Evaluating Strategies for Achieving Global Collective Action on Transnational Health Threats and Social Inequalities

    OpenAIRE

    Hoffman, Steven Justin

    2015-01-01

    This dissertation presents three studies that evaluate different strategies for addressing transnational health threats and social inequalities that depend upon or would benefit from global collective action. Each draws upon different academic disciplines, methods and epistemological traditions. Chapter 1 assesses the role of international law in addressing global health challenges, specifically examining when, how and why global health treaties may be helpful. Evidence from 90 quantitati...

  20. Effects of Self-Evaluation Threat on Schadenfreude Toward Strangers in a Reality TV Show.

    Science.gov (United States)

    Watanabe, Hitomi

    2016-06-01

    Schadenfreude toward strangers in a reality TV show may be affected by self-evaluation threat. This study extends previous work by adding a control group to positive and negative feedback groups in order to investigate the effects of self-evaluation threat. Sex of the target of schadenfreude and schadenfroh participant was considered. Among undergraduate students screened for low general self-esteem, 31 men (M = 20.3 ± 1.6 years old) and 59 women (M = 20.0 ± 1.2 years old) volunteered to participate. Participants performed a simple calculation task, and then received negative, positive, or no feedback regarding the task before completing the State Self-Esteem Scale and watching videos taken from American Idol that showed an applicant being criticized by judges. After watching videos, participants completed items related to schadenfreude. There were no differences in schadenfreude toward strangers between the three feedback groups. In addition to the Japanese tendency of reduced self-enhancement in self-threatening situations, targets with no psychological closeness may also explain the lack of a relationship between self-evaluation threat and schadenfreude. © The Author(s) 2016.

  1. Unmanned Aerial Vehicle Route Planning in the Presence of a Threat Environment Based on a Virtual Globe Platform

    Directory of Open Access Journals (Sweden)

    Ming Zhang

    2016-10-01

    Full Text Available Route planning is a key technology for an unmanned aerial vehicle (UAV to fly reliably and safely in the presence of a threat environment. Existing route planning methods are mainly based on the simulation scene, whereas approaches based on the virtual globe platform have rarely been reported. In this paper, a new planning space for the virtual globe and the planner is proposed and a common threat model is constructed for threats including a no-fly zone, hazardous weather, radar coverage area, missile killing zone and dynamic threats. Additionally, an improved ant colony optimization (ACO algorithm is developed to enhance route planning efficiency and terrain masking ability. Our route planning methods are optimized on the virtual globe platform for practicability. A route planning system and six types of planners were developed and implemented on the virtual globe platform. Finally, our evaluation results demonstrate that our optimum planner has better performance in terms of fuel consumption, terrain masking, and risk avoidance. Experiments also demonstrate that the method and system described in this paper can be used to perform global route planning and mission operations.

  2. Adaptive, Model-Based Monitoring and Threat Detection

    National Research Council Canada - National Science Library

    Valdes, Alfonso

    2002-01-01

    .... We describe a network intrusion detection system (IDS) using Bayes inference, wherein the knowledge base is encoded not as rules but as conditional probability relations between observables and hypotheses of normal and malicious usage...

  3. Threat, prejudice and stereotyping in the context of Japanese, North Korean, and South Korean intergroup relations.

    OpenAIRE

    Myers, Chris; Abrams, Dominic; Rosenthal, Harriet E. S.; Christian, Julie

    2013-01-01

    Integrated threat theory, realistic conflict theory, and group justification (based on social\\ud identity theory) were evaluated in the international context of Japanese prejudice toward North\\ud Korea and South Korea. Military threat emerged as an important addition to the four threats\\ud outlined by integrated threat theory. Three perceived North Korean threats (realistic [domestic]\\ud threat; intergroup anxiety; military threat) predicted prejudice toward North Korea. North\\ud Korean preju...

  4. Unmanned Aerial Vehicle Route Planning in the Presence of a Threat Environment Based on a Virtual Globe Platform

    OpenAIRE

    Ming Zhang; Chen Su; Yuan Liu; Mingyuan Hu; Yuesheng Zhu

    2016-01-01

    Route planning is a key technology for an unmanned aerial vehicle (UAV) to fly reliably and safely in the presence of a threat environment. Existing route planning methods are mainly based on the simulation scene, whereas approaches based on the virtual globe platform have rarely been reported. In this paper, a new planning space for the virtual globe and the planner is proposed and a common threat model is constructed for threats including a no-fly zone, hazardous weather, radar coverage are...

  5. Responsibility/Threat Overestimation Moderates the Relationship Between Contamination-Based Disgust and Obsessive-Compulsive Concerns About Sexual Orientation.

    Science.gov (United States)

    Ching, Terence H W; Williams, Monnica T; Siev, Jedidiah; Olatunji, Bunmi O

    2018-05-01

    Disgust has been shown to perform a "disease-avoidance" function in contamination fears. However, no studies have examined the relevance of disgust to obsessive-compulsive (OC) concerns about sexual orientation (e.g., fear of one's sexual orientation transforming against one's will, and compulsive avoidance of same-sex and/or gay or lesbian individuals to prevent that from happening). Therefore, we investigated whether the specific domain of contamination-based disgust (i.e., evoked by the perceived threat of transmission of essences between individuals) predicted OC concerns about sexual orientation, and whether this effect was moderated/amplified by obsessive beliefs, in evaluation of a "sexual orientation transformation-avoidance" function. We recruited 283 self-identified heterosexual college students (152 females, 131 males; mean age = 20.88 years, SD = 3.19) who completed three measures assessing disgust, obsessive beliefs, and OC concerns about sexual orientation. Results showed that contamination-based disgust (β = .17), responsibility/threat overestimation beliefs (β = .15), and their interaction (β = .17) each uniquely predicted OC concerns about sexual orientation, ts = 2.22, 2.50, and 2.90, ps contamination-based disgust accompanied by strong responsibility/threat overestimation beliefs predicted more severe OC concerns about sexual orientation, β = .48, t = 3.24, p contamination-based disgust, and exacerbated by responsibility/threat overestimation beliefs. Treatment for OC concerns about sexual orientation should target such beliefs.

  6. Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Brown, Christopher R.; Ferryman, Thomas A.

    2013-10-01

    In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they can be assessed. A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. A complementary Personality Factor modeling approach was developed based on analysis to derive relevant personality characteristics from word use. Several implementations of the psychosocial model were evaluated by comparing their agreement with judgments of human resources and management professionals; the personality factor modeling approach was examined using email samples. If implemented in an operational setting, these models should be part of a set of management tools for employee assessment to identify employees who pose a greater insider threat.

  7. Distinguishing stereotype threat from priming effects : On the role of the social self and threat-based concerns (Retracted article. See vol. 104, pg. 196, 2013)

    NARCIS (Netherlands)

    Marx, David M.; Stapel, Diederik A.

    It has been argued that priming negative stereotypic traits is sufficient to cause stereotype threat. The present research challenges this assumption by highlighting the role of the social self and targets' concerns about confirming a negative group-based stereotype. Specifically, in 3 experiments

  8. Physiological and emotional responses to subjective social evaluative threat in daily life.

    Science.gov (United States)

    Lehman, Barbara J; Cane, Arianna C; Tallon, Shannon J; Smith, Stephanie F

    2015-01-01

    This study examined concurrent and delayed emotional and cardiovascular correlates of naturally occurring experiences with subjective social evaluative threat (SSET) and tested whether individual differences in social interaction anxiety moderated those associations. Sixty-eight participants wore ambulatory blood pressure monitors for three days. Following each blood pressure reading, participants reported on SSET and negative emotions, yielding 1770 momentary measures. Multilevel modeling suggested that reports of greater SSET uniquely predicted elevations in anxiety and embarrassment, with elevations in anxiety, embarrassment, and shame extending to the hour following SSET. Reports of concurrent and previous-hour SSET also predicted cardiovascular elevations. Linkages between SSET and anxiety and shame, but not cardiovascular measures, were moderated by social interaction anxiety. Those higher in social interaction anxiety showed especially strong associations between SSET and both concurrent and delayed anxiety and greater delayed shame. This research suggests an important role for anxiety, embarrassment, and shame as emotional consequences of naturally occurring evaluative threat, especially for those who are more socially anxious. Further, this work replicates other naturalistic studies that have documented increased blood pressure at times of SSET and extends that work by documenting cardiovascular responses into the following hour.

  9. Stress on the dance floor: the cortisol stress response to social-evaluative threat in competitive ballroom dancers.

    Science.gov (United States)

    Rohleder, Nicolas; Beulen, Silke E; Chen, Edith; Wolf, Jutta M; Kirschbaum, Clemens

    2007-01-01

    The social self-preservation theory states that humans have a fundamental motivation to preserve the social self and that threats to the social self perturb biological markers such as cortisol. Five studies were designed to examine the cortisol response to competitive ballroom dancing as a paradigm for real-life social-evaluative threat. Competitive dancing produced substantial increases in cortisol compared to a control day. These increases were not due to the physical strain of dancing and were greater than those found during social-evaluative laboratory stressors. Responses did not habituate across competitions and were mostly elevated under highly focused conditions of threat (couple vs. group competition). These findings support the notion of a social self-preservation system that is physiologically responsive to threats to the social self.

  10. Avoidance temperament and social-evaluative threat in college students' math performance: a mediation model of math and test anxiety.

    Science.gov (United States)

    Liew, Jeffrey; Lench, Heather C; Kao, Grace; Yeh, Yu-Chen; Kwok, Oi-man

    2014-01-01

    Standardized testing has become a common form of student evaluation with high stakes, and limited research exists on understanding the roles of students' personality traits and social-evaluative threat on their academic performance. This study examined the roles of avoidance temperament (i.e., fear and behavioral inhibition) and evaluative threat (i.e., fear of failure and being viewed as unintelligent) in standardized math test and course grades in college students. Undergraduate students (N=184) from a large public university were assessed on temperamental fear and behavioral inhibition. They were then given 15 minutes to complete a standardized math test. After the test, students provided data on evaluative threat and their math performance (scores on standardized college entrance exam and average grades in college math courses). Results indicate that avoidance temperament was linked to social-evaluative threat and low standardized math test scores. Furthermore, evaluative threat mediated the influence of avoidance temperament on both types of math performance. Results have educational and clinical implications, particularly for students at risk for test anxiety and underperformance. Interventions targeting emotion regulation and stress management skills may help individuals reduce their math and test anxieties.

  11. A Reproductive Threat-Based Model of Evolved Sex Differences in Jealousy

    OpenAIRE

    Brad J. Sagarin; D. Vaughn Becker; Rosanna E. Guadagno; Wayne W. Wilkinson; Lionel D. Nicastle

    2012-01-01

    Although heterosexual women and men consistently demonstrate sex differences in jealousy, these differences disappear among lesbians and gay men as well as among heterosexual women and men contemplating same-sex infidelities (infidelities in which the partner and rival are the same sex). Synthesizing these past findings, the present paper offers a reproductive threat-based model of evolved sex differences in jealousy that predicts that the sexes will differ only when the jealous perceivers' r...

  12. On the early detection of threats in the real world based on open-source information on the internet

    NARCIS (Netherlands)

    Bouma, H.; Rajadell Rojas, O.; Worm, D.T.H.; Versloot, C.A.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activities of persons on the internet. Internet surveillance aims to detect threats in an early stage and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time

  13. Law enforcers recognition level emerging threats based on physical appearance and behavior signs the enemy

    Directory of Open Access Journals (Sweden)

    R.M. Radzievskiy

    2015-02-01

    Full Text Available Purpose: examine the effectiveness of the training method of differential approach to the choice of means of influence on the action of law enforcers opponent with different levels of aggressiveness. Material : the experiment involved 15 students of the Kyiv National Academy of Internal Affairs and the 15 employees of the State Guard of Ukraine. Results : presented curriculum for special physical and tactical training. The program details the conceptual apparatus of THREATS and DANGERS manifestations of different levels of aggressiveness opponent (case analysis of its motor behavior. The study participants underwent 7 day course focused training. The basis of the course is an advanced theoretical base. The base is aimed at developing knowledge and skills of employees in determining the level of danger. Including threats from testing and modeling episodes of extreme situations the options cadets. Conclusions : In the simulated collision situations with aggressive opponent to the students significantly improved the adequacy of the response to the threat of execution time and within the legal grounds. Recognition was determined by the level of aggressiveness manifest manners enemy, his emotions, motivation, motor behavior, positional arrangement for 2 - 3 seconds. The program contributed to the development of qualities: attention, orientation, perception, motor lead.

  14. Development, Evaluation, and Future Directions of the Virginia Student Threat Assessment Guidelines

    Science.gov (United States)

    Cornell, Dewey; Allen, Korrie

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed in response to studies of school shootings conducted by the U.S. Federal Bureau of Investigation, U.S. Secret Service, and U.S. Department of Education that recommended schools should adopt a threat assessment approach to prevent targeted violence. This article reviews the…

  15. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    Science.gov (United States)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  16. Test Review: Schneller, J. (2005). "Psychosocial Evaluation and Threat Risk Assessment (PETRA)." Lutz, FL--Psychological Assessment Resources

    Science.gov (United States)

    Sullivan, Jeremy R.; Holcomb, Michelle R.

    2010-01-01

    This article presents a review of the "Psychosocial Evaluation and Threat Risk Assessment" (PETRA), a 60-item self-report instrument "designed to address the psychosocial characteristics most commonly associated with acts of school violence" among middle school and high school students ages 11 to 18 years. The PETRA was…

  17. Polar lessons learned: long-term management based on shared threats in Arctic and Antarctic environments

    NARCIS (Netherlands)

    Bennett, J.R.; Shaw, J.D.; Terauds, A.; Smol, J.P.; Aerts, R.; Bergstrom, D.M.; Blais, J.M.; Cheung, W.W.L.; Chown, S.L.; Lea, M.-A.; Nielsen, U.N.; Pauly, D.; Reimer, K.J.; Riddle, M.J.; Snape, I.; Stark, J.S.; Tulloch, V.J.; Possingham, H.P.

    2015-01-01

    The Arctic and Antarctic polar regions are subject to multiple environmental threats, arising from both local and ex-situ human activities. We review the major threats to polar ecosystems including the principal stressor, climate change, which interacts with and exacerbates other threats such as

  18. Evaluating threats to an endangered species by proxy: air pollution as threat to the blue swallow (Hirundo atrocaerulea) in South Africa.

    Science.gov (United States)

    Kylin, Henrik; Bouwman, Henk; Evans, Steven W

    2011-02-01

    between sulphur dioxide and organic compounds in the humid air induced by ultraviolet radiation. Second, elevated concentrations of sulphonates in the fog could affect the water repellence of the blue swallow plumage, possibly decreasing their capacity to forage in the fog. We cannot prove conclusively that this is the reason why the number of blue swallows at the BSNHS has decreased dramatically, but for endangered species, we may have to rely on proxies to draw conclusions about outside threats. All such information should be valuable in devising protection plans for species under threat. The use of proxies to elucidate threats to endangered species should be evaluated in a broad scale. The mist-belt habitat in general is threatened by many human activities. These findings indicate that air pollution and the proximity of volatile organic compound (VOC) sources close to mist-belt habitat refuges may be an unrecognised conservation threat to the animals inhabiting them.

  19. Subjective Performance Evaluations, Self-esteem, and Ego-threats in Principal-agent Relations

    DEFF Research Database (Denmark)

    Sebald, Alexander Christopher; Walzl, Markus

    find that agents sanction whenever the feedback of principals is below their subjective self-evaluations even if the agents' payoff is independent of the principals' feedback. Based on our experimental analysis we propose a principal-agent model with subjective performance evaluations that accommodates...

  20. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    Science.gov (United States)

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  1. Inadequate evaluation and management of threats in Australia's Marine Parks, including the Great Barrier Reef, misdirect Marine conservation.

    Science.gov (United States)

    Kearney, Bob; Farebrother, Graham

    2014-01-01

    The magnificence of the Great Barrier Reef and its worthiness of extraordinary efforts to protect it from whatever threats may arise are unquestioned. Yet almost four decades after the establishment of the Great Barrier Reef Marine Park, Australia's most expensive and intensely researched Marine Protected Area, the health of the Reef is reported to be declining alarmingly. The management of the suite of threats to the health of the reef has clearly been inadequate, even though there have been several notable successes. It is argued that the failure to prioritise correctly all major threats to the reef, coupled with the exaggeration of the benefits of calling the park a protected area and zoning subsets of areas as 'no-take', has distracted attention from adequately addressing the real causes of impact. Australia's marine conservation efforts have been dominated by commitment to a National Representative System of Marine Protected Areas. In so doing, Australia has displaced the internationally accepted primary priority for pursuing effective protection of marine environments with inadequately critical adherence to the principle of having more and bigger marine parks. The continuing decline in the health of the Great Barrier Reef and other Australian coastal areas confirms the limitations of current area management for combating threats to marine ecosystems. There is great need for more critical evaluation of how marine environments can be protected effectively and managed efficiently.

  2. Data and software tools for gamma radiation spectral threat detection and nuclide identification algorithm development and evaluation

    Science.gov (United States)

    Portnoy, David; Fisher, Brian; Phifer, Daniel

    2015-06-01

    The detection of radiological and nuclear threats is extremely important to national security. The federal government is spending significant resources developing new detection systems and attempting to increase the performance of existing ones. The detection of illicit radionuclides that may pose a radiological or nuclear threat is a challenging problem complicated by benign radiation sources (e.g., cat litter and medical treatments), shielding, and large variations in background radiation. Although there is a growing acceptance within the community that concentrating efforts on algorithm development (independent of the specifics of fully assembled systems) has the potential for significant overall system performance gains, there are two major hindrances to advancements in gamma spectral analysis algorithms under the current paradigm: access to data and common performance metrics along with baseline performance measures. Because many of the signatures collected during performance measurement campaigns are classified, dissemination to algorithm developers is extremely limited. This leaves developers no choice but to collect their own data if they are lucky enough to have access to material and sensors. This is often combined with their own definition of metrics for measuring performance. These two conditions make it all but impossible for developers and external reviewers to make meaningful comparisons between algorithms. Without meaningful comparisons, performance advancements become very hard to achieve and (more importantly) recognize. The objective of this work is to overcome these obstacles by developing and freely distributing real and synthetically generated gamma-spectra data sets as well as software tools for performance evaluation with associated performance baselines to national labs, academic institutions, government agencies, and industry. At present, datasets for two tracks, or application domains, have been developed: one that includes temporal

  3. Forests on the edge: evaluating contributions of and threats to America's private forest lands

    Science.gov (United States)

    Mark Hatfield; Ronald E. McRoberts; Dacia M. Meneguzzo; Mike Dechter; < i> et al< /i>

    2007-01-01

    The Forests on the Edge project, sponsored by the U.S. Department of Agriculture Forest Service, uses geographic information systems to construct and analyze maps depicting ecological, social, and economic contributions of America's private forest lands and threats to those contributions. Watersheds across the conterminous United States are ranked relative to the...

  4. Evaluating anthropogenic threats to endangered killer whales to inform effective recovery plans.

    Science.gov (United States)

    Lacy, Robert C; Williams, Rob; Ashe, Erin; Balcomb Iii, Kenneth C; Brent, Lauren J N; Clark, Christopher W; Croft, Darren P; Giles, Deborah A; MacDuffee, Misty; Paquet, Paul C

    2017-10-26

    Understanding cumulative effects of multiple threats is key to guiding effective management to conserve endangered species. The critically endangered, Southern Resident killer whale population of the northeastern Pacific Ocean provides a data-rich case to explore anthropogenic threats on population viability. Primary threats include: limitation of preferred prey, Chinook salmon; anthropogenic noise and disturbance, which reduce foraging efficiency; and high levels of stored contaminants, including PCBs. We constructed a population viability analysis to explore possible demographic trajectories and the relative importance of anthropogenic stressors. The population is fragile, with no growth projected under current conditions, and decline expected if new or increased threats are imposed. Improvements in fecundity and calf survival are needed to reach a conservation objective of 2.3% annual population growth. Prey limitation is the most important factor affecting population growth. However, to meet recovery targets through prey management alone, Chinook abundance would have to be sustained near the highest levels since the 1970s. The most optimistic mitigation of noise and contaminants would make the difference between a declining and increasing population, but would be insufficient to reach recovery targets. Reducing acoustic disturbance by 50% combined with increasing Chinook by 15% would allow the population to reach 2.3% growth.

  5. User's manual of a computer code for seismic hazard evaluation for assessing the threat to a facility by fault model. SHEAT-FM

    International Nuclear Information System (INIS)

    Sugino, Hideharu; Onizawa, Kunio; Suzuki, Masahide

    2005-09-01

    To establish the reliability evaluation method for aged structural component, we developed a probabilistic seismic hazard evaluation code SHEAT-FM (Seismic Hazard Evaluation for Assessing the Threat to a facility site - Fault Model) using a seismic motion prediction method based on fault model. In order to improve the seismic hazard evaluation, this code takes the latest knowledge in the field of earthquake engineering into account. For example, the code involves a group delay time of observed records and an update process model of active fault. This report describes the user's guide of SHEAT-FM, including the outline of the seismic hazard evaluation, specification of input data, sample problem for a model site, system information and execution method. (author)

  6. Effects of social comparison direction, threat, and self-esteem on affect, self-evaluation, and expected success.

    Science.gov (United States)

    Aspinwall, L G; Taylor, S E

    1993-05-01

    Two studies explored the conditions under which social comparisons are used to manage negative affect and naturalistic threats. Study 1 examined induced mood and dispositional self-esteem as determinants of affective responses to upward and downward comparisons. Consistent with a mood repair prediction, only low-self-esteem Ss in whom a negative mood had been induced reported improved mood after exposure to downward comparison information. Study 2 examined the impact of naturalistic threats on responses to comparison information. Relative to a no-comparison baseline, low-self-esteem Ss who had experienced a recent academic setback reported more favorable self-evaluations and greater expectations of future success in college after exposure to downward comparison information. These results remained significant after controlling statistically for general distress. Implications for downward comparison theory are discussed.

  7. Evaluation and Verification of the Global Rapid Identification of Threats System for Infectious Diseases in Textual Data Sources

    Directory of Open Access Journals (Sweden)

    Andrew G. Huff

    2016-01-01

    Full Text Available The Global Rapid Identification of Threats System (GRITS is a biosurveillance application that enables infectious disease analysts to monitor nontraditional information sources (e.g., social media, online news outlets, ProMED-mail reports, and blogs for infectious disease threats. GRITS analyzes these textual data sources by identifying, extracting, and succinctly visualizing epidemiologic information and suggests potentially associated infectious diseases. This manuscript evaluates and verifies the diagnoses that GRITS performs and discusses novel aspects of the software package. Via GRITS’ web interface, infectious disease analysts can examine dynamic visualizations of GRITS’ analyses and explore historical infectious disease emergence events. The GRITS API can be used to continuously analyze information feeds, and the API enables GRITS technology to be easily incorporated into other biosurveillance systems. GRITS is a flexible tool that can be modified to conduct sophisticated medical report triaging, expanded to include customized alert systems, and tailored to address other biosurveillance needs.

  8. Evaluating Perceived Probability of Threat-Relevant Outcomes and Temporal Orientation in Flying Phobia.

    Science.gov (United States)

    Mavromoustakos, Elena; Clark, Gavin I; Rock, Adam J

    2016-01-01

    Probability bias regarding threat-relevant outcomes has been demonstrated across anxiety disorders but has not been investigated in flying phobia. Individual temporal orientation (time perspective) may be hypothesised to influence estimates of negative outcomes occurring. The present study investigated whether probability bias could be demonstrated in flying phobia and whether probability estimates of negative flying events was predicted by time perspective. Sixty flying phobic and fifty-five non-flying-phobic adults were recruited to complete an online questionnaire. Participants completed the Flight Anxiety Scale, Probability Scale (measuring perceived probability of flying-negative events, general-negative and general positive events) and the Past-Negative, Future and Present-Hedonistic subscales of the Zimbardo Time Perspective Inventory (variables argued to predict mental travel forward and backward in time). The flying phobic group estimated the probability of flying negative and general negative events occurring as significantly higher than non-flying phobics. Past-Negative scores (positively) and Present-Hedonistic scores (negatively) predicted probability estimates of flying negative events. The Future Orientation subscale did not significantly predict probability estimates. This study is the first to demonstrate probability bias for threat-relevant outcomes in flying phobia. Results suggest that time perspective may influence perceived probability of threat-relevant outcomes but the nature of this relationship remains to be determined.

  9. Contribution of Near Real Time MODIS-Based Forest Disturbance Detection Products to a National Forest Threat Early Warning System

    Science.gov (United States)

    Spruce, J.; Hargrove, W. W.; Gasser, J.; Smoot, J.; Kuper, P.

    2011-12-01

    This presentation discusses an effort to compute and post weekly MODIS forest change products for the conterminous US (CONUS), as part of a web-based national forest threat early warning system (EWS) known as the U.S. Forest Change Assessment Viewer (FCAV). The US Forest Service, NASA, USGS, and ORNL are working collaboratively to contribute weekly change products to this EWS. Large acreages of the nation's forests are being disturbed by a growing multitude of biotic and abiotic threats that can act either singularly or in combination. When common at regional scales, such disturbances can pose hazards and threats to floral and faunal bio-diversity, ecosystem sustainability, ecosystem services, and human settlements across the conterminous US. Regionally evident forest disturbances range from ephemeral periodic canopy defoliation to stand replacement mortality events due to insects, disease, fire, hurricanes, tornadoes, ice, hail, and drought. Mandated by the Healthy Forest Restoration Act of 2003, this forest threat EWS has been actively developed since 2006 and on-line since 2010. The FCAV system employs 250-meter MODIS NDVI-based forest change products as a key element of the system, providing regional and CONUS scale products in near real time every 8 days. Each of our forest change products in FCAV is based on current versus historical 24 day composites of NDVI data gridded at 231.66 meter resolution. Current NDVI is derived from USGS eMODIS expedited products. MOD13 NDVI is used for constructing historical baselines. CONUS change products are computed for all forests as % change in the current versus historical NDVI for a given 24 day period. Change products are computed according to previous year, previous 3 year and previous 8 year historical baselines. The use of multiple baselines enables apparent forest disturbance anomalies to be more fully assessed. CONUS forest change products are posted each week on the FCAV, a web mapping service constructed and

  10. Coping with Self-Threat and the Evaluation of Self-Related Traits: An fMRI Study

    Science.gov (United States)

    Corcoran, Katja; Ebner, Franz

    2015-01-01

    A positive view of oneself is important for a healthy lifestyle. Self-protection mechanisms such as suppressing negative self-related information help us to maintain a positive view of ourselves. This is of special relevance when, for instance, a negative test result threatens our positive self-view. To date, it is not clear which brain areas support self-protective mechanisms under self-threat. In the present functional magnetic resonance imaging (fMRI) study the participants (N = 46) received a (negative vs. positive) performance test feedback before entering the scanner. In the scanner, the participants were instructed to ascribe personality traits either to themselves or to a famous other. Our results showed that participants responded slower to negative self-related traits compared to positive self-related traits. High self-esteem individuals responded slower to negative traits compared to low self-esteem individuals following a self-threat. This indicates that high self-esteem individuals engage more in self-enhancing strategies after a threat by inhibiting negative self-related information more successfully than low self-esteem individuals. This behavioral pattern was mirrored in the fMRI data as dACC correlated positively with trait self-esteem. Generally, ACC activation was attenuated under threat when participants evaluated self-relevant traits and even more for negative self-related traits. We also found that activation in the ACC was negatively correlated with response times, indicating that greater activation of the ACC is linked to better access (faster response) to positive self-related traits and to impaired access (slower response) to negative self-related traits. These results confirm the ACC function as important in managing threatened self-worth but indicate differences in trait self-esteem levels. The fMRI analyses also revealed a decrease in activation within the left Hippocampus and the right thalamus under threat. This indicates that a down

  11. Coping with Self-Threat and the Evaluation of Self-Related Traits: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Andreas Hoefler

    Full Text Available A positive view of oneself is important for a healthy lifestyle. Self-protection mechanisms such as suppressing negative self-related information help us to maintain a positive view of ourselves. This is of special relevance when, for instance, a negative test result threatens our positive self-view. To date, it is not clear which brain areas support self-protective mechanisms under self-threat. In the present functional magnetic resonance imaging (fMRI study the participants (N = 46 received a (negative vs. positive performance test feedback before entering the scanner. In the scanner, the participants were instructed to ascribe personality traits either to themselves or to a famous other. Our results showed that participants responded slower to negative self-related traits compared to positive self-related traits. High self-esteem individuals responded slower to negative traits compared to low self-esteem individuals following a self-threat. This indicates that high self-esteem individuals engage more in self-enhancing strategies after a threat by inhibiting negative self-related information more successfully than low self-esteem individuals. This behavioral pattern was mirrored in the fMRI data as dACC correlated positively with trait self-esteem. Generally, ACC activation was attenuated under threat when participants evaluated self-relevant traits and even more for negative self-related traits. We also found that activation in the ACC was negatively correlated with response times, indicating that greater activation of the ACC is linked to better access (faster response to positive self-related traits and to impaired access (slower response to negative self-related traits. These results confirm the ACC function as important in managing threatened self-worth but indicate differences in trait self-esteem levels. The fMRI analyses also revealed a decrease in activation within the left Hippocampus and the right thalamus under threat. This

  12. A Reproductive Threat-Based Model of Evolved Sex Differences in Jealousy

    Directory of Open Access Journals (Sweden)

    Brad J. Sagarin

    2012-07-01

    Full Text Available Although heterosexual women and men consistently demonstrate sex differences in jealousy, these differences disappear among lesbians and gay men as well as among heterosexual women and men contemplating same-sex infidelities (infidelities in which the partner and rival are the same sex. Synthesizing these past findings, the present paper offers a reproductive threat-based model of evolved sex differences in jealousy that predicts that the sexes will differ only when the jealous perceivers' reproductive outcomes are differentially at risk. This model is supported by data from a web-based study in which lesbians, gay men, bisexual women and men, and heterosexual women and men responded to a hypothetical infidelity scenario with the sex of the rival randomly determined. After reading the scenario, participants indicated which type of infidelity (sexual versus emotional would cause greater distress. Consistent with predictions, heterosexual women and men showed a sex difference when contemplating opposite-sex infidelities but not when contemplating same-sex infidelities, whereas lesbians and gay men showed no sex difference regardless of whether the infidelity was opposite-sex or same-sex.

  13. A reproductive threat-based model of evolved sex differences in jealousy.

    Science.gov (United States)

    Sagarin, Brad J; Becker, D Vaughn; Guadagno, Rosanna E; Wilkinson, Wayne W; Nicastle, Lionel D

    2012-08-10

    Although heterosexual women and men consistently demonstrate sex differences in jealousy, these differences disappear among lesbians and gay men as well as among heterosexual women and men contemplating same-sex infidelities (infidelities in which the partner and rival are the same sex). Synthesizing these past findings, the present paper offers a reproductive threat-based model of evolved sex differences in jealousy that predicts that the sexes will differ only when the jealous perceivers' reproductive outcomes are differentially at risk. This model is supported by data from a web-based study in which lesbians, gay men, bisexual women and men, and heterosexual women and men responded to a hypothetical infidelity scenario with the sex of the rival randomly determined. After reading the scenario, participants indicated which type of infidelity (sexual versus emotional) would cause greater distress. Consistent with predictions, heterosexual women and men showed a sex difference when contemplating opposite-sex infidelities but not when contemplating same-sex infidelities, whereas lesbians and gay men showed no sex difference regardless of whether the infidelity was opposite-sex or same-sex.

  14. Contribution of Near Real Time MODIS-Based Forest Disturbance Detection Products to a National Forest Threat Early Warning System

    Science.gov (United States)

    Spruce, Joseph P.; Hargrove, William; Glasser, Jerry; Kuper, Philip D.

    2011-01-01

    This presentation discusses an effort to compute and post weekly MODIS forest change products for the conterminous US (CONUS), as part of national forest threat early warning system (EWS) known as the U.S. Forest Change Assessment Viewer (FCAV). The US Forest Service, NASA, USGS, and ORNL are working collaboratively to contribute weekly change products to this EWS. Large acreages of the nation's forests are being disturbed by a growing multitude of biotic and abiotic threats that can act either singularly or in combination. When common at regional scales, such disturbances can pose hazards and threats to floral and faunal bio-diversity, ecosystem sustainability, ecosystem services, and human settlements across the conterminous US. Regionally evident forest disturbances range from ephemeral periodic canopy defoliation to stand replacement mortality events due to insects, disease, fire, hurricanes, tornadoes, ice, hail, and drought. Mandated by the Healthy Forest Restoration Act of 2003, this forest threat EWS has been actively developed since 2006 and on-line since 2010. This FCAV system employs 250-meter MODIS NDVI-based forest change products as a key element of the system, providing regional and CONUS scale products in near real time every 8 days. Each forest change product in FCAV is based on current versus historical 24 day composite NDVI data gridded at 231.66 meter resolution. Current NDVI is derived from USGS eMODIS expedited products. MOD13 NDVI is used for constructing historical baselines. CONUS change products are computed for all forests as % change in the current versus historical NDVI. Change products are computed according to previous year, previous 3 years and previous 8 year historical baselines. The use of multiple baselines enables disturbance anomaly phenology to be more fully assessed. CONUS forest change products are posted each week on the FCAV, a web mapping service maintained by the National Environmental Modeling and Analysis Center. The

  15. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  16. An Agent-Based Intervention to Assist Drivers Under Stereotype Threat: Effects of In-Vehicle Agents' Attributional Error Feedback.

    Science.gov (United States)

    Joo, Yeon Kyoung; Lee-Won, Roselyn J

    2016-10-01

    For members of a group negatively stereotyped in a domain, making mistakes can aggravate the influence of stereotype threat because negative stereotypes often blame target individuals and attribute the outcome to their lack of ability. Virtual agents offering real-time error feedback may influence performance under stereotype threat by shaping the performers' attributional perception of errors they commit. We explored this possibility with female drivers, considering the prevalence of the "women-are-bad-drivers" stereotype. Specifically, we investigated how in-vehicle voice agents offering error feedback based on responsibility attribution (internal vs. external) and outcome attribution (ability vs. effort) influence female drivers' performance under stereotype threat. In addressing this question, we conducted an experiment in a virtual driving simulation environment that provided moment-to-moment error feedback messages. Participants performed a challenging driving task and made mistakes preprogrammed to occur. Results showed that the agent's error feedback with outcome attribution moderated the stereotype threat effect on driving performance. Participants under stereotype threat had a smaller number of collisions when the errors were attributed to effort than to ability. In addition, outcome attribution feedback moderated the effect of responsibility attribution on driving performance. Implications of these findings are discussed.

  17. Evaluating the effectiveness of protected areas for maintaining biodiversity, securing habitats, and reducing threats

    DEFF Research Database (Denmark)

    Geldmann, Jonas

    Protected areas are amongst the most important conservation responses to halt the loss of biodiversity and cover more than 12.7% of the terrestrial surface of earth. Likewise, protected areas are an important political instrument and a key component of the Convention for Biological Diversity (CBD...... of this thesis has been to evaluate the performance and effectiveness of protected area in securing biodiversity, by evaluating their ability to either improve conservation responses, the state of biodiversity, or alternatively to reduce the human pressures responsible for the loss of biodiversity. The scope...... areas do have an effect and that many protected areas have seen an improvement in management over time. A second and perhaps equally important conclusion is that strong empirically based evidence on the effectiveness of protected areas is impeded by the lack of good data to measure change compared...

  18. Building Regional Threat-Based Networks for Estuaries in the Western United States

    Science.gov (United States)

    Merrifield, Matthew S.; Hines, Ellen; Liu, Xiaohang; Beck, Michael W.

    2011-01-01

    Estuaries are ecologically and economically valuable and have been highly degraded from both land and sea. Estuarine habitats in the coastal zone are under pressure from a range of human activities. In the United States and elsewhere, very few conservation plans focused on estuaries are regional in scope; fewer still address threats to estuary long term viability.We have compiled basic information about the spatial extent of threats to identify commonalities. To do this we classify estuaries into hierarchical networks that share similar threat characteristics using a spatial database (geodatabase) of threats to estuaries from land and sea in the western U.S.Our results show that very few estuaries in this region (16%) have no or minimal stresses from anthropogenic activity. Additionally, one quarter (25%) of all estuaries in this study have moderate levels of all threats. The small number of un-threatened estuaries is likely not representative of the ecological variability in the region and will require working to abate threats at others. We think the identification of these estuary groups can foster sharing best practices and coordination of conservation activities amongst estuaries in any geography. PMID:21387006

  19. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  20. Gender-related biases in evaluations of sex discrimination allegations: is perceived threat the key?

    Science.gov (United States)

    Elkins, Teri J; Phillips, James S; Konopaske, Robert

    2002-04-01

    Hypotheses derived from defensive attribution theory and social identity theory were tested in 3 laboratory experiments examining the effects of plaintiff and observer gender on perceived threat, plaintiff identification, and sex discrimination. In Study 1, women differentiated plaintiffs on the basis of gender, whereas men did not. Study 2 showed that this bias occurred because employment discrimination was personally threatening to women but not to men. In Study 3, the bias was reversed in a child custody context. As predicted, men found this context to be significantly more threatening than did women and subsequently exhibited a similarity bias. Mediation analyses suggested that responsibility attributions explained most of the variance in discrimination judgments associated with the plaintiff gender by observer gender interactions.

  1. Physical Protection System Design Analysis against Insider Threat based on Game Theoretic Modeling

    International Nuclear Information System (INIS)

    Kim, Kyo-Nam; Suh, Young-A; Yim, Man-Sung; Schneider, Erich

    2015-01-01

    This study explores the use of game-theoretic modeling of physical protection analysis by incorporating the implications of an insider threat. The defender-adversary interaction along with the inclusion of an insider is demonstrated using a simplified test case problem at an experimental fast reactor system. Non-detection probability and travel time are used as a baseline of physical protection parameters in this model. As one of the key features of the model is its ability to choose among security upgrades given the constraints of a budget, the study also performed cost benefit analysis for security upgrades options. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three types of adversary paths assisted by the insider and derived the largest insider threat in terms of the budget for security upgrades. More work needs to be done to incorporate complex dimensions of insider threats, which include but are not limited to: a more realistic mapping of insider threat, accounting for information asymmetry between the adversary, insider, and defenders, and assignment of more pragmatic parameter values

  2. Use of fear and threat-based messages to motivate preparedness: Costs, consequences and other choices: part one.

    Science.gov (United States)

    Jones, Ana-Marie

    Over the last several decades, billions of dollars have been spent in the USA to increase its disaster readiness and response capacity. Virtually every poll and survey shows that the US public remains woefully underprepared. At the 2012 'Awareness to Action' workshop convened by the Federal Emergency Management Agency (FEMA) and the American Red Cross to examine the future of the long-standing 'Have a Kit. Make a Plan. Be Informed' preparedness campaign, FEMA Administrator Craig Fugate acknowledged that traditional efforts have not 'moved the preparedness needle'. The most frequently cited causes for lack of preparedness in the general public are consumer apathy, lack of time, lack of money and the lack of knowledge on how best to prepare. This paper explores the reliance on fear- and threat-based messages (also referred to as 'fear appeals' to promote preparedness as a significant cause for this lack of preparation. It will look at the growing body of fear research, how fear and threat appeals are pervasive in emergency management, as well as its costs, unintended consequences and the other choices that can be made. The author asserts that by eliminating fear and threat-based messages, new messengers can share readiness as an accessible, empowering and valued pursuit for all communities - entirely distinct from the disasters and threats that people face.

  3. Use of fear and threat-based messages to motivate preparedness: costs, consequences and other choices. Part Two.

    Science.gov (United States)

    Jones, Ana-Marie

    2013-01-01

    Over the last several decades, billions of dollars have been spent in the USA to increase disaster readiness and response capacity. Virtually every poll and survey shows that the US public remains woefully underprepared. At the 2012 'Awareness to Action' workshop convened by the Federal Emergency Management Agency (FEMA) and the American Red Cross to examine the future of the long-standing 'Have a Kit. Make a Plan. Be Informed' preparedness campaign, FEMA Administrator Craig Fugate acknowledged that traditional efforts have not 'moved the preparedness needle'. The most frequently cited causes for lack of preparedness in the general public are consumer apathy, lack of time, lack of money and the lack of knowledge on how best to prepare. This paper explores the reliance on fear and threat-based messages (also referred to as 'fear appeals') to promote preparedness as a significant cause for this lack of preparation. It will look at the growing body of fear research, how fear and threat appeals are pervasive in emergency management, as well as their costs, unintended consequences and the other choices that can be made. The author asserts that by eliminating fear and threat-based messages, new messengers can share readiness as an accessible, empowering and valued pursuit for all communities - entirely distinct from the disasters and threats that are faced.

  4. Helping Parents Cope with Suicide Threats: An Approach Based on Nonviolent Resistance.

    Science.gov (United States)

    Omer, Haim; Dolberger, Dan Isaac

    2015-09-01

    Parent training in nonviolent resistance was adapted to deal with situations of suicide threat by children, adolescents, and young adults. The approach aims at reducing the risk potential and the mutual distress surrounding the threat-interaction. Parent training in nonviolent resistance has been shown to help parents move from helplessness to presence, from isolation to connectedness, from submission to resistance, from escalation to self-control, and from mutual distancing and hostility to care and support. Those emphases can be crucial for the diminution of suicide risk. Parents show good ability to implement the approach and report gains on various areas over and beyond the reduction in suicide threat. A particular advantage is that the method can be used also in cases where the young person threatening suicide is not willing to cooperate. © 2015 Family Process Institute.

  5. A methodology for the evaluation of the turbine jet engine fragment threat to generic air transportable containers

    International Nuclear Information System (INIS)

    Harding, D.C.; Pierce, J.D.

    1993-06-01

    Uncontained, high-energy gas turbine engine fragments are a potential threat to air-transportable containers carried aboard jet aircraft. The threat to a generic example container is evaluated by probability analyses and penetration testing to demonstrate the methodology to be used in the evaluation of a specific container/aircraft/engine combination. Fragment/container impact probability is the product of the uncontained fragment release rate and the geometric probability that a container is in the path of this fragment. The probability of a high-energy rotor burst fragment from four generic aircraft engines striking one of the containment vessels aboard a transport aircraft is approximately 1.2 x 10 -9 strikes/hour. Finite element penetration analyses and tests can be performed to identify specific fragments which have the potential to penetrate a generic or specific containment vessel. The relatively low probability of engine fragment/container impacts is primarily due to the low release rate of uncontained, hazardous jet engine fragments

  6. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  7. Standoff Methods for the Detection of Threat Agents: A Review of Several Promising Laser-Based Techniques

    Directory of Open Access Journals (Sweden)

    J. Bruce Johnson

    2014-01-01

    Full Text Available Detection of explosives, explosive precursors, or other threat agents presents a number of technological challenges for optical sensing methods. Certainly detecting trace levels of threat agents against a complex background is chief among these challenges; however, the related issues of multiple target distances (from standoff to proximity and sampling time scales (from passive mines to rapid rate of march convoy protection for different applications make it unlikely that a single technique will be ideal for all sensing situations. A number of methods for spanning the range of optical sensor technologies exist which, when integrated, could produce a fused sensor system possessing a high level of sensitivity to threat agents and a moderate standoff real-time capability appropriate for portal screening of personnel or vehicles. In this work, we focus on several promising, and potentially synergistic, laser-based methods for sensing threat agents. For each method, we have briefly outlined the technique and report on the current level of capability.

  8. Comparison of Efficacy and Threat Perception Processes in Predicting Smoking among University Students Based on Extended Parallel Process Model

    Directory of Open Access Journals (Sweden)

    S. Bashirian

    2014-04-01

    Full Text Available Introduction & Objective: The survey of smoking as the most toxic, common and cheapest ad-diction, and its psychological and demographic variables especially among the youth who are efficient and constructive individuals of the society is of great importance. This study was performed to compare efficacy and threat perception in predicting cigarette smoking among university students based on Expended Parallel Process Model (EPPM. Material & Methods: This cross sectional descriptive study was carried out on 700 college stu-dents of Hamadan recruited with a stratified sampling method. The participants completed a self-administered questionnaire including demographic characteristics, smoking status and EPPM Data analysis was done with the SPSS software (version 16, using t-test, one way ANOVA, Pierson correlation and logistic regression methods. Results: The average scores of threat and efficacy perception were 39.7 and 38.6, respectively. The prevalence of cigarette smoking among participants was 27.1 percent. Also, there were significant differences between the average score of efficacy perception and age, gender, his-tory of drug abuse and dwelling of students (P<0.05. Efficacy and threat perception both predicted student cigarette smoking. Conclusions: Cognitive mediating process of threat perception was a more powerful predictor of cigarette smoking as an unsafe behavior. Therefore, increasing self efficacy and response efficacy of university students aimed at facilitating the acceptance of safe behavior could be note-worthy as a principle in education. (Sci J Hamadan Univ Med Sci 2014; 21 (1:58-65

  9. Vulnerability of Water Resources under Climate and Land Use Change: Evaluation of Present and Future Threats for Austria

    Science.gov (United States)

    Nachtnebel, Hans-Peter; Wesemann, Johannes; Herrnegger, Mathew; Senoner, Tobias; Schulz, Karsten

    2015-04-01

    vulnerability were developed. A comparison with existing data (River Basin Management Plan and Groundwater Chemistry Regulation) shows a good agreement between the elaborated maps and observations for the present state. The Overall Vulnerability is very low and low for most parts of Austria, especially in the forested alpine region. Bigger cities like Vienna, Graz and Linz show medium vulnerabilities, due to the high water demand and low ecosystem services. Only in the north-eastern and south-eastern part of the country some water supply associations with high and very high overall vulnerability exist. Groundwater recharge is quite small in these regions and the water quality is limited due to intense agriculture and possible threats through landfills. The developed framework allows an evaluation of water quantity and quality vulnerabilities for large scales for the present and the future. Including ecosystem services and gross value added an overall vulnerability can be determined.

  10. Evaluating the response of complex systems to environmental threats: the Σ II method

    International Nuclear Information System (INIS)

    Corynen, G.C.

    1983-05-01

    The Σ II method was developed to model and compute the probabilistic performance of systems that operate in a threatening environment. Although we emphasize the vulnerability of complex systems to earthquakes and to electromagnetic threats such as EMP (electromagnetic pulse), the method applies in general to most large-scale systems or networks that are embedded in a potentially harmful environment. Other methods exist for obtaining system vulnerability, but their complexity increases exponentially as the size of systems is increased. The complexity of the Σ II method is polynomial, and accurate solutions are now possible for problems for which current methods require the use of rough statistical bounds, confidence statements, and other approximations. For super-large problems, where the costs of precise answers may be prohibitive, a desired accuracy can be specified, and the Σ II algorithms will halt when that accuracy has been reached. We summarize the results of a theoretical complexity analysis - which is reported elsewhere - and validate the theory with computer experiments conducted both on worst-case academic problems and on more reasonable problems occurring in practice. Finally, we compare our method with the exact methods of Abraham and Nakazawa, and with current bounding methods, and we demonstrate the computational efficiency and accuracy of Σ II

  11. A value- and expectancy-based approach to understanding residents' intended response to a wildfire threat

    DEFF Research Database (Denmark)

    McNeill, Ilona M.; Dunlop, Patrick D.; Skinner, Timothy C.

    2016-01-01

    To motivate residents to evacuate early in case of a wildfire threat, it is important to know what factors underlie their response-related decision-making. The current paper examines the role of the value and expectancy tied to potential outcomes of defending vs evacuating on awareness of a commu......To motivate residents to evacuate early in case of a wildfire threat, it is important to know what factors underlie their response-related decision-making. The current paper examines the role of the value and expectancy tied to potential outcomes of defending vs evacuating on awareness...... of a community fire threat. A scenario study among 339 Western Australians revealed that residents intending to leave immediately on awareness of a community fire threat differ from those not intending to leave immediately in both value and expectancy. For one, intended leavers were more likely than those...... expectancies regarding the likelihood of achieving positive outcomes by defending than those intending to defend or wait and see before deciding what to do. Finally, intended leavers perceived it more likely that they would avoid harm to their pets by evacuating than those intending to defend throughout...

  12. A Feasibility Study on Detection of Insider Threats based on Human Bio-signals

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    The insider threat means that trusted workers in an organization might carry out harmful acts from the negligent use of classified data to potentially sabotage the workplace. Surveys and studies conducted over the last decade have consistently shown the critical nature of the insider threats problem, in both government and private sectors. The shortcomings of existing systems, such as mental self-assessment and peer review, are very subjective, biased-assessments and employed infrequently. To overcome these limitations, this study investigates the feasibility of detecting and predicting an insider threat by using human biodata, from smart wearable devices. This paper showed the feasibility of predicting and detecting insider threats using EEG, GSR and ECG signals. In the section 2.1, two research hypotheses were established to identify the significant difference on EEG, GSR and ECG signals when the subject decided bad action and is the placed in deceit situation. These hypotheses were tested using two kinds of pilot experiments in the form of input (stimulus) and output (checking response of physiological signals and reaction time)

  13. Screening-level exposure-based prioritization to identify potential POPs, vPvBs and planetary boundary threats among Arctic contaminants

    Directory of Open Access Journals (Sweden)

    Efstathios Reppas-Chrysovitsinos

    2017-06-01

    Full Text Available A report that reviews Arctic contaminants that are not currently regulated as persistent organic pollutants (POPs under international treaties was recently published by the Arctic Monitoring and Assessment Programme (AMAP. We evaluated 464 individual chemicals mentioned in the AMAP report according to hazard profiles for POPs, very persistent and very bioaccumulative (vPvB chemicals, and two novel and distinct hazard profiles we derived from the planetary boundary threat framework. The two planetary boundary threat profiles assign high priority to chemicals that will be mobile and poorly reversible environmental contaminants. Utilizing persistence as a proxy for poor reversibility, we defined two exposure-based hazard profiles; airborne persistent contaminants (APCs and waterborne persistent contaminants (WPCs that are potential planetary boundary threats. We used in silico estimates of physicochemical properties and multimedia models to calculate hazard metrics for persistence, bioaccumulation and long-range transport potential, then we synthesized this information into four exposure-based hazard scores of the potential of each AMAP chemical to fit each of the POP, vPvB, APC and WPC exposure-based hazard profiles. As an alternative to adopting a “bright line” score that represented cause for concern, we scored the AMAP chemicals by benchmarking against a reference set of 148 known and relatively well-studied contaminants and expressed their exposure-based hazard scores as percentile ranks against the scores of the reference set chemicals. Our results show that scores in the four exposure-based hazard profiles provide complementary information about the potential environmental exposure-based hazards of the AMAP chemicals. Our POP, vPvB, APC and WPC exposure-based hazard scores identify high priority chemicals for further study from among the AMAP contaminants.

  14. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  15. Stereotype Threat among Students with Disabilities: The Importance of The Evaluative Context on Their Cognitive Performance

    Science.gov (United States)

    Desombre, Caroline; Anegmar, Souad; Delelis, Gérald

    2018-01-01

    This study investigated the hypothesis that cognitive performance of students with physical disabilities may be influenced by the evaluators' identity. Students with or without a physical disability completed a logic test and were informed that they would be evaluated by students from their own group (ingroup condition) or from an other group…

  16. Gender-, Race-, and Income-Based Stereotype Threat: The Effects of Multiple Stigmatized Aspects of Identity on Math Performance and Working Memory Function

    Science.gov (United States)

    Tine, Michele; Gotlieb, Rebecca

    2013-01-01

    This study compared the relative impact of gender-, race-, and income-based stereotype threat and examined if individuals with multiple stigmatized aspects of identity experience a larger stereotype threat effect on math performance and working memory function than people with one stigmatized aspect of identity. Seventy-one college students of the…

  17. Transferring x-ray based automated threat detection between scanners with different energies and resolution

    Science.gov (United States)

    Caldwell, M.; Ransley, M.; Rogers, T. W.; Griffin, L. D.

    2017-10-01

    A significant obstacle to developing high performance Deep Learning algorithms for Automated Threat Detection (ATD) in security X-ray imagery, is the difficulty of obtaining large training datasets. In our previous work, we circumvented this problem for ATD in cargo containers, using Threat Image Projection and data augmentation. In this work, we investigate whether data scarcity for other modalities, such as parcels and baggage, can be ameliorated by transforming data from one domain so that it approximates the appearance of another. We present an ontology of ATD datasets to assess where transfer learning may be applied. We define frameworks for transfer at the training and testing stages, and compare the results for both methods against ATD where a common data source is used for training and testing. Our results show very poor transfer, which we attribute to the difficulty of accurately matching the blur and contrast characteristics of different scanners.

  18. Evaluating the effectiveness of protected areas for maintaining biodiversity, securing habitats, and reducing threats

    DEFF Research Database (Denmark)

    Geldmann, Jonas

    of this thesis has been to evaluate the performance and effectiveness of protected area in securing biodiversity, by evaluating their ability to either improve conservation responses, the state of biodiversity, or alternatively to reduce the human pressures responsible for the loss of biodiversity. The scope...... already published works. For protected areas ability to reduce habitat loss the evidence is stronger, suggesting that protected areas have been able to reduce the rate of habitat loss compared to a counterfactual scenario. In chapter II we evaluate the different types of methods to assess management...

  19. INFORMATION SYSTEM SECURITY THREATS CLASSIFICATIONS

    Directory of Open Access Journals (Sweden)

    Sandro Gerić

    2007-06-01

    Full Text Available Information systems are exposed to different types of security risks. Theconsequences of information systems security (ISS breaches can vary from e.g. damaging the data base integrity to physical "destruction" of entire information system facilities, and can result with minor disruptions in less important segments of information systems, or with significant interruptions in information systems functionality. The sources of security risks are different, and can origin from inside or outside of information system facility, and can be intentional or unintentional. The precise calculation of loses caused by such incidents is often not possible because a number of small scale ISS incidents are never detected, or detected with a significant time delay, a part of incidents are interpreted as an accidental mistakes, and all that results with an underestimation of ISS risks. This paper addresses the different types and criteria of information system security risks (threats classification and gives an overview of most common classifications used in literature and in practice. We define a common set of criteria that can be used for information system security threats classification, which will enable the comparison and evaluation of different security threats from different security threats classifications.

  20. Immortal time bias: a frequently unrecognized threat to validity in the evaluation of postoperative radiotherapy.

    Science.gov (United States)

    Park, Henry S; Gross, Cary P; Makarov, Danil V; Yu, James B

    2012-08-01

    To evaluate the influence of immortal time bias on observational cohort studies of postoperative radiotherapy (PORT) and the effectiveness of sequential landmark analysis to account for this bias. First, we reviewed previous studies of the Surveillance, Epidemiology, and End Results (SEER) database to determine how frequently this bias was considered. Second, we used SEER to select three tumor types (glioblastoma multiforme, Stage IA-IVM0 gastric adenocarcinoma, and Stage II-III rectal carcinoma) for which prospective trials demonstrated an improvement in survival associated with PORT. For each tumor type, we calculated conditional survivals and adjusted hazard ratios of PORT vs. postoperative observation cohorts while restricting the sample at sequential monthly landmarks. Sixty-two percent of previous SEER publications evaluating PORT failed to use a landmark analysis. As expected, delivery of PORT for all three tumor types was associated with improved survival, with the largest associated benefit favoring PORT when all patients were included regardless of survival. Preselecting a cohort with a longer minimum survival sequentially diminished the apparent benefit of PORT. Although the majority of previous SEER articles do not correct for it, immortal time bias leads to altered estimates of PORT effectiveness, which are very sensitive to landmark selection. We suggest the routine use of sequential landmark analysis to account for this bias. Copyright © 2012 Elsevier Inc. All rights reserved.

  1. Immortal Time Bias: A Frequently Unrecognized Threat to Validity in the Evaluation of Postoperative Radiotherapy

    International Nuclear Information System (INIS)

    Park, Henry S.; Gross, Cary P.; Makarov, Danil V.; Yu, James B.

    2012-01-01

    Purpose: To evaluate the influence of immortal time bias on observational cohort studies of postoperative radiotherapy (PORT) and the effectiveness of sequential landmark analysis to account for this bias. Methods and Materials: First, we reviewed previous studies of the Surveillance, Epidemiology, and End Results (SEER) database to determine how frequently this bias was considered. Second, we used SEER to select three tumor types (glioblastoma multiforme, Stage IA–IVM0 gastric adenocarcinoma, and Stage II–III rectal carcinoma) for which prospective trials demonstrated an improvement in survival associated with PORT. For each tumor type, we calculated conditional survivals and adjusted hazard ratios of PORT vs. postoperative observation cohorts while restricting the sample at sequential monthly landmarks. Results: Sixty-two percent of previous SEER publications evaluating PORT failed to use a landmark analysis. As expected, delivery of PORT for all three tumor types was associated with improved survival, with the largest associated benefit favoring PORT when all patients were included regardless of survival. Preselecting a cohort with a longer minimum survival sequentially diminished the apparent benefit of PORT. Conclusions: Although the majority of previous SEER articles do not correct for it, immortal time bias leads to altered estimates of PORT effectiveness, which are very sensitive to landmark selection. We suggest the routine use of sequential landmark analysis to account for this bias.

  2. Immortal Time Bias: A Frequently Unrecognized Threat to Validity in the Evaluation of Postoperative Radiotherapy

    Energy Technology Data Exchange (ETDEWEB)

    Park, Henry S. [Department of Therapeutic Radiology, Yale University School of Medicine, New Haven, CT (United States); Gross, Cary P. [Cancer Outcomes Policy and Effectiveness Research Center, Yale University School of Medicine, New Haven, CT (United States); Makarov, Danil V. [Department of Urology, New York University School of Medicine, New York, NY (United States); Yu, James B., E-mail: james.b.yu@yale.edu [Department of Therapeutic Radiology, Yale University School of Medicine, New Haven, CT (United States); Cancer Outcomes Policy and Effectiveness Research Center, Yale University School of Medicine, New Haven, CT (United States)

    2012-08-01

    Purpose: To evaluate the influence of immortal time bias on observational cohort studies of postoperative radiotherapy (PORT) and the effectiveness of sequential landmark analysis to account for this bias. Methods and Materials: First, we reviewed previous studies of the Surveillance, Epidemiology, and End Results (SEER) database to determine how frequently this bias was considered. Second, we used SEER to select three tumor types (glioblastoma multiforme, Stage IA-IVM0 gastric adenocarcinoma, and Stage II-III rectal carcinoma) for which prospective trials demonstrated an improvement in survival associated with PORT. For each tumor type, we calculated conditional survivals and adjusted hazard ratios of PORT vs. postoperative observation cohorts while restricting the sample at sequential monthly landmarks. Results: Sixty-two percent of previous SEER publications evaluating PORT failed to use a landmark analysis. As expected, delivery of PORT for all three tumor types was associated with improved survival, with the largest associated benefit favoring PORT when all patients were included regardless of survival. Preselecting a cohort with a longer minimum survival sequentially diminished the apparent benefit of PORT. Conclusions: Although the majority of previous SEER articles do not correct for it, immortal time bias leads to altered estimates of PORT effectiveness, which are very sensitive to landmark selection. We suggest the routine use of sequential landmark analysis to account for this bias.

  3. Trait mindfulness modulates neuroendocrine and affective responses to social evaluative threat.

    Science.gov (United States)

    Brown, Kirk Warren; Weinstein, Netta; Creswell, J David

    2012-12-01

    Individual differences in mindfulness have been associated with numerous self-report indicators of stress, but research has not examined how mindfulness may buffer neuroendocrine and psychological stress responses under controlled laboratory conditions. The present study investigated the role of trait mindfulness in buffering cortisol and affective responses to a social evaluative stress challenge versus a control task. Participants completed measures of trait mindfulness, perceived stress, anxiety, and fear of negative evaluation before being randomized to complete the Trier Social Stress Test (TSST; Kirschbaum et al., 1993) or a control task. At points throughout the session, participants provided five saliva samples to assess cortisol response patterns, and completed four self-report measures of anxiety and negative affect to assess psychological responses. In accord with hypotheses, higher trait mindfulness predicted lower cortisol responses to the TSST, relative to the control task, as well as lower anxiety and negative affect. These relations remained significant when controlling for the role of other variables that predicted cortisol and affective responses. The findings suggest that trait mindfulness modulates cortisol and affective responses to an acute social stressor. Further research is needed to understand the neural pathways through which mindfulness impacts these responses. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. Model to Counter the Threats in the Data Transmission System PLC-based Technology with the Use of Petri Nets

    Directory of Open Access Journals (Sweden)

    A. A. Balaev

    2010-06-01

    Full Text Available In the article the most important aspects of information security technology Power Line Communica tions, namely the provision of conditions accessibility and integrity, are considered. It is shown that these aspects of the PLC-Technology has some internal “potential” counter, at least, such a widespread threat to both natural disturbances and/or artificial origin. The possibility of such an implementation using the simplified mathematical model of the PLC-based technologies of the theory of Petri nets is presented.

  5. Evaluation of laser-induced breakdown spectroscopy analysis potential for addressing radiological threats from a distance

    International Nuclear Information System (INIS)

    Gaona, I.; Serrano, J.; Moros, J.; Laserna, J.J.

    2014-01-01

    Although radioactive materials are nowadays valuable tools in nearly all fields of modern science and technology, the dangers stemming from the uncontrolled use of ionizing radiation are more than evident. Since preparedness is a key issue to face the risks of a radiation dispersal event, development of rapid and efficient monitoring technologies to control the contamination caused by radioactive materials is of crucial interest. Laser-induced breakdown spectroscopy (LIBS) exhibits appealing features for this application. This research focuses on the assessment of LIBS potential for the in-situ fingerprinting and identification of radioactive material surrogates from a safe distance. LIBS selectivity and sensitivity to detect a variety of radioactive surrogates, namely 59 Co, 88 Sr, 130 Ba, 133 Cs, 193 Ir and 238 U, on the surface of common urban materials at a distance of 30 m have been evaluated. The performance of the technique for nuclear forensics has been also studied on different model scenarios. Findings have revealed the difficulties to detect and to identify the analytes depending on the surface being interrogated. However, as demonstrated, LIBS shows potential enough for prompt and accurate gathering of essential evidence at a number of sites after the release, either accidental or intentional, of radioactive material. The capability of standoff analysis confers to LIBS unique advantages in terms of fast and safe inspection of forensic scenarios. The identity of the radioactive surrogates is easily assigned from a distance and the sensitivity to their detection is in the range of a few hundreds of ng per square centimeter. - Highlights: • Distant identification of radioactive surrogates on urban surfaces has been proved. • LIBS sensitivity to distant detection of radioactive surrogates has been checked. • Influences of the atmosphere on emission signals have been ascertained. • Usage of standoff LIBS for identifying forensic evidences has been

  6. A review and meta-analysis of age-based stereotype threat: negative stereotypes, not facts, do the damage.

    Science.gov (United States)

    Lamont, Ruth A; Swift, Hannah J; Abrams, Dominic

    2015-03-01

    Stereotype threat effects arise when an individual feels at risk of confirming a negative stereotype about their group and consequently underperforms on stereotype relevant tasks (Steele, 2010). Among older people, underperformance across cognitive and physical tasks is hypothesized to result from age-based stereotype threat (ABST) because of negative age-stereotypes regarding older adults' competence. The present review and meta-analyses examine 22 published and 10 unpublished articles, including 82 effect sizes (N = 3882) investigating ABST on older people's (Mage = 69.5) performance. The analysis revealed a significant small-to-medium effect of ABST (d = .28) and important moderators of the effect size. Specifically, older adults are more vulnerable to ABST when (a) stereotype-based rather than fact-based manipulations are used (d = .52); (b) when performance is tested using cognitive measures (d = .36); and (c) occurs reliably when the dependent variable is measured proximally to the manipulation. The review raises important theoretical and methodological issues, and areas for future research. (c) 2015 APA, all rights reserved).

  7. Experimentation and evaluation of threat detection and local area awareness using advanced computational technologies in a simulated military environment

    Science.gov (United States)

    Metcalfe, Jason S.; Brick Larkin, Gabriella; Johnson, Tony; Oie, Kelvin; Paul, Victor; Davis, James

    2010-04-01

    Tomorrows military systems will require novel methods for assessing Soldier performance and situational awareness (SA) in mobile operations involving mixed-initiative systems. Although new methods may augment Soldier assessments, they may also reduce Soldier performance as a function of demand on workload, requiring concurrent performance of mission and assessment tasks. The present paper describes a unique approach that supports assessment in environments approximating the operational context within which future systems will be deployed. A complex distributed system was required to emulate the operational environment. Separate computational and visualization systems provided an environment representative of the military operational context, including a 3D urban environment with dynamic human entities. Semi-autonomous driving was achieved with a simulated autonomous mobility system and SA was assessed through digital reports. A military crew station mounted on a 6-DOF motion simulator was used to create the physical environment. Cognitive state evaluation was enabled using physiological monitoring. Analyses indicated individual differences in temporal and accuracy components when identifying key features of potential threats; i.e., comparing Soldiers and insurgents with non-insurgent civilians. The assessment approach provided a natural, operationally-relevant means of assessing needs of future secure mobility systems and detecting key factors affecting Soldier-system performance as foci for future development.

  8. Depression history as a moderator of relations between cortisol and shame responses to social-evaluative threat in young adults.

    Science.gov (United States)

    Hellman, Natalie; Morris, Matthew C; Rao, Uma; Garber, Judy

    2015-07-01

    Changes in cortisol and shame are commonly elicited by psychosocial stressors involving social-evaluative threat. According to social self preservation theory, this coordinated psychobiological response is adaptive. Individuals with a history of depression, however, may exhibit diminished cortisol reactivity to acute stressors, which could interfere with coordinated cortisol and shame responses. The present study examined temporal relations between cortisol and shame responses to a psychosocial stress task in young adults who varied in their history of depression (56 remitted-depressed, 46 never-depressed). Lagged effects multilevel models revealed that depression history moderated relations between cortisol levels and shame ratings 25-55min later. The pattern of these interactions was similar: whereas higher cortisol levels predicted increases in shame in never-depressed individuals, cortisol levels were unrelated to shame responses in remitted-depressed individuals. Findings suggest a dissociation between cortisol and shame responses to stress in individuals with a history of depression. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Classification-free threat detection based on material-science-informed clustering

    Science.gov (United States)

    Yuan, Siyang; Wolter, Scott D.; Greenberg, Joel A.

    2017-05-01

    X-ray diffraction (XRD) is well-known for yielding composition and structural information about a material. However, in some applications (such as threat detection in aviation security), the properties of a material are more relevant to the task than is a detailed material characterization. Furthermore, the requirement that one first identify a material before determining its class may be difficult or even impossible for a sufficiently large pool of potentially present materials. We therefore seek to learn relevant composition-structure-property relationships between materials to enable material-identification-free classification. We use an expert-informed, data-driven approach operating on a library of XRD spectra from a broad array of stream of commerce materials. We investigate unsupervised learning techniques in order to learn about naturally emergent groupings, and apply supervised learning techniques to determine how well XRD features can be used to separate user-specified classes in the presence of different types and degrees of signal degradation.

  10. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  11. Offensive Threats

    Directory of Open Access Journals (Sweden)

    Alaa A. Mahdi

    2017-02-01

    Full Text Available This paper try to give us more details about the meaning of directory, and which type of security involved within the intended with each type of the specified directory. The security threats pose a significant and increasing problem for organizations. This is shown by the regular stories of fraud and data loss reported daily in the media in anywhere in the world. There is a need to provide systematic protection from insider attacks because of their privileged access. Moreover, we should provide a systematic protection from the outside attacks, as well. It is worthy to separate the duty of directory by indentifying the main two duties: the duty of the system administrator and the database administrator, and we have to recognize the difference between them. We will provide the researchers with four main threats that might be offensive to the security of directory. Moreover, we will address the nature of attack and the purpose of this attack that may encounter the directory or network assets. Finally, we will show the relation between Active Directory Security and Server Security.

  12. Cardiovascular and cortisol reactions to acute psychological stress under conditions of high versus low social evaluative threat: associations with the type D personality construct.

    Science.gov (United States)

    Bibbey, Adam; Carroll, Douglas; Ginty, Annie T; Phillips, Anna C

    2015-06-01

    Social evaluative threat is an important factor in the cardiovascular response to mental stress. This study examined whether Type D personality, characterized by social inhibition and negative affectivity, is associated with an adverse cardiovascular response to a non-social and social evaluative threat. A total of 2300 students were screened for Type D personality, and 130 were selected for a nonsocial stress exposure condition (31 Type D, 30 non-Type D: 52% female) or a condition high in social evaluative threat (35 Type D, 34 non-Type D: 55% female). Systolic (SBP) and diastolic blood pressure (DBP), heart rate (HR), and salivary cortisol were measured. Social evaluative threat resulted in higher cardiovascular responses than the nonsocial challenge (SBP, p = .001, η = 0.092;DBP, p = .006, η = 0.058;HR, p = .006, η = 0.059). The greatest cardiovascular stress reactions were exhibited by Type D participants in the high social evaluation condition; reflected in significant group by condition interactions for SBP (F(1,126) = 7.29, p = .008, η = 0.055), DBP (F(1,126) = 5.23, p = .024, η = 0.040), and HR (F(1,126) = 5.04, p = .027, η = 0.038) reactivity. Only Type Ds in the social condition mounted a positive cortisol response (F(1,33) = 5.07, p = .031, η = 0.133). Type D individuals show different stress reactions depending on the social evaluative nature of the stress exposure. These findings suggest that dysregulation of the stress response in social situations potentially increases cardiovascular disease risk.

  13. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  14. Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats

    Energy Technology Data Exchange (ETDEWEB)

    Mills, Richard T [ORNL; Hoffman, Forrest M [ORNL; Kumar, Jitendra [ORNL; HargroveJr., William Walter [USDA Forest Service

    2011-01-01

    We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The approaches explored here are based on k-means cluster analysis of this massive data set, which provides a basis for defining the bounds of the expected or normal phenological patterns that indicate healthy vegetation at a given geographic location. We briefly describe the computational approaches we have used to make cluster analysis of such massive data sets feasible, describe approaches we have explored for distinguishing between normal and abnormal phenology, and present some examples in which we have applied these approaches to identify various forest disturbances in the CONUS.

  15. Integration of population genetic structure and plant response to climate change: sustaining genetic resources through evaluation of projected threats

    Science.gov (United States)

    Bryce A. Richardson; Marcus V. Warwell; Mee-Sook Kim; Ned B. Klopfenstein; Geral I. McDonald

    2010-01-01

    To assess threats or predict responses to disturbances, or both, it is essential to recognize and characterize the population structures of forest species in relation to changing environments. Appropriate management of these genetic resources in the future will require (1) understanding the existing genetic diversity/variation and population structure of forest trees...

  16. Understanding and managing human threats to the coastal marine environment.

    Science.gov (United States)

    Crain, Caitlin M; Halpern, Benjamin S; Beck, Mike W; Kappel, Carrie V

    2009-04-01

    Coastal marine habitats at the interface of land and sea are subject to threats from human activities in both realms. Researchers have attempted to quantify how these various threats impact different coastal ecosystems, and more recently have focused on understanding the cumulative impact from multiple threats. Here, the top threats to coastal marine ecosystems and recent efforts to understand their relative importance, ecosystem-level impacts, cumulative effects, and how they can best be managed and mitigated, are briefly reviewed. Results of threat analysis and rankings will differ depending on the conservation target (e.g., vulnerable species, pristine ecosystems, mitigatable threats), scale of interest (local, regional, or global), whether externalities are considered, and the types of management tools available (e.g., marine-protected areas versus ecosystem-based management). Considering the cumulative effect of multiple threats has only just begun and depends on spatial analysis to predict overlapping threats and a better understanding of multiple-stressor effects and interactions. Emerging conservation practices that hold substantial promise for protecting coastal marine systems include multisector approaches, such as ecosystem-based management (EBM), that account for ecosystem service valuation; comprehensive spatial management, such as ocean zoning; and regulatory mechanisms that encourage or require cross-sector goal setting and evaluation. In all cases, these efforts require a combination of public and private initiatives for success. The state of our ecological understanding, public awareness, and policy initiatives make the time ripe for advancing coastal marine management and improving our stewardship of coastal and marine ecosystems.

  17. Migrants and emerging public health issues in a globalized world: threats, risks and challenges, an evidence-based framework.

    Science.gov (United States)

    Gushulak, Bd; Weekers, J; Macpherson, Dw

    2009-01-01

    International population mobility is an underlying factor in the emergence of public health threats and risks that must be managed globally. These risks are often related, but not limited, to transmissible pathogens. Mobile populations can link zones of disease emergence to lowprevalence or nonendemic areas through rapid or high-volume international movements, or both. Against this background of human movement, other global processes such as economics, trade, transportation, environment and climate change, as well as civil security influence the health impacts of disease emergence. Concurrently, global information systems, together with regulatory frameworks for disease surveillance and reporting, affect organizational and public awareness of events of potential public health significance. International regulations directed at disease mitigation and control have not kept pace with the growing challenges associated with the volume, speed, diversity, and disparity of modern patterns of human movement. The thesis that human population mobility is itself a major determinant of global public health is supported in this article by review of the published literature from the perspective of determinants of health (such as genetics/biology, behavior, environment, and socioeconomics), population-based disease prevalence differences, existing national and international health policies and regulations, as well as inter-regional shifts in population demographics and health outcomes. This paper highlights some of the emerging threats and risks to public health, identifies gaps in existing frameworks to manage health issues associated with migration, and suggests changes in approach to population mobility, globalization, and public health. The proposed integrated approach includes a broad spectrum of stakeholders ranging from individual health-care providers to policy makers and international organizations that are primarily involved in global health management, or are influenced

  18. Ozone threat

    International Nuclear Information System (INIS)

    Rajput, M.A.

    1995-01-01

    Ozone hole was first discovered in 1980. Thus 15 years even after the first warming, the world is no where near to the elimination of man made gases that threaten to destroy the ozone layer. Ozone depletion has become a matter of enormous threat which remains to be solved by the Scientists and intelligentia of the world. Ozone (O3) is a pungent poisonous gas. It forms a layer at a distance of about 15 miles above the earth's surface which helps shield living things from the sun shearing ultra violet light. If ozone is lost, more ultra violet light reaches the earth, which can lead to increasing rate of skin cancer, the death of micro organisms and the failure of crops and plants. It was in 1974 when it was discovered that Chlorofluorocarbons (CFCs) cold rise slowly to the upper atmosphere and destroy the earth's fragile ozone shield. Chlorofluorocarbons are commonly used as coolants (such as Freon) for home and automobile air conditioners and in the making of fast food containers. CFCs take about 100 years or more to reach he stratosphere to damage the ozone layers. In 1988, Scientists confirmed that upto 3% of the ozone layer over the more populated Northern Hemisphere has been destroyed. it is believed that for every 1% decrease in ozone, skin cancers are expected to rise 5 to 6 per cent due to the increase of ultraviolet light. Cases of cataracts and certain human immune system diseases are also expected to rise. (author)

  19. Are Standards-Based Quality Systems a Threat to the Internationalization of Teaching and Learning?

    Science.gov (United States)

    Thompson-Whiteside, Scott

    2013-01-01

    This paper explores the current shift in Australia's higher education system moving to a more explicit, standards-based quality system and its potential impact on international partnerships in teaching and learning, particularly in Asia. The new Tertiary Education Quality and Standards Agency and the underlying Higher Education Standards Framework…

  20. Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering

    Science.gov (United States)

    Kerzhner, Aleksandr; Pomerantz, Marc; Tan, Kymie; Campuzano, Brian; Dinkel, Kevin; Pecharich, Jeremy; Nguyen, Viet; Steele, Robert; Johnson, Bryan

    2015-01-01

    The spectre of cyber attacks on aerospace systems can no longer be ignored given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attack invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system where the goal of the defensive response is to preserve critical mission objectives in the presence of adversarial activity. In this paper, a structured approach for modeling aerospace systems is described. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group's Systems Modeling Language to represent the system being analyzed and also utilize model transformations to change relevant aspects of the model into specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. Two different example analysis types are demonstrated in this paper: a graph-based propagation analysis based on edge labels, and a graph-based propagation analysis based on node labels.

  1. Process based system models for detecting opportunities and threats : the case of World Cement Production

    OpenAIRE

    Isaksson, Raine

    2016-01-01

    Background Visualising change needs could be complex. One way of sense - making is to use process based system models. G lobal warming require s major changes in many fields and especially for cement manufacturing, which represents a growing portion of manmade carbon emissions . The industry has proposed measures for change , but it is diff icult to assess how good these are and more sense - making is needed to clarify the situation. Purpose The purpose is to visualise opportunities and threa...

  2. The Shoreline Video Assessment Method (S-VAM): Using dynamic hyperlapse image acquisition to evaluate shoreline mangrove forest structure, values, degradation and threats.

    Science.gov (United States)

    Mackenzie, Jock R; Duke, Norman C; Wood, Apanie L

    2016-08-30

    Climate change with human direct pressures represent significant threats to the resilience of shoreline habitats like mangroves. A rapid, whole-of-system assessment strategy is needed to evaluate such threats, better linking innovative remote sensing with essential on-ground evaluations. Using the Shoreline Video Assessment Method, we surveyed around 190km of the mostly mangrove-fringed (78%) coastline of Kien Giang Province, Vietnam. The aim was to identify anthropogenic drivers of degradation, establishing baseline for specific rehabilitation and protection strategies. Fish traps occupy at least 87% of shoreline mangroves, around which there were abundant human activities - like fishing, crabbing, farming, plus collecting firewood and foliage. Such livelihoods were associated with remnant, fringing mangrove that were largely degraded and threatened by erosion retreat, herbivory, and excessive cutting. Our assessment quantified associated threats to shoreline stability, along with previous rehabilitation intervention measures. The method offers key opportunities for effective conservation and management of vulnerable shoreline habitats. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Theory-Based Stakeholder Evaluation

    Science.gov (United States)

    Hansen, Morten Balle; Vedung, Evert

    2010-01-01

    This article introduces a new approach to program theory evaluation called theory-based stakeholder evaluation or the TSE model for short. Most theory-based approaches are program theory driven and some are stakeholder oriented as well. Practically, all of the latter fuse the program perceptions of the various stakeholder groups into one unitary…

  4. Protecting computer-based medical devices: defending against viruses and other threats.

    Science.gov (United States)

    2005-07-01

    The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.

  5. Are Standards-based Quality Systems a Threat to the Internationalization of Teaching and Learning?

    Directory of Open Access Journals (Sweden)

    Scott Thompson-Whiteside

    2013-05-01

    Full Text Available This paper explores the current shift in Australia’s higher education system moving to a more explicit, standards-based quality system and its potential impact on international partnerships in teaching and learning, particularly in Asia. The new Tertiary Education Quality and Standards Agency and the underlying Higher Education Standards Framework have the potential to threaten a large number of transnational or cross-border programs delivered outside of Australia. With over one hundred and fifty thousand tertiary students studying Australian programs in Asia, the impact could be significant. It would also be significant for countries that leverage of Australian Universities to build human capacity within their country. The paper highlights the current practice of assuring equivalent and comparable academic standards in transnational education and explores how shifting to a more precise standards framework will require more explicit demonstration of standards across teaching, learning and student outcomes. If equivalent or comparable standards were to be achieved across the whole standards framework, it is likely to constrain the opportunities for internationalization and the formation of new transnational partnerships.

  6. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available Darshan Lakha Vodacom Group CTSO 6th CSIR Conference 6 October 2017 INSIDER THREATS Darshan Lakha 2 INSIDER THREATS | Impact Darshan Lakha 3 Are insider threats the main security threat in 2017? 2017 insider threat Intelligence report (Dtex...,2017) High Risk Applications 95% Leavers, Joiners & Movers 56% Public Data 64% Inappropriate Internet Usag 59% Security Bypass x2 INSIDER THREATS | Who is involved? Darshan Lakha 4 Privileged Users Terminated Employees Third...

  7. Inducing Attitude Change toward Online Gaming among Adolescent Players Based on Dissonance Theory: The Role of Threats and Justification of Effort

    Science.gov (United States)

    Wan, Chin-Sheng; Chiou, Wen-Bin

    2010-01-01

    The negative impact of online gaming on adolescents has received much attention. The question of how to reduce their pathological use of online gaming is a critical issue. Based on the concept of external justification in dissonance theory, this experimental study aimed to examine whether severity of threat and justification of effort would impact…

  8. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  9. Champ or chump? Challenge and threat states during pressurized competition.

    Science.gov (United States)

    Moore, Lee J; Wilson, Mark R; Vine, Samuel J; Coussens, Adam H; Freeman, Paul

    2013-12-01

    The present research examined the immediate impact of challenge and threat states on golf performance in both real competition and a laboratory-based task. In Study 1, 199 experienced golfers reported their evaluations of competition demands and personal coping resources before a golf competition. Evaluating the competition as a challenge (i.e., sufficient resources to cope with demands) was associated with superior performance. In Study 2, 60 experienced golfers randomly received challenge or threat manipulation instructions and then performed a competitive golf-putting task. Challenge and threat states were successfully manipulated and the challenge group outperformed the threat group. Furthermore, the challenge group reported less anxiety, more facilitative interpretations of anxiety, less conscious processing, and displayed longer quiet eye durations. However, these variables failed to mediate the group-performance relationship. These studies demonstrate the importance of considering preperformance psychophysiological states when examining the influence of competitive pressure on motor performance.

  10. Effects of a glyphosate-based herbicide and predation threat on the behaviour of agile frog tadpoles.

    Science.gov (United States)

    Mikó, Zsanett; Ujszegi, János; Gál, Zoltán; Hettyey, Attila

    2017-06-01

    The widespread application of pesticides emphasises the importance of understanding the impacts of these chemicals on natural communities. The most commonly applied broad-spectrum herbicides in the world are glyphosate-based herbicides, which have been suggested to induce significant behavioural changes in non-target organisms even at low environmental concentrations. To scrutinize the behavioural effects of herbicide-exposure we exposed agile frog (Rana dalmatina) tadpoles in an outdoor mesocosm experiment to three concentrations of a glyphosate-based herbicide (0, 2 and 6.5mg acid equivalent (a.e.) / L). To assess whether anti-predator behaviour is affected by the pesticide, we combined all levels of herbicide-exposure with three predator treatments (no predator, caged Aeshna cyanea dragonfly larvae or Lissotriton vulgaris newt adults) in a full factorial design. We observed hiding, activity, proximity to the predator cage and vertical position of tadpoles. We found that at the higher herbicide concentration tadpoles decreased their activity and more tadpoles were hiding, and at least at the lower concentration their vertical position was closer to the water surface than in tadpoles of the control treatment. Tadpoles also decreased their activity in the presence of dragonfly larvae, but did not hide more in response to either predator, nor did tadpoles avoid predators spatially. Further, exposure to the herbicide did not significantly influence behavioural responses to predation threat. Our study documents a definite influence of glyphosate-based herbicides on the behaviour of agile frog tadpoles and indicates that some of these changes are similar to those induced by dangerous predators. This may suggest that the underlying physiological mechanisms or the adaptive value of behavioural changes may similar. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Model description and evaluation of the mark-recapture survival model used to parameterize the 2012 status and threats analysis for the Florida manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Langtimm, Catherine A.; Kendall, William L.; Beck, Cathy A.; Kochman, Howard I.; Teague, Amy L.; Meigs-Friend, Gaia; Peñaloza, Claudia L.

    2016-11-30

    This report provides supporting details and evidence for the rationale, validity and efficacy of a new mark-recapture model, the Barker Robust Design, to estimate regional manatee survival rates used to parameterize several components of the 2012 version of the Manatee Core Biological Model (CBM) and Threats Analysis (TA).  The CBM and TA provide scientific analyses on population viability of the Florida manatee subspecies (Trichechus manatus latirostris) for U.S. Fish and Wildlife Service’s 5-year reviews of the status of the species as listed under the Endangered Species Act.  The model evaluation is presented in a standardized reporting framework, modified from the TRACE (TRAnsparent and Comprehensive model Evaluation) protocol first introduced for environmental threat analyses.  We identify this new protocol as TRACE-MANATEE SURVIVAL and this model evaluation specifically as TRACE-MANATEE SURVIVAL, Barker RD version 1. The longer-term objectives of the manatee standard reporting format are to (1) communicate to resource managers consistent evaluation information over sequential modeling efforts; (2) build understanding and expertise on the structure and function of the models; (3) document changes in model structures and applications in response to evolving management objectives, new biological and ecological knowledge, and new statistical advances; and (4) provide greater transparency for management and research review.

  12. BioSense/SR-BioSpectra demonstrations of wide area/early warning for bioaerosol threats: program description and early test and evaluation results

    Science.gov (United States)

    Simard, Jean-Robert; Buteau, Sylvie; Lahaie, Pierre; Mathieu, Pierre; Roy, Gilles; Nadeau, Denis; McFee, John; Ho, Jim; Rowsell, Susan; Ho, Nicolas; Babin, François; Cantin, Daniel; Healey, Dave; Robinson, Jennifer; Wood, Scott; Hsu, Jack

    2011-11-01

    Threats associated with bioaerosol weapons have been around for several decades and have been mostly associated with terrorist activities or rogue nations. Up to the turn of the millennium, defence concepts against such menaces relied mainly on point or in-situ detection technologies. Over the last 10 years, significant efforts have been deployed by multiple countries to supplement the limited spatial coverage of a network of one or more point bio-detectors using lidar technology. The addition of such technology makes it possible to detect within seconds suspect aerosol clouds over area of several tens of square kilometers and track their trajectories. These additional capabilities are paramount in directing presumptive ID missions, mapping hazardous areas, establishing efficient counter-measures and supporting subsequent forensic investigations. In order to develop such capabilities, Defence Research and Development Canada (DRDC) and the Chemical, Biological, Radiological-Nuclear, and Explosives Research and Technology Initiative (CRTI) have supported two major demonstrations based on spectrally resolved Laser Induced Fluorescence (LIF) lidar: BioSense, aimed at defence military missions in wide open spaces, and SR-BioSpectra, aimed at surveillance of enclosed or semienclosed wide spaces common to defence and public security missions. This article first reviews briefly the modeling behind these demonstration concepts. Second, the lidar-adapted and the benchtop bioaerosol LIF chambers (BSL1), developed to challenge the constructed detection systems and to accelerate the population of the library of spectral LIF properties of bioaerosols and interferents of interest, will be described. Next, the most recent test and evaluation (T&E) results obtained with SR-BioSpectra and BioSense are reported. Finally, a brief discussion stating the way ahead for a complete defence suite is provided.

  13. Development of a bead-based Luminex assay using lipopolysaccharide specific monoclonal antibodies to detect biological threats from Brucella species.

    Science.gov (United States)

    Silbereisen, Angelika; Tamborrini, Marco; Wittwer, Matthias; Schürch, Nadia; Pluschke, Gerd

    2015-10-05

    Brucella, a Gram-negative bacterium, is classified as a potential bioterrorism agent mainly due to the low dose needed to cause infection and the ability to transmit the bacteria via aerosols. Goats/sheep, cattle, pigs, dogs, sheep and rodents are infected by B. melitensis, B. abortus, B. suis, B. canis, B. ovis and B. neotomae, respectively, the six classical Brucella species. Most human cases are caused by B. melitensis and B. abortus. Our aim was to specifically detect Brucellae with 'smooth' lipopolysaccharide (LPS) using a highly sensitive monoclonal antibody (mAb) based immunological assay. To complement molecular detection systems for potential bioterror agents, as required by international biodefense regulations, sets of mAbs were generated by B cell hybridoma technology and used to develop immunological assays. The combination of mAbs most suitable for an antigen capture assay format was identified and an immunoassay using the Luminex xMAP technology was developed. MAbs specific for the LPS O-antigen of Brucella spp. were generated by immunising mice with inactivated B. melitensis or B. abortus cells. Most mAbs recognised both B. melitensis and B. abortus and antigen binding was not impeded by inactivation of the bacterial cells by γ irradiation, formalin or heat treatment, a step required to analyse the samples immunologically under biosafety level two conditions. The Luminex assay recognised all tested Brucella species with 'smooth' LPS with detection limits of 2×10(2) to 8×10(4) cells per mL, depending on the species tested. Milk samples spiked with Brucella spp. cells were identified successfully using the Luminex assay. In addition, the bead-based immunoassay was integrated into a multiplex format, allowing for simultaneous, rapid and specific detection of Brucella spp., Bacillus anthracis, Francisella tularensis and Yersinia pestis within a single sample. Overall, the robust Luminex assay should allow detection of Brucella spp. in both natural

  14. Investigating the genetic and environmental bases of biases in threat recognition and avoidance in children with anxiety problems

    Science.gov (United States)

    2012-01-01

    Background Adults with anxiety show biased categorization and avoidance of threats. Such biases may emerge through complex interplay between genetics and environments, occurring early in life. Research on threat biases in children has focuses on a restricted range of biases, with insufficient focus on genetic and environmental origins. Here, we explore differences between children with and without anxiety problems in under-studied areas of threat bias. We focused both on associations with anxious phenotype and the underlying gene-environmental correlates for two specific processes: the categorisation of threat faces and avoidance learning. Method Two-hundred and fifty 10-year old MZ and DZ twin pairs (500 individuals) completed tasks assessing accuracy in the labelling of threatening facial expressions and in the acquisition of avoidant responses to a card associated with a masked threatening face. To assess whether participants met criteria for an anxiety disorder, parents of twins completed a self-guided computerized version of the Development and Well-being Assessment (DAWBA). Comparison of MZ and DZ twin correlations using model-fitting were used to compute estimates of genetic, shared and non-shared environmental effects. Results Of the 500 twins assessed, 25 (5%) met diagnostic criteria for a current anxiety disorder. Children with anxiety disorders were more accurate in their ability to recognize disgust faces than those without anxiety disorders, but were commensurate on identifying other threatening face emotions (angry, fearful, sad). Children with anxiety disorders but also more strongly avoided selecting a conditioned stimulus than non-anxious children. While recognition of socially threatening faces was moderately heritable, avoidant responses were heavily influenced by the non-shared environment. Conclusion These data add to other findings on threat biases in anxious children. Specifically, we found biases in the labelling of some negative

  15. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  16. Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats

    Science.gov (United States)

    Richard Trans Mills; Forrest M Hoffman; Jitendra Kumar; William W. Hargrove

    2011-01-01

    We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The...

  17. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  18. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  19. MTA Computer Based Evaluation System.

    Science.gov (United States)

    Brenner, Lisa P.; And Others

    The MTA PLATO-based evaluation system, which has been implemented by a consortium of schools of medical technology, is designed to be general-purpose, modular, data-driven, and interactive, and to accommodate other national and local item banks. The system provides a comprehensive interactive item-banking system in conjunction with online student…

  20. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  1. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    ); the utilization of the international statement of threat by states, organizations, and sites in developing their own statement of threat, recognition of vulnerabilities, and creation of threat based design (concepts) for the implementation of security measures; an approach to the acquisition of resources to provide for the realization of internationally accepted security measures. (author)

  2. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  3. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  4. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  5. Insider threat data sharing

    OpenAIRE

    Sellen, Jeremey J.

    2016-01-01

    Approved for public release; distribution is unlimited Insider threat is a significant problem for both governmental and private organizations. Individuals can do immense harm with their trusted accesses. To combat this threat, organizations have created departments with trained analysts whose sole purpose is to deter, detect, and mitigate the insider threat. These analysts monitor employees and analyze activities to detect dangerous practices, whether witting or unwitting, and report thes...

  6. Development of a risk-ranking framework to evaluate potential high-threat microorganisms, toxins, and chemicals in food.

    Science.gov (United States)

    Newsome, R; Tran, N; Paoli, G M; Jaykus, L A; Tompkin, B; Miliotis, M; Ruthman, T; Hartnett, E; Busta, F F; Petersen, B; Shank, F; McEntire, J; Hotchkiss, J; Wagner, M; Schaffner, D W

    2009-03-01

    Through a cooperative agreement with the U.S. Food and Drug Administration, the Institute of Food Technologists developed a risk-ranking framework prototype to enable comparison of microbiological and chemical hazards in foods and to assist policy makers, risk managers, risk analysts, and others in determining the relative public health impact of specific hazard-food combinations. The prototype is a bottom-up system based on assumptions that incorporate expert opinion/insight with a number of exposure and hazard-related risk criteria variables, which are propagated forward with food intake data to produce risk-ranking determinations. The prototype produces a semi-quantitative comparative assessment of food safety hazards and the impacts of hazard control measures. For a specific hazard-food combination the prototype can produce a single metric: a final risk value expressed as annual pseudo-disability adjusted life years (pDALY). The pDALY is a harmonization of the very different dose-response relationships observed for chemicals and microbes. The prototype was developed on 2 platforms, a web-based user interface and an Analytica(R) model (Lumina Decision Systems, Los Gatos, Calif., U.S.A.). Comprising visual basic language, the web-based platform facilitates data input and allows use concurrently from multiple locations. The Analytica model facilitates visualization of the logic flow, interrelationship of input and output variables, and calculations/algorithms comprising the prototype. A variety of sortable risk-ranking reports and summary information can be generated for hazard-food pairs, showing hazard and dose-response assumptions and data, per capita consumption by population group, and annual p-DALY.

  7. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  8. The Threat of Uncertainty: Why Using Traditional Approaches for Evaluating Spacecraft Reliability are Insufficient for Future Human Mars Missions

    Science.gov (United States)

    Stromgren, Chel; Goodliff, Kandyce; Cirillo, William; Owens, Andrew

    2016-01-01

    Through the Evolvable Mars Campaign (EMC) study, the National Aeronautics and Space Administration (NASA) continues to evaluate potential approaches for sending humans beyond low Earth orbit (LEO). A key aspect of these missions is the strategy that is employed to maintain and repair the spacecraft systems, ensuring that they continue to function and support the crew. Long duration missions beyond LEO present unique and severe maintainability challenges due to a variety of factors, including: limited to no opportunities for resupply, the distance from Earth, mass and volume constraints of spacecraft, high sensitivity of transportation element designs to variation in mass, the lack of abort opportunities to Earth, limited hardware heritage information, and the operation of human-rated systems in a radiation environment with little to no experience. The current approach to maintainability, as implemented on ISS, which includes a large number of spares pre-positioned on ISS, a larger supply sitting on Earth waiting to be flown to ISS, and an on demand delivery of logistics from Earth, is not feasible for future deep space human missions. For missions beyond LEO, significant modifications to the maintainability approach will be required.Through the EMC evaluations, several key findings related to the reliability and safety of the Mars spacecraft have been made. The nature of random and induced failures presents significant issues for deep space missions. Because spare parts cannot be flown as needed for Mars missions, all required spares must be flown with the mission or pre-positioned. These spares must cover all anticipated failure modes and provide a level of overall reliability and safety that is satisfactory for human missions. This will require a large amount of mass and volume be dedicated to storage and transport of spares for the mission. Further, there is, and will continue to be, a significant amount of uncertainty regarding failure rates for spacecraft

  9. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  10. Cortisol responses to psychosocial stress predict depression trajectories: social-evaluative threat and prior depressive episodes as moderators.

    Science.gov (United States)

    Morris, Matthew C; Rao, Uma; Garber, Judy

    2012-12-20

    Alterations of hypothalamic-pituitary-adrenal (HPA) function are well-established in adults with current depression. HPA alterations may persist into remission and confer increased risk for recurrence. A modified version of the Trier Social Stress Test (TSST) was administered at baseline to 32 young adults with remitted major depressive disorder and 36 never-depressed controls. Participants were randomly assigned to either a 'high-stress' condition involving social evaluation or a 'low-stress' control condition. Cortisol concentrations were measured in saliva samples throughout the TSST. Participants were assessed again after 6 months for the occurrence of stressful life events and depressive symptoms/disorders during the follow-up period. Participants who exhibited enhanced cortisol reactivity in the low-stress condition showed increases in depressive symptoms over follow-up, after controlling for stressful life events during the follow-up period. Anticipatory stress cortisol and cortisol reactivity each interacted with history of depressive episodes to predict depression trajectories. The single TSST administration limits conclusions about whether alterations of cortisol reactivity represent trait-like vulnerability factors or consequences ("scars') of past depression. These results extend previous findings on stress sensitivity in depression and suggest that altered HPA function during remission could reflect an endophenotype for vulnerability to depression recurrence. Findings support interactive models of risk for depression recurrence implicating HPA function, depression history, and sensitivity to minor stressors. Results may have implications for interventions that match treatment approaches to profiles of HPA function. Copyright © 2012 Elsevier B.V. All rights reserved.

  11. Fuzzy Similarity Measures Approach in Benchmarking Taxonomies of Threats against SMEs in Developing Economies

    DEFF Research Database (Denmark)

    Yeboah-Boateng, Ezer Osei

    2013-01-01

    in developing economies were strategically interviewed for their expert opinions on various business and security metrics. The study established that natural disasters, which are perennial in most developing economies, are the most critical cyber-threat agent, whilst social engineering is the least critical......There are various threats that militate against SMEs in developing economies. However, most SMEs fall on the conservative “TV News Effect” of most-publicized cyber-threats or incidences, with disproportionate mitigation measures. This paper endeavors to establish a taxonomy of threat agents to fill...... in the void. Various fuzzy similarity measures based on multi-attribute decision-making techniques have been employed in the evaluation. The taxonomy offers a panoramic view of cyber-threats in assessing mission-critical assets, and serves as a benchmark for initiating appropriate mitigation strategies. SMEs...

  12. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  13. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  14. Threats and vulnerabilities

    Science.gov (United States)

    Ahonen, Pasi; Alahuhta, Petteri; Daskala, Barbara; Delaitre, Sabine; Hert, Paul De; Lindner, Ralf; Maghiros, Ioannis; Moscibroda, Anna; Schreurs, Wim; Verlinden, Michiel

    In this chapter, we present a review of threats and vulnerabilities that could afflict society and individuals in the AmI world in the context of the key policy issues of privacy, identity, trust, security and digital divide. We define a threat as the potential for one or more unwanted consequences caused by a circumstance, capability, action or event that could be harmful to a system or person. Threats can be caused naturally, accidentally or intentionally. In essence, a threat is a ubiquitous phenomenon. A vulnerability is a flaw or weakness in a system's design, its implementation, operation or management that could be exploited to violate the system and, consequently, cause a threat. Vulnerabilities may have different dimensions: technical, functional or behavioural.1

  15. Training organizational supervisors to detect and prevent cyber insider threats: two approaches

    Directory of Open Access Journals (Sweden)

    Dee H. Andrews

    2013-05-01

    Full Text Available Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instructional approaches for this training challenge – optimal path modelling and a competency-based approach. The paper concludes by discussing challenges of evaluating training for seldom occurring real world phenomena, like detecting a cyber-insider threat.

  16. Assessing the Threat of Erosion to Nature-Based Interventions for Stormwater Management and Flood Control in the Greater Accra Metropolitan Area, Ghana

    Directory of Open Access Journals (Sweden)

    Joel Bernard Kofi Asiedu

    2018-01-01

    Full Text Available Perennial floodinghas become a major feature in urban areas in developing economies generating research interest towards finding alternative approaches to stormwater management which could complement the existing systems and help address the challenge of flooding. One of such alternative approaches is nature-based stormwater management and flood control, the implementation of which could be affected by soil erosion. This paper, as part of a wider research, was developed to determine the extent of the threat of soil erosion to stormwater management in an urban area on the example of Greater Accra Metropolitan Area, Accra Ghana as the focus of the research. Landsat 8 images (2014 were used in the research to prepare the Landcover maps. Daily rainfall data from 6 raingauge stations from 1972 to 2014 were utilized to prepare the rainfall erosivity factor maps, whereas DEM was used to prepare the slope and slope length (SL factor maps. The land cover map with an overall accuracy of 73.6 and Kappa 0.7122 was combined with literature sources to prepare the vegetative cover factor map, and conservation practice factor map. A soil series map, prepared and updated with literature sources and data from the Harmonized World Soil Database on physical parameters, was used to calculate the soil erodibility factor (K factor for each soil series. These were integrated into RUSLE model as 30 m raster maps to generate a soil loss map at tons/ha/yr. The results produced rainfall erosivity index values based on the modified Fournier index ranging between 0.058 and 23.197 which is classified as low. Low soil erodibility factor (K ranging between 2.9×10 –5 and 8.5×10 –2 (t ha/MJ mm indicated low susceptibility to erosion, SL factor value showing areas of low to almost flatrelief with a few isolated areas of moderate slope length were generated. A soil loss of 69,5918 tons/ha/yr classified the soils as having high potential soil loss. The results showed a very

  17. Perception of the Threat of Terrorism.

    Science.gov (United States)

    Cohen-Louck, Keren

    2016-04-28

    In light of the tense and ongoing security situation in Israel, one important issue that needs to be analyzed and understood is the perception of terrorism threats. Most studies focused mainly on the psychological implications of terrorist acts; this study examines the complexity of the manner in which the individual perceives the threat of terrorism. In all, 40 Israeli adults (22 women and 18 men) were interviewed using semistructured in-depth interviews. Qualitative analysis indicates that the components of the perception of terrorism that construct the evaluation and subjective perception of the participants are as follows: (a) perception of control, which is a feeling of loss of control and helplessness due to uncertainty, inability to predict threats, and the vagueness of the threat; (b) perception of vulnerability to the threat, such as a feeling of vulnerability to and potential victimization by terrorism; and (c) perception of fear of terrorism that includes responses of fear, anxiety, feeling of danger, and emotional distress. In addition, gender differences were found in the analysis. The findings of this study help gain a better understanding as to how people perceive the threat of terrorism. The findings also enable an understanding of the complexity of living under ongoing terrorism threats and may assist in understanding how citizens cope with and adjust to this threat. © The Author(s) 2016.

  18. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    Science.gov (United States)

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of

  19. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting.

    Science.gov (United States)

    Devriendt, Els; Wellens, Nathalie I H; Flamaing, Johan; Declercq, Anja; Moons, Philip; Boonen, Steven; Milisen, Koen

    2013-09-05

    The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons' medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients' data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. The primary strengths of the BelRAI-system were a structured overview of the patients' condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of care. An actual shortage of

  20. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  1. Chile: Its Conventional Threats

    Science.gov (United States)

    2005-03-18

    tdf.htm>. Internet. Accessed 30 October 2004. 20 21 BIBLIOGRAPHY Barros, Van Buren Mario. Historia Diplomatica de Chile . Santiago: Editorial Andres...USAWC STRATEGY RESEARCH PROJECT CHILE : ITS CONVENTIONAL THREATS by Lieutenant Colonel Claudio Toledo Chilean Army Dr. Gabriel Marcella Project...3. DATES COVERED - 4. TITLE AND SUBTITLE Chile Its Conventional Threats 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  2. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  3. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  4. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Science.gov (United States)

    2010-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917... identification in its integrity program? (a) Threat identification. An operator must identify and evaluate all... internal corrosion, external corrosion, and stress corrosion cracking; (2) Static or resident threats, such...

  5. Evaluation and Prediction of Water Resources Based on AHP

    Science.gov (United States)

    Li, Shuai; Sun, Anqi

    2017-01-01

    Nowadays, the shortage of water resources is a threat to us. In order to solve the problem of water resources restricted by varieties of factors, this paper establishes a water resources evaluation index model (WREI), which adopts the fuzzy comprehensive evaluation (FCE) based on analytic hierarchy process (AHP) algorithm. After considering influencing factors of water resources, we ignore secondary factors and then hierarchical approach the main factors according to the class, set up a three-layer structure. The top floor is for WREI. Using analytic hierarchy process (AHP) to determine weight first, and then use fuzzy judgment to judge target, so the comprehensive use of the two algorithms reduce the subjective influence of AHP and overcome the disadvantages of multi-level evaluation. To prove the model, we choose India as a target region. On the basis of water resources evaluation index model, we use Matlab and combine grey prediction with linear prediction to discuss the ability to provide clean water in India and the trend of India’s water resources changing in the next 15 years. The model with theoretical support and practical significance will be of great help to provide reliable data support and reference for us to get plans to improve water quality.

  6. Guidelines for reporting evaluations based on observational methodology.

    Science.gov (United States)

    Portell, Mariona; Anguera, M Teresa; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana

    2015-01-01

    Observational methodology is one of the most suitable research designs for evaluating fidelity of implementation, especially in complex interventions. However, the conduct and reporting of observational studies is hampered by the absence of specific guidelines, such as those that exist for other evaluation designs. This lack of specific guidance poses a threat to the quality and transparency of these studies and also constitutes a considerable publication hurdle. The aim of this study thus was to draw up a set of proposed guidelines for reporting evaluations based on observational methodology. The guidelines were developed by triangulating three sources of information: observational studies performed in different fields by experts in observational methodology, reporting guidelines for general studies and studies with similar designs to observational studies, and proposals from experts in observational methodology at scientific meetings. We produced a list of guidelines grouped into three domains: intervention and expected outcomes, methods, and results. The result is a useful, carefully crafted set of simple guidelines for conducting and reporting observational studies in the field of program evaluation.

  7. They Might be Giants: Small-Scale RPAs as a Threat to Air Base Defense and Air Power Projection

    Science.gov (United States)

    2014-06-01

    in 2013. His 15-year career as an active duty maintenance officer provided a variety of assignments and duties, including multiple deployments...seen ink -blot disposition of forces means a dispersal of ground support may not directly support the air base. Given that the air base remains...comes only with the first bombardments, then the enemy quickly disperses and seeks concealment or camouflage . At this point, subsequent attacks are

  8. Combatting Insider Threats

    Science.gov (United States)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  9. 49 CFR 1515.5 - Appeal of Initial Determination of Threat Assessment based on criminal conviction, immigration...

    Science.gov (United States)

    2010-10-01

    ... Assessment based on criminal conviction, immigration status, or mental capacity. 1515.5 Section 1515.5... criminal conviction, immigration status, or mental capacity. (a) Scope. This section applies to applicants... the immigration status requirements as described in 49 CFR 1572.105. (3) TSA has determined that an...

  10. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  11. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  12. A novel two-stage evaluation system based on a Group-G1 approach to identify appropriate emergency treatment technology schemes in sudden water source pollution accidents.

    Science.gov (United States)

    Qu, Jianhua; Meng, Xianlin; Hu, Qi; You, Hong

    2016-02-01

    Sudden water source pollution resulting from hazardous materials has gradually become a major threat to the safety of the urban water supply. Over the past years, various treatment techniques have been proposed for the removal of the pollutants to minimize the threat of such pollutions. Given the diversity of techniques available, the current challenge is how to scientifically select the most desirable alternative for different threat degrees. Therefore, a novel two-stage evaluation system was developed based on a circulation-correction improved Group-G1 method to determine the optimal emergency treatment technology scheme, considering the areas of contaminant elimination in both drinking water sources and water treatment plants. In stage 1, the threat degree caused by the pollution was predicted using a threat evaluation index system and was subdivided into four levels. Then, a technique evaluation index system containing four sets of criteria weights was constructed in stage 2 to obtain the optimum treatment schemes corresponding to the different threat levels. The applicability of the established evaluation system was tested by a practical cadmium-contaminated accident that occurred in 2012. The results show this system capable of facilitating scientific analysis in the evaluation and selection of emergency treatment technologies for drinking water source security.

  13. [Motivations and barriers of chilean children; threats or opportunities for the implementation of 2013 food based dietary guidelines].

    Science.gov (United States)

    Olivares, Sonia; Zacarías, Isabel; González, Carmen Gloria

    2014-08-01

    Implementation of the updated Food Based Dietary Guidelines (FBDG) for the Chilean population requires the design of innovative strategies and effective. To determine motivations and barriers for children and mothers of preschool-age children to follow new FBDG messages, aiming to identify challenges and opportunities for designing effective communication and implementation strategies. A qualitative study based on 12 focus groups of 9 to 13 age children and 6 focus groups of mothers of preschool-age children, living in the north, central and south regions of the country, to analyze their reaction to each one of the 2013 FBDG messages. Answers of children and mothers did not show differences by gender (in the case of the children) or region of the country. Results show the most frequent and representative comments regarding each message. Challenges to reducing the consumption of foods high in energy, fat, sugar and salt include advertisements and plentiful supply and low prices for these types of foods, both in the school environment and on the street. Opportunities identified included the advertisement of fruits, vegetables and dairy products to promote their consumption, as well as the coming implementation of Law 20.606, which is expected to be an effective way to support this initiative. The results of this study show that the design of strategies based on values, desires and needs of different groups will contribute to optimizing the implementation of the 2013 Chilean FBDG. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  14. Characterizing hospital workers' willingness to report to duty in an influenza pandemic through threat- and efficacy-based assessment

    Directory of Open Access Journals (Sweden)

    Catlett Christina L

    2010-07-01

    Full Text Available Abstract Background Hospital-based providers' willingness to report to work during an influenza pandemic is a critical yet under-studied phenomenon. Witte's Extended Parallel Process Model (EPPM has been shown to be useful for understanding adaptive behavior of public health workers to an unknown risk, and thus offers a framework for examining scenario-specific willingness to respond among hospital staff. Methods We administered an anonymous online EPPM-based survey about attitudes/beliefs toward emergency response, to all 18,612 employees of the Johns Hopkins Hospital from January to March 2009. Surveys were completed by 3426 employees (18.4%, approximately one third of whom were health professionals. Results Demographic and professional distribution of respondents was similar to all hospital staff. Overall, more than one-in-four (28% hospital workers indicated they were not willing to respond to an influenza pandemic scenario if asked but not required to do so. Only an additional 10% were willing if required. One-third (32% of participants reported they would be unwilling to respond in the event of a more severe pandemic influenza scenario. These response rates were consistent across different departments, and were one-third lower among nurses as compared with physicians. Respondents who were hesitant to agree to work additional hours when required were 17 times less likely to respond during a pandemic if asked. Sixty percent of the workers perceived their peers as likely to report to work in such an emergency, and were ten times more likely than others to do so themselves. Hospital employees with a perception of high efficacy had 5.8 times higher declared rates of willingness to respond to an influenza pandemic. Conclusions Significant gaps exist in hospital workers' willingness to respond, and the EPPM is a useful framework to assess these gaps. Several attitudinal indicators can help to identify hospital employees unlikely to respond. The

  15. Revenue-based cost assignment: a potent but hidden threat to the survival of the multispecialty medical practice.

    Science.gov (United States)

    Cooper, Robin; Kramer, Theresa R

    2010-03-01

    To demonstrate detrimental effects of revenue-based cost assignment (RBCA) in clinical practice and to compare that system with activity-based costing (ABC). Four cost-allocation methods including RBCA were applied to a comprehensive ophthalmology practice using typical accounting methods. Data were obtained by a survey of practitioners or practices and/or extracted from decision support and practice management systems. Inaccuracies and distortions in reported costs were enumerated. Accounting scenario analysis was used to predict resultant provider and managerial decisions. A sampling survey was used to analyze other specialties. ABC was applied to the practice. RBCA causes procedures with higher profitability to appear less profitable and those with lower profitability to appear more profitable. The distortion in reported costs, in medical settings, is often sufficient to incentivize providers with higher profitability to exit a practice and those with lower profitability to remain in it. The departure of providers causes the residual practice profits to decline. These detrimental effects occur in many subspecialties, which suggests a national effect on health care. ABC allocation can reduce cost distortions and eliminate detrimental effects. RBCA leads to fragmentation of health care and a reduction in the profitability of multispecialty practices. Its use may slow the updating of reimbursement and help eliminate low-profitability specialties.

  16. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  17. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  18. Clinical evaluation of the BioFire FilmArray® BioThreat-E test for the diagnosis of Ebola Virus Disease in Guinea.

    Science.gov (United States)

    Gay-Andrieu, Françoise; Magassouba, N'Fally; Picot, Valentina; Phillips, Cynthia L; Peyrefitte, Christophe N; Dacosta, Brigitte; Doré, Ahmadou; Kourouma, Fode; Ligeon-Ligeonnet, Véronique; Gauby, Corentin; Longuet, Christophe; Scullion, Matt; Faye, Ousmane; Machuron, Jean Louis; Miller, Mark

    2017-07-01

    The recent West Africa Ebola outbreak highlighted the need to provide access to rapid, safe and reliable Ebola Virus Disease diagnostics. The objective of this field study was to assess the clinical performance of the FilmArray ® BioThreat-E test for the detection of Ebola Zaïre virus in whole blood in symptomatic patients suspected of Ebola Virus Disease in Conakry (Guinea) from March to July 2015. The BioThreat-E test was compared to the two RT-PCRs, using serum, implemented at Donka Hospital in the emergency context: an in-house developed quantitative one-step RT-PCR adapted from the Weidmann technique, and the RealStar ® Filovirus RT-PCR Kit 1.0 (Altona-Diagnostics). We also assessed the performance of this assay in noninvasive specimens (urine and saliva) to detect infected patients. Of 135 patients enrolled and eligible for performance assessment on whole blood, the sensitivity was 95.7% [95% CI: 85.5-99.5] and specificity 100% [95% CI: 95.9-100]. Of the 37 symptomatic infected patients able to provide saliva and/or urine samples, 34 of the 35 saliva samples and all 3 of the urine samples were positive with the BioThreat-E test. This study showed that the FilmArray BioThreat-E test performs comparably to conventional molecular tests under field conditions, providing results and interpretation in approximately 1h. Due to its operational characteristics, it can be easily deployed in the field during an epidemic and could also be a useful tool for post-outbreak surveillance. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Rainwater Harvesting-based Safe Water Access in Diarrhea-endemic Coastal Communities of Bangladesh under Threats of Climate Change

    Science.gov (United States)

    Akanda, A. S.; Redwan, A. M.; Ali, M. A.; Alam, M.; Jutla, A.; Colwell, R. R.

    2014-12-01

    feasibility and optimum scales and designs of rainwater-harvesting schemes in areas under changing precipitation patterns and coastal sea-level rise. We present preliminary results based on changing rainfall patterns, water budget analysis, and rainwater harvesting potential.

  20. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  1. Building Assessment Survey and Evaluation Data (BASE)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Building Assessment Survey and Evaluation (BASE) study was a five year study to characterize determinants of indoor air quality and occupant perceptions in...

  2. Performance-Based Evaluation and School Librarians

    Science.gov (United States)

    Church, Audrey P.

    2015-01-01

    Evaluation of instructional personnel is standard procedure in our Pre-K-12 public schools, and its purpose is to document educator effectiveness. With Race to the Top and No Child Left Behind waivers, states are required to implement performance-based evaluations that demonstrate student academic progress. This three-year study describes the…

  3. Cyber Intelligence Threat Prioritization

    Science.gov (United States)

    2014-10-01

    actors resources. Money People Tools Training Motive Why do threat actors attack? Determining an actor’s motive provides insight into the...possible direction of their behavior. and determines their interest in targeting the organization. t Intrinsic (personally rewarding) Extrinsic (receive...Prioritization October 1, 2014 © 2014 Carnegie Mellon University Relevance From leadership to rank-and-file employees . the Internet offers a communication

  4. Threatened freshwater and terrestrial molluscs (Mollusca, Gastropoda et Bivalvia of Santa Catarina State, Southern Brazil: check list and evaluation of regional threats

    Directory of Open Access Journals (Sweden)

    2011-06-01

    Full Text Available A total of nineteen continental native mollusc species are confirmed for the Santa Catarina State (SC(organized in ten Genera and seven Families, one aquatic Prosobranchia/Caenogastropoda (Ampullariidae,six Pulmonata terrestrial gastropods (one Ellobiidae, three Megalobulimidae and two micro-snails –Charopidae and Streptaxidae and twelve freshwater mussels (eight Mycetopodidae and four Hyriidae. Thesespecies are designated by the International Union for Conservation of the Nature – IUCN as follows: seven as"Vulnerable", six "In Danger" and six “Without Category Established”. The general regional threats that thesespecies are subjected to are briefly analyzed.

  5. performance-based approach to design and evaluation of nuclear security systems for Brazilian nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Tavares, Renato L. A.; Filho, Josélio S. M., E-mail: renato.tavares@cnen.gov.br, E-mail: joselio@cnen.gov.br [Comissão Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Diretoria de Radioproteção e Segurança Nuclear. Divisão de Normas e Segurança Física; Fontes, Gladson S.; Fiel, J.C.B., E-mail: gsfontes@hotmail.com, E-mail: fiel@ime.eb.br [Instituto Militar de Engenharia (SE-7/IME), Rio de Janeiro, RJ (Brazil). Seção de Engenharia Nuclear

    2017-07-01

    This study presents an application of a performance-based approach to definition of requirements, design and evaluation of physical protection systems for nuclear facilities. Such approach considers a probabilistic analysis of the threat, equipment, systems and response forces used to prevent, dissuade and detain malicious acts against the integrity of facilities and the nuclear materials inside them. Nowadays, in the context of Brazilian nuclear facilities licensing, a mostly prescriptive approach is adopted, which despite having advantages such as simplified inspections and homogeneous regulatory requisites amid different fuel cycle facility types, does not consider evolution, dynamism and capacities of external or internal threats to facilities and to Brazilian Nuclear Program itself, neither provides metrics to evaluate system performance facing such threats. In order to preserve actual plans and systems confidentiality, a facility hypothetical model is created, including a research reactor and a waste storage facility. It is expected that the methodology and results obtained in this study serve in the future as a basis to Brazilian nuclear operators, in elaboration process of their Physical Protection Plans, which must comply with future regulation CNEN-NN 2.01, a revision of CNEN-NE 2.01, once that regulation will include performance requisites. (author)

  6. Financial Derivatives (Based on Two Supports Evaluation

    Directory of Open Access Journals (Sweden)

    Tiberiu Socaciu

    2016-07-01

    Full Text Available In this paper we build a PDE like Black-Scholes equation in hypothesis of a financial derivative that is dependent on two supports (usual is dependent only on one support, like amoption based on gold, when national currency has a great float.Keywords: Financial derivatives, derivatives evaluation, derivatives based on two supports, extended Itō like lemma.

  7. DNA barcodes and species distribution models evaluate threats of global climate changes to genetic diversity: a case study from Nanorana parkeri (Anura: Dicroglossidae).

    Science.gov (United States)

    Zhou, Wei-wei; Zhang, Bao-lin; Chen, Hong-man; Jin, Jie-qiong; Yang, Jun-xiao; Wang, Yun-yu; Jiang, Ke; Murphy, Robert W; Zhang, Ya-ping; Che, Jing

    2014-01-01

    Anthropogenic global climate changes are one of the greatest threats to biodiversity. Distribution modeling can predict the effects of climate changes and potentially their effects on genetic diversity. DNA barcoding quickly identifies patterns of genetic diversity. As a case study, we use DNA barcodes and distribution models to predict threats under climate changes in the frog Nanorana parkeri, which is endemic to the Qinghai-Tibetan Plateau. Barcoding identifies major lineages W and E. Lineage W has a single origin in a refugium and Lineage E derives from three refugia. All refugia locate in river valleys and each greatly contributes to the current level of intraspecific genetic diversity. Species distribution models suggest that global climate changes will greatly influence N. parkeri, especially in the level of genetic diversity, because two former refugia will fail to provide suitable habitat. Our pipeline provides a novel application of DNA barcoding and has important implications for the conservation of biodiversity in southern areas of the Qinghai-Tibetan Plateau.

  8. DNA barcodes and species distribution models evaluate threats of global climate changes to genetic diversity: a case study from Nanorana parkeri (Anura: Dicroglossidae.

    Directory of Open Access Journals (Sweden)

    Wei-wei Zhou

    Full Text Available Anthropogenic global climate changes are one of the greatest threats to biodiversity. Distribution modeling can predict the effects of climate changes and potentially their effects on genetic diversity. DNA barcoding quickly identifies patterns of genetic diversity. As a case study, we use DNA barcodes and distribution models to predict threats under climate changes in the frog Nanorana parkeri, which is endemic to the Qinghai-Tibetan Plateau. Barcoding identifies major lineages W and E. Lineage W has a single origin in a refugium and Lineage E derives from three refugia. All refugia locate in river valleys and each greatly contributes to the current level of intraspecific genetic diversity. Species distribution models suggest that global climate changes will greatly influence N. parkeri, especially in the level of genetic diversity, because two former refugia will fail to provide suitable habitat. Our pipeline provides a novel application of DNA barcoding and has important implications for the conservation of biodiversity in southern areas of the Qinghai-Tibetan Plateau.

  9. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    International Nuclear Information System (INIS)

    Koh, Moonsung; Jung, Myungtak

    2015-01-01

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities

  10. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  11. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    In 1945 the United Nations was founded with one major goal in mind, and I quote, 'to save succeeding generations from the scourge of war.' The founders noted that twice in the 20th Century major wars had brought 'untold sorrow to mankind.' Since its founding, 191 nations have joined the UN. We have no other place where all nations can work together for peace, a place where we can use verbal conflict rather than armed conflict to solve problems. And often, the UN, with US support, has provided armed force to help ensure the peace. The entire planet now faces global challenges including ensuring bio-diversity and ending the destruction of thousands of species; reversing the depletion of fishing stocks; controlling ocean dumping; preventing ozone depletion; halting global warming; controlling and eliminating terrorism and weapons of mass destruction; fighting pandemic diseases; ending the tragedy of crushing poverty and lack of clean drinking water; and addressing crises arising from failed States. No nation or even a small group of nations can succeed in addressing these issues alone. The United Nations is based on political insights that have led to successful governance principles and enhanced the wealth of nations. These values include market freedoms, religious liberty, an independent judiciary, government transparency and accountability, democracy, and a high level of respect for civil liberties and human rights. They have evolved into nearly universal goals and norms. The countries that have adhered to these principles are the most secure and healthy. The United Nations is guided by such countries, and simultaneously provides the only viable forum for the expression of the aspirations of the poor and the weak. The establishment of international norms of conduct is where idealism informs realism. We are called to nothing less than moral leadership. When moral leadership is coupled with power, it galvanizes the world. Moral leadership requires living up to one

  12. Terrorism: Global Threat Forecast

    Directory of Open Access Journals (Sweden)

    Rohan Gunaratna

    2017-01-01

    Full Text Available Three significant developments will characterize the global threat landscape in 2017. First, it is likely that the so-called Islamic State (IS will transform itself from a caliphate-building entity into a global terrorist movement in a similar manner as Al Qaeda (AQ. Second, the death of either the IS leader Abu Bakr al Baghdadi or AQ leader Ayman al Zawahiri, may lead to collaboration or possible unification of the most powerful terrorist groups. IS, AQ and their associates will compensate for their losses in the physical space by expanding further into cyber space

  13. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  14. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  15. Conventional and New Ways of Governing Forest Threats: A Study of Stakeholder Coherence in Sweden

    Science.gov (United States)

    Eriksson, Louise

    2018-01-01

    Based on a framework for analyzing stakeholder coherence horizontally and vertically, the present study examined the governance of forest threats in Sweden. Opinions of forest risk governance in stakeholder groups with and without a connection to private forestry were compared ( n = 2496) and the opinions were analyzed in relation to current governance practices. More specifically, forest threat appraisals, trust in the Swedish Forest Agency (SFA), and the acceptability of forest risk policy measures directed at private forest owners were assessed. Results revealed an overall coherence between different stakeholders in this context. However, the groups differed in, for example, the acceptability of the hypothetical regulative measure aiming to reduce damages threatening the forest long-term (e.g., climate change). Furthermore, an extensive use of advice for a fee may challenge particularly the internal, but also the external, legitimacy of forest risk governance. The forest owner stakeholder group showed lower threat appraisals when evaluating threat to one's own forest rather than to the Swedish forest, except regarding browsing by animals. Regulations were not disapproved of in any of the stakeholder groups, although the forest owner group generally displayed higher acceptability of encouraging measures compared to the general public. Trust in the SFA was furthermore confirmed as an important driver of policy acceptability, and higher threat appraisals of novel threats, such as climate change and fire, resulted in a higher acceptability of measures less central or new in this context. The value of analyzing stakeholder coherence for natural resource management and governance is discussed.

  16. Mobile based optical form evaluation system

    Directory of Open Access Journals (Sweden)

    Asım Sinan YÜKSEL

    2016-05-01

    Full Text Available Optical forms that contain multiple-choice answers are widely used both for electing students and evaluating student achievements in education systems in our country and worldwide. Optical forms are evaluated by employing optical mark recognition techniques through optical readers. High cost of these machines, limited access to them, long waiting time for evaluation results make the process hard for educationists working in cities or countries. In this study, a mobile application was developed for the educationists who own mobile phones or tablets for the purpose of evaluating students' answer sheets quickly and independent of location and optical readers. Optical form recognition, reading and evaluation processes are done on the image of student's answer sheet that is taken with the mobile phone or tablet of educationist. The Android based mobile application that we developed has a user-friendly interface, high success rate and is the first of our knowledge application that operates on mobile platforms in this field.

  17. Maintenance evaluation using risk based criteria

    International Nuclear Information System (INIS)

    Torres Valle, A.

    1996-01-01

    The maintenance evaluation is currently performed by using economic and, in some case, technical equipment failure criteria, however this is done to a specific equipment level. In general, when statistics are used the analysis for maintenance optimization are made isolated and whit a post mortem character; The integration provided by mean of Probabilistic Safety assessment (PSA) together with the possibilities of its applications, allow for evaluation of maintenance on the basis of broader scope criteria in regard to those traditionally used. The evaluate maintenance using risk based criteria, is necessary to follow a dynamic and systematic approach, in studying the maintenance strategy, to allow for updating the initial probabilistic models, for including operational changes that often take place during operation of complex facilities. This paper proposes a dynamic evaluation system of maintenance task. The system is illustrated by means of a practical example

  18. Evaluating Hospital-Based Surveillance for Outbreak Detection in Bangladesh: Analysis of Healthcare Utilization Data.

    Directory of Open Access Journals (Sweden)

    Birgit Nikolay

    2017-01-01

    Full Text Available The International Health Regulations outline core requirements to ensure the detection of public health threats of international concern. Assessing the capacity of surveillance systems to detect these threats is crucial for evaluating a country's ability to meet these requirements.We propose a framework to evaluate the sensitivity and representativeness of hospital-based surveillance and apply it to severe neurological infectious diseases and fatal respiratory infectious diseases in Bangladesh. We identified cases in selected communities within surveillance hospital catchment areas using key informant and house-to-house surveys and ascertained where cases had sought care. We estimated the probability of surveillance detecting different sized outbreaks by distance from the surveillance hospital and compared characteristics of cases identified in the community and cases attending surveillance hospitals. We estimated that surveillance detected 26% (95% CI 18%-33% of severe neurological disease cases and 18% (95% CI 16%-21% of fatal respiratory disease cases residing at 10 km distance from a surveillance hospital. Detection probabilities decreased markedly with distance. The probability of detecting small outbreaks (three cases dropped below 50% at distances greater than 26 km for severe neurological disease and at distances greater than 7 km for fatal respiratory disease. Characteristics of cases attending surveillance hospitals were largely representative of all cases; however, neurological disease cases aged <5 y or from the lowest socioeconomic group and fatal respiratory disease cases aged ≥60 y were underrepresented. Our estimates of outbreak detection rely on suspected cases that attend a surveillance hospital receiving laboratory confirmation of disease and being reported to the surveillance system. The extent to which this occurs will depend on disease characteristics (e.g., severity and symptom specificity and surveillance resources

  19. Fuzzy logic based sensor performance evaluation of vehicle mounted metal detector systems

    Science.gov (United States)

    Abeynayake, Canicious; Tran, Minh D.

    2015-05-01

    Vehicle Mounted Metal Detector (VMMD) systems are widely used for detection of threat objects in humanitarian demining and military route clearance scenarios. Due to the diverse nature of such operational conditions, operational use of VMMD without a proper understanding of its capability boundaries may lead to heavy causalities. Multi-criteria fitness evaluations are crucial for determining capability boundaries of any sensor-based demining equipment. Evaluation of sensor based military equipment is a multi-disciplinary topic combining the efforts of researchers, operators, managers and commanders having different professional backgrounds and knowledge profiles. Information acquired through field tests usually involves uncertainty, vagueness and imprecision due to variations in test and evaluation conditions during a single test or series of tests. This report presents a fuzzy logic based methodology for experimental data analysis and performance evaluation of VMMD. This data evaluation methodology has been developed to evaluate sensor performance by consolidating expert knowledge with experimental data. A case study is presented by implementing the proposed data analysis framework in a VMMD evaluation scenario. The results of this analysis confirm accuracy, practicability and reliability of the fuzzy logic based sensor performance evaluation framework.

  20. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  1. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  2. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  3. Gauging U.S. Emergency Medical Services workers' willingness to respond to pandemic influenza using a threat- and efficacy-based assessment framework.

    Directory of Open Access Journals (Sweden)

    Daniel J Barnett

    2010-03-01

    Full Text Available Emergency Medical Services workers' willingness to report to duty in an influenza pandemic is essential to healthcare system surge amidst a global threat. Application of Witte's Extended Parallel Process Model (EPPM has shown utility for revealing influences of perceived threat and efficacy on non-EMS public health providers' willingness to respond in an influenza pandemic. We thus propose using an EPPM-informed assessment of EMS workers' perspectives toward fulfilling their influenza pandemic response roles.We administered an EPPM-informed snapshot survey about attitudes and beliefs toward pandemic influenza response, to a nationally representative, stratified random sample of 1,537 U.S. EMS workers from May-June 2009 (overall response rate: 49%. Of the 586 respondents who met inclusion criteria (currently active EMS providers in primarily EMS response roles, 12% indicated they would not voluntarily report to duty in a pandemic influenza emergency if asked, 7% if required. A majority (52% indicated their unwillingness to report to work if risk of disease transmission to family existed. Confidence in personal safety at work (OR = 3.3 and a high threat/high efficacy ("concerned and confident" EPPM profile (OR = 4.7 distinguished those who were more likely to voluntarily report to duty. Although 96% of EMS workers indicated that they would probably or definitely report to work if they were guaranteed a pandemic influenza vaccine, only 59% had received an influenza immunization in the preceding 12 months.EMS workers' response willingness gaps pose a substantial challenge to prehospital surge capacity in an influenza pandemic. "Concerned and confident" EMS workers are more than four times as likely to fulfill pandemic influenza response expectations. Confidence in workplace safety is a positively influential modifier of their response willingness. These findings can inform insights into interventions for enhancing EMS workers' willingness to respond

  4. Biospheric Changes are Threat Multipliers

    OpenAIRE

    Cairns, John

    2010-01-01

    A threat multiplier is defined as another agent that impacts a current situation, creating an additional set of problems while also making existing problems worse. Sometimes a seemingly innocent change in the biosphere can cause major alterations and become a threat multiplier. Because the biosphere is a highly interactive system, damage to a single component, like the ocean for example, will produce a ripple effect throughout the entire system. In order for humans to eliminate threat multip...

  5. Biological Threats Detection Technologies

    International Nuclear Information System (INIS)

    Bartoszcze, M.

    2007-01-01

    Among many decisive factors, which can have the influence on the possibility of decreases the results of use biological agents should be mentioned obligatory: rapid detection and identification of biological factor used, the proper preventive treatment and the medical management. The aims of identification: to identify the factor used, to estimate the area of contamination, to evaluate the possible countermeasure efforts (antibiotics, disinfectants) and to assess the effectiveness of the decontamination efforts (decontamination of the persons, equipment, buildings, environment etc.). The objects of identification are: bacteria and bacteria's spores, viruses, toxins and genetically modified factors. The present technologies are divided into: based on PCR techniques (ABI PRISM, APSIS, BIOVERIS, RAPID), immuno (BADD, RAMP, SMART) PCR and immuno techniques (APDS, LUMINEX) and others (BDS2, LUNASCAN, MALDI). The selected technologies assigned to field conditions, mobile and stationary laboratories will be presented.(author)

  6. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  7. Astrology Pseudoscience and a Discussion About Its Threats to Society

    Directory of Open Access Journals (Sweden)

    Tevfik UYAR

    2016-05-01

    Full Text Available Astrology, a pseudoscience, is highly popular in Turkey. Astrologers, who are its practitioners, produce discourses in the scientific field at the media and at their own platforms. Furthermore, it is possible to find some instances of astrology related activities in Turkish universities. In this article, demarcation of science from pseudoscience and the pseudoscientific status of astrology were discussed in a first place. Next, threats of astrological discourse within economic, educational and medical fields and their threats to society were expressed with some examples. Instances of the astrological activities within higher education institutions, such as an astrology-based master degree thesis, the astrology certificate programs, and an astrology column in an official medical school magazine were evaluated, and it was put forward that they contributed to increase the level of threat and it was also claimed that the existence of astrological activities in the universities contradicts the main purpose and principles of the higher education. In conclusion, some regulatory actions like the implementation of the scientific literacy and demarcation problem to each level of educational curriculum, a general policy for excluding the pseudoscience from higher education institutions and a recommended health warning at the top of the astrology were suggested.

  8. Threat Barometer. Ten Years of Terrorist Threat Assessment Netherlands

    NARCIS (Netherlands)

    Bakker, E.; Roy, de van Zuijdewijn J.

    2015-01-01

    In this essay, which was commissioned by the NCTV to mark the occasion of the conference “Threat Barometer. Ten years of Terrorist Threat Assessments for the Netherlands 2005-2015”, we address this and other aspects of the DTN and consider how this instrument has developed over the past decade. We

  9. Thinking about threats: Memory and prospection in human threat management.

    Science.gov (United States)

    Bulley, Adam; Henry, Julie D; Suddendorf, Thomas

    2017-03-01

    Humans have evolved mechanisms for the detection and management of possible threats in order to abate their negative consequences for fitness. Internally generated ('detached') cognition may have evolved in part because of its contributions to this broad function, but important questions remain about its role in threat management. In this article, we therefore present a taxonomy of threat-related internally generated cognition comprising episodic and semantic formats of memory and prospection. We address the proximate mechanisms of each of the capacities in this taxonomy, and discuss their respective contributions to adaptive threat management in humans. For instance, mental time travel empowers people to contemplate and learn from threats experienced long ago, as well as to plan for dangers that might arise in the distant future. However, despite their functional benefits, these thought processes are also central to contemporary anxiety disorders and may be a potent source of distress. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. UNIX-based operating systems robustness evaluation

    Science.gov (United States)

    Chang, Yu-Ming

    1996-01-01

    Robust operating systems are required for reliable computing. Techniques for robustness evaluation of operating systems not only enhance the understanding of the reliability of computer systems, but also provide valuable feed- back to system designers. This thesis presents results from robustness evaluation experiments on five UNIX-based operating systems, which include Digital Equipment's OSF/l, Hewlett Packard's HP-UX, Sun Microsystems' Solaris and SunOS, and Silicon Graphics' IRIX. Three sets of experiments were performed. The methodology for evaluation tested (1) the exception handling mechanism, (2) system resource management, and (3) system capacity under high workload stress. An exception generator was used to evaluate the exception handling mechanism of the operating systems. Results included exit status of the exception generator and the system state. Resource management techniques used by individual operating systems were tested using programs designed to usurp system resources such as physical memory and process slots. Finally, the workload stress testing evaluated the effect of the workload on system performance by running a synthetic workload and recording the response time of local and remote user requests. Moderate to severe performance degradations were observed on the systems under stress.

  11. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  12. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    NARCIS (Netherlands)

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  13. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  14. Laboratory and field based evaluation of chromatography ...

    Science.gov (United States)

    The Monitor for AeRosols and GAses in ambient air (MARGA) is an on-line ion-chromatography-based instrument designed for speciation of the inorganic gas and aerosol ammonium-nitrate-sulfate system. Previous work to characterize the performance of the MARGA has been primarily based on field comparison to other measurement methods to evaluate accuracy. While such studies are useful, the underlying reasons for disagreement among methods are not always clear. This study examines aspects of MARGA accuracy and precision specifically related to automated chromatography analysis. Using laboratory standards, analytical accuracy, precision, and method detection limits derived from the MARGA chromatography software are compared to an alternative software package (Chromeleon, Thermo Scientific Dionex). Field measurements are used to further evaluate instrument performance, including the MARGA’s use of an internal LiBr standard to control accuracy. Using gas/aerosol ratios and aerosol neutralization state as a case study, the impact of chromatography on measurement error is assessed. The new generation of on-line chromatography-based gas and particle measurement systems have many advantages, including simultaneous analysis of multiple pollutants. The Monitor for Aerosols and Gases in Ambient Air (MARGA) is such an instrument that is used in North America, Europe, and Asia for atmospheric process studies as well as routine monitoring. While the instrument has been evaluat

  15. Theory-Based Evaluation Meets Ambiguity

    DEFF Research Database (Denmark)

    Dahler-Larsen, Peter

    2017-01-01

    As theory-based evaluation (TBE) engages in situations where multiple stakeholders help develop complex program theory about dynamic phenomena in politically contested settings, it becomes difficult to develop and use program theory without ambiguity. The purpose of this article is to explore...... ambiguity as a fruitful perspective that helps TBE face current challenges. Literatures in organization theory and political theory are consulted in order to cultivate the concept of ambiguity. Janus variables (which work in two ways) and other ambiguous aspects of program theories are classified...

  16. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  17. An improved SWOT evidential reasoning based approach for strategy evaluation under uncertainty

    Directory of Open Access Journals (Sweden)

    K. Ramooshjan

    2014-01-01

    Full Text Available Formulation and evaluation of strategy play important role in the strategy management. Strength, Weakness, Opportunity and Threats (SWOT is a famous approach to formulate strategy planning, which relies on external and internal factors. Identifying these factors precisely is very critical for any organization and manager. This study aims at providing a quantitative basis to analytically determine the ranking of the factors in SWOT analysis via Evidential Reasoning (ER approach. This paper applies SWOT and Richard Rumelt's criteria to evaluate strategies in Evidential Reasoning approach. The ER approach has been developed to support MADA under uncertainty. It is based on Dempster’s rule for evidence combination and uses belief functions for dealing with probabilistic uncertainty and ignorance. This research is the first study in the ranking the factors of SWOT and Richard Rumelt approach. An illustrative example is also presented to show the efficiency of our model.

  18. Patient Safety Threat - Syringe Reuse

    Science.gov (United States)

    ... to Prevent HAIs HICPAC One & Only Campaign A Patient Safety Threat – Syringe Reuse Recommend on Facebook Tweet Share Compartir Important ... due to syringe reuse by your healthcare provider. Patients need to be aware of a very serious ...

  19. Defeating the Modern Asymmetric Threat

    National Research Council Canada - National Science Library

    Connor, Robert

    2002-01-01

    ...) ending a horrific 19 year-old low-intensity conflict, Over the course of nearly two decades, the LTTE came to exemplify the modern asymmetric threat as they battled the Sri Lankan Armed Forces (SLAF...

  20. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  1. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  2. Credit risk evaluation based on social media.

    Science.gov (United States)

    Yang, Yang; Gu, Jing; Zhou, Zongfang

    2016-07-01

    Social media has been playing an increasingly important role in the sharing of individuals' opinions on many financial issues, including credit risk in investment decisions. This paper analyzes whether these opinions, which are transmitted through social media, can accurately predict enterprises' future credit risk. We consider financial statements oriented evaluation results based on logit and probit approaches as the benchmarks. We then conduct textual analysis to retrieve both posts and their corresponding commentaries published on two of the most popular social media platforms for financial investors in China. Professional advice from financial analysts is also investigated in this paper. We surprisingly find that the opinions extracted from both posts and commentaries surpass opinions of analysts in terms of credit risk prediction. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Assessing the threat of firearms: new threat formula, resources, and ontological linking algorithms

    Science.gov (United States)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay Metodiev

    2014-06-01

    The present work is part of an ongoing larger project.2, 3, 11, 12 The goal of this project is to develop a system capable of automatic threat assessment for instances of firearms use in public places. The main components of the system are: an ontology of firearms;1, 14 algorithms to create the visual footprint of the firearms,1, 14 to compare visual information,2, 3, 11, 12 to facilitate search in the ontology, and to generate the links between the conceptual and visual ontologies; as well as a formula to calculate the threat of individual firearms, firearms classes, and ammunition types in different environments. One part of the dual-level ontology for the properties of the firearms captures key visual features used to identify their type or class in images, while the other part captures their threat-relevant conceptual properties. The visual ontology is the result of image segmentation and matching methods, while the conceptual ontology is designed using knowledge-engineering principles and populated semi-automatically from Web resources. The focus of the present paper is two-fold. On the one hand, we will report on an update of the initial threat formula, based on the substantially increased population of the firearm ontology, including ammunition types and comparisons to actual incidents, and allowing for an overall more accurate assessment. On the other hand, the linking algorithms between the visual and conceptual ontologies are elaborated for faster transfer of information leading to an improvement in accuracy of the threat assessment.

  4. The level of knowledge about parasitic diseases and the threats resulting from their presence in the environment evaluated in a group of parents of preschool children.

    Science.gov (United States)

    Gniadek, Agnieszka; Cepuch, Grażyna; Ochender, Katarzyna; Salamon, Dominika

    2015-01-01

    Despite a significant civilization advancement, parasitic diseases still pose a serious diagnostic and therapeutic problem. Children's susceptibility to these infections stems from their immature immune system and lack of basic hygiene routines. The objective of the study was to evaluate the level of knowledge which parents of preschool children's possess about parasitic diseases in their children's environment. The study was carried out in the group of 151 parents of preschool children living both in the city and in the country. The survey was carried out by means of a diagnostic poll with the application of a self-designed research questionnaire. To make the evaluation even more objective, a special scale was created in which parents could score points for their answers (0 - wrong answer, 1 - correct answer). The total number of points ranging from 0 to 9 indicated an unsatisfactory level of knowledge, from 10 to 13 - satisfactory level, from 14 to 16 - good level and from 17 to 20 - very good level of parents' awareness. The results of the study reveal that the level of parents' knowledge about parasitic diseases is only satisfactory. A statistically significant relationship was observed between the variables such as education and sex. The higher education, the higher level of knowledge. Moreover, women were more knowledgeable in the field of parasitic diseases than men were. Financial status of the family did not influence the level of parents' awareness. Well-planned educational programmes might have a positive influence on developing proper hygiene routines in families, which, in turn, will limit the risk of spreading parasitoses in the population of children.

  5. Evaluating Theory-Based Evaluation: Information, Norms, and Adherence

    Science.gov (United States)

    Jacobs, W. Jake; Sisco, Melissa; Hill, Dawn; Malter, Frederic; Figueredo, Aurelio Jose

    2012-01-01

    Programmatic social interventions attempt to produce appropriate social-norm-guided behavior in an open environment. A marriage of applicable psychological theory, appropriate program evaluation theory, and outcome of evaluations of specific social interventions assures the acquisition of cumulative theory and the production of successful social…

  6. Perceived threat and corroboration: key factors that improve a predictive model of trust in internet-based health information and advice.

    Science.gov (United States)

    Harris, Peter R; Sillence, Elizabeth; Briggs, Pam

    2011-07-27

    How do people decide which sites to use when seeking health advice online? We can assume, from related work in e-commerce, that general design factors known to affect trust in the site are important, but in this paper we also address the impact of factors specific to the health domain. The current study aimed to (1) assess the factorial structure of a general measure of Web trust, (2) model how the resultant factors predicted trust in, and readiness to act on, the advice found on health-related websites, and (3) test whether adding variables from social cognition models to capture elements of the response to threatening, online health-risk information enhanced the prediction of these outcomes. Participants were asked to recall a site they had used to search for health-related information and to think of that site when answering an online questionnaire. The questionnaire consisted of a general Web trust questionnaire plus items assessing appraisals of the site, including threat appraisals, information checking, and corroboration. It was promoted on the hungersite.com website. The URL was distributed via Yahoo and local print media. We assessed the factorial structure of the measures using principal components analysis and modeled how well they predicted the outcome measures using structural equation modeling (SEM) with EQS software. We report an analysis of the responses of participants who searched for health advice for themselves (N = 561). Analysis of the general Web trust questionnaire revealed 4 factors: information quality, personalization, impartiality, and credible design. In the final SEM model, information quality and impartiality were direct predictors of trust. However, variables specific to eHealth (perceived threat, coping, and corroboration) added substantially to the ability of the model to predict variance in trust and readiness to act on advice on the site. The final model achieved a satisfactory fit: χ(2) (5) = 10.8 (P = .21), comparative fit

  7. Perceived Threat and Corroboration: Key Factors That Improve a Predictive Model of Trust in Internet-based Health Information and Advice

    Science.gov (United States)

    Harris, Peter R; Briggs, Pam

    2011-01-01

    Background How do people decide which sites to use when seeking health advice online? We can assume, from related work in e-commerce, that general design factors known to affect trust in the site are important, but in this paper we also address the impact of factors specific to the health domain. Objective The current study aimed to (1) assess the factorial structure of a general measure of Web trust, (2) model how the resultant factors predicted trust in, and readiness to act on, the advice found on health-related websites, and (3) test whether adding variables from social cognition models to capture elements of the response to threatening, online health-risk information enhanced the prediction of these outcomes. Methods Participants were asked to recall a site they had used to search for health-related information and to think of that site when answering an online questionnaire. The questionnaire consisted of a general Web trust questionnaire plus items assessing appraisals of the site, including threat appraisals, information checking, and corroboration. It was promoted on the hungersite.com website. The URL was distributed via Yahoo and local print media. We assessed the factorial structure of the measures using principal components analysis and modeled how well they predicted the outcome measures using structural equation modeling (SEM) with EQS software. Results We report an analysis of the responses of participants who searched for health advice for themselves (N = 561). Analysis of the general Web trust questionnaire revealed 4 factors: information quality, personalization, impartiality, and credible design. In the final SEM model, information quality and impartiality were direct predictors of trust. However, variables specific to eHealth (perceived threat, coping, and corroboration) added substantially to the ability of the model to predict variance in trust and readiness to act on advice on the site. The final model achieved a satisfactory fit: χ2 5 = 10

  8. From shape to threat: exploiting the convergence between visual and conceptual organization for weapon identification and threat assessment

    Science.gov (United States)

    Arslan, Abdullah N.; Hempelmann, Christian F.; Di Ferrante, Carlo; Attardo, Salvatore; Sirakov, Nikolay M.

    2013-05-01

    The present work is a part of a larger project on recognizing and identifying weapons from a single image and assessing threats in public places. Methods of populating the weapon ontology have been shown. A clustering-based approach of constructing visual hierarchies on the base of extracted geometric features of weapons has been proposed. The convergence of a sequence of visual hierarchy trees to a conceptual hierarchy tree has been discussed. For illustrative purposes, from the growing conceptual ontology, a conceptual hierarchy tree has been chosen as a point of convergence for a sequence of visual hierarchy trees. A new approach is defined, on the base of the Gonzalez' algorithm, to generate the visual hierarchies. The closest visual hierarchy tree is selected as the search environment for a query weapon. A method of threat assessment is proposed. This method uses the attribute-rich conceptual hierarchy tree to evaluate the results from the visual hierarchy tree search. The two trees are linked at the leaf-level, because the visual hierarchy closest to the conceptual has the same distribution of the leaf nodes. A set of experimental results are reported to validate the theoretical concepts. A portion of the existing weapon ontology is used for this purpose.

  9. Evaluating Expert Estimators Based on Elicited Competences

    Directory of Open Access Journals (Sweden)

    Hrvoje Karna

    2015-07-01

    Full Text Available Utilization of expert effort estimation approach shows promising results when it is applied to software development process. It is based on judgment and decision making process and due to comparative advantages extensively used especially in situations when classic models cannot be accounted for. This becomes even more accentuated in today’s highly dynamical project environment. Confronted with these facts companies are placing ever greater focus on their employees, specifically on their competences. Competences are defined as knowledge, skills and abilities required to perform job assignments. During effort estimation process different underlying expert competences influence the outcome i.e. judgments they express. Special problem here is the elicitation, from an input collection, of those competences that are responsible for accurate estimates. Based on these findings different measures can be taken to enhance estimation process. The approach used in study presented in this paper was targeted at elicitation of expert estimator competences responsible for production of accurate estimates. Based on individual competences scores resulting from performed modeling experts were ranked using weighted scoring method and their performance evaluated. Results confirm that experts with higher scores in competences identified by applied models in general exhibit higher accuracy during estimation process. For the purpose of modeling data mining methods were used, specifically the multilayer perceptron neural network and the classification and regression decision tree algorithms. Among other, applied methods are suitable for the purpose of elicitation as in a sense they mimic the ways human brains operate. Data used in the study was collected from real projects in the company specialized for development of IT solutions in telecom domain. The proposed model, applied methodology for elicitation of expert competences and obtained results give evidence that in

  10. Metabolism-based herbicide resistance and cross-resistance in crop weeds: a threat to herbicide sustainability and global crop production.

    Science.gov (United States)

    Yu, Qin; Powles, Stephen

    2014-11-01

    Weedy plant species that have evolved resistance to herbicides due to enhanced metabolic capacity to detoxify herbicides (metabolic resistance) are a major issue. Metabolic herbicide resistance in weedy plant species first became evident in the 1980s in Australia (in Lolium rigidum) and the United Kingdom (in Alopecurus myosuroides) and is now increasingly recognized in several crop-weed species as a looming threat to herbicide sustainability and thus world crop production. Metabolic resistance often confers resistance to herbicides of different chemical groups and sites of action and can extend to new herbicide(s). Cytochrome P450 monooxygenase, glycosyl transferase, and glutathione S-transferase are often implicated in herbicide metabolic resistance. However, precise biochemical and molecular genetic elucidation of metabolic resistance had been stalled until recently. Complex cytochrome P450 superfamilies, high genetic diversity in metabolic resistant weedy plant species (especially cross-pollinated species), and the complexity of genetic control of metabolic resistance have all been barriers to advances in understanding metabolic herbicide resistance. However, next-generation sequencing technologies and transcriptome-wide gene expression profiling are now revealing the genes endowing metabolic herbicide resistance in plants. This Update presents an historical review to current understanding of metabolic herbicide resistance evolution in weedy plant species. © 2014 American Society of Plant Biologists. All Rights Reserved.

  11. Metabolism-Based Herbicide Resistance and Cross-Resistance in Crop Weeds: A Threat to Herbicide Sustainability and Global Crop Production1

    Science.gov (United States)

    Yu, Qin; Powles, Stephen

    2014-01-01

    Weedy plant species that have evolved resistance to herbicides due to enhanced metabolic capacity to detoxify herbicides (metabolic resistance) are a major issue. Metabolic herbicide resistance in weedy plant species first became evident in the 1980s in Australia (in Lolium rigidum) and the United Kingdom (in Alopecurus myosuroides) and is now increasingly recognized in several crop-weed species as a looming threat to herbicide sustainability and thus world crop production. Metabolic resistance often confers resistance to herbicides of different chemical groups and sites of action and can extend to new herbicide(s). Cytochrome P450 monooxygenase, glycosyl transferase, and glutathione S-transferase are often implicated in herbicide metabolic resistance. However, precise biochemical and molecular genetic elucidation of metabolic resistance had been stalled until recently. Complex cytochrome P450 superfamilies, high genetic diversity in metabolic resistant weedy plant species (especially cross-pollinated species), and the complexity of genetic control of metabolic resistance have all been barriers to advances in understanding metabolic herbicide resistance. However, next-generation sequencing technologies and transcriptome-wide gene expression profiling are now revealing the genes endowing metabolic herbicide resistance in plants. This Update presents an historical review to current understanding of metabolic herbicide resistance evolution in weedy plant species. PMID:25106819

  12. Evaluation of the threat of marine CO{sub 2} leakage-associated acidification on the toxicity of sediment metals to juvenile bivalves

    Energy Technology Data Exchange (ETDEWEB)

    Basallote, M. Dolores, E-mail: dolores.basallote@uca.es [Cátedra UNESCO/UNITWIN WiCop, Departamento de Química-Física, Facultad de Ciencias del Mar y Ambientales, Universidad de Cádiz, Polígono Río San Pedro s/n, 11510 Puerto Real, Cádiz (Spain); Rodríguez-Romero, Araceli [Departamento de Ecología y Gestión Costera, Instituto de Ciencias Marinas de Andalucía (CSIC), Campus Río San Pedro, 11510 Puerto Real, Cádiz (Spain); De Orte, Manoela R.; Del Valls, T. Ángel; Riba, Inmaculada [Cátedra UNESCO/UNITWIN WiCop, Departamento de Química-Física, Facultad de Ciencias del Mar y Ambientales, Universidad de Cádiz, Polígono Río San Pedro s/n, 11510 Puerto Real, Cádiz (Spain)

    2015-09-15

    Highlights: • Short-term tests using juveniles of bivalves to study the effects of CO{sub 2} dissolved. • CO{sub 2} causes effects if the threshold concentration of the organism is overlapped. • Flows of escaped CO{sub 2} would affect the geochemical composition of sediment–seawater. • CO{sub 2}-induced acidification would affect differently to marine sediment toxicity. - Abstract: The effects of the acidification associated with CO{sub 2} leakage from sub-seabed geological storage was studied by the evaluation of the short-term effects of CO{sub 2}-induced acidification on juveniles of the bivalve Ruditapes philippinarum. Laboratory scale experiments were performed using a CO{sub 2}-bubbling system designed to conduct ecotoxicological assays. The organisms were exposed for 10 days to elutriates of sediments collected in different littoral areas that were subjected to various pH treatments (pH 7.1, 6.6, 6.1). The acute pH-associated effects on the bivalves were observed, and the dissolved metals in the elutriates were measured. The median toxic effect pH was calculated, which ranged from 6.33 to 6.45. The amount of dissolved Zn in the sediment elutriates increased in parallel with the pH reductions and was correlated with the proton concentrations. The pH, the pCO{sub 2} and the dissolved metal concentrations (Zn and Fe) were linked with the mortality of the exposed bivalves.

  13. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  14. Familiarity Threat Arguement Revisited

    DEFF Research Database (Denmark)

    Warming-Rasmussen, Bent; Aschauer, Ewald

    2013-01-01

    and clients, we identify their subjective theories of trust and discuss them against the backdrop of recent trust research to develop four hypotheses. In the second study, the hypotheses are tested in an OLS regression based on data from 218 auditor-client dyads in Germany. Then, our interpretations......-reliance on the clients’ abilities do. The long-term engagement of the audit firm and relationships characterized by strong identification-based trust, however, contribute to a climate of professional skepticism. Besides the theoretical contribution, the practical implications of our findings for (re...

  15. DEVELOPMENT OF INFORMATION SECURITY INSIDER THREAT CLASSIFICATION USING INCIDENT CLUSTERING

    Directory of Open Access Journals (Sweden)

    A. S. Zaitsev

    2016-10-01

    Full Text Available Effective information security insider threat countermeasure requires knowledge and understanding of actual insider threats and methods of their realization. The article represents analysis of existing insider threat’s and intruder’s classifications. This analysis elicited an absence of comprehensive and consistent classification nowadays. Basing of this outcome a method of insider threat classification development using clustering of incidents was introduced. For this purpose an insider incident database was created and filled with 500 open source incidents. For determination of classification criterions and criterions of result estimation an analysis of gathered statistics was carried out. Using modeling framework IBM SPSS Modeler incident clustering was conducted basing on the following algorithms: k-means, two-step clustering algorithm, Cohonen self-organizing maps. Basing on incident clustering an information security insider threat classification was developed.

  16. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  17. Clinical evaluation based on cost-effectiveness

    International Nuclear Information System (INIS)

    Inoue, Takehiro; Inoue, Toshihiko

    1998-01-01

    We carried out two Phase III clinical trials using high dose rate (HDR) remote afterloading brachytherapy unit. We evaluated the clinical results based not only on the medical but also the economical standpoint. The first trial is the Phase III trial for cervical cancer treated with HDR or medium dose rate (MDR) intracavitary radiotherapy. The second one is the Phase III trial for tongue cancer treated with HDR or low dose rate (LDR) interstitial radiation. For cervical cancer, the survival rate of patients treated with HDR brachytherapy is the some as for LDR brachytherapy. The average total cost of treatment for the HDR group was 1.47 million yen, while that for the MDR group was 1.58 million yen. The average total admission days was 63. For tongue cancer, the local control rate of the HDR group is almost the same as that of the LDR groups. The average total cost for the HDR group was 780 thousand yen, and that for the LDR group was 830 thousand yen. The average total admission days was 34. According to the cost-effectiveness, HDR brachytherapy for cervical cancer has the same result as MDR, and HDR brachytherapy for tongue cancer has the same result as LDR. However, HDR can be treated without admission for patients who live near the hospital. HDR can be applied for these patients with less expense. We must be aware of not only the medical results but also the cost-effectiveness. (author)

  18. Coating defect evaluation based on stimulated thermography

    Science.gov (United States)

    Palumbo, Davide; Tamborrino, Rosanna; Galietti, Umberto

    2017-05-01

    Thermal Barrier Coatings are used to protect the materials from severe temperature and chemical environments. In particular, these materials are used in the engineering fields where high temperatures, corrosive environments and high mechanical stress are required. Defects present between substrate material and coating, as detachments may cause the break of coating and the consequent possibility to exposure the substrate material to the environment conditions. The capability to detect the defect zones with non-destructive techniques could allow the maintenance of coated components with great advantages in terms of costs and prediction of fatigue life. In this work, two different heat sources and two different thermographic techniques have been used to detect the adhesion defects among the base material and the coating. Moreover, an empirical thermographic method has been developed to evaluate the thickness of the thermal coating and to discriminate between an unevenness of the thickness and a defect zone. The study has been conducted on circular steel specimens with simulated adhesion defect and on specimens prepared with different thicknesses of thermal barrier coating.

  19. Evaluating Software Complexity Based on Decision Coverage

    Directory of Open Access Journals (Sweden)

    Mustafa AL-HAJJAJI

    2012-01-01

    Full Text Available It is becoming increasingly difficult to ignore the complexity of software products. Software metrics are proposed to help show indications for quality, size, complexity, etc. of software products. In this paper, software metrics related to complexity are developed and evaluated. A dataset of many open source projects is built to assess the value of the developed metrics. Comparisons and correlations are conducted among the different tested projects. A classifica-tion is proposed to classify software code into different levels of complexity. The results showed that measuring the complexity of software products based on decision coverage gives a significant indicator of degree of complexity of those software products. However, such in-dicator is not exclusive as there are many other complexity indicators that can be measured in software products. In addition, we conducted a comparison among several available metric tools that can collect software complexity metrics. Results among those different tools were not consistent. Such comparison shows the need to have a unified standard for measuring and collecting complexity attributes.

  20. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...... threats, based on probabilistic modelling, verification, and synthesis techniques. The framework first identifies insiders’ intention to perform an inside attack, using Bayesian networks, and in a second phase computes the probability of success for an inside attack by this actor, using probabilistic...

  1. International standard for design basis threat (DBT)

    International Nuclear Information System (INIS)

    Blankenship, J.A.

    2002-01-01

    Full text: A design basis threat (DBT) has been used by the United States since the 1970's as a basis for the design of a facility physical protection system, a basis for the evaluation of the facility physical protection system, and as a standard against which to compare the continuously changing threat. In the last two years substantial effort has been made to develop an international standard for the development of a design basis threat. This approach is the result of a year's worth of discussions between the United States, Germany, United Kingdom, France, and most recently the Russian Federation. The International Atomic Energy Agency (IAEA) supported these discussions and the resulting process, which culminated in a three day workshop on the development of a state DBT. The IAEA was directly involved in this process due to the latest revision of INFCIRC 225, which recommends the use of a DBT in the state physical protection regime. This international standard for the development of a DBT is a significant milestone in the international community. This was necessary because Sandia National Laboratory had developed material for a 'DBT Workshop', and a standard, international approach had to be established before the workshop could be finalized and the instructional material provided to the IAEA for general use. This paper presents a summary of the new international approach to the creation and use of a design basis threat. The paper describes how a DBT is created within a state. This paper also explains the advantages and disadvantages of using this internationalized approach to the DBT. Each state may, of course, choose to modify their use of the DBT to better fit their culture, technical experience of the facilities and authorities, and strengths and weaknesses of their regulatory systems. The internationalized version of the creation and use of the DBT is a major milestone in the international effort of the United States and the IAEA, and this paper is a

  2. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  3. Strengths, weaknesses, opportunities and threats

    DEFF Research Database (Denmark)

    Bull, Joseph William; Jobstvogt, N.; Böhnke-Henrichs, A.

    2016-01-01

    . Such an assessment could form the basis for improving ES thinking, further embedding it into environmental decisions and management.The Young Ecosystem Services Specialists (YESS) completed a Strengths-Weaknesses-Opportunities-Threats (SWOT) analysis of ES through YESS member surveys. Strengths include the approach...... environmental awareness. Threats include resistance to change, and difficulty with interdisciplinary collaboration. Consideration of SWOT themes suggested five strategic areas for developing and implementing ES.The ES concept could improve decision-making related to natural resource use, and interpretation...

  4. Information fusion: telling the story (or threat narrative)

    Science.gov (United States)

    Fenstermacher, Laurie

    2014-06-01

    Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.

  5. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  6. Combining Internal and External Evaluation: A Case for School-Based Evaluation.

    Science.gov (United States)

    Nevo, David

    1994-01-01

    School-based evaluation, the focus of this article, is conceived of as neither a synonym for internal evaluation nor an antonym for external evaluation, but as a combination that is examined through a review of recent research. A school-based evaluation in Israel illustrates combining these approaches in a complementary way. (SLD)

  7. DENGUE: GLOBAL THREAT.

    Science.gov (United States)

    Thisyakorn, Usa; Thisyakorn, Chule

    2015-01-01

    Dengue is a mosquito-borne viral disease, which is currently an expanding global problem. Four closely related dengue serotypes cause the disease, which ranges from asymptomatic infection to undifferentiated fever, dengue fever (DF), and dengue hemorrhagic fever (DHF). DHF is characterized by fever, bleeding diathesis, and a tendency to develop a potentially fatal shock syndrome. Dengue infection with organ impairment mainly involves the central nervous system and the liver. Consistent hematological findings include vasculopathy, coagulopathy, and thrombocytopenia. Laboratory diagnosis includes virus isolation, serology, and detection of dengue ribonucleic acid. Successful treatment, which is mainly supportive, depends on early recognition of the disease and careful monitoring for shock. A severity-based revised dengue classification for medical interventions has been developed and validated in many countries. There is no specific dengue treatment, and prevention is currently limited to vector control measures. The world's first, large-scale dengue vaccine efficacy study demonstrated its efficacy and a reduction of dengue disease severity with a good safety profile in a study of more than 30,000 volunteers from Asia and Latin America.

  8. Dengue: a global threat.

    Science.gov (United States)

    Thisyakorn, Usa; Thisyakorn, Chule

    2015-01-01

    Dengue, a mosquito-borne viral disease, is currently an expanding global problem. The disease is caused by four closely related dengue serotypes; it ranges from asymptomatic infection to undifferentiated fever, dengue fever (DF) and dengue hemorrhagic fever (DHF). DHF is characterized by fever, bleeding diathesis and a tendency to develop apotentially fatal shock syndrome. Dengue infection with organ impairment mainly involves the central nervous system and liver. Consistent hematological findings include vasculopathy, coagulopathy and thrombocytopenia. Laboratory diagnoses include virus isolation, serology, and detection ofdengue ribonucleic acid. Successful treatment, which is mainly supportive, depends on early recognition of the disease and careful monitoring for shock. A severity-based revised dengue classification for medical interventions has been developed and validated in many countries. So far however, there has not been any specific dengue treatment; prevention is currently limited to vector control measures. The world's first, large-scale dengue vaccine, efficacy study demonstrated its efficacy and a reduction of dengue's severity in a study of more than 10,000 volunteers in Asia. Initial safety data are consistent with a good safety profile.

  9. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  10. Emotion blocks the path to learning under stereotype threat

    OpenAIRE

    Mangels, Jennifer A.; Good, Catherine; Whiteman, Ronald C.; Maniscalco, Brian; Dweck, Carol S.

    2011-01-01

    Gender-based stereotypes undermine females’ performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback relat...

  11. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  12. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  13. Countering the nuclear terrorist threat

    International Nuclear Information System (INIS)

    Vantine, H.C.

    2002-01-01

    Full text: An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to a RDD. RDDs, or 'dirty bombs' as they are often called, spread radioactivity but they do not generate nuclear yield. The fabrication of a RDD requires radioactive material and a dispersal mechanism. Standards for safe handling and accountability of radioactive material vary around the world. Terrorist acquisition and use of an IND is a low-probability but high-consequence threat. Terrorist use of a RDD is a threat of higher probability but lower consequence. Two threats need to be considered for civil radiological and nuclear facilities. One is the theft of materials by terrorists, and the other is an attack on a facility to disperse radiological or nuclear materials. Facilities may include reactors as well as nuclear waste and storage areas. While important elements of a layered defense against these threats are already in place, improved international cooperation and a sustained investment in the science and technology needed to win the war on terrorism is necessary. (author)

  14. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  15. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  16. Modeling threat assessments of water supply systems using markov latent effects methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Consuelo Juanita

    2006-12-01

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  17. Evaluation of Advanced Petroleum-Based Fuels

    National Research Council Canada - National Science Library

    Likos, W. E

    2001-01-01

    The U.S. Department of Energy with the cooperation of DaimlerChrysler undertook a series of evaluations of diesel fuel formulation alternatives using the newly released Daimler-Benz OM 611 diesel engine...

  18. Evaluation of asphalt treated permeable base.

    Science.gov (United States)

    2013-12-01

    III : Tec : hnical : Report Documentation Page : 1. Report No. : 2. Government Accession : No. : 3. Recipient's Catalog No : . : 201 : 3 : - : 09 : - : - : - : - : - : - : 4. Title and Subtitle : 5. Report Date : Evaluation of Asphalt Treated Permeab...

  19. Are modern technologies a threat to fundamental rights

    International Nuclear Information System (INIS)

    Discussion of the problem whether nuclear technology represents a more serious threat to fundamental rights (such as the right to live and to be protected from bodily harm) than other technical developments. Stating that nuclear facilities as an object of possible assaults by terrorist groups cannot be regarded as an additional menace to the existance of our free and democratic society. Science and technology on the whole, together with their impact on our every-day life might, under the specific conditions of our industrial society based on division of labour, entail an undue infringement of fundamental rights unless the consequences of the technical development are evaluated in due time by the competent authorities in government, industry and society on the basis of the standard of value set by the Basic Law for the Fed. Republic of Germany. (orig./HP) 891 HP/orig.- 892 MBE [de

  20. PSA-based evaluation and rating of operational events

    International Nuclear Information System (INIS)

    Gomez Cobo, A.

    1997-01-01

    The presentation discusses the PSA-based evaluation and rating of operational events, including the following: historical background, procedures for event evaluation using PSA, use of PSA for event rating, current activities

  1. Psychological and Cortisol Responses to and Recovery From Exposure to a Body Image Threat

    Directory of Open Access Journals (Sweden)

    Larkin Lamarche

    2016-04-01

    Full Text Available The majority of body image research has failed to measure what occurs beyond the immediate presentation of a body image threat, or after a body image threat is no longer present. This is particularly true for physiological outcomes. The present study examined psychological and cortisol responses to, and recovery from, a body composition assessment as a social-evaluative body image threat. Women (N = 64 were randomized into either a control or threat group. Participants completed a measure of social physique anxiety and provided a sample of saliva (to assess cortisol at baseline, and immediately following and 20 min following their condition. The threat group reported higher social physique anxiety following the threat in comparison with both baseline levels and recovery levels. Cortisol was higher immediately following the threat in comparison with baseline levels. Findings support the inclusion of a recovery time point in body image research to provide a more complete picture of the psychobiology of body image experiences.

  2. FACTORS OF PERSONNEL SECURITY THREATS IN THE ORGANIZATION

    Directory of Open Access Journals (Sweden)

    Anastasiya Yu. Timofeeva

    2017-06-01

    Full Text Available The study of factors that influence the occurrence of threats is of particular importance in the theory and practice of ensuring personnel security in the organization. The article aims at the identification of major threats to the organizational personnel security. As the latter, we suggest considering a set of causes related to the intention of the employee/ employer to harm each other and determine the ability to causes harm. Based on the content analysis of publications we identified the main causes of threats to the personnel security of organization, sources of hazardous factors origin. Consequently, we compiled a list of personnel security threats consisting of 18 items. The authors assessed the acuteness and urgency of threats, their impact on the state of personnel security in the organizations (a study was carried out on the example of Irkutsk region. Using the technique of factor analysis, we extracted factors of personnel security threats in the organization, interpreted as the existence of vulnerabilities in the security system, poor quality of the labor force and its moral and ethical capacities, shortcomings and mistakes in the area of implemented personnel policy and in the policy of personnel security. The applied methods of analysis are as follows: content analysis; analysis of frequency tables and contingency tables; correlation and factor analysis. Materials of the expert survey conducted in the Irkutsk region (2015 serves as the analysis base. Kendall’s coefficient of concordance confirmed agreement among the experts. Obtained results can be used to investigate and identify personnel security threats in the organization, can form the basis for prediction and analysis of personnel security threats, for development of methods of their prevention.

  3. Building a community-based culture of evaluation.

    Science.gov (United States)

    Janzen, Rich; Ochocka, Joanna; Turner, Leanne; Cook, Tabitha; Franklin, Michelle; Deichert, Debbie

    2017-12-01

    In this article we argue for a community-based approach as a means of promoting a culture of evaluation. We do this by linking two bodies of knowledge - the 70-year theoretical tradition of community-based research and the trans-discipline of program evaluation - that are seldom intersected within the evaluation capacity building literature. We use the three hallmarks of a community-based research approach (community-determined; equitable participation; action and change) as a conceptual lens to reflect on a case example of an evaluation capacity building program led by the Ontario Brian Institute. This program involved two community-based groups (Epilepsy Southwestern Ontarioand the South West Alzheimer Society Alliance) who were supported by evaluators from the Centre for Community Based Research to conduct their own internal evaluation. The article provides an overview of a community-based research approach and its link to evaluation. It then describes the featured evaluation capacity building initiative, including reflections by the participating organizations themselves. We end by discussing lessons learned and their implications for future evaluation capacity building. Our main argument is that organizations that strive towards a community-based approach to evaluation are well placed to build and sustain a culture of evaluation. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  5. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  6. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  7. Operationalizing Counter Threat Finance Strategies

    Science.gov (United States)

    2014-12-01

    problem may reveal or create additional problems. As such, it is essential that the problem is exam - ined not as a stand-alone subject, but in the...terrorist finance could not be looked at in isolation. It is this realization that gave birth to the term “threat finance” which exam - ines not only...Newsletter, Charlottesville, VA: University of Virginia, 2001, available from www.virginia.edu/ soa - sia/newsletter/Fall01/warfare.html, accessed on October

  8. TERRORIST THREATS AND PUBLIC TRANSPORTATION

    OpenAIRE

    Ioan NASCU

    2009-01-01

    public transportation is an activity facing various problems. One of them, very complex and dangerous, is terrorism which together with criminal activities and vandalism, is making the top of the threats affecting public transportation and therefore urban life quality. Public transportation has several characteristics which make it vulnerable to terroris attacks and a main target for them. To compensate for these weeknesses, certain solutions are necessary to prevent the attack or in case it ...

  9. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  10. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  12. Evaluating Web-Based Learning Systems

    Science.gov (United States)

    Pergola, Teresa M.; Walters, L. Melissa

    2011-01-01

    Accounting educators continuously seek ways to effectively integrate instructional technology into accounting coursework as a means to facilitate active learning environments and address the technology-driven learning preferences of the current generation of students. Most accounting textbook publishers now provide interactive, web-based learning…

  13. Triacylglycerol-based fuels: An evaluation

    Science.gov (United States)

    A variety of feedstocks exist and several processes have been developed to produce alternative diesel fuels from triacylglycerol-based materials, such as plant and algal oils as well as animal fats and used cooking oils. Biodiesel is obtained by transesterifying a triacylglycerol feedstock with an a...

  14. HYBRID THREATS, CYBER WARFARE AND NATO'S ...

    African Journals Online (AJOL)

    Bachmans

    threats and at discussing some key implications when countering such risks and challenges. In essence, hybrid threats faced ..... just as a collateral effect of the belligerent actions. But in the African radical Islamist .... Defining comprehensive approach for 21st century threats to global risk and security”. Swedish MoD – High ...

  15. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  16. The evidenced-based shoulder evaluation.

    Science.gov (United States)

    O'Kane, John W; Toresdahl, Brett G

    2014-01-01

    The physical examination of the shoulder has been studied extensively, but the quality and statistical power of the published research often is lacking. The initial reports of new shoulder examination techniques commonly describe impressive performance. However recent meta-analyses have found that when the majority of these tests are used in isolation, they lack the ability to rule in or rule out the pathology in question, with few exceptions. The diagnostic accuracy of the physical examination improves when the shoulder tests are evaluated in combination, such as positive passive distraction and active compression identifying a superior labral anterior to posterior (SLAP) lesion. The accuracy also can be improved when the shoulder tests are evaluated in conjunction with specific historical findings, such as age greater than 39 years, history of popping or clicking, and a positive painful arc (pain experienced between 60° and 120° of abduction) identifying rotator cuff tendinopathy. The literature on shoulder imaging demonstrates that rotator cuff tears can be ruled in or ruled out by both ultrasound and magnetic resonance imaging. For SLAP lesions, magnetic resonance arthrography can be used to rule out a tear but may not be as accurate as combined physical examinations to rule in a tear.

  17. Scaling range sizes to threats for robust predictions of risks to biodiversity.

    Science.gov (United States)

    Keith, David A; Akçakaya, H Resit; Murray, Nicholas J

    2017-07-13

    Assessments of risk to biodiversity often rely on spatial distributions of species and ecosystems. Range-size metrics used extensively in these assessments, such as area of occupancy (AOO), are sensitive to measurement scale, prompting proposals to measure them at finer scales or at different scales based on the shape of the distribution or ecological characteristics of the biota. Despite its dominant role in red-list assessments for decades, appropriate spatial scales of AOO for predicting risks of species' extinction or ecosystem collapse remain untested and contentious. There are no quantitative evaluations of the scale-sensitivity of AOO as a predictor of risks, the relationship between optimal AOO scale and threat scale, or the effect of grid uncertainty. We used stochastic simulation models to explore risks to ecosystems and species with clustered, dispersed, and linear distribution patterns subject to regimes of threat events with different frequency and spatial extent. Area of occupancy was an accurate predictor of risk (0.81<|r|<0.98) and performed optimally when measured with grid cells 0.1-1.0 times the largest plausible area threatened by an event. Contrary to previous assertions, estimates of AOO at these relatively coarse scales were better predictors of risk than finer-scale estimates of AOO (e.g., when measurement cells are <1% of the area of the largest threat). The optimal scale depended on the spatial scales of threats more than the shape or size of biotic distributions. Although we found appreciable potential for grid-measurement errors, current IUCN guidelines for estimating AOO neutralize geometric uncertainty and incorporate effective scaling procedures for assessing risks posed by landscape-scale threats to species and ecosystems. © 2017 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  18. Evaluating the bases of supplier segmentation

    DEFF Research Database (Denmark)

    Day, Marc; Magnan, Gregory M.; Munkgaard Møller, Morten

    2010-01-01

    A taxonomy of segmentation bases is presented which builds a multi-disciplinary approach to the categorization of suppliers. Supplier segmentation, from a purchasing perspective, still appears to be in the early stages of providing a coherent strategic intent behind supplier assessment. Whilst...... fragmentary in nature, current portfolio models are grouped into two principal taxonomic constructs of power and dependence and relational factors. In particular, the prevalent use of transaction cost economics (TCE) in portfolio modelling provides a foundation for purchasers to appraise risks from supplier...... opportunism. We augment existing approaches with reference to inter-organisational theory and the resource-based view to show different modes of inter-firm value creation that act as constituents of a strategic intent for segmentation. Our resulting taxonomy draws together a holistic view of supplier...

  19. Bioimpedance measurement based evaluation of wound healing.

    Science.gov (United States)

    Kekonen, Atte; Bergelin, Mikael; Eriksson, Jan-Erik; Vaalasti, Annikki; Ylänen, Heimo; Viik, Jari

    2017-06-22

    Our group has developed a bipolar bioimpedance measurement-based method for determining the state of wound healing. The objective of this study was to assess the capability of the method. To assess the performance of the method, we arranged a follow-up study of four acute wounds. The wounds were measured using the method and photographed throughout the healing process. Initially the bioimpedance of the wounds was significantly lower than the impedance of the undamaged skin, used as a baseline. Gradually, as healing progressed, the wound impedance increased and finally reached the impedance of the undamaged skin. The clinical appearance of the wounds examined in this study corresponded well with the parameters derived from the bioimpedance data. Hard-to-heal wounds are a significant and growing socioeconomic burden, especially in the developed countries, due to aging populations and to the increasing prevalence of various lifestyle related diseases. The assessment and the monitoring of chronic wounds are mainly based on visual inspection by medical professionals. The dressings covering the wound must be removed before assessment; this may disturb the wound healing process and significantly increases the work effort of the medical staff. There is a need for an objective and quantitative method for determining the status of a wound without removing the wound dressings. This study provided evidence of the capability of the bioimpedance based method for assessing the wound status. In the future measurements with the method should be extended to concern hard-to-heal wounds.

  20. Usage-Based Collection Evaluation with a Curricular Focus

    Science.gov (United States)

    Kohn, Karen C.

    2013-01-01

    Systematic evaluation of a library's collection can be a useful tool for collection development. After reviewing three evaluation methods and their usefulness for our small academic library, I undertook a usage-based evaluation, focusing on narrow segments of our collection that served specific undergraduate courses. For each section, I collected…

  1. Research Methods for Assessing and Evaluating School-Based Clinics.

    Science.gov (United States)

    Kirby, Douglas

    This monograph describes three types of evaluation that are potentially useful to school-based clinics: needs assessments, process evaluations, and impact evaluations. Two important methodological principles are involved: (1) collecting multiple kinds of data with multiple methods; and (2) collecting comparison data. Student needs can be…

  2. Complementary methods to plan pedestrian evacuation of the French Riviera's beaches in case of tsunami threat: graph- and multi-agent-based modelling

    Directory of Open Access Journals (Sweden)

    A. Sahal

    2013-07-01

    Full Text Available Small amplitude tsunamis have impacted the French Mediterranean shore (French Riviera in the past centuries. Some caused casualties; others only generated economic losses. While the North Atlantic and Mediterranean tsunami warning system is being tested and is almost operational, no awareness and preparedness measure is being implemented at a local scale. Evacuation is to be considered along the French Riviera, but no plan exists within communities. We show that various approaches can provide local stakeholders with evacuation capacities assessments to develop adapted evacuation plans through the case study of the Cannes–Antibes region. The complementarity between large- and small-scale approaches is demonstrated with the use of macro-simulators (graph-based and micro-simulators (multi-agent-based to select shelter points and choose evacuation routes for pedestrians located on the beach. The first one allows automatically selecting shelter points and measuring and mapping their accessibility. The second one shows potential congestion issues during pedestrian evacuations, and provides leads for the improvement of urban environment. Temporal accessibility to shelters is compared to potential local and distal tsunami travel times, showing a 40 min deficit for an adequate crisis management in the first scenario, and a 30 min surplus for the second one.

  3. Modulated evaluation metrics for drug-based ontologies.

    Science.gov (United States)

    Amith, Muhammad; Tao, Cui

    2017-04-24

    Research for ontology evaluation is scarce. If biomedical ontological datasets and knowledgebases are to be widely used, there needs to be quality control and evaluation for the content and structure of the ontology. This paper introduces how to effectively utilize a semiotic-inspired approach to ontology evaluation, specifically towards drug-related ontologies hosted on the National Center for Biomedical Ontology BioPortal. Using the semiotic-based evaluation framework for drug-based ontologies, we adjusted the quality metrics based on the semiotic features of drug ontologies. Then, we compared the quality scores before and after tailoring. The scores revealed a more precise measurement and a closer distribution compared to the before-tailoring. The results of this study reveal that a tailored semiotic evaluation produced a more meaningful and accurate assessment of drug-based ontologies, lending to the possible usefulness of semiotics in ontology evaluation.

  4. Does by-catch pose a threat for the conservation of seabird populations in the southern Ionian Sea (eastern Mediterranean? A questionnaire based survey of local fisheries

    Directory of Open Access Journals (Sweden)

    G. KARRIS

    2013-09-01

    Full Text Available A significant number of studies worldwide have shown that incidental catches (by-catch of seabirds in fishing gear might pose a considerable risk for the conservation of their populations. Nevertheless reliable data on by-catch rates of seabirds in European marine ecosystems are patchy and need to be improved. This study constitutes a first attempt at the evaluation of by-catch rates in the southern Ionian Sea. Data were obtained by distributing a specific questionnaire to the fishers of Zakynthos Island. 150 professional fishers (representing 90% of the local fishing fleet participated in the research, and were interviewed during July-December 2010. The information collected showed that commercial longline and (to a lesser extent gillnet fishery gears caused incidental catches mostly of Scopoli’s Shearwater and Mediterranean Shag. The temporal analysis of the incidental bird mortality showed that seabirds were more susceptible to be trapped in fishery gears set around sunrise during spring and summer whereas spatial analysis of by-catch data indicated variations in the number of seabirds caught in different fishery areas.

  5. Energy Rebound as a Potential Threat to a Low-Carbon Future: Findings from a New Exergy-Based National-Level Rebound Approach

    Directory of Open Access Journals (Sweden)

    Paul E. Brockway

    2017-01-01

    Full Text Available 150 years ago, Stanley Jevons introduced the concept of energy rebound: that anticipated energy efficiency savings may be “taken back” by behavioural responses. This is an important issue today because, if energy rebound is significant, this would hamper the effectiveness of energy efficiency policies aimed at reducing energy use and associated carbon emissions. However, empirical studies which estimate national energy rebound are rare and, perhaps as a result, rebound is largely ignored in energy-economy models and associated policy. A significant difficulty lies in the components of energy rebound assessed in empirical studies: most examine direct and indirect rebound in the static economy, excluding potentially significant rebound of the longer term structural response of the national economy. In response, we develop a novel exergy-based approach to estimate national energy rebound for the UK and US (1980–2010 and China (1981–2010. Exergy—as “available energy”—allows a consistent, thermodynamic-based metric for national-level energy efficiency. We find large energy rebound in China, suggesting that improvements in China’s energy efficiency may be associated with increased energy consumption (“backfire”. Conversely, we find much lower (partial energy rebound for the case of the UK and US. These findings support the hypothesis that producer-sided economies (such as China may exhibit large energy rebound, reducing the effectiveness of energy efficiency, unless other policy measures (e.g., carbon taxes are implemented. It also raises the prospect we need to deploy renewable energy sources faster than currently planned, if (due to rebound energy efficiency policies cannot deliver the scale of energy reduction envisaged to meet climate targets.

  6. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  7. Exploring the Structure of Human Defensive Responses from Judgments of Threat Scenarios.

    Directory of Open Access Journals (Sweden)

    Laura A Harrison

    Full Text Available How humans react to threats is a topic of broad theoretical importance, and also relevant for understanding anxiety disorders. Many animal threat reactions exhibit a common structure, a finding supported by human evaluations of written threat scenarios that parallel patterns of rodent defensive behavior to actual threats. Yet the factors that underlie these shared behavioral patterns remain unclear. Dimensional accounts rooted in Darwin's conception of antithesis explain many defensive behaviors. Across species, it is also clear that defensive reactions depend on specific situational factors, a feature long emphasized by psychological appraisal theories. Our study sought to extend prior investigations of human judgments of threat to a broader set of threats, including natural disasters, threats from animals, and psychological (as opposed to physical threats. Our goal was to test whether dimensional and specific patterns of threat evaluation replicate across different threat classes. 85 healthy adult subjects selected descriptions of defensive behaviors that indicated how they would react to 29 threatening scenarios. Scenarios differed with respect to ten factors, e.g., perceived dangerousness or escapability. Across scenarios, we correlated these factor ratings with the pattern of defensive behaviors subjects endorsed. A decision tree hierarchically organized these correlation patterns to successfully predict each scenario's most common reaction, both for the original sample of subjects and a separate replication group (n = 22. At the top of the decision tree, degree of dangerousness interacted with threat type (physical or psychological to predict dimensional approach/avoidance behavior. Subordinate nodes represented specific defensive responses evoked by particular contexts. Our ecological approach emphasizes the interplay of situational factors in evoking a broad range of threat reactions. Future studies could test predictions made by our

  8. Entropy Evaluation Based on Value Validity

    Directory of Open Access Journals (Sweden)

    Tarald O. Kvålseth

    2014-09-01

    Full Text Available Besides its importance in statistical physics and information theory, the Boltzmann-Shannon entropy S has become one of the most widely used and misused summary measures of various attributes (characteristics in diverse fields of study. It has also been the subject of extensive and perhaps excessive generalizations. This paper introduces the concept and criteria for value validity as a means of determining if an entropy takes on values that reasonably reflect the attribute being measured and that permit different types of comparisons to be made for different probability distributions. While neither S nor its relative entropy equivalent S* meet the value-validity conditions, certain power functions of S and S* do to a considerable extent. No parametric generalization offers any advantage over S in this regard. A measure based on Euclidean distances between probability distributions is introduced as a potential entropy that does comply fully with the value-validity requirements and its statistical inference procedure is discussed.

  9. New threats to academic freedom.

    Science.gov (United States)

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  10. The threat of nuclear war

    International Nuclear Information System (INIS)

    1985-01-01

    This report aims to describe the present threat of nuclear war, with particular reference to New Zealand, and the increasing concern felt by many scientists, from a scientific viewpoint but in non-technical language. It surveys what is known about nuclear weapons and the consequences of their use, and attention is drawn to the importance of penetrating the language and examining the assumptions made in the propaganda about n uclear deterrence . The tasks involved in maintaining the present peace and attempting to establish an agreed disarmament is examined. The report pays particular attention to the roles of scientists in these endeavours

  11. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  12. A simple strategy to reduce stereotype threat for orthopedic residents.

    Science.gov (United States)

    Gomez, Everlyne; Wright, James G

    2014-04-01

    Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR.

  13. Muscle fatigue based evaluation of bicycle design.

    Science.gov (United States)

    Balasubramanian, V; Jagannath, M; Adalarasu, K

    2014-03-01

    Bicycling posture leads to considerable discomfort and a variety of chronic injuries. This necessitates a proper bicycle design to avoid injuries and thereby enhance rider comfort. The objective of this study was to investigate the muscle activity during cycling on three different bicycle designs, i.e., rigid frame (RF), suspension (SU) and sports (SP) using surface electromyography (sEMG). Twelve male volunteers participated in this study. sEMG signals were acquired bilaterally from extensor carpi radialis (ECR), trapezius medial (TM), latissimus dorsi medial (LDM) and erector spinae (ES), during 30 min of cycling on each bicycle and after cycling. Time domain (RMS) and frequency domain (MPF) parameters were extracted from acquired sEMG signals. From the sEMG study, it was found that the fatigue in right LDM and ES were significantly (p bicycle. This was corroborated by a psychophysical assessment based on RBG pain scale. The study also showed that there was a significantly lesser fatigue with the SU bicycle than the RF and SP bicycles. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  14. A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Claudio S. Malavenda

    2014-01-01

    Full Text Available This article presents a novel approach to the analysis of wireless sensor networks (WSN security, based on the regulations intended for wireless communication devices. Starting from the analysis and classification of attacks, countermeasures, and available protocols, we present the current state on secure communication stacks for embedded systems. The regulation analysis is based on civil EN 50150 and MIL STD-188-220, both applicable to WSN communications. Afterwards, starting from a list of known WSN attacks, we use a correspondence table to match WSN attacks with countermeasures required by regulations. This approach allows us to produce a precise security evaluation and classification methodology for WSN protocols. The results show that current protocols do not present a complete coverage of security issues. While this conclusion is already known for many WSN protocols, to the best of our knowledge this is the first time a complete methodology is proposed to base this assertion. Moreover, by using the proposed methodology, we are able to precisely identify the exposed threats for each WSN protocol under analysis.

  15. Time Series UAV Image-Based Point Clouds for Landslide Progression Evaluation Applications.

    Science.gov (United States)

    Al-Rawabdeh, Abdulla; Moussa, Adel; Foroutan, Marzieh; El-Sheimy, Naser; Habib, Ayman

    2017-10-18

    Landslides are major and constantly changing threats to urban landscapes and infrastructure. It is essential to detect and capture landslide changes regularly. Traditional methods for monitoring landslides are time-consuming, costly, dangerous, and the quality and quantity of the data is sometimes unable to meet the necessary requirements of geotechnical projects. This motivates the development of more automatic and efficient remote sensing approaches for landslide progression evaluation. Automatic change detection involving low-altitude unmanned aerial vehicle image-based point clouds, although proven, is relatively unexplored, and little research has been done in terms of accounting for volumetric changes. In this study, a methodology for automatically deriving change displacement rates, in a horizontal direction based on comparisons between extracted landslide scarps from multiple time periods, has been developed. Compared with the iterative closest projected point (ICPP) registration method, the developed method takes full advantage of automated geometric measuring, leading to fast processing. The proposed approach easily processes a large number of images from different epochs and enables the creation of registered image-based point clouds without the use of extensive ground control point information or further processing such as interpretation and image correlation. The produced results are promising for use in the field of landslide research.

  16. Rapid Assessment of Protected area Pressures and Threats in ...

    African Journals Online (AJOL)

    Regular evaluation of protected area operations can enable policy makers develop strategic responses to pervasive management problems. Pressures and threats in seven National Parks of the National Park Service (NPS) were therefore assessed using the Rapid Assessment and Prioritization of Protected Area ...

  17. Collective Study On Security Threats In VOIP Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Zulkifl Hasan

    2017-01-01

    Full Text Available The Collective study will critically evaluate the voice over internet protocol VOIP Security threats issues amp challenges in the communication over the network the solution provided by different vendors. Authors will be discussing all security issues different protocols but main focus will be on SIP protocol its implementation and vendors VOIP security system.

  18. rapid assessment of protected area pressures and threats in nigeria ...

    African Journals Online (AJOL)

    BARTH

    Regular evaluation of protected area operations can enable policy makers develop strategic responses to pervasive management problems. Pressures and threats in seven National Parks of the National Park Service (NPS) were therefore assessed using the Rapid Assessment and Prioritization of Protected Area ...

  19. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  20. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  1. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  2. Evaluation of computer-based ultrasonic inservice inspection systems

    Energy Technology Data Exchange (ETDEWEB)

    Harris, R.V. Jr.; Angel, L.J.; Doctor, S.R.; Park, W.R.; Schuster, G.J.; Taylor, T.T. [Pacific Northwest Lab., Richland, WA (United States)

    1994-03-01

    This report presents the principles, practices, terminology, and technology of computer-based ultrasonic testing for inservice inspection (UT/ISI) of nuclear power plants, with extensive use of drawings, diagrams, and LTT images. The presentation is technical but assumes limited specific knowledge of ultrasonics or computers. The report is divided into 9 sections covering conventional LTT, computer-based LTT, and evaluation methodology. Conventional LTT topics include coordinate axes, scanning, instrument operation, RF and video signals, and A-, B-, and C-scans. Computer-based topics include sampling, digitization, signal analysis, image presentation, SAFI, ultrasonic holography, transducer arrays, and data interpretation. An evaluation methodology for computer-based LTT/ISI systems is presented, including questions, detailed procedures, and test block designs. Brief evaluations of several computer-based LTT/ISI systems are given; supplementary volumes will provide detailed evaluations of selected systems.

  3. Evaluation of computer-based ultrasonic inservice inspection systems

    International Nuclear Information System (INIS)

    Harris, R.V. Jr.; Angel, L.J.; Doctor, S.R.; Park, W.R.; Schuster, G.J.; Taylor, T.T.

    1994-03-01

    This report presents the principles, practices, terminology, and technology of computer-based ultrasonic testing for inservice inspection (UT/ISI) of nuclear power plants, with extensive use of drawings, diagrams, and LTT images. The presentation is technical but assumes limited specific knowledge of ultrasonics or computers. The report is divided into 9 sections covering conventional LTT, computer-based LTT, and evaluation methodology. Conventional LTT topics include coordinate axes, scanning, instrument operation, RF and video signals, and A-, B-, and C-scans. Computer-based topics include sampling, digitization, signal analysis, image presentation, SAFI, ultrasonic holography, transducer arrays, and data interpretation. An evaluation methodology for computer-based LTT/ISI systems is presented, including questions, detailed procedures, and test block designs. Brief evaluations of several computer-based LTT/ISI systems are given; supplementary volumes will provide detailed evaluations of selected systems

  4. Evaluating Functional and Structural Condition Based Maintenances of Airfield Pavements

    Directory of Open Access Journals (Sweden)

    Tarefder R.

    2013-01-01

    Full Text Available This study evaluates airfield pavements’ functional- and structural-condition to determine the most economical maintenance method. As a part of the analysis, Pavement Condition Index (PCI for several runways, taxiways, and aprons has been determined by MicroPAVER. Structural evaluation of airport pavements has been performed by Falling Weight Deflectometer (FWD test. Evaluation of Layer Moduli and Overlay Design (ELMOD also determines the required overlay thickness based on the E-values, i.e. FWD data analysis. Damage analysis determines the time of repeated overlay application. In addition, functional parameters have been included to determine the time of functional maintenance. Maintenance and rehabilitation alternatives have been selected to develop different program strategies. Life Cycle Cost Analysis (LCCA has been performed to determine the maintenance cost. Structural condition based maintenance cost is compared to functional condition based maintenance cost. Comparison shows that structural condition based approach yields cheaper maintenance strategies than functional condition based maintenance approach.

  5. Research on Livable Community Evaluation Based on GIS

    Science.gov (United States)

    Yin, Zhangcai; Wu, Yang; Jin, Zhanghaonan; Zhang, Xu

    2018-01-01

    Community is the basic unit of the city. Research on livable community could provide a bottom-up research path for the realization of livable city. Livability is the total factor affecting the quality of community life. In this paper, livable community evaluation indexes are evaluated based on GIS and fuzzy comprehensive evaluation method. Then the sum-index and sub-index of community livability are both calculated. And community livable evaluation index system is constructed based on the platform of GIS. This study provides theoretical support for the construction and management of livable communities, so as to guide the development and optimization of city.

  6. Stereotype Threat and College Academic Performance: A Latent Variables Approach*

    Science.gov (United States)

    Owens, Jayanti; Massey, Douglas S.

    2013-01-01

    Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using summed indicators and predicted relationships modeled using ordinary least squares. Using the National Longitudinal Survey of Freshman, this study overcomes previous methodological shortcomings by developing a latent construct model of stereotype threat. Theoretical constructs and equations are estimated simultaneously from multiple indicators, yielding a more reliable, valid, and parsimonious test of key propositions. Findings additionally support the view that social stigma can indeed have strong negative effects on the academic performance of pejoratively stereotyped racial-minority group members, not only in laboratory settings, but also in the real world. PMID:23950616

  7. Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model

    Directory of Open Access Journals (Sweden)

    Zehui Wu

    2017-01-01

    Full Text Available SDN-based controller, which is responsible for the configuration and management of the network, is the core of Software-Defined Networks. Current methods, which focus on the secure mechanism, use qualitative analysis to estimate the security of controllers, leading to inaccurate results frequently. In this paper, we employ a quantitative approach to overcome the above shortage. Under the analysis of the controller threat model we give the formal model results of the APIs, the protocol interfaces, and the data items of controller and further provide our Threat/Effort quantitative calculation model. With the help of Threat/Effort model, we are able to compare not only the security of different versions of the same kind controller but also different kinds of controllers and provide a basis for controller selection and secure development. We evaluated our approach in four widely used SDN-based controllers which are POX, OpenDaylight, Floodlight, and Ryu. The test, which shows the similarity outcomes with the traditional qualitative analysis, demonstrates that with our approach we are able to get the specific security values of different controllers and presents more accurate results.

  8. Frequently updated noise threat maps created with use of supercomputing grid

    Directory of Open Access Journals (Sweden)

    Szczodrak Maciej

    2014-09-01

    Full Text Available An innovative supercomputing grid services devoted to noise threat evaluation were presented. The services described in this paper concern two issues, first is related to the noise mapping, while the second one focuses on assessment of the noise dose and its influence on the human hearing system. The discussed serviceswere developed within the PL-Grid Plus Infrastructure which accumulates Polish academic supercomputer centers. Selected experimental results achieved by the usage of the services proposed were presented. The assessment of the environmental noise threats includes creation of the noise maps using either ofline or online data, acquired through a grid of the monitoring stations. A concept of estimation of the source model parameters based on the measured sound level for the purpose of creating frequently updated noise maps was presented. Connecting the noise mapping grid service with a distributed sensor network enables to automatically update noise maps for a specified time period. Moreover, a unique attribute of the developed software is the estimation of the auditory effects evoked by the exposure to noise. The estimation method uses a modified psychoacoustic model of hearing and is based on the calculated noise level values and on the given exposure period. Potential use scenarios of the grid services for research or educational purpose were introduced. Presentation of the results of predicted hearing threshold shift caused by exposure to excessive noise can raise the public awareness of the noise threats.

  9. Assessment of wind erosion threat for soils in cadastral area of Hajske

    International Nuclear Information System (INIS)

    Muchova, Z.; Stredanska, A.

    2008-01-01

    This contribution illustrates the application of methods of erosion threat assessment in lan adaptation projects. Calculations of the soil erosion index of particular soil blocks are demonstrated for the cadastral area of Hajske. Two methods for assessment of erosion threat have been applied. First the assessment based on the ecological soil-quality units (ESQU) has been performed. Next, the Pasak method for a detailed analysis of the soil erosion threat was applied. Both of the mentioned approaches are recommended for the land adaption projects. Based on the results, the soil blocks have been ranked by their soil erosion threat. (authors)

  10. Report card: an evaluation of a concept-based curriculum.

    Science.gov (United States)

    Giddens, Jean Foret; Morton, Nancy

    2010-01-01

    This article describes the evaluation of an innovative, concept-based baccalaureate nursing curriculum. Curriculum evaluation is an ongoing process that serves to ensure the delivery of quality education. Findings from surveys and focus groups identified strengths of the new curriculum as the conceptual approach, interactive small-group learning activities, clinical intensives, and early patient care experiences. Issues and challenges identified in the evaluation included perceived repetition of content in the Professional Nursing concept courses, coordination of community-based clinical experiences, a perceived need for greater age-span, pharmacology, and pathophysiology content, and NCLEX-RN preparation. Curriculum revisions based on these findings are described.

  11. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  12. Using resilience and resistance concepts to manage persistent threats to sagebrush ecosystems and greater sage-grouse

    Science.gov (United States)

    Jeanne C. Chambers; Jeremy D. Maestas; David A. Pyke; Chad S. Boyd; Mike Pellant; Amarina Wuenschel

    2017-01-01

    Conservation of imperiled species often demands addressing a complex suite of threats that undermine species viability. Regulatory approaches, such as the US Endangered Species Act (1973), tend to focus on anthropogenic threats through adoption of policies and regulatory mechanisms. However, persistent ecosystem-based threats, such as invasive species and altered...

  13. Conceptualizing threats to tobacco control from international economic agreements: the Brazilian experience.

    Science.gov (United States)

    Drope, Jeffrey; McGrady, Benn; Bialous, Stella Aguinaga; Lencucha, Raphael; Silva, Vera Luiza da Costa E

    2017-10-19

    Using the results of dozens of interviews with key actors involved in tobacco control policymaking, we examine these actors' perceptions of threats to tobacco control policy efforts from international economic policies on trade and investment. We also evaluate, from a legal perspective, the genuine threats that exist or potential challenges that economic policies may pose to the Brazilian government's public health efforts. We find that most actors did not perceive these economic policies as a major threat to tobacco control. Objectively, we found that some threats do exist. For example, Brazil's attempt to ban most tobacco additives and flavorings continues to met resistance at the World Trade Organization.

  14. Risk assessment of groundwater contamination: a multilevel fuzzy comprehensive evaluation approach based on DRASTIC model.

    Science.gov (United States)

    Zhang, Qiuwen; Yang, Xiaohong; Zhang, Yan; Zhong, Ming

    2013-01-01

    Groundwater contamination is a serious threat to water supply. Risk assessment of groundwater contamination is an effective way to protect the safety of groundwater resource. Groundwater is a complex and fuzzy system with many uncertainties, which is impacted by different geological and hydrological factors. In order to deal with the uncertainty in the risk assessment of groundwater contamination, we propose an approach with analysis hierarchy process and fuzzy comprehensive evaluation integrated together. Firstly, the risk factors of groundwater contamination are identified by the sources-pathway-receptor-consequence method, and a corresponding index system of risk assessment based on DRASTIC model is established. Due to the complexity in the process of transitions between the possible pollution risks and the uncertainties of factors, the method of analysis hierarchy process is applied to determine the weights of each factor, and the fuzzy sets theory is adopted to calculate the membership degrees of each factor. Finally, a case study is presented to illustrate and test this methodology. It is concluded that the proposed approach integrates the advantages of both analysis hierarchy process and fuzzy comprehensive evaluation, which provides a more flexible and reliable way to deal with the linguistic uncertainty and mechanism uncertainty in groundwater contamination without losing important information.

  15. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  16. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  17. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    Science.gov (United States)

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  18. Evaluating energy saving system of data centers based on AHP and fuzzy comprehensive evaluation model

    Science.gov (United States)

    Jiang, Yingni

    2018-03-01

    Due to the high energy consumption of communication, energy saving of data centers must be enforced. But the lack of evaluation mechanisms has restrained the process on energy saving construction of data centers. In this paper, energy saving evaluation index system of data centers was constructed on the basis of clarifying the influence factors. Based on the evaluation index system, analytical hierarchy process was used to determine the weights of the evaluation indexes. Subsequently, a three-grade fuzzy comprehensive evaluation model was constructed to evaluate the energy saving system of data centers.

  19. Network Monitoring for Web-Based Threats

    Science.gov (United States)

    2011-02-01

    Using the HTP Package [49] 52 Figure 5-42: SQL Injection Using the CXTSYS Package [49] 52 Figure 5-43: Bypassing the PL/SQL Exclusion List with...to packages that form the PL/SQL Web Toolkit, such as the OWA and HTP packages. One package of note is the OWA_UTIL package, which contains a...produced by the PL/SQL Cartridge on date" CMU/SEI-2011-TR-005 | 52 Figure 5-40: SQL Injection Using the OWA_UTIL Package [49] In addition, the HTP

  20. Brillouin Spectroscopy Data Base for Biological Threats

    National Research Council Canada - National Science Library

    Rubel, Glenn

    2003-01-01

    .... Brillouin scattering from DNA, ovalbumen, the Bacillus spores globigii and thuringiensis were measured to determine the feasibility of biological material discrimination using Brillouin scattering...

  1. Threat Based Risk Assessment for Enterprise Networks

    Science.gov (United States)

    2016-02-15

    Weller-Fahy, and Tamara Yu. References 1. G. Greenwald, No Place to Hide: Edward Snowden , the NSA, and the U.S. Surveillance State. London: Hamish...devastating insider attacks, Edward Snowden exfiltrated 1.7 million documents from the National Security Agency [1]. That same year, the security company

  2. Model Based Analysis of Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Han, Tingting; Kammueller, Florian

    2016-01-01

    In order to detect malicious insider attacks it is important to model and analyse infrastructures and policies of organisations and the insiders acting within them. We extend formal approaches that allow modelling such scenarios by quantitative aspects to enable a precise analysis of security...

  3. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  4. Smartphone-based evaluations of clinical placements—a useful complement to web-based evaluation tools

    Directory of Open Access Journals (Sweden)

    Jesper Hessius

    2015-11-01

    Full Text Available Purpose: Web-based questionnaires are currently the standard method for course evaluations. The high rate of smartphone adoption in Sweden makes possible a range of new uses, including course evaluation. This study examines the potential advantages and disadvantages of using a smartphone app as a complement to web-based course evaluationsystems. Methods: An iPhone app for course evaluations was developed and interfaced to an existing web-based tool. Evaluations submitted using the app were compared with those submitted using the web between August 2012 and June 2013, at the Faculty of Medicine at Uppsala University, Sweden. Results: At the time of the study, 49% of the students were judged to own iPhones. Over the course of the study, 3,340 evaluations were submitted, of which 22.8% were submitted using the app. The median of mean scores in the submitted evaluations was 4.50 for the app (with an interquartile range of 3.70-5.20 and 4.60 (3.70-5.20 for the web (P=0.24. The proportion of evaluations that included a free-text comment was 50.5% for the app and 49.9% for the web (P=0.80. Conclusion: An app introduced as a complement to a web-based course evaluation system met with rapid adoption. We found no difference in the frequency of free-text comments or in the evaluation scores. Apps appear to be promising tools for course evaluations. web-based course evaluation system met with rapid adoption. We found no difference in the frequency of free-text comments or in the evaluation scores. Apps appear to be promising tools for course evaluations.

  5. Smartphone-based evaluations of clinical placements-a useful complement to web-based evaluation tools.

    Science.gov (United States)

    Hessius, Jesper; Johansson, Jakob

    2015-01-01

    Web-based questionnaires are currently the standard method for course evaluations. The high rate of smartphone adoption in Sweden makes possible a range of new uses, including course evaluation. This study examines the potential advantages and disadvantages of using a smartphone app as a complement to web-based course evaluationsystems. An iPhone app for course evaluations was developed and interfaced to an existing web-based tool. Evaluations submitted using the app were compared with those submitted using the web between August 2012 and June 2013, at the Faculty of Medicine at Uppsala University, Sweden. At the time of the study, 49% of the students were judged to own iPhones. Over the course of the study, 3,340 evaluations were submitted, of which 22.8% were submitted using the app. The median of mean scores in the submitted evaluations was 4.50 for the app (with an interquartile range of 3.70-5.20) and 4.60 (3.70-5.20) for the web (P=0.24). The proportion of evaluations that included a free-text comment was 50.5% for the app and 49.9% for the web (P=0.80). An app introduced as a complement to a web-based course evaluation system met with rapid adoption. We found no difference in the frequency of free-text comments or in the evaluation scores. Apps appear to be promising tools for course evaluations. web-based course evaluation system met with rapid adoption. We found no difference in the frequency of free-text comments or in the evaluation scores. Apps appear to be promising tools for course evaluations.

  6. Multivariate Methods Based Soft Measurement for Wine Quality Evaluation

    Directory of Open Access Journals (Sweden)

    Shen Yin

    2014-01-01

    a decision. However, since the physicochemical indexes of wine can to some extent reflect the quality of wine, the multivariate statistical methods based soft measure can help the oenologist in wine evaluation.

  7. An Evaluation of Knowledge Base Systems for Large OWL Datasets

    National Research Council Canada - National Science Library

    Guo, Yuanbo; Pan, Zhengxiang; Heflin, Jeff

    2004-01-01

    .... To this end, we have developed the Lehigh University Benchmark (LUBM). The benchmark is intended to evaluate knowledge base systems with respect to extensional queries over a large dataset that commits to a single realistic ontology...

  8. Development of an evaluation matrix for a community-based ...

    African Journals Online (AJOL)

    ... matrix based on the Concept-Indicator-Method, which served as the organising framework for the evaluation. The focus of the evaluation was on assessing the perceived effectiveness and impact on the stakeholders of the course so as to direct the teaching and learning of health promotion at higher education institutions.

  9. Performance and Security Evaluation of Biometric-Based Web ...

    African Journals Online (AJOL)

    This paper evaluates the performance and security of biometric based web application, narrating the importance and challenges of using biometric to identify individuals in the web. To evaluate the system, Student Attendance Monitoring System was developed using java technology and MYSQL as the backend. The system ...

  10. Evaluation of a Community-Based Aging Intervention Program

    Science.gov (United States)

    Hsu, Hui-Chuan; Wang, Chun-Hou; Chen, Yi-Chun; Chang, Ming-Chen; Wang, Jean

    2010-01-01

    This study evaluated the outcome and process of a community-based aging intervention program for the elderly in Taiwan. The program included education on nutrition and dietary behavior and on physical activities. Outcome and process evaluations were conducted. The program may have had some effects on decreasing some dietary behavioral problems and…

  11. Chemical and organoleptic evaluation of Moi-moi based on ...

    African Journals Online (AJOL)

    Chemical and organoleptic evaluation of Moi-moi based on fermented wateryam, Cocoyam, plantain, African yam bean, cowpea, pigeon pea and corn flours. ... The nutrient content of the moi-moi and its organoleptic properties were evaluated using standard procedures. ... http://dx.doi.org/10.4314/jbi.v5i1.30421.

  12. Evaluating potentialities and constrains of Problem Based Learning curriculum

    DEFF Research Database (Denmark)

    Guerra, Aida

    2013-01-01

    This paper presents a research design to evaluate Problem Based Learning (PBL) curriculum potentialities and constrains for future changes. PBL literature lacks examples of how to evaluate and analyse established PBL learning environments to address new challenges posed. The research design enclo...

  13. Countering 21st Century Threats

    DEFF Research Database (Denmark)

    Scharling Pedersen, Peter; Pillai, Chad M.; Hun, Lee Jae

    2015-01-01

    The United States and its Allies confront an increasingly volatile world where threats range from traditional state-on-state challenges to non-state transnational networks. To successfully combat these 21st Century problems, in an era of resource and geo-political power constraints, the U...... to be addressed in order to successfully conduct IW. As result of researching the issues associated with developing a JIIM approach to IW, the paper makes the following recommendations: • Establishing universally accepted concepts and doctrines for IW, UW, Foreign Internal Defense (FID), Counter Insurgency (COIN......), Counter-Terrorism (CT), and Security and Stability Operations (SSO). • Establishing a construct that allows a strategic Whole-of-Government capacity for operations coordinated by joint interagency task forces. • Continue to developing the Global SOF network. • Increased intelligence sharing in areas...

  14. Emotion blocks the path to learning under stereotype threat.

    Science.gov (United States)

    Mangels, Jennifer A; Good, Catherine; Whiteman, Ronald C; Maniscalco, Brian; Dweck, Carol S

    2012-02-01

    Gender-based stereotypes undermine females' performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback related negativity (FRN), P3a], as well as any subsequent sustained attention/arousal to that information [late positive potential (LPP)]. Learning was defined as success in applying tutorial information to correction of initial test errors on a surprise retest 24-h later. Under non-threat conditions, emotional responses to negative feedback did not curtail exploration of the tutor, and the amount of tutor exploration predicted learning success. In the stereotype threat condition, however, greater initial salience of the failure (FRN) predicted less exploration of the tutor, and sustained attention to the negative feedback (LPP) predicted poor learning from what was explored. Thus, under stereotype threat, emotional responses to negative feedback predicted both disengagement from learning and interference with learning attempts. We discuss the importance of emotion regulation in successful rebound from failure for stigmatized groups in stereotype-salient environments.

  15. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches. © 2014 Society for Conservation Biology.

  16. Managing threats from emerging technologies: can safeguards show the way?

    International Nuclear Information System (INIS)

    Leffer, Teri N.

    2014-01-01

    The system of international nuclear safeguards implemented by the International Atomic Energy Agency (IAEA) is primarily a means of verification of states’ commitments under various legal instruments, principally the Nuclear Non‑Proliferation Treaty (NPT), to utilize controlled nuclear fission for peaceful purposes only. However, the safeguards system can also be seen as a mechanism through which states acted to reduce the threat posed by a new technology that had a transformative impact on existing national security paradigms when it emerged in the twentieth century. In the twenty‑first century, new technologies with equally profound national security implications are emerging. These include biotechnology and synthetic biology, nano technology, information technology, cognitive science, robotics and artificial intelligence. Throughout its history, the safeguards system has evolved to accommodate new technologies, new undertakings and new threats. Because multiple emerging technologies now constitute potential national security threats, it is appropriate to consider whether and how the lessons and successes of the safeguards system, including its capacity to evolve in response to changing requirements, could be leveraged to mitigate the threat posed by these new technologies. This paper addresses the possibility of re‑imagining safeguards in a way that makes them applicable to a broader range of technology‑based threats without compromising their effectiveness for their original purpose.

  17. Security Threats in the 21st Century

    Science.gov (United States)

    2006-11-01

    Power Conflict • Rise of China • Rise of India • Return of Russia • EU-Europe and NATO • Japan’s dilemma • Changing alliances? Threat 2 Climate Change...tomorrow. Anon. Security Threats 1. Return of great power conflict 2. Climate change 3. Uneven development 4. Overpopulation , migration, pandemics...Threat 4 Overpopulation , Migration, Pandemics • Climate change means overpopulation • Mass migrations are unstoppable • Migrations mean conflict and

  18. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  19. Extracting Cyber Threat Intelligence From Hacker Forums

    OpenAIRE

    Deliu, Isuf

    2017-01-01

    The use of more sophisticated tools and methods from cyber criminals has urged the cyber security community to look for enhancements to traditional security controls. Cyber Threat Intelligence represents one such proactive approach and includes the collection and analysis of information for potential threats from multiple diverse sources of data. The objective is to understand the methodology that different threat actors are using to launch their campaigns, and proactively adapt security cont...

  20. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  1. Influence of security threats on tourism destination development

    Directory of Open Access Journals (Sweden)

    Kurež Bojan

    2015-01-01

    Full Text Available The aim of the paper is to analyze the modern security environment and its impact on tourism destination development. Contemporary security environment is a result of historical events affected by the elements of the contemporary safety and political environment. Ground security concepts, which dominate contemporary security environment, are pointed out and further linked to the development of the modern security threats shaping tourism destination development. We are pointing out how the major security threats influence the tourism destination development. Methodology is based on secondary analysis of literature. Several current case studies are made to support conclusions on relationship between security and tourism destination developments.

  2. On the experience of feeling powerful: perceived power moderates the effect of stereotype threat on women's math performance.

    Science.gov (United States)

    Van Loo, Katie J; Rydell, Robert J

    2013-03-01

    This research examined whether feeling powerful can eliminate the deleterious effect of stereotype threat (i.e., concerns about confirming a negative self-relevant stereotype) on women's math performance. In Experiments 1 and 2, priming women with high power buffered them from reduced math performance in response to stereotype threat instructions, whereas women in the low and control power conditions showed poorer math performance in response to threat. Experiment 3 found that working memory capacity is one mechanism through which power moderates the effect of threat on women's math performance. In the low and control power conditions, women showed reduced working memory capacity in response to stereotype threat, accounting for threat's effect on performance. In contrast, women in the high power condition did not show reductions in working memory capacity or math performance in response to threat. This work demonstrates that perceived power moderates stereotype threat-based performance effects and explains why this occurs.

  3. Network Intrusion Detection with Threat Agent Profiling

    Directory of Open Access Journals (Sweden)

    Tomáš Bajtoš

    2018-01-01

    Full Text Available With the increase in usage of computer systems and computer networks, the problem of intrusion detection in network security has become an important issue. In this paper, we discuss approaches that simplify network administrator’s work. We applied clustering methods for security incident profiling. We consider K-means, PAM, and CLARA clustering algorithms. For this purpose, we used data collected in Warden system from various security tools. We do not aim to differentiate between normal and abnormal network traffic, but we focus on grouping similar threat agents based on attributes of security events. We suggest a case of a fine classification and a case of a coarse classification and discuss advantages of both cases.

  4. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  5. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  6. How English Learners Manage Face Threats in MSN Conversations

    Science.gov (United States)

    Hong, Chi-yin

    2012-01-01

    This study explores how low- and intermediate-level English learners manage face threats in MSN conversations. The effects of the addressee's status are also studied. Forty English learners, who were further divided into beginner and intermediate groups according to their English proficiency, participated in this study. Based on six offensive…

  7. Threats and opportunities for post-closure development in dolomitic ...

    African Journals Online (AJOL)

    Based on an analysis of mining impacts and potential threats for post-mining developments provided in Part I, this 2nd paper in a 3-part series aims to stimulate thought, through the discussion of potential opportunities centred on the rich water resources of the area. This is in full recognition of a subsequent need to assess ...

  8. Threats and opportunities for post-closure development in dolomitic ...

    African Journals Online (AJOL)

    Mining-related impacts such as large-scale land degradation associated with dewatering of karstic aquifers and widespread pollution of surface water and groundwater systems are discussed. Based on this, potential threats and opportunities for post-mining scenarios are identified in a series of 3 papers. Part 1 of this series ...

  9. Protecting National Critical Infrastructure against Radiological Threat

    International Nuclear Information System (INIS)

    Yaar, I.; Halevy, I.; Berenstein, Z.; Sharon, A.

    2014-01-01

    responder equipped with a radiation detector or a dosimeter. The main impact of such a radiological attack is the contamination of a large areaxxxii. The size of the contaminated area depends on the type and activity of the radioactive material, on the type and geometry of the dispersion device, on the micro-meteorology conditions and on the cross contamination caused by the movement of people inside the contaminated areaxxxiii. Two experimental programs, G reen Field x xxiv (GF) and R ed House x xxv (RH) were recently conducted in Israel in order to increase the preparedness for a RDD event. The GF program aimed at evaluating the consequences of an outdoor and an indoor explosion of an RDD device; while the RH program aimed at evaluating the outcome of a silent dispersion of a radioactive material inside a building. Based on the results of these two experimental programs, the consequences of a possible RDD attack or a silent indoor dispersion of a radioactive material will be given and the necessary preventative steps that can be taken in order to secure NCI's against these threats will be specified

  10. Inspection Based Evaluation of a Danish Road Bridge

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle

    In this paper it is shown how an inspection-based evaluation of a Danish road bridge may be performed using the BRIDGE1 and BRIDGE2 bridge management systems produced within the EC-supported research programme "Assessment of Performance and Optimal Strategies for Inspection and Maintenance of Con...... of Concrete Structures using Reliability Based Expert Systems"....

  11. Curriculum-Based Evaluation and Math: An Overview

    Science.gov (United States)

    Kelley, Bridget; Hosp, John L.; Howell, Kenneth W.

    2008-01-01

    Poor math performance is a major concern leading the current educational reform agenda. Many educational math critics are claiming a math crisis. Researchers and school personnel are trying to resolve this crisis. Some are looking at curriculum-based evaluation (CBE) as a process for solving this problem. CBE and curriculum-based measurement (CBM)…

  12. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends and describes NNSA’s integrated threat reduction strategy.

  13. How Moral Threat Shapes Laypersons' Engagement With Science.

    Science.gov (United States)

    Bender, Jens; Rothmund, Tobias; Nauroth, Peter; Gollwitzer, Mario

    2016-12-01

    Laypersons' engagement with science has grown over the last decade, especially in Internet environments. While this development has many benefits, scientists also face the challenge of devaluation and public criticism by laypersons. Embedding this phenomenon in social-psychological theories and research on value-behavior correspondence, we investigated moral threat as a factor influencing laypersons' engagement with science. Across three studies, we hypothesized and found that moral values shape the way laypersons evaluate and communicate about science when these values are threatened in a given situation and central to people's self-concept. However, prior research on the underlying mechanism of moral threat effects cannot fully rule out value salience as an alternative explanation. To close this gap, we situationally induced value salience while varying the degree of moral threat (Study 3). Our findings indicate that moral threat amplifies the influence of moral values on laypersons' evaluation of science above and beyond value salience. © 2016 by the Society for Personality and Social Psychology, Inc.

  14. OWL2 benchmarking for the evaluation of knowledge based systems.

    Directory of Open Access Journals (Sweden)

    Sher Afgun Khan

    Full Text Available OWL2 semantics are becoming increasingly popular for the real domain applications like Gene engineering and health MIS. The present work identifies the research gap that negligible attention has been paid to the performance evaluation of Knowledge Base Systems (KBS using OWL2 semantics. To fulfil this identified research gap, an OWL2 benchmark for the evaluation of KBS is proposed. The proposed benchmark addresses the foundational blocks of an ontology benchmark i.e. data schema, workload and performance metrics. The proposed benchmark is tested on memory based, file based, relational database and graph based KBS for performance and scalability measures. The results show that the proposed benchmark is able to evaluate the behaviour of different state of the art KBS on OWL2 semantics. On the basis of the results, the end users (i.e. domain expert would be able to select a suitable KBS appropriate for his domain.

  15. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  16. Hitting a Moving Target: A Strategic Tool for Analyzing Terrorist Threats.

    Science.gov (United States)

    Coleman, Ken; Ishisoko, Noriko; Trounce, Milana; Bernard, Kenneth

    The subject of terrorism risk can be confusing for both the general public and for those responsible for protecting us from attack. Relatively minor terrorist threats are often conflated with much more serious ones, in part because it is hard to quantify either intent or technical ability to carry out an attack. Plotting threats on a "potential mass casualties" versus "ease of obtainment or production" matrix creates some order out of a seemingly endless array of worldwide threats, and it highlights those threats that are in need of more urgent attention. The specific threats on this 2x2 matrix can fall into one or multiple quadrants, which can be qualitatively described as "most dangerous," "dangerous but difficult," "worrisome," and "persistent terror." By placing threats into these quadrants and illustrating movement within and between them, the matrix can help (1) visualize and parse a diverse set of threats, (2) view how threats have changed over time and judge the efficacy of current countermeasures, and (3) evaluate the merit of future actions and investments. Having a dynamic matrix that can visually map the comparative risk of terrorist threat events in toto and that can help us monitor the effectiveness of present and future resource investments can add intellectual rigor to some of the most difficult and daunting decisions pertaining to our nation's safety and security.

  17. Indicators of implicit and explicit social anxiety influence threat-related interpretive bias as a function of working memory capacity

    Science.gov (United States)

    Salemink, Elske; Friese, Malte; Drake, Emily; Mackintosh, Bundy; Hoppitt, Laura

    2013-01-01

    Interpretive biases play a crucial role in anxiety disorders. The aim of the current study was to examine factors that determine the relative strength of threat-related interpretive biases that are characteristic of individuals high in social anxiety. Different (dual process) models argue that both implicit and explicit processes determine information processing biases and behavior, and that their impact is moderated by the availability of executive resources such as working memory capacity (WMC). Based on these models, we expected indicators of implicit social anxiety to predict threat-related interpretive bias in individuals low, but not high in WMC. Indicators of explicit social anxiety should predict threat-related interpretive bias in individuals high, but not low in WMC. As expected, WMC moderated the impact of implicit social anxiety on threat-related interpretive bias, although the simple slope for individuals low in WMC was not statistically significant. The hypotheses regarding explicit social anxiety (with fear of negative evaluation used as an indicator) were fully supported. The clinical implications of these findings are discussed. PMID:23734123

  18. Indicators of implicit and explicit social anxiety influence threat-related interpretive bias as a function of working memory capacity

    Directory of Open Access Journals (Sweden)

    Elske eSalemink

    2013-05-01

    Full Text Available Interpretive biases play a crucial role in anxiety disorders. The aim of the current study was to examine factors that determine the relative strength of threat-related interpretive biases that are characteristic of individuals high in social anxiety. Different (dual process models argue that both implicit and explicit processes determine information processing biases and behaviour, and that their impact is moderated by the availability of executive resources such as working memory capacity (WMC. Based on these models, we expected indicators of implicit social anxiety to predict threat-related interpretive bias in individuals low, but not high in WMC. Indicators of explicit social anxiety should predict threat-related interpretive bias in individuals high, but not low in WMC. As expected, WMC moderated the impact of implicit social anxiety on threat-related interpretive bias, although the simple slope for individuals low in WMC was not statistically significant. The hypotheses regarding explicit social anxiety (with fear of negative evaluation used as an indicator were fully supported. The clinical implications of these findings are discussed.

  19. Evaluating a collaborative IT based research and development project.

    Science.gov (United States)

    Khan, Zaheer; Ludlow, David; Caceres, Santiago

    2013-10-01

    In common with all projects, evaluating an Information Technology (IT) based research and development project is necessary in order to discover whether or not the outcomes of the project are successful. However, evaluating large-scale collaborative projects is especially difficult as: (i) stakeholders from different countries are involved who, almost inevitably, have diverse technological and/or application domain backgrounds and objectives; (ii) multiple and sometimes conflicting application specific and user-defined requirements exist; and (iii) multiple and often conflicting technological research and development objectives are apparent. In this paper, we share our experiences based on the large-scale integrated research project - The HUMBOLDT project - with project duration of 54 months, involving contributions from 27 partner organisations, plus 4 sub-contractors from 14 different European countries. In the HUMBOLDT project, a specific evaluation methodology was defined and utilised for the user evaluation of the project outcomes. The user evaluation performed on the HUMBOLDT Framework and its associated nine application scenarios from various application domains, resulted in not only an evaluation of the integrated project, but also revealed the benefits and disadvantages of the evaluation methodology. This paper presents the evaluation methodology, discusses in detail the process of applying it to the HUMBOLDT project and provides an in-depth analysis of the results, which can be usefully applied to other collaborative research projects in a variety of domains. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. An evaluability assessment of a West Africa based Non-Governmental Organization's (NGO) progressive evaluation strategy.

    Science.gov (United States)

    D'Ostie-Racine, Léna; Dagenais, Christian; Ridde, Valéry

    2013-02-01

    While program evaluations are increasingly valued by international organizations to inform practices and public policies, actual evaluation use (EU) in such contexts is inconsistent. Moreover, empirical literature on EU in the context of humanitarian Non-Governmental Organizations (NGOs) is very limited. The current article focuses on the evaluability assessment (EA) of a West-Africa based humanitarian NGO's progressive evaluation strategy. Since 2007, the NGO has established an evaluation strategy to inform its maternal and child health care user-fee exemption intervention. Using Wholey's (2004) framework, the current EA enabled us to clarify with the NGO's evaluation partners the intent of their evaluation strategy and to design its program logic model. The EA ascertained the plausibility of the evaluation strategy's objectives, the accessibility of relevant data, and the utility for intended users of evaluating both the evaluation strategy and the conditions that foster EU. Hence, key evaluability conditions for an EU study were assured. This article provides an example of EA procedures when such guidance is scant in the literature. It also offers an opportunity to analyze critically the use of EAs in the context of a humanitarian NGO's collaboration with evaluators and political actors. Copyright © 2012 Elsevier Ltd. All rights reserved.

  1. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  2. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  3. Dutch politicians' coping with terrorist threat

    NARCIS (Netherlands)

    Nijdam, Mirjam J.; Gersons, Berthold P. R.; Olff, Miranda

    2010-01-01

    The psychosocial effects of terrorist threat and close protection have never been studied systematically in political leaders. We conducted a study among 12 Dutch politicians and their partners who were living under terrorist threat and close protection in the aftermath of two political murders.

  4. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  5. Perceived migrant threat among migrants in Europe

    NARCIS (Netherlands)

    van der Zwan, Roos; Bles, Per; Lubbers, M.

    2017-01-01

    This research presents a new perspective on migrant integration. It questions the extent that established migrants perceive threats from new migrants, and how that is influenced by natives’ perceived migrant threat. We hypothesized about an acculturation pattern that established migrants will be

  6. Perceived migrant threat among migrants in Europe

    NARCIS (Netherlands)

    Zwan, R. van der; Bles, P.H.; Lubbers, M.

    2017-01-01

    This research presents a new perspective on migrant integration. It questions the extent that established migrants perceive threats from new migrants, and how that is influenced by natives' perceived migrant threat. We hypothesized about an acculturation pattern that established migrants will be

  7. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  8. GLOBAL THREAT LANDSCAPE IN 2018

    Directory of Open Access Journals (Sweden)

    Rohan Gunaratna

    2018-01-01

    Full Text Available The global terrorism threat has become decentralised, unpredictable, hard-to-detect and resilient with regenerative capacities. The global jihadist movements, principally the so-called Islamic State (IS and Al-Qaeda, have glocalised to exploit indigenous grievances, recruit aspiring jihadists and fight for local and global causes. Overall, both IS and Al-Qaeda have become underground terror networks. In 2018, three trends are likely to define the global terrorism landscape: IS is transforming itself from a ‘caliphate’-building entity to a global terrorist movement; IS is decentralising, shifting its centre of gravity from Iraq and Syria to its multiple wilayat and divisions in different countries; Al-Qaeda affiliates in Syria will capitalise on the vacuum left by IS and exploit the fragile and unstable situation in post-IS Syria. In order to prevent IS’ re-emergence and losing the hard-fought victory, it is imperative that the international community address the underlying conditions that facilitated the rise of IS, AlQaeda and other militant groups in Iraq and Syria, the issues that give sustenance to other terrorist and militant groups, and support governments that lack capabilities to fight terrorism

  9. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  10. Data Base on Peer Evaluation of Research in the Netherlands - PER-Base - 1993-2013

    NARCIS (Netherlands)

    van Drooge, L.; de Jong, S.; Faber, M.; Westerheijden, D.

    2013-01-01

    PER-Base contains information on institutional research evaluation in the Netherlands. It covers results from evaluations with the 'Vereniging van Samenwerkende Nederlandse Universiteiten' - VSNU 1993, VSNU 1994 and VSNU 1998 protocols as well as the 'Standard Evaluation Protocol' - SEP 2003-2009

  11. Threats to Parental and Romantic Attachment Figures' Availability and Adult Attachment Insecurity

    Science.gov (United States)

    Holman, Thomas B.; Galbraith, Richard C.; Timmons, Nicole Mead; Steed, April; Tobler, Samuel B.

    2009-01-01

    This study tested hypotheses based on the theoretical idea that threats to parental availability would have a direct effect on later adult attachment insecurity and that this relationship would be partially, but not fully, mediated by threats to the availability of a romantic partner. Participants were 1,063 individuals in a married or unmarried…

  12. Evaluating Emulation-based Models of Distributed Computing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Stephen T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cyber Initiatives; Gabert, Kasimir G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cyber Initiatives; Tarman, Thomas D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Emulytics Initiatives

    2017-08-01

    Emulation-based models of distributed computing systems are collections of virtual ma- chines, virtual networks, and other emulation components configured to stand in for oper- ational systems when performing experimental science, training, analysis of design alterna- tives, test and evaluation, or idea generation. As with any tool, we should carefully evaluate whether our uses of emulation-based models are appropriate and justified. Otherwise, we run the risk of using a model incorrectly and creating meaningless results. The variety of uses of emulation-based models each have their own goals and deserve thoughtful evaluation. In this paper, we enumerate some of these uses and describe approaches that one can take to build an evidence-based case that a use of an emulation-based model is credible. Predictive uses of emulation-based models, where we expect a model to tell us something true about the real world, set the bar especially high and the principal evaluation method, called validation , is comensurately rigorous. We spend the majority of our time describing and demonstrating the validation of a simple predictive model using a well-established methodology inherited from decades of development in the compuational science and engineering community.

  13. Inferences from counterfactual threats and promises.

    Science.gov (United States)

    Egan, Suzanne M; Byrne, Ruth M J

    2012-01-01

    We examine how people understand and reason from counterfactual threats, for example, "if you had hit your sister, I would have grounded you" and counterfactual promises, for example, "if you had tidied your room, I would have given you ice-cream." The first experiment shows that people consider counterfactual threats, but not counterfactual promises, to have the illocutionary force of an inducement. They also make the immediate inference that the action mentioned in the "if" part of the counterfactual threat and promise did not occur. The second experiment shows that people make more negative inferences (modus tollens and denial of the antecedent) than affirmative inferences (modus ponens and affirmation of the consequent) from counterfactual threats and promises, unlike indicative threats and promises. We discuss the implications of the results for theories of the mental representations and cognitive processes that underlie conditional inducements.

  14. Research on Air Quality Evaluation based on Principal Component Analysis

    Science.gov (United States)

    Wang, Xing; Wang, Zilin; Guo, Min; Chen, Wei; Zhang, Huan

    2018-01-01

    Economic growth has led to environmental capacity decline and the deterioration of air quality. Air quality evaluation as a fundamental of environmental monitoring and air pollution control has become increasingly important. Based on the principal component analysis (PCA), this paper evaluates the air quality of a large city in Beijing-Tianjin-Hebei Area in recent 10 years and identifies influencing factors, in order to provide reference to air quality management and air pollution control.

  15. An evaluation of unit-based ethics conversations.

    Science.gov (United States)

    Wocial, Lucia D; Hancock, Maureen; Bledsoe, Patricia D; Chamness, Amy R; Helft, Paul R

    2010-01-01

    Unit-based ethics conversations (UBECs) provide nurses with an opportunity for meaningful conversation about the ethical issues they face in routine clinical practice. The goal of the program is to increase participants' abilities and confidence in dealing with ethically challenging situations. This article reviews results from a formal evaluation of UBECs at one organization. The results of this evaluation suggest the UBEC program provides a transformational ethics experience for nurses.

  16. Voxel-based frog phantom for internal dose evaluation

    International Nuclear Information System (INIS)

    Kinase, Sakae

    2008-01-01

    A voxel-based frog phantom has been developed for radiation protection of the environment. The voxel-based frog phantom was applied to evaluating self-absorbed fractions (self-AFs), which are defined as the fraction of energy emitted by a radiation source that is absorbed within the source organ. The self-AFs were evaluated for both photons and electrons in the spleen, kidneys, and liver using Monte Carlo simulations. Furthermore, self-S values (μGy/MBq·s) for 18 F and 90 Y in the organs were calculated using the results of the self-AFs. Consequently, the voxel-based frog phantom was found to be useful for the organ dose evaluations, which have not been proposed by the International Commission on Radiological Protection (ICRP). It was also confirmed that the self-AFs and self-S values are largely dependent on the mass of the source organ. (author)

  17. A study of combined evaluation of suppliers based on correlation

    Directory of Open Access Journals (Sweden)

    Heting Qiu

    2013-03-01

    Full Text Available Purpose: The Selection of logistics service providers is an important issue in supply chain management. But different evaluation methods may lead to different results, which could cause inconsistent conclusions. This paper makes use of a new perspective to combine with a variety of methods to eliminate the deviation of different single evaluation methods. Design/methodology/approach: This paper expounds the application of the combined evaluation method based on correlation. Entropy method, factor analysis, grey colligation evaluation and AHP have been used for research. Findings: According to the evaluate result, the ranking of suppliers obtained by each method have obvious differences. The result shows that combined evaluation method can eliminate the deviation of different single evaluation methods. Originality/value: The combined evaluation method makes up for the defects of single evaluation methods and obtains a result that is more stable and creditable with smaller deviation. This study can provide the enterprise leaders with more scientific method to select their cooperative companies. 

  18. ITAC, an insider threat assessment computer program

    International Nuclear Information System (INIS)

    Eggers, R.F.; Giese, E.W.

    1988-01-01

    The insider threat assessment computer program, ITAC, is used to evaluate the vulnerability of nuclear material processing facilities to theft of special nuclear material by one or more authorized insider adversaries. The program includes two main parts: one is used to determine the timeliness of nuclear material accounting tests for loss of special nuclear material, and the other determines pathway aggregate detection probabilities for physical protection systems and material control procedures that could detect the theft. Useful features of ITAC include its ability to (1) evaluate and quantify the timeliness of material accounting tests, (2) analyze branching systems of physical pathways and adversary strategies, (3) analyze trickle or abrupt theft situations for combinations of insiders, (4) accept input probabilities and times in the form of ranges rather than discrete points, and (5) simulate input data using Monte Carlo methods to produce statistically distributed aggregate delay times and detection probabilities. The ITAC program was developed by the Security Applications Center of Westinghouse Hanford Comapny and Boeing Computer Services, Richland, WA

  19. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  20. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  1. What Is Going On Around Here? Intolerance of Uncertainty Predicts Threat Generalization.

    Directory of Open Access Journals (Sweden)

    Jayne Morriss

    Full Text Available Attending to stimuli that share perceptual similarity to learned threats is an adaptive strategy. However, prolonged threat generalization to cues signalling safety is considered a core feature of pathological anxiety. One potential factor that may sustain over-generalization is sensitivity to future threat uncertainty. To assess the extent to which Intolerance of Uncertainty (IU predicts threat generalization, we recorded skin conductance in 54 healthy participants during an associative learning paradigm, where threat and safety cues varied in perceptual similarity. Lower IU was associated with stronger discrimination between threat and safety cues during acquisition and extinction. Higher IU, however, was associated with generalized responding to threat and safety cues during acquisition, and delayed discrimination between threat and safety cues during extinction. These results were specific to IU, over and above other measures of anxious disposition. These findings highlight: (1 a critical role of uncertainty-based mechanisms in threat generalization, and (2 IU as a potential risk factor for anxiety disorder development.

  2. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism.

  3. Analytical evaluation of computer-based decision aids

    International Nuclear Information System (INIS)

    Kisner, R.A.

    1985-01-01

    This paper introduces a method for evaluating decision aids for nuclear power plant operators. The method involves a two-stage process of classification and analytical evaluation of display form and content. The classification scheme relates each specific aid to one or more general decision-making tasks. Evaluation then proceeds using a normative top-down design process based on the classification scheme by determining or deducing how various design issues associated with this process were resolved by the designer. The result is an assessment of the ''understandability'' of the aid as well as identification of the training and display features necessary to ensure understandability. 7 refs., 4 figs., 1 tab

  4. A online credit evaluation method based on AHP and SPA

    Science.gov (United States)

    Xu, Yingtao; Zhang, Ying

    2009-07-01

    Online credit evaluation is the foundation for the establishment of trust and for the management of risk between buyers and sellers in e-commerce. In this paper, a new credit evaluation method based on the analytic hierarchy process (AHP) and the set pair analysis (SPA) is presented to determine the credibility of the electronic commerce participants. It solves some of the drawbacks found in classical credit evaluation methods and broadens the scope of current approaches. Both qualitative and quantitative indicators are considered in the proposed method, then a overall credit score is achieved from the optimal perspective. In the end, a case analysis of China Garment Network is provided for illustrative purposes.

  5. Chronic illness in the workplace: stigma, identity threat and strain.

    Science.gov (United States)

    McGonagle, Alyssa K; Barnes-Farrell, Janet L

    2014-10-01

    Chronic illness affects a large and growing number of workers in the United States and globally. Stigmatization (devaluation) at work based on chronic illness may be stressful for individuals and therefore may lead to negative psychological consequences (i.e. strains). In order to better understand stressful experiences of stigma for workers with chronic illnesses, a model of stigma-related identity threat (perceptions that one is at risk of being treated negatively at work because of chronic illness) was tested on a sample of 203 working adults with chronic illnesses. The following variables related to workers' perceptions of chronic illness-related identity threat: workers' boundary flexibility (flexibility in managing their work and life), their meta-perceptions of devaluation (perceptions of others' devaluation of them based on illness) and their job self-efficacy (feelings of confidence related to performing their job). In turn, perceptions of identity threat related to both feelings of psychological strain and (lower levels of) perceived work ability. Surprisingly, neither stigma centrality (how fundamental illness is to one's identity) nor supervisor support related to workers' identity threat perceptions. Copyright © 2013 John Wiley & Sons, Ltd.

  6. Current Status of the Cyber Threat Assessment for Nuclear Facilities

    International Nuclear Information System (INIS)

    Kim, Hyun Doo

    2016-01-01

    In December 2014, unknown hackers hacked internal documents sourced from Korea Hydro and Nuclear Power (KHNP) and those electronic documents were posted five times on a Social Network Service (SNS). The data included personal profiles, flow charts, manuals and blueprints for installing pipes in the nuclear power plant. Although the data were not critical to operation or sabotage of the plant, it threatened people and caused social unrest in Korea and neighboring countries. In December 2015, cyber attack on power grid caused a blackout for hundreds of thousands of people in Ukraine. The power outage was caused by a sophisticated attack using destructive malware called 'BlackEnergy'. Cyber attacks are reality in today's world and critical infrastructures are increasingly targeted. Critical infrastructures, such as the nuclear power plant, need to be proactive and protect the nuclear materials, assets and facilities from potential cyber attacks. The threat assessment document and its detailed procedure are confidential for the State. Nevertheless, it is easy to find cooperation on assessing and evaluating the threats of nuclear materials and facilities with other government departments or agencies including the national police. The NSSC and KINAC also cooperated with the National Intelligence Service (NIS) and National Security Research Institute (NSR). However, robust cyber threat assessment system and regular consultative group should be established with domestic and overseas organization including NIS, NSR, the National Police Agency and the military force to protect and ensure to safety of people, public and environment from rapidly changing and upgrading cyber threats

  7. Current Status of the Cyber Threat Assessment for Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Doo [KINAC, Daejeon (Korea, Republic of)

    2016-05-15

    In December 2014, unknown hackers hacked internal documents sourced from Korea Hydro and Nuclear Power (KHNP) and those electronic documents were posted five times on a Social Network Service (SNS). The data included personal profiles, flow charts, manuals and blueprints for installing pipes in the nuclear power plant. Although the data were not critical to operation or sabotage of the plant, it threatened people and caused social unrest in Korea and neighboring countries. In December 2015, cyber attack on power grid caused a blackout for hundreds of thousands of people in Ukraine. The power outage was caused by a sophisticated attack using destructive malware called 'BlackEnergy'. Cyber attacks are reality in today's world and critical infrastructures are increasingly targeted. Critical infrastructures, such as the nuclear power plant, need to be proactive and protect the nuclear materials, assets and facilities from potential cyber attacks. The threat assessment document and its detailed procedure are confidential for the State. Nevertheless, it is easy to find cooperation on assessing and evaluating the threats of nuclear materials and facilities with other government departments or agencies including the national police. The NSSC and KINAC also cooperated with the National Intelligence Service (NIS) and National Security Research Institute (NSR). However, robust cyber threat assessment system and regular consultative group should be established with domestic and overseas organization including NIS, NSR, the National Police Agency and the military force to protect and ensure to safety of people, public and environment from rapidly changing and upgrading cyber threats.

  8. Attention avoidance of the threat conditioned stimulus during extinction increases physiological arousal generalisation and retention.

    Science.gov (United States)

    O'Malley, Karina R; Waters, Allison M

    2018-05-01

    Exposure therapy is a key component of efficacious treatment for anxiety. Biases in the allocation of attention towards versus away from threat assessed prior to exposure-based treatments such as cognitive-behavioural therapy differentially predict treatment outcomes. However, it is unclear whether monitoring versus avoiding threat stimuli influences learning during exposure. Extinction paradigms are the experimental analogue of exposure therapy. Therefore, manipulating attention towards versus away from threat during extinction trials may shed light on the role of attention during exposure therapy. This study utilised a Pavlovian fear conditioning and extinction paradigm to examine whether directing attention towards versus away from the threat conditioned stimulus (CS+) related to differences in extinction, as indexed by skin conductance responses (SCR), CS evaluations and subjective measures of anxiety. Following a fear conditioning phase in which a dog image (CS+) was paired with an aversive tone unconditioned stimulus (US) and another dog image (CS-) was presented alone, 57 participants were randomly assigned to one of three conditions during extinction in which both CSs were presented alone: monitor the CS+ (N = 19), avoid the CS+ and attend to another stimulus (N = 18), no attention manipulation control (N = 20). Eye movements were monitored for visual adherence to assigned location using horizontal electro-oculogram. In the context of the acquisition of differential conditioning and visual adherence during extinction, both active groups exhibited larger SCRs to the CS + relative to the CS- during the first extinction block compared to the control group, and the avoid group exhibited significantly larger SCRs on CS+ and CS- trials throughout the extinction phase compared to the other groups. The avoid group also exhibited less decline in SCRs to the CS+ during the extinction retest phase relative to the control group. No significant group

  9. Beyond Google: Finding and Evaluating Web-Based Information for Community-Based Nursing Practice*

    OpenAIRE

    Miller, Louise C; Graves, Rebecca S.; Jones, Barbara B.; Sievert, Maryellen C

    2010-01-01

    Nurses are challenged to find and use reliable, credible information to support clinical decision-making and to meet expectations for evidence-based nursing practice. This project targeted practicing public health and school nurses, teaching them how to access and critically evaluate web-based information resources for frontline practice. Health sciences librarians partnered with nursing faculty to develop two participatory workshops to teach skills in searching for and evaluating web-based c...

  10. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  11. Classification and Quality Evaluation of Tobacco Leaves Based on Image Processing and Fuzzy Comprehensive Evaluation

    Science.gov (United States)

    Zhang, Fan; Zhang, Xinhong

    2011-01-01

    Most of classification, quality evaluation or grading of the flue-cured tobacco leaves are manually operated, which relies on the judgmental experience of experts, and inevitably limited by personal, physical and environmental factors. The classification and the quality evaluation are therefore subjective and experientially based. In this paper, an automatic classification method of tobacco leaves based on the digital image processing and the fuzzy sets theory is presented. A grading system based on image processing techniques was developed for automatically inspecting and grading flue-cured tobacco leaves. This system uses machine vision for the extraction and analysis of color, size, shape and surface texture. Fuzzy comprehensive evaluation provides a high level of confidence in decision making based on the fuzzy logic. The neural network is used to estimate and forecast the membership function of the features of tobacco leaves in the fuzzy sets. The experimental results of the two-level fuzzy comprehensive evaluation (FCE) show that the accuracy rate of classification is about 94% for the trained tobacco leaves, and the accuracy rate of the non-trained tobacco leaves is about 72%. We believe that the fuzzy comprehensive evaluation is a viable way for the automatic classification and quality evaluation of the tobacco leaves. PMID:22163744

  12. Providing a Science Base for the Evaluation of Tobacco Products.

    Science.gov (United States)

    Berman, Micah L; Connolly, Greg; Cummings, K Michael; Djordjevic, Mirjana V; Hatsukami, Dorothy K; Henningfield, Jack E; Myers, Matthew; O'Connor, Richard J; Parascandola, Mark; Rees, Vaughan; Rice, Jerry M; Shields, Peter G

    2015-04-01

    Evidence-based tobacco regulation requires a comprehensive scientific framework to guide the evaluation of new tobacco products and health-related claims made by product manufacturers. The Tobacco Product Assessment Consortium (TobPRAC) employed an iterative process involving consortia investigators, consultants, a workshop of independent scientists and public health experts, and written reviews in order to develop a conceptual framework for evaluating tobacco products. The consortium developed a four-phased framework for the scientific evaluation of tobacco products. The four phases addressed by the framework are: (1) pre-market evaluation, (2) pre-claims evaluation, (3) post-market activities, and (4) monitoring and re-evaluation. For each phase, the framework proposes the use of validated testing procedures that will evaluate potential harms at both the individual and population level. While the validation of methods for evaluating tobacco products is an ongoing and necessary process, the proposed framework need not wait for fully validated methods to be used in guiding tobacco product regulation today.

  13. A proposed benchmark problem for cargo nuclear threat monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Holmes, Thomas Wesley, E-mail: twholmes@ncsu.edu [Center for Engineering Applications of Radioisotopes, Nuclear Engineering Department, North Carolina State University, Raleigh, NC 27695-7909 (United States); Calderon, Adan; Peeples, Cody R.; Gardner, Robin P. [Center for Engineering Applications of Radioisotopes, Nuclear Engineering Department, North Carolina State University, Raleigh, NC 27695-7909 (United States)

    2011-10-01

    There is currently a great deal of technical and political effort focused on reducing the risk of potential attacks on the United States involving radiological dispersal devices or nuclear weapons. This paper proposes a benchmark problem for gamma-ray and X-ray cargo monitoring with results calculated using MCNP5, v1.51. The primary goal is to provide a benchmark problem that will allow researchers in this area to evaluate Monte Carlo models for both speed and accuracy in both forward and inverse calculational codes and approaches for nuclear security applications. A previous benchmark problem was developed by one of the authors (RPG) for two similar oil well logging problems (Gardner and Verghese, 1991, ). One of those benchmarks has recently been used by at least two researchers in the nuclear threat area to evaluate the speed and accuracy of Monte Carlo codes combined with variance reduction techniques. This apparent need has prompted us to design this benchmark problem specifically for the nuclear threat researcher. This benchmark consists of conceptual design and preliminary calculational results using gamma-ray interactions on a system containing three thicknesses of three different shielding materials. A point source is placed inside the three materials lead, aluminum, and plywood. The first two materials are in right circular cylindrical form while the third is a cube. The entire system rests on a sufficiently thick lead base so as to reduce undesired scattering events. The configuration was arranged in such a manner that as gamma-ray moves from the source outward it first passes through the lead circular cylinder, then the aluminum circular cylinder, and finally the wooden cube before reaching the detector. A 2 in.x4 in.x16 in. box style NaI (Tl) detector was placed 1 m from the point source located in the center with the 4 in.x16 in. side facing the system. The two sources used in the benchmark are {sup 137}Cs and {sup 235}U.

  14. Multinational Experiment 7. Space: Dependencies, Vulnerabilities and Threats

    Science.gov (United States)

    2012-01-01

    attack. b. Electronic attack ( LASER dazzle , radio frequency jamming, EMP). 4-2 Multinational Experiment 7 Vulnerabilities, Hazards and Threats c...their size, few launcher/payload combinations pose problems for radar detection. Ground-based optical and laser -based systems can also provide...Data collection may be conducted using a range of sensors including ground optical (including laser ranging and imaging) and radar as well as space

  15. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    Science.gov (United States)

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  16. Evaluating a Pivot-Based Approach for Bilingual Lexicon Extraction

    Directory of Open Access Journals (Sweden)

    Jae-Hoon Kim

    2015-01-01

    Full Text Available A pivot-based approach for bilingual lexicon extraction is based on the similarity of context vectors represented by words in a pivot language like English. In this paper, in order to show validity and usability of the pivot-based approach, we evaluate the approach in company with two different methods for estimating context vectors: one estimates them from two parallel corpora based on word association between source words (resp., target words and pivot words and the other estimates them from two parallel corpora based on word alignment tools for statistical machine translation. Empirical results on two language pairs (e.g., Korean-Spanish and Korean-French have shown that the pivot-based approach is very promising for resource-poor languages and this approach observes its validity and usability. Furthermore, for words with low frequency, our method is also well performed.

  17. Physics-based damage predictions for simulating testing and evaluation (T and E) experiments

    Energy Technology Data Exchange (ETDEWEB)

    Addessio, F.L.; Schraad, M.W.; Lewis, M.W.

    1999-03-01

    This is the final report of a two-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). This report addresses the need to develop computational techniques and physics-based material models for simulating damage to weapons systems resulting from ballistic threats. Modern weapons systems, such as fighter aircraft, are becoming more dependent upon composite materials to reduce weight, to increase strength and stiffness, and to resist adverse conditions resulting from high temperatures and corrosion. Unfortunately, damaged components can have severe and detrimental effects, as evidenced by statistics from Desert Storm indicating that 75% of aircraft losses were attributable to fuel system vulnerability with hydrodynamic ram being the primary kill mechanism. Therefore, this project addresses damage predictions for composite systems that are subjected to ballistic threats involving hydrodynamic ram. A computational technique for simulating fluid-solid interaction phenomena and physics-based material models have been developed for this purpose.

  18. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  19. A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, K; Sokkappa, P

    2008-10-29

    This report describes an approach for generating a simulated population of plausible nuclear threat radiation signatures spanning a range of variability that could be encountered by radiation detection systems. In this approach, we develop a statistical model for generating random instances of smuggled nuclear material. The model is based on physics principles and bounding cases rather than on intelligence information or actual threat device designs. For this initial stage of work, we focus on random models using fissile material and do not address scenarios using non-fissile materials. The model has several uses. It may be used as a component in a radiation detection system performance simulation to generate threat samples for injection studies. It may also be used to generate a threat population to be used for training classification algorithms. In addition, we intend to use this model to generate an unclassified 'benchmark' threat population that can be openly shared with other organizations, including vendors, for use in radiation detection systems performance studies and algorithm development and evaluation activities. We assume that a quantity of fissile material is being smuggled into the country for final assembly and that shielding may have been placed around the fissile material. In terms of radiation signature, a nuclear weapon is basically a quantity of fissile material surrounded by various layers of shielding. Thus, our model of smuggled material is expected to span the space of potential nuclear weapon signatures as well. For computational efficiency, we use a generic 1-dimensional spherical model consisting of a fissile material core surrounded by various layers of shielding. The shielding layers and their configuration are defined such that the model can represent the potential range of attenuation and scattering that might occur. The materials in each layer and the associated parameters are selected from probability distributions that

  20. Fish product quality evaluation based on temperature monitoring in ...

    African Journals Online (AJOL)

    Yomi

    2010-09-13

    Sep 13, 2010 ... Key words: Frozen tilapia fillet, temperature, cold chain, shelf-life, total volatile base-nitrogen, sensory ... and use value was seriously affected. The cold chain management (CCM) has become crucial, challenging and important to keep fish product safety due to a .... Quality evaluation and Shelf-life modeling.

  1. Performance evaluation of self-breakdown-based single-gap ...

    Indian Academy of Sciences (India)

    gap plasma cathode electron (PCE) gun (5–20 kV/50–160 A) in argon, gas atmosphere and its performance evaluation based on particle-in-cell (PIC) simulation code `OOPIC-Pro'.The PCE-Gun works in conducting phase (low energy, high ...

  2. Evaluation of Adverse Drug Reactions to Artemisinin-based ...

    African Journals Online (AJOL)

    Purpose: The study was carried out to evaluate the incidence of adverse reactions to antimalarial drugs among residents of a Nigeria university community with a focus on artemisinin-based combination therapy (ACT). Specifically, the profile of use, and the reporting culture of people with respect to experienced reactions ...

  3. Design considerations for CALL based upon evaluation criteria for ...

    African Journals Online (AJOL)

    This article presents a rubric for the evaluation of Computer-Assisted Language Learning (CALL) software based on international recommendations for effective CALL. After a brief overview of the pedagogical and implementation fundamentals of CALL, and a discussion of what should be included in a needs analysis for ...

  4. Evaluation of computer-based library services at Kenneth Dike ...

    African Journals Online (AJOL)

    This study evaluated computer-based library services/routines at Kenneth Dike Library, University of Ibadan. Four research questions were developed and answered. A survey research design was adopted; using questionnaire as the instrument for data collection. A total of 200 respondents randomly selected from 10 ...

  5. Evaluating the performance of survey-based operational management procedures

    NARCIS (Netherlands)

    Pomarede, M.; Hillary, R.; Ibaibarriaga, L.; Bogaards, J.A.; Apostolaki, P.

    2010-01-01

    The design and evaluation of survey-based management strategies is addressed in this article, using three case-study fisheries: North Sea herring, Bay of Biscay anchovy and North Sea cod, with a brief history and the main management issues with each fishery outlined. A range of operational

  6. A Discrepancy-Based Methodology for Nuclear Training Program Evaluation.

    Science.gov (United States)

    Cantor, Jeffrey A.

    1991-01-01

    A three-phase comprehensive process for commercial nuclear power training program evaluation is presented. The discrepancy-based methodology was developed after the Three Mile Island nuclear reactor accident. It facilitates analysis of program components to identify discrepancies among program specifications, actual outcomes, and industry…

  7. Farmer evaluation of dried banana based products | Pekke | African ...

    African Journals Online (AJOL)

    A farmer participatory evaluation of dried banana based products was conducted in various districts of Uganda. Bananas were dried using a tunnel solar dryer developed by Post Harvest Handling and Storage project (PHHS) of Kawanda Post-harvest Programme and improved by the National Banana Research ...

  8. Machine Learning Based Evaluation of Reading and Writing Difficulties.

    Science.gov (United States)

    Iwabuchi, Mamoru; Hirabayashi, Rumi; Nakamura, Kenryu; Dim, Nem Khan

    2017-01-01

    The possibility of auto evaluation of reading and writing difficulties was investigated using non-parametric machine learning (ML) regression technique for URAWSS (Understanding Reading and Writing Skills of Schoolchildren) [1] test data of 168 children of grade 1 - 9. The result showed that the ML had better prediction than the ordinary rule-based decision.

  9. Evaluation of a school-based nutrition and physical activity ...

    African Journals Online (AJOL)

    Objective: This study aimed to evaluate the effectiveness of the Making the Difference programme (MTDP), an educationand activity-based intervention for Grade 4 learners at primary schools in the Western Cape. Design: This was a cross-sectional, post-intervention survey of an existing programme, using control schools ...

  10. How Can Theory-Based Evaluation Make Greater Headway?

    Science.gov (United States)

    Weiss, Carol H.

    1997-01-01

    Explores the problems of theory-based evaluation, describes the nature of potential benefits, and suggests that the benefits are significant enough to warrant continued effort to overcome the obstacles and advance its use. Many of the problems are related to inadequate theories about pathways to desired program outcomes. (SLD)

  11. Evaluation of Topical Gel Bases Formulated with Various Essential ...

    African Journals Online (AJOL)

    Evaluation of Topical Gel Bases Formulated with Various Essential Oils for Antibacterial Activity against Methicillin- Resistant Staphylococcus Aureus. ... Lemon grass and thyme oils were chosen for further studies, including analysis of their composition by gas chromatography–mass spectrometry (GC/MS). Gels were ...

  12. Formative Evaluation of a Web-Based Course in Meteorology.

    Science.gov (United States)

    Phelps, Julia; Reynolds, Ross

    1999-01-01

    Describes the formative-evaluation process for the EuroMET (European Meteorological Education and Training) project, Web-Based university courses in meteorology that were created to address the education and training needs of professional meteorologists and students throughout Europe. Usability and interactive and multimedia elements are…

  13. Evaluation of Sift and Surf for Vision Based Localization

    Science.gov (United States)

    Qu, Xiaozhi; Soheilian, Bahman; Habets, Emmanuel; Paparoditis, Nicolas

    2016-06-01

    Vision based localization is widely investigated for the autonomous navigation and robotics. One of the basic steps of vision based localization is the extraction of interest points in images that are captured by the embedded camera. In this paper, SIFT and SURF extractors were chosen to evaluate their performance in localization. Four street view image sequences captured by a mobile mapping system, were used for the evaluation and both SIFT and SURF were tested on different image scales. Besides, the impact of the interest point distribution was also studied. We evaluated the performances from for aspects: repeatability, precision, accuracy and runtime. The local bundle adjustment method was applied to refine the pose parameters and the 3D coordinates of tie points. According to the results of our experiments, SIFT was more reliable than SURF. Apart from this, both the accuracy and the efficiency of localization can be improved if the distribution of feature points are well constrained for SIFT.

  14. Port performance evaluation tool based on microsimulation model

    Directory of Open Access Journals (Sweden)

    Tsavalista Burhani Jzolanda

    2017-01-01

    Full Text Available As port performance is becoming correlative to national competitiveness, the issue of port performance evaluation has significantly raised. Port performances can simply be indicated by port service levels to the ship (e.g., throughput, waiting for berthing etc., as well as the utilization level of equipment and facilities within a certain period. The performances evaluation then can be used as a tool to develop related policies for improving the port’s performance to be more effective and efficient. However, the evaluation is frequently conducted based on deterministic approach, which hardly captures the nature variations of port parameters. Therefore, this paper presents a stochastic microsimulation model for investigating the impacts of port parameter variations to the port performances. The variations are derived from actual data in order to provide more realistic results. The model is further developed using MATLAB and Simulink based on the queuing theory.

  15. Evaluation-Function-based Model-free Adaptive Fuzzy Control

    Directory of Open Access Journals (Sweden)

    Agus Naba

    2016-12-01

    Full Text Available Designs of adaptive fuzzy controllers (AFC are commonly based on the Lyapunov approach, which requires a known model of the controlled plant. They need to consider a Lyapunov function candidate as an evaluation function to be minimized. In this study these drawbacks were handled by designing a model-free adaptive fuzzy controller (MFAFC using an approximate evaluation function defined in terms of the current state, the next state, and the control action. MFAFC considers the approximate evaluation function as an evaluative control performance measure similar to the state-action value function in reinforcement learning. The simulation results of applying MFAFC to the inverted pendulum benchmark verified the proposed scheme’s efficacy.

  16. Ergonomic evaluation model of operational room based on team performance

    Directory of Open Access Journals (Sweden)

    YANG Zhiyi

    2017-05-01

    Full Text Available A theoretical calculation model based on the ergonomic evaluation of team performance was proposed in order to carry out the ergonomic evaluation of the layout design schemes of the action station in a multitasking operational room. This model was constructed in order to calculate and compare the theoretical value of team performance in multiple layout schemes by considering such substantial influential factors as frequency of communication, distance, angle, importance, human cognitive characteristics and so on. An experiment was finally conducted to verify the proposed model under the criteria of completion time and accuracy rating. As illustrated by the experiment results,the proposed approach is conductive to the prediction and ergonomic evaluation of the layout design schemes of the action station during early design stages,and provides a new theoretical method for the ergonomic evaluation,selection and optimization design of layout design schemes.

  17. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  18. Evaluation of Stallions Based on Linear Description of Their Daughters

    Directory of Open Access Journals (Sweden)

    Barbora Králová

    2017-01-01

    Full Text Available The purpose of our work was an objective evaluation of mares of the Czech warmblood horse based on the linear description, as well as the evaluation of the benefits of stallion breeding based on the linear description of their daughters and – for specific stallions – the evaluation of certain individual exterior traits which are passed on by stallions to their offspring. Stallion horses with at least 7 descendants were used for the evaluation and determination of the values, mares which underwent a linear description of traits at the age of 3 years. For this evaluation we used available data from the year 1996 to 2012, a total including 251 stallions and 4709 mares and more than 500 000 records related to the linear description. The data were gathered from the database of the Central Register of Horse Breeding at Slatińany in the Czech Republic. These data were manually compiled using Excel 2007 and then processed and evaluated according to the objectives of the present study using the linear model GLM as well as the statistical programme Scheffe. The results of the study showed a convincing statistical influence of the stallions on all the monitored exterior traits analyzed on the mares for the father‑factor, and after evaluating all the general exterior traits the statistical difference among the stallions was seen as convincing. We found out that in most cases the breed had no convincing statistical influence on the analyzed traits of the linear description. On the contrary, in terms of the other effects (father and year of measurement we found a convincing statistical influence on all traits of the linear description. For some stallions we evaluated particular traits of linear description, which they pass on to their female offspring using charts and graphics. Afterwards we compared reciprocally certain stallions according to the traits of the linear description.

  19. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Science.gov (United States)

    2012-01-01

    Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic. PMID:23241433

  20. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Directory of Open Access Journals (Sweden)

    Lindberg Nina

    2012-12-01

    Full Text Available Abstract Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic.

  1. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Science.gov (United States)

    Lindberg, Nina; Oksanen, Atte; Sailas, Eila; Kaltiala-Heino, Riittakerttu

    2012-12-15

    Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic.

  2. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  3. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    Science.gov (United States)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  4. Interfacing a biosurveillance portal and an international network of institutional analysts to detect biological threats.

    Science.gov (United States)

    Riccardo, Flavia; Shigematsu, Mika; Chow, Catherine; McKnight, C Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray

    2014-01-01

    The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an

  5. Distracted by the Unthought - Suppression and Reappraisal of Mind Wandering under Stereotype Threat.

    Directory of Open Access Journals (Sweden)

    Carolin Schuster

    Full Text Available Previous research has found that subtle reminders of negative stereotypes about one's group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests. This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women's math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking in stereotype threat (ST and no threat (NT situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT and cognitive regulation strategy (suppression, reappraisal, or no strategy and measured women's performance on a math and a concentration task (N = 113. We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants' math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss

  6. Distracted by the Unthought – Suppression and Reappraisal of Mind Wandering under Stereotype Threat

    Science.gov (United States)

    Schuster, Carolin; Martiny, Sarah E.; Schmader, Toni

    2015-01-01

    Previous research has found that subtle reminders of negative stereotypes about one’s group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women’s math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women’s performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants’ math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss

  7. Distracted by the Unthought - Suppression and Reappraisal of Mind Wandering under Stereotype Threat.

    Science.gov (United States)

    Schuster, Carolin; Martiny, Sarah E; Schmader, Toni

    2015-01-01

    Previous research has found that subtle reminders of negative stereotypes about one's group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women's math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women's performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants' math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss implications for

  8. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  9. Image Encryption Performance Evaluation Based on Poker Test

    Directory of Open Access Journals (Sweden)

    Shanshan Li

    2016-01-01

    Full Text Available The fast development of image encryption requires performance evaluation metrics. Traditional metrics like entropy do not consider the correlation between local pixel and its neighborhood. These metrics cannot estimate encryption based on image pixel coordinate permutation. A novel effectiveness evaluation metric is proposed in this paper to address the issue. The cipher text image is transformed to bit stream. Then, Poker Test is implemented. The proposed metric considers the neighbor correlations of image by neighborhood selection and clip scan. The randomness of the cipher text image is tested by calculating the chi-square test value. Experiment results verify the efficiency of the proposed metrics.

  10. Criteria to evaluate SAT-based training programs

    International Nuclear Information System (INIS)

    Arjona, O.; Venegas, M.; Rodriguez, L.; Lopez, M.

    1997-01-01

    This paper present some coefficients of error obtained to evaluate the quality of the design development and implementation of SAT-based personnel training programs. With the attainment of these coefficients, with the use of the GESAT system, is facilitated the continuos evaluation of training programs and the main deficiencies in the design, development and implementation of training programs are obtained, through the comparison between the program features and their standards or wanted features and doing an statistics analysis of the data kept in the GESAT system

  11. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    Hartmann, Patrick; Apaolaza, Vanessa; D'Souza, Clare; Echebarria, Carmen; Barrutia, Jose M.

    2013-01-01

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  12. Disentangling Islamophobia: The Differential Effects of Symbolic, Realistic, and Terroristic Threat Perceptions as Mediators Between Social Dominance Orientation and Islamophobia

    Directory of Open Access Journals (Sweden)

    Fatih Uenal

    2016-04-01

    Full Text Available The aim of this paper is threefold. First, based on ongoing theoretical discussions on the dimensionality of Islamophobia, this study analyzes whether Islamophobia empirically constitutes a one-dimensional construct or rather a multidimensional construct consisting of anti-Muslim prejudice and anti-Islam sentiment. Second, the effects of symbolic, realistic, and terroristic (safety threats on Islamophobia were analyzed concurrently. Finally, within the framework of the revised Integrated Threat Theory (Stephan & Renfro, 2002, and in order to test the mediating effect of threats, SDO is tested as an antecedent of perceived threat and Islamophobia. Respondents from Berlin (N = 355 participated in an online survey. The results indicate that Islamophobia empirically constitutes a two-dimensional phenomenon, consisting of anti-Muslim and anti-Islam sentiment. Whereas symbolic threat is related to both types of Islamophobia, realistic threat is associated only with anti-Muslim prejudice, and terroristic threat is associated only with anti-Islam sentiment. Finally, the results indicate that the relationship between SDO and both dimensions of Islamophobia is mediated by threats. Symbolic threats mediate the relationships between SDO and both dimensions of Islamophobia. Realistic threats mediate the relationship between SDO and anti-Muslim prejudice and terroristic threats between SDO and anti-Islam sentiment.

  13. Bureaucracy vs. Bioterrorism: Countering a Globalized Threat

    Science.gov (United States)

    2011-02-16

    AIR WAR COLLEGE AIR UNIVERSITY BUREAUCRACY VS. BIOTERRORISM: COUNTERING A GLOBALIZED THREAT by Stephen G. Hoffman, Lt Col, USAF...DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Bureaucracy vs. Bioterrorism: Countering a Globalized Threat 5a. CONTRACT NUMBER...and novel biothreats to our adversaries. Globalization and the increasing availability of knowledge required to develop biothreats coupled with

  14. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  15. Anomaly Detection of IP Header Threats

    OpenAIRE

    S.H.C. Haris, Ghossoon M. Waleed, R.B. Ahmad & M.A.H.A. Ghani

    2011-01-01

    Threats have become a big problem since the past few years as computerviruses are widely recognized as a significant computer threat. However, the roleof Information Technology security must be revisit again since it is too often. ITsecurity managers find themselves in the hopeless situation of trying to uphold amaximum of security as requested from management. At the same time they areconsidered an obstacle in the way of developing and introducing newapplications into business and government...

  16. Development, use and maintenance of the design basis threat. Implementing guide

    International Nuclear Information System (INIS)

    2009-01-01

    In response to a resolution by the IAEA General Conference in September 2002, the IAEA adopted an integrated approach to protection against nuclear terrorism. This approach coordinates IAEA activities concerned with physical protection of nuclear material and nuclear installations, nuclear material accountancy, detection of and response to trafficking in nuclear and other radioactive material, the security of radioactive sources, security in the transport of nuclear and other radioactive material, emergency response and emergency preparedness in Member States and at the IAEA, and promotion of adherence by States to relevant international instruments. The IAEA also helps to identify threats and vulnerability related to the security of nuclear and other radioactive material. However, it is the responsibility of the States to provide for the physical protection of nuclear and other radioactive material and associated facilities, to ensure the security of such material in transport, and to combat illicit trafficking and the inadvertent movement of radioactive material. Physical protection systems are intended to prevent unacceptable consequences arising from malicious activities. The more serious the consequences, the more important it is to have a high degree of confidence that physical protection will be effective as planned. The need for a high level of confidence in the effectiveness of physical protection has long been recognized by those concerned about nuclear material and nuclear facilities. Nuclear material and facilities have the potential for a variety of unacceptable radiological and proliferation consequences if subjected to a malicious act. The highest level of confidence in physical protection demands a close correlation between protective measures and the threat. This approach is firmly grounded in the fundamental principle that physical protection of nuclear assets under the jurisdiction of a State should be based on the State's evaluation of the

  17. Development, Use and Maintenance of the Design Basis Threat. Implementing Guide (Arabic Edition)

    International Nuclear Information System (INIS)

    2009-01-01

    In response to a resolution by the IAEA General Conference in September 2002, the IAEA adopted an integrated approach to protection against nuclear terrorism. This approach coordinates IAEA activities concerned with physical protection of nuclear material and nuclear installations, nuclear material accountancy, detection of and response to trafficking in nuclear and other radioactive material, the security of radioactive sources, security in the transport of nuclear and other radioactive material, emergency response and emergency preparedness in Member States and at the IAEA, and promotion of adherence by States to relevant international instruments. The IAEA also helps to identify threats and vulnerability related to the security of nuclear and other radioactive material. However, it is the responsibility of the States to provide for the physical protection of nuclear and other radioactive material and associated facilities, to ensure the security of such material in transport, and to combat illicit trafficking and the inadvertent movement of radioactive material. Physical protection systems are intended to prevent unacceptable consequences arising from malicious activities. The more serious the consequences, the more important it is to have a high degree of confidence that physical protection will be effective as planned. The need for a high level of confidence in the effectiveness of physical protection has long been recognized by those concerned about nuclear material and nuclear facilities. Nuclear material and facilities have the potential for a variety of unacceptable radiological and proliferation consequences if subjected to a malicious act. The highest level of confidence in physical protection demands a close correlation between protective measures and the threat. This approach is firmly grounded in the fundamental principle that physical protection of nuclear assets under the jurisdiction of a State should be based on the State's evaluation of the

  18. [Inferential evaluation of intimacy based on observation of interpersonal communication].

    Science.gov (United States)

    Kimura, Masanori

    2015-06-01

    How do people inferentially evaluate others' levels of intimacy with friends? We examined the inferential evaluation of intimacy based on the observation of interpersonal communication. In Experiment 1, participants (N = 41) responded to questions after observing conversations between friends. Results indicated that participants inferentially evaluated not only goodness of communication, but also intimacy between friends, using an expressivity heuristic approach. In Experiment 2, we investigated how inferential evaluation of intimacy was affected by prior information about relationships and by individual differences in face-to-face interactional ability. Participants (N = 64) were divided into prior- and no-prior-information groups and all performed the same task as in Experiment 1. Additionally, their interactional ability was assessed. In the prior-information group, individual differences had no effect on inferential evaluation of intimacy. On the other hand, in the no-prior-information group, face-to-face interactional ability partially influenced evaluations of intimacy. Finally, we discuss the fact that to understand one's social environment, it is important to observe others' interpersonal communications.

  19. The Climate Change Education Evidence Base: Lessons Learned from NOAA's Monitoring and Evaluation Framework Implementation

    Science.gov (United States)

    Baek, J.

    2012-12-01

    effort has provided some shared understanding and general guidance, there is still a lack of guidance to make decisions at any level of the community. A recent memorandum from the Office of Management and Budget provides more specific guidance around the generation and utilization of evidence. For example, the amount of funding awarded through grants should be weighted by the level of the evidence supporting a proposed project. As the field of climate change education establishes an evidence base, study designs should address a greater number of internal validity threats through comparison groups and reliable common measures. In addition, OMB invites agencies to develop systematic measurement of costs and costs per outcome. A growing evidence base, one that includes data that includes costs and even monetizes benefits, can inform decisions based on the strongest returns on investments within a portfolio. This paper will provide examples from NOAA's Monitoring and Evaluation Framework Implementation project that illustrate how NOAA is facing these challenges. This is intended to inform climate change educators, evaluators, and researchers in ways to integrate evaluation into the management of their programs while providing insight across the portfolio.

  20. School-based vaccination: a systematic review of process evaluations.

    Science.gov (United States)

    Cooper Robbins, Spring Chenoa; Ward, Kirsten; Skinner, S Rachel

    2011-12-06

    School-based vaccination is becoming a more widely used method of vaccine delivery. However, evaluations of school-based vaccination program implementation have not been systematically reviewed. This paper describes the results of a systematic review of the literature on process (or implementation) evaluations of school-based vaccination delivery. Search terms: "school based vaccination" OR (("schools" OR "school") AND ("immunisation" OR "immunization" OR "vaccination")). Humans; English language; Age: 6-18 (school-age children and adolescents); No editorials; No letters. Databases: PUBMED; Embase.com; Cochrane Database of Systematic Reviews; Cinahl; Web of Science; PsycINFO. Inclusions: Articles must have originated from an advanced economic 'developed' country, be peer-reviewed, available in English, randomised or non-randomised controlled design, published from 1970 to August 2010 and focused on vaccinations provided in the school setting and during school time which reported one or more outcomes. qualitative or descriptive papers without any evaluation component; papers that only reported on impact evaluation (i.e. number of students vaccinated); and those published before 1970. A total of 14 articles were identified as including some element of a process evaluation of a school-based vaccination program. Nurses, parents, teachers, and adolescents were involved in measures of procedural factors related to school-based vaccination implementation. Outcomes included return rates of consent forms; knowledge about the specific vaccine offered; attitudes toward vaccination and school-based vaccination; reasons for non-vaccination; resources, support, and procedures related to implementation; and environmental factors within the school that may impact vaccination success. Vaccination coverage was also reported in the majority of papers. Many studies reported on the importance of ensuring all stakeholders (school nurses, parents, teachers, and adolescents) receive

  1. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  2. Threat driven modeling framework using petri nets for e-learning system.

    Science.gov (United States)

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  3. EVALUATION OF THE WEIGHT-BASED COLLECTION PROJECT IN FARMINGTON, MINNESOTA: A MITE PROGRAM EVALUATION

    Science.gov (United States)

    This project evaluates a test program of a totally automated weight-based refuse disposal rate system. his test program was conducted by the City of Farmington, Minnesota between 1991 and 1993. he intent of the program was to test a mechanism which would automatically assess a fe...

  4. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  5. Tools for evaluating team performance in simulation-based training.

    Science.gov (United States)

    Rosen, Michael A; Weaver, Sallie J; Lazzara, Elizabeth H; Salas, Eduardo; Wu, Teresa; Silvestri, Salvatore; Schiebel, Nicola; Almeida, Sandra; King, Heidi B

    2010-10-01

    Teamwork training constitutes one of the core approaches for moving healthcare systems toward increased levels of quality and safety, and simulation provides a powerful method of delivering this training, especially for face-paced and dynamic specialty areas such as Emergency Medicine. Team performance measurement and evaluation plays an integral role in ensuring that simulation-based training for teams (SBTT) is systematic and effective. However, this component of SBTT systems is overlooked frequently. This article addresses this gap by providing a review and practical introduction to the process of developing and implementing evaluation systems in SBTT. First, an overview of team performance evaluation is provided. Second, best practices for measuring team performance in simulation are reviewed. Third, some of the prominent measurement tools in the literature are summarized and discussed relative to the best practices. Subsequently, implications of the review are discussed for the practice of training teamwork in Emergency Medicine.

  6. [Grades evaluation of Scutellariae Radix slices based on quality constant].

    Science.gov (United States)

    Deng, Zhe; Zhang, Jun; Jiao, Meng-Jiao; Zhong, Wen; Cui, Wen-Jin; Cheng, Jin-Tang; Chen, Sha; Wang, Yue-Sheng; Liu, An

    2017-05-01

    By measuring the morphological indexes and the marker components content of 22 batches of Scutellariae Radix slices as well as calculating the quality constant, this research was aimed to establish a new method of evaluating the specifications and grades of Scutellariae Radix slices. The quality constants of these samples were in the range of 0.04-0.49, which can be divided into several grades based on the real requirement. If they were divided into three grades, the quality constant was ≥0.39 for the first grade, quality constants characterizing both apparent parameters and intrinsic quality can be used as a comprehensive evaluation index to classify the grades of traditional Chinese medicine quantitatively, clearly and objectively. The research results in this paper would provide new ideas and references for evaluating the specifications and grades of traditional Chinese medicines. Copyright© by the Chinese Pharmaceutical Association.

  7. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  8. Reliability evaluation of microgrid considering incentive-based demand response

    Science.gov (United States)

    Huang, Ting-Cheng; Zhang, Yong-Jun

    2017-07-01

    Incentive-based demand response (IBDR) can guide customers to adjust their behaviour of electricity and curtail load actively. Meanwhile, distributed generation (DG) and energy storage system (ESS) can provide time for the implementation of IBDR. The paper focus on the reliability evaluation of microgrid considering IBDR. Firstly, the mechanism of IBDR and its impact on power supply reliability are analysed. Secondly, the IBDR dispatch model considering customer’s comprehensive assessment and the customer response model are developed. Thirdly, the reliability evaluation method considering IBDR based on Monte Carlo simulation is proposed. Finally, the validity of the above models and method is studied through numerical tests on modified RBTS Bus6 test system. Simulation results demonstrated that IBDR can improve the reliability of microgrid.

  9. An evaluation of the hemiplegic subject based on the Bobath approach. Part II: The evaluation protocol.

    Science.gov (United States)

    Corriveau, H; Guarna, F; Dutil, E; Riley, E; Arsenault, A B; Drouin, G

    1988-01-01

    A protocol of evaluation of the hemiplegic patient based on the Bobath approach to treatment is presented. Six parameters are evaluated: sensorium, muscle tone, reflex activity, active movement, postural reactions and pain. The first and last of these are included because of their possible effects on the motor recovery process of the hemiplegic patient. The other four are directly borrowed from the Bobath modality of treatment. For each of these parameters, the procedures are given for its evaluation along with its respective rating scales. These scales are of an ordinal nature ranging from 0 to 3. It is suggested that this new evaluation protocol is fully compatible with the therapeutic modality developed by Bobath and as well is adequate to quantify patient progress in the principle aspects treated by this well used rehabilitation approach.

  10. Model-based efficiency evaluation of combine harvester traction drives

    Directory of Open Access Journals (Sweden)

    Steffen Häberle

    2015-08-01

    Full Text Available As part of the research the drive train of the combine harvesters is investigated in detail. The focus on load and power distribution, energy consumption and usage distribution are explicitly explored on two test machines. Based on the lessons learned during field operations, model-based studies of energy saving potential in the traction train of combine harvesters can now be quantified. Beyond that the virtual machine trial provides an opportunity to compare innovative drivetrain architectures and control solutions under reproducible conditions. As a result, an evaluation method is presented and generically used to draw comparisons under local representative operating conditions.

  11. Teleradiology: an evaluation of a microcomputer-based system.

    Science.gov (United States)

    Gayler, B W; Gitlin, J N; Rappaport, W; Skinner, F L; Cerva, J

    1981-08-01

    A laboratory evaluation of a microcomputer-based teleradiology system is described. The system used state-of-the-art hardware, and provided for contrast and brightness control by the consulting radiologists. The transmitted, digitized images were compared with conventional radiographs. The radiologists' scores for findings, impressions, and confidence levels were significantly lower for radiographic images viewed on the teleradiology system. However, the quality of the images provided by the teleradiology system was high enough to warrant further study, especially since microcomputer-based teleradiology offers the advantage of providing access to radiology services for rural areas and small hospitals.

  12. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    Science.gov (United States)

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Countermeasure Availability, and Ease of Detection. Reproducibility of scoring data was assessed by examining the standard deviations (SD) of mean scores. Our results were unexpected. Several familiar biothreat diseases such as anthrax and tularemia were judged, by our experts, to be less threatening than many others owing to a number of factors including ease of detection, lack of communicability, and the ready availability of countermeasures. Conversely, several toxins were judged by experts to have very high potential as threat agents owing, in part, to their reliability, virulence, and a lack of available countermeasures. Agreement among experts, as determined by lower SD about a mean score, was greater for more familiar threats. Our study was designed to provide a concise and east-to-apply set of criteria that could be used by NATO nations to evaluate emerging infectious disease threats with respect to their weaponization potential. Our results were unexpected. We believe that a lack of appropriate weighting factors may explain these results and suggest that future studies weigh each of the 12 proposed criteria based on the intended use of the assessment data and other situational factors. We believe that the greatest value of our study lies in a codification of the attributes of a biological weapon. © Association of Military Surgeons of the United States 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  13. An academic program for experience-based seismic evaluation

    International Nuclear Information System (INIS)

    Nix, S.J.; Meyer, W.; Clemence, S.P.

    1990-01-01

    The authors have been involved in a project, sponsored by the Niagara Mohawk Power Corporation, to develop knowledge-based expert systems to aid in the implementation of the Seismic Qualification Utility Group (SQUG) approach for the seismic qualification of equipment in operating nuclear power plants. This approach, being founded on the use of engineering judgment in the application of prior earthquake experience data, requires comprehensive training. There seems to be general consensus that the experience-based approach is a more cost-effective means of qualifying nuclear power plant equipment when compared to the more traditional analytical methods. The experience-based approach has a number of potential applications in civil engineering, including bridge evaluation and design, seismic adequacy of general structures, foundation design, and water and wastewater treatment plant design and operation. The objective of this paper is to outline an academic curriculum, at the master's level, to educate structural engineers to use and further develop the experience-based approach for seismic evaluation. In the long term, this could lead to the development of academic programs in experience-based assessment and design for a wide range of applications in maintaining the nation's infrastructure

  14. Zika Virus: An Emerging Global Health Threat

    Science.gov (United States)

    Mittal, Rahul; Nguyen, Desiree; Debs, Luca H.; Patel, Amit P.; Liu, George; Jhaveri, Vasanti M.; S. Kay, Sae-In; Mittal, Jeenu; Bandstra, Emmalee S.; Younis, Ramzi T.; Chapagain, Prem; Jayaweera, Dushyantha T.; Liu, Xue Zhong

    2017-01-01

    Zika virus (ZIKV) is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS) and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV), and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease. PMID:29276699

  15. Countering GPS jamming and EW threat

    Science.gov (United States)

    Pereira, Carlos M.; Rastegar, J.; McLain, Clifford E.; Alanson, T.; McMullan, Charles; Nguyen, H.-L.

    2007-09-01

    Efforts at the U.S. Army Research, Development and Engineering Center (ARDEC) at Picatinny, New Jersey are focused on developing methods to counter GPS jamming and electronic warfare (EW) threat by eliminating GPS dependency entirely. In addition, the need for munitions cost reduction requires alternatives to expensive high-grade inertia components. Efforts at ARDEC include investigations of novel methods for onboard measurement of munitions full position and angular orientation independent of GPS signals or high-grade inertia components. Currently, two types of direct angular measurement sensors are being investigated. A first sensor, Radio Frequency Polarized Sensor (RFPS), uses an electromagnetic field as a reference. A second sensor is based on magnetometers, using the Earth magnetic field for orientation measurement. Magnetometers, however, can only provide two independent orientation measurements. The RFPS may also be used to make full object position and angular orientation measurement relative to a reference coordinate system, which may be moving or stationary. The potential applications of novel RFPS sensors is in providing highly effective inexpensive replacement for GPS, which could be used in a "Layered Navigation" scheme employing alternate referencing methods and reduce the current dependency on GPS as a primary reference for guided gun-fired munitions. Other potential applications of RFPSs is in UAVs, UGVs, and robotic platforms.

  16. Optimized data evaluation for k0-based NAA

    International Nuclear Information System (INIS)

    Van Sluijs, R.; Bossus, D.A.W.

    1999-01-01

    k 0 -NAA allows the simultaneous analysis of up-to 67 elements. The k 0 method is based on calculations using a special library instead of measuring standards. For an efficient use of the method, the calculations and resulting raw data require optimized evaluation procedures. In this paper two efficient procedures for nuclide identification and gamma interference correction are outlined. For a fast computation of the source-detector efficiency and coincidence correction factors the matrix interpolation technique is introduced. (author)

  17. USMC ISR: Preparing for the A2AD Threat

    Science.gov (United States)

    2014-06-13

    communications. “The PLA has also developed ground-based ASAT laser systems that have reportedly been employed to ‘ dazzle ’ US satellites” (Saunders...millimeter waves, high- power microwaves, lasers or electromagnetic pulses (Brimley 2013, 15). Replacing modern day munitions, directed-energy...2007, 39). A report from the Office of Threat Assessment published in 1995 defined dazzling as, “the temporary blinding of a sensor by overloading it

  18. Treating Infidelity: Therapists' Ratings Of Hope, Threat, Forgiveness, And Justification

    OpenAIRE

    Dodini, Aaron Jarrett

    2000-01-01

    This exploratory study examined the beliefs of 82 experienced Marriage and Family Therapists regarding the treatment of marital infidelity. Participants were asked to read an on-line vignette and respond to a subsequent web based questionnaire by rating levels of hope, threat, forgiveness, and justification for a couple in regard to various affair scenarios. This study employed an experimental design using six groups to discover possible differences in responses across the dependent variabl...

  19. Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis

    OpenAIRE

    Olandersson, Sandra; Fredsson, Jeanette

    2001-01-01

    To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful ...

  20. Beyond google: finding and evaluating web-based information for community-based nursing practice.

    Science.gov (United States)

    Miller, Louise C; Graves, Rebecca S; Jones, Barbara B; Sievert, Maryellen C

    2010-01-01

    Nurses are challenged to find and use reliable, credible information to support clinical decision-making and to meet expectations for evidence-based nursing practice. This project targeted practicing public health and school nurses, teaching them how to access and critically evaluate web-based information resources for frontline practice. Health sciences librarians partnered with nursing faculty to develop two participatory workshops to teach skills in searching for and evaluating web-based consumer and professional practice resources. The first workshop reviewed reliable, credible consumer web-resources appropriate to use with clients, using published criteria to evaluate website credibility. In the second workshop, nurses were taught how to retrieve and evaluate health-related research from professional databases to support evidence-based nursing practice. Evaluation data indicated nurses most valued knowing about the array of reliable, credible web-based health information resources, learning how to evaluate website credibility, and understanding how to find and apply professional research literature to their own practice.

  1. Color image definition evaluation method based on deep learning method

    Science.gov (United States)

    Liu, Di; Li, YingChun

    2018-01-01

    In order to evaluate different blurring levels of color image and improve the method of image definition evaluation, this paper proposed a method based on the depth learning framework and BP neural network classification model, and presents a non-reference color image clarity evaluation method. Firstly, using VGG16 net as the feature extractor to extract 4,096 dimensions features of the images, then the extracted features and labeled images are employed in BP neural network to train. And finally achieve the color image definition evaluation. The method in this paper are experimented by using images from the CSIQ database. The images are blurred at different levels. There are 4,000 images after the processing. Dividing the 4,000 images into three categories, each category represents a blur level. 300 out of 400 high-dimensional features are trained in VGG16 net and BP neural network, and the rest of 100 samples are tested. The experimental results show that the method can take full advantage of the learning and characterization capability of deep learning. Referring to the current shortcomings of the major existing image clarity evaluation methods, which manually design and extract features. The method in this paper can extract the images features automatically, and has got excellent image quality classification accuracy for the test data set. The accuracy rate is 96%. Moreover, the predicted quality levels of original color images are similar to the perception of the human visual system.

  2. @tomic 2012 Seminar on Design Basis Threat for Cyber Attacks on the Nuclear Sector

    International Nuclear Information System (INIS)

    Schraver, M.

    2014-01-01

    On November 30, 2012 the Dutch National Coordinator for Security and Counter terrorism hosted the @tomic 2012 Seminar on Design Basis Threat for Cyber Attacks on the Nuclear Sector. A DBT is a comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated. The traditional DBT approach is based on a physical security perspective. It was proposed, however, that it can be modified to fit the cyber threat. The aim of the seminar was to identify possible approaches to developing a DBT ICT for the nuclear sector that takes into account the speed at which cyber tools and methods evolve. The seminar was attended by a select group of participants from government, academia and the nuclear industry. The seminar started with several presentations on the development of a DBT ICT by representatives from the Dutch National Coordinator for Security and Counter terrorism and the International Atomic Energy Agency (IAEA). The Ministry of Economic Affairs currently developing the Dutch DBT ICT, presented the Dutch approach and the current state of affairs. In addition, the keynote speech focused on the constant innovations within the cyber sector. To enable the discussion the participants took part in a red-blue team policy exercise to brainstorm about potential attacks, vulnerabilities and defensive measures. In the end the participants formulated five potential cases against which defensive measures should be in place. After the policy exercise, a discussion on the needs of a DBT ICT ensued. During the discussion various approaches were mentioned including; a scenario-based DBT (as in the exercise), protection requirements based on functional analysis of dependencies, vulnerabilities and interfaces, the adoption of existing requirements, and several combinations of these approaches; — The scenario-based approach requires the definition of reasonably likely modi operandi of attack on the

  3. Evaluation of ecosystem-based marine management strategies based on risk assessment

    NARCIS (Netherlands)

    Piet, G.J.; Jongbloed, R.H.; Knights, A.M.; Tamis, J.E.; Paijmans, A.J.; Sluis, van der M.T.; Vries, de P.; Robinson, L.A.

    2015-01-01

    This study presents a comprehensive and generic framework that provides a typology for the identification and selection of consistently defined ecosystem-based management measures and allows a coherent evaluation of these measures based on their performance to achieve policy objectives. The

  4. Eight habitats, 38 threats and 55 experts: Assessing ecological risk in a multi-use marine region.

    Directory of Open Access Journals (Sweden)

    Zoë A Doubleday

    Full Text Available Identifying the relative risk human activities pose to a habitat, and the ecosystem services they provide, can guide management prioritisation and resource allocation. Using a combination of expert elicitation to assess the probable effect of a threat and existing data to assess the level of threat exposure, we conducted a risk assessment for 38 human-mediated threats to eight marine habitats (totalling 304 threat-habitat combinations in Spencer Gulf, Australia. We developed a score-based survey to collate expert opinion and assess the relative effect of each threat to each habitat, as well as a novel and independent measure of knowledge-based uncertainty. Fifty-five experts representing multiple sectors and institutions participated in the study, with 6 to 15 survey responses per habitat (n = 81 surveys. We identified key threats specific to each habitat; overall, climate change threats received the highest risk rankings, with nutrient discharge identified as a key local-scale stressor. Invasive species and most fishing-related threats, which are commonly identified as major threats to the marine environment, were ranked as low-tier threats to Spencer Gulf, emphasising the importance of regionally-relevant assessments. Further, we identified critical knowledge gaps and quantified uncertainty scores for each risk. Our approach will facilitate prioritisation of resource allocation in a region of increasing social, economic and environmental importance, and can be applied to marine regions where empirical data are lacking.

  5. The evaluation of a web-based incident reporting system.

    Science.gov (United States)

    Kuo, Ya-Hui; Lee, Ting-Ting; Mills, Mary Etta; Lin, Kuan-Chia

    2012-07-01

    A Web-based reporting system is essential to report incident events anonymously and confidentially. The purpose of this study was to evaluate a Web-based reporting system in Taiwan. User satisfaction and impact of system use were evaluated through a survey answered by 249 nurses. Incident events reported in paper and electronic systems were collected for comparison purposes. Study variables included system user satisfaction, willingness to report, number of reports, severity of the events, and efficiency of the reporting process. Results revealed that senior nurses were less willing to report events, nurses on internal medicine units had higher satisfaction than others, and lowest satisfaction was related to the time it took to file a report. In addition, the Web-based reporting system was used more often than the paper system. The percentages of events reported were significantly higher in the Web-based system in laboratory, environment/device, and incidents occurring in other units, whereas the proportions of reports involving bedsores and dislocation of endotracheal tubes were decreased. Finally, moderate injury event reporting decreased, whereas minor or minimal injury event reporting increased. The study recommends that the data entry process be simplified and the network system be improved to increase user satisfaction and reporting rates.

  6. Efficient p-value evaluation for resampling-based tests

    KAUST Repository

    Yu, K.

    2011-01-05

    The resampling-based test, which often relies on permutation or bootstrap procedures, has been widely used for statistical hypothesis testing when the asymptotic distribution of the test statistic is unavailable or unreliable. It requires repeated calculations of the test statistic on a large number of simulated data sets for its significance level assessment, and thus it could become very computationally intensive. Here, we propose an efficient p-value evaluation procedure by adapting the stochastic approximation Markov chain Monte Carlo algorithm. The new procedure can be used easily for estimating the p-value for any resampling-based test. We show through numeric simulations that the proposed procedure can be 100-500 000 times as efficient (in term of computing time) as the standard resampling-based procedure when evaluating a test statistic with a small p-value (e.g. less than 10( - 6)). With its computational burden reduced by this proposed procedure, the versatile resampling-based test would become computationally feasible for a much wider range of applications. We demonstrate the application of the new method by applying it to a large-scale genetic association study of prostate cancer.

  7. Risk Evaluation of Railway Coal Transportation Network Based on Multi Level Grey Evaluation Model

    Science.gov (United States)

    Niu, Wei; Wang, Xifu

    2018-01-01

    The railway transport mode is currently the most important way of coal transportation, and now China’s railway coal transportation network has become increasingly perfect, but there is still insufficient capacity, some lines close to saturation and other issues. In this paper, the theory and method of risk assessment, analytic hierarchy process and multi-level gray evaluation model are applied to the risk evaluation of coal railway transportation network in China. Based on the example analysis of Shanxi railway coal transportation network, to improve the internal structure and the competitiveness of the market.

  8. Benchmarking Spike-Based Visual Recognition: A Dataset and Evaluation

    Science.gov (United States)

    Liu, Qian; Pineda-García, Garibaldi; Stromatias, Evangelos; Serrano-Gotarredona, Teresa; Furber, Steve B.

    2016-01-01

    Today, increasing attention is being paid to research into spike-based neural computation both to gain a better understanding of the brain and to explore biologically-inspired computation. Within this field, the primate visual pathway and its hierarchical organization have been extensively studied. Spiking Neural Networks (SNNs), inspired by the understanding of observed biological structure and function, have been successfully applied to visual recognition and classification tasks. In addition, implementations on neuromorphic hardware have enabled large-scale networks to run in (or even faster than) real time, making spike-based neural vision processing accessible on mobile robots. Neuromorphic sensors such as silicon retinas are able to feed such mobile systems with real-time visual stimuli. A new set of vision benchmarks for spike-based neural processing are now needed to measure progress quantitatively within this rapidly advancing field. We propose that a large dataset of spike-based visual stimuli is needed to provide meaningful comparisons between different systems, and a corresponding evaluation methodology is also required to measure the performance of SNN models and their hardware implementations. In this paper we first propose an initial NE (Neuromorphic Engineering) dataset based on standard computer vision benchmarksand that uses digits from the MNIST database. This dataset is compatible with the state of current research on spike-based image recognition. The corresponding spike trains are produced using a range of techniques: rate-based Poisson spike generation, rank order encoding, and recorded output from a silicon retina with both flashing and oscillating input stimuli. In addition, a complementary evaluation methodology is presented to assess both model-level and hardware-level performance. Finally, we demonstrate the use of the dataset and the evaluation methodology using two SNN models to validate the performance of the models and their hardware

  9. Designing and Evaluating Conative Game-Based Learning Scenarios

    DEFF Research Database (Denmark)

    Schønau-Fog, Henrik

    2014-01-01

    It is an essential prerequisite to design for motivation in game-based learning applications, tools and activities. However, how is it possible to design and evaluate motivational game-based learning scenarios in a systematic process-oriented manner based on conation and player engagement? While...... conation is related to the perseverance, determination and tenacity players exhibit when playing an interesting game, player engagement describes in detail what it is that causes a player to keep playing - Not only through fun and gamification drivers such as points and levels, but by utilizing triggers...... of ‘continuation desire’ such as interfacing with the scenario, exploration and socialising. This paper aims to combine the concepts of Player Engagement, Conation and Continuation Desire by focusing on the conative aspects which are the essential drivers for the desire to continue any learning activity...

  10. Designing and evaluating risk-based surveillance systems

    DEFF Research Database (Denmark)

    Willeberg, Preben; Nielsen, Liza Rosenbaum; Salman, Mo

    2012-01-01

    Risk-based surveillance systems reveal occurrence of disease or infection in a sample of population units, which are selected on the basis of risk factors for the condition under study. The purpose of such systems for supporting practical animal disease policy formulations and management decisions...... are: A: to detect an emerging disease or infection, if it becomes introduced into a population; or B: to substantiate freedom from a condition in a population; or C: to detect cases and estimate the prevalence of an endemic condition in a population. In risk-based surveillance these aims should be met...... applicable risk estimate for use in designing and evaluating a risk-based surveillance system would be a crude (unadjusted) relative risk, odds ratio or apparent prevalence. Risk estimates found in the published literature, however, are often the results of multivariable analyses implicitly adjusting...

  11. Resilience, Vulnerability and Residual Threat: An Assessment from Indian Sundarban

    Science.gov (United States)

    Ghosh, T.

    2016-12-01

    The estuarine islands within Indian Sundarban are extremely vulnerable due to climate change, erosion, flooding and increasing population pressure. Around 4.6 million people are living under constant threat of climatic shocks, affecting their farm based economy and dependency on forest resources for their livelihood. This paper attempts to focus on the dynamics of system's resilience in the backdrop of higher level of vulnerability. Globally the assessment of island vulnerability is generally more focused towards the climate change impacts, rather than taking into account other determining drivers with proper weightage. Three estuarine islands namely Sagar, Ghoramara and Mousani at the western part of Indian Sundarban Delta (ISD) have been chosen for this study to derive the indicator based scoring method using the household survey data from twenty seven (27) sampled `Mouza' (lowest administrative boundary; village) with cluster random sampling. Vulnerability and resilience of these islands have been calculated using the indicators like housing condition, electrification, population density, accretion, adult secondary education level, percentage of people `Below Poverty Line' (BPL) based on per capita income. Residual threats for these islands have been obtained by subtracting the score of resilience and vulnerability of the system. Result suggests that all these islands are in less resilient condition to combat the negative impact of the influencing factors. Sapkhali, Ghoramara, Bankimnagar, Shibpur and Baliara are becoming sensitive from excess residual threats. This study is an initiation for identifying the thrust areas need to address with effective policy adaptation, necessary to minimize the existing vulnerable conditions in these islands. Key words: Vulnerability, Resilience, Residual threat, Indian Sundarban

  12. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    Science.gov (United States)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  13. Evaluation of upper limb muscle fatigue based on surface electromyography.

    Science.gov (United States)

    Zhou, Qianxiang; Chen, Yuhong; Ma, Chao; Zheng, Xiaohui

    2011-10-01

    Fatigue is believed to be a major contributory factor to occupational injuries in machine operators. The development of accurate and usable techniques to measure operator fatigue is therefore important. In this study, we used a novel method based on surface electromyography (sEMG) of the biceps brachii and the Borg scale to evaluate local muscle fatigue in the upper limb after isometric muscle action. Thirteen young males performed isometric actions with the upper limb at different force levels. sEMG activities of the biceps brachii were recorded during the actions. Borg scales were used to evaluate the subjective sensation of local fatigue of the biceps brachii after the actions. sEMG activities were analyzed using the one-third band octave method, and an equation to determine the degree of fatigue was derived based on the relationship between the variable and the Borg scale. The results showed that the relationship could be expressed by a conic curve, and could be used to evaluate muscle fatigue during machine operation.

  14. Dissolution Threats and Legislative Bargaining

    DEFF Research Database (Denmark)

    Becher, Michael; Christiansen, Flemming Juul

    2015-01-01

    Chief executives in many parliamentary democracies have the power to dissolve the legislature. Despite a well-developed literature on the endogenous timing of parliamentary elections, political scientists know remarkably little about the strategic use of dissolution power to influence policymaking....... To address this gap, we propose and empirically evaluate a theoretical model of legislative bargaining in the shadow of executive dissolution power. The model implies that the chief executive's public support and legislative strength, as well as the time until the next constitutionally mandated election...

  15. EU conference - 'The microbial threat'

    DEFF Research Database (Denmark)

    Mevius, D.J.; Sprenger, M.J.W.; Wegener, Henrik Caspar

    1999-01-01

    transfer of resistant, zoonotic, food-born pathogens and resistance genes to humans. In humans the surveillance should be clinically relevant. Guidelines for rational therapy should be implemented and 'antibiotic teams' should be installed in each hospital to evaluate the prescription of antibiotics....... Research aimed at intervention strategies for antimicrobial resistance should be given a high priority with adequate financing both nationally and in Europe. Well co-ordinated European research programmes should have priority; this includes the need to install a European multidisciplinary scientific...

  16. Wavelets based algorithm for the evaluation of enhanced liver areas

    Science.gov (United States)

    Alvarez, Matheus; Rodrigues de Pina, Diana; Giacomini, Guilherme; Gomes Romeiro, Fernando; Barbosa Duarte, Sérgio; Yamashita, Seizo; de Arruda Miranda, José Ricardo

    2014-03-01

    Hepatocellular carcinoma (HCC) is a primary tumor of the liver. After local therapies, the tumor evaluation is based on the mRECIST criteria, which involves the measurement of the maximum diameter of the viable lesion. This paper describes a computed methodology to measure through the contrasted area of the lesions the maximum diameter of the tumor by a computational algorithm. 63 computed tomography (CT) slices from 23 patients were assessed. Noncontrasted liver and HCC typical nodules were evaluated, and a virtual phantom was developed for this purpose. Optimization of the algorithm detection and quantification was made using the virtual phantom. After that, we compared the algorithm findings of maximum diameter of the target lesions against radiologist measures. Computed results of the maximum diameter are in good agreement with the results obtained by radiologist evaluation, indicating that the algorithm was able to detect properly the tumor limits. A comparison of the estimated maximum diameter by radiologist versus the algorithm revealed differences on the order of 0.25 cm for large-sized tumors (diameter > 5 cm), whereas agreement lesser than 1.0cm was found for small-sized tumors. Differences between algorithm and radiologist measures were accurate for small-sized tumors with a trend to a small increase for tumors greater than 5 cm. Therefore, traditional methods for measuring lesion diameter should be complemented with non-subjective measurement methods, which would allow a more correct evaluation of the contrast-enhanced areas of HCC according to the mRECIST criteria.

  17. Shifting the evaluative gaze: Community-based program evaluation in the homeless sector

    Directory of Open Access Journals (Sweden)

    Bruce Wallace

    2015-09-01

    Full Text Available Homelessness is a growing social issue that is a consequence of structural inequities and contributor to the development of health inequities. Community-based research (CBR has been proposed as an effective research strategy for addressing health equities and promoting social justice through participatory processes. The purpose of this article is to examine the application of CBR principles and practices in the homeless sector and the implications for the production of knowledge and social change to address homelessness. Drawing on our experiences as researchers and service providers, we reflect on the significant successes and challenges associated with using CBR in the homelessness sector. In our discussion we emphasise insights, challenges and lessons learned from a community-university partnership that focused on an evaluation of a transitional shelter program in a large urban centre where housing is expensive and often unavailable. Keywords: Homelessness, housing, transitional housing, transitional shelter, program evaluation, community-based research

  18. Defending against the Advanced Persistent Threat: An Optimal Control Approach

    Directory of Open Access Journals (Sweden)

    Pengdeng Li

    2018-01-01

    Full Text Available The new cyberattack pattern of advanced persistent threat (APT has posed a serious threat to modern society. This paper addresses the APT defense problem, that is, the problem of how to effectively defend against an APT campaign. Based on a novel APT attack-defense model, the effectiveness of an APT defense strategy is quantified. Thereby, the APT defense problem is modeled as an optimal control problem, in which an optimal control stands for a most effective APT defense strategy. The existence of an optimal control is proved, and an optimality system is derived. Consequently, an optimal control can be figured out by solving the optimality system. Some examples of the optimal control are given. Finally, the influence of some factors on the effectiveness of an optimal control is examined through computer experiments. These findings help organizations to work out policies of defending against APTs.

  19. Physically based evaluation of climate models over the Iberian Peninsula

    Science.gov (United States)

    Sánchez de Cos, Carmen; Sánchez-Laulhé, Jose M.; Jiménez-Alonso, Carlos; Sancho-Avila, Juan M.; Rodriguez-Camino, Ernesto

    2013-04-01

    A novel approach is proposed for evaluating regional climate models based on the comparison of empirical relationships among model outcome variables. The approach is actually a quantitative adaptation of the method for evaluating global climate models proposed by Betts (Bull Am Meteorol Soc 85:1673-1688, 2004). Three selected relationships among different magnitudes involved in water and energy land surface budgets are firstly established using daily re-analysis data. The selected relationships are obtained for an area encompassing two river basins in the southern Iberian Peninsula corresponding to 2 months, representative of dry and wet seasons. The same corresponding relations are also computed for each of the thirteen regional simulations of the ENSEMBLES project over the same area. The usage of a metric based on the Hellinger coefficient allows a quantitative estimation of how well models are performing in simulating the relations among surface magnitudes. Finally, a series of six rankings of the thirteen regional climate models participating in the ENSEMBLES project is obtained based on their ability to simulate such surface processes.

  20. Bio-Based Adhesives and Evaluation for Wood Composites Application

    Directory of Open Access Journals (Sweden)

    Fatemeh Ferdosian

    2017-02-01

    Full Text Available There has been a rapid growth in research and innovation of bio-based adhesives in the engineered wood product industry. This article reviews the recent research published over the last few decades on the synthesis of bio-adhesives derived from such renewable resources as lignin, starch, and plant proteins. The chemical structure of these biopolymers is described and discussed to highlight the active functional groups that are used in the synthesis of bio-adhesives. The potentials and drawbacks of each biomass are then discussed in detail; some methods have been suggested to modify their chemical structures and to improve their properties including water resistance and bonding strength for their ultimate application as wood adhesives. Moreover, this article includes discussion of techniques commonly used for evaluating the petroleum-based wood adhesives in terms of mechanical properties and penetration behavior, which are expected to be more widely applied to bio-based wood adhesives to better evaluate their prospect for wood composites application.

  1. Module-based quality system functionality evaluation in production logistics

    Energy Technology Data Exchange (ETDEWEB)

    Khabbazi, M.R.; Wikander, J.; Onori, M.; Maffei, A.; Chen, D.

    2016-07-01

    This paper addresses a comprehensive modeling and functionality evaluation of a module-based quality system in production logistics at the highest domain abstract level of business processes. All domain quality business processes and quality data transactions are modeled using BPMN and UML tools and standards at the business process and data modeling. A modular web-based prototype is developed to evaluate the models addressing the quality information system functionality requirements and modularity in production logistics through data scenarios and data queries. Using the object-oriented technique in design at the highest domain level, the proposed models are subject further development in the lower levels for the implementing case. The models are specifically able to manipulate all quality operations including remedy and control in a lot-based make-to-order production logistics system as an individual module. Due to the specification of system as domain design structure, all proposed BPMs, data models, and the actual database prototype are seen referential if not a solution as a practical “to-be” quality business process re-engineering template. This paper sets out to provide an explanatory approach using different practical technique at modeling steps as well as the prototype implementation. (Author)

  2. Comprehensive evaluation of Shahid Motahari Educational Festival during 2008-2013 based on CIPP Evaluation Model

    Directory of Open Access Journals (Sweden)

    SN Hosseini

    2014-09-01

    Full Text Available Introduction: Education quality improvement is one of the main goals of higher education. In this regard, has been provided various solutions such as holding educational Shahid Motahari annual festivals, in order to appreciate of educational process, development and innovation educational processes and procedures, preparation of calibration standards and processes of accrediting educational. The aim of this study was to comprehensive evaluating of educational Shahid Motahari festival during six periods (2008-2013 based on CIPP evaluation model. Method : This cross-sectional study was conducted among the 473 faculty members include deputies and administrators educational, administrators and faculty members of medical education development centers, members of the scientific committee and faculty member’s participants in Shahid Motahari festival from 42 universities medical sciences of Iran. Data collection based on self-report writing questionnaires. Data were analyzed by SPSS version 20 at α=0.05 significant level. Results: The subjects reported 75.13%, 65.33%, 64.5%, and 59.21 % of receivable scores of process, context, input and product, respectively. In addition, there was a direct and significant correlation between all domains . Conclusion : According to the study findings, in the evaluation and correlation of domains models, we can explicitly how to holding festivals was appropriate and the main reason for the poor evaluation in product domain is related to the problems in input and product domains.

  3. Neurally based measurement and evaluation of environmental noise

    CERN Document Server

    Soeta, Yoshiharu

    2015-01-01

    This book deals with methods of measurement and evaluation of environmental noise based on an auditory neural and brain-oriented model. The model consists of the autocorrelation function (ACF) and the interaural cross-correlation function (IACF) mechanisms for signals arriving at the two ear entrances. Even when the sound pressure level of a noise is only about 35 dBA, people may feel annoyed due to the aspects of sound quality. These aspects can be formulated by the factors extracted from the ACF and IACF. Several examples of measuring environmental noise—from outdoor noise such as that of aircraft, traffic, and trains, and indoor noise such as caused by floor impact, toilets, and air-conditioning—are demonstrated. According to the noise measurement and evaluation, applications for sound design are discussed. This book provides an excellent resource for students, researchers, and practitioners in a wide range of fields, such as the automotive, railway, and electronics industries, and soundscape, architec...

  4. Performance Evaluation of a Biometric System Based on Acoustic Images

    Directory of Open Access Journals (Sweden)

    Juan J. Villacorta

    2011-10-01

    Full Text Available An acoustic electronic scanning array for acquiring images from a person using a biometric application is developed. Based on pulse-echo techniques, multifrequency acoustic images are obtained for a set of positions of a person (front, front with arms outstretched, back and side. Two Uniform Linear Arrays (ULA with 15 l/2-equispaced sensors have been employed, using different spatial apertures in order to reduce sidelobe levels. Working frequencies have been designed on the basis of the main lobe width, the grating lobe levels and the frequency responses of people and sensors. For a case-study with 10 people, the acoustic profiles, formed by all images acquired, are evaluated and compared in a mean square error sense. Finally, system performance, using False Match Rate (FMR/False Non-Match Rate (FNMR parameters and the Receiver Operating Characteristic (ROC curve, is evaluated. On the basis of the obtained results, this system could be used for biometric applications.

  5. Exploration of Urban Spatial Planning Evaluation Based on Humanland Harmony

    Science.gov (United States)

    Hu, X. S.; Ma, Q. R.; Liang, W. Q.; Wang, C. X.; Xiong, X. Q.; Han, X. H.

    2017-09-01

    This study puts forward a new concept, "population urbanization level forecast - driving factor analysis - urban spatial planning analysis" for achieving efficient and intensive development of urbanization considering human-land harmony. We analyzed big data for national economic and social development, studied the development trends of population urbanization and its influencing factors using the grey system model in Chengmai county of Hainan province, China. In turn, we calculated the population of Chengmai coming years based on the forecasting urbanization rate and the corresponding amount of urban construction land, and evaluated the urban spatial planning with GIS spatial analysis method in the study area. The result shows that the proposed concept is feasible for evaluation of urban spatial planning, and is meaningful for guiding the rational distribution of urban space, controlling the scale of development, improving the quality of urbanization and thus promoting highly-efficient and intensive use of limited land resource.

  6. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    Durdiak, J.; Gafrik, A.; Pulis, P.; Susko, M.

    2005-01-01

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  7. Evaluation of a commercial biologically based IMRT treatment planning system

    International Nuclear Information System (INIS)

    Semenenko, Vladimir A.; Reitz, Bodo; Day, Ellen; Qi, X. Sharon; Miften, Moyed; Li, X. Allen

    2008-01-01

    A new inverse treatment planning system (TPS) for external beam radiation therapy with high energy photons is commercially available that utilizes both dose-volume-based cost functions and a selection of cost functions which are based on biological models. The purpose of this work is to evaluate quality of intensity-modulated radiation therapy (IMRT) plans resulting from the use of biological cost functions in comparison to plans designed using a traditional TPS employing dose-volume-based optimization. Treatment planning was performed independently at two institutions. For six cancer patients, including head and neck (one case from each institution), prostate, brain, liver, and rectal cases, segmental multileaf collimator IMRT plans were designed using biological cost functions and compared with clinically used dose-based plans for the same patients. Dose-volume histograms and dosimetric indices, such as minimum, maximum, and mean dose, were extracted and compared between the two types of treatment plans. Comparisons of the generalized equivalent uniform dose (EUD), a previously proposed plan quality index (fEUD), target conformity and heterogeneity indices, and the number of segments and monitor units were also performed. The most prominent feature of the biologically based plans was better sparing of organs at risk (OARs). When all plans from both institutions were combined, the biologically based plans resulted in smaller EUD values for 26 out of 33 OARs by an average of 5.6 Gy (range 0.24 to 15 Gy). Owing to more efficient beam segmentation and leaf sequencing tools implemented in the biologically based TPS compared to the dose-based TPS, an estimated treatment delivery time was shorter in most (five out of six) cases with some plans showing up to 50% reduction. The biologically based plans were generally characterized by a smaller conformity index, but greater heterogeneity index compared to the dose-based plans. Overall, compared to plans based on dose

  8. Parents' perceptions of skin cancer threat and children's physical activity.

    Science.gov (United States)

    Tran, Alexander D; Aalborg, Jenny; Asdigian, Nancy L; Morelli, Joseph G; Mokrohisky, Stefan T; Dellavalle, Robert P; Berwick, Marianne; Box, Neil F; Crane, Lori A

    2012-01-01

    Sun exposure is a major risk factor for skin cancer, but without physical activity, children are at risk of childhood obesity. The objective of this study was to explore relationships between parental perceptions of skin cancer threat, sun protection behaviors, physical activity, and body mass index (BMI) in children. This is a cross-sectional analysis nested within the Colorado Kids Sun Care Program sun safety intervention trial. In summer 2007, parent telephone interviews provided data on demographics, perceptions of skin cancer threat, sun protection behaviors, and physical activity. Physical examinations provided data on phenotype, freckling, and BMI. Data from 999 Colorado children born in 1998 were included in analysis. We used analysis of variance, Spearman's rho (ρ) correlation, and multivariable linear regression analysis to evaluate relationships with total amount of outdoor physical activity. After controlling for sex, race/ethnicity, skin color, and sun protection, regression analysis showed that each unit increase in perceived severity of nonmelanoma skin cancer was associated with a 30% increase in hours of outdoor physical activity (P = .005). Hours of outdoor physical activity were not related to perceived severity of melanoma or perceived susceptibility to skin cancer. BMI-for-age was not significantly correlated with perceptions of skin cancer threat, use of sun protection, or level of physical activity. The promotion of sun safety is not likely to inhibit physical activity. Skin cancer prevention programs should continue to promote midday sun avoidance and sun protection during outdoor activities.

  9. 2.10. Threat: Pollution

    OpenAIRE

    2016-01-01

    3.12.1 Industrial pollution Based on the collated evidence, what is the current assessment of the effectiveness of interventions for industrial pollution? Likely to be beneficial ● Use visual and acoustic ʹscarersʹ to deter birds from landing on pools polluted by mining or sewage Unknown effectiveness (limited evidence) ● Relocate birds following oil spills● Use repellents to deter birds from landing on pools polluted by mining Unlikely to be beneficial ● Clean birds after oil spills Likely ...

  10. Managing the Aviation Insider Threat

    Science.gov (United States)

    2010-12-01

    World Airport NSAS National Strategy for Aviation Security OIS Office of Intelligence SIDA Security Identification Display Area STA Security...extortion to aid an individual or organization intent on doing harm to an aircraft. D. CONCERNS, CONSEQUENCES, AND COUNTERMEASURES The consequences...Security of the secured area”, 1542.205, “Security of the security identification display area ( SIDA )”, and 1542.209, “Fingerprint-based criminal

  11. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight... upon receiving information that an act or suspected act of air piracy has been committed, the aircraft...

  12. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  13. Stereotype threat and lift effects in motor task performance: the mediating role of somatic and cognitive anxiety.

    Science.gov (United States)

    Laurin, Raphael

    2013-01-01

    The aim of this investigation was to replicate the stereotype threat and lift effects in a motor task in a neutral sex-typed activity, using somatic and cognitive anxiety as key mediators of these phenomena. It was hypothesized that an ingroup/outgroup social categorization based on gender would have distinctive effects for female and male participants. A total of 161 French physical education students were randomly assigned to three threat conditions--no threat, female threat, and male threat--thus leading to a 3 x 2 (threat by gender) design. The analyses revealed a stereotype lift effect on the performances for both male and female participants, as well as a stereotype threat effect only for female participants. They also indicated that somatic anxiety had a mediating effect on the performance of female participants targeted by a negative stereotype, but that it had a facilitating effect on their performance. The stereotype threat and lift effects on motor tasks were replicated in a neutral sex-typed activity and somatic anxiety seems to have a facilitating mediating effect of the relationships between the gender-conditions (control or female threat) interaction and free-throw performance. The model used to distinguish somatic and cognitive anxiety appeared to be a relevant means of explaining the stereotype threat and lift mechanisms.

  14. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  15. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  16. Synthesis, characterization and biological evaluation of tryptamine based benzamide derivatives.

    Science.gov (United States)

    Aftab, Kiran; Aslam, Kinza; Kousar, Shazia; Nadeem, Muhammad Jawad Ul Hasan

    2016-03-01

    Benzamides and tryptamine are biologically significant compounds, therefore, various benzamide analogous of tryptamine have been efficiently synthesized using tryptamine and different benzoyl chlorides, in order to find new biologically active compounds. The resulting products were then characterized by melting point determination, calculation of Rf values and LC-MS techniques. At last, structure activity relationship (SAR) of the synthesized compounds was evaluated against two microbial strains; Bacillus subtilis and Aspergillus niger. All the five prepared products have shown high yield, sharp characterization and significant resistance against the growth of tested microorganism, providing a new range of tryptamine based benzamide derivatives having significant antimicrobial activities.

  17. A realistic evaluation: the case of protocol-based care

    Science.gov (United States)

    2010-01-01

    Background 'Protocol based care' was envisioned by policy makers as a mechanism for delivering on the service improvement agenda in England. Realistic evaluation is an increasingly popular approach, but few published examples exist, particularly in implementation research. To fill this gap, within this paper we describe the application of a realistic evaluation approach to the study of protocol-based care, whilst sharing findings of relevance about standardising care through the use of protocols, guidelines, and pathways. Methods Situated between positivism and relativism, realistic evaluation is concerned with the identification of underlying causal mechanisms, how they work, and under what conditions. Fundamentally it focuses attention on finding out what works, for whom, how, and in what circumstances. Results In this research, we were interested in understanding the relationships between the type and nature of particular approaches to protocol-based care (mechanisms), within different clinical settings (context), and what impacts this resulted in (outcomes). An evidence review using the principles of realist synthesis resulted in a number of propositions, i.e., context, mechanism, and outcome threads (CMOs). These propositions were then 'tested' through multiple case studies, using multiple methods including non-participant observation, interviews, and document analysis through an iterative analysis process. The initial propositions (conjectured CMOs) only partially corresponded to the findings that emerged during analysis. From the iterative analysis process of scrutinising mechanisms, context, and outcomes we were able to draw out some theoretically generalisable features about what works, for whom, how, and what circumstances in relation to the use of standardised care approaches (refined CMOs). Conclusions As one of the first studies to apply realistic evaluation in implementation research, it was a good fit, particularly given the growing emphasis on

  18. How Stereotype Threat Affects Healthy Older Adults' Performance on Clinical Assessments of Cognitive Decline: The Key Role of Regulatory Fit.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara; Gatz, Margaret

    2015-11-01

    Stereotype threat can impair older adults' performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments' reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat's negative effects. By using a loss-avoidance frame, stereotype threat's negative effects can be attenuated or even eliminated. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  19. Web service reputation evaluation based on QoS measurement.

    Science.gov (United States)

    Zhang, Haiteng; Shao, Zhiqing; Zheng, Hong; Zhai, Jie

    2014-01-01

    In the early service transactions, quality of service (QoS) information was published by service provider which was not always true and credible. For better verification the trust of the QoS information was provided by the Web service. In this paper, the factual QoS running data are collected by our WS-QoS measurement tool; based on these objectivity data, an algorithm compares the difference of the offered and measured quality data of the service and gives the similarity, and then a reputation evaluation method computes the reputation level of the Web service based on the similarity. The initial implementation and experiment with three Web services' example show that this approach is feasible and these values can act as the references for subsequent consumers to select the service.

  20. Evaluation of the integrated community based home care model

    Directory of Open Access Journals (Sweden)

    LR Uys

    2001-09-01

    Full Text Available In 1999-2000 the Integrated Community-Based Home Care model for the care of people with AIDS in communities were implemented in seven sites across the country. The post-implementation evaluation showed that most respondents felt that the model could be replicated if a functioning and informed network including all partners, and a strong management team were in place. The effects of the project were mainly positive for all stakeholders (hospice, clinic, hospital, PWA and their carers, professionals and other community members. Hospitals and community- based services became more aware of and involved in the needs of PWA and felt that the model enabled them to address these needs. PWA and their carers felt supported and respected.