WorldWideScience

Sample records for bioterrorism related threats

  1. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  2. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  3. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  4. The bioterrorism threat by non-state actors hype or horror?

    OpenAIRE

    Thompson, Christopher M.

    2006-01-01

    This thesis provides a capabilities-based approach to assessing the bioterrorism threat from non-state actors. Through comparative case study, prior bioterrorism attacks are analyzed to assess capability in the three areas necessary to complete a biological weapons attack: obtaining or isolating a pathogen, weaponizing the agent, and employing or disseminating the weapon. The three cases are the Rajneeshee cult in 1984, the Aum Shinrikyo cult in the early 1990's, and the United States Posta...

  5. Countering the livestock-targeted bioterrorism threat and responding with an animal health safeguarding system.

    Science.gov (United States)

    Yeh, J-Y; Lee, J-H; Park, J-Y; Cho, Y S; Cho, I-S

    2013-08-01

    Attacks against livestock and poultry using biological agents constitute a subtype of agroterrorism. These attacks are defined as the intentional introduction of an animal infectious disease to strike fear in people, damage a nation's economy and/or threaten social stability. Livestock bioterrorism is considered attractive to terrorists because biological agents for use against livestock or poultry are more readily available and difficult to monitor than biological agents for use against humans. In addition, an attack on animal husbandry can have enormous economic consequences, even without human casualties. Animal husbandry is vulnerable to livestock-targeted bioterrorism because it is nearly impossible to secure all livestock animals, and compared with humans, livestock are less well-guarded targets. Furthermore, anti-livestock biological weapons are relatively easy to employ, and a significant effect can be produced with only a small amount of infectious material. The livestock sector is presently very vulnerable to bioterrorism as a result of large-scale husbandry methods and weaknesses in the systems used to detect disease outbreaks, which could aggravate the consequences of livestock-targeted bioterrorism. Thus, terrorism against livestock and poultry cannot be thought of as either a 'low-probability' or 'low-consequence' incident. This review provides an overview of methods to prevent livestock-targeted bioterrorism and respond to terrorism involving the deliberate introduction of a pathogen-targeting livestock and poultry. PMID:22726305

  6. Bioterrorism: Challenges and considerations

    Directory of Open Access Journals (Sweden)

    Nilima Prakash

    2010-01-01

    Full Text Available Bioterrorism, the deliberate, private use of biological agents to harm and frighten the people of a state or society, is related to the military use of biological, chemical, and nuclear weapons. Attacks with biological agents are among the most insidious and breed the greatest fear. Attacks could go undetected for a long time, potentially exposing a vast number of people, who are unaware of the threat. Dentist′s responses to catastrophes have been redefined by bioterrorism. Accurate and substantial information given to the public by credible public health and medical experts can do much to allay their fears and encourage their cooperation and participation in constructive, organized community response efforts. The dental profession could potentially play a significant role in the emergency response to a major bioterrorism attack.

  7. Possible use of bacteriophages active against Bacillus anthracis and other B. cereus group members in the face of a bioterrorism threat.

    Science.gov (United States)

    Jończyk-Matysiak, Ewa; Kłak, Marlena; Weber-Dąbrowska, Beata; Borysowski, Jan; Górski, Andrzej

    2014-01-01

    Anthrax is an infectious fatal disease with epidemic potential. Nowadays, bioterrorism using Bacillus anthracis is a real possibility, and thus society needs an effective weapon to neutralize this threat. The pathogen may be easily transmitted to human populations. It is easy to store, transport, and disseminate and may survive for many decades. Recent data strongly support the effectiveness of bacteriophage in treating bacterial diseases. Moreover, it is clear that bacteriophages should be considered a potential incapacitative agent against bioterrorism using bacteria belonging to B. cereus group, especially B. anthracis. Therefore, we have reviewed the possibility of using bacteriophages active against Bacillus anthracis and other species of the B. cereus group in the face of a bioterrorism threat. PMID:25247187

  8. Endemic, Notifiable Bioterrorism-Related Diseases, United States, 1992–1999

    OpenAIRE

    Chang, Man-Huei; Glynn, M. Kathleen; Groseclose, Samuel L.

    2003-01-01

    Little information is available in the United States regarding the incidence and distribution of diseases caused by critical microbiologic agents with the potential for use in acts of terrorism. We describe disease-specific, demographic, geographic, and seasonal distribution of selected bioterrorism-related conditions (anthrax, botulism, brucellosis, cholera, plague, tularemia, and viral encephalitides) reported to the National Notifiable Diseases Surveillance System in 1992–1999. Tularemia a...

  9. Bioterorizem: Bioterrorism:

    OpenAIRE

    Pokrajac, Tatjana

    2010-01-01

    Bioterrorism is an attack on the health of the general population through an artificially induced epidemic ofbacterial infectious diseases such as anthrax,pIague, cholera, tularemia, brucellosis or botulism, and certain viroses, such as Ebola, smallpox etc., along with rickettsioses or systemic mycoses. This article includes an analysis of microbiological agents which areof interest for bioterrorism and the possibility of providing efficient preventative action (e.g. preventative measures in ...

  10. Identification and analysis of obstacles in bioterrorism preparedness and response

    Science.gov (United States)

    Sincavage, Suzanne Michele

    The focus of this study was to identify and analyze the obstacles to bioterrorism preparedness and response facing emergency management agencies and public authorities. In order to establish the limits of this discussion, the obstacles will examine a combined conceptual framework of public health, environmental security and social response. The interdisciplinary characteristics of this framework are ideal for addressing the issue of bioterrorism because of its simultaneous impact, which encompasses the complex interrelationships that pertain to public health and national security and social response. Based on a review of literature, the obstacles presented range from the absence of an effective surveillance system for biological terrorism related diseases to the inadequate training of first responders in bioterrorism preparedness and the difficult challenges of a mass casualty situation and the intense pressures associated with the crisis response. Furthermore, the impending reality of bioterrorism will further illustrate a close examination of the characteristics and management of three major biowarfare agents---anthrax, plague and smallpox. Finally, to provide a realistic understanding of the impact of bioterrorism, three case studies of actual events and two hypothetical scenarios will be discussed. Specifically, the discussion will provide the following three unconventional terrorist attacks: the recent anthrax attacks of 2001, the Aum Shinrikyo's attack of the Tokyo subway in 1995, and the Rajneeshees' use of salmonella poisoning in 1994. The inclusion of the hypothetical scenarios of two massive outbreaks of smallpox and anthrax will be presented to illuminate the seriousness and magnitude of the threat of bioterrorism and the probable consequences of failing to overcome the obstacles presented in this study. The importance of this research cannot be overemphasized, the threat is undeniably serious, and the potential for biological agents to cause devastating

  11. The Critical Role of Pathology in the Investigation of Bioterrorism-Related Cutaneous Anthrax

    OpenAIRE

    Shieh, Wun-Ju; Guarner, Jeannette; Paddock, Christopher; Greer, Patricia; Tatti, Kathleen; Fischer, Marc; Layton, Marci; Philips, Michael; Bresnitz, Eddy; Quinn, Conrad P.; Popovic, Tanja; Perkins, Bradley A.; Zaki, Sherif R.

    2003-01-01

    Cutaneous anthrax is a rare zoonotic disease in the United States. The clinical diagnosis traditionally has been established by conventional microbiological methods, such as culture and gram staining. However, these methods often yield negative results when patients have received antibiotics. During the bioterrorism event of 2001, we applied two novel immunohistochemical assays that can detect Bacillus anthracis antigens in skin biopsy samples even after prolonged antibiotic treatment. These ...

  12. Bioterrorism and Smallpox: Policies, Practices, and Implications for Social Work

    Science.gov (United States)

    Mackelprang, Romel W.; Mackelprang, Romel D.; Thirkill, Ashley D.

    2005-01-01

    Terrorist acts and the fear of terrorism have become a part of everyday life in the early 21st century. Among the threats most feared is bioterrorism, including the intentional release of smallpox. With the invasion of Iraq and toppling of the Saddam Hussein regime, acute bioterrorism fears have abated; however, an ongoing threat remains. This…

  13. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes. PMID:24345711

  14. [Protection against bioterrorism acts in Poland].

    Science.gov (United States)

    Chomiczewski, Krzysztof

    2003-01-01

    In this article general principles of defense against bioterrorism are presented. Furthermore, the effort, already undertaken for organization of the system enabling effective countermeasures to this threat as well as liquidation of the effects of such an event, is shown. PMID:12910607

  15. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Guide Reaching At-Risk Populations MedCon Video: "The History of Bioterrorism" Recommend on Facebook Tweet Share Compartir ... as bioterrorist weapons. Watch the Complete Program "The History of Bioterroism" (26 min 38 sec) Watch Specific ...

  16. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Chemical Release Bioterrorism Information for Specific Groups Older Adults Children and Their Caregivers People with Disabilities People ... Disaster Public Health Assessment and Surveillance Tools Training & Education Emergency Responder Health Monitoring & Surveillance (ERHMS) ERHMS Online ...

  17. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Release Bioterrorism Information for Specific Groups Older Adults Children and Their Caregivers People with Disabilities People with ... people, they would cause the most illness and death. Watch this video to learn how some of ...

  18. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... for Emergency Health Professionals Clinician Outreach (COCA) Crisis & Risk Communication (CERC) Laboratory Information Health Alert Network (HAN) ... Cleaning Public Health Emergency Response Guide Reaching At-Risk Populations MedCon Video: "The History of Bioterrorism" Recommend ...

  19. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Emergency Response Guide Reaching At-Risk Populations MedCon Video: "The History of Bioterrorism" Recommend on Facebook Tweet Share Compartir This video describes the Category A diseases: smallpox, anthrax, botulism, ...

  20. Detection limit of negative staining electron microscopy for the diagnosis of bioterrorism-related micro-organisms

    OpenAIRE

    Laue, Michael; Bannert, Norbert

    2010-01-01

    Aims: To determine the detection limit of diagnostic negative staining electron microscopy for the diagnosis of pathogens that could be used for bioterrorism. Methods and Results: Suspensions of vaccinia poxvirus and endospores of Bacillus subtilis were used at defined concentrations as a model for poxviruses and spores of anthrax (Bacillus anthracis), both of which are pathogens that could be used for bioterrorist attacks. Negative staining electron microscopy was performed directly or afte...

  1. Patients' request for and emergency physicians' prescription of antimicrobial prophylaxis for anthrax during the 2001 bioterrorism-related outbreak

    Directory of Open Access Journals (Sweden)

    Aber Robert C

    2005-01-01

    Full Text Available Abstract Background Inappropriate use of antibiotics by individuals worried about biological agent exposures during bioterrorism events is an important public health concern. However, little is documented about the extent to which individuals with self-identified risk of anthrax exposure approached physicians for antimicrobial prophylaxis during the 2001 bioterrorism attacks in the United States. Methods We conducted a telephone survey of randomly selected members of the Pennsylvania Chapter of the American College of Emergency Physicians to assess patients' request for and emergency physicians' prescription of antimicrobial agents during the 2001 anthrax attacks. Results Ninety-seven physicians completed the survey. Sixty-four (66% respondents had received requests from patients for anthrax prophylaxis; 16 (25% of these physicians prescribed antibiotics to a total of 23 patients. Ten physicians prescribed ciprofloxacin while 8 physicians prescribed doxycycline. Conclusion During the 2001 bioterrorist attacks, the majority of the emergency physicians we surveyed encountered patients who requested anthrax prophylaxis. Public fears may lead to a high demand for antibiotic prophylaxis during bioterrorism events. Elucidation of the relationship between public health response to outbreaks and outcomes would yield insights to ease burden on frontline clinicians and guide strategies to control inappropriate antibiotic allocation during bioterrorist events.

  2. Threat-Related Attentional Bias in Anxious Youth: A Review

    Science.gov (United States)

    Puliafico, Anthony C.; Kendall, Philip C.

    2006-01-01

    The research literature suggests that children and adolescents suffering from anxiety disorders experience cognitive distortions that magnify their perceived level of threat in the environment. Of these distortions, an attentional bias toward threat-related information has received the most theoretical and empirical consideration. A large volume…

  3. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. PMID:24890710

  4. Neurologists and the threat of bioterrorism.

    Science.gov (United States)

    Donaghy, Michael

    2006-11-01

    Neurologists are most likely to become involved in primarily diagnosing those bioterrorist attacks utilising botulinum toxin. Oral ingestion, or possibly inhalation, are likely routes of delivery. The characteristic descending paralysis starts in the extraocular and bulbar muscles, with associated autonomic features. Repetitive nerve stimulation usually shows an incremental muscle response. Treatment is supportive. The differential diagnosis is from naturally occurring paralysing illnesses such as Guillain-Barré syndrome, myasthenic crisis or diphtheria, from paralysing seafood neurotoxins (tetrodotoxin, saxitoxin), snake envenomation, and from chemical warfare poisoning by organophosphates. Primary neurological infections are less feasible for use as bioweapons. There are theoretical possibilities of Venezuelan equine encephalitis transmission by inhalation and secondary zoonotic transmission cycles sustained by horses and mosquitoes. Severe haemorrhagic meningitis regularly occurs in anthrax, usually in the aftermath of severe systemic disease likely to have been transmitted by spore inhalation. Panic and psychologically determined 'me-too' symptomatology are likely to pose the biggest diagnostic and management burden on neurologists handling bioterrorist attack on an institution or a random civilian population. Indeed civilian panic and disablement of institutional operations are likely to be prominent intentions of any bioterrorist attack. PMID:16844143

  5. Bioterrorism and the Food Drug Administration: H.R. 3448, Related Legislation, and the FDA’s Expanding Role in Preventing and Responding to Biological Attack

    OpenAIRE

    Kirk, Christine E.

    2002-01-01

    This paper examines the potential impact of recent and proposed bioterrorism legislation on the U.S. Food and Drug Administration (FDA). It concludes that at least one such piece of legislation, H.R. 3448, the “Public Health Security and Bioterrorism Response Act of 2001,†would significantly impact the authority and activities of FDA, as well as affecting FDA-regulated entities and other stakeholders. The paper includes recommendations for further FDA action, n...

  6. Computer Viruses and Related Threats: A Management Guide.

    Science.gov (United States)

    Wack, John P.; Carnahan, Lisa J.

    This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…

  7. Bioterrorism versus radiological terrorism: notes from a bio/nuclear epidemiologist.

    Science.gov (United States)

    Goffman, Thomas E

    2009-01-01

    The antiterrorism and disaster planning communities often speak of the high potential for bioterrorism and possible potential for radioterrorism, specifically the explosion of a fission device on US soil. Information gained from an epidemiologist's work in the national and international scene, which inevitably involves Intel regarding the cultures and subcultures being studied, suggest that bioterrorism is far less likely to be a major threat, that has been over-emphasized at the state level due to warnings from Homeland Security, and that Homeland Security itself appears biased toward bioterrorism of late with very little available rational basis. PMID:19378664

  8. A Program Against Bacterial Bioterrorism

    DEFF Research Database (Denmark)

    Kemp, Michael; Dargis, Rimtas; Andresen, Keld;

    2012-01-01

    In 2002 it was decided to establish laboratory facilities in Denmark for diagnosing agents associated with bioterrorism in order to make an immediate appropriate response to the release of such agents possible. Molecular assays for detection of specific agents and molecular and proteomic techniqu...

  9. Survey of threat studies related to the nuclear power industry

    International Nuclear Information System (INIS)

    A considerable effort has been directed toward the determination of threat characteristics, resulting in a voluminous collection of documents. This report summarizes several of the major studies in order to make the information more accessible. This summary includes only studies involving attacks on nuclear material, plus those incidents which because of their objectives, resources, or motivations may lend insight into potential threat against nuclear facilities or material

  10. Health-Related Stereotype Threat Predicts Health Services Delays Among Blacks

    OpenAIRE

    Jones, Paul R.; Taylor, Dexter M.; Dampeer-Moore, Jodi; Allen, Katherine L.; Saunders, Darlene R.; Snowden, Cecelia B.; Johnson, Mark B.

    2013-01-01

    To our knowledge, no published research has developed an individual difference measure of health-related stereotype threat (HRST). We adapted existing measures of academic stereotype threat to the health domain on a sample of black college students (N = 280). The resulting health-related stereotype threat scale-24 (HRST-24) was assessed for internal consistency, construct and incremental validity, and whether it explains variance in self-reported delays among four preventive health behaviors—...

  11. 75 FR 42363 - Public Health Security and Bioterrorism Preparedness and Response Act of 2002; Biennial Review...

    Science.gov (United States)

    2010-07-21

    ... HUMAN SERVICES 42 CFR Part 73 RIN 0920-AA34 Public Health Security and Bioterrorism Preparedness and...: Advance notice of proposed rulemaking and request for comments. SUMMARY: The Public Health Security and... potential to pose a severe threat to public health and safety. In determining whether to include an agent...

  12. Kairos as Indeterminate Risk Management: The Pharmaceutical Industry's Response to Bioterrorism

    Science.gov (United States)

    Scott, J. Blake

    2006-01-01

    The pharmaceutical industry's response to the threat of bioterrorism following 9-11 invoked the rhetorical notion of kairos as an urgent and ongoing opportunity not only to protect the nation but also to improve the industry's reputation and fortify its political power. Yet the notion of kairos as seizing an advantage--grounded in modernist…

  13. Mass spectrometry for the detection of bioterrorism agents: from environmental to clinical applications.

    Science.gov (United States)

    Duriez, E; Armengaud, J; Fenaille, F; Ezan, E

    2016-03-01

    The threat posed by bioterrorism is a serious concern as the consequences of a large-scale biological attack would be devastating, causing significant social and economic disruption, while being potentially achievable at a relatively moderate cost and without the need for specific high-level technology. The biological agents potentially concerned include both microorganisms and protein toxins. In this Special Feature article, Eric Ezan and co-workers provide an up to date review and report on some of the technological developments that have recently enabled the detection of these bioagents to move forward. They also address today's challenges in translating MS-based approaches from the original environmental detection to clinical diagnosis. Dr. Ezan is a biochemist at the Centre d'Etude Atomique de Saclay (Gif sur Yvette, France). Amongst his research interests is the study of metabolic processing of biologics by numerous techniques including mass spectrometry. PMID:26956394

  14. Enhanced Olfactory Sensory Perception of Threat in Anxiety: An Event-Related fMRI Study

    OpenAIRE

    Krusemark, Elizabeth A.; Li, Wen

    2012-01-01

    The current conceptualization of threat processing in anxiety emphasizes emotional hyper-reactivity, which mediates various debilitating symptoms and derangements in anxiety disorders. Here, we investigated olfactory sensory perception of threat as an alternative causal mechanism of anxiety. Combining an event-related functional magnetic resonance imaging paradigm with an olfactory discrimination task, we examined how anxiety modulates basic perception of olfactory threats at behavioral and n...

  15. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    OpenAIRE

    Majid Zare Bidaki; Mahdi Balalimood

    2015-01-01

    Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on ef...

  16. Application of New Absolute and Relative Conditioning Rules in Threat Assessment

    OpenAIRE

    Ksawery Krenc; Florentin Smarandache

    2013-01-01

    This paper presents new absolute and relative conditioning rules as possible solution of multi-level conditioning in threat assessment problem. An example of application of these rules with respect to target observation threat model has been provided.

  17. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  18. Metabolic network analysis-based identification of antimicrobial drug targets in category A bioterrorism agents.

    Directory of Open Access Journals (Sweden)

    Yong-Yeol Ahn

    Full Text Available The 2001 anthrax mail attacks in the United States demonstrated the potential threat of bioterrorism, hence driving the need to develop sophisticated treatment and diagnostic protocols to counter biological warfare. Here, by performing flux balance analyses on the fully-annotated metabolic networks of multiple, whole genome-sequenced bacterial strains, we have identified a large number of metabolic enzymes as potential drug targets for each of the three Category A-designated bioterrorism agents including Bacillus anthracis, Francisella tularensis and Yersinia pestis. Nine metabolic enzymes- belonging to the coenzyme A, folate, phosphatidyl-ethanolamine and nucleic acid pathways common to all strains across the three distinct genera were identified as targets. Antimicrobial agents against some of these enzymes are available. Thus, a combination of cross species-specific antibiotics and common antimicrobials against shared targets may represent a useful combinatorial therapeutic approach against all Category A bioterrorism agents.

  19. Bioterrorism

    Science.gov (United States)

    ... basis if the vaccine should be given. The anthrax vaccine is controlled by the U.S. Department of Defense ... in combat settings and people who work with anthrax in a laboratory setting. A note about vaccines Sometimes the amount of a certain vaccine cannot ...

  20. Sugar-Coated PPE's, Novel Nanomaterial's and Sensing Modules for Disease and Bioterrorism Related Threats

    Energy Technology Data Exchange (ETDEWEB)

    Bunz, Uwe [Georgia Inst. of Technology, Atlanta, GA (United States)

    2003-11-21

    The detection and sensing of biological warfare agents (ricin, anthrax toxin), of disease agents (cholera, botulinum, and tetnus toxins, influenza virus, etc.) and of biologically active species important for national security and disease control.

  1. Technical Report for DE-FG02-03ER46029 Sugar-Coated PPEs, Novel Nanomaterials and Sensing Modules for Disease and Bioterrorism Related Threats

    Energy Technology Data Exchange (ETDEWEB)

    Uwe Bunz

    2003-08-27

    The detection and sensing of biological warfare agents (Ricin, Anthrax toxin), of disease agents (cholera, botulinum and tetanus toxins, influenza virus etc) and of biologically active species is important for national security and disease control. A premiere goal would be the simple colorimetric or fluorimetric detection of such toxins by a dipstick test. It would be desirable to sense 5,000-10,000 toxin molecules, i.e. 10-100 fg of a toxin contained 1-5 mL of sample. Fluorescent conjugated polymers should be particularly interesting in this regard, because they can carry multiple identical and/or different recognition units. Such an approach is particularly valuable for the detection of lectin toxins, because these bind to oligomeric carbohydrate displays. Lectins bind multivalently to sugars, i.e. several covalently connected sugar moieties have to be exposed to the lectin at the same time to obtain binding. The requirement of multivalency of the lectin-sugar interactions should allow a very sensitive detection of lectins with sugar coated conjugated polymers in an agglutination type assay, where the fluorescence of the PPEs disappears upon binding to the lectins. High molecular weights of the used PPEs would mean high sensitivity. Herein we present our progress towards that goal up to date.

  2. Community Reaction to Bioterrorism: Prospective Study of Simulated Outbreak

    OpenAIRE

    DiGiovanni, Cleto; Reynolds, Barbara; Harwell, Robert; Stonecipher, Elliott B.; Burkle, Frederick M.

    2003-01-01

    To assess community needs for public information during a bioterrorism-related crisis, we simulated an intentional Rift Valley fever outbreak in a community in the southern part of the United States. We videotaped a series of simulated print and television “news reports” over a fictional 9-day crisis period and invited various groups (e.g., first-responders and their spouses or partners, journalists) within the selected community to view the videotape and respond to questions about their reac...

  3. History of biological warfare and bioterrorism.

    OpenAIRE

    Barras V.; Greub G

    2014-01-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern mi...

  4. Predicting response to reassurances and uncertainties in bioterrorism communications for urban populations in New York and California.

    Science.gov (United States)

    Vaughan, Elaine; Tinker, Tim L; Truman, Benedict I; Edelson, Paul; Morse, Stephen S

    2012-06-01

    Recent national plans for recovery from bioterrorism acts perpetrated in densely populated urban areas acknowledge the formidable technical and social challenges of consequence management. Effective risk and crisis communication is one priority to strengthen the U.S.'s response and resilience. However, several notable risk events since September 11, 2001, have revealed vulnerabilities in risk/crisis communication strategies and infrastructure of agencies responsible for protecting civilian populations. During recovery from a significant biocontamination event, 2 goals are essential: (1) effective communication of changing risk circumstances and uncertainties related to cleanup, restoration, and reoccupancy; and (2) adequate responsiveness to emerging information needs and priorities of diverse populations in high-threat, vulnerable locations. This telephone survey study explored predictors of public reactions to uncertainty communications and reassurances from leaders related to the remediation stage of an urban-based bioterrorism incident. African American and Hispanic adults (N=320) were randomly sampled from 2 ethnically and socioeconomically diverse geographic areas in New York and California assessed as high threat, high vulnerability for terrorism and other public health emergencies. Results suggest that considerable heterogeneity exists in risk perspectives and information needs within certain sociodemographic groups; that success of risk/crisis communication during recovery is likely to be uneven; that common assumptions about public responsiveness to particular risk communications need further consideration; and that communication effectiveness depends partly on preexisting values and risk perceptions and prior trust in leaders. Needed improvements in communication strategies are possible with recognition of where individuals start as a reference point for reasoning about risk information, and comprehension of how this influences subsequent interpretation

  5. Inhibitory control as a moderator of threat-related interference biases in social anxiety.

    Science.gov (United States)

    Gorlin, Eugenia I; Teachman, Bethany A

    2015-01-01

    Prior findings are mixed regarding the presence and direction of threat-related interference biases in social anxiety. The current study examined general inhibitory control (IC), measured by the classic colour-word Stroop, as a moderator of the relationship between both threat interference biases [indexed by the emotional Stroop (e-Stroop)] and several social anxiety indicators. High socially anxious undergraduate students (N = 159) completed the emotional and colour-word Stroop tasks, followed by an anxiety-inducing speech task. Participants completed measures of trait social anxiety, state anxiety before and during the speech, negative task-interfering cognitions during the speech and overall self-evaluation of speech performance. Speech duration was used to measure behavioural avoidance. In line with hypotheses, IC moderated the relationship between e-Stroop bias and every anxiety indicator (with the exception of behavioural avoidance), such that greater social-threat interference was associated with higher anxiety among those with weak IC, whereas lesser social-threat interference was associated with higher anxiety among those with strong IC. Implications for the theory and treatment of threat interference biases in socially anxious individuals are discussed. PMID:24967719

  6. Threat Related Selective Attention Predicts Treatment Success in Childhood Anxiety Disorders

    Science.gov (United States)

    Legerstee, Jeroen S.; Tulen, Joke H. M.; Kallen, Victor L.; Dieleman, Gwen C.; Treffers, Philip D. A.; Verhulst, Frank C.; Utens, Elisabeth M. W. J.

    2009-01-01

    Threat-related selective attention was found to predict the success of the treatment of childhood anxiety disorders through administering a pictorial dot-probe task to 131 children with anxiety disorders prior to cognitive behavioral therapy. The diagnostic status of the subjects was evaluated with a semistructured clinical interview at both pre-…

  7. Monitoring style of coping with cancer related threats: a review of the literature.

    Science.gov (United States)

    Roussi, Pagona; Miller, Suzanne M

    2014-10-01

    Building on the Cognitive-Social Health Information-Processing model, this paper provides a theoretically guided review of monitoring (i.e., attend to and amplify) cancer-related threats. Specifically, the goals of the review are to examine whether individuals high on monitoring are characterized by specific cognitive, affective, and behavioral responses to cancer-related health threats than individuals low on monitoring and the implications of these cognitive-affective responses for patient-centered outcomes, including patient-physician communication, decision-making and the development of interventions to promote adherence and adjustment. A total of 74 reports were found, based on 63 studies, 13 of which were intervention studies. The results suggest that although individuals high on monitoring are more knowledgeable about health threats, they are less satisfied with the information provided. Further, they tend to be characterized by greater perceived risk, more negative beliefs, and greater value of health-related information and experience more negative affective outcomes. Finally, individuals high on monitoring tend to be more demanding of the health providers in terms of desire for more information and emotional support, are more assertive during decision-making discussions, and subsequently experience more decisional regret. Psychoeducational interventions improve outcomes when the level and type of information provided is consistent with the individual's monitoring style and the demands of the specific health threat. Implications for patient-centered outcomes, in terms of tailoring of interventions, patient-provider communication, and decision-making, are discussed. PMID:24488543

  8. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  9. Threat, prejudice and stereotyping in the context of Japanese, North Korean, and South Korean intergroup relations.

    OpenAIRE

    Myers, Chris; Abrams, Dominic; Rosenthal, Harriet E.S.; Christian, Julie

    2013-01-01

    Integrated threat theory, realistic conflict theory, and group justification (based on social identity theory) were evaluated in the international context of Japanese prejudice toward North Korea and South Korea. Military threat emerged as an important addition to the four threats outlined by integrated threat theory. Three perceived North Korean threats (realistic [domestic] threat; intergroup anxiety; military threat) predicted prejudice toward North Korea. North Korean preju...

  10. Mitigation Policy Scenario of Space Debris Threat Related with National Security

    Science.gov (United States)

    Herdiansyah, Herdis; Frimawaty, Evy; Munir, Ahmad

    2016-02-01

    The development of air space recently entered a new phase, when the space issues correlated with the future of a country. In past time, the space authorization was related with advancing technology by many space mission and various satellite launchings, or it could be said that who ruled technology will rule the space. Therefore, the numerous satellites in the space could be a threat for the countries which are mainly located in the path of the satellite, especially in the equatorial region including Indonesia. This study aims to create a policy scenario in mitigating the threat of space debris. The results showed that although space debris was not threatened national security for now, but the potential and its impact on the future potentially harmful. The threats of orbit circulation for some experts considered as a threat for national security, because its danger potential which caused by space debris could significantly damage the affected areas. However, until now Indonesia has no comprehensive mitigation strategy for space matters although it has been ratified by the United Nations Convention.

  11. Threat-Related Information Suggests Competence: A Possible Factor in the Spread of Rumors

    OpenAIRE

    Boyer, Pascal; Parren, Nora

    2015-01-01

    Information about potential danger is a central component of many rumors, urban legends, ritual prescriptions, religious prohibitions and witchcraft crazes. We investigate a potential factor in the cultural success of such material, namely that a source of threat-related information may be intuitively judged as more competent than a source that does not convey such information. In five studies, we asked participants to judge which of two sources of information, only one of which conveyed thre...

  12. Illness representations of type 2 diabetes patients are associated with perceptions of diabetes threat in relatives.

    Science.gov (United States)

    van Esch, Suzanne C M; Nijkamp, Marjan D; Cornel, Martina C; Snoek, Frank J

    2014-03-01

    In the fight against the type 2 diabetes epidemic, patients might be asked to discuss familial susceptibility to type 2 diabetes in their family. Illness representations of patients (N = 546) were assessed to explore their impact on perceived type 2 diabetes threat in relatives. Reporting high type 2 diabetes burden, emotional impact and perceiving type 2 diabetes as an inheritable disease seemed to increase patients' family risk perception and worries about relatives' future health. Patients with coherent illness understanding reported positive beliefs regarding type 2 diabetes prevention in relatives. Findings may give direction in how illness representations may be used to guide patients in the process of family risk disclosure. PMID:23399919

  13. A review of neuroimaging studies of race-related prejudice: Does amygdala response reflect threat?

    Directory of Open Access Journals (Sweden)

    Adam Mourad Chekroud

    2014-03-01

    Full Text Available Prejudice is an enduring and pervasive aspect of human cognition. An emergent trend in modern psychology has focused on understanding how cognition is linked to neural function, leading researchers to investigate the neural correlates of prejudice. Research in this area, using racial group memberships, quickly highlighted the amygdala as a neural structure of importance. In this article, we offer a critical review of social neuroscientific studies of the amygdala in race-related prejudice. Rather than the dominant interpretation that amygdala activity reflects a racial or outgroup bias per se, we argue that the observed pattern of sensitivity in this literature is best considered in terms of potential threat. More specifically, we argue that negative culturally-learned associations between black males and potential threat better explain the observed pattern of amygdala activity. Finally, we consider future directions for the field, and offer specific experiments and predictions to directly address unanswered questions.

  14. Bioterrorism preparedness and response in European public health institutes.

    Science.gov (United States)

    Coignard, B

    2001-11-01

    The terrorist attacks on 11 September 2001 and the deliberate release of anthrax in the United States had consequences for public health not only there, but also in Europe. Europe's public health systems had to manage numerous postal materials possibly contaminated with anthrax. Our survey aimed to document the response of European public health institutes to recent bioterrorist events to identify the gaps that need to be addressed; 18 institutes from 16 countries participated in this Euroroundup. Bioterrorist threats in Europe were hoaxes only, and should be considered as a "preparedness exercise" from which three lessons can be drawn. Firstly, because of inadequate preparedness planning and funding arrangements, Europe was not ready in October 2001 to respond to bioterrorism. Secondly, although European institutes reacted quickly and adapted their priorities to a new type of threat, they need adequate and sustained support from national governments to maintain their overall capacity. Thirdly, the recent crisis demonstrated the need for increased investment in epidemiology training programmes and the establishment of a technical coordination unit for international surveillance and outbreak response in the European Union. PMID:11891386

  15. The Approach to Bioterrorism Incidents in Turkey

    International Nuclear Information System (INIS)

    Achieving an adequate level of planning and preparedness for terrorist events involving unconventional weapons, such as the intentional release of nuclear, radiological, biological, and/or chemical agents is a great challenge for Turkey. However, since bioterror agents possess different properties than other conventional attacks like the need for decontamination and the need for personal protective equipment, etc., special plannings should be made where various governmental organizations should be involved. First response against a bioterror attack is commonly given by local or regional organizations. Some of the following reactions include quick notification of authorities, establishment of a local crisis management center, information to public, medical management and decontamination, quarantine measures, evacuation to hospitals for suspected cases, forensic measures, social aids to victims Laboratory management is essential for bioterror attacks, so that the treatment or prophylaxis of injured cases with the organism can be performed properly. Therefore, an accredited reference laboratory should be set up for final diagnosis. Although much progress has been made in this regards, much work remains be to done in terms of ensuring adequate level via bioterror drills, adequate hospital-based decontamination unit and negative pressure isolation bed capacities, and adequate hospital-based stockpiles of personal protective equipment, drugs, vaccines and ventilators. From this point of view, potential organizations which are supposed to be assigned in this event must have task-oriented official departments and the roles should be outlined in detailed. Within this connection, a scenario simulating a bioterrorist attack and describing the response and coordination developed is schematised. (author)

  16. Failure to differentiate between threat-related and positive emotion cues in healthy adults with childhood interpersonal or adult trauma.

    Science.gov (United States)

    Chu, Denise A; Bryant, Richard A; Gatt, Justine M; Harris, Anthony W F

    2016-07-01

    Enhanced threat-related processing is associated with both elevated anxiety and childhood exposure to trauma. Given the paucity of evidence regarding the effects of childhood and adult trauma exposure on subsequent psychophysiological processes in the absence of psychopathology, we investigated the relative impacts of childhood interpersonal and non-interpersonal trauma, as well as adult trauma exposure on neural processing of threat in healthy adults. We measured peak amplitudes of the N170 face-sensitive visual ERP component response to non-conscious and conscious Angry (threat) versus Happy (non-threat, positive) and Neutral (non-threat baseline) faces at temporo-occipital sites (right-T6; left-T5) in 489 psychiatrically asymptomatic adults (aged 18-70 years, 54% women, 94% right-handed). N170 peak amplitude differences between Angry vs Happy or Neutral faces were calculated and subjected to hierarchical multiple regression analysis, with trauma types (childhood interpersonal, childhood non-interpersonal and adult trauma) entered as predictors of interest. After controlling for sociodemographic and health factors, N170 peak amplitudes for non-conscious Angry vs Happy faces were inversely associated with childhood interpersonal trauma at T6 and adult trauma exposure at T5. Post-hoc repeated measures ANOVA indicated that unlike adults without trauma exposure, trauma-exposed adults failed to show significantly reduced N170 responses to Happy relative to Angry faces during non-conscious processing. This suggests that childhood interpersonal and adult trauma exposure are associated with a failure to differentiate between non-threat or positive and threat-related emotion cues. This is consistent with generalised hypervigilance seen in PTSD, and suggests trauma exposure is associated with a generalized heightened responsivity to non-conscious non-threat or positive as well as threat-related emotion cues in psychiatrically healthy adults. PMID:27055015

  17. Social Media and Its Dual Use in Biopreparedness: Communication and Visualization Tools in an Animal Bioterrorism Incident

    DEFF Research Database (Denmark)

    Sjöberg, Elisabeth; Barker, Gary C.; Landgren, Jonas;

    2013-01-01

    This article focuses on social media and interactive challenges for emergency organizations during a bioterrorism or agroterrorism incident, and it outlines the dual-use dilemma of social media. Attackers or terrorists can use social media as their modus of operandi, and defenders, including emer...... in stream graphs and networks showing clusters of Twitter and Facebook users. The visualization of social media can be an important preparedness tool in the response to bioterrorism and agroterrorism.......This article focuses on social media and interactive challenges for emergency organizations during a bioterrorism or agroterrorism incident, and it outlines the dual-use dilemma of social media. Attackers or terrorists can use social media as their modus of operandi, and defenders, including...... emergency organizations in law enforcement and public and animal health, can use it for peaceful purposes. To get a better understanding of the uses of social media in these situations, a workshop was arranged in Stockholm, Sweden, to raise awareness about social media and animal bioterrorism threats. Fifty...

  18. Threat-related amygdala functional connectivity is associated with 5-HTTLPR genotype and neuroticism

    DEFF Research Database (Denmark)

    Madsen, Martin Korsbak; Mc Mahon, Brenda; Andersen, Sofie Bech;

    2016-01-01

    Communication between the amygdala and other brain regions critically regulates sensitivity to threat, which has been associated with risk for mood and affective disorders. The extent to which these neural pathways are genetically determined or correlate with risk-related personality measures is...... S' carriers exhibited a more negative association relative to L(A)L(A) individuals. These findings provide novel evidence for both independent and interactive effects of 5-HTTLPR genotype and neuroticism on amygdala communication, which may mediate effects on risk for mood and affective disorders....... not fully understood. Using functional magnetic resonance imaging, we evaluated independent and interactive effects of the 5-HTTLPR genotype and neuroticism on amygdala functional connectivity during an emotional faces paradigm in 76 healthy individuals. Functional connectivity between left amygdala...

  19. Comparison of quantitative PCR and culture-based methods for evaluating dispersal of Bacillus thuringiensis endospores at a bioterrorism hoax crime scene.

    Science.gov (United States)

    Crighton, Taryn; Hoile, Rebecca; Coleman, Nicholas V

    2012-06-10

    Since the anthrax mail attacks of 2001, law enforcement agencies have processed thousands of suspicious mail incidents globally, many of which are hoax bioterrorism threats. Bio-insecticide preparations containing Bacillus thuringiensis (Bt) spores have been involved in several such threats in Australia, leading to the requirement for rapid and sensitive detection techniques for this organism, a close relative of Bacillus anthracis. Here we describe the development of a quantitative PCR (qPCR) method for the detection of Bt crystal toxin gene cry1, and evaluation of the method's effectiveness during a hoax bioterrorism event in 2009. When combined with moist wipe sampling, the cry1 qPCR was a rapid, reliable, and sensitive diagnostic tool for detecting and quantifying Bt contamination, and mapping endospore dispersal within a mail sorting facility. Results from the cry1 qPCR were validated by viable counts of the same samples on Bacillus-selective agar (PEMBA), which revealed a similar pattern of contamination. Extensive and persistent contamination of the facility was detected, both within the affected mailroom, and extending into office areas up to 30m distant from the source event, emphasising the need for improved containment procedures for suspicious mail items, both during and post-event. The cry1 qPCR enables detection of both viable and non-viable Bt spores and cells, which is important for historical crime scenes or scenes subjected to decontamination. This work provides a new rapid method to add to the forensics toolbox for crime scenes suspected to be contaminated with biological agents. PMID:22227150

  20. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. PMID:24894605

  1. No prior entry for threat-related faces: evidence from temporal order judgments.

    Directory of Open Access Journals (Sweden)

    Antonio Schettino

    Full Text Available Previous research showed that threat-related faces, due to their intrinsic motivational relevance, capture attention more readily than neutral faces. Here we used a standard temporal order judgment (TOJ task to assess whether negative (either angry or fearful emotional faces, when competing with neutral faces for attention selection, may lead to a prior entry effect and hence be perceived as appearing first, especially when uncertainty is high regarding the order of the two onsets. We did not find evidence for this conjecture across five different experiments, despite the fact that participants were invariably influenced by asynchronies in the respective onsets of the two competing faces in the pair, and could reliably identify the emotion in the faces. Importantly, by systematically varying task demands across experiments, we could rule out confounds related to suboptimal stimulus presentation or inappropriate task demands. These findings challenge the notion of an early automatic capture of attention by (negative emotion. Future studies are needed to investigate whether the lack of systematic bias of attention by emotion is imputed to the primacy of a non-emotional cue to resolve the TOJ task, which in turn prevents negative emotion to exert an early bottom-up influence on the guidance of spatial and temporal attention.

  2. Biosensors for security and bioterrorism applications

    CERN Document Server

    Nikoleli, Georgia-Paraskevi

    2016-01-01

    This book offers comprehensive coverage of biomarker/biosensor interactions for the rapid detection of weapons of bioterrorism, as well as current research trends and future developments and applications. It will be useful to researchers in this field who are interested in new developments in the early detection of such. The authors have collected very valuable and, in some aspects indispensable experience in the area i.e. in the development and application of portable biosensors for the detection of potential hazards. Most efforts are centered on the development of immunochemical assays including flow-lateral systems and engineered antibodies and their fragments. In addition, new approaches to the detection of enzyme inhibitors, direct enzymatic and microbial detection of metabolites and nutrients are elaborated. Some realized prototypes and concept devices applicable for the further use as a basis for the cooperation programs are also discussed. There is a particular focus on electrochemical and optical det...

  3. Biodefense and Bioterrorism - Multiple Languages: MedlinePlus

    Science.gov (United States)

    ... Supplements Videos & Tools You Are Here: Home → Multiple Languages → All Health Topics → Biodefense and Bioterrorism URL of this page: https://medlineplus.gov/languages/biodefenseandbioterrorism.html Other topics A-Z A B ...

  4. Indicators of implicit and explicit social anxiety influence threat-related interpretive bias as a function of working memory capacity

    Directory of Open Access Journals (Sweden)

    Elske eSalemink

    2013-05-01

    Full Text Available Interpretive biases play a crucial role in anxiety disorders. The aim of the current study was to examine factors that determine the relative strength of threat-related interpretive biases that are characteristic of individuals high in social anxiety. Different (dual process models argue that both implicit and explicit processes determine information processing biases and behaviour, and that their impact is moderated by the availability of executive resources such as working memory capacity (WMC. Based on these models, we expected indicators of implicit social anxiety to predict threat-related interpretive bias in individuals low, but not high in WMC. Indicators of explicit social anxiety should predict threat-related interpretive bias in individuals high, but not low in WMC. As expected, WMC moderated the impact of implicit social anxiety on threat-related interpretive bias, although the simple slope for individuals low in WMC was not statistically significant. The hypotheses regarding explicit social anxiety (with fear of negative evaluation used as an indicator were fully supported. The clinical implications of these findings are discussed.

  5. The Risk of Risk Analysis And its Relation to the Economics of Insider Threats

    Science.gov (United States)

    Probst, Christian W.; Hunker, Jeffrey

    Insider threats to organizational information security are widely viewed as an important concern, but little is understood as to the pattern of their occurrence. We outline an argument for explaining what originally surprised us: that many practitioners report that their organizations take basic steps to prevent insider attacks, but do not attempt to address more serious attacks. We suggest that an understanding of the true cost of additional policies to control insider threats, and the dynamic nature of potential insider threats together help explain why this observed behavior is economically rational. This conclusion also suggests that further work needs to be done to understand how better to change underlying motivations of insiders, rather than simply focus on controlling and monitoring their behavior.

  6. Perceived Threat, Risk Perception, and Efficacy Beliefs Related to SARS and Other (Emerging) Infectious Diseases

    DEFF Research Database (Denmark)

    de Zwart, Onno; Veldhuijzen, Irene; Elam, Gillian;

    2009-01-01

    PURPOSE: To study the levels of perceived threat, perceived severity, perceived vulnerability, response efficacy, and self-efficacy for severe acute respiratory syndrome (SARS) and eight other diseases in five European and three Asian countries. METHOD: A computer-assisted phone survey was conduc...

  7. Coping with Self-Threat and the Evaluation of Self-Related Traits: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Andreas Hoefler

    Full Text Available A positive view of oneself is important for a healthy lifestyle. Self-protection mechanisms such as suppressing negative self-related information help us to maintain a positive view of ourselves. This is of special relevance when, for instance, a negative test result threatens our positive self-view. To date, it is not clear which brain areas support self-protective mechanisms under self-threat. In the present functional magnetic resonance imaging (fMRI study the participants (N = 46 received a (negative vs. positive performance test feedback before entering the scanner. In the scanner, the participants were instructed to ascribe personality traits either to themselves or to a famous other. Our results showed that participants responded slower to negative self-related traits compared to positive self-related traits. High self-esteem individuals responded slower to negative traits compared to low self-esteem individuals following a self-threat. This indicates that high self-esteem individuals engage more in self-enhancing strategies after a threat by inhibiting negative self-related information more successfully than low self-esteem individuals. This behavioral pattern was mirrored in the fMRI data as dACC correlated positively with trait self-esteem. Generally, ACC activation was attenuated under threat when participants evaluated self-relevant traits and even more for negative self-related traits. We also found that activation in the ACC was negatively correlated with response times, indicating that greater activation of the ACC is linked to better access (faster response to positive self-related traits and to impaired access (slower response to negative self-related traits. These results confirm the ACC function as important in managing threatened self-worth but indicate differences in trait self-esteem levels. The fMRI analyses also revealed a decrease in activation within the left Hippocampus and the right thalamus under threat. This

  8. China Threat, What Threat?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Since the end of the Cold War, China has become the candidate of choice among "illusionist" hawks looking to justify Pentagon spending. Henry Rosemont, a professor emeritus at St Mary’s CoUege of Maryland and a visiting scholar in the Religious Studies Department at Brown University, recently wrote an article for Asia Times Online, saying that facts belie the claims of China’s military threat

  9. Social media and its dual use in biopreparedness: communication and visualization tools in an animal bioterrorism incident.

    Science.gov (United States)

    Sjöberg, Elisabeth; Barker, Gary C; Landgren, Jonas; Griberg, Isaac; Skiby, Jeffrey E; Tubbin, Anna; von Stapelmohr, Anne; Härenstam, Malin; Jansson, Mikael; Knutsson, Rickard

    2013-09-01

    This article focuses on social media and interactive challenges for emergency organizations during a bioterrorism or agroterrorism incident, and it outlines the dual-use dilemma of social media. Attackers or terrorists can use social media as their modus operandi, and defenders, including emergency organizations in law enforcement and public and animal health, can use it for peaceful purposes. To get a better understanding of the uses of social media in these situations, a workshop was arranged in Stockholm, Sweden, to raise awareness about social media and animal bioterrorism threats. Fifty-six experts and crisis communicators from international and national organizations participated. As a result of the workshop, it was concluded that emergency organizations can collect valuable information and monitor social media before, during, and after an outbreak. In order to make use of interactive communication to obtain collective intelligence from the public, emergency organizations must adapt to social networking technologies, requiring multidisciplinary knowledge in the fields of information, communication, IT, and biopreparedness. Social network messaging during a disease outbreak can be visualized in stream graphs and networks showing clusters of Twitter and Facebook users. The visualization of social media can be an important preparedness tool in the response to bioterrorism and agroterrorism. PMID:23971817

  10. The relation between electroencephalogram asymmetry and attention biases to threat at baseline and under stress

    OpenAIRE

    Pérez-Edgar, Koraly; Kujawa, Autumn; Nelson, S. Katherine; Cole, Claire; Zapp, Daniel J.

    2013-01-01

    Electroencephalogram (EEG) asymmetry in the alpha frequency band has been implicated in emotion processing and broad approach-withdrawal motivation systems. Questions remain regarding the cognitive mechanisms that may help elucidate the observed links between EEG asymmetry and patterns of socioemotional functioning. The current study observed frontal EEG asymmetry patterns at rest and under social threat among young adults (N=45, M=21.1 years). Asymmetries were, in turn, associated with perfo...

  11. Smallpox-Related Knowledge and Beliefs among Recent College Graduates

    Science.gov (United States)

    Bungum, Timothy; Day, Charlene

    2006-01-01

    Recent world events have increased concern and preparations for possible bioterror events. Despite worldwide efforts to limit access to bio-weapons, smallpox is still considered a potential bioterror threat. Americans' understanding of smallpox could prevent panic and enhance the willingness of citizens to receive vaccinations. Objective: The…

  12. National Bioterrorism Syndromic Surveillance Demonstration Program.

    Science.gov (United States)

    Yih, W Katherine; Caldwell, B; Harmon, R; Kleinman, K; Lazarus, R; Nelson, A; Nordin, J; Rehm, B; Richter, B; Ritzwoller, D; Sherwood, E; Platt, R

    2004-09-24

    The National Bioterrorism Syndromic Surveillance Demonstration Program identifies new cases of illness from electronic ambulatory patient records. Its goals are to use data from health plans and practice groups to detect localized outbreaks and to facilitate rapid public health follow-up. Data are extracted nightly on patient encounters occurring during the previous 24 hours. Visits or calls with diagnostic codes corresponding to syndromes of interest are counted; repeat encounters are excluded. Daily counts of syndromes by zip code are sent to a central data repository, where they are statistically analyzed for unusual clustering by using a model-adjusted SaTScan approach. The results and raw data are displayed on a restricted website. Patient-level information stays at the originating health-care organization unless required by public health authorities. If a cluster surpasses a threshold of statistical aberration chosen by the corresponding public health department, an electronic alert can be sent to that department. The health department might then call a clinical responder, who has electronic access to records of cases contributing to clusters. The system is flexible, allowing for changes in participating organizations, syndrome definitions, and alert thresholds. It is transparent to clinicians and has been accepted by the health-care organizations that provide the data. The system's data are usable by local and national health agencies. Its software is compatible with commonly used systems and software and is mostly open-source. Ongoing activities include evaluating the system's ability to detect naturally occurring outbreaks and simulated terrorism events, automating and testing alerts and response capability, and evaluating alternative data sources. PMID:15714626

  13. Bioterrorism education effect on knowledge and attitudes of nurses

    Directory of Open Access Journals (Sweden)

    Nahid Aghaei

    2013-01-01

    Full Text Available Context: The most important way against bioterrorism is reinforcement of knowledge of health and medical team to diagnose and rapid reaction during these events. Aims: To assess the effect of bioterrorism education on knowledge and attitudes of nurses. Settings and Design: the setting of study was one of the infectious disease wards, emergency rooms or internal wards of the hospitals under supervision of Mazandaran University of Medical Sciences. Materials and Methods: In this pre-experimental study, 65 nurses who had all inclusion criteria are selected by accessible sampling method. Data on nurses knowledge and attitudes toward bioterrorism were collected using a self-administered questionnaire before and after two two-h sessions education. After a month of education, the units responded to questionnaire again. Statistical Analysis Used: A descriptive statistics Wilcoxon tests and Spearman correlation coefficient were used. Results: Before education, the majority of units (96.9% had low knowledge about bioterrorism (0-33.3% score of 100%,whereas after education, the majority of them (100% had good knowledge(well done (66.7-100% score of 100%. And majority of units (96.9% before education had indifferent attitude toward bioterrorism (33.4-66.6% score of 100%, whereas a majority of them (98.5% after education had positive attitude (66.7-100% score of 100%. Conclusions: The education has a positive effect on nurses′ knowledge and attitudes and it can be a guideline for administrators of the Ministry of Health and medicine for planning to achieve the goals of preventive and defense against bioterrorism.

  14. Bioterrorism education effect on knowledge and attitudes of nurses

    Science.gov (United States)

    Aghaei, Nahid; Nesami, Masoumeh Bagheri

    2013-01-01

    Context: The most important way against bioterrorism is reinforcement of knowledge of health and medical team to diagnose and rapid reaction during these events. Aims: To assess the effect of bioterrorism education on knowledge and attitudes of nurses. Settings and Design: the setting of study was one of the infectious disease wards, emergency rooms or internal wards of the hospitals under supervision of Mazandaran University of Medical Sciences. Materials and Methods: In this pre-experimental study, 65 nurses who had all inclusion criteria are selected by accessible sampling method. Data on nurses knowledge and attitudes toward bioterrorism were collected using a self-administered questionnaire before and after two two-h sessions education. After a month of education, the units responded to questionnaire again. Statistical Analysis Used: A descriptive statistics Wilcoxon tests and Spearman correlation coefficient were used. Results: Before education, the majority of units (96.9%) had low knowledge about bioterrorism (0-33.3% score of 100%),whereas after education, the majority of them (100%) had good knowledge(well done) (66.7-100% score of 100%). And majority of units (96.9%) before education had indifferent attitude toward bioterrorism (33.4-66.6% score of 100%), whereas a majority of them (98.5%) after education had positive attitude (66.7-100% score of 100%). Conclusions: The education has a positive effect on nurses’ knowledge and attitudes and it can be a guideline for administrators of the Ministry of Health and medicine for planning to achieve the goals of preventive and defense against bioterrorism. PMID:23723614

  15. Neural responses to threat and reward interact to predict stress-related problem drinking: A novel protective role of the amygdala

    Directory of Open Access Journals (Sweden)

    Nikolova Yuliya S

    2012-11-01

    Full Text Available Abstract Background Research into neural mechanisms of drug abuse risk has focused on the role of dysfunction in neural circuits for reward. In contrast, few studies have examined the role of dysfunction in neural circuits of threat in mediating drug abuse risk. Although typically regarded as a risk factor for mood and anxiety disorders, threat-related amygdala reactivity may serve as a protective factor against substance use disorders, particularly in individuals with exaggerated responsiveness to reward. Findings We used well-established neuroimaging paradigms to probe threat-related amygdala and reward-related ventral striatum reactivity in a sample of 200 young adult students from the ongoing Duke Neurogenetics Study. Recent life stress and problem drinking were assessed using self-report. We found a significant three-way interaction between threat-related amygdala reactivity, reward-related ventral striatum reactivity, and recent stress, wherein individuals with higher reward-related ventral striatum reactivity exhibit higher levels of problem drinking in the context of stress, but only if they also have lower threat-related amygdala reactivity. This three-way interaction predicted both contemporaneous problem drinking and problem drinking reported three-months later in a subset of participants. Conclusions These findings suggest complex interactions between stress and neural responsiveness to both threat and reward mediate problem drinking. Furthermore, they highlight a novel protective role for threat-related amygdala reactivity against drug use in individuals with high neural reactivity to reward.

  16. The dynamic effects of age-related stereotype threat on explicit and implicit memory performance in older adults

    OpenAIRE

    Eich, TS; Murayama, K.; Castel, AD; Knowlton, BJ

    2014-01-01

    © 2014 Guilford Publications, Inc. While an awareness of age-related changes in memory may help older adults gain insight into their own cognitive abilities, it may also have a negative impact on memory performance through a mechanism of stereotype threat (ST). The consequence of ST is under-performance in abilities related to the stereotype. Here, we examined the degree to which explicit and implicit memory were affected by ST across a wide age-range. We found that explicit memory was affect...

  17. Biological Threats

    Science.gov (United States)

    ... Workplace Plans School Emergency Plans Main Content Biological Threats Biological agents are organisms or toxins that can ... for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may or ...

  18. [Molecular and immunological detection of bacteria applied to bio-terrorism].

    Science.gov (United States)

    Pelletier, N; La Scola, B

    2010-09-01

    Following the episode of letters containing anthrax in the USA in 2001, the fight against bio-terrorism became a priority for many countries (including France). The detection of bacteria in bio-terrorism settings is a major component of this fight. Indeed, the early detection of these bio-terrorism agents leads to an appropriate treatment and to a reduced transmission of the disease. Bacteria are important bio-terrorism agents, and the techniques used for their detection are constantly evolving. In this review, after describing the main bacteria that can be used for bio-terrorism, we also describe the techniques available for their detection: DNA or antigen detection. PMID:20400254

  19. Three-Week Bright-Light Intervention Has Dose-Related Effects on Threat-Related Corticolimbic Reactivity and Functional Coupling

    DEFF Research Database (Denmark)

    Fisher, Patrick M; Madsen, Martin K; Mc Mahon, Brenda;

    2014-01-01

    -11.0 kilolux) for 30 minutes daily over a period of 3 weeks. Additionally, we considered serotonin transporter-linked polymorphic region (5-HTTLPR) genotype status as a model for differences in serotonin signaling and moderator of intervention effects. RESULTS: Bright-light dose significantly negatively......BACKGROUND: Bright-light intervention is reported to successfully treat depression, in particular seasonal affective disorder, but the neural pathways and molecular mechanisms mediating its effects are unclear. An amygdala-prefrontal cortex corticolimbic circuit regulates responses to salient...... environmental stimuli (e.g., threat) and may underlie these effects. Serotonin signaling modulates this circuit and is implicated in the pathophysiology of seasonal and other affective disorders. METHODS: We evaluated the effects of a bright-light intervention protocol on threat-related corticolimbic reactivity...

  20. Smallpox: a potential agent of bioterrorism.

    Science.gov (United States)

    Whitley, Richard J

    2003-01-01

    The events of 11 September 2001, in New York City, and subsequent identification of anthrax in the United States Postal System, have generated a new sense of awareness for the potential of biological terrorism, if not warfare. Among those agents identified by the Centers for Disease Control and Prevention as 'Class A Bioterrorist Threats', smallpox is among the most dangerous. The ease of transmission of this agent, the lack of immunity in the population at large to this agent, and rapidity of its spread, if released, all generate significant concern for its deployment. A vaccine directed against smallpox is available but it is also associated with significant adverse events-some of which are life-threatening. Further, no antiviral drug has proven efficacious for therapy of human disease, although one licensed drug, cidofovir, does have in vitro activity. Regardless, heightened awareness should lead to the development of a vaccine without significant adverse events and safe and efficacious antiviral drugs. The availability of a vaccine and antiviral drugs that are safe would significantly remove any major threat of smallpox deployment by a terrorist. PMID:12615298

  1. Accidental and deliberate microbiological contamination in the feed and food chains — How biotraceability may improve the response to bioterrorism

    DEFF Research Database (Denmark)

    Knutsson, Rickard; van Rotterdam, Bart; Fach, Patrick;

    2011-01-01

    A next frontier of the global food safety agenda has to consider a broad spectrum of bio-risks, such as accidental and intentional contaminations in the food and feed chain. In this article, the background for the research needs related to biotraceability and response to bioterrorism incidents are...... crucial in any food-born outbreak and particular in the response to bioterrorism events. In the later case, tested and proven biotraceability improves the following; (i) international collaboration of validated tracing tools and detection methods, (ii) multi-disciplinary expertise and collaboration in the...... outlined. Given the current scale of international trade any response need to be considered in an international context. Biotraceability (e.g the ability to use downstream information to point to processes or within a particular food chain that can be identified as the source of undesirable agents) is...

  2. Attention Biases Towards and Away from Threat Mark the Relation between Early Dysregulated Fear and the Later Emergence of Social Withdrawal.

    Science.gov (United States)

    Morales, Santiago; Pérez-Edgar, Koraly E; Buss, Kristin A

    2015-08-01

    Fearful temperament, mostly studied as behavioral inhibition (BI), has been extensively associated with social withdrawal in childhood and the later emergence of anxiety disorders, especially social anxiety disorder (SAD). Recent studies have characterized a distinct type of fearful temperament marked by high levels of fear in low threat situations - labeled dysregulated fear. Dysregulated fear has been related to SAD over and above risks associated with BI. However, the mechanism by which dysregulated fear is related to SAD has not been studied. Cognitive mechanisms, such as attentional bias towards threat, may be a possible conduit. We examined differences in attentional bias towards threat in six-year-olds who displayed a pattern of dysregulated fear at age two (N = 23) compared with children who did not display dysregulated fear (N = 33). Moreover, we examined the concurrent relation between attentional bias and social withdrawal. Results indicated that children characterized by dysregulated fear showed a significant bias away from threat, and that this bias was significantly different from the children without dysregulated fear, who showed no significant bias. Moreover, attentional bias towards threat was positively related to social withdrawal only for the dysregulated fear group. These results are discussed in consideration of the existing knowledge of attentional bias to threat in the developmental and pediatric anxiety literatures, as well as recent studies that find important heterogeneity in attentional bias. PMID:25510354

  3. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate. PMID:26361054

  4. Media exposure to bioterrorism: stress and the anthrax attacks.

    Science.gov (United States)

    Dougall, Angela Liegey; Hayward, Michele C; Baum, Andrew

    2005-01-01

    This study examined media exposure and adjustment to anthrax bioterrorism attacks and the terrorist attacks on 9/11 in a sample of 300 people who lived distant from the attacks. Measures of direct and indirect exposure to terrorism, perceived risk of anthrax exposure, psychological distress, and outlook were assessed at 2 to 3 months and at 8 months after the first reported anthrax attack. Initial anthrax media exposure was a powerful predictor of distress, whereas subsequent anthrax media exposure only predicted negative changes in outlook over time. Perceived risk of anthrax exposure predicted distress and outlook but did not appear to mediate the effects of media exposure. Determining the nature and consequences of media exposure to threatening and frightening events like terrorism will help predict and manage response to future bioterrorism. PMID:15899708

  5. Transatlantic relations are alliances a funcion [i.e. function] of an external threat?

    OpenAIRE

    Jahnel, Carsten H.

    2005-01-01

    Current European-U.S. transatlantic relations represent the heritage of a large number of international alliances and institutions that were founded at a time when there was a bipolar world, a world dominated by the United States and the Soviet Union. Today fourteen years after the end of the Cold War, some national leaders question the continued viability of these international alliances and institutions. In their references to international relations, realist and liberal theorists reflect s...

  6. Bio-terrorism: still interesting or concerning nowadays?

    OpenAIRE

    Claudiu E. Sbârcea; Lucian Lerescu; Mariana Jinga

    2014-01-01

    Bio-terrorism involves using biological agents/toxins with the intent to intimidate or coerce a government or civilian population to further political or social objectives, usually leading to deaths or illnesses of humans but also of plants/animals. Their use would probably initially be considered as a natural or unintentional event, especially in case of live biological agents. Moreover, a natural occurring disease outbreak could have the same destructive outcome as an efficie...

  7. Secretory IgA reactivity to social threat in youth: Relations with HPA, ANS, and behavior.

    Science.gov (United States)

    Laurent, Heidemarie K; Stroud, Laura R; Brush, Bridget; D'Angelo, Christina; Granger, Douglas A

    2015-09-01

    Although the role of immune marker secretory immunoglobulin A (SIgA) in stress-related health outcomes is gaining recognition, SIgA responsiveness to acute stress has rarely been assessed in adults, and not at all in children. This study was designed to clarify developmental origins of differential immune function-related health risks by investigating youth SIgA responses to psychosocial stressors, including both normative responses and variability related to behavioral problems. Children and adolescents from a larger study (n=82) gave 6 saliva samples during a laboratory session in which they were exposed to a series of performance or interpersonal stressors. Samples were assayed for SIgA, as well as cortisol (representing hypothalamic-pituitary-adrenal axis activity) and alpha-amylase (sAA; representing autonomic nervous system activity). Behavioral problems were assessed with parent-report measures of youth internalizing and externalizing. Youth SIgA trajectories followed a normative pattern of reactivity and recovery around the stressors; however, these responses were blunted in youth with higher externalizing scores. SIgA showed differential associations with cortisol and sAA, and with positive and negative affect; whereas overall levels of SIgA related to cortisol output and positive affect, changes in SIgA over time synchronized with changes in sAA and negative affect. In contrast to SIgA, neither cortisol nor sAA related significantly to behavioral problems. Implications for the role of SIgA during psychosocial stress in the development of immune function-related health risks are discussed. PMID:26036453

  8. A Math-Related Decrement Stereotype Threat Reaction among Older Nontraditional College Learners

    Science.gov (United States)

    Hollis-Sawyer, Lisa

    2011-01-01

    It is important to address quality of life issues, such as education participation, with a growing aging population. The focus for the present research was on possible reactions among a broad age range of nontraditional learners. The present study found significant aging-related issues in perceived willingness to be involved in math-related…

  9. The Effects of Verbal Disgust- and Threat-Related Information about Novel Animals on Disgust and Fear Beliefs and Avoidance in Children

    Science.gov (United States)

    Muris, Peter; Huijding, Jorg; Mayer, Birgit; Leemreis, Willem; Passchier, Stefanie; Bouwmeester, Samantha

    2009-01-01

    Disgust is a basic emotion that is thought to play a role in the etiology of certain types of specific phobias, like animal phobias. Two experiments were conducted in which 9- to 14-year-old children were exposed to disgust-related, cleanliness-related, and threat-related information about unknown animals. It was investigated to what extent these…

  10. Attentional bias to respiratory- and anxiety-related threat in children with asthma.

    Science.gov (United States)

    Lowther, Helen; Newman, Emily; Sharp, Kirstin; McMurray, Ann

    2016-08-01

    This study investigated attentional biases in children with asthma. The study aimed at testing whether children with asthma are vigilant to asthma and/or anxiety cues. Thirty-six children (18 with asthma and 18 healthy controls) aged 9-12 completed a computerised dot probe task designed to measure attentional bias to three different categories of words: asthma, anxiety symptom and general negative emotion. Main caregiver anxiety was also assessed, as was frequency of inhaler use for those with asthma. Children with asthma showed an attentional bias towards asthma words but not anxiety or general negative emotion words. Children without asthma showed no significant attentional biases to any word categories. Caregiver anxiety was correlated with asthma word attentional bias in the asthma group. The findings indicate that attentional bias is present in children with asthma. Further research is required to ascertain if this exacerbates or maintains health-related problems. PMID:25966340

  11. Bioterrorism and radiation. What to do? What research is needed?

    International Nuclear Information System (INIS)

    Radiological and nuclear terrorism has emerged as a major concern. Often included within the broad category of bioterrorism, the response to the intentional exposure of populations to radiation requires governmental agencies, law enforcement agencies, policy-makers, experts in radiation medicine and radiation biology and an educated citizenry. Emerging knowledge of normal tissue injury following radiation will provide important areas for research, as outlined in a recent Radiation Research Program (RRP) Workshop from the National Cancer Institute (NCI) (Stone HB, Rad Res 157:204- 223, 2002). Such research involves radiation biology and wound healing and may ultimately provide strategies for pre-exposure radioprotectors as well as post-exposure strategies to prevent serious normal tissue damage. Radiation in the Moderate Dose range, defined as 1-10 Gy, applies to radiological and nuclear terrorism and also to clinical radiation therapy. (RRP Moderate Dose Radiation Workshop, Coleman CN, Rad Res, in press 2003). New approaches such as Intensity Modulated Radiotherapy (IMRT) will expose more tissues to low doses of radiation. Strategies for developing agents for normal tissue targets (Tofilon). The successful application of radiotherapy as a cancer treatment modality is severely constrained by the risk for normal tissue injury. Because approximately half of all cancer patients receive radiation treatment, the ability to selectively protect normal tissue would be of obvious clinical benefit. In addition to cancer therapy, current geopolitical circumstances reinforce the need for generating agents that protect against the consequences of environmental radiation exposure, accidental or intentional. Currently, there are relatively few available agents with the potential to reduce or eliminate radiation-induced normal tissue injury after clinical and/or environmental exposure. A goal of the Radiation Research Program is to identify and develop novel radioprotectors

  12. The Effect Of Non-Audit Services And Related Threats On Investors' Perceptions Of Auditor Independence: An Experiment

    DEFF Research Database (Denmark)

    Warming-Rasmussen, Bent; Quick, Reiner

    2011-01-01

    The provision of non-audit services by the statutory auditor may have a negative impact on independence in mind as well as on independence in appearance. Prior research revealed that different advisory services have a different effect on perceived auditor independence. This could be caused by the...... fact that a differnt number and intensity of endependence threats is attached to indiviual services. Therefore this experimental study investigates the effect of such threats on independence perceptions of German individual investors. The results show that the selfreview and the familiarity threat may...

  13. 生物恐怖:威胁和解决%Bioterrorism: from Threats to Solutions

    Institute of Scientific and Technical Information of China (English)

    Robert Steffen

    2002-01-01

    @@ Robert Steffen, Scientist, WHO Project Improving public health preparedness on diseases associated with biological warfare; Co-chair, Swiss B Committee: University of Zurich, Switzerland. The goal of any emergency preparedness and response planning is to keep it an emergency and to avert a disaster.

  14. Distributed micro-releases of bioterror pathogens : threat characterizations and epidemiology from uncertain patient observables.

    Energy Technology Data Exchange (ETDEWEB)

    Wolf, Michael M. (University of Illinois, Urbana-Champaign, Urbana, IL); Marzouk, Youssef M.; Adams, Brian M.; Devine, Karen Dragon; Ray, Jaideep; Najm, Habib N.

    2008-10-01

    Terrorist attacks using an aerosolized pathogen preparation have gained credibility as a national security concern since the anthrax attacks of 2001. The ability to characterize the parameters of such attacks, i.e., to estimate the number of people infected, the time of infection, the average dose received, and the rate of disease spread in contemporary American society (for contagious diseases), is important when planning a medical response. For non-contagious diseases, we address the characterization problem by formulating a Bayesian inverse problem predicated on a short time-series of diagnosed patients exhibiting symptoms. To keep the approach relevant for response planning, we limit ourselves to 3.5 days of data. In computational tests performed for anthrax, we usually find these observation windows sufficient, especially if the outbreak model employed in the inverse problem is accurate. For contagious diseases, we formulated a Bayesian inversion technique to infer both pathogenic transmissibility and the social network from outbreak observations, ensuring that the two determinants of spreading are identified separately. We tested this technique on data collected from a 1967 smallpox epidemic in Abakaliki, Nigeria. We inferred, probabilistically, different transmissibilities in the structured Abakaliki population, the social network, and the chain of transmission. Finally, we developed an individual-based epidemic model to realistically simulate the spread of a rare (or eradicated) disease in a modern society. This model incorporates the mixing patterns observed in an (American) urban setting and accepts, as model input, pathogenic transmissibilities estimated from historical outbreaks that may have occurred in socio-economic environments with little resemblance to contemporary society. Techniques were also developed to simulate disease spread on static and sampled network reductions of the dynamic social networks originally in the individual-based model, yielding faster, though approximate, network-based epidemic models. These reduced-order models are useful in scenario analysis for medical response planning, as well as in computationally intensive inverse problems.

  15. Bioterrorism Threats Must Unite Academe and the U.S. Intelligence Community

    Science.gov (United States)

    Parker, Elizabeth Rindskopf

    2004-01-01

    The National Research Council recently issued a report that suggested ways in which to improve the management of potentially dangerous biomedical research in both academe and private industry, without unduly restricting scientists in their research activities. Here, the author shares her views on the report as well as the estrangement of the…

  16. The Psychology of Ongoing Threat: Relative Risk Appraisal, the September 11 Attacks, and Terrorism-Related Fears

    Science.gov (United States)

    Marshall, Randall D.; Bryant, Richard A.; Amsel, Lawrence; Suh, Eun Jung; Cook, Joan M.; Neria, Yuval

    2007-01-01

    There are now replicated findings that posttraumatic stress disorder (PTSD) symptoms related to the September 11, 2001, attacks occurred in large numbers of persons who did not fit the traditional definition of exposure to a traumatic event. These data are not explained by traditional epidemiologic "bull's eye" disaster models, which assume the…

  17. Fluctuations in [¹¹C]SB207145 PET binding associated with change in threat-related amygdala reactivity in humans

    DEFF Research Database (Denmark)

    Fisher, Patrick MacDonald; Haahr, Mette Ewers; Jensen, Christian Gaden;

    2015-01-01

    resonance imaging while performing a gender discrimination task of fearful, angry, and neutral faces. This offered a unique opportunity to evaluate whether individual fluctuations in central serotonin levels, indexed by change in [11C]SB207145 binding, predicted changes in threat-related reactivity (ie...

  18. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  19. Bioterrorism-Related Anthrax Surveillance, Connecticut, September–December, 2001

    OpenAIRE

    Williams, Alcia A.; Parashar, Umesh D.; Adrian STOICA; Ridzon, Renee; Kirschke, David L.; Meyer, Richard F.; McClellan, Jennifer; Fischer, Marc; Nelson, Randy; Cartter, Matt; Hadler, James L; Jernigan, John A.; Mast, Eric E.; Swerdlow, David L.; ,

    2002-01-01

    On November 19, 2001, a case of inhalational anthrax was identified in a 94-year-old Connecticut woman, who later died. We conducted intensive surveillance for additional anthrax cases, which included collecting data from hospitals, emergency departments, private practitioners, death certificates, postal facilities, veterinarians, and the state medical examiner. No additional cases of anthrax were identified. The absence of additional anthrax cases argued against an intentional environmental ...

  20. After 9/11: priority focus areas for bioterrorism preparedness in hospitals.

    Science.gov (United States)

    Murphy, Jenifer K

    2004-01-01

    Following the terrorist attacks of September 11, 2001, bioterrorism preparedness was a priority in hospitals, but it did not remain a priority. As a result, hospitals are still unprepared to deal with the effects of a bioterrorist attack. The government has provided initial funding to state and local governments for bioterrorism preparedness; however, much of this money has yet to reach hospitals. With the inadequate funding available to hospitals, four initial measures must be focused on. These focus areas are community involvement, hospital staff education, information technology and disease surveillance improvement, and additional equipment and staff acquisition. Hospitals should also make bioterrorism-preparedness planning a regional effort. PMID:15328657

  1. Animal Botulism Outcomes in the AniBioThreat Project

    DEFF Research Database (Denmark)

    Woudstra, Cédric; Tevell Åberg, Annica; Skarin, Hanna;

    2013-01-01

    and botulinum neurotoxins are considered potential weapons for bioterrorism and have been included in the Australia Group List of Biological Agents. In 2010 the European Commission (DG Justice, Freedom and Security) funded a 3-year project named AniBioThreat to improve the EU's capacity to counter...... required acquiring new genetic information to better understand the diversity of these Clostridia and develop detection methods targeting both highly specific genetic markers of these Clostridia and the neurotoxins they are able to produce. Several European institutes participating in the Ani...

  2. Fluctuations in [11C]SB207145 PET Binding Associated with Change in Threat-Related Amygdala Reactivity in Humans

    OpenAIRE

    Fisher, Patrick MacDonald; Haahr, Mette Ewers; Jensen, Christian Gaden; Frokjaer, Vibe Gedsoe; Siebner, Hartwig Roman; Knudsen, Gitte Moos

    2015-01-01

    Serotonin critically affects the neural processing of emotionally salient stimuli, including indices of threat; however, how alterations in serotonin signaling contribute to changes in brain function is not well understood. Recently, we showed in a placebo-controlled study of 32 healthy males that brain serotonin 4 receptor (5-HT4) binding, assessed with [11C]SB207145 PET, was sensitive to a 3-week intervention with the selective serotonin reuptake inhibitor fluoxetine, supporting it as an in...

  3. IMPACT OF THE 2002 BIOTERRORISM ACT ON THE NEW JERSEY FOOD INDUSTRY

    OpenAIRE

    Turvey, Calum G.; Onyango, Benjamin M.; Schilling, Brian J.

    2003-01-01

    This paper provides an overview of the four key sections of the Public Health Security and Bioterrorism Preparedness and Response Act of 2002, with regard to Administrative Detention (Section 303), Facilities Registration (Section 305), Records and Maintenance (Section 306), and Prior Notice of Food Imports (Section 307). The potential impacts of the Bioterrorism Act on the food industry are examined through qualitative analysis of industry submissions to the Food and Drug Administration (FDA...

  4. Actionable Knowledge and Strategic Decision Making for Bio- and Agroterrorism Threats: Building a Collaborative Early Warning Culture

    DEFF Research Database (Denmark)

    Mårtensson, Per-Åke; Hedström, Lars; Sundelius, Bengt;

    2013-01-01

    commission reports that reflect concerns about non-state actors in asymmetric threats. The intersectoral and international nature of bioterrorism and agroterrorism threats requires collaboration across several sectors including intelligence, police, forensics, customs, and other law enforcement organizations...... organizations compared to the benefit of sharing information can be considered in an “information sharing risk-benefit analysis” to prevent a terrorism incident from occurring and to build a rapid response capability. In the EU project AniBioThreat, early warning is the main topic in work package 3 (WP 3). A...

  5. Ozone threat

    International Nuclear Information System (INIS)

    Ozone hole was first discovered in 1980. Thus 15 years even after the first warming, the world is no where near to the elimination of man made gases that threaten to destroy the ozone layer. Ozone depletion has become a matter of enormous threat which remains to be solved by the Scientists and intelligentia of the world. Ozone (O3) is a pungent poisonous gas. It forms a layer at a distance of about 15 miles above the earth's surface which helps shield living things from the sun shearing ultra violet light. If ozone is lost, more ultra violet light reaches the earth, which can lead to increasing rate of skin cancer, the death of micro organisms and the failure of crops and plants. It was in 1974 when it was discovered that Chlorofluorocarbons (CFCs) cold rise slowly to the upper atmosphere and destroy the earth's fragile ozone shield. Chlorofluorocarbons are commonly used as coolants (such as Freon) for home and automobile air conditioners and in the making of fast food containers. CFCs take about 100 years or more to reach he stratosphere to damage the ozone layers. In 1988, Scientists confirmed that upto 3% of the ozone layer over the more populated Northern Hemisphere has been destroyed. it is believed that for every 1% decrease in ozone, skin cancers are expected to rise 5 to 6 per cent due to the increase of ultraviolet light. Cases of cataracts and certain human immune system diseases are also expected to rise. (author)

  6. Exercising multi-jurisdictional response to bioterrorism in Canada

    International Nuclear Information System (INIS)

    Throughout 2007, the CRTI Biological Cluster conducted a series of biological terrorism exercises within a project entitled Bi-Ex West. The overall purpose of Bi-Ex West was to determine how the federal science and technology community could assist responders in a bio-terrorism attack involving a zoonotic agent. Bi-Ex West consisted of three immersive electronic tabletop exercises, which culminated into a two-day full-scale field exercise involving more than 200 players distributed throughout six sites. Participants represented 18 agencies, including agricultural, health and emergency management organizations at the federal, provincial and municipal levels, as well as first responders from the law enforcement and fire rescue communities. These exercises were conducted in a learning environment that fostered knowledge sharing between local, provincial and federal agencies and enabled participants to exercise their roles, responsibilities and procedures when responding to a biological terrorist event. It also provided agencies with an opportunity to gain a better understanding of how to integrate their various response plans to improve coordination. Observations and recommendations were collected from evaluators and participants over the course of the exercise. The resulting 70 recommendations have been grouped under the following categories: Roles and Responsibilities; Communication; Training, Education and Planning; Resources and Equipment; Security and; Exercise Design. In addition to action items attached to the recommendations, a number of CBRNE activities resulted from Bi-Ex West increasing the capacity of resources within the Federal Government and the Province of British Columbia.(author)

  7. Bio-terrorism: still interesting or concerning nowadays?

    Directory of Open Access Journals (Sweden)

    Claudiu E. Sbârcea

    2014-12-01

    Full Text Available Bio-terrorism involves using biological agents/toxins with the intent to intimidate or coerce a government or civilian population to further political or social objectives, usually leading to deaths or illnesses of humans but also of plants/animals. Their use would probably initially be considered as a natural or unintentional event, especially in case of live biological agents. Moreover, a natural occurring disease outbreak could have the same destructive outcome as an efficient biological weapon. There is a need for proper differentiation between natural and intentional events although in the first stages the medical response should be similar; however, the course of incident management would take different paths later on. Biological agents’ investigation of dangerous pathogens, from natural unusual outbreaks or bioterrorist attacks/other intentional use, imply the collaboration of different institutions with responsibilities in public health but also in national security and defense. The National Security and the Defense System institutions think mainly in security terms while national health care system institutions think principally` in medical care/prevention terms. These two ways of acting have to be combined in order to deal properly with hazardous biological agents.

  8. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  9. Efficacy of Modified Cognitive Interviewing, Compared to Human Judgments in Detecting Deception Related to Bio-threat Activities

    Directory of Open Access Journals (Sweden)

    Dr. Charles A. Morgan

    2013-08-01

    Full Text Available National security professionals have few scientifically valid methods for detecting deception in people who deny being involved in illicit activities relevant to national security. Numerous detecting deception studies have demonstrated that the Modified Cognitive Interviewing (MCI method is one such method - yielding detecting deception rates (i.e. 80-85% that are significantly above those achieved by chance (i.e. 50% or by human judgments (i.e. 54-56%. To date, however, no MCI studies have involved dilemmas of ethological interest to national security professionals. This project begins to address this gap in the scientific literature. In it, we compared the efficacy of MCI to that of human judgments for detecting deception in scientists with expertise in biological materials. Sixty-four scientists were recruited for study; 12 met with a “terrorist” and were paid to make biological materials for illicit purposes. All 64 scientists were interviewed by investigators with law enforcement experience about the bio-threat issue. MCI elicited speech content differences in deceptive, compared to truthful scientists. This resulted in a classification accuracy of 84.4%; Accuracies for Human Judgments (interviewers/raters were 54% and 46%, respectively. MCI required little time and its efficacy suggests it is reasonable to recommend its use to national security experts.

  10. Is the Hybrid Threat a True Threat?

    Directory of Open Access Journals (Sweden)

    David L. Raugh

    2016-06-01

    Full Text Available Does the “hybrid threat” discussed in General Marty Dempsey’s 2015 United States National Military Strategy make logical sense? In this paper I define the national security threat risk assessment process, examine the most significant US security threats, and study the hybrid threat. I conclude that the hybrid threat is the one that could most exploit our nation’s critical vulnerabilities- both from a security and foreign policy perspective. I conclude with a study of security and economic methods to reduce this threat.

  11. The germs of terror – Bioterrorism and science communication after September 11 (Italian original version

    Directory of Open Access Journals (Sweden)

    Maria Chiara Montani

    2006-09-01

    Full Text Available The attacks of September 11 2001 and in particular, the sending of letters containing anthrax spores the following October had a profound effect on society, and at the same time on science and its communicative mechanisms. Through a quanto-qualitative analysis of articles taken from four publications: two daily newspapers, the Corriere della Sera from Italy and the New York Times from the United States and two science magazines, Science and Nature, we have shown how the aforementioned events provoked the emergence of media attention regarding bioterrorism. A closer reading of the articles shows that today, science – including that found in science magazines – is closely related to politics, economics and the debate over the freedom to practice communicate. The very mechanisms of communication between scientists were changed as a result of this debate, as can be seen from the signing of the Denver Declaration in February 2003, which brought about the preventative self-censorship of publication of biomedical research findings.

  12. The germs of terror – Bioterrorism and science communication after September 11

    Directory of Open Access Journals (Sweden)

    Maria Chiara Montani

    2006-09-01

    Full Text Available The attacks of September 11 2001 and in particular, the sending of letters containing anthrax spores the following October had a profound effect on society, and at the same time on science and its communicative mechanisms. Through a quanto-qualitative analysis of articles taken from four publications: two daily newspapers, the Corriere della Sera from Italy and the New York Times from the United States and two science magazines, Science and Nature, we have shown how the aforementioned events provoked the emergence of media attention regarding bioterrorism. A closer reading of the articles shows that today, science – including that found in science magazines – is closely related to politics, economics and the debate over the freedom to practice communicate. The very mechanisms of communication between scientists were changed as a result of this debate, as can be seen from the signing of the Denver Declaration in February 2003, which brought about the preventative self-censorship of publication of biomedical research findings.

  13. The experience of self and threats to sense of self among relatives caring for people with Alzheimer's disease.

    Science.gov (United States)

    Skaalvik, Mari Wolff; Norberg, Astrid; Normann, Ketil; Fjelltun, Aud-Mari; Asplund, Kenneth

    2016-07-01

    This study explored how the relatives of people with Alzheimer's disease expressed Self 2 and Self 3 according to Harré's social constructionist theory of selfhood. Having a relative with Alzheimer's disease affects one's life. In this study, we concentrated on how close relatives of people with Alzheimer's disease experienced their sense of self. This study was descriptive and qualitative. Interviews were conducted with 20 relatives of 10 people with Alzheimer's disease from 2009 to 2011. The data were analysed according to Harré's social constructionist theory of selfhood including Selves 2 and 3. Participants reported that Alzheimer's disease challenged their personal attributes, relations and positioning. Understanding how Alzheimer's disease affects the sense of self among close relatives is important, as this knowledge is pivotal for supporting these relatives who are often informal caregivers in ways that enable a fulfilling and meaningful life. PMID:24535820

  14. Bubbling Threat

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The shift of China’s monetary policy stance from "moderately loose" to "prudent" in 2011 indicates curbing inflation and asset bubbles have become the Central Government’s top priority. But is China’s bubble problem short-term or long-term? Is it only monetary or related to economic structure? Is it the cause of China’s economic imbalance or the result? And what kind of deep-rooted problems in the macro economy does it reflect? All these questions call for deep thought,said Zhang Monan,a

  15. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    Directory of Open Access Journals (Sweden)

    Yong eZhu

    2015-11-01

    Full Text Available Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed.

  16. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat.

    Science.gov (United States)

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook's theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants' memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  17. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  18. Identity, Power, and Threat Perception

    OpenAIRE

    David L. Rousseau; Rocio Garcia-Retamero

    2007-01-01

    Realists in international relations and realistic conflict theorists in social psychology argue that the perception of threat in intergroup conflict is a function of power asymmetries between groups. In contrast, social constructivists and social identity theorists argue that a shared sense of identity can reduce perceptions of intergroup threat. In this article, we test these competing arguments using three laboratory experiments conducted in two different countries (Spain and the United Sta...

  19. 75 FR 50730 - Public Health Security and Bioterrorism Preparedness and Response Act of 2002: Biennial Review...

    Science.gov (United States)

    2010-08-17

    ... Register (75 FR 42363) requesting public comment on the current HHS list of select agents and toxins. The... Register (75 FR 44724) requesting public comment on the USDA/APHIS list of select agents and toxins. The... HUMAN SERVICES 42 CFR Part 73 RIN 0920-AA34 Public Health Security and Bioterrorism Preparedness...

  20. Retroviruses and other latent viruses: the deadliest of pathogens are not necessarily the best candidates for bioterrorism.

    Science.gov (United States)

    Salgado, Cassandra D; Kilby, J Michael

    2009-06-01

    HIV-1 (and other viral causes of latent, chronic infections) is not a likely candidate for bioterrorism. Scenarios resulting in the introduction of retroviral infections into a large population generally seem impractical and unpredictable as bioterrorist plots, especially relative to the frightening simplicity of deadly anthrax spores or smallpox virions. As evidenced in the above discussion, contaminating the blood supply would require a highly sophisticated plan resulting in effects of rather limited ultimate scope, and would have to evade an extremely effective screening process already in full force. Contaminating other agents given parenterally is also a potential concern, but again the virus has rather fastidious growth characteristics outside of the human host, and even if this could be accomplished it would presumably affect only a very limited number of targeted individuals. Finally, the idea of a kind of"sexual suicide bomber", an individual deliberately introduced into the community to spread a deadly infectious disease might be proposed. However, as discussed in this commentary, the impact of this rather implausible scenario would be substantially delayed, unreliable, and ultimately could be controlled through a heightened response of already existing public health mechanisms. Whereas HIV has resulted in the "perfect storm" of a devastating pandemic, a major cause of worldwide morbidity and mortality that is tremendously challenging to control, it does not match up very effectively with the Centers for Disease Control and Prevention (CDC) Category A definition of an ideal agent of bioterrorism. It is not easily spread through casual or incidental contact and does not cause a substantial immediate death toll. Instead it is spread only through sexual, parenteral, or maternal/fetal transmission, and generally requires a prolonged and variable clinical latency period prior to disease progression and death. The U.S. public health system is already reasonably

  1. Ebola Virus ─ A Global Threat

    Directory of Open Access Journals (Sweden)

    Mejbah Uddin Ahmed

    2015-01-01

    Full Text Available Ebola virus is a filamentous, enveloped, non-segmented, single-stranded, negative-sense RNA virus. It belongs to the Filoviridae and was first recognized near the Ebola River valley in Zaire in 1976. Since then most of the outbreaks have occurred to both human and nonhuman primates in sub-Saharan Africa. Ebola virus causes highly fatal hemorrhagic fever in human and nonhuman primates. In addition to hemorrhagic fever, it could be used as a bioterrorism agent. Although its natural reservoir is yet to be proven, current data suggest that fruit bats are the possibility. Infection has also been documented through the handling of infected chimpanzees, gorillas, monkeys, forest antelope and porcupines. Human infection is caused through close contact with the blood, secretion, organ or other body fluids of infected animal. Human-to-human transmission is also possible. Ebola virus infections are characterized by immune suppression and a systemic inflammatory response that causes impairment of the vascular, coagulation, and immune systems, leading to multiorgan failure and shock. The virus constitutes an important public health threat in Africa and also worldwide as no effective treatment or vaccine is available till now

  2. Threats to Bitcoin Software

    OpenAIRE

    Kateraas, Christian H

    2014-01-01

    Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.

  3. Development of a highly efficacious vaccinia-based dual vaccine against smallpox and anthrax, two important bioterror entities

    OpenAIRE

    Tod J Merkel; Perera, Pin-Yu; Kelly, Vanessa K.; Verma, Anita; Llewellyn, Zara N.; Waldmann, Thomas A.; Mosca, Joseph D.; Perera, Liyanage P.

    2010-01-01

    Bioterrorism poses a daunting challenge to global security and public health in the 21st century. Variola major virus, the etiological agent of smallpox, and Bacillus anthracis, the bacterial pathogen responsible for anthrax, remain at the apex of potential pathogens that could be used in a bioterror attack to inflict mass casualties. Although licensed vaccines are available for both smallpox and anthrax, because of inadequacies associated with each of these vaccines, serious concerns remain ...

  4. Prophylaxis and Treatment of Pregnant Women for Emerging Infections and Bioterrorism Emergencies

    OpenAIRE

    Cono, Joanne; Cragan, Janet D.; Jamieson, Denise J.; Rasmussen, Sonja A.

    2006-01-01

    Emerging infectious disease outbreaks and bioterrorism attacks warrant urgent public health and medical responses. Response plans for these events may include use of medications and vaccines for which the effects on pregnant women and fetuses are unknown. Healthcare providers must be able to discuss the benefits and risks of these interventions with their pregnant patients. Recent experiences with outbreaks of severe acute respiratory syndrome, monkeypox, and anthrax, as well as response plan...

  5. Agents of Bioterrorism: Curriculum and Pedagogy in an Online Masters Course

    OpenAIRE

    Page, Eric J.; Gray, Joshua P.

    2014-01-01

    The Agents of Bioterrorism course (BSBD 640, University of Maryland University College) is a graduate level course created in response to an elevated need for scientists working in the field of medical countermeasures to biological and chemical weapons in the years following 9/11. Students read and evaluate assigned current primary literature articles investigating medical countermeasures at each stage of development. In addition, students learn concepts of risk assessment, comparing and rank...

  6. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  7. Development of the Academic Stereotype Threat Inventory

    Science.gov (United States)

    Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.

    2008-01-01

    The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…

  8. Planning for Rift Valley fever virus: use of geographical information systems to estimate the human health threat of white-tailed deer (Odocoileus virginianus-related transmission

    Directory of Open Access Journals (Sweden)

    Sravan Kakani

    2010-11-01

    Full Text Available Rift Valley fever (RVF virus is a mosquito-borne phlebovirus of the Bunyaviridae family that causes frequent outbreaks of severe animal and human disease in sub-Saharan Africa, Egypt and the Arabian Peninsula. Based on its many known competent vectors, its potential for transmission via aerosolization, and its progressive spread from East Africa to neighbouring regions, RVF is considered a high-priority, emerging health threat for humans, livestock and wildlife in all parts of the world. Introduction of West Nile virus to North America has shown the potential for “exotic” viral pathogens to become embedded in local ecological systems. While RVF is known to infect and amplify within domestic livestock, such as taurine cattle, sheep and goats, if RVF virus is accidentally or intentionally introduced into North America, an important unknown factor will be the role of local wildlife in the maintenance or propagation of virus transmission. We examined the potential impact of RVF transmission via white-tailed deer (Odocoileus virginianus in a typical north-eastern United States urban-suburban landscape, where livestock are rare but where these potentially susceptible, ungulate wildlife are highly abundant. Model results, based on overlap of mosquito, human and projected deer densities, indicate that a significant proportion (497/1186 km2, i.e. 42% of the urban and peri-urban landscape could be affected by RVF transmission during the late summer months. Deer population losses, either by intervention for herd reduction or by RVF-related mortality, would substantially reduce these likely transmission zones to 53.1 km2, i.e. by 89%.

  9. The Relation between Hollywood and the New Threat Perception of the USA after the End of the Cold War from the Perspective of Postmodernism

    Directory of Open Access Journals (Sweden)

    Derya Deger

    2011-10-01

    Full Text Available After the end of Cold War, the USA became the only super power and there was no threat perception from outside, in other words no enemy anymore. In fact, throughout history the USA faced different threats, that is to say, enemies. The terrorist events experienced in America after the end of Cold War brought about that the new enemy was Middle Easterners. Accordingly, the place of cinema in postmodernism is very significant as it becomes the reflection of the zeitgeist and the mindset of the era in which the film is shot.

  10. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  11. A Proposed Data Mining Profiler Model to Fight Security Threats in Nigeria

    OpenAIRE

    Jackson AKPOJARO

    2013-01-01

    The growing insecurity challenges in Nigeria are of great concern to everyone and every effort must be employed to combat these security threats. Using the proposed data mining profiler model, our work distinguishes between information related threats and non-information related security threats. Information related threats are essentially attacks on computers and networks. That is, they are threats that damage electronic information. Non-information related terrorist threats include terroris...

  12. Stereotype Threat and Feedback Seeking in the Workplace.

    Science.gov (United States)

    Roberson, Loriann; Deitch, Elizabeth A.; Brief, Arthur P.; Block, Caryn J.

    2003-01-01

    Among 166 African American managers, those who were the only minority-group member in their workgroup perceived more stereotype threat. Stereotype threat was related to indirect feedback seeking and discounting of supervisors' performance feedback. (Contains 41 references.) (SK)

  13. The bioscience revolution & the biological weapons threat: levers & interventions

    Directory of Open Access Journals (Sweden)

    Martin Greg

    2009-02-01

    Full Text Available Abstract In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level.

  14. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  15. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  16. Alternative Threat Methodology

    Directory of Open Access Journals (Sweden)

    Charles B. King III

    2011-01-01

    Full Text Available Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known. However, estimating the probability of an individual's or group's attacking a specific (or even a generic target is an element of risk analysis in which art and intuition are applied far more regularly than is science.

  17. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    OpenAIRE

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Oehlhof, Marissa Wagner; LeRoy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants’ mean age was 2...

  18. Facing ambiguous threats.

    Science.gov (United States)

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  19. The Changing Threat

    Directory of Open Access Journals (Sweden)

    Gabriel Siboni

    2010-06-01

    Full Text Available The purpose of this conference is to try to understand the changes in the threat against the State of Israel that have taken place in recent years, and to examine the components of the optimal response to the threat. Today’s seminar is organized within the framework of the INSS Military and Strategic Affairs Program, which aims to enhance the public discourse on subjects relevant to this discipline through conferences and the Military and Strategic Affairs journal.

  20. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  1. Pre-PCR processing in bioterrorism preparedness: improved diagnostic capabilities for laboratory response networks.

    Science.gov (United States)

    Hedman, Johannes; Knutsson, Rickard; Ansell, Ricky; Rådström, Peter; Rasmusson, Birgitta

    2013-09-01

    Diagnostic DNA analysis using polymerase chain reaction (PCR) has become a valuable tool for rapid detection of biothreat agents. However, analysis is often challenging because of the limited size, quality, and purity of the biological target. Pre-PCR processing is an integrated concept in which the issues of analytical limit of detection and simplicity for automation are addressed in all steps leading up to PCR amplification--that is, sampling, sample treatment, and the chemical composition of PCR. The sampling method should maximize target uptake and minimize uptake of extraneous substances that could impair the analysis--so-called PCR inhibitors. In sample treatment, there is a trade-off between yield and purity, as extensive purification leads to DNA loss. A cornerstone of pre-PCR processing is to apply DNA polymerase-buffer systems that are tolerant to specific sample impurities, thereby lowering the need for expensive purification steps and maximizing DNA recovery. Improved awareness among Laboratory Response Networks (LRNs) regarding pre-PCR processing is important, as ineffective sample processing leads to increased cost and possibly false-negative or ambiguous results, hindering the decision-making process in a bioterrorism crisis. This article covers the nature and mechanisms of PCR-inhibitory substances relevant for agroterrorism and bioterrorism preparedness, methods for quality control of PCR reactions, and applications of pre-PCR processing to optimize and simplify the analysis of various biothreat agents. Knowledge about pre-PCR processing will improve diagnostic capabilities of LRNs involved in the response to bioterrorism incidents. PMID:23971826

  2. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  3. [Dimensional analysis of the concept of biosafety due to bioterrorism].

    Science.gov (United States)

    Bernard, Laurence; Shaha, Maya

    2014-03-01

    In recent years with the strengthening of the discourse surrounding the biological risk of bioterrorist nature, the concept of biosafety emerged gradually. A dimensional analysis was used to contextualize the concept. Initially, biosafety was essentially a technical term related to the risks of contamination in laboratories or food industry and then be used to protect biodiversity against the spread of genetically modified organisms (GMOs) into the environment. Now, it is increasingly used in reference to the prevention and infections control, even though its use remains marginal. However, biosecurity may be defined as the security of life and therefore affect the safety devices participating in the government of bodies and power over life. A more critical approach including social and political dimensions within a Foucauldian perspective is needed to expand the scope of the biosecurity concept up to biological hazards constructs. PMID:24830220

  4. 核或辐射事故应急威胁评估兼论其它%On Nuclear or Radiological Accident Emergency Threat Assessment and Related Aspects

    Institute of Scientific and Technical Information of China (English)

    卢盛甲

    2013-01-01

    It was presented for object of nuclear or radiological accident emergency, according to national regulations of nuclear or radiological emergency, and base on IAEA Safety Standards for requirement for preparedness of a nuclear or radiological emergency in the paper. To avoid empty in nuclear or radiological accident emergency arrangement, propose to set up regions arrangement for nuclear or radiological accidents emergency in on threat I or II of provinces according to IAEA threat category IV exist situation in Sino.%  本文根据国家核或辐射应急相关法规,参照国际子能机构有关安全出版物对核或辐射应急准备与响应的要求,提出国内核或辐射事故应急准备和应急响应的目标。鉴国际子能机构划分的核或辐射威胁类型 IV 各国和地区都存在的事实,建议我国在无威胁类型 I 和 II 的省份,考虑区应急管理,避免部分省或地区核或辐射事故应急管理出现盲区。

  5. Ethical Proactive Threat Research

    Science.gov (United States)

    Aycock, John; Sullins, John

    Through a provocative examination of the positive effects of computer security research on regular users, we argue that traditional security research is insufficient. Instead, we turn to a largely untapped alternative, proactive threat research, a fruitful research area but an ethical minefield. We discuss practices for ethical research and dissemination of proactive research.

  6. Historical precedence and technical requirements of biological weapons use : a threat assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Estes, Daniel P.; Vogel, Kathleen Margaret; Gaudioso, Jennifer Marie; Hickok, Lauren T.; Jung, Danielle F.; Barnett, Natalie Beth; Frerichs, Rebecca L.; Salerno, Reynolds Mathewson

    2004-05-01

    The threat from biological weapons is assessed through both a comparative historical analysis of the patterns of biological weapons use and an assessment of the technological hurdles to proliferation and use that must be overcome. The history of biological weapons is studied to learn how agents have been acquired and what types of states and substate actors have used agents. Substate actors have generally been more willing than states to use pathogens and toxins and they have focused on those agents that are more readily available. There has been an increasing trend of bioterrorism incidents over the past century, but states and substate actors have struggled with one or more of the necessary technological steps. These steps include acquisition of a suitable agent, production of an appropriate quantity and form, and effective deployment. The technological hurdles associated with the steps present a real barrier to producing a high consequence event. However, the ever increasing technological sophistication of society continually lowers the barriers, resulting in a low but increasing probability of a high consequence bioterrorism event.

  7. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  8. Wireless LAN Security Threats & Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Md. Waliullah

    2014-01-01

    Full Text Available Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organisation, IT staff and IT security professionals. This paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system and provide overall guidelines and recommendation to the home users and organizations.

  9. Modeling threat assessments of water supply systems using markov latent effects methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Consuelo Juanita

    2006-12-01

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  10. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  11. Summary and results of the joint WMD-DAC/Alameda County bioterrorism response plan exercise.

    Energy Technology Data Exchange (ETDEWEB)

    Manley, Dawn Kataoka; Lipkin, Joel; West, Todd H.; Tam, Ricky; Hirano, Howard H.; Ammerlahn, Heidi R.

    2003-11-01

    On June 12,2003, the Alameda County Public Health Department and Sandia National Laboratories/CA jointly conducted an exercise that used a Weapons of Mass Destruction-Decision Analysis Center (WMD-DAC) bioterrorism attack simulation to test the effectiveness of the county's emergency response plan. The exercise was driven by an assumed release (in the vicinity of the Berkeley Marina), and subsequent spread, of a small quantity of aerosolized, weapons-grade anthrax spores. The simulation used several key WMD-DAC capabilities, namely: (1) integration with an atmospheric dispersion model to calculate expected dose levels in the affected areas, (2) a individual-tracking capability for both infected and non-infected persons as they made decisions, sought treatment, and received prophylaxis drugs, and (3) a user interface that allows exercise participants to affect the scenario evolution and outcome. The analysis of the county's response plan included documenting and reviewing the decisions made by participants during the exercise. Twenty-six local and regional officials representing the health care system, emergency medical services and law enforcement were involved in responding to the simulated attack. The results of this joint effort include lessons learned both by the Alameda County officials regarding implementation of their bioterrorism response plan and by the Sandia representatives about conducting exercises of this type. These observations are reviewed in this report, and they form a basis for providing a better understanding of group/individual decision processes and for identifying effective communication options among decision makers.

  12. Social Anxiety-Linked Attention Bias to Threat Is Indirectly Related to Post-Event Processing Via Subjective Emotional Reactivity to Social Stress.

    Science.gov (United States)

    Çek, Demet; Sánchez, Alvaro; Timpano, Kiara R

    2016-05-01

    Attention bias to threat (e.g., disgust faces) is a cognitive vulnerability factor for social anxiety occurring in early stages of information processing. Few studies have investigated the relationship between social anxiety and attention biases, in conjunction with emotional and cognitive responses to a social stressor. Elucidating these links would shed light on maintenance factors of social anxiety and could help identify malleable treatment targets. This study examined the associations between social anxiety level, attention bias to disgust (AB-disgust), subjective emotional and physiological reactivity to a social stressor, and subsequent post-event processing (PEP). We tested a mediational model where social anxiety level indirectly predicted subsequent PEP via its association with AB-disgust and immediate subjective emotional reactivity to social stress. Fifty-five undergraduates (45% female) completed a passive viewing task. Eye movements were tracked during the presentation of social stimuli (e.g., disgust faces) and used to calculate AB-disgust. Next, participants gave an impromptu speech in front of a video camera and watched a neutral video, followed by the completion of a PEP measure. Although there was no association between AB-disgust and physiological reactivity to the stressor, AB-disgust was significantly associated with greater subjective emotional reactivity from baseline to the speech. Analyses supported a partial mediation model where AB-disgust and subjective emotional reactivity to a social stressor partially accounted for the link between social anxiety levels and PEP. PMID:27157031

  13. Patient Safety Threat - Syringe Reuse

    Science.gov (United States)

    ... HAIs HICPAC One & Only Campaign A Patient Safety Threat – Syringe Reuse Recommend on Facebook Tweet Share Compartir ... need to be aware of a very serious threat to their health - the reuse of needles or ...

  14. Capripoxviruses: an emerging worldwide threat to sheep, goats and cattle.

    Science.gov (United States)

    Babiuk, S; Bowden, T R; Boyle, D B; Wallace, D B; Kitching, R P

    2008-09-01

    Capripoxviruses are the cause of sheeppox, goatpox and lumpy skin disease (LSD) of cattle. These diseases are of great economic significance to farmers in regions in which they are endemic and are a major constraint to international trade in livestock and their products. Although the distribution of capripoxviruses is considerably reduced from what it was even 50 years ago, they are now expanding their territory, with recent outbreaks of sheeppox or goatpox in Vietnam, Mongolia and Greece, and outbreaks of LSD in Ethiopia, Egypt and Israel. Increased legal and illegal trade in live animals provides the potential for further spread, with, for instance, the possibility of LSD becoming firmly established in Asia. This review briefly summarizes what is known about capripoxviruses, including their impact on livestock production, their geographic range, host-specificity, clinical disease, transmission and genomics, and considers current developments in diagnostic tests and vaccines. Capripoxviruses have the potential to become emerging disease threats because of global climate change and changes in patterns of trade in animals and animal products. They also could be used as economic bioterrorism agents. PMID:18774991

  15. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  16. An integrated and dynamic optimisation model for the multi-level emergency logistics network in anti-bioterrorism system

    Science.gov (United States)

    Liu, Ming; Zhao, Lindu

    2012-08-01

    Demand for emergency resources is usually uncertain and varies quickly in anti-bioterrorism system. Besides, emergency resources which had been allocated to the epidemic areas in the early rescue cycle will affect the demand later. In this article, an integrated and dynamic optimisation model with time-varying demand based on the epidemic diffusion rule is constructed. The heuristic algorithm coupled with the MATLAB mathematical programming solver is adopted to solve the optimisation model. In what follows, the application of the optimisation model as well as a short sensitivity analysis of the key parameters in the time-varying demand forecast model is presented. The results show that both the model and the solution algorithm are useful in practice, and both objectives of inventory level and emergency rescue cost can be controlled effectively. Thus, it can provide some guidelines for decision makers when coping with emergency rescue problem with uncertain demand, and offers an excellent reference when issues pertain to bioterrorism.

  17. Predicting Response to Reassurances and Uncertainties in Bioterrorism Communications for Urban Populations in New York and California

    OpenAIRE

    Vaughan, Elaine; Tinker, Tim L.; Truman, Benedict I.; Edelson, Paul; Morse, Stephen S.

    2012-01-01

    Recent national plans for recovery from bioterrorism acts perpetrated in densely populated urban areas acknowledge the formidable technical and social challenges of consequence management. Effective risk and crisis communication is one priority to strengthen the U.S.’s response and resilience. However, several notable risk events since September 11, 2001, have revealed vulnerabilities in risk/crisis communication strategies and infrastructure of agencies responsible for protecting civilian po...

  18. Agriculture bioterrorism:risk and management%农业生物恐怖的风险及其防范

    Institute of Scientific and Technical Information of China (English)

    朱联辉; 田德桥; 郑涛

    2014-01-01

    In recent years , a series of agriculture biosecurity accidents have occurred ,such as mad cow disease , foot-and-mouth disease and avian influenza , which has aroused worldwide , concern over agriculture bioterrorist attacks .This paper comprehensively analyzes the history and impact of agriculture bioterrorism , the current status of international agricul-ture bioterrorism research , and important issues to be taken into account in future efforts to deal with agriculture bioterrorism .%近年来,疯牛病、口蹄疫和禽流感等重大农业安全事件不断发生,引起了国际社会的强烈关注,也更加引发了人们对农业生物恐怖袭击的担忧,如何应对农业生物恐怖威胁已成为国际社会无法回避的安全问题之一。该文通过综合分析农业生物恐怖的“历史”、实施后的危害效果以及国际上对农业生物恐怖的研究现状,提出加强农业生物恐怖防范的对策建议。

  19. Prior notice of imported food under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002. Final rule.

    Science.gov (United States)

    2008-11-01

    The Food and Drug Administration (FDA) is issuing a final regulation that requires the submission to FDA of prior notice of food, including animal feed, that is imported or offered for import into the United States. The final rule implements the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (the Bioterrorism Act), which required prior notification of imported food to begin on December 12, 2003. The final rule requires that the prior notice be submitted to FDA electronically via either the U.S. Customs and Border Protection (CBP or Customs) Automated Broker Interface (ABI) of the Automated Commercial System (ACS) or the FDA Prior Notice System Interface (FDA PNSI). The information must be submitted and confirmed electronically as facially complete by FDA for review no less than 8 hours (for food arriving by water), 4 hours (for food arriving by air or land/rail), and 2 hours (for food arriving by land/road) before the food arrives at the port of arrival. Food imported or offered for import without adequate prior notice is subject to refusal and, if refused, must be held. Elsewhere in this issue of the Federal Register, FDA is announcing the availability of a draft compliance policy guide (CPG) entitled "Sec. 110.310 Prior Notice of Imported Food Under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002." PMID:19112701

  20. The Threat of Captivity: Hollywood and the Sexualization of Race Relations in "The Girls of the White Orchid" and "The Bitter Tea of General Yen."

    Science.gov (United States)

    Marchetti, Gina

    1987-01-01

    Discusses the captivity tale as an outgrowth of two fundamental contradictions within patriarchal ideology. Considers American popular thought in relation to this tale. Relates xenophobia in the 1980s to the sexual and racial politics of "The Girls of the White Orchid." Discusses the racial, sexual, and textual ambivalence in "The Bitter Tea of…

  1. 美国应对地铁生物恐怖袭击的科技措施与启示%Technological response measures against subway bioterrorism in the United States:investigation and analysis

    Institute of Scientific and Technical Information of China (English)

    田德桥; 祖正虎; 刘健; 许晴; 朱联辉; 黄培堂; 沈倍奋; 郑涛

    2014-01-01

    Due to the large population and relatively closed space environment , the subway system is vulnerable to bioterrorist attacks.This paper analyzes the technological response measures against subway bioterrorism in the United States, including Detect to Protect program of Department of Homeland Security (DHS) and PROTECTS program of Depart-ment of Energy ( DOE) .We also put forward some proposals on how to improve China′s capability of prevention of and response to subway bioterrorism .%地铁系统由于人口流动性大和相对封闭的空间环境是遭受潜在生物恐怖袭击的一个重要目标。该文分析了美国防范和应对地铁系统生物恐怖袭击的一些科技措施,包括国土安全部提高地铁生物监测预警能力措施以及能源部开展的地铁化学和生物恐怖袭击应对与技术支持项目情况等,并提出了提高我国地铁生物恐怖应对能力的一些措施建议。

  2. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  3. Revising Australia's Design Basis Threat

    International Nuclear Information System (INIS)

    Australia’s Design Basis Threat (DBT) was revised in 2012, ten years after the previous review. Using the IAEA’s Nuclear Security Series Guidance document on DBTs the Australian Safeguards and Non-Proliferation Office used an interagency process to devise a series of threat profiles which were distilled into the final DBT. Challenges to the review process included setting the scope, treating insider, cyber and air-borne threats, and interpretation of the final product. (author)

  4. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects. PMID:27120561

  5. Recurrent dreams: Recurring threat simulations?

    Science.gov (United States)

    Valli, K; Revonsuo, A

    2006-06-01

    Zadra, Desjardins, and Marcotte (2006) have made a valuable contribution to the empirical testing of the Threat Simulation Theory (TST) (Revonsuo, 2000a) in recurrent dreams. For the most part, their results are in accordance with the theory, while some findings seem to conflict with the predictions of TST. In our commentary, we consider some alternative ways to interpret the results, and we conclude that many prominent features of most recurrent dreams seem to be manifestations of a threat simulation function, leading to repeated rehearsal of threat perception and avoidance, but a minority of recurrent dreams seem to have origins unrelated to threat simulation. PMID:16019227

  6. Game theory of pre-emptive vaccination before bioterrorism or accidental release of smallpox.

    Science.gov (United States)

    Molina, Chai; Earn, David J D

    2015-06-01

    Smallpox was eradicated in the 1970s, but new outbreaks could be seeded by bioterrorism or accidental release. Substantial vaccine-induced morbidity and mortality make pre-emptive mass vaccination controversial, and if vaccination is voluntary, then there is a conflict between self- and group interests. This conflict can be framed as a tragedy of the commons, in which herd immunity plays the role of the commons, and free-riding (i.e. not vaccinating pre-emptively) is analogous to exploiting the commons. This game has been analysed previously for a particular post-outbreak vaccination scenario. We consider several post-outbreak vaccination scenarios and compare the expected increase in mortality that results from voluntary versus imposed vaccination. Below a threshold level of post-outbreak vaccination effort, expected mortality is independent of the level of response effort. A lag between an outbreak starting and a response being initiated increases the post-outbreak vaccination effort necessary to reduce mortality. For some post-outbreak vaccination scenarios, even modest response lags make it impractical to reduce mortality by increasing post-outbreak vaccination effort. In such situations, if decreasing the response lag is impossible, the only practical way to reduce mortality is to make the vaccine safer (greater post-outbreak vaccination effort leads only to fewer people vaccinating pre-emptively). PMID:25926701

  7. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim;

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  8. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    NARCIS (Netherlands)

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  9. Mass spectrometry for the detection of bioterrorism agents: from environmental to clinical applications.

    Science.gov (United States)

    Duriez, Elodie; Armengaud, Jean; Fenaille, François; Ezan, Eric

    2016-03-01

    In the current context of international conflicts and localized terrorist actions, there is unfortunately a permanent threat of attacks with unconventional warfare agents. Among these, biological agents such as toxins, microorganisms, and viruses deserve particular attention owing to their ease of production and dissemination. Mass spectrometry (MS)-based techniques for the detection and quantification of biological agents have a decisive role to play for countermeasures in a scenario of biological attacks. The application of MS to every field of both organic and macromolecular species has in recent years been revolutionized by the development of soft ionization techniques (MALDI and ESI), and by the continuous development of MS technologies (high resolution, accurate mass HR/AM instruments, novel analyzers, hybrid configurations). New possibilities have emerged for exquisite specific and sensitive detection of biological warfare agents. MS-based strategies for clinical application can now address a wide range of analytical questions mainly including issues related to the complexity of biological samples and their available volume. Multiplexed toxin detection, discovery of new markers through omics approaches, and identification of untargeted microbiological or of novel molecular targets are examples of applications. In this paper, we will present these technological advances along with the novel perspectives offered by omics approaches to clinical detection and follow-up. PMID:26956386

  10. Linking Stereotype Threat and Anxiety

    Science.gov (United States)

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  11. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  12. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  13. Threat Modelling for Active Directory

    OpenAIRE

    Chadwick, David W

    2004-01-01

    This paper analyses the security threats that can arise against an Active Directory server when it is included in a Web application. The approach is based on the STRIDE classification methodology. The paper also provides outline descriptions of countermeasures that can be deployed to protect against the different threats and vulnerabilities identified here.

  14. The nuclear threat

    International Nuclear Information System (INIS)

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  15. The Neuroscience of Stigma and Stereotype Threat

    OpenAIRE

    Derks, Belle; Inzlicht, Michael; Kang, Sonia

    2008-01-01

    Abstract This article reviews social neuroscience research on the experience of stigma from the target's perspective. More specifically, we discuss several research programs that employ electroencephalography, event-related potentials, or functional magnetic resonance imaging methods to examine neural correlates of stereotype and social identity threat. We present neuroimaging studies that show brain activation related to the experience of being stereotyped and ERP studies that she...

  16. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  17. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  18. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    Science.gov (United States)

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  19. Global threat to agriculture from invasive species

    Science.gov (United States)

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  20. Global threat to agriculture from invasive species.

    Science.gov (United States)

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  1. The sound of danger: threat sensitivity to predator vocalizations, alarm calls, and novelty in gulls.

    Directory of Open Access Journals (Sweden)

    Sarah A MacLean

    Full Text Available The threat sensitivity hypothesis predicts that organisms will evaluate the relative danger of and respond differentially to varying degrees of predation threat. Doing so allows potential prey to balance the costs and benefits of anti-predator behaviors. Threat sensitivity has undergone limited testing in the auditory modality, and the relative threat level of auditory cues from different sources is difficult to infer across populations when variables such as background risk and experience are not properly controlled. We experimentally exposed a single population of two sympatric gull species to auditory stimuli representing a range of potential threats in order to compare the relative threat of heterospecific alarm calls, conspecific alarms calls, predator vocalizations, and novel auditory cues. Gulls were able to discriminate among a diverse set of threat indicators and respond in a graded manner commensurate with the level of threat. Vocalizations of two potential predators, the human voice and bald eagle call, differed in their threat level compared to each other and to alarm calls. Conspecific alarm calls were more threatening than heterospecfic alarm calls to the larger great black-backed gull, but the smaller herring gull weighed both equally. A novel cue elicited a response intermediate between known threats and a known non-threat in herring gulls, but not great black-backed gulls. Our results show that the relative threat level of auditory cues from different sources is highly species-dependent, and that caution should be exercised when comparing graded and threshold threat sensitive responses.

  2. Global Threats to Child Safety.

    Science.gov (United States)

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. PMID:26613687

  3. Heat Waves Are Health Threats

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and ... 2016 SATURDAY, July 2, 2016 (HealthDay News) -- Heat waves are more than uncomfortable, they can be deadly. ...

  4. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  5. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  6. End the nuclear threat

    International Nuclear Information System (INIS)

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  7. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  8. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  9. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  10. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  11. Emotion blocks the path to learning under stereotype threat

    OpenAIRE

    Mangels, Jennifer A.; Good, Catherine; Whiteman, Ronald C.; Maniscalco, Brian; Dweck, Carol S.

    2011-01-01

    Gender-based stereotypes undermine females’ performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback relat...

  12. 49 CFR 1572.19 - Applicant responsibilities for a TWIC security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... threat assessment. 1572.19 Section 1572.19 Transportation Other Regulations Relating to Transportation... TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.19 Applicant responsibilities for a TWIC security threat assessment. (a) Implementation schedule. Except...

  13. Identifying key conservation threats to Alpine birds through expert knowledge.

    Science.gov (United States)

    Chamberlain, Dan E; Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  14. Identifying key conservation threats to Alpine birds through expert knowledge

    OpenAIRE

    Chamberlain, Dan E.; Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, ...

  15. 28 CFR 36.208 - Direct threat.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) Direct threat means a...

  16. Comparative Environmental Threat Analysis: Three Case Studies.

    Science.gov (United States)

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  17. Stereotype threat can both enhance and impair older adults' memory.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses. PMID:24150969

  18. Computer viruses: The threat today and the expected future

    OpenAIRE

    Li, Xin

    2003-01-01

    This Master’s Thesis within the area computer security concerns ”Computer viruses: The threat today and the expected future”. Firstly, the definitions of computer virus and the related threats are presented; Secondly, current situation of computer viruses are discussed, the working and spreading mechanisms of computer viruses are reviewed in details, simplistic attitude of computer world in computer virus defence is analyzed; Thirdly, today’s influencing factors for near future computer viru...

  19. Costa Rica - An Army-less Nation Facing External Threats

    OpenAIRE

    Dall, Nana; Hammer Holm, Lasse; Kaas-Claesson, Kristina; McCay Martinez, Eamonn

    2013-01-01

    This project aims to explain how Costa Rica deal with external threats. Having abolished their military in 1948, the small state of Costa Rica situated in the conflict-ridden region of Central America, is internationally portrayed as an inspirational nation upholding peace and high morality. This has raised questions in regards to how Costa Rica upholds security in the event of threat. The project applies the International Relations theories of neo-liberalism and neo-realism to two cases: the...

  20. DENGUE: GLOBAL THREAT.

    Science.gov (United States)

    Thisyakorn, Usa; Thisyakorn, Chule

    2015-01-01

    Dengue is a mosquito-borne viral disease, which is currently an expanding global problem. Four closely related dengue serotypes cause the disease, which ranges from asymptomatic infection to undifferentiated fever, dengue fever (DF), and dengue hemorrhagic fever (DHF). DHF is characterized by fever, bleeding diathesis, and a tendency to develop a potentially fatal shock syndrome. Dengue infection with organ impairment mainly involves the central nervous system and the liver. Consistent hematological findings include vasculopathy, coagulopathy, and thrombocytopenia. Laboratory diagnosis includes virus isolation, serology, and detection of dengue ribonucleic acid. Successful treatment, which is mainly supportive, depends on early recognition of the disease and careful monitoring for shock. A severity-based revised dengue classification for medical interventions has been developed and validated in many countries. There is no specific dengue treatment, and prevention is currently limited to vector control measures. The world's first, large-scale dengue vaccine efficacy study demonstrated its efficacy and a reduction of dengue disease severity with a good safety profile in a study of more than 30,000 volunteers from Asia and Latin America. PMID:26506726

  1. Dengue: a global threat.

    Science.gov (United States)

    Thisyakorn, Usa; Thisyakorn, Chule

    2015-01-01

    Dengue, a mosquito-borne viral disease, is currently an expanding global problem. The disease is caused by four closely related dengue serotypes; it ranges from asymptomatic infection to undifferentiated fever, dengue fever (DF) and dengue hemorrhagic fever (DHF). DHF is characterized by fever, bleeding diathesis and a tendency to develop apotentially fatal shock syndrome. Dengue infection with organ impairment mainly involves the central nervous system and liver. Consistent hematological findings include vasculopathy, coagulopathy and thrombocytopenia. Laboratory diagnoses include virus isolation, serology, and detection ofdengue ribonucleic acid. Successful treatment, which is mainly supportive, depends on early recognition of the disease and careful monitoring for shock. A severity-based revised dengue classification for medical interventions has been developed and validated in many countries. So far however, there has not been any specific dengue treatment; prevention is currently limited to vector control measures. The world's first, large-scale dengue vaccine, efficacy study demonstrated its efficacy and a reduction of dengue's severity in a study of more than 10,000 volunteers in Asia. Initial safety data are consistent with a good safety profile. PMID:25764623

  2. Ebola Virus ─ A Global Threat

    OpenAIRE

    Mejbah Uddin Ahmed; Sushmita Roy

    2015-01-01

    Ebola virus is a filamentous, enveloped, non-segmented, single-stranded, negative-sense RNA virus. It belongs to the Filoviridae and was first recognized near the Ebola River valley in Zaire in 1976. Since then most of the outbreaks have occurred to both human and nonhuman primates in sub-Saharan Africa. Ebola virus causes highly fatal hemorrhagic fever in human and nonhuman primates. In addition to hemorrhagic fever, it could be used as a bioterrorism agent. Although its natural reservoir is...

  3. Countering the nuclear terrorist threat

    International Nuclear Information System (INIS)

    Full text: An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to a RDD. RDDs, or 'dirty bombs' as they are often called, spread radioactivity but they do not generate nuclear yield. The fabrication of a RDD requires radioactive material and a dispersal mechanism. Standards for safe handling and accountability of radioactive material vary around the world. Terrorist acquisition and use of an IND is a low-probability but high-consequence threat. Terrorist use of a RDD is a threat of higher probability but lower consequence. Two threats need to be considered for civil radiological and nuclear facilities. One is the theft of materials by terrorists, and the other is an attack on a facility to disperse radiological or nuclear materials. Facilities may include reactors as well as nuclear waste and storage areas. While important elements of a layered defense against these threats are already in place, improved international cooperation and a sustained investment in the science and technology needed to win the war on terrorism is necessary. (author)

  4. Measuring Vulnerability to Stereotype Threat

    Science.gov (United States)

    Barnard, Lucy; Burley, Hansel; Olivarez, Arturo; Crooks, Steven

    2008-01-01

    Introduction: In this study, we examined the psychometric properties of an instrument intended to measure vulnerability to stereotype threat. Method: We revised the instrument through assessing score reliability and then examined a domain specific model using confirmatory factor analyses. After examining the responses of the total sample…

  5. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  6. Cognitive and physiological antecedents of threat and challenge appraisal.

    Science.gov (United States)

    Tomaka, J; Blascovich, J; Kibler, J; Ernst, J M

    1997-07-01

    Cognitive appraisal theories of stress and emotion propose that cognitive appraisals precede physiological responses, whereas peripheralist theories propose that physiological arousal precedes cognitive processes. Three studies examined this issue regarding threat and challenge responses to potential stress. Study 1 supported cognitive appraisal theory by demonstrating that threat and challenge cognitive appraisals and physiological responses could be elicited experimentally by manipulating instructional set. Studies 2 and 3, in contrast, found that manipulations of physiological response patterns consistent with challenge and threat did not result in corresponding changes in cognitive appraisal. Appraisals in Study 3, however, were related to subjective pain independent of the physiological manipulation. These studies suggest a central role for cognitive appraisal processes in elicitation of threat and challenge responses to potentially stressful situations. PMID:9216079

  7. DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING

    Directory of Open Access Journals (Sweden)

    Ali Gholami

    2016-03-01

    Full Text Available Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system. This paper describes an extension of Cloud Privacy Threat Modeling (CPTM methodology for privacy threat modeling in relation to processing sensitive data in cloud computing environments. It describes the modeling methodology that involved applying Method Engineering to specify characteristics of a cloud privacy threat modeling methodology, different steps in the proposed methodology and corresponding products. In addition, a case study has been implemented as a proof of concept to demonstrate the usability of the proposed methodology. We believe that the extended methodology facilitates the application of a privacy-preserving cloud software development approach from requirements engineering to design.

  8. Threats in Optical Burst Switched Network

    Directory of Open Access Journals (Sweden)

    P. Siva Subramanian

    2011-05-01

    Full Text Available Optical network is a viable network for future communication, which transmits data at an average rate of 50Tb/s. Optical Burst Switching is a trusted mechanism used for Optical network. There is a good amount of research done in the area of security in Optical networks. In addition, the issues related to physical network security has been dealt with respect to Optical networks. Our proposed work is intend to find the possible security threats that may happen in Optical Burst Switched Networks and the counter measures are examined separately. The NS-2 simulator with modified OBS patch is used to verify and validate the proposed mechanism

  9. Is China Threat a Hoax?

    Institute of Scientific and Technical Information of China (English)

    Niu Weigan; Ma Zongshi

    2008-01-01

    The Beijing Olympics has focused unprecedented world attention on China this year. Many people hail the Games as an occasion that showcases China's growing contribution to world development and harmony. But intent on politicizing this global event, a few modern Cassandras still cling to the flawed China Threat theory. In this paper, the author traces the origins of this fallacious theory. He sees it as a product of Western empiricism viewed through an historical and philosophical prism. He argues that the assertion of threat arises from a generalization of historical facts. The assertion links China's growing clout with declining Western dominance in international affairs. Starting with the myth that peace is possible only among democracies, the theory predicts the inevitability of conflict between the West and China, a country with an alleged expansionist tradition and under an authoritarian system.

  10. Countering 21st Century Threats

    DEFF Research Database (Denmark)

    Scharling Pedersen, Peter; Pillai, Chad M.; Hun, Lee Jae

    2015-01-01

    The United States and its Allies confront an increasingly volatile world where threats range from traditional state-on-state challenges to non-state transnational networks. To successfully combat these 21st Century problems, in an era of resource and geo-political power constraints, the U.S. and......), Counter-Terrorism (CT), and Security and Stability Operations (SSO). • Establishing a construct that allows a strategic Whole-of-Government capacity for operations coordinated by joint interagency task forces. • Continue to developing the Global SOF network. • Increased intelligence sharing in areas of...... shared interests pre-crisis. • Establish political agreements and/or intentions with partners to address potential threats. • Establishing mutual trust through Building Partnership Capacity with capable SOF and intelligence organizations....

  11. Prefrontal control of attention to threat.

    Science.gov (United States)

    Peers, Polly V; Simons, Jon S; Lawrence, Andrew D

    2013-01-01

    Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g., trait anxiety) and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink (AB) following threat-related targets. Moreover, we demonstrate that activity in dorso-lateral prefrontal cortex (DLPFC), is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience. PMID:23386824

  12. Prefrontal control of attention to threat

    Directory of Open Access Journals (Sweden)

    Polly V Peers

    2013-02-01

    Full Text Available Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g. trait anxiety and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show, that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink following threat-related targets. Moreover, we demonstrate that activity in dorsolateral prefrontal cortex, is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience.

  13. Sea Level Threat in Tuvalu

    OpenAIRE

    Than Aung; Awnesh Singh; Uma Prasad

    2009-01-01

    Problem statement: Recently the impacts of climate change, in particular, sea level rise, had been a major concern for many Pacific island countries. In early 2000, there were a series of media coverage over sea level rise issues using Tuvalu as an example. The daily life of Tuvalu revolves around the ocean and the immediate threat on the islands people, economy, environment and its islands is of concern to the Tuvalu government. The Tuvalu government has concluded that Tuvalu was destined to...

  14. Affirmative action and stereotype threat

    OpenAIRE

    Bracha, Anat; Cohen, Alma; Conell-Price, Lynn

    2013-01-01

    In spite of the apparent success of affirmative action (AA) in the past, many oppose such policies. Opponents argue that the cost of attaining proportional representation by preferential policies is too high, reducing the quality of selected groups and stigmatizing members of the protected class. One way in which preferential policies might harm groups they are designed to benefit is by producing stereotype threat; that is, cueing a negative stereotype may lead individuals to conform to it. A...

  15. Cyber Terrorism– Global Security Threat

    OpenAIRE

    Bogdanoski, Mitko; Petreski, Drage

    2013-01-01

    It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramat...

  16. Symbian `vulnerability' and Mobile Threats

    OpenAIRE

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one o...

  17. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, Lucas; O'Connor, Brian; Visconti, Piero;

    2016-01-01

    he diversity of life on Earth—which provides vital services to humanity (1)—stems from the difference between rates of evolutionary diversification and extinction. Human activities have shifted the balance (2): Species extinction rates are an estimated 1000 times the “background” rate (3) and cou...... United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  18. Subordinates as Threats to Leaders

    OpenAIRE

    Glazer, Amihai; Segendorff, Björn

    2001-01-01

    A leader of an organization may view a subordinate as threatening or weakening the leader's position. The threat may increase with the subordinate's ability and reduce the rents the leader wins. In particular, a leader who trains his subordinate reduces the cost to the owner of a firm in replacing the leader, and so reduces the leader's bargaining power. The leader therefore provides inefficiently low training for the subordinate.

  19. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... this? Submit What's this? Submit Button Antibiotic Resistance Threats in the United States, 2013 Recommend on Facebook Tweet Share Compartir This report, Antibiotic resistance threats in the United States, 2013 gives a first- ...

  20. A Bayesian belief network of threat anticipation and terrorist motivations

    Science.gov (United States)

    Olama, Mohammed M.; Allgood, Glenn O.; Davenport, Kristen M.; Schryver, Jack C.

    2010-04-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  1. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states. PMID:23256682

  2. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  3. An age apart: the effects of intergenerational contact and stereotype threat on performance and intergroup bias.

    Science.gov (United States)

    Abrams, Dominic; Eller, Anja; Bryant, Jacqueline

    2006-12-01

    An experimental study examined the effect of intergenerational contact and stereotype threat on older people's cognitive performance, anxiety, intergroup bias, and identification. Participants completed a series of cognitive tasks under high or low stereotype threat (through comparison with younger people). In line with stereotype threat theory, threat resulted in worse performance. However, this did not occur if prior intergenerational contact had been more positive. This moderating effect of contact was mediated by test-related anxiety. In line with intergroup contact theory, more positive contact was associated with reduced prejudice and reduced ingroup identification. However this occurred in the high threat, but not low threat, condition. The findings suggest that positive intergenerational contact can reduce vulnerability to stereotype threat among older people. PMID:17201490

  4. Understanding and managing human threats to the coastal marine environment.

    Science.gov (United States)

    Crain, Caitlin M; Halpern, Benjamin S; Beck, Mike W; Kappel, Carrie V

    2009-04-01

    Coastal marine habitats at the interface of land and sea are subject to threats from human activities in both realms. Researchers have attempted to quantify how these various threats impact different coastal ecosystems, and more recently have focused on understanding the cumulative impact from multiple threats. Here, the top threats to coastal marine ecosystems and recent efforts to understand their relative importance, ecosystem-level impacts, cumulative effects, and how they can best be managed and mitigated, are briefly reviewed. Results of threat analysis and rankings will differ depending on the conservation target (e.g., vulnerable species, pristine ecosystems, mitigatable threats), scale of interest (local, regional, or global), whether externalities are considered, and the types of management tools available (e.g., marine-protected areas versus ecosystem-based management). Considering the cumulative effect of multiple threats has only just begun and depends on spatial analysis to predict overlapping threats and a better understanding of multiple-stressor effects and interactions. Emerging conservation practices that hold substantial promise for protecting coastal marine systems include multisector approaches, such as ecosystem-based management (EBM), that account for ecosystem service valuation; comprehensive spatial management, such as ocean zoning; and regulatory mechanisms that encourage or require cross-sector goal setting and evaluation. In all cases, these efforts require a combination of public and private initiatives for success. The state of our ecological understanding, public awareness, and policy initiatives make the time ripe for advancing coastal marine management and improving our stewardship of coastal and marine ecosystems. PMID:19432644

  5. Stereotype Threat and Survey Response Bias

    OpenAIRE

    King, Kenya Latonya

    2014-01-01

    Stereotype threat is the threat of confirming a negative stereotype about a group with which a person identifies. Researchers have found that stereotype threat can result in underperformance in multiple domains, shifts in social behavior, and shifts in assessed implicit attitudes, the likelihood of which increases as an individual's concern about the domain of interest increases. According to theory, this threat can be "alleviated",thereby diminishing or eliminating its impact. In this projec...

  6. The role of threats in animal cooperation

    OpenAIRE

    Cant, Michael A.

    2010-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identi...

  7. Turning Social Identity Threat into Challenge: Status Stability and Cardiovascular Reactivity During Inter-group Competition

    OpenAIRE

    Scheepers, Daan

    2008-01-01

    "The current research examined the occurrence of threat and challenge in low and high status groups resulting from the stability of inter-group status differences during an inter-group competition. It was hypothesized that members of low status groups are relatively threatened when status differences are stable, but that this threat turns into a challenge when status differences become unstable. By contrast, unstable status relations were predicted to lead to threat in members of high status ...

  8. Security of radioactive sources: Threats and answers

    International Nuclear Information System (INIS)

    The general issue of the security of radioactive sources is presented as a prime but constitutive element of radiation safety, focusing particularly on the perceived threats for the malevolent use of radioactive sources and on the possible answers to these threats. The paper discusses the source security threat and the possible international response, and presents an overall outlook for the future. (author)

  9. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  10. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  11. Actionable knowledge and strategic decision making for bio- and agroterrorism threats: building a collaborative early warning culture.

    Science.gov (United States)

    Mårtensson, Per-Åke; Hedström, Lars; Sundelius, Bengt; Skiby, Jeffrey E; Elbers, Armin; Knutsson, Rickard

    2013-09-01

    Current trends in biosecurity and cybersecurity include (1) the wide availability of technology and specialized knowledge that previously were available only to governments; (2) the global economic recession, which may increase the spread of radical non-state actors; and (3) recent US and EU commission reports that reflect concerns about non-state actors in asymmetric threats. The intersectoral and international nature of bioterrorism and agroterrorism threats requires collaboration across several sectors including intelligence, police, forensics, customs, and other law enforcement organizations who must work together with public and animal health organizations as well as environmental and social science organizations. This requires coordinated decision making among these organizations, based on actionable knowledge and information sharing. The risk of not sharing information among organizations compared to the benefit of sharing information can be considered in an "information sharing risk-benefit analysis" to prevent a terrorism incident from occurring and to build a rapid response capability. In the EU project AniBioThreat, early warning is the main topic in work package 3 (WP 3). A strategy has been generated based on an iterative approach to bring law enforcement agencies and human and animal health institutes together. Workshops and exercises have taken place during the first half of the project, and spin-off activities include new preparedness plans for institutes and the formation of a legal adviser network for decision making. In addition, a seminar on actionable knowledge was held in Stockholm, Sweden, in 2012, which identified the need to bring various agency cultures together to work on developing a resilient capability to identify early signs of bio- and agroterrorism threats. The seminar concluded that there are a number of challenges in building a collaborative culture, including developing an education program that supports collaboration and shared

  12. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  13. Stereotype threat prevents perceptual learning

    OpenAIRE

    Rydell, Robert J.; Shiffrin, Richard M.; Boucher, Kathryn L.; Van Loo, Katie; Rydell, Michael T.

    2010-01-01

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype “women are bad at math” causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task...

  14. New Threat to World Economy

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The aggregate amount of money and credit in the global economy has risen sharply over the past 30 years,with its growth rate and stock far exceeding that of the real economy or real assets of the world.This is the view of Xiang Songzuo,professor at the Huazhong University of Science and Technology,whose opinion was first published in a recent article in China Business News.Xiang said this situation is a real threat to the world economy.Excerpts of his article are reprinted below:

  15. Symbian `vulnerability' and Mobile Threats

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.

  16. Parallel processing of general and specific threat during early stages of perception.

    Science.gov (United States)

    You, Yuqi; Li, Wen

    2016-03-01

    Differential processing of threat can consummate as early as 100 ms post-stimulus. Moreover, early perception not only differentiates threat from non-threat stimuli but also distinguishes among discrete threat subtypes (e.g. fear, disgust and anger). Combining spatial-frequency-filtered images of fear, disgust and neutral scenes with high-density event-related potentials and intracranial source estimation, we investigated the neural underpinnings of general and specific threat processing in early stages of perception. Conveyed in low spatial frequencies, fear and disgust images evoked convergent visual responses with similarly enhanced N1 potentials and dorsal visual (middle temporal gyrus) cortical activity (relative to neutral cues; peaking at 156 ms). Nevertheless, conveyed in high spatial frequencies, fear and disgust elicited divergent visual responses, with fear enhancing and disgust suppressing P1 potentials and ventral visual (occipital fusiform) cortical activity (peaking at 121 ms). Therefore, general and specific threat processing operates in parallel in early perception, with the ventral visual pathway engaged in specific processing of discrete threats and the dorsal visual pathway in general threat processing. Furthermore, selectively tuned to distinctive spatial-frequency channels and visual pathways, these parallel processes underpin dimensional and categorical threat characterization, promoting efficient threat response. These findings thus lend support to hybrid models of emotion. PMID:26412811

  17. Stereotype threat reduces false recognition when older adults are forewarned.

    Science.gov (United States)

    Wong, Jessica T; Gallo, David A

    2016-05-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information-a phenomenon attributed to stereotype threat-but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval. PMID:26218527

  18. The threat of illicit trafficking

    International Nuclear Information System (INIS)

    Intelligence services, the army, the navy, the air force and the police together work to avoid illicit trafficking around the world by taking actions as follows: examining the risks and threats of illicit trafficking of radioactive material by terrorists or criminals; gaining a better understanding of current and future patterns and trends in the illicit trafficking of radioactive material; determining progress on efforts to establish detection capabilities at borders and to exchange information on developments in detection technology and response methodologies through installation of radiation detection equipment; strengthening existing networks and cooperation for sharing information on illicit trafficking reports on incidents involving smuggling, theft, loss and illegal disposal, illegal possession and transfer, and attempted illegal sales of the material; examining how an enhanced export/import regime can assist in combating illicit trafficking control through unauthorized movement of radioactive material; sharing information on activities intended to implement international obligations, recommendations and guidance relevant to nuclear security; suggest actions by which the international effort, through the IAEA, would be strengthened. This paper examines the threat and context of illicit nuclear trafficking of radioactive material, what is being done to combat such trafficking and highlights where more needs to be done

  19. Threat sensitivity in bipolar disorder.

    Science.gov (United States)

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  20. Do Current European Policies Prevent Soil Threats and Support Soil Functions?

    OpenAIRE

    Nadia Glæsner; Katharina Helming; Wim de Vries

    2014-01-01

    There is currently no legislation at the European level that focuses exclusively on soil conservation. A cross-policy analysis was carried out to identify gaps and overlaps in existing EU legislation that is related to soil threats and functions. We found that three soil threats, namely compaction, salinization and soil sealing, were not addressed in any of the 19 legislative policies that were analyzed. Other soil threats, such as erosion, decline in organic matter, loss of biodiversity and ...

  1. Geographical linkages between threats and imperilment in freshwater fish in the Mediterranean Basin

    OpenAIRE

    Clavero, Miguel; Hermoso, Virgilio; Levin, Noam; Kark, Salit

    2010-01-01

    Aim The level of imperilment of mediterranean freshwater fish is among the highest recorded for any group of organisms evaluated to date. Here, we describe the geographical patterns in the incidence of threats affecting mediterranean freshwater fish and test whether the effects of specific threats are spatially related to the degree of imperilment of fish faunas. Location The Mediterranean Basin Biome. Methods From the IUCN Red List, we recorded the six main threats to 232 e...

  2. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  3. Transmitting the sum of all fears: Iranian nuclear threat salience among offspring of Holocaust survivors.

    Science.gov (United States)

    Shrira, Amit

    2015-07-01

    Many Israelis are preoccupied with the prospect of a nuclear-armed Iran, frequently associating it with the danger of annihilation that existed during the Holocaust. The current article examined whether offspring of Holocaust survivors (OHS) are especially preoccupied and sensitive to the Iranian threat, and whether this susceptibility is a part of their increased general image of actual and potential threats, defined as the hostile world scenario (HWS). Study 1 (N = 106) showed that relative to comparisons, OHS reported more preoccupation with the Iranian nuclear threat. Moreover, the positive relationship between the salience of the Iranian threat and symptoms of anxiety was stronger among OHS. Study 2 (N = 450) replicated these findings, while focusing on the Iranian nuclear threat salience and symptoms of psychological distress. It further showed that OHS reported more negative engagement with the HWS (i.e., feeling that surrounding threats decrease one's sense of competence), which in turn mediated their increased preoccupation with the Iranian threat. The results suggest that intergenerational transmission of the Holocaust trauma includes heightened preoccupation with and sensitivity to potential threats of annihilation, and that the specific preoccupation with threats of annihilation reflects a part of a more general preoccupation with surrounding threats. PMID:25793401

  4. Real threat of nuclear smuggling

    International Nuclear Information System (INIS)

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  5. World's soils are under threat

    Science.gov (United States)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  6. A Proposed Data Mining Profiler Model to Fight Security Threats in Nigeria

    Directory of Open Access Journals (Sweden)

    Jackson AKPOJARO

    2013-01-01

    Full Text Available The growing insecurity challenges in Nigeria are of great concern to everyone and every effort must be employed to combat these security threats. Using the proposed data mining profiler model, our work distinguishes between information related threats and non-information related security threats. Information related threats are essentially attacks on computers and networks. That is, they are threats that damage electronic information. Non-information related terrorist threats include terrorist attacks, bombing, shooting and killing someone, vandalism, kidnapping, setting property on fire, etc. The questions asked by all stakeholders are: can the security agencies and their strategies fight the non-information related security threats in Nigeria? Do these agencies have appropriate Information Technology Infrastructure in place for the purpose of information gathering, sharing, dissemination, and decision making? Do they have adequate surveillance systems/equipment? These are some of the issues this research work attempts to address by proposing an automated data profiler model to detect terrorist activities. The work would be accomplished by using different machine learning methods, in particular, we would combine data mining algorithms with established (or experimental thresholds to profile users’ call data, combined with evidence from the profilers to construct a security detector system that would trigger alarm for prompt arrest and investigation of terrorists by law enforcement agencies. Our model can be generalised to handle other non-information related threats in different domains.

  7. Elucidating an Affective Pain Circuit that Creates a Threat Memory.

    Science.gov (United States)

    Han, Sung; Soleiman, Matthew T; Soden, Marta E; Zweifel, Larry S; Palmiter, Richard D

    2015-07-16

    Animals learn to avoid harmful situations by associating a neutral stimulus with a painful one, resulting in a stable threat memory. In mammals, this form of learning requires the amygdala. Although pain is the main driver of aversive learning, the mechanism that transmits pain signals to the amygdala is not well resolved. Here, we show that neurons expressing calcitonin gene-related peptide (CGRP) in the parabrachial nucleus are critical for relaying pain signals to the central nucleus of amygdala and that this pathway may transduce the affective motivational aspects of pain. Genetic silencing of CGRP neurons blocks pain responses and memory formation, whereas their optogenetic stimulation produces defensive responses and a threat memory. The pain-recipient neurons in the central amygdala expressing CGRP receptors are also critical for establishing a threat memory. The identification of the neural circuit conveying affective pain signals may be pertinent for treating pain conditions with psychiatric comorbidities. PMID:26186190

  8. Cognitive bias for pictorial and linguistic threat cues in children

    NARCIS (Netherlands)

    Kindt, M; van den Hout, M; de Jong, Peter; Hoekzema, B

    2000-01-01

    The present study was designed to test the conditions under which threat-related cognitive bias can be observed in anxious children. Measures of cognitive bias for threatening words and pictures were obtained from spider fearful children (N = 55) and non-fearful children (N = 58) aged 8-11 in the fi

  9. Cognitive bias for pictorial and linguistic threat cues in children

    NARCIS (Netherlands)

    M. van den Hout; B. Hoekzema; P. de Jong; M. Kindt

    2000-01-01

    The present study was designed to test the conditions under which threat-related cognitive bias can be observed in anxious children. Measures of cognitive bias for threatening words and pictures were obtained from 55 spider fearful children and 58 non-fearful children (aged 8-11 yrs) in the 1st expe

  10. Zika Virus: Old Rival, New Threat

    Directory of Open Access Journals (Sweden)

    Huanyu Wang

    2016-04-01

    Full Text Available Zika virus (ZIKV, originally isolated in 1947, caused a worldwide epidemic between January 2014 and February 2016 in which a total of 39 countries have reported autochthonous circulation (33 or indirect evidence of local transmission (6. The total area affected by ZIKV infection is expanding steadily. ZIKV has become a new threat to public health, and the recent cluster of microcephaly and other neurologic disorders suspected to be due to ZIKV has lead the World Health Organization to announce that it is a Public Health Emergency of International Concern. Because of its current importance, this review summarizes the currently available data on the etiology, epidemiology, clinical features, laboratory diagnosis, and transmission of ZIKV and its related diseases.

  11. MCNPX improvements for threat reduction applications

    Energy Technology Data Exchange (ETDEWEB)

    Waters, Laurie S [Los Alamos National Laboratory; Durkee, Joe W [Los Alamos National Laboratory; Elson, Jay S [Los Alamos National Laboratory; Esch, Ernst I [Los Alamos National Laboratory; Fensin, Michael L [Los Alamos National Laboratory; Hendricks, John S [Los Alamos National Laboratory; Holloway, Shannon T [Los Alamos National Laboratory; James, Michael R [Los Alamos National Laboratory; Jason, Andrew [Los Alamos National Laboratory; Johns, Russell C [Los Alamos National Laboratory; Johnson, M William [Los Alamos National Laboratory; Kawano, Toshihiko [Los Alamos National Laboratory; Mckinney, Gregg W [Los Alamos National Laboratory; Moller, Peter [Los Alamos National Laboratory; Pelowitz, Denise B [Los Alamos National Laboratory

    2008-01-01

    The DHS Domestic Nuclear Detection Office (DNDO) is funding a multiyear program of improvements for the MCNPX{sup TM} Monte Carlo radiation-transport code. Additional work is underway for the DTRA Active Interrogation programs. Enhancements contained in the current MCNPX 2.6.0 RSICC release will be presented, including stopped-muon physics, delayed neutron and photon generation and automatic generation of source photons. Preliminary benchmarking comparisons with data taken with a PSI muon beam will be discussed. We will also describe current improvements now underway, including Nuclear Resonance Fluorescence, pulsed sources, and others. We will also describe very new work begun on a Threat-Reduction user inferface, designed to simplify the setup of TR-related calculations, and introduce standards into geometry, sources and backgrounds.

  12. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  13. Beeinflusst Stereotype Threat die Leseleistung von Jungen?

    OpenAIRE

    Eckert, Christine

    2012-01-01

    Ein durchgängiger Befund internationaler Schulleistungsvergleichsstudien bezieht sich auf die niedrigere Lesekompetenz von Jungen im Vergleich zu Mädchen (OECD, 2010). Ziel der vorliegenden Arbeit war, zu prüfen, welchen Einfluss negative Stereotype – im Sinne der Stereotype Threat-Theorie (Steele & Aronson, 1995) – auf die Leseleistung von Jungen haben. Basierend auf Befunden aus der Lese- und Stereotype Threat-Forschung wurde ein Mediator-Moderator-Modell des Stereotype Threat-Effekts (vgl....

  14. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xu, Xiao Y.; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  15. Reaction to New Security Threat Class

    OpenAIRE

    Elovici, Yuval; Rokach, Lior

    2014-01-01

    Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified threat classes as it is reflected in the number of patents, scientific articles and professional publications over a long period of time. The following threat classes were studied: Phishing; SQL Injection; BotNet; Distributed Denial of Service; ...

  16. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  17. The Moderating Role of Age-Group Identification and Perceived Threat on Stereotype Threat among Older Adults

    Science.gov (United States)

    Kang, Sonia K.; Chasteen, Alison L.

    2009-01-01

    Although research has shown that older adults are negatively affected by aging stereotypes, relatively few studies have attempted to identify those older adults who may be especially susceptible to these effects. The current research takes steps toward identifying older adults most susceptible to the effects of stereotype threat and investigates…

  18. 49 CFR Appendix A to Part 1580 - High Threat Urban Areas (HTUAs)

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false High Threat Urban Areas (HTUAs) A Appendix A to Part 1580 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION... TRANSPORTATION SECURITY Pt. 1580, App. A Appendix A to Part 1580—High Threat Urban Areas (HTUAs) State...

  19. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  20. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    OpenAIRE

    Zhu, Yong; ZHAO Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study...

  1. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  2. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  3. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  4. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  5. Gender, Stereotype Threat and Mathematics Test Scores

    Directory of Open Access Journals (Sweden)

    Ming Tsui

    2011-01-01

    Full Text Available Problem statement: Stereotype threat has repeatedly been shown to depress women’s scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: Experiment 1, where in Chinese students were tested with the added independent variable of test importance. Our results produced only marginally significant stereotype threat effects. Experiment 2, a replication of experiment 1, yielded completely different results, with no threat effects at all. Math-test scores were significantly higher in the threat condition for both men and women, consistent with the phenomena of stereotype lift and stereotype reactance. Experiment 3, which did not include the test-important variable, yielded no significant effects. Conclusion: Stereotype threat, in the mathematics domain, does not seem to be a problem for women in China. We discuss our results in terms of factors which moderate stereotype threat and societal differences in the U.S. and China.

  6. Stereotype Threat, Identity Salience, and Spatial Reasoning

    Science.gov (United States)

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups…

  7. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Eliane Volchan

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  8. [Counterfeit medicines: a growing threat].

    Science.gov (United States)

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world. PMID:17286014

  9. The Threat of Terrorist Organizations in Cyberspace

    Directory of Open Access Journals (Sweden)

    Gabi Siboni

    2013-12-01

    Full Text Available This article discusses the threat of terrorism in cyberspace and examines the truth of the perceptions of this threat that have formed in recent years. It examines the capabilities that a non-state actor can achieve and whether these can constitute a real threat to the national security of states. For an analysis of the main threats facing a state from a multi-year perspective and in light of anticipated changes in a state’s strategic balance, the factors that threaten the state are presented and the roots of the threat are identified. The article thus examines whether terrorism, whose impact is generally tactical, could make (or perhaps has already made the transition to a cyber weapon capability with strategic impact. Specifically, the question is could terrorists develop cyber weapon capabilities that could inflict widespread damage or damage over time, of the sort that brings states to their knees and causes critical systems to crash.

  10. Insider threat to secure facilities: data analysis

    Energy Technology Data Exchange (ETDEWEB)

    1979-12-07

    This report is the culmination of a project in which data from several industries confronting internal security threats were collected and analyzed. The industries and threats involved are deemed to be analogous in one or more respects to potential threats confronting decision makers in the nuclear industry. The analog internal threats consist of bank frauds and embezzlements over $10,000, computer crimes of various types and insider drug thefts from drug manufactures and distributors. These data have been subjected to careful analysis utilizing both descriptive and formal statistical techniques. A number of findings are quite suggestive as to the general nature of the internal threat and are discussed and interpreted in terms of thenuclear industry analogy.

  11. Teens Impulsively React Rather than Retreat from Threat

    Science.gov (United States)

    Dreyfuss, Michael; Caudle, Kristina; Drysdale, Andrew T.; Johnston, Natalie E.; Cohen, Alexandra O.; Somerville, Leah H.; Galván, Adriana; Tottenham, Nim; Hare, Todd A.; Casey, BJ

    2014-01-01

    There is a significant inflection in risk taking and criminal behavior during adolescence, but the basis for this increase remains largely unknown. An increased sensitivity to rewards has been suggested to explain these behaviors. Yet juvenile offenses often occur in emotionally charged situations of negative valence. How behavior is altered by changes in negative emotional processes during adolescence has received less attention than changes in positive emotional processes. The current study uses a measure of impulsivity in combination with cues that signal threat or safety to assess developmental changes in emotional responses to threat cues. We show that adolescents, especially males, impulsively react to threat cues relative to neutral ones, more than adults or children, even when instructed not to respond. This adolescent specific behavioral pattern is paralleled by enhanced activity in limbic cortical regions implicated in detection and assignment of emotional value to inputs and in the subsequent regulation of responses to them when successfully suppressing impulsive responses to threat cues. In contrast, prefrontal control regions implicated in detecting and resolving competing responses show an adolescent emergent pattern (i.e., greater activity in adolescents and adults relative to children) during successful suppression of a response regardless of emotion. Our findings suggest that adolescence is a period of heightened sensitivity to social and emotional cues that results in diminished regulation of behavior in their presence. PMID:24821576

  12. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism. PMID:23390971

  13. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  14. Norwegian assessment of nuclear and radiological threats

    International Nuclear Information System (INIS)

    Full text: There has previously been a series of severe accidents and other events around the world, which has lead to health effects and severe consequences to the environment as a result of ionising radiation. Some of the most severe accidents have been related to explosions or fires in nuclear installations and high dose levels due to orphan sources. Even though the Norwegian nuclear industry is limited, it has since the Chernobyl accident in 1986 been Norwegian policy to have a particular emergency preparedness towards nuclear or radiological events. In order to maintain an effective emergency preparedness with limited resources, it is necessary to have a good understanding of possible scenarios and related consequences. Norwegian authorities are therefore continuously assessing nuclear and radiological threats. Norwegian emergency preparedness has to a large extent been directed towards scenarios where an accident at a foreign nuclear installation leads to radioactive volumes of air passing over Norway, causing considerable deposition over large geographical areas. Norway is neighbouring the Kola Peninsula, where there was a considerable nuclear development during the cold war. Due to their close vicinity to the Norwegian border and poor conditions at some of the sites, possible accidents at nuclear installations on the Kola Peninsula in Russia have been emphasised in Norwegian emergency preparedness. However, Norwegian and international efforts have contributed to improve the conditions at several sites on the Kola Peninsula. Improved safety and physical protection at these sites have reduced the risk for cross-border contamination. Furthermore, extensive decommissioning and dismantlement of aged nuclear submarines have reduced the number of nuclear objects of particular concern. Meanwhile, the latest changes in the international security environment have made one consider a new set of scenarios, involving e.g. massive attacks on nuclear installations. Aging

  15. Distracted by the Unthought - Suppression and Reappraisal of Mind Wandering under Stereotype Threat.

    Science.gov (United States)

    Schuster, Carolin; Martiny, Sarah E; Schmader, Toni

    2015-01-01

    Previous research has found that subtle reminders of negative stereotypes about one's group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women's math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women's performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants' math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss implications for

  16. Distracted by the Unthought - Suppression and Reappraisal of Mind Wandering under Stereotype Threat.

    Directory of Open Access Journals (Sweden)

    Carolin Schuster

    Full Text Available Previous research has found that subtle reminders of negative stereotypes about one's group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests. This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women's math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking in stereotype threat (ST and no threat (NT situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT and cognitive regulation strategy (suppression, reappraisal, or no strategy and measured women's performance on a math and a concentration task (N = 113. We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants' math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss

  17. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  18. Threat assessment using visual hierarchy and conceptual firearms ontology

    Science.gov (United States)

    Arslan, Abdullah N.; Hempelmann, Christian F.; Attardo, Salvatore; Blount, Grady Price; Sirakov, Nikolay Metodiev

    2015-05-01

    The work that established and explored the links between visual hierarchy and conceptual ontology of firearms for the purpose of threat assessment is continued. The previous study used geometrical information to find a target in the visual hierarchy and through the links with the conceptual ontology to derive high-level information that was used to assess a potential threat. Multiple improvements and new contributions are reported. The theoretical basis of the geometric feature extraction method was improved in terms of accuracy. The sample space used for validations is expanded from 31 to 153 firearms. Thus, a new larger and more accurate sequence of visual hierarchies was generated using a modified Gonzalez' clustering algorithm. The conceptual ontology is elaborated as well and more links were created between the two kinds of hierarchies (visual and conceptual). The threat assessment equation is refined around ammunition-related properties and uses high-level information from the conceptual hierarchy. The experiments performed on weapons identification and threat assessment showed that our system recognized 100% of the cases if a weapon already belongs to the ontology and in 90.8% of the cases, determined the correct third ancestor (level concept) if the weapon is unknown to the ontology. To validate the accuracy of identification for a very large data set, we calculated the intervals of confidence for our system.

  19. Threats to Feminist Identity and Reactions to Gender Discrimination.

    Science.gov (United States)

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists (M age  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed. PMID:23606785

  20. Inclusion of Premeditated Threats in the Safety Methodology for NPPs

    International Nuclear Information System (INIS)

    During the last decade the global effort to prevent terrorism or to mitigate its harm, if prevention fails, has increased. The nuclear power community was involved in this effort trying to prevent terrorist attacks on NPPs (Nuclear Power Plants). A natural extension of terror restraining is the prevention of any premeditated damage to the plant, including acts of state. The pre-feasibility study of an Israeli NPP, conducted by the Ministry of National Infrastructures, has identified the risk of hostile damage to the NPP as a major obstacle to the establishment of nuclear power in Israel, second only to the refusal of nuclear exporting nations to sell an NPP to Israelv. The General Director of the Ministry and the Head of the IAEC (Israeli Atomic Energy Commission) have approved continuation of the pre-feasibility study. This synopsis presents a study, regarding premeditated threats to NPPs, commissioned by the Ministry of National Infrastructures as part of the continuation. It focuses on the safety aspect of premeditated threats originating outside the plant, although a significant part of the analysis can be extended to other subjects such as theft or diversion of strategic materials. The study deals only with methodology and does not encompass specific threats or protection measures. Conclusions and recommendations and marked by bold italics Arial font. The theory of nuclear safety regarding non-premeditated safety events (equipment failures, human errors, natural events, etc.) is well developed. The study refers to these events and the theory attached to them as classical, distinguishing them from premeditated events. The study defines two postulates, related to premeditated threats: Correspondence – We should adopt the classical methodology whenever possible. Regulation – The safety of an NPP from premeditated threats requires examination, approval and inspection by a regulator. Key issues of the methodology with substantial differences from the classical

  1. Unconventional biological threats and the molecular biological response to biological threats.

    Science.gov (United States)

    Greenfield, Ronald A; Lutz, Brock D; Huycke, Mark M; Gilmore, Michael S

    2002-06-01

    This article concludes this symposium on potential agents of warfare and terrorism with discussion of 3 topics. First, influenza A virus is discussed as a potential biological weapon. Although it does not receive much attention in this role, the potential for mass casualties and public panic certainly exist if an epidemic of a virulent influenza A virus were initiated. Second, agroterrorism, terrorism directed at livestock or poultry or crops, is briefly discussed. Finally, the potential role of techniques of modern molecular biology to create new agents for bioterrorism or enhance the terrorist potential of available agents, and the known roles of these techniques in defense against biological warfare or terrorism are discussed. PMID:12074489

  2. Sea Level Threat in Tuvalu

    Directory of Open Access Journals (Sweden)

    Than Aung

    2009-01-01

    Full Text Available Problem statement: Recently the impacts of climate change, in particular, sea level rise, had been a major concern for many Pacific island countries. In early 2000, there were a series of media coverage over sea level rise issues using Tuvalu as an example. The daily life of Tuvalu revolves around the ocean and the immediate threat on the islands people, economy, environment and its islands is of concern to the Tuvalu government. The Tuvalu government has concluded that Tuvalu was destined to become the first nation to be sunk by global warming because it is one of the smallest and lowest-lying countries in the world. Approach: In this study, sea level data from the Australian project will be focussed on despite the fact that the length of data is not sufficiently long. The AusAID funded South Pacific Sea Level and climate monitoring project was set up in response to concerns raised by Pacific island countries over the potential impacts of an enhanced greenhouse effect on climate and sea levels in the South Pacific for 20 years. Results: Based upon the 15½ years of sea level data from the project, the sea level rise rate in Tuvalu as at september 2008 was 5.9 mM year-1. This was about four times higher than the global average of 1-2 mm year-1. Sea level in the Tuvalu area had risen approximately 9.14 cm since the inception of the project 15½ years ago. However, it was to be noted that the land is quite stable and the rate of land sinking is -0.06 mM year-1 only. Accordingly, there was no significant impact on the sea level trends. Conclusion: Although the data length is just over 15 years, the sea level trend values do not fluctuate significantly since 1999. It simply indicated that the rate of sea level rise in the Tuvalu region was not accelerating as anticipated by the community.

  3. Neural correlates of threat perception: neural equivalence of conspecific and heterospecific mobbing calls is learned.

    Directory of Open Access Journals (Sweden)

    Marc T Avey

    Full Text Available Songbird auditory areas (i.e., CMM and NCM are preferentially activated to playback of conspecific vocalizations relative to heterospecific and arbitrary noise. Here, we asked if the neural response to auditory stimulation is not simply preferential for conspecific vocalizations but also for the information conveyed by the vocalization. Black-capped chickadees use their chick-a-dee mobbing call to recruit conspecifics and other avian species to mob perched predators. Mobbing calls produced in response to smaller, higher-threat predators contain more "D" notes compared to those produced in response to larger, lower-threat predators and thus convey the degree of threat of predators. We specifically asked whether the neural response varies with the degree of threat conveyed by the mobbing calls of chickadees and whether the neural response is the same for actual predator calls that correspond to the degree of threat of the chickadee mobbing calls. Our results demonstrate that, as degree of threat increases in conspecific chickadee mobbing calls, there is a corresponding increase in immediate early gene (IEG expression in telencephalic auditory areas. We also demonstrate that as the degree of threat increases for the heterospecific predator, there is a corresponding increase in IEG expression in the auditory areas. Furthermore, there was no significant difference in the amount IEG expression between conspecific mobbing calls or heterospecific predator calls that were the same degree of threat. In a second experiment, using hand-reared chickadees without predator experience, we found more IEG expression in response to mobbing calls than corresponding predator calls, indicating that degree of threat is learned. Our results demonstrate that degree of threat corresponds to neural activity in the auditory areas and that threat can be conveyed by different species signals and that these signals must be learned.

  4. Disentangling Islamophobia: The Differential Effects of Symbolic, Realistic, and Terroristic Threat Perceptions as Mediators Between Social Dominance Orientation and Islamophobia

    Directory of Open Access Journals (Sweden)

    Fatih Uenal

    2016-04-01

    Full Text Available The aim of this paper is threefold. First, based on ongoing theoretical discussions on the dimensionality of Islamophobia, this study analyzes whether Islamophobia empirically constitutes a one-dimensional construct or rather a multidimensional construct consisting of anti-Muslim prejudice and anti-Islam sentiment. Second, the effects of symbolic, realistic, and terroristic (safety threats on Islamophobia were analyzed concurrently. Finally, within the framework of the revised Integrated Threat Theory (Stephan & Renfro, 2002, and in order to test the mediating effect of threats, SDO is tested as an antecedent of perceived threat and Islamophobia. Respondents from Berlin (N = 355 participated in an online survey. The results indicate that Islamophobia empirically constitutes a two-dimensional phenomenon, consisting of anti-Muslim and anti-Islam sentiment. Whereas symbolic threat is related to both types of Islamophobia, realistic threat is associated only with anti-Muslim prejudice, and terroristic threat is associated only with anti-Islam sentiment. Finally, the results indicate that the relationship between SDO and both dimensions of Islamophobia is mediated by threats. Symbolic threats mediate the relationships between SDO and both dimensions of Islamophobia. Realistic threats mediate the relationship between SDO and anti-Muslim prejudice and terroristic threats between SDO and anti-Islam sentiment.

  5. Acid Rain: The Silent Environmental Threat.

    Science.gov (United States)

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  6. Heat Waves Pose Big Health Threats

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_159744.html Heat Waves Pose Big Health Threats Kids, elderly among those ... can be inherently dangerous, but the initial heat waves every summer can be particularly perilous to those ...

  7. Cyber Threats In Social Networking Websites

    Directory of Open Access Journals (Sweden)

    Wajeb Ghari

    2012-02-01

    Full Text Available A social network is a social structure made up of individuals or organizations called nodes, which areconnected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sitesare not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websites.

  8. Cyber threats in social networking websites

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sites are not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websi...

  9. Conditional health threats: health beliefs, decisions, and behaviors among adults.

    Science.gov (United States)

    Ronis, D L

    1992-01-01

    We combined the health belief model with the theory of subjective expected utility to derive hypotheses about the relations among health beliefs and preventive decisions. The central implication of this combination of theories is the importance of conceptualizing, measuring, and communicating about health threats in ways that are clearly conditional on action. It is important to distinguish, for example, between how susceptible to a disease a person thinks he or she would be if that person were and were not to take a preventive action. An experimental study of judgments about a hypothetical preventive action was conducted to test many of the theoretically derived hypotheses. A correlation study of dental flossing behavior was conducted to test the hypotheses as they apply to overt behavior rather than to judgment. Results of both studies supported most of the tested hypotheses, especially those related to the conditional conceptualization of health threats. Implications for theory, research methods, and practical applications are discussed. PMID:1582381

  10. A survey on top security threats in cloud computing

    Directory of Open Access Journals (Sweden)

    Muhammad Kazim

    2015-03-01

    Full Text Available Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.

  11. Reducing stereotype threat by blurring intergroup boundaries.

    OpenAIRE

    Rosenthal, H. E. S.; Crisp, R. J.

    2006-01-01

    The authors aimed to establish whether interventions designed to reduce intergroup bias could be applied to the stereotype threat domain. In three experiments, the hypothesis was tested that blurring intergroup boundaries would reduce stereotype threat. In the first study, it was found that female participants who thought about characteristics shared between the genders tended to show less preference for stereotypical female careers than did participants in the baseline condition. In. Experim...

  12. Stereotype Threat and the Student-Athlete

    OpenAIRE

    Thomas S. Dee

    2009-01-01

    Achievement gaps may reflect the cognitive impairment thought to occur in evaluative settings (e.g., classrooms) where a stereotyped identity is salient (i.e., stereotype threat). This study presents an economic model of stereotype threat that reconciles prior evidence on how student effort and performance are influenced by this social-identity phenomenon. This study also presents empirical evidence from a laboratory experiment in which students at a selective college were randomly assigned t...

  13. Environmental Health: Threats and their Interactions

    OpenAIRE

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurren...

  14. Contemporary terrorism as a global threat

    OpenAIRE

    Smolarek, Mirosław; Żuber, Marian

    2013-01-01

    Terrorism has been present in human history since ancient times, but it was not considered a serious threat for global security. The attacks on the World Trade Center have demonstrated that it is a threat of a global nature. It is an effective weapon used by the "weaker" against the stronger opponents. The subject of terrorism is very complex, difficult and elusive. There is a divergence among the scholars in understanding terrorism studies due to the lack of uniform criteria for the deter...

  15. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

    OpenAIRE

    Mardiana Mohamad Noor; Wan Haslina Hassan

    2013-01-01

    This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellul...

  16. Security Solutions against Computer Networks Threats

    OpenAIRE

    Fatemeh Soleimani Roozbahani; Reihaneh Azad

    2015-01-01

    The spread of information networks in communities and organizations have led to a daily huge volume of information exchange between different networks which, of course, has resulted in new threats to the national organizations. It can be said that information security has become today one of the most challenging areas. In other words, defects and disadvantages of computer network security address irreparable damage for enterprises. Therefore, identification of security threats and ways of dea...

  17. Open literature review of threats including sabotage and theft of fissile material transport in Japan

    International Nuclear Information System (INIS)

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty

  18. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    Energy Technology Data Exchange (ETDEWEB)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-06-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

  19. Disease-threat model explains acceptance of genetically modified products

    OpenAIRE

    Prokop Pavol; Ozel Murat; Usak Muhammet; Senay Ibrahim

    2013-01-01

    Natural selection favoured survival of individuals who were able to avoid disease. The behavioural immune system is activated especially when our sensory system comes into contact with disease-connoting cues and/or when these cues resemble disease threat. We investigated whether or not perception of modern risky technologies, risky behaviour, expected reproductive goals and food neophobia are associated with the behavioural immune system related to specific attitudes toward genetically ...

  20. Piracy As A Threat To International Peace And Security

    OpenAIRE

    Anton A. Varfolomeev

    2015-01-01

    The study focuses on specific issues in the system of international security related to modern-day piracy. The first part examines the adequacy of the classical approach treating piracy as a common crime with an international element, comparing contemporary piracy to other illegal activities committed by non-state actors. The second part deals with the status of the threat to international peace and security potentially applicable to piracy. The essay concludes with a brief case study on the ...

  1. Globalisation of water: Opportunities and threats of virtual water trade

    OpenAIRE

    A. K. Chapagain

    2006-01-01

    Where the river basin is generally seen as the appropriate unit for analyzing freshwater availability and use, it becomes increasingly important to put freshwater issues in a global context. The book analyses the opportunities and threats of international virtual water trade in the context of solving national and regional problems of water shortages. Central questions addressed in the study are: What are the fluxes of virtual water related to the international trade of products? Is the import...

  2. Nuclear threat. A clear and present danger

    International Nuclear Information System (INIS)

    It was disappointed at the discussion in the review conference of the NPT held in 2005. The fact may be caused by the estrangement between the international urgent issues related to the non-proliferation and the effectiveness of archaic measures through the NPT. However, it should not be recognized that the international obligation and worth of NPT has been gone. The NPT referred the typical international situation under the cold war era. Although several permanent issues of the nuclear non-proliferation exist in current discussions, the activities relevant to the NPT may not be effect against newly unstable situations after the September 11th of 2001. Urgent challenges to be taken are that we must strictly analyze the interventions between 'the clear and present danger' of our world and the nuclear herms, and must take appropriate actions toward them without influences from previous international situations that might be subsisted in current international treaties and agreements. This paper identified the features of nuclear threats based on the four categories and examined the possibilities of nuclear terrorism from previous facts with the inductive inference. The results identified the possibility of nuclear facility attack and of radioactive materials theft by the Polico-Religious Groups and others are stood out. The authors would suggest the important of urgent recognition to establish the certain security system against nuclear terrorism. (author)

  3. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat. PMID:19245886

  4. Does parental anxiety cause biases in the processing of child-relevant threat material?

    OpenAIRE

    Cartwright-Hatton, Sam; Abeles, Paul; Dixon, Clare; Holliday, Christine; Hills, Becky

    2014-01-01

    OBJECTIVES: Anxiety leads to biases in processing personally relevant information. This study set out to examine whether anxious parents also experience biases in processing child-relevant material. DESIGN AND METHODS: Ninety parents acted as a control condition, or received a social anxiety or child-related anxiety induction. They completed a task examining attentional biases in relation to child-threat words and social-threat words, and a task examining ability to categorize e...

  5. Stereotype threat as a determinant of burnout or work engagement. Mediating role of positive and negative emotions.

    Science.gov (United States)

    Bedyńska, Sylwia; Żołnierczyk-Zreda, Dorota

    2015-01-01

    Stereotype threat as an example of serious interpersonal strain at workplace can lead either to impaired work engagement or it can motivate workers to strengthen their efforts to disconfirm a stereotype and can result in excessive work engagement. Thus, the basic aim of the study was to examine whether stereotype threat is related to burnout or to work engagement. The mediating role of the negative and positive emotions were also tested in the classical approach. Mediational analysis revealed a linear relation of stereotype threat and burnout, mediated by negative emotions and a quadratic relationship between stereotype threat and work engagement. In the latter analysis none of the mediators were significant. Therefore, the results showed that both burnout and work engagement are associated with stereotype threat at the workplace, probably depending on the stage of response to the stereotype threat. Further research should confirm these associations in a longitudinal study. PMID:26327256

  6. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    Science.gov (United States)

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior. PMID:21204691

  7. Wealth a Threat to Health

    DEFF Research Database (Denmark)

    Nørgaard, Jørgen

    2006-01-01

    Overweight problems and related deseases are causing 400.000 death alone in the USA, and other countries are catching up. Together with too much food intake, too little use of the body energy is the main cause of the problem. It is shown how more physical exercise can help solving another big pro...

  8. Managing facility risk: external threats and health care organizations.

    Science.gov (United States)

    Reid, Daniel J; Reid, William H

    2014-01-01

    Clinicians and clinical administrators should have a basic understanding of physical and financial risk to mental health facilities related to external physical threat, including actions usually viewed as "terrorism" and much more common sources of violence. This article refers to threats from mentally ill persons and those acting out of bizarre or misguided "revenge," extortionists and other outright criminals, and perpetrators usually identified as domestic or international terrorists. The principles apply both to relatively small and contained acts (such as a patient or ex-patient attacking a staff member) and to much larger events (such as bombings and armed attack), and are relevant to facilities both within and outside the U.S. Patient care and accessibility to mental health services rest not only on clinical skills, but also on a place to practice them and an organized system supported by staff, physical facilities, and funding. Clinicians who have some familiarity with the non-clinical requirements for care are in a position to support non-clinical staff in preventing care from being interrupted by external threats or events such as terrorist activity, and/or to serve at the interface of facility operations and direct clinical care. Readers should note that this article is an introduction to the topic and cannot address all local, state and national standards for hospital safety, or insurance providers' individual facility requirements. PMID:24733720

  9. Disease-threat model explains acceptance of genetically modified products

    Directory of Open Access Journals (Sweden)

    Prokop Pavol

    2013-01-01

    Full Text Available Natural selection favoured survival of individuals who were able to avoid disease. The behavioural immune system is activated especially when our sensory system comes into contact with disease-connoting cues and/or when these cues resemble disease threat. We investigated whether or not perception of modern risky technologies, risky behaviour, expected reproductive goals and food neophobia are associated with the behavioural immune system related to specific attitudes toward genetically modified (GM products. We found that respondents who felt themselves more vulnerable to infectious diseases had significantly more negative attitudes toward GM products. Females had less positive attitudes toward GM products, but engaging in risky behaviours, the expected reproductive goals of females and food neophobia did not predict attitudes toward GM products. Our results suggest that evolved psychological mechanisms primarily designed to protect us against pathogen threat are activated by modern technologies possessing potential health risks.

  10. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Disaster Evacuees Keep It With You Drug and Medical Device Safety Immunizations Food & Water Safety and Hand Hygiene Clean Hands Save Lives Resources for Emergency Health Professionals Clinician Outreach ... Health Response," co-produced by the United States Army Medical Research Institute of Infectious Diseases (USAMRIID), the Food ...

  11. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Disaster Public Health Assessment and Surveillance Tools Training & Education Emergency Responder Health Monitoring & Surveillance (ERHMS) ERHMS Online ... co-produced by the United States Army Medical Research Institute of Infectious Diseases (USAMRIID), the Food and ...

  12. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... or is not supported by your browser. For this reason, some items on this page will be unavailable. For more information about this message, please visit this page: About CDC.gov . ...

  13. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Biological Warfare and Terrorism: The Military and Public Health Response," co-produced by the United States Army Medical Research Institute of Infectious Diseases (USAMRIID), the Food and Drug Administration (FDA), and the Centers for Disease Control and ...

  14. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... With You Drug and Medical Device Safety Immunizations Food & Water Safety and Hand Hygiene Clean Hands Save ... Medical Research Institute of Infectious Diseases (USAMRIID), the Food and Drug Administration (FDA), and the Centers for ...

  15. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Drug and Medical Device Safety Immunizations Food & Water Safety and Hand Hygiene Clean Hands Save Lives Resources for Emergency Health Professionals Clinician Outreach (COCA) Crisis & Risk Communication (CERC) Laboratory Information Health Alert Network (HAN) Responders ...

  16. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... diseases: smallpox, anthrax, botulism, plague, tularemia, and viral hemorrhagic fevers. If these germs were used to intentionally infect ... the Program Overview Anthrax Plague Smallpox Botulism Viral Hemorrhagic Fevers Tularemia Note: Parts of this video were adapted ...

  17. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... After a Disaster Evacuees Keep It With You Drug and Medical Device Safety Immunizations Food & Water Safety ... Institute of Infectious Diseases (USAMRIID), the Food and Drug Administration (FDA), and the Centers for Disease Control ...

  18. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Controls Search Form Controls Search The CDC Cancel Submit Search The CDC CDC A-Z Index MENU ... Controls Search Form Controls Search The CDC Cancel Submit Search The CDC Emergency Preparedness and Response Note: ...

  19. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Keep It With You Drug and Medical Device Safety Immunizations Food & Water Safety and Hand Hygiene Clean Hands Save Lives Resources ... Preventing Chain Saw Injuries During Tree Removal Electrical Safety and Generators Handling Human Remains After a Disaster ...

  20. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Hygiene Clean Hands Save Lives Resources for Emergency Health Professionals Clinician Outreach (COCA) Crisis & Risk Communication (CERC) Laboratory Information Health Alert Network (HAN) Responders Disaster Relief Volunteers Preventing ...

  1. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... as bioterrorist weapons. Watch the Complete Program "The History of Bioterroism" (26 min 38 sec) Watch ... Public Health Response," co-produced by the United States Army Medical Research Institute of Infectious Diseases (USAMRIID), the Food ...

  2. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... You Drug and Medical Device Safety Immunizations Food & Water Safety and Hand Hygiene Clean Hands Save Lives ... Public Health Response," co-produced by the United States Army Medical Research Institute of Infectious Diseases (USAMRIID), ...

  3. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... on this page will be unavailable. For more information about this message, please visit this page: About ... Emergency Preparedness and Response Emergency Preparedness and You Information on Specific Types of Emergencies Recent Outbreaks and ...

  4. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... During Tree Removal Electrical Safety and Generators Handling Human Remains After a Disaster Public Health Assessment and ... 6348 Email CDC-INFO U.S. Department of Health & Human Services HHS/Open USA.gov

  5. Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids

    NARCIS (Netherlands)

    Vasenev, Alexandr; Montoya, Lorena; Ceccarelli, Andrea; Le, Anhtuan; Ionita, Dan

    2016-01-01

    Deriving value judgements about threat rankings for large and entangled systems, such as those of urban smart grids, is a challenging task. Suitable approaches should account for multiple threat events posed by different classes of attackers who target system components. Given the complexity of the

  6. Women and computers: effects of stereotype threat on attribution of failure

    OpenAIRE

    Koch, Sabine C.; Müller, Stephanie M; Sieverding, Monika

    2008-01-01

    This study investigated whether stereotype threat can influence women’s attributions of failure in a computer task. Male and female college-age students (n = 86, 16–21 years old) from Germany were asked to work on a computer task and were hinted beforehand that in this task, either (a) men usually perform better than women do (negative threat condition), or (b) women usually perform better than men do (positive condition), or (c) they received no threat or gender-related information (contr...

  7. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight... upon receiving information that an act or suspected act of air piracy has been committed, the...

  8. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  9. 49 CFR 1540.203 - Security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to...

  10. 49 CFR 1572.5 - Standards for security threat assessments.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Standards for security threat assessments. 1572.5... CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.5 Standards for security threat assessments. (a) Standards. TSA determines that an applicant poses a security threat...

  11. 49 CFR 1540.209 - Fees for security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart....

  12. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  13. On the special status of "ego threats".

    Science.gov (United States)

    Schotte, D E

    1992-05-01

    This article comments on a recent article by Heatherton, Herman, and Polivy (1991) in which they suggest that ego threats are a prerequisite to affectively induced disinhibition of food intake in restrained eaters and current dieters. In contrast, the present review suggests that mood induction procedures that involve no apparent threat (e.g., viewing a frightening film) can also prompt disinhibition in restrained eaters. Thus, any mood induction procedure that does not directly physically threaten the S may disinhibit restrained eaters. It is concluded that recommendations to focus future research on ego threats are premature and may serve to obscure the mechanisms by which changes in affective state influence food intake in dieters. PMID:1507070

  14. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  15. The Range of Threats against Israel

    Directory of Open Access Journals (Sweden)

    Yaakov Amidror

    2010-06-01

    Full Text Available This essay focuses primarily on the threats against the State of Israel and touches little on the responses to these threats. Over the last sixty years, the threats Israel has been forced to tackle have assumed different emphases, but the fundamental principle for understanding them has not changed, namely: the world around us, the Arab world, most of the Muslim world – not necessarily “most” in the numerical-statistical terms, but in terms of those determining the outlook of that world – does not consent to the existence of an independent, sovereign Jewish state in the heart of the Middle East and will do whatever it takes to destroy it.

  16. Intergroup threat and outgroup attitudes: a meta-analytic review.

    Science.gov (United States)

    Riek, Blake M; Mania, Eric W; Gaertner, Samuel L

    2006-01-01

    This article examines the relationship between intergroup threat and negative outgroup attitudes. We first qualitatively review the intergroup threat literature, describing the shift from competing theories toward more integrated approaches, such as the integrated threat theory (ITT; W. G. Stephan and Stephan, 2000). The types of threats discussed include: realistic threat, symbolic threat, intergroup anxiety, negative stereotypes, group esteem threat, and distinctiveness threat. We then conducted a quantitative meta-analysis examining the relationships between various intergroup threats and outgroup attitudes. The meta-analysis, involving 95 samples, revealed that 5 different threat types had a positive relationship with negative outgroup attitudes. Additionally, outgroup status moderated some of these relationships. Implications and future directions are considered. PMID:17201592

  17. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  18. The roots of stereotype threat: when automatic associations disrupt girls' math performance.

    Science.gov (United States)

    Galdi, Silvia; Cadinu, Mara; Tomasetto, Carlo

    2014-01-01

    Although stereotype awareness is a prerequisite for stereotype threat effects (Steele & Aronson, 1995), research showed girls' deficit under stereotype threat before the emergence of math-gender stereotype awareness, and in the absence of stereotype endorsement. In a study including 240 six-year-old children, this paradox was addressed by testing whether automatic associations trigger stereotype threat in young girls. Whereas no indicators were found that children endorsed the math-gender stereotype, girls, but not boys, showed automatic associations consistent with the stereotype. Moreover, results showed that girls' automatic associations varied as a function of a manipulation regarding the stereotype content. Importantly, girls' math performance decreased in a stereotype-consistent, relative to a stereotype-inconsistent, condition and automatic associations mediated the relation between stereotype threat and performance. PMID:23713580

  19. Raising consciousness about the nuclear threat through music

    Energy Technology Data Exchange (ETDEWEB)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field of peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.

  20. Ready and waiting: Freezing as active action preparation under threat.

    Science.gov (United States)

    Gladwin, Thomas E; Hashemi, Mahur M; van Ast, Vanessa; Roelofs, Karin

    2016-04-21

    Freezing is a defensive response characterized by rigidity and bradycardia, but it is unclear whether it is a passive versus active preparatory state. We developed a shooting task in which preparation and threat were manipulated independently: Participants were either helpless or able to respond to a possible upcoming attack, and attacks were either associated with an electric shock or not. Essentially, a purely anticipatory preparatory period was used during which no stimuli occurred. Freezing was assessed during this period. In addition to heart rate, body sway was measured, using a stabilometric force platform. The efficacy of the threat manipulation was confirmed via self-report. The ability to prepare led to decreases in heart rate and postural sway, while threat led to decreased heart rate. Further, exploratory analyses suggested that aggressive participants showed reduced initial freezing for threatening opponents, but increased postural freezing when armed. The results suggest that freezing may involve active preparation. Relations to results in passive viewing tasks are discussed. PMID:26994781

  1. The effect of stereotype threat on performance of a rhythmic motor skill.

    Science.gov (United States)

    Huber, Meghan E; Seitchik, Allison E; Brown, Adam J; Sternad, Dagmar; Harkins, Stephen G

    2015-04-01

    Many studies using cognitive tasks have found that stereotype threat, or concern about confirming a negative stereotype about one's group, debilitates performance. The few studies that documented similar effects on sensorimotor performance have used only relatively coarse measures to quantify performance. This study tested the effect of stereotype threat on a rhythmic ball bouncing task, where previous analyses of the task dynamics afforded more detailed quantification of the effect of threat on motor control. In this task, novices hit the ball with positive racket acceleration, indicative of unstable performance. With practice, they learn to stabilize error by changing their ball-racket impact from positive to negative acceleration. Results showed that for novices, stereotype threat potentiated hitting the ball with positive racket acceleration, leading to poorer performance of stigmatized females. However, when the threat manipulation was delivered after having acquired some skill, reflected by negative racket acceleration, the stigmatized females performed better. These findings are consistent with the mere effort account that argues that stereotype threat potentiates the most likely response on the given task. The study also demonstrates the value of identifying the control mechanisms through which stereotype threat has its effects on outcome measures. PMID:25706769

  2. Mental health problems in adolescence and the interpretation of unambiguous threat.

    Directory of Open Access Journals (Sweden)

    Julie D Henry

    Full Text Available Aberrant threat perception has been linked to paranoia, anxiety and other mental health problems, and is widely considered to be a core, transdiagnostic feature of psychopathology. However, to date there has been only limited investigation of whether mental health problems are associated with a biased interpretation of stimuli that have explicit (as opposed to ambiguous connotations of threat. In the present study, 41 adolescents diagnosed with a mental illness and 45 demographically matched controls were asked to provide danger ratings of stimuli normatively rated as being either low or high in potential threat. All participants were also asked to complete background measures of cognitive function, mental health and wellbeing. The results indicated that the two groups did not differ in their capacity to discriminate between low and high threat stimuli, nor did they differ in the absolute level of threat that they attributed to these stimuli. However, for the control group, the overall level of threat perceived in facial stimuli was correlated with two important indices of mental health (depression and anxiety. No associations emerged in the clinical group. These data are discussed in relation to their potential implications for the role of aberrant threat perception in transdiagnostic models of mental health.

  3. Plasticity in pigmentation induced by conflicting threats from predation and UV radiation

    OpenAIRE

    Hansson, Lars-Anders

    2004-01-01

    In a variable and unpredictable environment, phenotypic plasticity in morphology or behavior may considerably improve an organism's protection against environmental threats and thereby its fitness. Here I demonstrate that common freshwater organisms, copepods (Crustacea), show a plastic response by adjusting pigmentation level in relation to two environmental threats: ultraviolet radiation (UV) and predation. The red pigment in copepods, astaxanthin, reduces damage caused by UV radiation,...

  4. The Effect of Stereotype Threat on Performance of a Rhythmic Motor Skill

    OpenAIRE

    Huber, Meghan E.; Seitchik, Allison E.; Brown, Adam J.; Sternad, Dagmar; Harkins, Stephen G.

    2015-01-01

    Many studies using cognitive tasks have found that stereotype threat, or concern about confirming a negative stereotype about one's group, debilitates performance. The few studies that documented similar effects on sensorimotor performance have used only relatively coarse measures to quantify performance. Three experiments tested the effect of stereotype threat on a rhythmic ball bouncing task, both at the novice and skilled level. Previous analysis of the task dynamics afforded more detailed...

  5. Perceived threat mediates the relationship between psychosis proneness and aggressive behavior

    OpenAIRE

    Fanning, Jennifer Renee; Berman, Mitchell Eric; Mohn, Richard Samuel; McCloskey, Michael Sean

    2010-01-01

    Psychotic symptoms are associated with aggressive tendencies, but this relationship is both complex and imperfect. In contrast to psychotic disorders, little is known about aggressive behavior and sub-clinical psychotic symptoms (e.g., “psychosis proneness”), which are relatively common in the general population. Threat/control-override (TCO), which is the propensity to overestimate the likelihood that an outside agent will (1) inflict harm (threat) or (2) control one’s behaviors (control-ove...

  6. Attentional Interference by Threat and Posttraumatic Stress Disorder: The Role of Thought Control Strategies

    OpenAIRE

    Wisco, Blair E.; Pineles, Suzanne L.; Shipherd, Jillian C.; Marx, Brian P.

    2013-01-01

    Attentional interference by threat is associated with PTSD, but the mechanisms of this relationship remain unclear. Attentional interference might be related to increased use of maladaptive thought control strategies, such as suppressing unwanted thoughts (thought suppression) or replacing threatening thoughts with everyday concerns (worry), which increase PTSD risk. Conversely, attentional interference might be associated with reduced use of adaptive strategies, such as talking about threate...

  7. Neural activity associated with monitoring the oscillating threat value of a tarantula

    OpenAIRE

    Mobbs, Dean; Yu, Rongjun; Rowe, James B.; Eich, Hannah; FeldmanHall, Oriel; Dalgleish, Tim

    2010-01-01

    Phylogenetic threats such as spiders evoke our deepest primitive fears. When close or looming, such threats engage evolutionarily conserved monitoring systems and defense reactions that promote self-preservation. With the use of a modified behavioral approach task within functional MRI, we show that, as a tarantula was placed closer to a subject's foot, increased experiences of fear coincided with augmented activity in a cascade of fear-related brain networks including the periaqueductal gray...

  8. Parental and Family Factors as Predictors of Threat Bias in Anxious Youth

    OpenAIRE

    Blossom, Jennifer B.; Ginsburg, Golda S.; Birmaher, Boris; Walkup, John T.; KENDALL, Philip C.; Keeton, Courtney P.; Langley, Audra K.; Piacentini, John C.; Sakolsky, Dara; Albano, Anne Marie

    2013-01-01

    The present study examined the relative predictive value of parental anxiety, parents' expectation of child threat bias, and family dysfunction on child's threat bias in a clinical sample of anxious youth. Participants (N = 488) were part of the Child/Adolescent Anxiety Multi-modal study (CAMS), ages 7–17 years (M = 10.69; SD = 2.80). Children met diagnostic criteria for generalized anxiety disorder, separation anxiety and/or social phobia. Children and caregivers completed questionnaires ass...

  9. [Biosimilars--opportunity or threat?].

    Science.gov (United States)

    Swierkot, Jerzy

    2013-01-01

    Strong interest in biosimilars dates back several years. In the coming years the patent protection ends for subsequent biological drugs, including monoclonal antibodies. This paper organizes the most important facts related to the issue of biosimilars. A biosimilar is a biotherapeutic product which is similar in terms of quality, efficacy and safety to an already licensed reference biotherapeutic product'. It should be noted that biosimilars approved underthe current regulations of the European Medicines Agency (EMA) meet the stringent standards of safety, efficacy and immunogenicity. It is also important to realize that the biosimilar has the right to that name, if it is registered by regulatory authorities like EMA or FDA. One should not confuse biosimilar drugs with those which counterfeit or imitate. Clinical trials on the convertibility of innovative and biosimilar drugs are ongoing. Nevertheless,there is no regulatory framework and clear guidelines of conduct in this regard. In the near future, thanks to the registration of the first biosimilar monoclonal antibodies in rheumatology and gastroenterology the availability of biological treatment for patients should increase. PMID:25775818

  10. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We the

  11. The Missing Piece in Threat Intelligence

    Directory of Open Access Journals (Sweden)

    Frank Denis

    2016-03-01

    Full Text Available Common systems for sharing intelligence on security threats have not been designed to efficiently process feedback from infrastructure providers. In order to fill this gap, we introduce DIP, a new description language to expose changes being made on a network that are relevant to security research and prevention.

  12. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  13. Diversity, Racial Threat and Metropolitan Housing Segregation

    Science.gov (United States)

    DeFina, Robert; Hannon, Lance

    2009-01-01

    Previous studies have shown that as the percent black or percent Hispanic grows, that group's residential segregation from whites tends to increase as well. Typically, these findings are explained in terms of white discriminatory reaction to the perceived threat associated with minority population growth. The present analysis examines whether…

  14. Reemerging Threat of Epidemic Typhus in Algeria

    OpenAIRE

    Mokrani, K.; Fournier, P E; Dalichaouche, M.; Tebbal, S.; Aouati, A.; Raoult, D

    2004-01-01

    We report a case of epidemic typhus in a patient from the Batna region of Algeria, who presented with generalized febrile exanthema. The clinical diagnosis was confirmed by serological cross-adsorption followed by Western blotting. Our report emphasizes the threat of epidemic typhus in the highlands of Algeria.

  15. Extensible threat taxonomy for critical infrastructures

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic thre

  16. After Heart Attack, New Threat: Heart Failure

    Science.gov (United States)

    ... nih.gov/medlineplus/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  17. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  18. Emergency response and disease control--a discussion of alternative objectives for zoning in the age of agricultural bioterrorism.

    Science.gov (United States)

    Munroe, Fonda A

    2007-01-01

    Emergency planning activities in most developed countries have increased as a result of such events as the September 11, 2001 terrorist attacks and the emergence of the highly pathogenic Asian strain of avian influenza, H5N1. The threat of terrorist activities, combined with advances in science and technology, have resulted in an expanded spectrum of threat for humans, animals, plants and the environment. It is possible that an attack or disease incursion could be so catastrophic and devastating that the resources to combat it would be rapidly overwhelmed. In these cases, it may be necessary to develop an alternative strategy. The author discusses the concept of protective zoning. Protective zoning is a strategy to salvage or protect a smaller segment of an agriculture sector or geographic area when resources are insufficient to protect the entire sector or area. This change in orientation will be extremely controversial and the exact criteria to determine when the situation warrants a change in objective, as well as the precise activities to be performed, must be determined by all stakeholders well in advance. Changes to other activities in current emergency plans may be required. The impact on the recovery phase plans will be significant. PMID:20411521

  19. Posttraumatic stress disorder under ongoing threat: a review of neurobiological and neuroendocrine findings

    Directory of Open Access Journals (Sweden)

    Iro Fragkaki

    2016-08-01

    Full Text Available Background: Although numerous studies have investigated the neurobiology and neuroendocrinology of posttraumatic stress disorder (PTSD after single finished trauma, studies on PTSD under ongoing threat are scarce and it is still unclear whether these individuals present similar abnormalities. Objective: The purpose of this review is to present the neurobiological and neuroendocrine findings on PTSD under ongoing threat. Ongoing threat considerably affects PTSD severity and treatment response and thus disentangling its neurobiological and neuroendocrine differences from PTSD after finished trauma could provide useful information for treatment. Method: Eighteen studies that examined brain functioning and cortisol levels in relation to PTSD in individuals exposed to intimate partner violence, police officers, and fire fighters were included. Results: Hippocampal volume was decreased in PTSD under ongoing threat, although not consistently associated with symptom severity. The neuroimaging studies revealed that PTSD under ongoing threat was not characterized by reduced volume of amygdala or parahippocampal gyrus. The neurocircuitry model of PTSD after finished trauma with hyperactivation of amygdala and hypoactivation of prefrontal cortex and hippocampus was also confirmed in PTSD under ongoing threat. The neuroendocrine findings were inconsistent, revealing increased, decreased, or no association between cortisol levels and PTSD under ongoing threat. Conclusions: Although PTSD under ongoing threat is characterized by abnormal neurocircuitry patterns similar to those previously found in PTSD after finished trauma, this is less so for other neurobiological and in particular neuroendocrine findings. Direct comparisons between samples with ongoing versus finished trauma are needed in future research to draw more solid conclusions before administering cortisol to patients with PTSD under ongoing threat who may already exhibit increased endogenous

  20. 29 CFR 458.38 - Deprivation of rights under the CSRA or FSA by violence or threat of violence.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Deprivation of rights under the CSRA or FSA by violence or threat of violence. 458.38 Section 458.38 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT... by violence or threat of violence. No labor organization or any officer, agent, shop steward,...

  1. Insider Threat - Material Control and Accountability Mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Danny H [ORNL; Elwood Jr, Robert H [ORNL; Roche, Charles T [ORNL

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  2. Sexual harassment under social identity threat: the computer harassment paradigm.

    Science.gov (United States)

    Maass, Anne; Cadinu, Mara; Guarnieri, Gaia; Grasselli, Annalisa

    2003-11-01

    Two laboratory experiments investigated the hypothesis that threat to male identity would increase the likelihood of gender harassment. In both experiments, using the computer harassment paradigm, male university students (N=80 in Experiment 1, N=90 in Experiment 2) were exposed to different types of identity threat (legitimacy threat and threat to group value in Experiment 1 and distinctiveness threat and prototypicality threat in Experiment 2) or to no threat and were then given the opportunity to send pornographic material to a virtual female interaction partner. Results show that (a) participants harassed the female interaction partner more when they were exposed to a legitimacy, distinctiveness, or prototypicality threat than to no threat; (b) this was mainly true for highly identified males; and (c) harassment enhanced postexperimental gender identification. Results are interpreted as supporting a social identity account of gender harassment. PMID:14599249

  3. Study on a Threat-Countermeasure Model Based on International Standard Information

    Directory of Open Access Journals (Sweden)

    Guillermo Horacio Ramirez Caceres

    2008-12-01

    Full Text Available Many international standards exist in the field of IT security. This research is based on the ISO/IEC 15408, 15446, 19791, 13335 and 17799 standards. In this paper, we propose a knowledge base comprising a threat countermeasure model based on international standards for identifying and specifying threats which affect IT environments. In addition, the proposed knowledge base system aims at fusing similar security control policies and objectives in order to create effective security guidelines for specific IT environments. As a result, a knowledge base of security objectives was developed on the basis of the relationships inside the standards as well as the relationships between different standards. In addition, a web application was developed which displays details about the most common threats to information systems, and for each threat presents a set of related security control policies from different international standards, including ISO/IEC 27002.

  4. A threat in the computer: the race implicit association test as a stereotype threat experience.

    Science.gov (United States)

    Frantz, Cynthia M; Cuddy, Amy J C; Burnett, Molly; Ray, Heidi; Hart, Allen

    2004-12-01

    Three experiments test whether the threat of appearing racist leads White participants to perform worse on the race Implicit Association Test (IAT) and whether self-affirmation can protect from this threat. Experiments 1 and 2 suggest that White participants show a stereotype threat effect when completing the race IAT, leading to stronger pro-White scores when the test is believed to be diagnostic of racism. This effect increases for domain-identified (highly motivated to control prejudice) participants (Experiment 2). In Experiment 3, self-affirmation inoculates participants against stereotype threat while taking the race IAT. These findings have methodological implications for use of the race IAT and theoretical implications concerning the malleability of automatic prejudice and the potential interpersonal effects of the fear of appearing racist. PMID:15536243

  5. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    Science.gov (United States)

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message. PMID:24393019

  6. Controllability modulates the neural response to predictable but not unpredictable threat in humans.

    Science.gov (United States)

    Wood, Kimberly H; Wheelock, Muriah D; Shumen, Joshua R; Bowen, Kenton H; Ver Hoef, Lawrence W; Knight, David C

    2015-10-01

    Stress resilience is mediated, in part, by our ability to predict and control threats within our environment. Therefore, determining the neural mechanisms that regulate the emotional response to predictable and controllable threats may provide important new insight into the processes that mediate resilience to emotional dysfunction and guide the future development of interventions for anxiety disorders. To better understand the effect of predictability and controllability on threat-related brain activity in humans, two groups of healthy volunteers participated in a yoked Pavlovian fear conditioning study during functional magnetic resonance imaging (fMRI). Threat predictability was manipulated by presenting an aversive unconditioned stimulus (UCS) that was either preceded by a conditioned stimulus (i.e., predictable) or by presenting the UCS alone (i.e., unpredictable). Similar to animal model research that has employed yoked fear conditioning procedures, one group (controllable condition; CC), but not the other group (uncontrollable condition; UC) was able to terminate the UCS. The fMRI signal response within the dorsolateral prefrontal cortex (PFC), dorsomedial PFC, ventromedial PFC, and posterior cingulate was diminished during predictable compared to unpredictable threat (i.e., UCS). In addition, threat-related activity within the ventromedial PFC and bilateral hippocampus was diminished only to threats that were both predictable and controllable. These findings provide insight into how threat predictability and controllability affects the activity of brain regions (i.e., ventromedial PFC and hippocampus) involved in emotion regulation, and may have important implications for better understanding neural processes that mediate emotional resilience to stress. PMID:26149610

  7. Modifying Threat-Related Interpretive Bias in Adolescents

    Science.gov (United States)

    Salemink, Elske; Wiers, Reinout W.

    2011-01-01

    Socially anxious feelings sharply increase during adolescence and such feelings have been associated with interpretive biases. Studies in adults have shown that interpretive biases can be modified using Cognitive Bias Modification procedures (CBM-I) and subsequent effects on anxiety have been observed. The current study was designed to examine…

  8. Receiver Operating Characteristic Analysis for Detecting Explosives-related Threats

    Energy Technology Data Exchange (ETDEWEB)

    Oxley, Mark E; Venzin, Alexander M

    2012-11-14

    The Department of Homeland Security (DHS) and the Transportation Security Administration (TSA) are interested in developing a standardized testing procedure for determining the performance of candidate detection systems. This document outlines a potential method for judging detection system performance as well as determining if combining the information from a legacy system with a new system can signicantly improve performance. In this document, performance corresponds to the Neyman-Pearson criterion applied to the Receiver Operating Characteristic (ROC) curves of the detection systems in question. A simulation was developed to investigate how the amount of data provided by the vendor in the form of the ROC curve eects the performance of the combined detection system. Furthermore, the simulation also takes into account the potential eects of correlation and how this information can also impact the performance of the combined system.

  9. The Relationships Between Internal and External Threats and Right-Wing Attitudes: A Three-Wave Longitudinal Study.

    Science.gov (United States)

    Onraet, Emma; Dhont, Kristof; Van Hiel, Alain

    2014-02-25

    The interplay between threat and right-wing attitudes has received much research attention, but its longitudinal relationship has hardly been investigated. In this study, we investigated the longitudinal relationships between internal and external threats and right-wing attitudes using a cross-lagged design at three different time points in a large nationally representative sample (N = 800). We found evidence for bidirectional relationships. Higher levels of external threat were related to higher levels of Right-Wing Authoritarianism (RWA) and to both the egalitarianism and dominance dimensions of Social Dominance Orientation at a later point in time. Conversely, higher levels of RWA were also related to increased perception of external threat later in time. Internal threat did not yield significant direct or indirect longitudinal relationships with right-wing attitudes. Theoretical and practical implications of these longitudinal effects are discussed. PMID:24570118

  10. Riverine threat indices to assess watershed condition and identify primary management capacity of agriculture natural resource management agencies.

    Science.gov (United States)

    Fore, Jeffrey D; Sowa, Scott P; Galat, David L; Annis, Gust M; Diamond, David D; Rewa, Charles

    2014-03-01

    Managers can improve conservation of lotic systems over large geographies if they have tools to assess total watershed conditions for individual stream segments and can identify segments where conservation practices are most likely to be successful (i.e., primary management capacity). The goal of this research was to develop a suite of threat indices to help agriculture resource management agencies select and prioritize watersheds across Missouri River basin in which to implement agriculture conservation practices. We quantified watershed percentages or densities of 17 threat metrics that represent major sources of ecological stress to stream communities into five threat indices: agriculture, urban, point-source pollution, infrastructure, and all non-agriculture threats. We identified stream segments where agriculture management agencies had primary management capacity. Agriculture watershed condition differed by ecoregion and considerable local variation was observed among stream segments in ecoregions of high agriculture threats. Stream segments with high non-agriculture threats were most concentrated near urban areas, but showed high local variability. 60 % of stream segments in the basin were classified as under U.S. Department of Agriculture's Natural Resources Conservation Service (NRCS) primary management capacity and most segments were in regions of high agricultural threats. NRCS primary management capacity was locally variable which highlights the importance of assessing total watershed condition for multiple threats. Our threat indices can be used by agriculture resource management agencies to prioritize conservation actions and investments based on: (a) relative severity of all threats, (b) relative severity of agricultural threats, and (c) and degree of primary management capacity. PMID:24390081

  11. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

    Directory of Open Access Journals (Sweden)

    Mardiana Mohamad Noor

    2013-01-01

    Full Text Available This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM, Rogue Access Points (RAP, Denial Of Services (DoS and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD, devices tethering and convergences of WiFi and cellular network technology are also presented. Some practical suggestion and advanced countermeasures are also reviewed in this paper. The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.

  12. Securing Infrastructure from High Explosive Threats

    Energy Technology Data Exchange (ETDEWEB)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  13. The nuclear threat. 2. enl. ed.

    International Nuclear Information System (INIS)

    The volume contains a collection of essays published already in 1972 under the title 'The last days and end of time'. Inspite of the articles having been written between 1958 and 1967, the author feels that they are not void of present-day interest because the threat of a global cataclysm has uninterruptedly continued to exist. What he fights is not this or that enemy who might be attacked or suppressed by nuclear means but the nuclear situation as such. As he makes clear, he is not unaware of the annihilation potential working in nuclear reactors but, he feels, the threat of nuclear war has almost creased to be noticed. So then, in his opinion, the anti-nuclear-power movement is something of an obstacle to the movement against nuclear war. (HSCH)

  14. Indian estuaries: Dynamics, ecosystems, and threats

    Digital Repository Service at National Institute of Oceanography (India)

    Shetye, S.R.

    ARTICLE Indian estuaries: Dynamics, ecosystems, and threats Satish R. Shetye National Institute of Oceanography Dona Paula, Goa - 403 004. e-mail: shetye@nio.org Received May 11, 2011 Abstract Indian estuaries have special features that are derived from... the tide pulls the mixed water out of the estuary through its mouth. Different processes within an estuary contribute to mixing of the two waters, the important among these in the Mandovi estuary are: influence of the tide on the advective field within...

  15. Stereotype Threat Reinterpreted as a Regulatory Mismatch

    OpenAIRE

    Grimm, Lisa R.; Markman, Arthur B.; Maddox, W. Todd; Baldwin, Grant C.

    2009-01-01

    Research documents performance decrements resulting from the activation of a negative task-relevant stereotype. We combine a number of strands of work to identify causes of stereotype threat in a way that allows us to reverse the effects and improve the performance of individuals with negative task-relevant stereotypes. We draw on prior work suggesting that negative stereotypes induce a prevention focus, and other research suggesting that people exhibit greater flexibility when their regulato...

  16. Nonproliferation, Nuclear Security, and the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  17. Matrix Characterization in Threat Material Detection Processes

    Science.gov (United States)

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-01

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, …) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1—contraband material in the sea containers, case 2—-explosives in soil (landmines), case 3—explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  18. Avian influenza: an emerging pandemic threat.

    Science.gov (United States)

    Jin, Xian Wen; Mossad, Sherif B

    2005-12-01

    While we are facing the threat of an emerging pandemic from the current avian flu outbreak in Asia, we have learned important traits of the virus responsible for the 1918 Spanish influenza pandemic that made it so deadly. By using stockpiled antiviral drugs effectively and developing an effective vaccine, we can be in a better position than ever to mitigate the global impact of an avian influenza pandemic. PMID:16392727

  19. Handsets Malware Threats and Facing Techniques

    CERN Document Server

    Elfattah, Marwa M A; Sarhan, Ebada

    2012-01-01

    Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

  20. Matrix Characterization in Threat Material Detection Processes

    International Nuclear Information System (INIS)

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  1. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    2013-09-30

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke.  Created: 9/30/2013 by Division of Community Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 9/30/2013.

  2. When sexual threat cues shape attitudes toward immigrants: The role of insecurity and benevolent sexism

    Directory of Open Access Journals (Sweden)

    Oriane eSarrasin

    2015-07-01

    Full Text Available Drawing on psychological and political science research on individuals’ sensitivity to threat cues, the present study examines reactions to political posters that depict male immigrants as a sexual danger. We expect anti-immigrant attitudes to be more strongly predicted by feelings of insecurity or representations of men and women as strong and fragile, when individuals are exposed to sexual threat cues than when they are not. Results from two online experiments conducted in Switzerland and Germany largely confirmed these assumptions. Comparing two anti-immigrant posters (general and non-sexual threat vs. sexual threat, Experiment 1 (n = 142 showed that feelings of insecurity were related to an increased support for expelling immigrants from the host country in both cases. However, only in the sexual threat cues condition and among female participants, were perceptions of women as fragile—as measured with benevolent sexism items—related to support for expelling immigrants. Further distinguishing between different forms of violence threat cues, Experiment 2 (n = 181 showed that collective feelings of insecurity were most strongly related to support for expelling immigrants when a male immigrant was presented as a violent criminal. In contrast, benevolent sexist beliefs were related to anti-immigrant stances only when participants were exposed to a depiction of a male immigrant as a rapist. In both cases attitudes were polarized: On the one hand, representations of immigrants as criminals provoked reactance reactions—that is, more positive attitudes—among participants scoring low in insecurity feelings or benevolent sexism. On the other hand, those scoring high in these dimensions expressed slightly more negative attitudes. Overall, by applying social psychological concepts to the study of anti-immigrant political campaigning, the present study demonstrated that individuals are sensitive to specific threat cues in posters.

  3. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  4. High-angular Resolution Laser Threat Warner

    Directory of Open Access Journals (Sweden)

    Sushil Kumar

    2007-07-01

    Full Text Available In this paper, the design and development aspects of a high-angular resolution laser-threat Warner developed at the Laser Science & Technology Centre (LASTEC, Delhi are presented. It describes a high-angular resolution laser-threat warner capable of giving warning with a resolution of i 3" when it is exposed to laser radiation from visible and near-IR pulsed solid-state laser source. It has a field of view of 90' in the azimuth direction, whereas the elevation coverage is between -5" and + 25". It is capable of handling multiple types of laser threats covering wavelength from 400 nm to 1100 nm and has an operational range of 4 km for a Q-switched laser source energy (10 ns of 10 mJ/pulse and output beam divergence of 1 mrad. The paper also describes its simulated evaluation process and field-testing which it has undergone. The result of field-testing confirms that it meets all its performance specifications mentioned above.

  5. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  6. Evaluation of Potential Biological Threats in Ukraine

    International Nuclear Information System (INIS)

    Dilating of biological threats spectrum, EDI diffusion opportunities and routes, unpredictability of outbreaks connected with connatural, technogenic, terrorist factors determines constant monitoring and readiness for operative BPA indication and identification. Scientific analytical approach of existing and probable regional bio-threats evaluation is necessary for adequate readiness system creation and maintenance of medical counteraction tactics to probable biological threats. Basing on the international experience, we carry out analysis of a situation present in Ukraine and routes for the decisions. The basic directions are: - Evaluation of a reality for EDI penetration from abroad and presence of conditions for their further diffusion inside the country. - Revealing of presence and definition of connatural EDI foci biocenoses features and BPAs. - Appropriate level of biological safety and physical protection of bio-laboratories and pathogens collections maintenance. - Gene/molecular and phenotypical definition of EDI circulating strains. - Creation of the circulating EDI gene/ phenotypic characteristics regional data bank. - Ranging of EDI actual for area. - Introduction of GPT, mathematical modeling and forecasting for tactics development in case of technogenic accidents and connatural outbreaks. - Methodical basis and equipment improvement for BPA system indication for well-timed identification of natural, or modified agent. - Education and training The international cooperation in maintenance of biosafety and bioprotection within the framework of scientific programs, grants, exchange of experience, introduction of international standards and rules are among basic factors in the decision for creating system national biosafety for countries not included in EU and the NATO. (author)

  7. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  8. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.)...

  9. Zika Threat Calls for Extra Mosquito Protection This Summer

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159168.html Zika Threat Calls for Extra Mosquito Protection This Summer ... THURSDAY, June 2, 2016 (HealthDay News) -- With the Zika threat growing in the United States, people need ...

  10. Zika Threat Calls for Extra Mosquito Protection This Summer

    Science.gov (United States)

    ... nlm.nih.gov/medlineplus/news/fullstory_159168.html Zika Threat Calls for Extra Mosquito Protection This Summer ... THURSDAY, June 2, 2016 (HealthDay News) -- With the Zika threat growing in the United States, people need ...

  11. Simultaneous Detection of CDC Category "A" DNA and RNA Bioterrorism Agents by Use of Multiplex PCR & RT-PCR Enzyme Hybridization Assays

    Directory of Open Access Journals (Sweden)

    Kelly J. Henrickson

    2009-10-01

    Full Text Available Assays to simultaneously detect multiple potential agents of bioterrorism are limited. Two multiplex PCR and RT-PCR enzyme hybridization assays (mPCR-EHA, mRT-PCR-EHA were developed to simultaneously detect many of the CDC category “A” bioterrorism agents. The “Bio T” DNA assay was developed to detect: Variola major (VM, Bacillus anthracis (BA, Yersinia pestis (YP, Francisella tularensis (FT and Varicella zoster virus (VZV. The “Bio T” RNA assay (mRT-PCR-EHA was developed to detect: Ebola virus (Ebola, Lassa fever virus (Lassa, Rift Valley fever (RVF, Hantavirus Sin Nombre species (HSN and dengue virus (serotypes 1-4. Sensitivity and specificity of the 2 assays were tested by using genomic DNA, recombinant plasmid positive controls, RNA transcripts controls, surrogate (spiked clinical samples and common respiratory pathogens. The analytical sensitivity (limit of detection (LOD of the DNA asssay for genomic DNA was 1×100~1×102 copies/mL for BA, FT and YP. The LOD for VZV whole organism was 1×10-2 TCID50/mL. The LOD for recombinant controls ranged from 1×102~1×103copies/mL for BA, FT, YP and VM. The RNA assay demonstrated LOD for RNA transcript controls of 1×104~1×106 copies/mL without extraction and 1×105~1×106 copies/mL with extraction for Ebola, RVF, Lassa and HSN. The LOD for dengue whole organisms was ~1×10-4 dilution for dengue 1 and 2, 1×104 LD50/mL and 1×102 LD50/mL for dengue 3 and 4. The LOD without extraction for recombinant plasmid DNA controls was ~1×103 copies/mL (1.5 input copies/reaction for Ebola, RVF, Lassa and HSN. No cross-reactivity of primers and probes used in both assays was detected with common respiratory pathogens or between targeted analytes. Clinical sensitivity was estimated using 264 surrogate clinical samples tested with the BioT DNA assay and 549 samples tested with the BioT RNA assay. The clinical specificity is 99.6% and 99.8% for BioT DNA assay and BioT RNA assay, respectively. The

  12. Persistent and novel threats to the biodiversity of Kazakhstan’s steppes and semi-deserts

    Science.gov (United States)

    Kamp, Johannes; Koshkin, Maxim A; Bragina, Tatyana M; Katzner, Todd Eli; Milner-Gulland, E J; Schreiber, Dagmar; Sheldon, Robert; Shmalenko, Alyona; Smelansky, Ilya; Terraube, Julien; Urazaliev, Ruslan

    2016-01-01

    Temperate grasslands have suffered disproportionally from conversion to cropland, degradation and fragmentation. A large proportion of the world’s remaining near-natural grassland is situated in Kazakhstan. We aimed to assess current and emerging threats to steppe and semi-desert biodiversity in Kazakhstan and evaluate conservation research priorities. We conducted a horizon-scanning exercise among conservationists from academia and practice. We first compiled a list of 45 potential threats. These were then ranked by the survey participants according to their perceived severity, the need for research on them, and their novelty. The highest-ranked threats were related to changes in land use (leading to habitat loss and deterioration), direct persecution of wildlife, and rapid infrastructure development due to economic and population growth. Research needs were identified largely in the same areas, and the mean scores of threat severity and research need were highly correlated. Novel threats comprised habitat loss by photovoltaic and wind power stations, climate change and changes in agriculture such as the introduction of biofuels. However, novelty was not correlated with threat severity or research priority, suggesting that the most severe threats are the established ones. Important goals towards more effective steppe and semi-desert conservation in Kazakhstan include more cross-sector collaboration (e.g. by involving stakeholders in conservation and agriculture), greater allocation of funds to under-staffed areas (e.g. protected area management), better representativeness and complementarity in the protected area system and enhanced data collection for wildlife monitoring and threat assessments (including the use of citizen-science databases).

  13. Stereotype threat can reduce older adults' memory errors

    OpenAIRE

    Barber, Sarah J.; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment (Seibt & Förster, 2004). Because of this, we predic...

  14. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  15. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems. PMID:18254857

  16. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    Science.gov (United States)

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  17. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  18. CBRN Threats and the Economic Analysis of Terrorism

    OpenAIRE

    Ramseger, Alexander; Kalinowski, Martin B.; Weiß, Lucia

    2009-01-01

    The aim of this paper is to investigate the economic aspects of CBRN threats. For this purpose, the extent to which this topic is reflected in freely-accessible academic literature and the costs associated with such threats will be assessed. Furthermore, it is to be determined which industries have a particular interest in security against such CBRN threats.

  19. Attention Training and the Threat Bias: An ERP Study

    Science.gov (United States)

    O'Toole, Laura; Dennis, Tracy A.

    2012-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these…

  20. 41 CFR 60-250.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as a... position held or desired without posing a direct threat to the health or safety of the individual or...

  1. 77 FR 73516 - Federal Acquisition Regulation; Iran Threat Reduction

    Science.gov (United States)

    2012-12-10

    ... RIN 9000-AM44 Federal Acquisition Regulation; Iran Threat Reduction AGENCY: Department of Defense (DoD... and III of the Iran Threat Reduction and Syria Human Rights Act of 2012. DATES: Effective Date...), to implement sections of Titles II and III of the Iran Threat Reduction and Syria Human Rights Act...

  2. 49 CFR 1540.205 - Procedures for security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  3. 77 FR 1672 - Threat Reduction Advisory Committee; Notice of Meeting

    Science.gov (United States)

    2012-01-11

    ... of the Secretary Threat Reduction Advisory Committee; Notice of Meeting AGENCY: Department of Defense... Department of Defense announces the following Federal advisory committee meeting of the Threat Reduction.... William Hostyn, GS-15, DoD, Defense Threat Reduction Agency/SP-ACP, 8725 John J. Kingman Road, MS...

  4. 41 CFR 60-300.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as a... position held or desired without posing a direct threat to the health or safety of the individual or...

  5. 77 FR 27208 - Renewal of Threat Reduction Advisory Committee

    Science.gov (United States)

    2012-05-09

    ... of the Secretary Renewal of Threat Reduction Advisory Committee AGENCY: DoD. ACTION: Renewal of...), the Department of Defense gives notice that it is renewing the charter for the Threat Reduction... Biological Defense Programs), independent advice and recommendations on: a. Reducing the threat to the...

  6. 75 FR 30002 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Science.gov (United States)

    2010-05-28

    ... Office of the Secretary Federal Advisory Committee; Threat Reduction Advisory Committee AGENCY... the charter for the Threat Reduction Advisory Committee (hereafter referred to as the Committee). FOR... Acquisition, Technology and Logistics and the Director of the Defense Threat Reduction Agency on the...

  7. Legality of the threat or use of nuclear weapons

    International Nuclear Information System (INIS)

    This paper examines international treaties in relation to the threat or use of nuclear weapons including the 1968 Nuclear Non-Proliferation Treaty and the 1996 Comprehensive Test Ban Treaty. It can be concluded that the effect of the aforesaid international treaties is still in doubt without explicit enforcement mechanisms and penalty for non-compliance. This paper also reviews the International Court of Justice's advisory opinion on the legality of the threat or use of nuclear weapons and comments that a clear explanation on the legality of use of nuclear weapons in 'extreme circumstances of self-defence' is required. Examples from current state practice in relation to nuclear non-proliferation efforts are also provided, with special attention to China, North Korea and Iran. This paper suggests that China as a leader of developing countries should extend its efforts on nuclear non-proliferation and conduct communication between North Korea and Iran and other nuclear weapons states to reduce or prohibit nuclear weapons.

  8. Cyber Terrorism demands a Global Risks and Threats Strategic Management

    International Nuclear Information System (INIS)

    The world is in the third wave of development, which is digital managed and networked. Information, which creates the knowledge is transferring thorough the Internet by exponential function. The rapid advancement of the computer technology has a great influence over the development of the critical information infrastructure, thus changing the safety environment and the national values and interests. This advancement produces threats and risks from computer perspective which are sublimated in different forms of international terrorism and particularly in cyber terrorism. The main aim of this paper is based on a thorough analysis of what is scientifically known and practiced when nowadays critical information infrastructure is in the focus of the cyber terrorism. The rapid IT development demands changes in the strategic management focus. As a result of a time-consuming theoretical and empirical research this paper suggests a methodology for strategic managing of: threats, risks and vulnerabilities. The proposed methodology is seen as a mean to increase the human security conscious in every sense of the word, and to promote the need for rules, procedures and standards establishment from the aspect of the strategic management in the new information epoch concerning. In addition, through a scientific discourse, a short attempt is made to relate Macedonian reality with the phenomenon mentioned above. The most fundamental set phrase is that the efficiency and promptly made decisions during strategic planning are a projection of the systematic organization of functions and models for managing the risks and threats of the critical information infrastructure. Hence, this paper could be seen as a perspective when taking in consideration the regional strategic management, and the cyber space vital functioning. (author)

  9. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the...

  10. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    Science.gov (United States)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  11. Identification of threats using linguistics-based knowledge extraction.

    Energy Technology Data Exchange (ETDEWEB)

    Chew, Peter A.

    2008-09-01

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe

  12. Nuclear waste dump no threat, says NAS

    International Nuclear Information System (INIS)

    This article is a review of the National Academy of Sciences report on the efforts to site a low-level waste repository in the Mohave Desert. This report states that there would be little threat to ground water or the Colorado River, but critics charge that the advisory group, with close ties to the nuclear industry, set forth some findings that support arguments against the project. Leakage pathways from the containers to the Colorado River are reviewed, and it is concluded that even if all the leakage of plutonium reached the river, the impact would be minimal

  13. Asteroids: Their composition and impact threat

    OpenAIRE

    Burbine T H

    2002-01-01

    Impacts by near-Earth asteroids are serious threats to life as we know it. The energy of the impact will be a function of the mass of the asteroid and its impact velocity. The mass of an asteroid is very difficult to determine from Earth. One way to derive a near-Earth object's mass is by estimating the object's density from its surface composition. Reflectance spectra are the best way to determine an object's composition since many minerals (e.g. olivine, pyroxene, hydrated silicates) have c...

  14. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  15. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  16. Assessing the global threat from Zika virus.

    Science.gov (United States)

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled. PMID:27417495

  17. Threat Model Design for new GNSS signals

    OpenAIRE

    Pagot, Jean-Baptiste; Thevenon, Paul; Julien, Olivier; Amarillo-Fernández, Francisco; Maillard, Denis

    2016-01-01

    This paper proposes threat models (TM) for Galileo E1C, the pilot component of the E1 Open Service signal, (CBOC(6,1,111⁄) modulation) and Galileo E5a (BPSK(10) modulation) signals, as they are the Galileo signals that will be used by civil aviation airborne receivers for pseudorange computation. The advent of new GNSS signals requests new definitions for prospective signal distortions. Indeed, new signals and/or new tracking methods change the conception of hazardous signal distortion. The p...

  18. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    Directory of Open Access Journals (Sweden)

    Ashley C. Banyard

    2014-08-01

    Full Text Available The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations.

  19. Tackling the Threats of Internet Worms

    OpenAIRE

    Al-Sakib Khan Pathan

    2012-01-01

    Computer Worm is a kind of malicious program that self-replicates automatically within a computer network. Again, Internet is defined as a network of networks. This is the reason why computer worms do not reside only within one computer or a single network but rather get spread all over the Internet whenever it is possible during computer-to-computer communications. The reality of today’s Internet is that the worms pose a major threat to the Internet infrastructure security. This is also unde...

  20. Threat model framework and methodology for personal networks (PNs)

    DEFF Research Database (Denmark)

    Prasad, Neeli R.

    2007-01-01

    To be able to build a secure network, it is essential to model the threats to the network. A methodology for building a threat model has been proposed in the paper. Several existing threat models and methodologies will be compared to the proposed methodology. The aim of the proposed methodology i...... have been used. Also risk assessment methods will be discussed. Threat profiles and vulnerability profiles have been presented.......To be able to build a secure network, it is essential to model the threats to the network. A methodology for building a threat model has been proposed in the paper. Several existing threat models and methodologies will be compared to the proposed methodology. The aim of the proposed methodology is...

  1. Sensitivity towards fear of electric shock in passive threat situations.

    Directory of Open Access Journals (Sweden)

    Patrick Ring

    Full Text Available Human judgment and decision-making (JDM requires an assessment of different choice options. While traditional theories of choice argue that cognitive processes are the main driver to reach a decision, growing evidence highlights the importance of emotion in decision-making. Following these findings, it appears relevant to understand how individuals asses the attractiveness or riskiness of a situation in terms of emotional processes. The following study aims at a better understanding of the psychophysiological mechanisms underlying threat sensitivity by measuring skin conductance responses (SCRs in passive threat situations. While previous studies demonstrate the role of magnitude on emotional body reactions preceding an outcome, this study focuses on probability. In order to analyze emotional body reactions preceding negative events with varying probability of occurrence, we have our participants play a two-stage card game. The first stage of the card game reveals the probability of receiving an unpleasant electric shock. The second stage applies the electric shock with the previously announced probability. For the analysis, we focus on the time interval between the first and second stage. We observe a linear relation between SCRs in anticipation of receiving an electric shock and shock probability. This finding indicates that SCRs are able to code the likelihood of negative events. We outline how this coding function of SCRs during the anticipation of negative events might add to an understanding of human JDM.

  2. Facing freeze: social threat induces bodily freeze in humans.

    Science.gov (United States)

    Roelofs, Karin; Hagenaars, Muriel A; Stins, John

    2010-11-01

    Freezing is a common defensive response in animals threatened by predators. It is characterized by reduced body motion and decreased heart rate (bradycardia). However, despite the relevance of animal defense models in human stress research, studies have not shown whether social threat cues elicit similar freeze-like responses in humans. We investigated body sway and heart rate in 50 female participants while they were standing on a stabilometric force platform and viewing cues that were socially threatening, socially neutral, and socially affiliative (angry, neutral, and happy faces, respectively). Posturographic analyses showed that angry faces (compared with neutral faces and happy faces) induced significant reductions in body sway. In addition, the reduced body sway for angry faces was accompanied by bradycardia and correlated significantly with subjective anxiety. Together, these findings indicate that spontaneous body responses to social threat cues involve freeze-like behavior in humans that mimics animal freeze responses. These findings open avenues for studying human freeze responses in relation to various sociobiological markers and social-affective disorders. PMID:20876881

  3. Polar marine ecosystems: major threats and future change

    Energy Technology Data Exchange (ETDEWEB)

    Clarke, A. [British Antarctic Survey, Cambridge (United Kingdom); Harris, C.M. [Environmental Research and Assessment, Grantchester (United Kingdom)

    2003-07-01

    This review of polar marine ecosystems covers both the Arctic and Antarctic, identifying the major threats and, where possible, predicting their possible state(s) in 2025. Although the two polar regions are similar in their extreme photoperiod, low temperatures, and in being heavily influenced by snow and ice, in almost all other respects they are very different. The Arctic Ocean is a basin surrounded by continental landmasses close to, and influenced by, large populations and industrial activities. In contrast, the Southern Ocean is contiguous with all the other great oceans and surrounds a single land mass; Antarctica is remote from major centres of population and sources of pollution. Marine environments in both Polar Regions have been highly disturbed by fishing activity, but, in terms of pollution, some areas remain among the most pristine in the world. There are, however, both local and global pressures. Over the 2025 time horizon, the greatest concern for the Arctic is probably the ecological implications of climate change, particularly insofar as sea ice extent and duration are likely to be affected. Such changes are not expected to be as pronounced in the Southern Ocean over this time period, and concerns are related more to direct threats from harvesting of marine living resources, and the ability to manage these fisheries sustainably. In both Polar Regions, the capacity of marine ecosystems to withstand the cumulative impact of a number of pressures, including climate change, pollution and overexploitation, acting synergistically is of greatest concern. (author)

  4. Stereotype threat among older employees: relationship with job attitudes and turnover intentions.

    Science.gov (United States)

    von Hippel, Courtney; Kalokerinos, Elise K; Henry, Julie D

    2013-03-01

    Stereotype threat, or the belief that one may be the target of demeaning stereotypes, leads to acute performance decrements and reduced psychological well-being. The current research examined stereotype threat among older employees, a group that is the target of many negative stereotypes. Study 1 surveyed older workers in two different organizations regarding their experiences of stereotype threat, their job attitudes and work mental health, and their intentions to resign or retire. Across both samples, feelings of stereotype threat were related to more negative job attitudes and poorer work mental health. In turn, these negative job attitudes were associated with intentions to resign and (possibly) retire. In Study 2, younger and older employees were surveyed. The results indicated that only for older employees were feelings of stereotype threat negatively related to job attitudes, work mental health, and intentions to resign. The implications of these findings for understanding job attitudes and intentions among older workers are discussed. (PsycINFO Database Record (c) 2013 APA, all rights reserved). PMID:22924658

  5. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  6. Ongoing Threats to Emerging Financial Entities

    Directory of Open Access Journals (Sweden)

    Bryce Alexander LYNCH

    2016-06-01

    Full Text Available In the twenty-first century the pace of technological advancement shows no signs of stopping. Old technologies are being discarded as obsolete or are transformed in ways that nobody could have foreseen even a half-decade ago. Along with these radical changes come vulnerabilities and threats to infrastructure, including informational and financial which must be considered and protected. This is not to say that basic security measures must continue to be neglected in favor of rapid development and deployment to provide a Minimum Viable Product to customers; basic security protocols become all the more important under these circumstances. Improving faster are attacks against the new infrastructure; technique and technology tend to change along generally accepted sets of rules while attackers follow no rules or guidelines. This fundamental asymmetry leaves defenders at a distinct advantage in several ways, including ethical concerns (“There are some lines we will not cross” versus “By any means necessary”, monetary considerations (“Return on investment” versus “The resources aren’t ours to begin with, so who cares” and pragmatism (“We exist to make money to improve shareholder value” versus “Because it’s there”. That said, measurable, repeatable, and effective countermeasures exist which can be deployed on an enterprise-wide basis to help level the playing field by deterring attackers. This paper will discuss these threats along with active and passive countermeasures for same.

  7. Nuclear threats and emergency preparedness in Finland

    International Nuclear Information System (INIS)

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.)

  8. Religion, group threat and sacred values

    Directory of Open Access Journals (Sweden)

    Hammad Sheikh

    2012-03-01

    Full Text Available Sacred or protected values have important influences on decision making, particularly in the context of intergroup disputes. Thus far, we know little about the process of a value becoming sacred or why one person may be more likely than another to hold a sacred value. We present evidence that participation in religious ritual and perceived threat to the group lead people to be more likely to consider preferences as protected or sacred values. Specifically, three studies carried out with Americans and Palestinians show: (a that the more people participate in religious ritual the more likely they are to report a preference to be a sacred value (Studies 1--3; (b that people claim more sacred values when they are reminded of religious ritual (Study 2; and (c that the effect of religious ritual on the likelihood of holding a sacred value is amplified by the perception of high threat to the in-group (Study 3. We discuss implications of these findings for understanding intergroup conflicts, and suggest avenues for future research into the emergence and spread of sacred values.

  9. Insider threat vulnerability analysis - MAIT update

    International Nuclear Information System (INIS)

    A computer-based method for security system evaluation and improvement called Matrix Analysis for the Insider Threat (MAIT) was developed and reported on previously by Science Applications International Corporation (SAIC). MAIT is a sophisticated method for the analysis of safeguards or security systems that determines if single or multiple insiders can covertly sabotage a facility or system or can covertly divert a resource that is present in the facility or system. The MAIT code was initially developed for application to theft from fuel cycle facilities. The MAIT method provides a detailed, organized way to exhaustively examine the safeguards or security system against these covert threats. An evaluation of this broad scope is beyond the reasonable capability of an analyst working without computer assistance. The MAIT analysis is conducted by first manually collecting detailed facility design data and access and control information for each individual safeguard measure. With this information, the MAIT computer code synthesizes every possible situation and returns data to the analyst concerning those particular events that are not adequately projected

  10. Unattended sensors for nuclear threat detection

    International Nuclear Information System (INIS)

    This paper discusses the ongoing development of a compact, unattended, and low-power radiation detection system designed for deployment to the front lines of nuclear proliferation. Current countermeasure deployments aim to detect nuclear threats by screening cargo containers abroad or at ports of entry, but the defensive nature of these systems means that they face the immense challenge of detecting intentionally-concealed materials. A complementary strategy places countermeasures closer to the source of nuclear proliferation, but deployments to these regions often must operate autonomously and in the absence of infrastructure. This application motivates our development of a low-power system capable of detecting gamma-ray and neutron emissions while operating autonomously for extended periods of time. Many challenges are present when developing radiation-detection systems for this application, and this paper describes work focused on two of them: the development of compact, low-power electronics for gamma-ray-spectrometer and 3He- tube signal processing, and analysis algorithms capable of distinguishing threats from benign sources in mid-resolution gamma-ray spectrometers. We discuss our development efforts on these fronts and present results based on implementation in a proof-of-principle system comprised of two 5 cm x 10 cm x 41 cm NaI(Tl) crystals and eight 40-cm 3He tubes

  11. Unattended sensors for nuclear threat detection

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C.; Myjak, Mitchell J.; Batdorf, Michael T.; Bowler, Ryan S.; Kiff, Scott D.; Morris, Scott J.; Mullen, Crystal A.; Rohrer, John S.; Todd, Lindsay C.

    2008-06-30

    This paper discusses the ongoing development of a compact, unattended, and low-power radiation detection system designed for deployment to the front lines of nuclear proliferation. Current countermeasure deployments aim to detect nuclear threats by screening cargo containers abroad or at ports of entry, but the defensive nature of these systems means that they face the immense challenge of detecting intentionally-concealed materials. A complementary strategy places countermeasures closer to the source of nuclear proliferation, but deployments to these regions often must operate autonomously and in the absence of infrastructure. This application motivates our development of a low-power system capable of detecting gamma-ray and neutron emissions while operating autonomously for extended periods of time. Many challenges are present when developing radiation-detection systems for this application, and this paper describes work focused on two of them: the development of compact, low-power electronics for gamma-ray-spectrometer and 3He- tube signal processing, and analysis algorithms capable of distinguishing threats from benign sources in mid-resolution gamma-ray spectrometers. We discuss our development efforts on these fronts and present results based on implementation in a proof-of-principle system comprised of two 5 cm x 10 cm x 41 cm NaI(Tl) crystals and eight 40-cm 3He tubes.

  12. Threats to the consumer market of region

    Directory of Open Access Journals (Sweden)

    Gavriil Aleksandrovich Agarkov

    2012-09-01

    Full Text Available This papers reviews the main threats to the today's consumer market and offers a historic tour of their existence. The results of a comprehensive diagnostics technique of economic safety of the consumer market in the region taking into account the impact of threats are presented. In the basis of the procedure is an indicative method of analysis, in which diagnosis is carried out on a set of criterial parameters. Along with a comprehensive assessment, the paper offers a detailed analysis of one of the method's modules - evaluation of consumer protection as the most vulnerable category of participants in the consumer market. A classification of prejudice of consumers in accordance with international studies is considered. The conducted study showed that, in general, there is a positive trend of economic safety of the consumer market in the region for the period from 2003 to 2010, but, according to some modules (evaluation of consumer protection, the situation has worsened for the majority of the subjects discussed during the reviewed period. The results of economic safety diagnostics of the consumer market actors can be used in the formation of program-target events to neutralize the negative trends in the consumer market

  13. Biophysics and Structure to Counter Threats and Challenges

    CERN Document Server

    Margaris, Manolia

    2013-01-01

    This ASI brought together a diverse group of experts who span virology, biology, biophysics, chemistry, physics and engineering.  Prominent lecturers representing world renowned scientists from nine (9) different countries, and students from around the world representing eighteen (18) countries, participated in the ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU).   The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting chemical and bioterrorism agents, lead to cleaner environments and improved energy sources, and help propel development in NATO partner countries.  At the end of the ASI students had an appreciation of how to apply each technique to their own particular research problem and to demonstrate that multifaceted approaches and new technologies are needed to solve the biological challenges of our time.  The course...

  14. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Science.gov (United States)

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  15. Threat Interference Biases Predict Socially Anxious Behavior: The Role of Inhibitory Control and Minute of Stressor.

    Science.gov (United States)

    Gorlin, Eugenia I; Teachman, Bethany A

    2015-07-01

    The current study brings together two typically distinct lines of research. First, social anxiety is inconsistently associated with behavioral deficits in social performance, and the factors accounting for these deficits remain poorly understood. Second, research on selective processing of threat cues, termed cognitive biases, suggests these biases typically predict negative outcomes, but may sometimes be adaptive, depending on the context. Integrating these research areas, the current study examined whether conscious and/or unconscious threat interference biases (indexed by the unmasked and masked emotional Stroop) can explain unique variance, beyond self-reported anxiety measures, in behavioral avoidance and observer-rated anxious behavior during a public speaking task. Minute of speech and general inhibitory control (indexed by the color-word Stroop) were examined as within-subject and between-subject moderators, respectively. Highly socially anxious participants (N=135) completed the emotional and color-word Stroop blocks prior to completing a 4-minute videotaped speech task, which was later coded for anxious behaviors (e.g., speech dysfluency). Mixed-effects regression analyses revealed that general inhibitory control moderated the relationship between both conscious and unconscious threat interference bias and anxious behavior (though not avoidance), such that lower threat interference predicted higher levels of anxious behavior, but only among those with relatively weaker (versus stronger) inhibitory control. Minute of speech further moderated this relationship for unconscious (but not conscious) social-threat interference, such that lower social-threat interference predicted a steeper increase in anxious behaviors over the course of the speech (but only among those with weaker inhibitory control). Thus, both trait and state differences in inhibitory control resources may influence the behavioral impact of threat biases in social anxiety. PMID:26163713

  16. Attracted to power: Challenge / threat and promotion / prevention focus differentially predict the attractiveness of group power

    Directory of Open Access Journals (Sweden)

    Annika eScholl

    2015-04-01

    Full Text Available Depending on their motivation, individuals prefer different group contexts for social interactions. The present research sought to provide more insight into this relationship. More specifically, we tested how challenge / threat and a promotion / prevention focus predict attraction to groups with high or low power. As such, we examined differential outcomes of threat and prevention focus as well as challenge and promotion focus that have often been regarded as closely related. According to regulatory focus, individuals should prefer groups that they expect to feel right for them to join: Low-power groups should be more attractive in a prevention (than a promotion focus, as these groups suggest security-oriented strategies, which fit a prevention focus. High-power groups should be more attractive in a promotion (rather than a prevention focus, as these groups are associated with promotion strategies fitting a promotion focus (Sassenberg, Jonas, Shah, & Brazy, 2007. In contrast, under threat (vs. challenge, groups that allow individuals to restore their (perceived lack of control should be preferred: Low-power groups should be less attractive under threat (than challenge because they provide low resources which threatened individuals already perceive as insufficient and high-power groups might be more attractive under threat (than under challenge, because their high resources allow individuals to restore control. Two experiments (N = 140 supported these predictions. The attractiveness of a group often depends on the motivation to engage in what fits (i.e., prefer a group that feels right in the light of one’s regulatory focus. However, under threat the striving to restore control (i.e., prefer a group allowing them to change the statuts quo under threat vs. challenge overrides the fit effect, which may in turn guide individuals’ behavior in social interactions.

  17. Assessing Local and Surrounding Threats to the Protected Area Network in a Biodiversity Hotspot: The Hengduan Mountains of Southwest China.

    Directory of Open Access Journals (Sweden)

    Xin Ye

    Full Text Available Protected areas (PAs not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitatively assessing local and surrounding threats to different types of PAs with gradient buffers, and to main ecoregions in the Hengduan Mountain Hotspot of southwest China. Our findings show that national protected areas (NPAs have lower and significantly lower threat values (p<0.05 than provincial protected areas (PPAs and other protected areas (OPAs, respectively, which indicates that NPAs are lands with a lower threat level and higher levels of protection and management. PAs have clear edge effects, as the proportion of areas with low threat levels decline dramatically in the 5-kilometer buffers just outside the PAs. However, NPAs suffered greater declines (58.3% than PPAs (34.8% and OPAs (33.4% in the 5-kilometer buffers. Moreover, a significant positive correlation was found between the size of PAs and the proportion of areas with low threat levels that they contained in both PAs and PA buffers (p<0.01. To control or mitigate current threats at the regional scale, PA managers often require quantitative information related to threat intensities and spatial distribution. The threat assessment in the Hengduan Mountain Hotspot will be useful to policy makers and managers in their efforts to establish effective plans and target-oriented management strategies.

  18. The Effects of Safety Behavior Directed Towards a Safety Cue on Perceptions of Threat.

    Science.gov (United States)

    Engelhard, Iris M; van Uijen, Sophie L; van Seters, Niels; Velu, Nicolette

    2015-09-01

    Safety behavior involves precautions to prevent or minimize a feared outcome, and is involved in the maintenance of anxiety disorders. Earlier research has shown that safety behavior prevents the extinction of conditioned fear and maintains threat expectations. This study tested whether safety behavior directed towards an objectively safe stimulus increases the perceived threat of that stimulus when it is subsequently experienced in the absence of the safety measure. In a conditioning task, participants first learned that one "danger" cue (A) was followed by shock and two "safety" cues (B, C) were not. Then they learned to apply safety behavior during A trials, which prevented the shock. Next, the experimental group, and not the control group, was given the opportunity to display safety behavior to C trials, which had never been coupled with the shock. In a subsequent test phase, A, B, and C were presented without the opportunity for participants to engage in safety behavior. Results showed that safety behavior increased shock expectancy to C in the test phase and maintained a preexisting shock expectancy in the experimental group, but not in the control group. This is the first study to show that safety behavior can maintain threat appraisal to stimuli that only ever acquired threat indirectly. This may be a possible mechanism for the origin of biased threat beliefs, superstitious behaviors, and irrational fears. It is also practically relevant: safety behavior reduces actual danger, but in relatively safe situations, its potential costs may outweigh the benefits. PMID:26459841

  19. Age Differences in Neural Response to Stereotype Threat and Resiliency for Self-Referenced Information

    Directory of Open Access Journals (Sweden)

    Angela H Gutchess

    2013-09-01

    Full Text Available To investigate the contribution of cortical midline regions to stereotype threat and resiliency, we compared age groups in an event-related functional MRI study. During scanning, seventeen younger and sixteen older adults judged whether words stereotypical of aging and control words described them. Judging stereotype words versus control words revealed higher activations in posterior midline regions associated with self-referencing, including the precuneus, for older adults compared to younger adults. While heightening salience of stereotypes can evoke a threat response, detrimentally affecting performance, invoking stereotypes can also lead to a phenomenon called resilience, where older adults use those stereotypes to create downward social comparisons to “other” older adults and elevate their own self-perception. In an exploration of brain regions underlying stereotype threat responses as well as resilience responses, we found significant activation in older adults for threat over resilient responses in posterior midline regions including the precuneus, associated with self-reflective thought, and parahippocampal gyrus, implicated in autobiographical memory. These findings have implications for understanding how aging stereotypes may affect the engagement of regions associated with contextual and social processing of self-relevant information, indicating ways in which stereotype threat can affect the engagement of neural resources with age.

  20. On the front lines: Stakeholder threat cues determine how identified employees cope with scandal.

    Science.gov (United States)

    Grandey, Alicia A; Krannitz, Morgan A; Slezak, Tyler

    2015-07-01

    When organizational identity is threatened as a result of scandal, highly identified members who represent the threatened organization to stakeholders have a particularly challenging and overlooked experience. Addressing a theoretical paradox, we propose that organizational identification interacts with the threat cues from stakeholders to determine employee responses. We conducted a multimethod, in vivo test of these ideas with university fundraising employees after events threatened the university's moral identity. Interview and archival data demonstrated that stakeholders expressed identity threat to fundraisers, who experienced their own identity-related distress and engaged in both group-dissociative and group-affirming responses. Surveys of professional and student university fundraisers demonstrated that more identified employees were more distressed (e,g., felt anxious, grief, betrayed) regardless of stakeholder threat cues. Yet, when employees perceived weak threat cues from stakeholders, more identified members were less likely to dissociate from the group and more likely to affirm the group's positive identity with stakeholders. These benefits of identification were not present when the stakeholder threat cues were strong. We discuss future research and practical implications of front-line employee identification and stakeholder cues during scandal. PMID:25602276

  1. Threat perception and familiarity moderate the androgen response to competition in women

    Science.gov (United States)

    Oliveira, Gonçalo A.; Uceda, Sara; Oliveira, Tânia; Fernandes, Alexandre; Garcia-Marques, Teresa; Oliveira, Rui F.

    2013-01-01

    Social interactions elicit androgen responses whose function has been posited to be the adjustment of androgen-dependent behaviors to social context. The activation of this androgen response is known to be mediated and moderated by psychological factors. In this study we tested the hypothesis that the testosterone (T) changes after a competition are not simply related to its outcome, but rather to the way the subject evaluates the event. In particular we tested two evaluative dimensions of a social interaction: familiarity with the opponent and the subjective evaluation of the outcome as threat or challenge. Challenge/threat occurs in goal relevant situations and represent different motivational states arising from the individuals’ subjective evaluation of the interplay between the task demands and coping resources possessed. For challenge the coping resources exceed the task demands, while threat represents a state where coping resources are insufficient to meet the task demands. In this experiment women competed in pairs, against a same sex opponent using the number tracking test as a competitive task. Losers appraised the competition outcome as more threatening than winners, and displayed higher post-competition T levels than winners. No differences were found either for cortisol (C) or for dehydroepiandrosterone. Threat, familiarity with the opponent and T response were associated only in the loser condition. Moderation analysis suggests that for the women that lost the competition the effect of threat on T is moderated by familiarity with the opponent. PMID:23847564

  2. Self-affirmations provide a broader perspective on self-threat.

    Science.gov (United States)

    Critcher, Clayton R; Dunning, David

    2015-01-01

    We present an "affirmation as perspective" model of how self-affirmations alleviate threat and defensiveness. Self-threats dominate the working self-concept, leading to a constricted self disproportionately influenced by the threat. Self-affirmations expand the size of the working self-concept, offering a broader perspective in which the threat appears more narrow and self-worth realigns with broader dispositional self-views (Experiment 1). Self-affirmed participants, relative to those not affirmed, indicated that threatened self-aspects were less all-defining of the self (although just as important), and this broader perspective on the threat mediated self-affirmation's reduction of defensiveness (Experiment 2). Finally, having participants complete a simple perspective exercise, which offered a broader perspective on the self without prompting affirmational thinking (Experiment 3a), reduced defensiveness in a manner equivalent to and redundant with a standard self-affirmation manipulation (Experiment 3b). The present model offers a unifying account for a wide variety of seemingly unrelated findings and mysteries in the self-affirmation literature. PMID:25319717

  3. Moderate threat causes longer lasting disruption to processing in anxious individuals

    Directory of Open Access Journals (Sweden)

    Sophie eForster

    2014-08-01

    Full Text Available Anxiety is associated with increased attentional capture by threat. Previous studies have used simultaneous or briefly separated (< 1s presentation of threat distractors and target stimuli. Here, we tested the hypothesis that high trait anxious participants would show a longer time window within which distractors cause disruption to subsequent task processing, and that this would particularly be observed for stimuli of moderate or ambiguous threat value. A novel temporally separated emotional distractor task was used. Face or house distractors were presented for 250ms at short (~1.6s or long (~3s intervals prior to a letter string comprising Xs or Ns. Trait anxiety was associated with slowed identification of letter strings presented at long intervals after face distractors with part surprise / part fear expressions. In other words, these distractors had an impact on high anxious individuals’ speed of target identification seconds after their offset. This was associated with increased activity in the fusiform gyrus and amygdala and reduced dorsal anterior cingulate recruitment. This pattern of activity may reflect impoverished recruitment of reactive control mechanisms to damp down stimulus-specific processing in subcortical and higher visual regions. These findings have implications for understanding how threat-related attentional biases in anxiety may lead to dysfunction in everyday settings where stimuli of moderate, potentially ambiguous, threat value such as those used here are fairly common, and where attentional disruption lasting several seconds may have a profound impact.

  4. Global Threat Reduction Initiative Domestic Security Program

    International Nuclear Information System (INIS)

    The Global Threat Reduction Initiative (GTRI) is part of the Department of Energy’s National Nuclear Security Administration (DOE/NNSA). One of GTRI’s primary missions is to work throughout the United States to enhance security for radiological materials located at civilian sites such as hospitals and universities that could be potentially used in a radiological dispersal device (RDD). In partnership with other federal organizations such as the Nuclear Regulatory Commission (NRC), the Federal Bureau of Investigation (FBI), and the Department of Homeland Security (DHS), GTRI has assisted sites in enhancing security for thousands of radioactive sources located throughout the U.S. This paper provides an overview of GTRI’s partnership with the NRC, the FBI, DHS, and host sites to enhance the security of radioactive sources

  5. Threats from space: 20 years of progress

    CERN Document Server

    Remo, J L

    2014-01-01

    It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

  6. Bluetooth Security Threats And Solutions: A Survey

    Directory of Open Access Journals (Sweden)

    Nateq Be-Nazir Ibn Minar

    2012-02-01

    Full Text Available Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The security issues of Bluetooth have been an active area of research for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along with some past security threats and possible countermeasures as reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information.Finally, the paper concludes with some recommendations for future security enhancements that can be implemented in the Bluetooth standard.

  7. The expectancy of threat and peritraumatic dissociation

    Directory of Open Access Journals (Sweden)

    Pamela McDonald

    2013-12-01

    Full Text Available Background: Peritraumatic dissociation is one of the most critical acute responses to a traumatic experience, partly because it predicts subsequent posttraumatic stress disorder. Despite this, there is little understanding about the factors that influence peritraumatic dissociation. This study investigated the extent to which peritraumatic dissociation is predicted by the amount of perceived warning that participants had of the impact of the trauma. Method: Randomized eligible admissions to four major trauma hospitals (N =243 were assessed during hospital admission with the Peritraumatic Dissociation Experiences Questionnaire (PDEQ and the perceived warning that participants had before the trauma impact occurred. Results: Whereas female gender predicted both Awareness and Derealization subscale scores on the PDEQ, perceived warning also predicted scores on the Derealization subscale. Conclusions: This finding suggests that the degree of anticipated threat may contribute to peritraumatic dissociation.

  8. Consequences of a changing CBRN threat

    International Nuclear Information System (INIS)

    The OPCW now counts 186 member States. Member States that possessed chemical weapons (CW) are destroying those weapons, albeit at a slow pace. In the coming decade most, if not all, of the 100.000 + tons of CW from the previous century will have been destroyed. Of the 12± States, not part of the OPCW, four of them potentially have CW but their quantities are restricted to less than 1000 tons. About one kg of the more potent nerve agent or Mustard gas is required to produce on average one casualty amongst unprotected troops, 1000 tons potentially can produce 1 million casualties. Protection, passive chemical defense, is therefore mandatory. However, once a detection and protection system is in place, with a protection factor of say one thousand, the amount required to produce one casualty amongst troops in a military scenario becomes prohibitive. Furthermore, available CW quantities will have been reduced by pre-emptive airstrikes and the aggressor will have little chance to fully deploy his CW capability. The threat from massive CW with units facing several attacks per week has changed to incidental attacks on a smaller scale and with far lower frequency. This should have consequences for the chemical defense posture of the forces, Detection and protection are still required but the protection can have a lower capacity, less spares per individual. Because the number of incidents will be far lower it might be more cost effective to abandon contaminated equipment than to decontaminate it. As the number of CW casualties entering the military medical system will be small it might be better to find cures for diseases from biological weapons than to spent money on improved therapies for nerve agent or mustard. Although research in CW medical over the last 50 years was great, it has not produced a therapy for mustard or a significant improvement over the old therapy for nerve agent poisoning. With a declining CW threat the BW threat is on the rise, making a passive

  9. Security Threats in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios

    2011-01-01

    Over the last few years, technological advances in the design of processors, memory, and radio communications have propelled an active interest in the area of distributed sensor networking, in which a number of independent, self-sustainable nodes collaborate to perform a large sensing task....... Security and privacy are rapidly replacing performance as the first and foremost concern in many sensor networking scenarios. While security prevention is important, it cannot guarantee that attacks will not be launched and that, once launched, they will not be successful. Therefore, detection of malicious...... of the most severe routing attacks against sensor networks, namely the sinkhole and wormhole attacks, and we emphasize on strategies that an attacker can follow to successfully launch them. Then we propose novel localized countermeasures that can make legitimate nodes become aware of the threat, while...

  10. The CBRNE Threat Needs New Dedicated Analysers

    International Nuclear Information System (INIS)

    Introduction: After the 9-11 attack by terrorists several governments realized their vulnerability towards creative asymmetric attacks. Due to increasing complexity of our society we create more vulnerability towards terror attacks. More chemical substances than we realize can be misused to destabilize our modern society. Recently aircraft passengers were confronted with new regulations, which limit the amount of fluid, which a passenger can bring on board with hand luggage. How far should we go limiting the allowance to bring liquids and substances on board? It indicates that we need new analytic instruments for screening the safety of luggage in all types of transport. Study Design: An inventory was made of the present demand for safe transport and its vulnerability to terror attacks. Also the safety and safety awareness in public buildings, offices and industrial complexes was assessed. Knowing the demand for a certain safety level, an inventory was made to identify analytical equipment, which can be used to check passengers and luggage on possible threats. The same can be used for protecting public areas, offices and industrial complexes. Results And Discussion: It is amazing how some governments, financially driven, underestimate the consequences of CBRNE incidences and disasters. Both threats due to release of dangerous substances just by accident and deliberate abuse of chemicals and/or biologicals by terror organizations is underestimated. Financial rationales are often the cause that the preparedness is less that technically could be possible. Still some commercial companies realize the importance of safety and preparedness towards terror attacks and take their precautions. Several detection systems are now under development and a new market of safety devices comes into existence. Conclusion: Key question is how far we would like to go with defending us with technical devices against potential terror attacks. Also the design of buildings, transport

  11. Nuclear terrorism: How real is the threat?

    International Nuclear Information System (INIS)

    After the end of the Cold War the threat of proliferation of weapons of mass destruction to non-state actors has increased and since non-territorial actors cannot be deterred as easily as states, new responses have to be found. The author offers a definition of nuclear terrorism which includes also attacks on, and sabotage of, nuclear reactors and the dispersal of radioactive waste, in addition to the possession or use of weapon-grade nuclear materials. It is held that the main bottleneck for would-be nuclear terrorists is not so much bomb design than access to nuclear material for which the territories of the former Soviet Union are a likely source, due to gaps in safety and security. The article discusses the smuggling of nuclear material from the former USSR's territories and lists seven possible methods of acquisition of nuclear materials by terrorists. The intentions of various types of groups to use weapons of mass destruction and their possible goals are analyzed and the question whether or not Osama Bin Laden has acquired nuclear materials is raised. A discussion of possible motivations for nuclear terrorism by non-state actors and a listing of facilitating and inhibiting factors with regard to terrorist use of weapons of mass destruction lead to the conclusion that nuclear terrorism by non-state actors is still a low probability event but that no risks can be taken and that a broad action plan to counter the threat is needed whereby the IAEA should stand in the forefront. (author)

  12. Prejudice towards Muslims in The Netherlands: testing integrated threat theory.

    Science.gov (United States)

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-12-01

    This study uses integrated threat theory to examine Dutch adolescents' (N=1,187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators between antecedent factors (in-group identification, intergroup contact, and the endorsement of multiculturalism) and prejudice. Based on structural equation modelling, it was found that stereotypes and symbolic threats, but not realistic threats, predicted prejudice towards Muslims. Further, it was found that the effect of in-group identification on prejudice was fully mediated by symbolic threat, the effect of contact was partially mediated by stereotypes, and the effect of the endorsement of multiculturalism was mediated by both symbolic threat and stereotypes. In addition, contact and multiculturalism were directly associated with prejudice towards Muslims. The theoretical and practical implications of these findings are discussed. PMID:18284782

  13. Proximal vocal threat recruits the right voice-sensitive auditory cortex.

    Science.gov (United States)

    Ceravolo, Leonardo; Frühholz, Sascha; Grandjean, Didier

    2016-05-01

    The accurate estimation of the proximity of threat is important for biological survival and to assess relevant events of everyday life. We addressed the question of whether proximal as compared with distal vocal threat would lead to a perceptual advantage for the perceiver. Accordingly, we sought to highlight the neural mechanisms underlying the perception of proximal vs distal threatening vocal signals by the use of functional magnetic resonance imaging. Although we found that the inferior parietal and superior temporal cortex of human listeners generally decoded the spatial proximity of auditory vocalizations, activity in the right voice-sensitive auditory cortex was specifically enhanced for proximal aggressive relative to distal aggressive voices as compared with neutral voices. Our results shed new light on the processing of imminent danger signaled by proximal vocal threat and show the crucial involvement of the right mid voice-sensitive auditory cortex in such processing. PMID:26746180

  14. The Reliability to Predict Threat in Social Networks

    Directory of Open Access Journals (Sweden)

    Aleksandrs Larionovs

    2014-11-01

    Full Text Available During the analysis and study it will be possible to create and describe information damping mechanism for transition of threats from one user group to another (within the parameters of portraits, which is the main cause of the massively spreading threat on social networks. Threat predictability in social networks is associated with an adequate scrutiny of system and user portrait, which has a direct correlation.

  15. Mediators of Stereotype Threat among Black College Students

    OpenAIRE

    Massey, Douglas S.; Owens, Jayanti

    2013-01-01

    We hypothesize that the manner in which stereotype threat affects college grade achievement is mediated by institutional context as well as individual characteristics. Drawing on a sample of black students from the National Longitudinal Survey of Freshmen we find weak and inconsistent evidence that institutional characteristics influence the operation of stereotype threat. We find more consistent evidence to indicate that the effect of stereotype threat is conditioned by individual factors su...

  16. CYBER THREATS TRENDS IN THE WORLD INFORMATION SPACE

    OpenAIRE

    Cherniak, Oleg R.; Fedulov, Oleg V.

    2015-01-01

    To protect informational systems against cyber threats (attacks) risks must be constantly evaluated and assessed their existence in the global information space affect the confidentiality, integrity and availability of information resources. Upon the analysis and identification of the trends major development of cyber threats in the global information space made, it is possible to draw the conclusion about the trends progress of cyber threats and mechanisms of their proliferation become more ...

  17. New Frontiers of Network Security: The Threat Within

    OpenAIRE

    Sanyal, Sugata; Shelat, Ajit; Gupta, Amit

    2010-01-01

    Nearly 70% of information security threats originate from inside an organization. Opportunities for insider threats have been increasing at an alarming rate with the latest trends of mobility (portable devices like Laptop, smart phones etc.), ubiquitous connectivity (wireless or through 3G connectivity) and this trend increases as more and more web-based applications are made available over the Internet. Insider threats are generally caused by current or ex-employees, contractors or partners,...

  18. The effects of takeover threats of shareholders and firm value

    OpenAIRE

    Haan, Marco; Riyanto, Yohanes

    2000-01-01

    We study the role of takeover threats as a corporate control mechanism using Aghion and Tirole's (1997) model of formal and real authority. Shareholders do not monitor the manager's actions, since ownership is widely dispersed. A corporate raider may monitor, and steps in if a profit opportunity exists. In our model, a takeover threat decreases the manager's effort and does not benefit shareholders. The effect of a takeover threat on the expected value of the firm is ambiguous. It is in the i...

  19. On the relationship between social distance and threat

    OpenAIRE

    Astrid C. Buba; de Hoog, Natascha

    2009-01-01

    We investigated the dependence of threat perception and reaction on social distance estimation. Social identity threat was imposed within a 2x2 between subjects design, with N=163 students reading a criticising comment about their ingroup assigned to originate from one of two possible outgroups. The participants completed parts of the scale Overlap of self, ingroup and outgroup (OSIO, Schubert and Otten, 2002) as a measure of social distance either before or after the threat manipulation. Res...

  20. Protected Areas in Tropical Africa : Assessing Threats and Conservation Activities

    OpenAIRE

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèlle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin; Davenport, Tim; Dunn, Andrew

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover...

  1. Attention Training and the Threat Bias: An ERP Study

    OpenAIRE

    O’Toole, Laura; Dennis, Tracy A.

    2011-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these changes remain unclear. To address this issue, 49 non-anxious adults were randomly assigned to either attentional training toward or training away from th...

  2. Enfrentando el bioterrorismo: aspectos epidemiológicos, clínicos y preventivos de la viruela Confronting bioterrorism: epidemiologic, clinical, and preventive aspects of smallpox

    Directory of Open Access Journals (Sweden)

    Carlos Franco-Paredes

    2003-08-01

    Full Text Available Uno de los grandes logros de la salud pública mundial, la erradicación de la viruela, puede verse mermado por el posible riesgo de bioterrorismo. El debate acerca de la destrucción de los restos del virus en los dos laboratorios de referencia de la Organización Mundial de la Salud ha cambiado diametralmente debido a los eventos terroristas y a la dispersión intencional de Bacillus anthracis ocurridos en poblaciones civiles en Estados Unidos de América en el año 2001. La liberación del virus Variola con fines terroristas constituye un riesgo mínimo no cuantificable, pero desafortunadamente real. El impacto podría ser devastador debido a la elevada morbimortalidad de la enfermedad aunada al pánico y a la desestabilización social que podría ocasionar. Es por ello que el establecimiento de un plan de respuesta, sumado a disponibilidad de vacuna para ser utilizada pos-exposición, es importante dentro de los planes de contingencia contra el bioterrorismo. El reiniciar un programa limitado de vacunación contra la viruela, como parte de dicho plan, ha sido recientemente recomendado por el Comité Asesor de Vacunación, del Centro para el Control de las Enfermedades, pero la vacuna disponible puede causar complicaciones graves e incluso la muerte, por lo que dicha recomendación no ha sido universalmente aceptada. No obstante, el personal médico y de salud pública requiere de información actualizada sobre la viruela y su prevención, ya que ellos son la primera línea de defensa en caso de un posible brote a consecuencia de un ataque bioterrorista. El presente artículo presenta una revisión dirigida a proporcionar al personal de salud un enfoque clínico, epidemiológico y preventivo sobre la viruela.The worldwide eradication of smallpox, a major achievement in public health, is currently threatened by the risk of bioterrorism. The debate on the destruction of the Variola virus in the two reference laboratories of the World Health

  3. Relativity

    CERN Document Server

    Einstein, Albert

    2013-01-01

    Time magazine's ""Man of the Century"", Albert Einstein is the founder of modern physics and his theory of relativity is the most important scientific idea of the modern era. In this short book, Einstein explains, using the minimum of mathematical terms, the basic ideas and principles of the theory that has shaped the world we live in today. Unsurpassed by any subsequent books on relativity, this remains the most popular and useful exposition of Einstein's immense contribution to human knowledge.With a new foreword by Derek Raine.

  4. Relativity

    CERN Document Server

    Brewster, Hilary D

    2009-01-01

    The theory of relativity has become a cornerstone of modern physics. Over the course of time it has been scrutinized in a multitude of experiments and has always been verified with high accuracy. The correctness of this theory can no longer be called into question. Right after its discovery by Albert Einstein in 1905, special relativity was only gradually accepted because it made numerous predictions contradicting common sense, fervently castigated by Einstein, and also defied experiment for too long a time. It was only with the advent of particle or high energy physics that matter could be ac

  5. Wetland Preservation in Australia: The Administrative and Policital Threats

    Institute of Scientific and Technical Information of China (English)

    Mark Yaolin Wang

    2008-01-01

    The wetlands in Australia are of great physical, chemical and biological variety due to the continent's age, geological history and climate. The traditional physical and biological threats remain as the main challenges for wetland preservation in Australia. However, it has been increasingly recognized that the immediate survival of wetlands are being affected by more subtle threats, such as administrative and political threats. This paper identifies these non-physical threats and discusses how and why they have become the major barriers for sustainable wetland preservation in Australia. Finally, this paper calls for more practical policies and solutions to be implemented for sustainable wetland preservation in Australia.

  6. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. PMID:21077905

  7. Stereotype threat as a determinant of burnout or work engagement. Mediating role of positive and negative emotions

    OpenAIRE

    Bedyńska, Sylwia; Żołnierczyk-Zreda, Dorota

    2015-01-01

    Stereotype threat as an example of serious interpersonal strain at workplace can lead either to impaired work engagement or it can motivate workers to strengthen their efforts to disconfirm a stereotype and can result in excessive work engagement. Thus, the basic aim of the study was to examine whether stereotype threat is related to burnout or to work engagement. The mediating role of the negative and positive emotions were also tested in the classical approach. Mediational analysis revealed...

  8. Threat Perception as a Determinant of Pro-Environmental Behaviors: Public Involvement in Air Pollution Abatement in Cache Valley, Utah

    OpenAIRE

    Marquit, Joshua D.

    2008-01-01

    Threat perception related to environmental issues such as air pollution may be a determinant of pro-environmental behaviors. Among the potential threats of air pollution, include the perceived impacts on the psychological, social, and economic wellbeing of a community. Because of rapid increases in population growth, urbanization, and the mountainous landscapes, the American West is extremely susceptible to the adverse impacts of air pollution. A secondary data analysis was conducted using d...

  9. Gender-, Race-, and Income-Based Stereotype Threat: The Effects of Multiple Stigmatized Aspects of Identity on Math Performance and Working Memory Function

    Science.gov (United States)

    Tine, Michele; Gotlieb, Rebecca

    2013-01-01

    This study compared the relative impact of gender-, race-, and income-based stereotype threat and examined if individuals with multiple stigmatized aspects of identity experience a larger stereotype threat effect on math performance and working memory function than people with one stigmatized aspect of identity. Seventy-one college students of the…

  10. A Longitudinal Path Analysis of Peer Victimization, Threat Appraisals to the Self, and Aggression, Anxiety, and Depression among Urban African American Adolescents

    Science.gov (United States)

    Taylor, Katherine A.; Sullivan, Terri N.; Kliewer, Wendy

    2013-01-01

    Threat appraisals--individuals' perceptions of how stressful situations may threaten their well-being--are an important but understudied mechanism that could explain links between peer victimization and adjustment. The goal of the present study was to examine relationships between physical and relational victimization by peers, threats to the…

  11. An Ecological Assessment of the Pandemic Threat of Zika Virus.

    Science.gov (United States)

    Carlson, Colin J; Dougherty, Eric R; Getz, Wayne

    2016-08-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset from Zika viral surveillance and serological surveys based in its native range, and construct ecological niche models to test basic hypotheses about its spread and potential establishment. The hypothesis that the outbreak of cases in Mexico and North America are anomalous and outside the native ecological niche of the disease, and may be linked to either genetic shifts between strains, or El Nino or similar climatic events, remains plausible at this time. Comparison of the Zika niche against the known distribution of dengue fever suggests that Zika is more constrained by the seasonality of precipitation and diurnal temperature fluctuations, likely confining autochthonous non-sexual transmission to the tropics without significant evolutionary change. Projecting the range of the diseases in conjunction with three major vector species (Aedes africanus, Ae. aegypti, and Ae. albopictus) that transmit the pathogens, under climate change, suggests that Zika has potential for northward expansion; but, based on current knowledge, our models indicate Zika is unlikely to fill the full range its vectors occupy, and public fear of a vector-borne Zika epidemic in the mainland United States is potentially informed by biased or limited scientific knowledge. With recent sexual transmission of the virus globally, we caution that our results only apply to the vector-borne transmission route of the pathogen, and while the threat of a mosquito-carried Zika pandemic may be overstated in the media

  12. An Ecological Assessment of the Pandemic Threat of Zika Virus

    Science.gov (United States)

    Getz, Wayne

    2016-01-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset from Zika viral surveillance and serological surveys based in its native range, and construct ecological niche models to test basic hypotheses about its spread and potential establishment. The hypothesis that the outbreak of cases in Mexico and North America are anomalous and outside the native ecological niche of the disease, and may be linked to either genetic shifts between strains, or El Nino or similar climatic events, remains plausible at this time. Comparison of the Zika niche against the known distribution of dengue fever suggests that Zika is more constrained by the seasonality of precipitation and diurnal temperature fluctuations, likely confining autochthonous non-sexual transmission to the tropics without significant evolutionary change. Projecting the range of the diseases in conjunction with three major vector species (Aedes africanus, Ae. aegypti, and Ae. albopictus) that transmit the pathogens, under climate change, suggests that Zika has potential for northward expansion; but, based on current knowledge, our models indicate Zika is unlikely to fill the full range its vectors occupy, and public fear of a vector-borne Zika epidemic in the mainland United States is potentially informed by biased or limited scientific knowledge. With recent sexual transmission of the virus globally, we caution that our results only apply to the vector-borne transmission route of the pathogen, and while the threat of a mosquito-carried Zika pandemic may be overstated in the media

  13. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, Karen; Van der Gang, Ineke

    2007-01-01

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is t

  14. A Stereotype Threat Account of Boys' Academic Underachievement

    Science.gov (United States)

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged…

  15. An examination of stereotype threat effects on girls' mathematics performance.

    Science.gov (United States)

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias. PMID:23356523

  16. An Integrated Process Model of Stereotype Threat Effects on Performance

    Science.gov (United States)

    Schmader, Toni; Johns, Michael; Forbes, Chad

    2008-01-01

    Research showing that activation of negative stereotypes can impair the performance of stigmatized individuals on a wide variety of tasks has proliferated. However, a complete understanding of the processes underlying these stereotype threat effects on behavior is still lacking. The authors examine stereotype threat in the context of research on…

  17. Lack of Stereotype Threat at a Liberal Arts College

    Science.gov (United States)

    Rivardo, Mark G.; Rhodes, Michael E.; Klein, Brandi

    2008-01-01

    Stereotype threat has been demonstrated to reduce the performance of stereotyped individuals in the threatened domain (Steele & Aronson, 1995). This study attempted to replicate the finding that stereotype threat instruction can erase the performance deficit women experience in math performance (Johns, Schmader, & Martens, 2005) and to further…

  18. Does Manipulating Stereotype Threat Condition Change Performance Goal State

    Science.gov (United States)

    Simmons, Cecil Max

    2010-01-01

    This study tested whether the Stereotype Threat effect is mediated by achievement goals, in particular performance-avoidance goals. Threat level was altered before a difficult math test to observe how the endorsement by females of various achievement goal dimensions was affected. 222 people (96 females) in a pre-calculus class at a Mid-Western…

  19. Threat Level High (School): Curriculum Reform with Violence in Mind

    Science.gov (United States)

    Hawkes, T. Elijah; Twemlow, Stuart W.

    2015-01-01

    When school communities are troubled by violence, or threats of violence, at the hands of young people, educators have an opportunity to learn about aggression and adolescent identity development. A disturbing threat incident provides the point of departure for this principal's reflection on how high school curriculum can better meet the identity…

  20. Superior Detection of Threat-Relevant Stimuli in Infancy

    Science.gov (United States)

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  1. Anxiety and threat perception abnormalities in normal children.

    NARCIS (Netherlands)

    P. Muris; M. Kindt; S. Boegels; H. Merckelbach; B, Gadet; V. Moulaert

    2000-01-01

    Examined the relationship between childhood anxiety and threat perception abnormalities. 105 children (aged 8-13 yrs) were exposed to stories reflecting 3 types of anxiety: social anxiety, separation anxiety, and generalized anxiety. From children's reactions to the stories, a number of threat perce

  2. 78 FR 46782 - Federal Acquisition Regulation; Iran Threat Reduction

    Science.gov (United States)

    2013-08-01

    ... RIN 9000-AM44 Federal Acquisition Regulation; Iran Threat Reduction AGENCIES: Department of Defense... Revolutionary Guard Corps, as contained in titles II and III of the Iran Threat Reduction and Syria Human Rights... Federal Register at 77 FR 73516, on December 10, 2012, to implement sections of titles II and III of...

  3. 75 FR 60430 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Science.gov (United States)

    2010-09-30

    ... of the Secretary Federal Advisory Committee; Threat Reduction Advisory Committee AGENCY: Office of... announces a meeting of the Threat Reduction Advisory Committee (hereafter referred to as ``the Committee..., October 21, 2010, from 9 a.m. to 5 p.m. ADDRESSES: The meeting will be held at the Heritage...

  4. Combating threats of bankruptcy to large energy consumers

    International Nuclear Information System (INIS)

    In spite of the outstanding advantages pointed out in the early privatization period in Croatia, the course of development taken by liberalized energy markets in Europe poses a number of threats of bankruptcy to large energy consumers. The paper presents several ways of combating these threats.(author)

  5. Superluminous supernovae: No threat from Eta Carinae

    CERN Document Server

    Thomas, Brian C; Fields, Brian D; Anthony-Twarog, Barbara J

    2007-01-01

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of ~10^44 Joules. It was proposed that the progenitor may have been a massive evolved star similar to Eta Carinae, which resides in our own galaxy at a (poorly determined) distance of ~2.5 kpc. Eta Carinae appears ready to detonate, and in fact had an outburst in 1843. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma Ray Burst oriented toward the Earth, Eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over ~10^4 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possib...

  6. Gonococcal endocarditis: an ever-present threat

    Science.gov (United States)

    Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society’s poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient’s clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  7. Gonococcal endocarditis: an ever-present threat.

    Science.gov (United States)

    de Campos, Fernando Peixoto Ferraz; Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society's poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient's clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  8. Nuclear weapons: new threats, new challenges

    International Nuclear Information System (INIS)

    After a brief history of the Iranian nuclear crisis since 2003, the author discusses the four aspects of this crisis which make it a textbook case: a country which wants to control the whole nuclear process and therefore may reach the capacity to produce military-grade uranium (this raises the question of the relationship between nuclear energy and disarmament), the validity and efficiency of international controls is at stake, divergence may appear on the ways to have international treaties respected (different approaches between Europe and the USA), a country which is looking for nuclear weapon for matters of regional security and power (this raises the issue of a new approach to security). Then, the author describes the new nuclear threats: proliferating states, terrorist groups, and states with nuclear weapons (attitude of the USA, China, Russia, France and the United Kingdom, perspective of a nuclear disarmament of Europe). He gives an overview of the current status of disarmament and of treaties (START, NPT), and discusses the opportunities to save the non proliferation treaty from collapsing in 2005

  9. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  10. The nuclear threat; La menace nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno

    2011-01-26

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  11. [Chikungunya fever - A new global threat].

    Science.gov (United States)

    Montero, Antonio

    2015-08-01

    The recent onset of epidemics caused by viruses such as Ebola, Marburg, Nipah, Lassa, coronavirus, West-Nile encephalitis, Saint Louis encephalitis, human immunodeficiency virus, dengue, yellow fever and Venezuelan hemorrhagic fever alerts about the risk these agents represent for the global health. Chikungunya virus represents a new threat. Surged from remote African regions, this virus has become endemic in the Indic ocean basin, the Indian subcontinent and the southeast of Asia, causing serious epidemics in Africa, Indic Ocean Islands, Asia and Europe. Due to their epidemiological and biological features and the global presence of their vectors, chikungunya represents a serious menace and could become endemic in the Americas. Although chikungunya infection has a low mortality rate, its high attack ratio may collapse the health system during epidemics affecting a sensitive population. In this paper, we review the clinical and epidemiological features of chikungunya fever as well as the risk of its introduction into the Americas. We remark the importance of the epidemiological control and mosquitoes fighting in order to prevent this disease from being introduced into the Americas. PMID:25087211

  12. Fructose; a Hidden Threat for Chronic Diseases

    Directory of Open Access Journals (Sweden)

    Ahmet Korkmaz

    2008-08-01

    Full Text Available Incremental usage of the fructose derived from corn by processed-food manufacturers has become a crucial threat in terms of human health. Although it is known as fruit sugar, the most important source of dietary fructose is now, processed-food prepared by using high-fructose corn syrup. Basically, fructose is metabolized within liver and its energy load is equal to glucose. Nevertheless, it does not make up satiety and fullness. Therefore, fructose-rich foods and beverages can be consumed in large amount because the absence of satiety. Studies performed recently unveil a connection between amount of fructose consumed and metabolic disorders such as cardiovascular diseases, type 2 diabetes, hypertension and obesity. The incidence of metabolic diseases which are already affecting more than half of the adults has been increasing among children. Moreover, these types of foods are generally consumed by children. Therefore, in order to reduce the frequency of metabolic disorders in all ages, the amount of fructose in processed-foods and beverages should also be taken into consideration. [TAF Prev Med Bull 2008; 7(4.000: 343-346

  13. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  14. Environmental degradation and environmental threats in China.

    Science.gov (United States)

    Wang, Ying

    2004-01-01

    The article presents a review of environmental degradation and its threats in China. Air pollution, water pollution, deforestation, soil degradation, sand depositing in dams, decaying urban infrastructure, and more and more hazards such as floods, landslides and soil erosion are major consequences of environmental degradation and are making tremendous loss both in life and property. Through investigation, the author found that poor air quality in the large cities; water pollution in the downstream of many rivers; the multiple problems of many mining areas; lack of access to fresh water; decaying sewage systems; and the disastrous impact of these environmental degradations on public health and agricultural products in many provinces is rather serious. Relationship of environmental degradation and natural hazards is close; more attention should be put in environmental degradation that may surpass economy progress if the trend continues. It is therefore imperative that Chinese government undertake a series of prudent actions now that will enable to be in the best possible position when the current environmental crisis ultimately passes. PMID:15887370

  15. Design basis threat analysis and implementation of the physical protection system at Nuclear Facility of BATAN Yogyakarta

    International Nuclear Information System (INIS)

    An analysis to determine the design basis threat (DBT) and its follow-up through the implementation of physical protection system at the nuclear facility of BATAN Yogyakarta has been done. Methodology used for the analysis is based on the IAEA guidance for the development and maintenance of a DBT. Based on the analysis results, it can be concluded that the threat motivation is influenced by political situation (related to the government policy), criminal, sabotage and theft. The characteristics of threats are: not so well organized, terror, theft of materials information, involving insider (collusion), and intimidation to workers. Potential threat could from guests/students who take a practical job or laboratory exercise. Therefore, it is necessary to be anticipated the possibility and its impact of turmoil/demonstrators such as destruction of: lighting, road, fence, sabotage on the electric and communication lines, surrounding the Yogyakarta nuclear facility

  16. Instantaneous threat escape and differentiated refuge demand among zooplankton taxa.

    Science.gov (United States)

    Hansson, Lars-Anders; Bianco, Giuseppe; Ekvall, Mikael; Heuschele, Jan; Hylander, Samuel; Yang, Xi

    2016-02-01

    Most animals, including aquatic crustacean zooplankton, perform strong avoidance movements when exposed to a threat, such as ultraviolet radiation (UVR). We here show that the genera Daphnia and Bosmina instantly adjust their vertical position in the water in accordance with the present UVR threat, i.e., seek refuge in deeper waters, whereas other taxa show less response to the threat. Moreover, Daphnia repeatedly respond to UVR pulses, suggesting that they spend more energy on movement than more stationary taxa, for example, during days with fluctuating cloud cover, illustrating nonlethal effects in avoiding UVR threat. Accordingly, we also show that the taxa with the most contrasting behavioral responses differ considerably in photoprotection, suggesting different morphological and behavioral strategies in handling the UVR threat. In a broader context, our studies on individual and taxa specific responses to UVR provide insights into observed spatial and temporal distribution in natural ecosystems. PMID:27145603

  17. Striving for Group Agency: Threat to Personal Control Increases the Attractiveness of Agentic Groups

    Directory of Open Access Journals (Sweden)

    Janine eStollberg

    2015-05-01

    Full Text Available When their sense of personal control is threatened people try to restore perceived control through the social self. We propose that it is the perceived agency of ingroups that provides the self with a sense of control. In three experiments, we for the first time tested the hypothesis that threat to personal control increases the attractiveness of being part or joining those groups that are perceived as coherent entities engaging in coordinated group goal pursuit (agentic groups but not of those groups whose agency is perceived to be low. Consistent with this hypothesis we found in Study 1 (N = 93 that threat to personal control increased ingroup identification only with task groups, but not with less agentic types of ingroups that were made salient simultaneously. Furthermore, personal control threat increased a sense of collective control and support within the task group, mediated through task-group identification (indirect effects. Turning to groups people are not (yet part of, Study 2 (N = 47 showed that personal control threat increased relative attractiveness ratings of small groups as possible future ingroups only when the relative agency of small groups was perceived to be high. Perceived group homogeneity or social power did not moderate the effect. Study 3 (N = 78 replicated the moderating role of perceived group agency for attractiveness ratings of entitative groups, whereas perceived group status did not moderate the effect. These findings extend previous research on group-based control, showing that perceived agency accounts for group-based responses to threatened control.

  18. Modulation of executive attention by threat stimulus in test-anxious students

    OpenAIRE

    Zhang, Huan; Zhou, Renlai; Zou, Jilin

    2015-01-01

    The study examined whether test anxiety (TA) is related to impaired attentional networks under emotional distraction. High and low test-anxious students completed a modified version of the attention network test (ANT) in which emotional distracters, specifically threat-related or neutral words, were embedded in centrally presented hollow arrows in Experiment 1. Results showed a significant reduction in efficiency of the executive attention in test-anxious students compared to controls when th...

  19. Chemical-Sensing Cables Detect Potential Threats

    Science.gov (United States)

    2007-01-01

    Intelligent Optical Systems Inc. (IOS) completed Phase I and II Small Business Innovation Research (SBIR) contracts with NASA's Langley Research Center to develop moisture- and pH-sensitive sensors to detect corrosion or pre-corrosive conditions, warning of potentially dangerous conditions before significant structural damage occurs. This new type of sensor uses a specially manufactured optical fiber whose entire length is chemically sensitive, changing color in response to contact with its target, and demonstrated to detect potentially corrosive moisture incursions to within 2 cm. After completing the work with NASA, the company received a Defense Advanced Research Projects Agency (DARPA) Phase III SBIR to develop the sensors further for detecting chemical warfare agents, for which they proved just as successful. The company then worked with the U.S. Department of Defense (DoD) to fine tune the sensors for detecting potential threats, such as toxic industrial compounds and nerve agents. In addition to the work with government agencies, Intelligent Optical Systems has sold the chemically sensitive fiber optic cables to major automotive and aerospace companies, who are finding a variety of uses for the devices. Marketed under the brand name Distributed Intrinsic Chemical Agent Sensing and Transmission (DICAST), these unique continuous-cable fiber optic chemical sensors can serve in a variety of applications: Corrosive-condition monitoring, aiding experimentation with nontraditional power sources, as an economical means of detecting chemical release in large facilities, as an inexpensive "alarm" systems to alert the user to a change in the chemical environment anywhere along the cable, or in distance-resolved optical time domain reflectometry systems to provide detailed profiles of chemical concentration versus length.

  20. Threat from Rubble-Pile Asteroids

    Science.gov (United States)

    Schultz, P. H.

    2015-12-01

    While chondrites are the most common meteoroids to enter our atmosphere, they represent a small fraction of recovered falls. Most stony meteorites disrupt during entry, consumed by ablation or lost by weathering; in contrast, small iron meteorites (entry at altitude; (c) no accessory meteorite falls; (d) "explosion" (not low-speed compression) crater; (e) infrasound/seismic data indicating a high-speed entry/collision; and (f) petrologic evidence for shock deformation/melting in breccias indicative of speeds >4 km/s. Although a monolithic chondrite (~ 10 m across) might allow surviving entry, most objects of this size contain multiple flaws, ensuring atmospheric disruption. Hence, an alternative "needle model" was proposed wherein a small rubble-pile object gradually re-shaped itself during entry [Schultz, 2008], a process that minimizes drag, thermal signatures of entry, and catastrophic disruption. First proposed to account for smaller than expected craters on Venus [Schultz, 1992], such a process resembles subsequent Shoemaker-Levy entry models [Boslough and Crawford, 1997] that predicted much deeper entry than standard models. Laboratory experiments at the NASA Ames Vertical Gun Range simulated this process by breaking-up hypervelocity projectiles into a cloud of debris and tracking its path at near-full atmospheric pressure. The resulting cloud of fragments exhibited less deceleration than a solid sphere at the same speed. Moreover, shadowgraphs revealed constituent fragments "surfing" the pressure jump within the mach cone/column. Previous models proposed that crater-forming impacts must be >50-100 m in diameter in order to survive entry [Bland and Artemieva, 2004]. The "needle model" for the Carancas meteorite entry, however, raises questions about this lower limit for threats by rubble-pile asteroids, e.g., Itokawa. Consequently, we modeled the fate of a rubble-pile entering earth's atmosphere using GEODYN, an Eulerian code with adaptive mesh refinement