WorldWideScience

Sample records for bioterrorism related threats

  1. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  2. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  3. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  4. Bioterrorism and biological threats dominate federal health security research; other priorities get scant attention.

    Science.gov (United States)

    Shelton, Shoshana R; Connor, Kathryn; Uscher-Pines, Lori; Pillemer, Francesca Matthews; Mullikin, James M; Kellermann, Arthur L

    2012-12-01

    The federal government plays a critical role in achieving national health security by providing strategic guidance and funding research to help prevent, respond to, mitigate, and recover from disasters, epidemics, and acts of terrorism. In this article we describe the first-ever inventory of nonclassified national health security-related research funded by civilian agencies of the federal government. Our analysis revealed that the US government's portfolio of health security research is currently weighted toward bioterrorism and emerging biological threats, laboratory methods, and development of biological countermeasures. Eight of ten other priorities identified in the Department of Health and Human Services' National Health Security Strategy-such as developing and maintaining a national health security workforce or incorporating recovery into planning and response-receive scant attention. We offer recommendations to better align federal spending with health security research priorities, including the creation of an interagency working group charged with minimizing research redundancy and filling persistent gaps in knowledge.

  5. Countering the livestock-targeted bioterrorism threat and responding with an animal health safeguarding system.

    Science.gov (United States)

    Yeh, J-Y; Lee, J-H; Park, J-Y; Cho, Y S; Cho, I-S

    2013-08-01

    Attacks against livestock and poultry using biological agents constitute a subtype of agroterrorism. These attacks are defined as the intentional introduction of an animal infectious disease to strike fear in people, damage a nation's economy and/or threaten social stability. Livestock bioterrorism is considered attractive to terrorists because biological agents for use against livestock or poultry are more readily available and difficult to monitor than biological agents for use against humans. In addition, an attack on animal husbandry can have enormous economic consequences, even without human casualties. Animal husbandry is vulnerable to livestock-targeted bioterrorism because it is nearly impossible to secure all livestock animals, and compared with humans, livestock are less well-guarded targets. Furthermore, anti-livestock biological weapons are relatively easy to employ, and a significant effect can be produced with only a small amount of infectious material. The livestock sector is presently very vulnerable to bioterrorism as a result of large-scale husbandry methods and weaknesses in the systems used to detect disease outbreaks, which could aggravate the consequences of livestock-targeted bioterrorism. Thus, terrorism against livestock and poultry cannot be thought of as either a 'low-probability' or 'low-consequence' incident. This review provides an overview of methods to prevent livestock-targeted bioterrorism and respond to terrorism involving the deliberate introduction of a pathogen-targeting livestock and poultry.

  6. Bioterrorism: Challenges and considerations

    Directory of Open Access Journals (Sweden)

    Nilima Prakash

    2010-01-01

    Full Text Available Bioterrorism, the deliberate, private use of biological agents to harm and frighten the people of a state or society, is related to the military use of biological, chemical, and nuclear weapons. Attacks with biological agents are among the most insidious and breed the greatest fear. Attacks could go undetected for a long time, potentially exposing a vast number of people, who are unaware of the threat. Dentist′s responses to catastrophes have been redefined by bioterrorism. Accurate and substantial information given to the public by credible public health and medical experts can do much to allay their fears and encourage their cooperation and participation in constructive, organized community response efforts. The dental profession could potentially play a significant role in the emergency response to a major bioterrorism attack.

  7. Possible Use of Bacteriophages Active against Bacillus anthracis and Other B. cereus Group Members in the Face of a Bioterrorism Threat

    Science.gov (United States)

    Weber-Dąbrowska, Beata; Borysowski, Jan; Górski, Andrzej

    2014-01-01

    Anthrax is an infectious fatal disease with epidemic potential. Nowadays, bioterrorism using Bacillus anthracis is a real possibility, and thus society needs an effective weapon to neutralize this threat. The pathogen may be easily transmitted to human populations. It is easy to store, transport, and disseminate and may survive for many decades. Recent data strongly support the effectiveness of bacteriophage in treating bacterial diseases. Moreover, it is clear that bacteriophages should be considered a potential incapacitative agent against bioterrorism using bacteria belonging to B. cereus group, especially B. anthracis. Therefore, we have reviewed the possibility of using bacteriophages active against Bacillus anthracis and other species of the B. cereus group in the face of a bioterrorism threat. PMID:25247187

  8. Possible Use of Bacteriophages Active against Bacillus anthracis and Other B. cereus Group Members in the Face of a Bioterrorism Threat

    Directory of Open Access Journals (Sweden)

    Ewa Jończyk-Matysiak

    2014-01-01

    Full Text Available Anthrax is an infectious fatal disease with epidemic potential. Nowadays, bioterrorism using Bacillus anthracis is a real possibility, and thus society needs an effective weapon to neutralize this threat. The pathogen may be easily transmitted to human populations. It is easy to store, transport, and disseminate and may survive for many decades. Recent data strongly support the effectiveness of bacteriophage in treating bacterial diseases. Moreover, it is clear that bacteriophages should be considered a potential incapacitative agent against bioterrorism using bacteria belonging to B. cereus group, especially B. anthracis. Therefore, we have reviewed the possibility of using bacteriophages active against Bacillus anthracis and other species of the B. cereus group in the face of a bioterrorism threat.

  9. Possible use of bacteriophages active against Bacillus anthracis and other B. cereus group members in the face of a bioterrorism threat.

    Science.gov (United States)

    Jończyk-Matysiak, Ewa; Kłak, Marlena; Weber-Dąbrowska, Beata; Borysowski, Jan; Górski, Andrzej

    2014-01-01

    Anthrax is an infectious fatal disease with epidemic potential. Nowadays, bioterrorism using Bacillus anthracis is a real possibility, and thus society needs an effective weapon to neutralize this threat. The pathogen may be easily transmitted to human populations. It is easy to store, transport, and disseminate and may survive for many decades. Recent data strongly support the effectiveness of bacteriophage in treating bacterial diseases. Moreover, it is clear that bacteriophages should be considered a potential incapacitative agent against bioterrorism using bacteria belonging to B. cereus group, especially B. anthracis. Therefore, we have reviewed the possibility of using bacteriophages active against Bacillus anthracis and other species of the B. cereus group in the face of a bioterrorism threat.

  10. [Bioterrorism: data of a recent history of risks and uncertainties].

    Science.gov (United States)

    Cardoso, Dora Rambauske; Cardoso, Telma Abdalla de Oliveira

    2011-01-01

    Today, bioterrorism is a real threat in the whole world. Considering the actions of bioterrorism by using biological agents capable of promoting great epidemics and overload in the health systems of any city, state or country, the bioterrorism is not only a health professional concern, but government and military also. This article discusses a bibliographical review done in the LILACS, MEDLINE, SciELO and REPIDISCA databases, during the period of 1997 the 2007, the characteristics of related national publications to the bioterrorism, the type of biological agents studied, and the existing knowledge in the country to face a bioterrorism event, in order to feed with information the professionals who will act in first reply to the bioterrorism events and that are essential to reduce the number of victims.

  11. Bioterrorism: pathogens as weapons.

    Science.gov (United States)

    Anderson, Peter D; Bokor, Gyula

    2012-10-01

    Biowarfare has been used for centuries. The use of biological weapons in terrorism remains a threat. Biological weapons include infectious agents (pathogens) and toxins. The most devastating bioterrorism scenario would be the airborne dispersal of pathogens over a concentrated population area. Characteristics that make a specific pathogen a high-risk for bioterrorism include a low infective dose, ability to be aerosolized, high contagiousness, and survival in a variety of environmental conditions. The most dangerous potential bioterrorism agents include the microorganisms that produce anthrax, plague, tularemia, and smallpox. Other diseases of interest to bioterrorism include brucellosis, glanders, melioidosis, Q fever, and viral encephalitis. Food safety and water safety threats are another area of concern.

  12. Development of a comparative risk ranking system for agents posing a bioterrorism threat to human or animal populations.

    Science.gov (United States)

    Tomuzia, Katharina; Menrath, Andrea; Frentzel, Hendrik; Filter, Matthias; Weiser, Armin A; Bräunig, Juliane; Buschulte, Anja; Appel, Bernd

    2013-09-01

    Various systems for prioritizing biological agents with respect to their applicability as biological weapons are available, ranging from qualitative to (semi)quantitative approaches. This research aimed at generating a generic risk ranking system applicable to human and animal pathogenic agents based on scientific information. Criteria were evaluated and clustered to create a criteria list. Considering availability of data, a number of 28 criteria separated by content were identified that can be classified in 11 thematic areas or categories. Relevant categories contributing to probability were historical aspects, accessibility, production efforts, and possible paths for dispersion. Categories associated with impact are dealing with containment measures, availability of diagnostics, preventive and treatment measures in human and animal populations, impact on society, human and veterinary public health, and economic and ecological consequences. To allow data-based scoring, each criterion was described by at least 1 measure that allows the assignment of values. These values constitute quantities, ranges, or facts that are as explicit and precise as possible. The consideration of minimum and maximum values that can occur due to natural variations and that are often described in the literature led to the development of minimum and maximum criteria and consequently category scores. Missing or incomplete data, and uncertainty resulting therefrom, were integrated into the scheme via a cautious (but not overcautious) approach. The visualization technique that was used allows the description and illustration of uncertainty on the level of probability and impact. The developed risk ranking system was evaluated by assessing the risk originating from the bioterrorism threat of the animal pathogen bluetongue virus, the human pathogen Enterohemorrhagic Escherichia coli O157:H7, the zoonotic Bacillus anthracis, and Botulinum neurotoxin.

  13. Missouri nurses' bioterrorism preparedness.

    Science.gov (United States)

    Rebmann, Terri; Mohr, Lisa Buettner

    2008-09-01

    Nurses are the largest group of healthcare providers and will be at the forefront during a response to a bioterrorism attack in the U.S. However, nurses' bioterrorism risk perceptions and their participation in bioterrorism preparedness activities, such as bioterrorism-related exercises or drills, have not been evaluated. We mailed a survey to all members of the Missouri Nurses Association in July 2006, consisting of 1,528 registered nurses. The instrument measured risk perception, perceived susceptibility, perceived seriousness, bioterrorism education received, participation in exercises/drills, and personal response plan thoroughness. The response rate was 31% (474/1,528). Most respondents believe that a bioterrorism attack will occur in the U.S. (82.3%; n = 390), but few (21.3%; n = 101) believe that one will occur in their community. The majority of nurses reported that they believe that a bioterrorism attack would have serious consequences (96.1%, n = 448), including having a serious impact on U.S. citizens' safety (90.7%, n = 446) and on their own safety (84.3%, n = 379). Most (60%, n = 284) reported that they had not received any bioterrorism-related education nor participated in any drills/exercises (82.7%, n = 392). Of those who had received education, most had participated in 3 or fewer programs and in only 1 drill. Few nurses (3.6%, n = 15) reported having all aspects of a personal bioterrorism response plan; approximately 20% (19.4%, n = 81) did not have any components of a plan. Most of the registered nurses in Missouri who were surveyed are not receiving bioterrorism education, participating in bioterrorism exercises, or developing thorough personal response plans. Nurses need to be aware of and encouraged to participate in the many education and training opportunities on bioterrorism and infectious disease disasters.

  14. Endemic, Notifiable Bioterrorism-Related Diseases, United States, 1992–1999

    OpenAIRE

    Chang, Man-Huei; Glynn, M. Kathleen; Groseclose, Samuel L.

    2003-01-01

    Little information is available in the United States regarding the incidence and distribution of diseases caused by critical microbiologic agents with the potential for use in acts of terrorism. We describe disease-specific, demographic, geographic, and seasonal distribution of selected bioterrorism-related conditions (anthrax, botulism, brucellosis, cholera, plague, tularemia, and viral encephalitides) reported to the National Notifiable Diseases Surveillance System in 1992–1999. Tularemia a...

  15. Analysis of research publications that relate to bioterrorism and risk assessment.

    Science.gov (United States)

    Barker, Gary C

    2013-09-01

    Research relating to bioterrorism and its associated risks is interdisciplinary and is performed with a wide variety of objectives. Although published reports of this research have appeared only in the past decade, there has been a steady increase in their number and a continuous diversification of sources, content, and document types. In this analysis, we explored a large set of published reports, identified from accessible indices using simple search techniques, and tried to rationalize the patterns and connectivity of the research subjects rather than the detailed content. The analysis is based on a connectivity network representation built from author-assigned keywords. Network analysis reveals a strong relationship between research aimed at bioterrorism risks and research identified with public health. Additionally, the network identifies clusters of keywords centered on emergency preparedness and food safety issues. The network structure includes a large amount of meta-information that can be used for assessment and planning of research activity and for framing specific research interests.

  16. Multi-platform comparison of ten commercial master mixes for probe-based real-time polymerase chain reaction detection of bioterrorism threat agents for surge preparedness.

    Science.gov (United States)

    Buzard, Gregory S; Baker, Daniel; Wolcott, Mark J; Norwood, David A; Dauphin, Leslie A

    2012-11-30

    The Centers for Disease Control and Prevention and United States Army Research Institute for Infectious Diseases have developed real-time PCR assays for the detection of bioterrorism threat agents. These assays all rely on a limited number of approved real-time PCR master mixes. Because the availability of these reagents is a critical element of bioterrorism preparedness, we undertook a joint national preparedness exercise to address the potential surge needs resulting from a large-scale bio-emergency. We identified 9 commercially-available potential alternatives to an existing approved master mix (LightCycler FastStart DNA Master HybProbes): the TaqMan Fast Universal PCR master mix, OmniMix HS, FAST qPCR master mix, EXPRESS qPCR SuperMix kit, QuantiFast Probe PCR kit, LightCycler FastStart DNA Master(PLUS) HybProbe, Brilliant II FAST qPCR master mix, ABsolute Fast QPCR Mix and the HotStart IT Taq master mix. The performances of these kits were evaluated by the use of real-time PCR assays for four bioterrorism threat agents: Bacillus anthracis, Brucella melitensis, Burkholderia mallei and Francisella tularensis. The master mixes were compared for target-specific detection levels, as well as consistency of results among three different real-time PCR platforms (LightCycler, SmartCycler and 7500 Fast Dx). Real-time PCR analysis revealed that all ten kits performed well for agent detection on the 7500 Fast Dx instrument; however, the QuantiFast Probe PCR kit yielded the most consistently positive results across multiple real-time PCR platforms. We report that certain combinations of commonly used master mixes and instruments are not as reliable as others at detecting low concentrations of target DNA. Furthermore, our study provides laboratories the option to select from the commercial kits we evaluated to suit their preparedness needs.

  17. Bioterrorism Preparedness: What School Counselors Need to Know

    Science.gov (United States)

    Baggerly, Jennifer N.; Rank, Michael G.

    2005-01-01

    To ensure the safety of school-aged children and adolescents, school counselors must not ignore or deny the public health threat of bioterrorism (Henderson, 1998). Rather, school counselors must be prepared with knowledge about bioterrorism and intervention skills. Bioterrorism within the United States is a continuing threat. Because children and…

  18. Bioterrorism and invasive species.

    Science.gov (United States)

    Chomel, B B; Sun, B

    2010-08-01

    The risk of dispersing invasive species, especially human pathogens, through acts of bioterrorism, cannot be neglected. However, that risk appears quite low in comparison with the risk of dispersing animal pathogens that could dramatically burden the agricultural economy of food animal producing countries, such as Australia and countries in Europe and North and South America. Although it is not directly related to bioterrorism, the intentional release of non-native species, particularly undesired companion animals or wildlife, may also have a major economic impact on the environment and, possibly, on animal and human health, in the case of accidental release of zoonotic agents.

  19. Towards securing SCADA systems against process-related threats

    NARCIS (Netherlands)

    Hadziosmanovic, Dina; Bolzoni, Damiano; Hartel, Pieter

    2010-01-01

    We propose a tool-assisted approach to address process-related threats on SCADA systems. Process-related threats have not been addressed before in a systematic manner. Our approach consists of two steps: threat analysis and threat mitigation. For the threat analysis, we combine two methodologies (PH

  20. Optimal swab processing recovery method for detection of bioterrorism-related Francisella tularensis by real-time PCR.

    Science.gov (United States)

    Walker, Roblena E; Petersen, Jeannine M; Stephens, Kenyatta W; Dauphin, Leslie A

    2010-10-01

    Francisella tularensis, the etiological agent of tularemia, is regarded as a potential bioterrorism agent. The advent of bioterrorism has heightened awareness of the need for validated methods for processing environmental samples. In this study we determined the optimal method for processing environmental swabs for the recovery and subsequent detection of F. tularensis by the use of real-time PCR assays. Four swab processing recovery methods were compared: heat, sonication, vortexing, and the Swab Extraction Tube System (SETS). These methods were evaluated using cotton, foam, polyester and rayon swabs spiked with six pathogenic strains of F. tularensis. Real-time PCR analysis using a multi-target 5'nuclease assay for F. tularensis showed that the use of the SETS method resulted in the best limit of detection when evaluated using multiple strains of F. tularensis. We demonstrated also that the efficiency of F. tularensis recovery from swab specimens was not equivalent for all swab processing methodologies and, thus, that this variable can affect real-time PCR assay sensitivity. The effectiveness of the SETS method was independent of the automated DNA extraction method and real-time PCR platforms used. In conclusion, diagnostic laboratories can now potentially incorporate the SETS method into specimen processing protocols for the rapid and efficient detection of F. tularensis by real-time PCR during laboratory bioterrorism-related investigations.

  1. Identification and analysis of obstacles in bioterrorism preparedness and response

    Science.gov (United States)

    Sincavage, Suzanne Michele

    The focus of this study was to identify and analyze the obstacles to bioterrorism preparedness and response facing emergency management agencies and public authorities. In order to establish the limits of this discussion, the obstacles will examine a combined conceptual framework of public health, environmental security and social response. The interdisciplinary characteristics of this framework are ideal for addressing the issue of bioterrorism because of its simultaneous impact, which encompasses the complex interrelationships that pertain to public health and national security and social response. Based on a review of literature, the obstacles presented range from the absence of an effective surveillance system for biological terrorism related diseases to the inadequate training of first responders in bioterrorism preparedness and the difficult challenges of a mass casualty situation and the intense pressures associated with the crisis response. Furthermore, the impending reality of bioterrorism will further illustrate a close examination of the characteristics and management of three major biowarfare agents---anthrax, plague and smallpox. Finally, to provide a realistic understanding of the impact of bioterrorism, three case studies of actual events and two hypothetical scenarios will be discussed. Specifically, the discussion will provide the following three unconventional terrorist attacks: the recent anthrax attacks of 2001, the Aum Shinrikyo's attack of the Tokyo subway in 1995, and the Rajneeshees' use of salmonella poisoning in 1994. The inclusion of the hypothetical scenarios of two massive outbreaks of smallpox and anthrax will be presented to illuminate the seriousness and magnitude of the threat of bioterrorism and the probable consequences of failing to overcome the obstacles presented in this study. The importance of this research cannot be overemphasized, the threat is undeniably serious, and the potential for biological agents to cause devastating

  2. [Analysis of policies in activating the Infectious Disease Specialist Network (IDSN) for bioterrorism events].

    Science.gov (United States)

    Kim, Yang Soo

    2008-07-01

    Bioterrorism events have worldwide impacts, not only in terms of security and public health policy, but also in other related sectors. Many countries, including Korea, have set up new administrative and operational structures and adapted their preparedness and response plans in order to deal with new kinds of threats. Korea has dual surveillance systems for the early detection of bioterrorism. The first is syndromic surveillance that typically monitors non-specific clinical information that may indicate possible bioterrorism-associated diseases before specific diagnoses are made. The other is infectious disease specialist network that diagnoses and responds to specific illnesses caused by intentional release of biologic agents. Infectious disease physicians, clinical microbiologists, and infection control professionals play critical and complementary roles in these networks. Infectious disease specialists should develop practical and realistic response plans for their institutions in partnership with local and state health departments, in preparation for a real or suspected bioterrorism attack.

  3. Bioterrorism and Smallpox: Policies, Practices, and Implications for Social Work

    Science.gov (United States)

    Mackelprang, Romel W.; Mackelprang, Romel D.; Thirkill, Ashley D.

    2005-01-01

    Terrorist acts and the fear of terrorism have become a part of everyday life in the early 21st century. Among the threats most feared is bioterrorism, including the intentional release of smallpox. With the invasion of Iraq and toppling of the Saddam Hussein regime, acute bioterrorism fears have abated; however, an ongoing threat remains. This…

  4. The Critical Role of Pathology in the Investigation of Bioterrorism-Related Cutaneous Anthrax

    OpenAIRE

    Shieh, Wun-Ju; Guarner, Jeannette; Paddock, Christopher; Greer, Patricia; Tatti, Kathleen; Fischer, Marc; Layton, Marci; Philips, Michael; Bresnitz, Eddy; Quinn, Conrad P.; Popovic, Tanja; Perkins, Bradley A.; Zaki, Sherif R.

    2003-01-01

    Cutaneous anthrax is a rare zoonotic disease in the United States. The clinical diagnosis traditionally has been established by conventional microbiological methods, such as culture and gram staining. However, these methods often yield negative results when patients have received antibiotics. During the bioterrorism event of 2001, we applied two novel immunohistochemical assays that can detect Bacillus anthracis antigens in skin biopsy samples even after prolonged antibiotic treatment. These ...

  5. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  6. Posttraumatic Stress Disorder in Rural Primary Care: Improving Care for Mental Health Following Bioterrorism

    Science.gov (United States)

    Tsao, Jennie C. I.; Dobalian, Aram; Wiens, Brenda A.; Gylys, Julius A.; Evans, Garret D.

    2006-01-01

    Context: Recent bioterrorist attacks have highlighted the critical need for health care organizations to prepare for future threats. Yet, relatively little attention has been paid to the mental health needs of rural communities in the wake of such events. A critical aspect of bioterrorism is emphasis on generating fear and uncertainty, thereby…

  7. Biodefense and Bioterrorism

    Science.gov (United States)

    A bioterrorism attack is the deliberate release of viruses, bacteria, or other germs to cause illness or death. These ... Biodefense uses medical measures to protect people against bioterrorism. This includes medicines and vaccinations. It also includes ...

  8. Biowarfare and bioterrorism.

    Science.gov (United States)

    Christian, Michael D

    2013-07-01

    Bioterrorism is not only a reality of the times in which we live but bioweapons have been used for centuries. Critical care physicians play a major role in the recognition of and response to a bioterrorism attack. Critical care clinicians must be familiar with the diagnosis and management of the most likely bioterrorism agents, and also be adequately prepared to manage a mass casualty situation. This article reviews the epidemiology, diagnosis, and treatment of the most likely agents of biowarfare and bioterrorism.

  9. Incorporating bioterrorism content in the nursing curriculum: a creative approach.

    Science.gov (United States)

    Carter, Melondie R; Gaskins, Susan W

    2010-07-01

    The community health faculty has developed a creative and comprehensive approach with community agencies to present bioterrorism content that could be useful to community health faculty in other schools of nursing. Since September 11, 2001, the United States has recognized that the threat of bioterrorism is real. Nurses are recognized by the American Association of Colleges of Nursing as key players in disaster response efforts. However, bioterrorism knowledge among nurses and nursing students has been reported to be low, and textbooks do not include comprehensive information about bioterrorism preparedness. Our college of nursing has collaborated with the U.S. Public Health Department to design a creative educational experience for community health students on bioterrorism and disaster preparedness. Content areas include the National Stockpile, the Planned Response to Pandemic Influenza provided by the U.S. Public Health Department, recognition and treatment of biological threats, and the care of patients with smallpox.

  10. [Protection against bioterrorism acts in Poland].

    Science.gov (United States)

    Chomiczewski, Krzysztof

    2003-01-01

    In this article general principles of defense against bioterrorism are presented. Furthermore, the effort, already undertaken for organization of the system enabling effective countermeasures to this threat as well as liquidation of the effects of such an event, is shown. PMID:12910607

  11. Hawaii veterinarians' bioterrorism preparedness needs assessment survey.

    Science.gov (United States)

    Katz, Alan R; Nekorchuk, Dawn M; Holck, Peter S; Hendrickson, Lisa A; Imrie, Allison A; Effler, Paul V

    2006-01-01

    The purpose of this study was to assess the objective bioterrorism-related knowledge base and the perceived response readiness of veterinarians in Hawaii to a bioterrorism event, and also to identify variables associated with knowledge-based test performance. An anonymous survey instrument was mailed to all licensed veterinarians residing in Hawaii (N = 229) up to three times during June and July 2004, using numeric identifiers to track non-respondents. The response rate for deliverable surveys was 59% (125 of 212). Only 12% (15 of 123) of respondents reported having had prior training on bioterrorism. Forty-four percent (55 of 125) reported being able to identify a bioterrorism event in animal populations; however, only 17% (21 of 125) felt able to recognize a bioterrorism event in human populations. Only 16% (20 of 123) felt they were able to respond effectively to a bioterrorist attack. Over 90% (106 of 116) expressed their willingness to provide assistance to the state in its response to a bioterrorist event. Veterinarians scored a mean of 70% correct (5.6 out of 8 questions) on the objective knowledge-based questions. Additional bioterrorism preparedness training should be made available, both in the form of continuing educational offerings for practicing veterinarians and as a component of the curriculum in veterinary schools.

  12. Patients' request for and emergency physicians' prescription of antimicrobial prophylaxis for anthrax during the 2001 bioterrorism-related outbreak

    Directory of Open Access Journals (Sweden)

    Aber Robert C

    2005-01-01

    Full Text Available Abstract Background Inappropriate use of antibiotics by individuals worried about biological agent exposures during bioterrorism events is an important public health concern. However, little is documented about the extent to which individuals with self-identified risk of anthrax exposure approached physicians for antimicrobial prophylaxis during the 2001 bioterrorism attacks in the United States. Methods We conducted a telephone survey of randomly selected members of the Pennsylvania Chapter of the American College of Emergency Physicians to assess patients' request for and emergency physicians' prescription of antimicrobial agents during the 2001 anthrax attacks. Results Ninety-seven physicians completed the survey. Sixty-four (66% respondents had received requests from patients for anthrax prophylaxis; 16 (25% of these physicians prescribed antibiotics to a total of 23 patients. Ten physicians prescribed ciprofloxacin while 8 physicians prescribed doxycycline. Conclusion During the 2001 bioterrorist attacks, the majority of the emergency physicians we surveyed encountered patients who requested anthrax prophylaxis. Public fears may lead to a high demand for antibiotic prophylaxis during bioterrorism events. Elucidation of the relationship between public health response to outbreaks and outcomes would yield insights to ease burden on frontline clinicians and guide strategies to control inappropriate antibiotic allocation during bioterrorist events.

  13. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Emergency Response Guide Reaching At-Risk Populations MedCon Video: "The History of Bioterrorism" Recommend on Facebook Tweet Share Compartir This video describes the Category A diseases: smallpox, anthrax, botulism, ...

  14. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Guide Reaching At-Risk Populations MedCon Video: "The History of Bioterrorism" Recommend on Facebook Tweet Share Compartir ... as bioterrorist weapons. Watch the Complete Program "The History of Bioterroism" (26 min 38 sec) Watch Specific ...

  15. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... for Emergency Health Professionals Clinician Outreach (COCA) Crisis & Risk Communication (CERC) Laboratory Information Health Alert Network (HAN) ... Cleaning Public Health Emergency Response Guide Reaching At-Risk Populations MedCon Video: "The History of Bioterrorism" Recommend ...

  16. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Chemical Release Bioterrorism Information for Specific Groups Older Adults Children and Their Caregivers People with Disabilities People ... Disaster Public Health Assessment and Surveillance Tools Training & Education Emergency Responder Health Monitoring & Surveillance (ERHMS) ERHMS Online ...

  17. History of Bioterrorism: Botulism

    Science.gov (United States)

    ... Guide Reaching At-Risk Populations MedCon Video: "The History of Bioterrorism" Recommend on Facebook Tweet Share Compartir ... as bioterrorist weapons. Watch the Complete Program "The History of Bioterroism" (26 min 38 sec) Watch Specific ...

  18. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Release Bioterrorism Information for Specific Groups Older Adults Children and Their Caregivers People with Disabilities People with ... people, they would cause the most illness and death. Watch this video to learn how some of ...

  19. A vector relational data modeling approach to Insider threat intelligence

    Science.gov (United States)

    Kelly, Ryan F.; Anderson, Thomas S.

    2016-05-01

    We address the problem of detecting insider threats before they can do harm. In many cases, co-workers notice indications of suspicious activity prior to insider threat attacks. A partial solution to this problem requires an understanding of how information can better traverse the communication network between human intelligence and insider threat analysts. Our approach employs modern mobile communications technology and scale free network architecture to reduce the network distance between human sensors and analysts. In order to solve this problem, we propose a Vector Relational Data Modeling approach to integrate human "sensors," geo-location, and existing visual analytics tools. This integration problem is known to be difficult due to quadratic increases in cost associated with complex integration solutions. A scale free network integration approach using vector relational data modeling is proposed as a method for reducing network distance without increasing cost.

  20. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks.

  1. Computer Viruses and Related Threats: A Management Guide.

    Science.gov (United States)

    Wack, John P.; Carnahan, Lisa J.

    This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…

  2. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. PMID:24890710

  3. Bioterrorism and Real-World Science

    Science.gov (United States)

    Johnson, Carla

    2003-01-01

    Recent events, such as the anthrax scares and the SARS outbreak, have forced teachers to focus on issues such as disease control and bioterrorism in their own backyards. Students are aware of the current biological issues in the news and are curious about infectious diseases and the issues relating to biological warfare. In order to address the…

  4. Evaluation of an Online Bioterrorism Continuing Medical Education Course

    Science.gov (United States)

    Casebeer, Linda; Andolsek, Kathryn; Abdolrasulnia, Maziar; Green, Joseph; Weissman, Norman; Pryor, Erica; Zheng, Shimin; Terndrup, Thomas

    2006-01-01

    Introduction: Much of the international community has an increased awareness of potential biologic, chemical, and nuclear threats and the need for physicians to rapidly acquire new knowledge and skills in order to protect the public's health. The present study evaluated the educational effectiveness of an online bioterrorism continuing medical…

  5. A Program Against Bacterial Bioterrorism

    DEFF Research Database (Denmark)

    Kemp, Michael; Dargis, Rimtas; Andresen, Keld;

    2012-01-01

    In 2002 it was decided to establish laboratory facilities in Denmark for diagnosing agents associated with bioterrorism in order to make an immediate appropriate response to the release of such agents possible. Molecular assays for detection of specific agents and molecular and proteomic techniques...... for bacterial infections not associated with bioterrorism that are difficult to culture or identify....

  6. Bioterrorism versus radiological terrorism: notes from a bio/nuclear epidemiologist.

    Science.gov (United States)

    Goffman, Thomas E

    2009-01-01

    The antiterrorism and disaster planning communities often speak of the high potential for bioterrorism and possible potential for radioterrorism, specifically the explosion of a fission device on US soil. Information gained from an epidemiologist's work in the national and international scene, which inevitably involves Intel regarding the cultures and subcultures being studied, suggest that bioterrorism is far less likely to be a major threat, that has been over-emphasized at the state level due to warnings from Homeland Security, and that Homeland Security itself appears biased toward bioterrorism of late with very little available rational basis.

  7. Survey of threat studies related to the nuclear power industry

    International Nuclear Information System (INIS)

    A considerable effort has been directed toward the determination of threat characteristics, resulting in a voluminous collection of documents. This report summarizes several of the major studies in order to make the information more accessible. This summary includes only studies involving attacks on nuclear material, plus those incidents which because of their objectives, resources, or motivations may lend insight into potential threat against nuclear facilities or material

  8. [Bioterrorism, parasites as potential bioterrorism agents and biosecurity studies].

    Science.gov (United States)

    Aksoy, Umit

    2006-01-01

    A variety of agents have a potential risk for being use as weapons of biological terrorism. However, the use of parasites as bioterrorism agents has not received so much attention. Parasites could contribute to the installation of fear in human population upon intentional addition to their food and water supplies. On the other hand, vector-borne parasites can also constitute risk of bioterrorism. Biosecurity issues are gaining importance as a consequence of globalization. Surveillance is critical in maintaining biosecurity and early detection of infectious disease agents is essential. In this review article, bioterrorism, the role of parasites as potential bioterrorism agents, studies on biosecurity and laboratory design for biosafety have been discussed under the light of recent literature.

  9. Bioterrorism: toxins as weapons.

    Science.gov (United States)

    Anderson, Peter D

    2012-04-01

    The potential for biological weapons to be used in terrorism is a real possibility. Biological weapons include infectious agents and toxins. Toxins are poisons produced by living organisms. Toxins relevant to bioterrorism include ricin, botulinum, Clostridium perfrigens epsilson toxin, conotoxins, shigatoxins, saxitoxins, tetrodotoxins, mycotoxins, and nicotine. Toxins have properties of biological and chemical weapons. Unlike pathogens, toxins do not produce an infection. Ricin causes multiorgan toxicity by blocking protein synthesis. Botulinum blocks acetylcholine in the peripheral nervous system leading to muscle paralysis. Epsilon toxin damages cell membranes. Conotoxins block potassium and sodium channels in neurons. Shigatoxins inhibit protein synthesis and induce apoptosis. Saxitoxin and tetrodotoxin inhibit sodium channels in neurons. Mycotoxins include aflatoxins and trichothecenes. Aflatoxins are carcinogens. Trichothecenes inhibit protein and nucleic acid synthesis. Nicotine produces numerous nicotinic effects in the nervous system.

  10. John Bartlett and bioterrorism.

    Science.gov (United States)

    Henderson, D A

    2014-09-15

    Until 1997, the subject of bioterrorism was not discussed within the medical community and deliberately ignored in national planning efforts. Biological weapons were regarded as "morally repulsive." This complacency stemmed from a 1972 Biological Weapons Convention where all countries agreed to cease offensive biological weapons research. In the 1990s, however, the Soviet Union was discovered to have an extensive bioweapons program and a Japanese religious cult sought to launch an anthrax attack on Tokyo. Biological weapons such as smallpox and anthrax had the potential to cause a national catastrophe. However, little was done until John Bartlett in 1997 led a symposium and program to educate the medical community and the country of the need for definitive bioweapons programs. It was highly persuasive and received a final stimulus when the anthrax attack occurred in the United States in 2001.

  11. Antimicrobials for bacterial bioterrorism agents.

    Science.gov (United States)

    Sarkar-Tyson, Mitali; Atkins, Helen S

    2011-06-01

    The limitations of current antimicrobials for highly virulent pathogens considered as potential bioterrorism agents drives the requirement for new antimicrobials that are suitable for use in populations in the event of a deliberate release. Strategies targeting bacterial virulence offer the potential for new countermeasures to combat bacterial bioterrorism agents, including those active against a broad spectrum of pathogens. Although early in the development of antivirulence approaches, inhibitors of bacterial type III secretion systems and cell division mechanisms show promise for the future.

  12. Rodents as potential couriers for bioterrorism agents.

    Science.gov (United States)

    Lõhmus, Mare; Janse, Ingmar; van de Goot, Frank; van Rotterdam, Bart J

    2013-09-01

    Many pathogens that can cause major public health, economic, and social damage are relatively easily accessible and could be used as biological weapons. Wildlife is a natural reservoir for many potential bioterrorism agents, and, as history has shown, eliminating a pathogen that has dispersed among wild fauna can be extremely challenging. Since a number of wild rodent species live close to humans, rodents constitute a vector for pathogens to circulate among wildlife, domestic animals, and humans. This article reviews the possible consequences of a deliberate spread of rodentborne pathogens. It is relatively easy to infect wild rodents with certain pathogens or to release infected rodents, and the action would be difficult to trace. Rodents can also function as reservoirs for diseases that have been spread during a bioterrorism attack and cause recurring disease outbreaks. As rats and mice are common in both urban and rural settlements, deliberately released rodentborne infections have the capacity to spread very rapidly. The majority of pathogens that are listed as potential agents of bioterrorism by the Centers for Disease Control and Prevention and the National Institute of Allergy and Infectious Diseases exploit rodents as vectors or reservoirs. In addition to zoonotic diseases, deliberately released rodentborne epizootics can have serious economic consequences for society, for example, in the area of international trade restrictions. The ability to rapidly detect introduced diseases and effectively communicate with the public in crisis situations enables a quick response and is essential for successful and cost-effective disease control.

  13. Brucella as a potential agent of bioterrorism.

    Science.gov (United States)

    Doganay, Gizem D; Doganay, Mehmet

    2013-04-01

    Perception on bioterrorism has changed after the deliberate release of anthrax by the postal system in the United States of America in 2001. Potential bioterrorism agents have been reclassified based on their dissemination, expected rate of mortality, availability, stability, and ability to lead a public panic. Brucella species can be easily cultured from infected animals and human materials. Also, it can be transferred, stored and disseminated easily. An intentional contamination of food with Brucella species could pose a threat with low mortality rate. Brucella spp. is highly infectious through aerosol route, making it an attractive pathogen to be used as a potential agent for biological warfare purposes. Recently, many studies have been concentrated on appropriate sampling of Brucella spp. from environment including finding ways for its early detection and development of new decontamination procedures such as new drugs and vaccines. There are many ongoing vaccine development studies; some of which recently received patents for detection and therapy of Brucella spp. However, there is still no available vaccine for humans. In this paper, recent developments and recent patents on brucellosis are reviewed and discussed.

  14. Enhanced Olfactory Sensory Perception of Threat in Anxiety: An Event-Related fMRI Study

    OpenAIRE

    Krusemark, Elizabeth A.; Li, Wen

    2012-01-01

    The current conceptualization of threat processing in anxiety emphasizes emotional hyper-reactivity, which mediates various debilitating symptoms and derangements in anxiety disorders. Here, we investigated olfactory sensory perception of threat as an alternative causal mechanism of anxiety. Combining an event-related functional magnetic resonance imaging paradigm with an olfactory discrimination task, we examined how anxiety modulates basic perception of olfactory threats at behavioral and n...

  15. Bioterrorism: intentional introduction of animal disease.

    Science.gov (United States)

    Clarke, N P; Rinderknecht, J L

    2011-04-01

    The possibility of the intentional introduction of animal disease as an act of bioterrorism adds a new dimension to the development of strategies for assessment, prevention, response and recovery from exotic diseases, including the zoonoses. The vulnerability of livestock operations, the likelihood of success, the possibility of the use of genetically engineered organisms and limited resources to handle multiple outbreaks place new pressures on policy-makers and emergency responders to make best use of limited resources. The methods for managing a natural occurrence or accidental introduction of high-consequence diseases are generally applicable to containment and recovery from outbreaks of intentionally introduced animal diseases. Zoonotic agents increase the complexity at both international and national levels. Modern biology provides both increased threat of new disease entities and methods for earlier and more effective detection and intervention. Improved methods are emerging for defining trade restrictions and animal movement and for determining when it is safe to resume normal trade.

  16. Exploring Parents' and Children's Awareness on Internet Threats in Relation to Internet Safety

    Science.gov (United States)

    Ktoridou, Despo; Eteokleous, Nikleia; Zahariadou, Anastasia

    2012-01-01

    Purpose: The purpose of the study is to explore parents' level of awareness in relation to the threats that children are exposed to when using the internet. Additionally, it explores the parental interest to raise their awareness on internet use and threats, as well as investigating their interest in establishing household environment safety…

  17. FOOD SAFETY AND BIOTERRORISM

    Science.gov (United States)

    This book chapter describes the scope of the bioterrorist threat to the United States food supply in terms of food service establishments. Descriptions include the organisms and other agents that may be disseminated by food ingestion and the challenges in differentiation of intentional and unintenti...

  18. Integrating the Agents of Bioterrorism into the General Biology Curriculum: 1. A Primer on Bioterrorism.

    Science.gov (United States)

    Pommerville, Jeffrey

    2002-01-01

    Reviews the history of and describes what biology educators should know about the topic of bioterrorism. Suggests materials that can be used to communicate more effectively with students and the community and prepare a classroom discussion on bioterrorism. (KHR)

  19. Kairos as Indeterminate Risk Management: The Pharmaceutical Industry's Response to Bioterrorism

    Science.gov (United States)

    Scott, J. Blake

    2006-01-01

    The pharmaceutical industry's response to the threat of bioterrorism following 9-11 invoked the rhetorical notion of kairos as an urgent and ongoing opportunity not only to protect the nation but also to improve the industry's reputation and fortify its political power. Yet the notion of kairos as seizing an advantage--grounded in modernist…

  20. Actionable Knowledge and Strategic Decision Making for Bio- and Agroterrorism Threats: Building a Collaborative Early Warning Culture

    DEFF Research Database (Denmark)

    Mårtensson, Per-Åke; Hedström, Lars; Sundelius, Bengt;

    2013-01-01

    commission reports that reflect concerns about non-state actors in asymmetric threats. The intersectoral and international nature of bioterrorism and agroterrorism threats requires collaboration across several sectors including intelligence, police, forensics, customs, and other law enforcement organizations...

  1. The influence of red on perceptions of relative dominance and threat in a competitive context.

    Science.gov (United States)

    Feltman, Roger; Elliot, Andrew J

    2011-04-01

    Recent research has revealed that a person or team wearing red is more likely to win a physical contest than a person or team wearing another color. In the present research, we examined whether red influences perceptions of relative dominance and threat in an imagined same-sex competitive context, and did so attending to the distinction between wearing red oneself and viewing red on an opponent. Results revealed a bidirectional effect: wearing red enhanced perceptions of one's relative dominance and threat, and viewing an opponent in red enhanced perceptions of the opponent's relative dominance and threat. These effects were observed across sex, and participants seemed unaware of the influence of red on their responses. Our findings lead to practical suggestions regarding the use of colored attire in sport contexts, and add to an emerging, provocative literature indicating that red has a subtle but important influence on psychological functioning.

  2. Metabolic network analysis-based identification of antimicrobial drug targets in category A bioterrorism agents.

    Science.gov (United States)

    Ahn, Yong-Yeol; Lee, Deok-Sun; Burd, Henry; Blank, William; Kapatral, Vinayak

    2014-01-01

    The 2001 anthrax mail attacks in the United States demonstrated the potential threat of bioterrorism, hence driving the need to develop sophisticated treatment and diagnostic protocols to counter biological warfare. Here, by performing flux balance analyses on the fully-annotated metabolic networks of multiple, whole genome-sequenced bacterial strains, we have identified a large number of metabolic enzymes as potential drug targets for each of the three Category A-designated bioterrorism agents including Bacillus anthracis, Francisella tularensis and Yersinia pestis. Nine metabolic enzymes- belonging to the coenzyme A, folate, phosphatidyl-ethanolamine and nucleic acid pathways common to all strains across the three distinct genera were identified as targets. Antimicrobial agents against some of these enzymes are available. Thus, a combination of cross species-specific antibiotics and common antimicrobials against shared targets may represent a useful combinatorial therapeutic approach against all Category A bioterrorism agents.

  3. Metabolic network analysis-based identification of antimicrobial drug targets in category A bioterrorism agents.

    Directory of Open Access Journals (Sweden)

    Yong-Yeol Ahn

    Full Text Available The 2001 anthrax mail attacks in the United States demonstrated the potential threat of bioterrorism, hence driving the need to develop sophisticated treatment and diagnostic protocols to counter biological warfare. Here, by performing flux balance analyses on the fully-annotated metabolic networks of multiple, whole genome-sequenced bacterial strains, we have identified a large number of metabolic enzymes as potential drug targets for each of the three Category A-designated bioterrorism agents including Bacillus anthracis, Francisella tularensis and Yersinia pestis. Nine metabolic enzymes- belonging to the coenzyme A, folate, phosphatidyl-ethanolamine and nucleic acid pathways common to all strains across the three distinct genera were identified as targets. Antimicrobial agents against some of these enzymes are available. Thus, a combination of cross species-specific antibiotics and common antimicrobials against shared targets may represent a useful combinatorial therapeutic approach against all Category A bioterrorism agents.

  4. Sugar-Coated PPE's, Novel Nanomaterial's and Sensing Modules for Disease and Bioterrorism Related Threats

    Energy Technology Data Exchange (ETDEWEB)

    Bunz, Uwe [Georgia Inst. of Technology, Atlanta, GA (United States)

    2003-11-21

    The detection and sensing of biological warfare agents (ricin, anthrax toxin), of disease agents (cholera, botulinum, and tetnus toxins, influenza virus, etc.) and of biologically active species important for national security and disease control.

  5. Technical Report for DE-FG02-03ER46029 Sugar-Coated PPEs, Novel Nanomaterials and Sensing Modules for Disease and Bioterrorism Related Threats

    Energy Technology Data Exchange (ETDEWEB)

    Uwe Bunz

    2003-08-27

    The detection and sensing of biological warfare agents (Ricin, Anthrax toxin), of disease agents (cholera, botulinum and tetanus toxins, influenza virus etc) and of biologically active species is important for national security and disease control. A premiere goal would be the simple colorimetric or fluorimetric detection of such toxins by a dipstick test. It would be desirable to sense 5,000-10,000 toxin molecules, i.e. 10-100 fg of a toxin contained 1-5 mL of sample. Fluorescent conjugated polymers should be particularly interesting in this regard, because they can carry multiple identical and/or different recognition units. Such an approach is particularly valuable for the detection of lectin toxins, because these bind to oligomeric carbohydrate displays. Lectins bind multivalently to sugars, i.e. several covalently connected sugar moieties have to be exposed to the lectin at the same time to obtain binding. The requirement of multivalency of the lectin-sugar interactions should allow a very sensitive detection of lectins with sugar coated conjugated polymers in an agglutination type assay, where the fluorescence of the PPEs disappears upon binding to the lectins. High molecular weights of the used PPEs would mean high sensitivity. Herein we present our progress towards that goal up to date.

  6. Threat Related Selective Attention Predicts Treatment Success in Childhood Anxiety Disorders

    Science.gov (United States)

    Legerstee, Jeroen S.; Tulen, Joke H. M.; Kallen, Victor L.; Dieleman, Gwen C.; Treffers, Philip D. A.; Verhulst, Frank C.; Utens, Elisabeth M. W. J.

    2009-01-01

    Threat-related selective attention was found to predict the success of the treatment of childhood anxiety disorders through administering a pictorial dot-probe task to 131 children with anxiety disorders prior to cognitive behavioral therapy. The diagnostic status of the subjects was evaluated with a semistructured clinical interview at both pre-…

  7. Bioterrorism and the Fermi Paradox

    Science.gov (United States)

    Cooper, Joshua

    2013-04-01

    We proffer a contemporary solution to the so-called Fermi Paradox, which is concerned with conflict between Copernicanism and the apparent paucity of evidence for intelligent alien civilizations. In particular, we argue that every community of organisms that reaches its space-faring age will (1) almost immediately use its rocket-building computers to reverse-engineer its genetic chemistry and (2) self-destruct when some individual uses said technology to design an omnicidal pathogen. We discuss some of the possible approaches to prevention with regard to Homo sapiens' vulnerability to bioterrorism, particularly on a short-term basis.

  8. [The strategic plan for preparedness and response to bioterrorism in Korea].

    Science.gov (United States)

    Hwang, Hyun Soon

    2008-07-01

    Following the Anthrax bioterrorism attacks in the US in 2001, the Korean government established comprehensive countermeasures against bioterrorism. These measures included the government assuming management of all infectious agents that cause diseases, including smallpox, anthrax, plaque, botulism, and the causative agents of viral hemorrhagic fevers (ebola fever, marburg fever, and lassa fever) for national security. In addition, the Korean government is reinforcing the ability to prepare and respond to bioterrorism. Some of the measures being implemented include revising the laws and guidelines that apply to the use of infectious agents, the construction and operation of dual surveillance systems for bioterrorism, stockpiling and managing products necessary to respond to an emergency (smallpox vaccine, antibiotics, etc.) and vigorously training emergency room staff and heath workers to ensure they can respond appropriately. In addition, the government's measures include improved public relations, building and maintaining international cooperation, and developing new vaccines and drugs for treatments of infectious agents used to create bioweapons.

  9. Monitoring style of coping with cancer related threats: a review of the literature.

    Science.gov (United States)

    Roussi, Pagona; Miller, Suzanne M

    2014-10-01

    Building on the Cognitive-Social Health Information-Processing model, this paper provides a theoretically guided review of monitoring (i.e., attend to and amplify) cancer-related threats. Specifically, the goals of the review are to examine whether individuals high on monitoring are characterized by specific cognitive, affective, and behavioral responses to cancer-related health threats than individuals low on monitoring and the implications of these cognitive-affective responses for patient-centered outcomes, including patient-physician communication, decision-making and the development of interventions to promote adherence and adjustment. A total of 74 reports were found, based on 63 studies, 13 of which were intervention studies. The results suggest that although individuals high on monitoring are more knowledgeable about health threats, they are less satisfied with the information provided. Further, they tend to be characterized by greater perceived risk, more negative beliefs, and greater value of health-related information and experience more negative affective outcomes. Finally, individuals high on monitoring tend to be more demanding of the health providers in terms of desire for more information and emotional support, are more assertive during decision-making discussions, and subsequently experience more decisional regret. Psychoeducational interventions improve outcomes when the level and type of information provided is consistent with the individual's monitoring style and the demands of the specific health threat. Implications for patient-centered outcomes, in terms of tailoring of interventions, patient-provider communication, and decision-making, are discussed. PMID:24488543

  10. Threat, prejudice and stereotyping in the context of Japanese, North Korean, and South Korean intergroup relations.

    OpenAIRE

    Myers, Chris; Abrams, Dominic; Rosenthal, Harriet E.S.; Christian, Julie

    2013-01-01

    Integrated threat theory, realistic conflict theory, and group justification (based on social identity theory) were evaluated in the international context of Japanese prejudice toward North Korea and South Korea. Military threat emerged as an important addition to the four threats outlined by integrated threat theory. Three perceived North Korean threats (realistic [domestic] threat; intergroup anxiety; military threat) predicted prejudice toward North Korea. North Korean preju...

  11. Mitigation Policy Scenario of Space Debris Threat Related with National Security

    Science.gov (United States)

    Herdiansyah, Herdis; Frimawaty, Evy; Munir, Ahmad

    2016-02-01

    The development of air space recently entered a new phase, when the space issues correlated with the future of a country. In past time, the space authorization was related with advancing technology by many space mission and various satellite launchings, or it could be said that who ruled technology will rule the space. Therefore, the numerous satellites in the space could be a threat for the countries which are mainly located in the path of the satellite, especially in the equatorial region including Indonesia. This study aims to create a policy scenario in mitigating the threat of space debris. The results showed that although space debris was not threatened national security for now, but the potential and its impact on the future potentially harmful. The threats of orbit circulation for some experts considered as a threat for national security, because its danger potential which caused by space debris could significantly damage the affected areas. However, until now Indonesia has no comprehensive mitigation strategy for space matters although it has been ratified by the United Nations Convention.

  12. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  13. Animal Botulism Outcomes in the AniBioThreat Project

    DEFF Research Database (Denmark)

    Woudstra, Cédric; Tevell Åberg, Annica; Skarin, Hanna;

    2013-01-01

    and botulinum neurotoxins are considered potential weapons for bioterrorism and have been included in the Australia Group List of Biological Agents. In 2010 the European Commission (DG Justice, Freedom and Security) funded a 3-year project named AniBioThreat to improve the EU's capacity to counter animal...... bioterrorism threats. A detection portfolio with screening methods for botulism agents and incidents was needed to improve tracking and tracing of accidental and deliberate contamination of the feed and food chain with botulinum neurotoxins and other Clostridia. The complexity of this threat required acquiring...

  14. Imminent danger? Probabilistic classification learning of threat-related information in obsessive-compulsive disorder.

    Science.gov (United States)

    Exner, Cornelia; Zetsche, Ulrike; Lincoln, Tania M; Rief, Winfried

    2014-03-01

    A tendency to overestimate threat has been shown in individuals with OCD. We tested the hypothesis that this bias in judgment is related to difficulties in learning probabilistic associations between events. Thirty participants with OCD and 30 matched healthy controls completed a learning experiment involving 2 variants of a probabilistic classification learning task. In the neutral weather-prediction task, rainy and sunny weather had to be predicted. In the emotional task danger of an epidemic from virus infection had to be predicted (epidemic-prediction task). Participants with OCD were as able as controls to improve their prediction of neutral events across learning trials but scored significantly below healthy controls on the epidemic-prediction task. Lower performance on the emotional task variant was significantly related to a heightened tendency to overestimate threat. Biased information processing in OCD might thus hamper corrective experiences regarding the probability of threatening events.

  15. Threat-Related Information Suggests Competence: A Possible Factor in the Spread of Rumors

    OpenAIRE

    Boyer, Pascal; Parren, Nora

    2015-01-01

    Information about potential danger is a central component of many rumors, urban legends, ritual prescriptions, religious prohibitions and witchcraft crazes. We investigate a potential factor in the cultural success of such material, namely that a source of threat-related information may be intuitively judged as more competent than a source that does not convey such information. In five studies, we asked participants to judge which of two sources of information, only one of which conveyed thre...

  16. Animals as sentinels of bioterrorism agents.

    Science.gov (United States)

    Rabinowitz, Peter; Gordon, Zimra; Chudnov, Daniel; Wilcox, Matthew; Odofin, Lynda; Liu, Ann; Dein, Joshua

    2006-04-01

    We conducted a systematic review of the scientific literature from 1966 to 2005 to determine whether animals could provide early warning of a bioterrorism attack, serve as markers for ongoing exposure risk, and amplify or propagate a bioterrorism outbreak. We found evidence that, for certain bioterrorism agents, pets, wildlife, or livestock could provide early warning and that for other agents, humans would likely manifest symptoms before illness could be detected in animals. After an acute attack, active surveillance of wild or domestic animal populations could help identify many ongoing exposure risks. If certain bioterrorism agents found their way into animal populations, they could spread widely through animal-to-animal transmission and prove difficult to control. The public health infrastructure must look beyond passive surveillance of acute animal disease events to build capacity for active surveillance and intervention efforts to detect and control ongoing outbreaks of disease in domestic and wild animal populations.

  17. LABORATORY GUIDELINES FOR ANALYSIS OF BIOTERRORISM SAMPLES

    Science.gov (United States)

    With advent of deaths associated with Bacillus anthracis spore contaminated mail, a worldwide need was apparent for increased laboratory capacity to safely analyze bioterrorism samples. The U.S. Department of Health and Human Services has furnished guidelines for microbiological...

  18. Bioterrorism

    Science.gov (United States)

    ... basis if the vaccine should be given. The anthrax vaccine is controlled by the U.S. Department of Defense ... in combat settings and people who work with anthrax in a laboratory setting. A note about vaccines Sometimes the amount of a certain vaccine cannot ...

  19. Labs Urged to Pre-empt Bioterrorism Threat

    Institute of Scientific and Technical Information of China (English)

    Erika; Check; 尚文

    2004-01-01

    恐怖分子可以利用的手段是层出不穷的。为了将风险降到最低,两个非盈利组织于2月20日在华盛顿宣布要采取措施,并且敦促生化技术公司防范它们的员工或实验室成为恐怖活动的源头。然而,各个方面对此的反应却不尽相同。

  20. Community response grids: using information technology to help communities respond to bioterror emergencies.

    Science.gov (United States)

    Jaeger, Paul T; Fleischmann, Kenneth R; Preece, Jennifer; Shneiderman, Ben; Wu, Philip Fei; Qu, Yan

    2007-12-01

    Access to accurate and trusted information is vital in preparing for, responding to, and recovering from an emergency. To facilitate response in large-scale emergency situations, Community Response Grids (CRGs) integrate Internet and mobile technologies to enable residents to report information, professional emergency responders to disseminate instructions, and residents to assist one another. CRGs use technology to help residents and professional emergency responders to work together in community response to emergencies, including bioterrorism events. In a time of increased danger from bioterrorist threats, the application of advanced information and communication technologies to community response is vital in confronting such threats. This article describes CRGs, their underlying concepts, development efforts, their relevance to biosecurity and bioterrorism, and future research issues in the use of technology to facilitate community response.

  1. A review of neuroimaging studies of race-related prejudice: Does amygdala response reflect threat?

    Directory of Open Access Journals (Sweden)

    Adam Mourad Chekroud

    2014-03-01

    Full Text Available Prejudice is an enduring and pervasive aspect of human cognition. An emergent trend in modern psychology has focused on understanding how cognition is linked to neural function, leading researchers to investigate the neural correlates of prejudice. Research in this area, using racial group memberships, quickly highlighted the amygdala as a neural structure of importance. In this article, we offer a critical review of social neuroscientific studies of the amygdala in race-related prejudice. Rather than the dominant interpretation that amygdala activity reflects a racial or outgroup bias per se, we argue that the observed pattern of sensitivity in this literature is best considered in terms of potential threat. More specifically, we argue that negative culturally-learned associations between black males and potential threat better explain the observed pattern of amygdala activity. Finally, we consider future directions for the field, and offer specific experiments and predictions to directly address unanswered questions.

  2. Predicting response to reassurances and uncertainties in bioterrorism communications for urban populations in New York and California.

    Science.gov (United States)

    Vaughan, Elaine; Tinker, Tim L; Truman, Benedict I; Edelson, Paul; Morse, Stephen S

    2012-06-01

    Recent national plans for recovery from bioterrorism acts perpetrated in densely populated urban areas acknowledge the formidable technical and social challenges of consequence management. Effective risk and crisis communication is one priority to strengthen the U.S.'s response and resilience. However, several notable risk events since September 11, 2001, have revealed vulnerabilities in risk/crisis communication strategies and infrastructure of agencies responsible for protecting civilian populations. During recovery from a significant biocontamination event, 2 goals are essential: (1) effective communication of changing risk circumstances and uncertainties related to cleanup, restoration, and reoccupancy; and (2) adequate responsiveness to emerging information needs and priorities of diverse populations in high-threat, vulnerable locations. This telephone survey study explored predictors of public reactions to uncertainty communications and reassurances from leaders related to the remediation stage of an urban-based bioterrorism incident. African American and Hispanic adults (N=320) were randomly sampled from 2 ethnically and socioeconomically diverse geographic areas in New York and California assessed as high threat, high vulnerability for terrorism and other public health emergencies. Results suggest that considerable heterogeneity exists in risk perspectives and information needs within certain sociodemographic groups; that success of risk/crisis communication during recovery is likely to be uneven; that common assumptions about public responsiveness to particular risk communications need further consideration; and that communication effectiveness depends partly on preexisting values and risk perceptions and prior trust in leaders. Needed improvements in communication strategies are possible with recognition of where individuals start as a reference point for reasoning about risk information, and comprehension of how this influences subsequent interpretation

  3. Predicting response to reassurances and uncertainties in bioterrorism communications for urban populations in New York and California.

    Science.gov (United States)

    Vaughan, Elaine; Tinker, Tim L; Truman, Benedict I; Edelson, Paul; Morse, Stephen S

    2012-06-01

    Recent national plans for recovery from bioterrorism acts perpetrated in densely populated urban areas acknowledge the formidable technical and social challenges of consequence management. Effective risk and crisis communication is one priority to strengthen the U.S.'s response and resilience. However, several notable risk events since September 11, 2001, have revealed vulnerabilities in risk/crisis communication strategies and infrastructure of agencies responsible for protecting civilian populations. During recovery from a significant biocontamination event, 2 goals are essential: (1) effective communication of changing risk circumstances and uncertainties related to cleanup, restoration, and reoccupancy; and (2) adequate responsiveness to emerging information needs and priorities of diverse populations in high-threat, vulnerable locations. This telephone survey study explored predictors of public reactions to uncertainty communications and reassurances from leaders related to the remediation stage of an urban-based bioterrorism incident. African American and Hispanic adults (N=320) were randomly sampled from 2 ethnically and socioeconomically diverse geographic areas in New York and California assessed as high threat, high vulnerability for terrorism and other public health emergencies. Results suggest that considerable heterogeneity exists in risk perspectives and information needs within certain sociodemographic groups; that success of risk/crisis communication during recovery is likely to be uneven; that common assumptions about public responsiveness to particular risk communications need further consideration; and that communication effectiveness depends partly on preexisting values and risk perceptions and prior trust in leaders. Needed improvements in communication strategies are possible with recognition of where individuals start as a reference point for reasoning about risk information, and comprehension of how this influences subsequent interpretation

  4. Biodefense and Bioterrorism - Multiple Languages: MedlinePlus

    Science.gov (United States)

    ... Home → Multiple Languages → All Health Topics → Biodefense and Bioterrorism URL of this page: https://medlineplus.gov/languages/ ... XYZ List of All Topics All Biodefense and Bioterrorism - Multiple Languages To use the sharing features on ...

  5. Failure to differentiate between threat-related and positive emotion cues in healthy adults with childhood interpersonal or adult trauma.

    Science.gov (United States)

    Chu, Denise A; Bryant, Richard A; Gatt, Justine M; Harris, Anthony W F

    2016-07-01

    Enhanced threat-related processing is associated with both elevated anxiety and childhood exposure to trauma. Given the paucity of evidence regarding the effects of childhood and adult trauma exposure on subsequent psychophysiological processes in the absence of psychopathology, we investigated the relative impacts of childhood interpersonal and non-interpersonal trauma, as well as adult trauma exposure on neural processing of threat in healthy adults. We measured peak amplitudes of the N170 face-sensitive visual ERP component response to non-conscious and conscious Angry (threat) versus Happy (non-threat, positive) and Neutral (non-threat baseline) faces at temporo-occipital sites (right-T6; left-T5) in 489 psychiatrically asymptomatic adults (aged 18-70 years, 54% women, 94% right-handed). N170 peak amplitude differences between Angry vs Happy or Neutral faces were calculated and subjected to hierarchical multiple regression analysis, with trauma types (childhood interpersonal, childhood non-interpersonal and adult trauma) entered as predictors of interest. After controlling for sociodemographic and health factors, N170 peak amplitudes for non-conscious Angry vs Happy faces were inversely associated with childhood interpersonal trauma at T6 and adult trauma exposure at T5. Post-hoc repeated measures ANOVA indicated that unlike adults without trauma exposure, trauma-exposed adults failed to show significantly reduced N170 responses to Happy relative to Angry faces during non-conscious processing. This suggests that childhood interpersonal and adult trauma exposure are associated with a failure to differentiate between non-threat or positive and threat-related emotion cues. This is consistent with generalised hypervigilance seen in PTSD, and suggests trauma exposure is associated with a generalized heightened responsivity to non-conscious non-threat or positive as well as threat-related emotion cues in psychiatrically healthy adults. PMID:27055015

  6. Social Media and Its Dual Use in Biopreparedness: Communication and Visualization Tools in an Animal Bioterrorism Incident

    DEFF Research Database (Denmark)

    Sjöberg, Elisabeth; Barker, Gary C.; Landgren, Jonas;

    2013-01-01

    This article focuses on social media and interactive challenges for emergency organizations during a bioterrorism or agroterrorism incident, and it outlines the dual-use dilemma of social media. Attackers or terrorists can use social media as their modus of operandi, and defenders, including...... emergency organizations in law enforcement and public and animal health, can use it for peaceful purposes. To get a better understanding of the uses of social media in these situations, a workshop was arranged in Stockholm, Sweden, to raise awareness about social media and animal bioterrorism threats. Fifty...... in stream graphs and networks showing clusters of Twitter and Facebook users. The visualization of social media can be an important preparedness tool in the response to bioterrorism and agroterrorism....

  7. Threat-related amygdala functional connectivity is associated with 5-HTTLPR genotype and neuroticism

    DEFF Research Database (Denmark)

    Madsen, Martin Korsbak; Mc Mahon, Brenda; Andersen, Sofie Bech;

    2016-01-01

    Communication between the amygdala and other brain regions critically regulates sensitivity to threat, which has been associated with risk for mood and affective disorders. The extent to which these neural pathways are genetically determined or correlate with risk-related personality measures...... and medial prefrontal cortex (mPFC) and between both amygdalae and a cluster including posterior cingulate cortex, precuneus and visual cortex was significantly increased in 5-HTTLPR S' allele carriers relative to L(A)L(A) individuals. Neuroticism was negatively correlated with functional connectivity......OFC/vlPFC, such that S' carriers exhibited a more negative association relative to L(A)L(A) individuals. These findings provide novel evidence for both independent and interactive effects of 5-HTTLPR genotype and neuroticism on amygdala communication, which may mediate effects on risk for mood and affective disorders....

  8. Agricultural Warfare and Bioterrorism using Invasive Species

    Science.gov (United States)

    The chapter on Agricultural Warfare and Bioterrorism using Invasive Species is part of the book titled Pest Management and Phytosanitary Trade Barriers authored by Neil Heather (Australia) and Guy Hallman. The chapter attempts to briefly put the topic into context with phytosanitation. It presents...

  9. Science Publishing in the Age of Bioterrorism

    Science.gov (United States)

    Atlas, Ronald

    2003-01-01

    Following the terrorist attacks of September 11, 2001, and the subsequent anthrax bioterrorism mailings, the science community and others worried that technical articles might inadvertently aid those planning acts of terrorism. Some authors asked the American Society for Microbiology (ASM) for permission to withhold critical information from…

  10. Addressing bioterrorism concerns: options for investigating the mechanism of action of Staphylococcus aureus enterotoxin B.

    Science.gov (United States)

    Lindsay, C D; Griffiths, G D

    2013-06-01

    Staphylococcal enterotoxin B (SEB) is of concern to military and civilian populations as a bioterrorism threat agent. It is a highly potent toxin produced by Staphylococcus aureus and is stable in storage and under aerosolisation; it is able to produce prolonged highly incapacitating illness at very low-inhaled doses and death at elevated doses. Concerns regarding SEB are compounded by the lack of effective medical countermeasures for mass treatment of affected populations. This article considers the mechanism of action of SEB, the availability of appropriate experimental models for evaluating the efficacy of candidate medical countermeasures with particular reference to the need to realistically model SEB responses in man and the availability of candidate countermeasures (with an emphasis on commercial off-the-shelf options). The proposed in vitro approaches would be in keeping with Dstl’s commitment to reduction, refinement and replacement of animal models in biomedical research, particularly in relation to identifying valid alternatives to the use of nonhuman primates in experimental studies.

  11. Assessing bioterrorism preparedness and response of rural veterinarians: experiences and training needs.

    Science.gov (United States)

    Hsu, Chiehwen Ed; Jacobson, Holly; Feldman, Katherine; Miller, Jerry A; Rodriguez, Lori; Soto Mas, Francisco

    2008-01-01

    Veterinarians play a unique role in emergency preparedness and response, and federal agencies and academic institutions therefore allocate considerable resources to provide training to enhance their readiness. However, the level of preparedness of veterinarians in many rural regions is yet to be improved. This article reports an assessment of the bioterrorism preparedness, specifically the experience and training needs, of rural veterinarians in North Texas. The study employed a cross-sectional design with a study population that included all veterinarians (N = 352) in the 37 counties within Texas Department of State Health Services Regions 2 and 3. Data on veterinarians practicing or residing in the target region were obtained from the Texas State Board of Veterinary Medical Examiners. The response rate was 35% (n = 121). Results indicate that chemical exposure was the condition most frequently seen and treated, followed by botulism and anthrax. The majority (80%) of respondents indicated that they had not previously participated in training related to bioterrorism preparedness, and many (41%) also indicated a willingness to participate in a state health department-initiated bioterrorism response plan. However, only 18% were confident in their ability to diagnose and treat bioterrorism cases. These results suggest that many North Texas veterinarians practicing in rural regions could benefit from additional training in bioterrorism preparedness and response. An area in particular need of further training is the diagnosis and treatment of Category A agents. Federal, state, and local health agencies are urged to increase training opportunities and to make additional efforts to involve veterinarians in bioterrorism preparedness and response.

  12. Bioterrorism preparedness and response in European public health institutes.

    Science.gov (United States)

    Coignard, B

    2001-11-01

    The terrorist attacks on 11 September 2001 and the deliberate release of anthrax in the United States had consequences for public health not only there, but also in Europe. Europe's public health systems had to manage numerous postal materials possibly contaminated with anthrax. Our survey aimed to document the response of European public health institutes to recent bioterrorist events to identify the gaps that need to be addressed; 18 institutes from 16 countries participated in this Euroroundup. Bioterrorist threats in Europe were hoaxes only, and should be considered as a "preparedness exercise" from which three lessons can be drawn. Firstly, because of inadequate preparedness planning and funding arrangements, Europe was not ready in October 2001 to respond to bioterrorism. Secondly, although European institutes reacted quickly and adapted their priorities to a new type of threat, they need adequate and sustained support from national governments to maintain their overall capacity. Thirdly, the recent crisis demonstrated the need for increased investment in epidemiology training programmes and the establishment of a technical coordination unit for international surveillance and outbreak response in the European Union. PMID:11891386

  13. The Role of Practical Advice in Bioterrorism News Coverage.

    Science.gov (United States)

    Swain, Kristen Alley

    2015-01-01

    This study examined the role of crisis advice appearing in US news coverage of the 2001 anthrax attacks. Coverage of any crisis can spark public outrage, including fear, speculation, and contradictory or confusing evidence, especially when the stories do not contain practical advice. Five coders analyzed 833 news stories from 272 major US newspapers, the Associated Press, National Public Radio, and 4 major US television networks. Practical advice appeared in only a quarter of the stories, even though practical advice for self-protection was mentioned 3 times more often than the vague advice that simply advised people not to panic. Public health officials provided the most practical advice, while scientists provided the least practical advice. Stories containing practical advice also provided more elucidating information, explaining why the threat was low, reducible, treatable, and detectable. Over the 3 phases of the anthrax crisis, an inverse relationship appeared between the amount of news coverage containing practical advice compared to "outrage rhetoric." Stories mentioned practical advice more often during the post-impact phase than earlier in the crisis. Elucidating, explanatory advice emphasized actions, risk comparisons, and tradeoffs. The findings indicate that when journalists use credible sources to provide practical advice and avoid speculation, their coverage can prevent the spread of misinformation and confusion during a bioterror attack. Also, journalists should provide context and sourcing when discussing advice during the outbreak and impact phases of the crisis, because these explanations could counteract outrage and threat distortion.

  14. Using decision models to decompose anxiety-related bias in threat classification.

    Science.gov (United States)

    White, Corey N; Skokin, Kimberly; Carlos, Brandon; Weaver, Alexandria

    2016-03-01

    Individuals with high levels of anxiety show preferential processing of threatening information, and this cognitive bias is thought to be an integral component of anxiety disorders. In threat classification tasks, this bias manifests as high-anxiety participants being more likely to classify stimuli as threatening than their low-anxiety counterparts. However, it is unclear which cognitive mechanisms drive this bias in threat classification. To better understand this phenomenon, threat classification data were analyzed with 2 decision models: a signal detection model and a drift-diffusion model. Signal detection models can dissociate measures of discriminability and bias, and diffusion models can further dissociate bias due to response preparation from bias due to stimulus evaluation. Individuals in the study completed a trait anxiety measure and classified threatening and neutral words based on whether they deemed them threatening. Signal detection analysis showed that high-anxiety participants had a bias driven by a weaker threat criterion than low-anxiety participants, but no differences in discriminability. Drift-diffusion analysis further decomposed the threat bias to show that it is driven by both an expectation bias that the threat response was more likely to be correct, and a stimulus bias driven by a weaker criterion for evaluating the stimuli under consideration. These model-based analyses provide valuable insight and show that multiple cognitive mechanisms underlie differential threat processing in anxiety. Implications for theories of anxiety are discussed.

  15. No prior entry for threat-related faces: evidence from temporal order judgments.

    Directory of Open Access Journals (Sweden)

    Antonio Schettino

    Full Text Available Previous research showed that threat-related faces, due to their intrinsic motivational relevance, capture attention more readily than neutral faces. Here we used a standard temporal order judgment (TOJ task to assess whether negative (either angry or fearful emotional faces, when competing with neutral faces for attention selection, may lead to a prior entry effect and hence be perceived as appearing first, especially when uncertainty is high regarding the order of the two onsets. We did not find evidence for this conjecture across five different experiments, despite the fact that participants were invariably influenced by asynchronies in the respective onsets of the two competing faces in the pair, and could reliably identify the emotion in the faces. Importantly, by systematically varying task demands across experiments, we could rule out confounds related to suboptimal stimulus presentation or inappropriate task demands. These findings challenge the notion of an early automatic capture of attention by (negative emotion. Future studies are needed to investigate whether the lack of systematic bias of attention by emotion is imputed to the primacy of a non-emotional cue to resolve the TOJ task, which in turn prevents negative emotion to exert an early bottom-up influence on the guidance of spatial and temporal attention.

  16. Indicators of implicit and explicit social anxiety influence threat-related interpretive bias as a function of working memory capacity

    Directory of Open Access Journals (Sweden)

    Elske eSalemink

    2013-05-01

    Full Text Available Interpretive biases play a crucial role in anxiety disorders. The aim of the current study was to examine factors that determine the relative strength of threat-related interpretive biases that are characteristic of individuals high in social anxiety. Different (dual process models argue that both implicit and explicit processes determine information processing biases and behaviour, and that their impact is moderated by the availability of executive resources such as working memory capacity (WMC. Based on these models, we expected indicators of implicit social anxiety to predict threat-related interpretive bias in individuals low, but not high in WMC. Indicators of explicit social anxiety should predict threat-related interpretive bias in individuals high, but not low in WMC. As expected, WMC moderated the impact of implicit social anxiety on threat-related interpretive bias, although the simple slope for individuals low in WMC was not statistically significant. The hypotheses regarding explicit social anxiety (with fear of negative evaluation used as an indicator were fully supported. The clinical implications of these findings are discussed.

  17. Bioterrorism in 2001: How Ready Are We?

    Directory of Open Access Journals (Sweden)

    B Lynn Johnston

    2001-01-01

    Full Text Available On January 30, 2001, the federal Immigration Department's headquarters in Ottawa were evacuated and shut down following a bioterrorism scare, which turned out to be a hoax. The building reopened 48 h later, after it was determined that the substance found was not anthrax (1. In the same week, a similar hoax forced the evacuation of an Ontario provincial government building in Toronto (1.

  18. Comparison of quantitative PCR and culture-based methods for evaluating dispersal of Bacillus thuringiensis endospores at a bioterrorism hoax crime scene.

    Science.gov (United States)

    Crighton, Taryn; Hoile, Rebecca; Coleman, Nicholas V

    2012-06-10

    Since the anthrax mail attacks of 2001, law enforcement agencies have processed thousands of suspicious mail incidents globally, many of which are hoax bioterrorism threats. Bio-insecticide preparations containing Bacillus thuringiensis (Bt) spores have been involved in several such threats in Australia, leading to the requirement for rapid and sensitive detection techniques for this organism, a close relative of Bacillus anthracis. Here we describe the development of a quantitative PCR (qPCR) method for the detection of Bt crystal toxin gene cry1, and evaluation of the method's effectiveness during a hoax bioterrorism event in 2009. When combined with moist wipe sampling, the cry1 qPCR was a rapid, reliable, and sensitive diagnostic tool for detecting and quantifying Bt contamination, and mapping endospore dispersal within a mail sorting facility. Results from the cry1 qPCR were validated by viable counts of the same samples on Bacillus-selective agar (PEMBA), which revealed a similar pattern of contamination. Extensive and persistent contamination of the facility was detected, both within the affected mailroom, and extending into office areas up to 30m distant from the source event, emphasising the need for improved containment procedures for suspicious mail items, both during and post-event. The cry1 qPCR enables detection of both viable and non-viable Bt spores and cells, which is important for historical crime scenes or scenes subjected to decontamination. This work provides a new rapid method to add to the forensics toolbox for crime scenes suspected to be contaminated with biological agents. PMID:22227150

  19. Comparison of quantitative PCR and culture-based methods for evaluating dispersal of Bacillus thuringiensis endospores at a bioterrorism hoax crime scene.

    Science.gov (United States)

    Crighton, Taryn; Hoile, Rebecca; Coleman, Nicholas V

    2012-06-10

    Since the anthrax mail attacks of 2001, law enforcement agencies have processed thousands of suspicious mail incidents globally, many of which are hoax bioterrorism threats. Bio-insecticide preparations containing Bacillus thuringiensis (Bt) spores have been involved in several such threats in Australia, leading to the requirement for rapid and sensitive detection techniques for this organism, a close relative of Bacillus anthracis. Here we describe the development of a quantitative PCR (qPCR) method for the detection of Bt crystal toxin gene cry1, and evaluation of the method's effectiveness during a hoax bioterrorism event in 2009. When combined with moist wipe sampling, the cry1 qPCR was a rapid, reliable, and sensitive diagnostic tool for detecting and quantifying Bt contamination, and mapping endospore dispersal within a mail sorting facility. Results from the cry1 qPCR were validated by viable counts of the same samples on Bacillus-selective agar (PEMBA), which revealed a similar pattern of contamination. Extensive and persistent contamination of the facility was detected, both within the affected mailroom, and extending into office areas up to 30m distant from the source event, emphasising the need for improved containment procedures for suspicious mail items, both during and post-event. The cry1 qPCR enables detection of both viable and non-viable Bt spores and cells, which is important for historical crime scenes or scenes subjected to decontamination. This work provides a new rapid method to add to the forensics toolbox for crime scenes suspected to be contaminated with biological agents.

  20. Relative threat and recognition ability in the responses of tropical mockingbirds to song playback.

    Science.gov (United States)

    Botero, Carlos A; Riveros, Jimena M; Vehrencamp, Sandra L

    2007-04-01

    It has been suggested that individual recognition based on song may be constrained by repertoire size in songbirds with very large song repertoires. This hypothesis has been difficult to test because there are few studies on species with very large repertoires and because traditional experiments based on the dear enemy effect do not provide evidence against recognition. The tropical mockingbird, Mimus gilvus, is a cooperative breeder with very large song repertoires and stable territorial neighbourhoods. The social system of this species allowed us to test individual recognition based on song independently from the dear enemy effect by evaluating male response to playback of strangers, neighbours (from shared and unshared boundaries), co-males (i.e. other males in the same social group) and own songs. Although subjects did not show a dear enemy effect, they were less aggressive to co-males than to all other singers. Our results suggest that recognition in tropical mockingbirds (1) does not simply distinguish between familiar and unfamiliar singers, (2) requires a small sample of both songs and song types, (3) does not rely on individual-specific sequences of song types and (4) is not likely to rely on group-specific vocal signatures potentially available in cooperatively breeding groups. We conclude that this is a case of true recognition and suggest that the lack of a dear enemy effect in this and other species with large repertoires may relate to the role of song in mate attraction and the perception of neighbours as a threat to future paternity.

  1. Perceived Threat, Risk Perception, and Efficacy Beliefs Related to SARS and Other (Emerging) Infectious Diseases

    DEFF Research Database (Denmark)

    de Zwart, Onno; Veldhuijzen, Irene; Elam, Gillian;

    2009-01-01

    PURPOSE: To study the levels of perceived threat, perceived severity, perceived vulnerability, response efficacy, and self-efficacy for severe acute respiratory syndrome (SARS) and eight other diseases in five European and three Asian countries. METHOD: A computer-assisted phone survey was conduc...

  2. China Threat, What Threat?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Since the end of the Cold War, China has become the candidate of choice among "illusionist" hawks looking to justify Pentagon spending. Henry Rosemont, a professor emeritus at St Mary’s CoUege of Maryland and a visiting scholar in the Religious Studies Department at Brown University, recently wrote an article for Asia Times Online, saying that facts belie the claims of China’s military threat

  3. Coping with Self-Threat and the Evaluation of Self-Related Traits: An fMRI Study.

    Directory of Open Access Journals (Sweden)

    Andreas Hoefler

    Full Text Available A positive view of oneself is important for a healthy lifestyle. Self-protection mechanisms such as suppressing negative self-related information help us to maintain a positive view of ourselves. This is of special relevance when, for instance, a negative test result threatens our positive self-view. To date, it is not clear which brain areas support self-protective mechanisms under self-threat. In the present functional magnetic resonance imaging (fMRI study the participants (N = 46 received a (negative vs. positive performance test feedback before entering the scanner. In the scanner, the participants were instructed to ascribe personality traits either to themselves or to a famous other. Our results showed that participants responded slower to negative self-related traits compared to positive self-related traits. High self-esteem individuals responded slower to negative traits compared to low self-esteem individuals following a self-threat. This indicates that high self-esteem individuals engage more in self-enhancing strategies after a threat by inhibiting negative self-related information more successfully than low self-esteem individuals. This behavioral pattern was mirrored in the fMRI data as dACC correlated positively with trait self-esteem. Generally, ACC activation was attenuated under threat when participants evaluated self-relevant traits and even more for negative self-related traits. We also found that activation in the ACC was negatively correlated with response times, indicating that greater activation of the ACC is linked to better access (faster response to positive self-related traits and to impaired access (slower response to negative self-related traits. These results confirm the ACC function as important in managing threatened self-worth but indicate differences in trait self-esteem levels. The fMRI analyses also revealed a decrease in activation within the left Hippocampus and the right thalamus under threat. This

  4. Infectious agents of bioterrorism: a review for emergency physicians.

    Science.gov (United States)

    Kman, Nicholas E; Nelson, Richard N

    2008-05-01

    The terrorist attacks on the United States in 2001 and the anthrax release soon after brought the issue of bioterrorism to the forefront in the medical community. Bioterrorism is the use of a biologic weapon to create terror and panic. Biologic weapons, or bioweapons, can be bacteria, fungi, viruses, or biologic toxins. Because the emergency department represents the front line of defense for the recognition of agents of bioterrorism, it is essential that emergency physicians have the ability to quickly diagnose victims of bioterrorism. This review examines the most deadly and virulent category A agents of bioterrorism, that is, anthrax, smallpox, plague, botulism, hemorrhagic fever viruses, and tularemia. The focus is on epidemiology, transmission, clinical manifestations, diagnosis, and treatment.

  5. Effect of Education on Knowledge and Attitude Regarding Bioterrorism

    Directory of Open Access Journals (Sweden)

    Siavash Hamzeh pour

    2015-05-01

    Full Text Available Introduction: Bioterrorism, as a major health problem, has received lots of attention in recent years. To date, the effect of education on knowledge and attitude of students regarding bioterrorism has not been evaluated in Iran. Therefore, this study aimed to determine how education affects knowledge and attitude of biological sciences students about bioterrorism. Methods: The present interventional before-after study was carried out on the students of different branches of biological sciences. The students’ level of knowledge on nature of bioterrorism and its causatives, diagnosing bioterrorism agents, management at the time of biological and bioterrorist attacks, and tendency to participate in relief at these events were evaluated before and after training using a pre-designed checklist. Then the effect of education on the students’ knowledge and attitude was evaluated based on their sex. Results: 120 students were included (60% female; mean age 21 ± 3.2 years. The knowledge score was not significantly different between female and male students before educational intervention (p > 0.05. After education, the knowledge score raised significantly in the 4 areas of bioterrorism nature (p < 0.0001, causative factors (p < 0.0001, diagnosing bioterrorism agents (p < 0.0001, and management at the time of bioterrorist attacks (p < 0.0001 in female participants, but not in male students (p > 0.05. In addition, after education both male and female participants showed greater tendency to work and do research in the field of bioterrorism (p < 0.0001 but the increase was more significant in females (p < 0.0001. Conclusion: Educational intervention led to an improvement in female participants’ knowledge regarding bioterrorism nature, causative factors, diagnosing bioterrorism agents, and management at the time of bioterrorist attacks. Yet, the low level of knowledge and tendency of the students indicates the need for more education in this field.

  6. Bioterrorism: a laboratory who does it?

    Science.gov (United States)

    Craft, David W; Lee, Philip A; Rowlinson, Marie-Claire

    2014-07-01

    In October 2001, the first disseminated biological warfare attack was perpetrated on American soil. Initially, a few clinical microbiology laboratories were testing specimens from acutely ill patients and also being asked to test nasal swabs from the potentially exposed. Soon after, a significant number of clinical microbiology and public health laboratories received similar requests to test the worried well or evaluate potentially contaminated mail or environmental materials, sometimes from their own break rooms. The role of the clinical and public health microbiology laboratory in response to a select agent event or act of bioterrorism is reviewed.

  7. Use of syndromic surveillance to early detect bioterrorism-related diseases in foreign military facilities and some revelations%症状监测在外军生物恐怖早期预警中的应用及启示

    Institute of Scientific and Technical Information of China (English)

    程瑾; 祖正虎; 徐致靖; 孙建中; 郑涛

    2012-01-01

    Syndromic surveillance, based on non-specific pre-diagnosis and other information, can give nearly real-time detection and early warning of potential bioterrorist and emerging infectious threats. This paper introduced the syndromic surveillance systems developed in military facilities of the U. S. , France, Canada and Singapore. It also discussed the trends of syndromic surveillance in early warning of bioterrorism and some revelations to China.%以非特异的症候群和(或)其他相关指示数据为基础的症状监测,能够对潜在生物恐怖袭击进行近乎实时的监测预警.本文在简介生物恐怖相关疾病症状监测系统特点的基础上,简要介绍美国、法国、加拿大和新加坡等外军医疗卫生系统应用的症状监测系统,讨论症状监测用于生物恐怖早期预警的发展趋势,以及对我国生物恐怖防御的启示.

  8. The functional activity and effective connectivity of pulvinar are modulated by individual differences in threat-related attentional bias

    Science.gov (United States)

    Hakamata, Yuko; Sato, Eisuke; Komi, Shotaro; Moriguchi, Yoshiya; Izawa, Shuhei; Murayama, Norio; Hanakawa, Takashi; Inoue, Yusuke; Tagaya, Hirokuni

    2016-01-01

    The pulvinar is important in selective attention, particularly to visual stimuli under the focus of attention. However, the pulvinar is assumed to process emotional stimuli even outside the focus of attention, because of its tight connection with the amygdala. We therefore investigated how unattended emotional stimuli affect the pulvinar and its effective connectivity (EC) while considering individual differences in selective attention. fMRI in 41 healthy human subjects revealed that the amygdala, but not the pulvinar, more strongly responded to unattended fearful faces than to unattended neutral faces (UF > UN), although we observed greater EC from the pulvinar to the amygdala. Interestingly, individuals with biased attention toward threat (i.e., attentional bias) showed significantly increased activity (UF > UN) and reduced grey matter volume in the pulvinar. These individuals also exhibited stronger EC from the pulvinar to the attention-related frontoparietal network (FPN), whereas individuals with greater attentional control showed more enhanced EC from the pulvinar to the amygdala, but not the FPN (UF > UN). The pulvinar may filter unattended emotional stimuli whose sensitivity depends on individual threat-related attentional bias. The connectivity patterns of the pulvinar may thus be determined based on individual differences in threat-related attentional bias and attentional control. PMID:27703252

  9. Accidental and deliberate microbiological contamination in the feed and food chains — How biotraceability may improve the response to bioterrorism

    DEFF Research Database (Denmark)

    Knutsson, Rickard; van Rotterdam, Bart; Fach, Patrick;

    2011-01-01

    A next frontier of the global food safety agenda has to consider a broad spectrum of bio-risks, such as accidental and intentional contaminations in the food and feed chain. In this article, the background for the research needs related to biotraceability and response to bioterrorism incidents......) is crucial in any food-born outbreak and particular in the response to bioterrorism events. In the later case, tested and proven biotraceability improves the following; (i) international collaboration of validated tracing tools and detection methods, (ii) multi-disciplinary expertise and collaboration......, and (vi) high-throughput sequencing using bio-informatic platforms to speed up the characterization of the biological agent. By applying biotraceability, the response phase during a bioterrorism event may be shortened and is facilitated for tracing the origin of biological agent contamination....

  10. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. PMID:24894605

  11. Hospital bioterrorism planning and burn surge.

    Science.gov (United States)

    Kearns, Randy D; Myers, Brent; Cairns, Charles B; Rich, Preston B; Hultman, C Scott; Charles, Anthony G; Jones, Samuel W; Schmits, Grace L; Skarote, Mary Beth; Holmes, James H; Cairns, Bruce A

    2014-01-01

    On the morning of June 9, 2009, an explosion occurred at a manufacturing plant in Garner, North Carolina. By the end of the day, 68 injured patients had been evaluated at the 3 Level I trauma centers and 3 community hospitals in the Raleigh/Durham metro area (3 people who were buried in the structural collapse died at the scene). Approximately 300 employees were present at the time of the explosion, when natural gas being vented during the repair of a hot water heater ignited. The concussion from the explosion led to structural failure in multiple locations and breached additional natural gas, electrical, and ammonia lines that ran overhead in the 1-story concrete industrial plant. Intent is the major difference between this type of accident and a terrorist using an incendiary device to terrorize a targeted population. But while this disaster lacked intent, the response, rescue, and outcomes were improved as a result of bioterrorism preparedness. This article discusses how bioterrorism hospital preparedness planning, with an all-hazards approach, became the basis for coordinated burn surge disaster preparedness. This real-world disaster challenged a variety of systems, hospitals, and healthcare providers to work efficiently and effectively to manage multiple survivors. Burn-injured patients served as a focus for this work. We describe the response, rescue, and resuscitation provided by first responders and first receivers as well as efforts made to develop burn care capabilities and surge capacity.

  12. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later.

  13. Comparing electronic news media reports of potential bioterrorism-related incidents involving unknown white powder to reports received by the United States Centers for Disease Control and Prevention and the Federal Bureau of Investigation: U.S.A., 2009-2011.

    Science.gov (United States)

    Fajardo, Geroncio C; Posid, Joseph; Papagiotas, Stephen; Lowe, Luis

    2015-01-01

    There have been periodic electronic news media reports of potential bioterrorism-related incidents involving unknown substances (often referred to as "white powder") since the 2001 intentional dissemination of Bacillus anthracis through the U.S. Postal System. This study reviewed the number of unknown "white powder" incidents reported online by the electronic news media and compared them with unknown "white powder" incidents reported to the U.S. Centers for Disease Control and Prevention (CDC) and the U.S. Federal Bureau of Investigation (FBI) during a 2-year period from June 1, 2009 and May 31, 2011. Results identified 297 electronic news media reports, 538 CDC reports, and 384 FBI reports of unknown "white powder." This study showed different unknown "white powder" incidents captured by each of the three sources. However, the authors could not determine the public health implications of this discordance.

  14. Neural responses to threat and reward interact to predict stress-related problem drinking: A novel protective role of the amygdala

    Directory of Open Access Journals (Sweden)

    Nikolova Yuliya S

    2012-11-01

    Full Text Available Abstract Background Research into neural mechanisms of drug abuse risk has focused on the role of dysfunction in neural circuits for reward. In contrast, few studies have examined the role of dysfunction in neural circuits of threat in mediating drug abuse risk. Although typically regarded as a risk factor for mood and anxiety disorders, threat-related amygdala reactivity may serve as a protective factor against substance use disorders, particularly in individuals with exaggerated responsiveness to reward. Findings We used well-established neuroimaging paradigms to probe threat-related amygdala and reward-related ventral striatum reactivity in a sample of 200 young adult students from the ongoing Duke Neurogenetics Study. Recent life stress and problem drinking were assessed using self-report. We found a significant three-way interaction between threat-related amygdala reactivity, reward-related ventral striatum reactivity, and recent stress, wherein individuals with higher reward-related ventral striatum reactivity exhibit higher levels of problem drinking in the context of stress, but only if they also have lower threat-related amygdala reactivity. This three-way interaction predicted both contemporaneous problem drinking and problem drinking reported three-months later in a subset of participants. Conclusions These findings suggest complex interactions between stress and neural responsiveness to both threat and reward mediate problem drinking. Furthermore, they highlight a novel protective role for threat-related amygdala reactivity against drug use in individuals with high neural reactivity to reward.

  15. Biological Threats

    Science.gov (United States)

    ... Workplace Plans School Emergency Plans Main Content Biological Threats Biological agents are organisms or toxins that can ... for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may or ...

  16. Psychoneurometric operationalization of threat sensitivity: Relations with clinical symptom and physiological response criteria.

    Science.gov (United States)

    Yancey, James R; Venables, Noah C; Patrick, Christopher J

    2016-03-01

    The National Institute of Mental Health's Research Domain Criteria (RDoC) initiative calls for the incorporation of neurobiological approaches and findings into conceptions of mental health problems through a focus on biobehavioral constructs investigated across multiple domains of measurement (units of analysis). Although the constructs in the RDoC system are characterized in "process terms" (i.e., as functional concepts with brain and behavioral referents), these constructs can also be framed as dispositions (i.e., as dimensions of variation in biobehavioral functioning across individuals). Focusing on one key RDoC construct, acute threat or "fear," the current article illustrates a construct-oriented psychoneurometric strategy for operationalizing this construct in individual difference terms-as threat sensitivity (THT+). Utilizing data from 454 adult participants, we demonstrate empirically that (a) a scale measure of THT+ designed to tap general fear/fearlessness predicts effectively to relevant clinical problems (i.e., fear disorder symptoms), (b) this scale measure shows reliable associations with physiological indices of acute reactivity to aversive visual stimuli, and (c) a cross-domain factor reflecting the intersection of scale and physiological indicators of THT+ predicts effectively to both clinical and neurophysiological criterion measures. Results illustrate how the psychoneurometric approach can be used to create a dimensional index of a biobehavioral trait construct, in this case THT+, which can serve as a bridge between phenomena in domains of psychopathology and neurobiology. Implications and future directions are discussed with reference to the RDoC initiative and existing report-based conceptions of psychological traits.

  17. Biosensors for security and bioterrorism applications

    CERN Document Server

    Nikoleli, Georgia-Paraskevi

    2016-01-01

    This book offers comprehensive coverage of biomarker/biosensor interactions for the rapid detection of weapons of bioterrorism, as well as current research trends and future developments and applications. It will be useful to researchers in this field who are interested in new developments in the early detection of such. The authors have collected very valuable and, in some aspects indispensable experience in the area i.e. in the development and application of portable biosensors for the detection of potential hazards. Most efforts are centered on the development of immunochemical assays including flow-lateral systems and engineered antibodies and their fragments. In addition, new approaches to the detection of enzyme inhibitors, direct enzymatic and microbial detection of metabolites and nutrients are elaborated. Some realized prototypes and concept devices applicable for the further use as a basis for the cooperation programs are also discussed. There is a particular focus on electrochemical and optical det...

  18. Bioterrorism education effect on knowledge and attitudes of nurses

    OpenAIRE

    Nahid Aghaei; Masoumeh Bagheri Nesami

    2013-01-01

    Context: The most important way against bioterrorism is reinforcement of knowledge of health and medical team to diagnose and rapid reaction during these events. Aims: To assess the effect of bioterrorism education on knowledge and attitudes of nurses. Settings and Design: the setting of study was one of the infectious disease wards, emergency rooms or internal wards of the hospitals under supervision of Mazandaran University of Medical Sciences. Materials and Methods: In this pre-experimenta...

  19. Challenges of Detecting Bioterrorism Agents in Complex Matrices

    Science.gov (United States)

    Hartmann, Erica M.; Halden, Rolf U.

    This chapter offers an overview of the shift from the use of mass ­spectrometry for studying purified bioterrorism agents to the development of methods for rapid detection thereof in environmental and clinical samples. We discuss the difficulties of working with such complex matrices and present methods for quickly and effectively reducing complexity through sample preparation. Finally, we examine a success story wherein the common pathogen and potential bioterrorism agent norovirus is detected at clinically relevant levels in human stool.

  20. Nurses' intentions to respond to bioterrorism and other infectious disease emergencies.

    Science.gov (United States)

    Grimes, Deanna E; Mendias, Elnora P

    2010-01-01

    Although nurses historically have responded to natural disasters, little is known about nurses' intentions to respond during bioterrorism and other infectious disease emergencies where they and their families may be at risk. To investigate that question, we surveyed nurses following their participation in a class on bioterrorism. Participants (N = 292) completed a Personal/Professional Profile (PPP), Test of Bioterrorism Knowledge (BT Knowledge), and an Intention to Respond (IR) instrument. IR was measured by participants' scores on their likelihood to care for patients (0 = extremely unlikely, 10 = extremely likely) for each of 10 infectious disease scenarios reflecting different infection risk. We calculated scores for each scenario, totaled them, and examined the total IR related to the participant's PPP and scores on BT Knowledge. Additionally, we examined participants' written comments explaining the reasons for their IR. Total IR scores ranged from 8-100 (mean and median of 70). The IR was higher in scenarios where the infection risk was lower. Overall IR scores were positively related to BT Knowledge and having had previous emergency and disaster experience. Those less likely to respond had dependent children and more years in nursing. Results indicate that nurses differentiated risks associated with different infectious disease situations and may decide to respond during a real emergency based on such information. Implications for nursing administrators and nursing educators are discussed.

  1. Social media and its dual use in biopreparedness: communication and visualization tools in an animal bioterrorism incident.

    Science.gov (United States)

    Sjöberg, Elisabeth; Barker, Gary C; Landgren, Jonas; Griberg, Isaac; Skiby, Jeffrey E; Tubbin, Anna; von Stapelmohr, Anne; Härenstam, Malin; Jansson, Mikael; Knutsson, Rickard

    2013-09-01

    This article focuses on social media and interactive challenges for emergency organizations during a bioterrorism or agroterrorism incident, and it outlines the dual-use dilemma of social media. Attackers or terrorists can use social media as their modus operandi, and defenders, including emergency organizations in law enforcement and public and animal health, can use it for peaceful purposes. To get a better understanding of the uses of social media in these situations, a workshop was arranged in Stockholm, Sweden, to raise awareness about social media and animal bioterrorism threats. Fifty-six experts and crisis communicators from international and national organizations participated. As a result of the workshop, it was concluded that emergency organizations can collect valuable information and monitor social media before, during, and after an outbreak. In order to make use of interactive communication to obtain collective intelligence from the public, emergency organizations must adapt to social networking technologies, requiring multidisciplinary knowledge in the fields of information, communication, IT, and biopreparedness. Social network messaging during a disease outbreak can be visualized in stream graphs and networks showing clusters of Twitter and Facebook users. The visualization of social media can be an important preparedness tool in the response to bioterrorism and agroterrorism. PMID:23971817

  2. Managing bioterrorism mass casualties in an emergency department: lessons learned from a rural community hospital disaster drill.

    Science.gov (United States)

    Vinson, Eric

    2007-01-01

    Bioterrorism represents a threat for which most emergency departments (EDs) are ill prepared. In order to develop an evidence-based plan for ED and hospital management of contaminated patients, a review was conducted of the most effective strategies developed during the severe acute respiratory syndrome (SARS) epidemic, as well as Centers for Disease Control and Prevention and military guidelines on biowarfare. Six basic steps were identified: 1) lock down the hospital and control access to the ED; 2) protect emergency care personnel with appropriate personal protective equipment; 3) decontaminate and triage patients; 4) isolate patients; 5) treat patients with appropriate medications or measures, including decontamination of wounds; and 6) use restrictive admission and transfer guidelines. By emphasizing these six basic concepts, a rural ED passed an annual state-run bioterrorism mass-casualty drill. The drill provided health care personnel with the knowledge and skills necessary to prepare for future bioterrorism casualties. These same concepts could also be used to manage highly virulent viral or bacterial outbreaks.

  3. Social media and its dual use in biopreparedness: communication and visualization tools in an animal bioterrorism incident.

    Science.gov (United States)

    Sjöberg, Elisabeth; Barker, Gary C; Landgren, Jonas; Griberg, Isaac; Skiby, Jeffrey E; Tubbin, Anna; von Stapelmohr, Anne; Härenstam, Malin; Jansson, Mikael; Knutsson, Rickard

    2013-09-01

    This article focuses on social media and interactive challenges for emergency organizations during a bioterrorism or agroterrorism incident, and it outlines the dual-use dilemma of social media. Attackers or terrorists can use social media as their modus operandi, and defenders, including emergency organizations in law enforcement and public and animal health, can use it for peaceful purposes. To get a better understanding of the uses of social media in these situations, a workshop was arranged in Stockholm, Sweden, to raise awareness about social media and animal bioterrorism threats. Fifty-six experts and crisis communicators from international and national organizations participated. As a result of the workshop, it was concluded that emergency organizations can collect valuable information and monitor social media before, during, and after an outbreak. In order to make use of interactive communication to obtain collective intelligence from the public, emergency organizations must adapt to social networking technologies, requiring multidisciplinary knowledge in the fields of information, communication, IT, and biopreparedness. Social network messaging during a disease outbreak can be visualized in stream graphs and networks showing clusters of Twitter and Facebook users. The visualization of social media can be an important preparedness tool in the response to bioterrorism and agroterrorism.

  4. The Effect Of Non-Audit Services And Related Threats On Investors' Perceptions Of Auditor Independence: An Experiment

    DEFF Research Database (Denmark)

    Warming-Rasmussen, Bent; Quick, Reiner

    2011-01-01

    by the fact that a differnt number and intensity of endependence threats is attached to indiviual services. Therefore this experimental study investigates the effect of such threats on independence perceptions of German individual investors. The results show that the selfreview and the familiarity threat may...... impair auditor independence disregarding their size. Furthermore, it was found that a higher self-review threat increases the negative impact on independence perceptions. an advocacy threat, however, seens to be irrelevant. Manipulation checks disclose that the manipulation of the familiarity chedk...

  5. Three-Week Bright-Light Intervention Has Dose-Related Effects on Threat-Related Corticolimbic Reactivity and Functional Coupling

    DEFF Research Database (Denmark)

    Fisher, Patrick M; Madsen, Martin K; Mc Mahon, Brenda;

    2014-01-01

    -11.0 kilolux) for 30 minutes daily over a period of 3 weeks. Additionally, we considered serotonin transporter-linked polymorphic region (5-HTTLPR) genotype status as a model for differences in serotonin signaling and moderator of intervention effects. RESULTS: Bright-light dose significantly negatively......BACKGROUND: Bright-light intervention is reported to successfully treat depression, in particular seasonal affective disorder, but the neural pathways and molecular mechanisms mediating its effects are unclear. An amygdala-prefrontal cortex corticolimbic circuit regulates responses to salient...... environmental stimuli (e.g., threat) and may underlie these effects. Serotonin signaling modulates this circuit and is implicated in the pathophysiology of seasonal and other affective disorders. METHODS: We evaluated the effects of a bright-light intervention protocol on threat-related corticolimbic reactivity...

  6. Current and future threats and opportunities facing European crop wild relatives and landrace diversity

    NARCIS (Netherlands)

    Maxted, N.; Akparov, Z.I.; Aronsson, M.; Kik, C.

    2012-01-01

    The approach of this priority crop wild relatives (CWR) and landraces (LR) conservation exercise was to use the skills and knowledge of 52 ECPGR in situ and on-farm conservation network members and other conference delegates, representing a broad European range of PGR-related academic, research and

  7. Transatlantic relations are alliances a funcion [i.e. function] of an external threat?

    OpenAIRE

    Jahnel, Carsten H.

    2005-01-01

    Current European-U.S. transatlantic relations represent the heritage of a large number of international alliances and institutions that were founded at a time when there was a bipolar world, a world dominated by the United States and the Soviet Union. Today fourteen years after the end of the Cold War, some national leaders question the continued viability of these international alliances and institutions. In their references to international relations, realist and liberal theorists reflect s...

  8. 75 FR 42363 - Public Health Security and Bioterrorism Preparedness and Response Act of 2002; Biennial Review...

    Science.gov (United States)

    2010-07-21

    ... republished the HHS select agent and toxin list in the Federal Register on October 16, 2008 (73 FR 61363). The... HUMAN SERVICES 42 CFR Part 73 RIN 0920-AA34 Public Health Security and Bioterrorism Preparedness and... Bioterrorism Preparedness and Response Act of 2002 (42 U.S.C. 262a) (the Bioterrorism Act) requires...

  9. 75 FR 44724 - Agricultural Bioterrorism Protection Act of 2002; Biennial Review and Republication of the Select...

    Science.gov (United States)

    2010-07-29

    ...-AD09 Agricultural Bioterrorism Protection Act of 2002; Biennial Review and Republication of the Select... accordance with the Agricultural Bioterrorism Protection Act of 2002, we are soliciting public comment... and Bioterrorism Preparedness and Response Act of 2002 provides for the regulation of...

  10. Attentional bias to respiratory- and anxiety-related threat in children with asthma.

    Science.gov (United States)

    Lowther, Helen; Newman, Emily; Sharp, Kirstin; McMurray, Ann

    2016-08-01

    This study investigated attentional biases in children with asthma. The study aimed at testing whether children with asthma are vigilant to asthma and/or anxiety cues. Thirty-six children (18 with asthma and 18 healthy controls) aged 9-12 completed a computerised dot probe task designed to measure attentional bias to three different categories of words: asthma, anxiety symptom and general negative emotion. Main caregiver anxiety was also assessed, as was frequency of inhaler use for those with asthma. Children with asthma showed an attentional bias towards asthma words but not anxiety or general negative emotion words. Children without asthma showed no significant attentional biases to any word categories. Caregiver anxiety was correlated with asthma word attentional bias in the asthma group. The findings indicate that attentional bias is present in children with asthma. Further research is required to ascertain if this exacerbates or maintains health-related problems. PMID:25966340

  11. Francisella tularensis as a potential agent of bioterrorism?

    Science.gov (United States)

    Maurin, Max

    2015-02-01

    Francisella tularensis is a category A bioterrorism agent. It is the etiological agent of tularemia, a zoonotic disease found throughout the northern hemisphere. The intentional spread of F. tularensis aerosols would probably lead to severe and often fatal pneumonia cases, but also secondary cases from contaminated animals and environments. We are not ready to face such a situation. No vaccine is currently available. A few antibiotics are active against F. tularensis, but strains resistant to these antibiotics could be used in the context of bioterrorism. We need new therapeutic strategies to fight against category A bioterrorism agents, including development of new drugs inhibiting F. tularensis growth and/or virulence, or enhancing the host response to infection by this pathogen.

  12. Bioterrorism education effect on knowledge and attitudes of nurses

    Directory of Open Access Journals (Sweden)

    Nahid Aghaei

    2013-01-01

    Full Text Available Context: The most important way against bioterrorism is reinforcement of knowledge of health and medical team to diagnose and rapid reaction during these events. Aims: To assess the effect of bioterrorism education on knowledge and attitudes of nurses. Settings and Design: the setting of study was one of the infectious disease wards, emergency rooms or internal wards of the hospitals under supervision of Mazandaran University of Medical Sciences. Materials and Methods: In this pre-experimental study, 65 nurses who had all inclusion criteria are selected by accessible sampling method. Data on nurses knowledge and attitudes toward bioterrorism were collected using a self-administered questionnaire before and after two two-h sessions education. After a month of education, the units responded to questionnaire again. Statistical Analysis Used: A descriptive statistics Wilcoxon tests and Spearman correlation coefficient were used. Results: Before education, the majority of units (96.9% had low knowledge about bioterrorism (0-33.3% score of 100%,whereas after education, the majority of them (100% had good knowledge(well done (66.7-100% score of 100%. And majority of units (96.9% before education had indifferent attitude toward bioterrorism (33.4-66.6% score of 100%, whereas a majority of them (98.5% after education had positive attitude (66.7-100% score of 100%. Conclusions: The education has a positive effect on nurses′ knowledge and attitudes and it can be a guideline for administrators of the Ministry of Health and medicine for planning to achieve the goals of preventive and defense against bioterrorism.

  13. [Molecular and immunological detection of bacteria applied to bio-terrorism].

    Science.gov (United States)

    Pelletier, N; La Scola, B

    2010-09-01

    Following the episode of letters containing anthrax in the USA in 2001, the fight against bio-terrorism became a priority for many countries (including France). The detection of bacteria in bio-terrorism settings is a major component of this fight. Indeed, the early detection of these bio-terrorism agents leads to an appropriate treatment and to a reduced transmission of the disease. Bacteria are important bio-terrorism agents, and the techniques used for their detection are constantly evolving. In this review, after describing the main bacteria that can be used for bio-terrorism, we also describe the techniques available for their detection: DNA or antigen detection. PMID:20400254

  14. The Psychology of Ongoing Threat: Relative Risk Appraisal, the September 11 Attacks, and Terrorism-Related Fears

    Science.gov (United States)

    Marshall, Randall D.; Bryant, Richard A.; Amsel, Lawrence; Suh, Eun Jung; Cook, Joan M.; Neria, Yuval

    2007-01-01

    There are now replicated findings that posttraumatic stress disorder (PTSD) symptoms related to the September 11, 2001, attacks occurred in large numbers of persons who did not fit the traditional definition of exposure to a traumatic event. These data are not explained by traditional epidemiologic "bull's eye" disaster models, which assume the…

  15. The Delivery: A Case Study in Bioterrorism Preparedness.

    Science.gov (United States)

    Cosh, Judith; Davis, Kim; Fullwood, Angela; Lippek, Maryann; Middleton, Jill

    This paper describes a bioterrorism incident at a Connecticut elementary school. Flowers sent to a teacher were permeated with anthrax spores that infected the teacher, 12 of her students, 3 office staff members, and an administrator. The teacher subsequently died. The Connecticut Department of Public Health confirmed that the students and staff…

  16. THE ESTABLISHMENT OF LABORATORY GUIDELINES FOR ANALYSIS OF BIOTERRORISM SAMPLES

    Science.gov (United States)

    After the attack on the World Trade Center on September 11, 2002, and the subsequent deaths associated with Bacillus anthracis spore contaminated mail, a worldwide need was apparent for increased laboratory capacity to safely analyze bioterrorism samples. The U.S. Department of ...

  17. Interpreting ambiguous health and bodily threat : Are individual differences in pain-related vulnerability constructs associated with an on-line negative interpretation bias?

    NARCIS (Netherlands)

    Vancleef, Linda M. G.; Peters, Madelon L.; De Jong, Peter J.

    2009-01-01

    The present study examined the association between pain-related anxiety and an on-line interpretation bias for putative physical health threat. Healthy volunteers (n = 80) completed measures on Anxiety Sensitivity, Injury/illness Sensitivity, Fear of Pain and Pain Catastrophizing. Furthermore, they

  18. Negative impact of laws regarding biosecurity and bioterrorism on real diseases.

    Science.gov (United States)

    Wurtz, N; Grobusch, M P; Raoult, D

    2014-06-01

    Research on highly pathogenic microorganisms in biosafety level 3 and 4 laboratories is very important for human public health, as it provides opportunities for the development of vaccines and novel therapeutics as well as diagnostic methods to prevent epidemics. However, in recent years, after the anthrax and World Trade Center attacks in 2001 in the USA, the threat of bioterrorism has grown for both the public and the authorities. As a result, technical and physical containment measures and biosafety and biosecurity practices have been implemented in laboratories handling these dangerous pathogens. Working with selected biological agents and toxins is now highly regulated, owing to their potential to pose a threat to public health and safety, despite the fact that the anthrax attack was found to be the result of a lack of security at a US Army laboratory. Thus, these added regulations have been associated with a large amount of fruitless investment. Herein, we describe the limitations of research in these facilities, and the multiple consequences of the increased regulations. These limitations have seriously negatively impacted on the number of collaborations, the size of research projects, and, more generally, scientific research on microbial pathogens. Clearly, the actual number of known victims and fatalities caused by the intentional use of microorganisms has been negligible as compared with those caused by naturally acquired human infections.

  19. Guidelines to implement medical examiner/coroner-based surveillance for fatal infectious diseases and bioterrorism ("Med-X").

    Science.gov (United States)

    Nolte, Kurt B; Fischer, Marc; Reagan, Sarah; Lynfield, Ruth

    2010-12-01

    Medical examiners and coroners investigate deaths that are sudden, unexplained, and violent. Oftentimes these deaths are a consequence of infections, many of which have public health consequences. Additionally, because deaths from bioterrorism are homicides, they fall under the jurisdiction of medical examiners and coroners. Surveillance for infectious disease-related deaths can enhance the opportunities to recognize these deaths. Beginning in 2000, the New Mexico Office of the Medical Investigator developed and tested a medical examiner surveillance model for bioterrorism and infectious disease mortality ("Med-X") using a set of symptoms to determine which cases should receive an autopsy and a set of pathology-based syndromes for early reporting of cases to public health authorities. This model demonstrated that many of the symptoms had a high predictive value for infections and were useful criteria for autopsy performance. The causative organism was identified for 81% of infections of which 58% were notifiable conditions by public health standards. Uniform criteria for performing autopsies and reporting cases to public health authorities enhance surveillance for notifiable infectious diseases and increase the probability of recognizing fatalities related to bioterrorism. We have developed guidelines for medical examiners, coroners and their public health partners to use in implementing Med-X surveillance in their jurisdictions. These guidelines encompass definitions of symptoms and syndromes, specimen collection and storage procedures, laboratory diagnostic approaches, and processes for case flow, case reporting, and data collection. We also suggest resources for autopsy biosafety information and funding.

  20. Protecting HVAC systems from bio-terrorism.

    Science.gov (United States)

    Arterburn, Tom

    2003-01-01

    The FBI, in the wake of the September 11 attacks, issued an advisory to state and local law enforcement authorities and the public asking to remain especially alert to any unusual activities around ventilation systems. It noted that while the Bureau possessed no specific threats regarding the release of toxic chemicals into air handling systems, building owners and managers should be well-aware of the potential for contamination of such systems. This article presents recommendations of air-handling experts and associations for operators to consider.

  1. Accidental and deliberate microbiological contamination in the feed and food chains--how biotraceability may improve the response to bioterrorism.

    Science.gov (United States)

    Knutsson, Rickard; van Rotterdam, Bart; Fach, Patrick; De Medici, Dario; Fricker, Martina; Löfström, Charlotta; Agren, Joakim; Segerman, Bo; Andersson, Gunnar; Wielinga, Peter; Fenicia, Lucia; Skiby, Jeffrey; Schultz, Anna Charlotte; Ehling-Schulz, Monika

    2011-03-01

    A next frontier of the global food safety agenda has to consider a broad spectrum of bio-risks, such as accidental and intentional contaminations in the food and feed chain. In this article, the background for the research needs related to biotraceability and response to bioterrorism incidents are outlined. Given the current scale of international trade any response need to be considered in an international context. Biotraceability (e.g. the ability to use downstream information to point to processes or within a particular food chain that can be identified as the source of undesirable agents) is crucial in any food-born outbreak and particular in the response to bioterrorism events. In the later case, tested and proven biotraceability improves the following: (i) international collaboration of validated tracing tools and detection methods, (ii) multi-disciplinary expertise and collaboration in the field of food microbiology and conceptual modeling of the food chain, (iii) sampling as a key step in biotracing (iv) optimized sample preparation procedures, including laboratory work in Biosafety level 3 (BSL-3) laboratories, (v) biomarker discovery for relevant tracing and tracking applications, and (vi) high-throughput sequencing using bio-informatic platforms to speed up the characterization of the biological agent. By applying biotraceability, the response phase during a bioterrorism event may be shortened and is facilitated for tracing the origin of biological agent contamination.

  2. Distributed micro-releases of bioterror pathogens : threat characterizations and epidemiology from uncertain patient observables.

    Energy Technology Data Exchange (ETDEWEB)

    Wolf, Michael M. (University of Illinois, Urbana-Champaign, Urbana, IL); Marzouk, Youssef M.; Adams, Brian M.; Devine, Karen Dragon; Ray, Jaideep; Najm, Habib N.

    2008-10-01

    Terrorist attacks using an aerosolized pathogen preparation have gained credibility as a national security concern since the anthrax attacks of 2001. The ability to characterize the parameters of such attacks, i.e., to estimate the number of people infected, the time of infection, the average dose received, and the rate of disease spread in contemporary American society (for contagious diseases), is important when planning a medical response. For non-contagious diseases, we address the characterization problem by formulating a Bayesian inverse problem predicated on a short time-series of diagnosed patients exhibiting symptoms. To keep the approach relevant for response planning, we limit ourselves to 3.5 days of data. In computational tests performed for anthrax, we usually find these observation windows sufficient, especially if the outbreak model employed in the inverse problem is accurate. For contagious diseases, we formulated a Bayesian inversion technique to infer both pathogenic transmissibility and the social network from outbreak observations, ensuring that the two determinants of spreading are identified separately. We tested this technique on data collected from a 1967 smallpox epidemic in Abakaliki, Nigeria. We inferred, probabilistically, different transmissibilities in the structured Abakaliki population, the social network, and the chain of transmission. Finally, we developed an individual-based epidemic model to realistically simulate the spread of a rare (or eradicated) disease in a modern society. This model incorporates the mixing patterns observed in an (American) urban setting and accepts, as model input, pathogenic transmissibilities estimated from historical outbreaks that may have occurred in socio-economic environments with little resemblance to contemporary society. Techniques were also developed to simulate disease spread on static and sampled network reductions of the dynamic social networks originally in the individual-based model, yielding faster, though approximate, network-based epidemic models. These reduced-order models are useful in scenario analysis for medical response planning, as well as in computationally intensive inverse problems.

  3. Animal Botulism Outcomes in the AniBioThreat Project. Biosecur. Bioterror

    NARCIS (Netherlands)

    Woudstra, C.; Tevell Aberg, A.; Skarin, H.; Anniballi, F.; Medici, De D.; Bano, L.; Koene, M.G.J.; Löfström, Ch.; Hansen, T.; Hedeland, M.; Fach, P.

    2013-01-01

    Botulism disease in both humans and animals is a worldwide concern. Botulinum neurotoxins produced by Clostridium botulinum and other Clostridium species are the most potent biological substances known and are responsible for flaccid paralysis leading to a high mortality rate. Clostridium botulinum

  4. Bioterrorism Threats Must Unite Academe and the U.S. Intelligence Community

    Science.gov (United States)

    Parker, Elizabeth Rindskopf

    2004-01-01

    The National Research Council recently issued a report that suggested ways in which to improve the management of potentially dangerous biomedical research in both academe and private industry, without unduly restricting scientists in their research activities. Here, the author shares her views on the report as well as the estrangement of the…

  5. 生物恐怖:威胁和解决%Bioterrorism: from Threats to Solutions

    Institute of Scientific and Technical Information of China (English)

    Robert Steffen

    2002-01-01

    @@ Robert Steffen, Scientist, WHO Project Improving public health preparedness on diseases associated with biological warfare; Co-chair, Swiss B Committee: University of Zurich, Switzerland. The goal of any emergency preparedness and response planning is to keep it an emergency and to avert a disaster.

  6. Technologies and equipments of the individual decontamination for medicinal rescue against bioterrorism attack%反生物恐怖袭击医学救援中人员洗消技术与装备

    Institute of Scientific and Technical Information of China (English)

    曹勇平; 贾德胜

    2012-01-01

    This paper made a discussion an the realistic threats of bioterrorism attack in the world and China,the principles and the basic methods of mass decontamination of individuals during a bioterrorism attack incident,the re-search developments at home and abroad and the existing problems in our nation on technology and equipment of de-contamination against bioterrorism attack, in order to provide the references for further improving the preparedness of emergency rescue and carrying out the research on technology and equipment of individual decontamination against bioterrorism attack.%本文探讨了生物恐怖袭击在世界和我国威胁的现实性、反生物恐怖袭击大量人员洗消的原则和基本方法、反生物恐怖袭击洗消技术和装备的研究进展以及我国在反生物恐怖袭击洗消技术和装备存在的问题,为进一步做好反生物恐怖袭击应急救援准备工作和开展生防人员洗消技术装备研究提供参考.

  7. Bioterrorism and radiation. What to do? What research is needed?

    International Nuclear Information System (INIS)

    Radiological and nuclear terrorism has emerged as a major concern. Often included within the broad category of bioterrorism, the response to the intentional exposure of populations to radiation requires governmental agencies, law enforcement agencies, policy-makers, experts in radiation medicine and radiation biology and an educated citizenry. Emerging knowledge of normal tissue injury following radiation will provide important areas for research, as outlined in a recent Radiation Research Program (RRP) Workshop from the National Cancer Institute (NCI) (Stone HB, Rad Res 157:204- 223, 2002). Such research involves radiation biology and wound healing and may ultimately provide strategies for pre-exposure radioprotectors as well as post-exposure strategies to prevent serious normal tissue damage. Radiation in the Moderate Dose range, defined as 1-10 Gy, applies to radiological and nuclear terrorism and also to clinical radiation therapy. (RRP Moderate Dose Radiation Workshop, Coleman CN, Rad Res, in press 2003). New approaches such as Intensity Modulated Radiotherapy (IMRT) will expose more tissues to low doses of radiation. Strategies for developing agents for normal tissue targets (Tofilon). The successful application of radiotherapy as a cancer treatment modality is severely constrained by the risk for normal tissue injury. Because approximately half of all cancer patients receive radiation treatment, the ability to selectively protect normal tissue would be of obvious clinical benefit. In addition to cancer therapy, current geopolitical circumstances reinforce the need for generating agents that protect against the consequences of environmental radiation exposure, accidental or intentional. Currently, there are relatively few available agents with the potential to reduce or eliminate radiation-induced normal tissue injury after clinical and/or environmental exposure. A goal of the Radiation Research Program is to identify and develop novel radioprotectors

  8. Ozone threat

    International Nuclear Information System (INIS)

    Ozone hole was first discovered in 1980. Thus 15 years even after the first warming, the world is no where near to the elimination of man made gases that threaten to destroy the ozone layer. Ozone depletion has become a matter of enormous threat which remains to be solved by the Scientists and intelligentia of the world. Ozone (O3) is a pungent poisonous gas. It forms a layer at a distance of about 15 miles above the earth's surface which helps shield living things from the sun shearing ultra violet light. If ozone is lost, more ultra violet light reaches the earth, which can lead to increasing rate of skin cancer, the death of micro organisms and the failure of crops and plants. It was in 1974 when it was discovered that Chlorofluorocarbons (CFCs) cold rise slowly to the upper atmosphere and destroy the earth's fragile ozone shield. Chlorofluorocarbons are commonly used as coolants (such as Freon) for home and automobile air conditioners and in the making of fast food containers. CFCs take about 100 years or more to reach he stratosphere to damage the ozone layers. In 1988, Scientists confirmed that upto 3% of the ozone layer over the more populated Northern Hemisphere has been destroyed. it is believed that for every 1% decrease in ozone, skin cancers are expected to rise 5 to 6 per cent due to the increase of ultraviolet light. Cases of cataracts and certain human immune system diseases are also expected to rise. (author)

  9. Bioterrorism and Emergency Preparedness in Aging (BTEPA): HRSA-Funded GEC Collaboration for Curricula and Training

    Science.gov (United States)

    Johnson, Arleen; Roush, Robert E., Jr.; Howe, Judith L.; Sanders, Margaret; McBride, Melen R.; Sherman, Andrea; Palmisano, Barbara; Tumosa, Nina; Perweiler, Elyse A.; Weiss, Joan

    2006-01-01

    Frail elders living alone or in long-term care settings are particularly vulnerable to bioterrorism and other emergencies due to their complex physical, social and psychological needs. This paper provides an overview of the recent literature on bioterrorism and emergency preparedness in aging (BTEPA); discusses federal initiatives by the health…

  10. Use of medical simulation to teach bioterrorism preparedness: the anthrax example.

    Science.gov (United States)

    Olsen, Martin E

    2013-01-01

    The 2001 anthrax bioterrorism attacks demonstrated vulnerability for future similar attacks. This article describes mechanisms that can be used to prepare the medical community and healthcare facilities for the diagnosis and management of a subsequent bioterrorism attack should such an event occur and the fundamentals of medical simulation and its use in teaching learners about the diagnosis of management of anthrax exposure.

  11. 76 FR 61227 - Agricultural Bioterrorism Protection Act of 2002; Biennial Review and Republication of the Select...

    Science.gov (United States)

    2011-10-03

    ... in both 9 CFR 121.4 and 42 CFR 73.4). On July 29, 2010, we published in the Federal Register (75 FR... 9 CFR Part 121 Agricultural Bioterrorism Protection Act of 2002; Biennial Review and Republication...-AD09 Agricultural Bioterrorism Protection Act of 2002; Biennial Review and Republication of the...

  12. Nuclear Threats and Security

    OpenAIRE

    Garry Jacobs; Winston P. Nagan

    2012-01-01

    This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legalit...

  13. The plague of Athens: an ancient act of bioterrorism?

    Science.gov (United States)

    Papagrigorakis, Manolis J; Synodinos, Philippos N; Stathi, Angeliki; Skevaki, Chrysanthi L; Zachariadou, Levantia

    2013-09-01

    Recent data implicate Salmonella enterica serovar Typhi as a causative pathogen of the Plague of Athens during the Peloponnesian War (430-426 bc). According to Thucydides, the sudden outbreak of the disease may link to poisoning of the water reservoirs by the Spartans. The siege of a city was aimed at exhausting the supplies of a population, which often led to the outbreak and spread of epidemics. Poisoning of the water reservoirs of a besieged city as an act of bioterrorism would probably shorten the necessary time for such conditions to appear.

  14. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  15. Progress on prevention and therapy against category A of bioterrorism agents in U.S.%美国针对A类生物恐怖剂的医学防护技术研究进展

    Institute of Scientific and Technical Information of China (English)

    李莹; 张传本; 王磊; 王松俊

    2008-01-01

    "Anthrax incident"happened in U.S.demonstrates the reality of the threat of bioterrorism.It also stimulates scientists to study the prevention against bioterrorism.The CDC has defined Bacillus anthracis,Smallpox virus,Yersinia pestis,Clostridium botulinum toxin,Francisella tularensis and Hemorrhagic fevers virus as category A of bioterrorism agents,meaning they present the greatest potential threats for harming public health.In the review,progress on prevention and therapy against these agents studied in U.S.will be summarized.%美国"炭疽事件"充分说明了生物恐怖威胁的现实性,同时也刺激了美国科技界对生物恐怖防护技术的研究.此文就美国针对A类生物恐怖剂预防和治疗相关技术的研究进展作了综述.

  16. Bioterrorism-Related Anthrax Surveillance, Connecticut, September–December, 2001

    OpenAIRE

    Williams, Alcia A.; Parashar, Umesh D.; Adrian STOICA; Ridzon, Renee; Kirschke, David L.; Meyer, Richard F.; McClellan, Jennifer; Fischer, Marc; Nelson, Randy; Cartter, Matt; Hadler, James L; Jernigan, John A.; Mast, Eric E.; Swerdlow, David L.; ,

    2002-01-01

    On November 19, 2001, a case of inhalational anthrax was identified in a 94-year-old Connecticut woman, who later died. We conducted intensive surveillance for additional anthrax cases, which included collecting data from hospitals, emergency departments, private practitioners, death certificates, postal facilities, veterinarians, and the state medical examiner. No additional cases of anthrax were identified. The absence of additional anthrax cases argued against an intentional environmental ...

  17. Efficacy of Modified Cognitive Interviewing, Compared to Human Judgments in Detecting Deception Related to Bio-threat Activities

    Directory of Open Access Journals (Sweden)

    Dr. Charles A. Morgan

    2013-08-01

    Full Text Available National security professionals have few scientifically valid methods for detecting deception in people who deny being involved in illicit activities relevant to national security. Numerous detecting deception studies have demonstrated that the Modified Cognitive Interviewing (MCI method is one such method - yielding detecting deception rates (i.e. 80-85% that are significantly above those achieved by chance (i.e. 50% or by human judgments (i.e. 54-56%. To date, however, no MCI studies have involved dilemmas of ethological interest to national security professionals. This project begins to address this gap in the scientific literature. In it, we compared the efficacy of MCI to that of human judgments for detecting deception in scientists with expertise in biological materials. Sixty-four scientists were recruited for study; 12 met with a “terrorist” and were paid to make biological materials for illicit purposes. All 64 scientists were interviewed by investigators with law enforcement experience about the bio-threat issue. MCI elicited speech content differences in deceptive, compared to truthful scientists. This resulted in a classification accuracy of 84.4%; Accuracies for Human Judgments (interviewers/raters were 54% and 46%, respectively. MCI required little time and its efficacy suggests it is reasonable to recommend its use to national security experts.

  18. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  19. Bioterrorism and the Role of the Clinical Microbiology Laboratory.

    Science.gov (United States)

    Wagar, Elizabeth

    2016-01-01

    Regular review of the management of bioterrorism is essential for maintaining readiness for these sporadically occurring events. This review provides an overview of the history of biological disasters and bioterrorism. I also discuss the recent recategorization of tier 1 agents by the U.S. Department of Health and Human Services, the Laboratory Response Network (LRN), and specific training and readiness processes and programs, such as the College of American Pathologists (CAP) Laboratory Preparedness Exercise (LPX). LPX examined the management of cultivable bacterial vaccine and attenuated strains of tier 1 agents or close mimics. In the LPX program, participating laboratories showed improvement in the level of diagnosis required and referral of isolates to an appropriate reference laboratory. Agents which proved difficult to manage in sentinel laboratories included the more fastidious Gram-negative organisms, especially Francisella tularensis and Burkholderia spp. The recent Ebola hemorrhagic fever epidemic provided a check on LRN safety processes. Specific guidelines and recommendations for laboratory safety and risk assessment in the clinical microbiology are explored so that sentinel laboratories can better prepare for the next biological disaster.

  20. Is the Hybrid Threat a True Threat?

    Directory of Open Access Journals (Sweden)

    David L. Raugh

    2016-06-01

    Full Text Available Does the “hybrid threat” discussed in General Marty Dempsey’s 2015 United States National Military Strategy make logical sense? In this paper I define the national security threat risk assessment process, examine the most significant US security threats, and study the hybrid threat. I conclude that the hybrid threat is the one that could most exploit our nation’s critical vulnerabilities- both from a security and foreign policy perspective. I conclude with a study of security and economic methods to reduce this threat.

  1. Bubbling Threat

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The shift of China’s monetary policy stance from "moderately loose" to "prudent" in 2011 indicates curbing inflation and asset bubbles have become the Central Government’s top priority. But is China’s bubble problem short-term or long-term? Is it only monetary or related to economic structure? Is it the cause of China’s economic imbalance or the result? And what kind of deep-rooted problems in the macro economy does it reflect? All these questions call for deep thought,said Zhang Monan,a

  2. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  3. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    Directory of Open Access Journals (Sweden)

    Yong eZhu

    2015-11-01

    Full Text Available Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed.

  4. Being prepared: bioterrorism and mass prophylaxis: part I.

    Science.gov (United States)

    Weant, Kyle A; Bailey, Abby M; Fleishaker, Elise L; Justice, Stephanie B

    2014-01-01

    Bioterrorism presents a real and omnipresent risk to public health throughout the world. More than 30 biological agents have been identified as possessing the potential to be deployed in a bioterrorist attack. Those that have been determined to be of the greatest concern and possess the greatest potential of use in this arena are known as the Category A agents: Bacillus anthracis (anthrax); Variola major (smallpox); Yersinia pestis (plague); Francisella tularensis (tularemia); viral hemorrhagic fevers; and Clostridium botulinum toxin (botulism toxin). Although the Centers for Disease Control and Prevention utilizes surveillance systems to identify illnesses, the weight of diagnosing, effectively treating, and notifying the appropriate public health officials lies squarely on the shoulders of emergency care personnel. Part I of this two-part review will focus on the clinical presentation and treatment of anthrax, plague, and tularemia. The subsequent Part II of this review will discuss smallpox, viral hemorrhagic fevers, botulism toxin, and the provision of mass prophylaxis.

  5. Interpreting ambiguous health and bodily threat: are individual differences in pain-related vulnerability constructs associated with an on-line negative interpretation bias?

    Science.gov (United States)

    Vancleef, Linda M G; Peters, Madelon L; De Jong, Peter J

    2009-03-01

    The present study examined the association between pain-related anxiety and an on-line interpretation bias for putative physical health threat. Healthy volunteers (n=80) completed measures on Anxiety Sensitivity, Injury/illness Sensitivity, Fear of Pain and Pain Catastrophizing. Furthermore, they performed an interpretation task, in which spontaneous (on-line) inferences were indirectly assessed from reaction times and accuracy of a lexical decision to the final word of an ambiguous description. Results demonstrated a general facilitation of responses to final words that endorsed a health-threatening resolution of ambiguity (e.g., illness). This effect correlated positively with individual levels of Fear of Pain, but was found to be unrelated to levels of Anxiety Sensitivity, Injury/illness Sensitivity or Pain Catastrophizing. Implications of the findings and recommendations for future research are discussed.

  6. Threats to Bitcoin Software

    OpenAIRE

    Kateraas, Christian H

    2014-01-01

    Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.

  7. Ebola Virus ─ A Global Threat

    Directory of Open Access Journals (Sweden)

    Mejbah Uddin Ahmed

    2015-01-01

    Full Text Available Ebola virus is a filamentous, enveloped, non-segmented, single-stranded, negative-sense RNA virus. It belongs to the Filoviridae and was first recognized near the Ebola River valley in Zaire in 1976. Since then most of the outbreaks have occurred to both human and nonhuman primates in sub-Saharan Africa. Ebola virus causes highly fatal hemorrhagic fever in human and nonhuman primates. In addition to hemorrhagic fever, it could be used as a bioterrorism agent. Although its natural reservoir is yet to be proven, current data suggest that fruit bats are the possibility. Infection has also been documented through the handling of infected chimpanzees, gorillas, monkeys, forest antelope and porcupines. Human infection is caused through close contact with the blood, secretion, organ or other body fluids of infected animal. Human-to-human transmission is also possible. Ebola virus infections are characterized by immune suppression and a systemic inflammatory response that causes impairment of the vascular, coagulation, and immune systems, leading to multiorgan failure and shock. The virus constitutes an important public health threat in Africa and also worldwide as no effective treatment or vaccine is available till now

  8. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  9. Threat by association: do distant intergroup threats carry-over into local intolerance?

    Science.gov (United States)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-09-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the threatening group, carry over to other groups that individuals actually do encounter in their local environment (e.g., immigrants). The main goal of our studies was to experimentally identify this carry-over effect of intergroup threat. Specifically, we hypothesized that (by definition relatively abstract) symbolic threats (e.g., threats to the ingroup's worldview) have an especially strong carry-over potential because those threats can be easily attributed to other outgroups. We tested these predictions in one correlational and two experimental studies. The results of all three studies confirmed our hypothesis that particularly distant symbolic threats were predictive of intolerance towards local outgroups.

  10. Exercising multi-jurisdictional response to bioterrorism in Canada

    International Nuclear Information System (INIS)

    Throughout 2007, the CRTI Biological Cluster conducted a series of biological terrorism exercises within a project entitled Bi-Ex West. The overall purpose of Bi-Ex West was to determine how the federal science and technology community could assist responders in a bio-terrorism attack involving a zoonotic agent. Bi-Ex West consisted of three immersive electronic tabletop exercises, which culminated into a two-day full-scale field exercise involving more than 200 players distributed throughout six sites. Participants represented 18 agencies, including agricultural, health and emergency management organizations at the federal, provincial and municipal levels, as well as first responders from the law enforcement and fire rescue communities. These exercises were conducted in a learning environment that fostered knowledge sharing between local, provincial and federal agencies and enabled participants to exercise their roles, responsibilities and procedures when responding to a biological terrorist event. It also provided agencies with an opportunity to gain a better understanding of how to integrate their various response plans to improve coordination. Observations and recommendations were collected from evaluators and participants over the course of the exercise. The resulting 70 recommendations have been grouped under the following categories: Roles and Responsibilities; Communication; Training, Education and Planning; Resources and Equipment; Security and; Exercise Design. In addition to action items attached to the recommendations, a number of CBRNE activities resulted from Bi-Ex West increasing the capacity of resources within the Federal Government and the Province of British Columbia.(author)

  11. Bio-terrorism: still interesting or concerning nowadays?

    Directory of Open Access Journals (Sweden)

    Claudiu E. Sbârcea

    2014-12-01

    Full Text Available Bio-terrorism involves using biological agents/toxins with the intent to intimidate or coerce a government or civilian population to further political or social objectives, usually leading to deaths or illnesses of humans but also of plants/animals. Their use would probably initially be considered as a natural or unintentional event, especially in case of live biological agents. Moreover, a natural occurring disease outbreak could have the same destructive outcome as an efficient biological weapon. There is a need for proper differentiation between natural and intentional events although in the first stages the medical response should be similar; however, the course of incident management would take different paths later on. Biological agents’ investigation of dangerous pathogens, from natural unusual outbreaks or bioterrorist attacks/other intentional use, imply the collaboration of different institutions with responsibilities in public health but also in national security and defense. The National Security and the Defense System institutions think mainly in security terms while national health care system institutions think principally` in medical care/prevention terms. These two ways of acting have to be combined in order to deal properly with hazardous biological agents.

  12. Are we preparing health services administration students to respond to bioterrorism and mass casualty management?

    Science.gov (United States)

    Houser, Shannon H; Houser, Howard W

    2006-01-01

    Bioterrorism/natural disaster events add significant specialized demands and disrupt normal operation of the health system, often for an indefinite period of time. Health administration leaders should be educationally prepared for and informed about these potential events, but few receive this knowledge via their academic preparation in health administration. This study examined the existence of coverage of bioterrorism topics in health administration curricula and characteristics of bioterrorism coverage in current health administration programs through a self-completed survey among AUPHA graduate and undergraduate program members. Of the total survey respondents, only 32% of programs have current coverage of bioterrorism. The main reasons for nothavingbioterrorism coverage were not having enough resources; not having enough time to develop course/materials; and not thinking it is necessary to add these courses/materials. To prepare better and to inform future health administrators regarding major disruptive circumstances, advocacy and documentation are important to develop and implement bioterrorism awareness. Possibly, suggested minimum curricular requirements, content, and mechanisms for inclusion can be developed in the near future. Health administration educators should address the new reality and demonstrate that their graduates can function and lead in crises and situations disruptive to normal commerce.

  13. Training Future Physicians about Weapons of Mass Destruction: Report of the Expert Panel on Bioterrorism Education for Medical Students.

    Science.gov (United States)

    Association of American Medical Colleges, Washington, DC.

    The Association of American Medical Colleges (AAMC) convened a multidisciplinary group of experts to share their insights about the learning objectives and educational experiences that they would recommend for the training of future physicians about bioterrorism. The expert panel broadened the scope of their discussion beyond bioterrorism to…

  14. The germs of terror – Bioterrorism and science communication after September 11 (Italian original version

    Directory of Open Access Journals (Sweden)

    Maria Chiara Montani

    2006-09-01

    Full Text Available The attacks of September 11 2001 and in particular, the sending of letters containing anthrax spores the following October had a profound effect on society, and at the same time on science and its communicative mechanisms. Through a quanto-qualitative analysis of articles taken from four publications: two daily newspapers, the Corriere della Sera from Italy and the New York Times from the United States and two science magazines, Science and Nature, we have shown how the aforementioned events provoked the emergence of media attention regarding bioterrorism. A closer reading of the articles shows that today, science – including that found in science magazines – is closely related to politics, economics and the debate over the freedom to practice communicate. The very mechanisms of communication between scientists were changed as a result of this debate, as can be seen from the signing of the Denver Declaration in February 2003, which brought about the preventative self-censorship of publication of biomedical research findings.

  15. The germs of terror – Bioterrorism and science communication after September 11

    Directory of Open Access Journals (Sweden)

    Maria Chiara Montani

    2006-09-01

    Full Text Available The attacks of September 11 2001 and in particular, the sending of letters containing anthrax spores the following October had a profound effect on society, and at the same time on science and its communicative mechanisms. Through a quanto-qualitative analysis of articles taken from four publications: two daily newspapers, the Corriere della Sera from Italy and the New York Times from the United States and two science magazines, Science and Nature, we have shown how the aforementioned events provoked the emergence of media attention regarding bioterrorism. A closer reading of the articles shows that today, science – including that found in science magazines – is closely related to politics, economics and the debate over the freedom to practice communicate. The very mechanisms of communication between scientists were changed as a result of this debate, as can be seen from the signing of the Denver Declaration in February 2003, which brought about the preventative self-censorship of publication of biomedical research findings.

  16. Surveillance of the bioterrorist threat: a primary care response.

    Science.gov (United States)

    Fleming, D M; Barley, M A; Chapman, R S

    2004-03-01

    Threats from bioterrorism are of national and international concern. We outline a system of disease surveillance covering a selection of diseases linked to potential bioterrorist threats, based on the weekly returns service of the Royal College of General Practitioners and covering a surveillance population of 650,000 in England and Wales. Practices record working diagnoses and the episode type (distinguishing new episodes of illness from ongoing consultations) on patients' computerised medical records. These are interrogated twice weekly by using automated routines. The registered population and persons consulting for each Read code (group of codes) are counted in sex and age specific groups and the data forwarded electronically to the Research Unit, where the results are consolidated by region (North, Central, South). Weekly incidence rates between October 2001 and September 2002 were compared with the weekly average over the past seven years for 13 selected conditions. Detailed data are presented for three conditions (asthma, infections of the skin, disorders of the peripheral nervous system). For asthma increased incidence was reported in weeks 31 and 32 of 2002, predominantly in the Central region. For the other two conditions no unusual peaks of incidence were observed in any region. Operational research based on disciplined recording of morbidity in general practice can deliver timely surveillance data on bioterrorist threats.

  17. Planning for Rift Valley fever virus: use of geographical information systems to estimate the human health threat of white-tailed deer (Odocoileus virginianus-related transmission

    Directory of Open Access Journals (Sweden)

    Sravan Kakani

    2010-11-01

    Full Text Available Rift Valley fever (RVF virus is a mosquito-borne phlebovirus of the Bunyaviridae family that causes frequent outbreaks of severe animal and human disease in sub-Saharan Africa, Egypt and the Arabian Peninsula. Based on its many known competent vectors, its potential for transmission via aerosolization, and its progressive spread from East Africa to neighbouring regions, RVF is considered a high-priority, emerging health threat for humans, livestock and wildlife in all parts of the world. Introduction of West Nile virus to North America has shown the potential for “exotic” viral pathogens to become embedded in local ecological systems. While RVF is known to infect and amplify within domestic livestock, such as taurine cattle, sheep and goats, if RVF virus is accidentally or intentionally introduced into North America, an important unknown factor will be the role of local wildlife in the maintenance or propagation of virus transmission. We examined the potential impact of RVF transmission via white-tailed deer (Odocoileus virginianus in a typical north-eastern United States urban-suburban landscape, where livestock are rare but where these potentially susceptible, ungulate wildlife are highly abundant. Model results, based on overlap of mosquito, human and projected deer densities, indicate that a significant proportion (497/1186 km2, i.e. 42% of the urban and peri-urban landscape could be affected by RVF transmission during the late summer months. Deer population losses, either by intervention for herd reduction or by RVF-related mortality, would substantially reduce these likely transmission zones to 53.1 km2, i.e. by 89%.

  18. The Relation between Hollywood and the New Threat Perception of the USA after the End of the Cold War from the Perspective of Postmodernism

    Directory of Open Access Journals (Sweden)

    Derya Deger

    2011-10-01

    Full Text Available After the end of Cold War, the USA became the only super power and there was no threat perception from outside, in other words no enemy anymore. In fact, throughout history the USA faced different threats, that is to say, enemies. The terrorist events experienced in America after the end of Cold War brought about that the new enemy was Middle Easterners. Accordingly, the place of cinema in postmodernism is very significant as it becomes the reflection of the zeitgeist and the mindset of the era in which the film is shot.

  19. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  20. 76 FR 77914 - Agricultural Bioterrorism Protection Act of 2002; Biennial Review and Republication of the Select...

    Science.gov (United States)

    2011-12-15

    ... submit comments. DATES: The comment period for the proposed rule published October 3, 2011 (76 FR 61228... INFORMATION: On October 3, 2011, we published in the Federal Register (76 FR 61228-61244, Docket No. APHIS...-AD09 Agricultural Bioterrorism Protection Act of 2002; Biennial Review and Republication of the...

  1. Retroviruses and other latent viruses: the deadliest of pathogens are not necessarily the best candidates for bioterrorism.

    Science.gov (United States)

    Salgado, Cassandra D; Kilby, J Michael

    2009-06-01

    HIV-1 (and other viral causes of latent, chronic infections) is not a likely candidate for bioterrorism. Scenarios resulting in the introduction of retroviral infections into a large population generally seem impractical and unpredictable as bioterrorist plots, especially relative to the frightening simplicity of deadly anthrax spores or smallpox virions. As evidenced in the above discussion, contaminating the blood supply would require a highly sophisticated plan resulting in effects of rather limited ultimate scope, and would have to evade an extremely effective screening process already in full force. Contaminating other agents given parenterally is also a potential concern, but again the virus has rather fastidious growth characteristics outside of the human host, and even if this could be accomplished it would presumably affect only a very limited number of targeted individuals. Finally, the idea of a kind of"sexual suicide bomber", an individual deliberately introduced into the community to spread a deadly infectious disease might be proposed. However, as discussed in this commentary, the impact of this rather implausible scenario would be substantially delayed, unreliable, and ultimately could be controlled through a heightened response of already existing public health mechanisms. Whereas HIV has resulted in the "perfect storm" of a devastating pandemic, a major cause of worldwide morbidity and mortality that is tremendously challenging to control, it does not match up very effectively with the Centers for Disease Control and Prevention (CDC) Category A definition of an ideal agent of bioterrorism. It is not easily spread through casual or incidental contact and does not cause a substantial immediate death toll. Instead it is spread only through sexual, parenteral, or maternal/fetal transmission, and generally requires a prolonged and variable clinical latency period prior to disease progression and death. The U.S. public health system is already reasonably

  2. Alternative Threat Methodology

    Directory of Open Access Journals (Sweden)

    Charles B. King III

    2011-01-01

    Full Text Available Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known. However, estimating the probability of an individual's or group's attacking a specific (or even a generic target is an element of risk analysis in which art and intuition are applied far more regularly than is science.

  3. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  4. The threat and countermeasure of bioterrorism%生物恐怖的威胁及其对策

    Institute of Scientific and Technical Information of China (English)

    姜庆五

    2003-01-01

    @@ 2001年9月11日美国遭遇恐怖袭击,一年多以来美国民众除一直沉浸在恐慌和哀伤之中外,还时时处于面临邮件炭疽袭击的危险中.生物恐怖袭击已经成为世界各国无法回避的问题.目前,有关生物性攻击的威胁以及可能造成的灾难和人类将面临何种生物威胁都成为国家安全与公共卫生关注的焦点.

  5. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...... on to discuss a number of approaches from the technological, the sociological, and the socio-technical domain. We draw two main conclusions. Tackling insider threats requires a combination of techniques from the technical, the sociological, and the socio-technical domain, to enable qualified detection...... of threats, and their mitigation. Another important observation is that the distinction between insiders and outsiders seems to loose significance as IT infrastructure is used in performing insider attacks....

  6. Facing ambiguous threats.

    Science.gov (United States)

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  7. External threat and the definition of deviance.

    Science.gov (United States)

    Laudedale, P; Smith-Cunnien, P; Parker, J; Inverarity, J

    1984-05-01

    Research ( Lauderdale , 1976; Schachter , 1951) suggests that an external threat to a group can lead to the rejection of deviant members of the group and alteration of group communication patterns and solidarity. This study sought to extend those findings, integrate them with concepts from Simmel 's (1917/1955) work on group conflict, and link them to key issues in the societal reaction approach to deviant behavior. We examined the effect of variation in level of threat, the relationship between deviant status and nonconformity to the central task norm, the role of high-status actors in deviance designation, the relationship between rejection and negative definition of the deviant, and the effects of rejection and negative definition on group solidarity. Hypotheses were tested in an experimental design involving three conditions (strong threat, weak threat, and no threat). The results suggest that (a) the level of threat is directly related to the extent of rejection and negative definition, (b) nonconformity to the central task norm is not systematically related to deviant status, (c) high-status actors are more involved in the rejection of the deviant, (d) sociometric rejection of the deviant is accompanied by negative definition in the strong-threat condition, and (e) the level of group solidarity is related to the extent of rejection and negative definition. Implications of these findings are discussed relative to the societal reaction approach to deviant behavior and analogous processes in other social groups.

  8. The bioscience revolution & the biological weapons threat: levers & interventions

    Directory of Open Access Journals (Sweden)

    Martin Greg

    2009-02-01

    Full Text Available Abstract In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level.

  9. Development of a highly efficacious vaccinia-based dual vaccine against smallpox and anthrax, two important bioterror entities

    OpenAIRE

    Tod J Merkel; Perera, Pin-Yu; Kelly, Vanessa K.; Verma, Anita; Llewellyn, Zara N.; Waldmann, Thomas A.; Mosca, Joseph D.; Perera, Liyanage P.

    2010-01-01

    Bioterrorism poses a daunting challenge to global security and public health in the 21st century. Variola major virus, the etiological agent of smallpox, and Bacillus anthracis, the bacterial pathogen responsible for anthrax, remain at the apex of potential pathogens that could be used in a bioterror attack to inflict mass casualties. Although licensed vaccines are available for both smallpox and anthrax, because of inadequacies associated with each of these vaccines, serious concerns remain ...

  10. 核或辐射事故应急威胁评估兼论其它%On Nuclear or Radiological Accident Emergency Threat Assessment and Related Aspects

    Institute of Scientific and Technical Information of China (English)

    卢盛甲

    2013-01-01

    It was presented for object of nuclear or radiological accident emergency, according to national regulations of nuclear or radiological emergency, and base on IAEA Safety Standards for requirement for preparedness of a nuclear or radiological emergency in the paper. To avoid empty in nuclear or radiological accident emergency arrangement, propose to set up regions arrangement for nuclear or radiological accidents emergency in on threat I or II of provinces according to IAEA threat category IV exist situation in Sino.%  本文根据国家核或辐射应急相关法规,参照国际子能机构有关安全出版物对核或辐射应急准备与响应的要求,提出国内核或辐射事故应急准备和应急响应的目标。鉴国际子能机构划分的核或辐射威胁类型 IV 各国和地区都存在的事实,建议我国在无威胁类型 I 和 II 的省份,考虑区应急管理,避免部分省或地区核或辐射事故应急管理出现盲区。

  11. Prophylaxis and Treatment of Pregnant Women for Emerging Infections and Bioterrorism Emergencies

    OpenAIRE

    Cono, Joanne; Cragan, Janet D.; Jamieson, Denise J.; Rasmussen, Sonja A.

    2006-01-01

    Emerging infectious disease outbreaks and bioterrorism attacks warrant urgent public health and medical responses. Response plans for these events may include use of medications and vaccines for which the effects on pregnant women and fetuses are unknown. Healthcare providers must be able to discuss the benefits and risks of these interventions with their pregnant patients. Recent experiences with outbreaks of severe acute respiratory syndrome, monkeypox, and anthrax, as well as response plan...

  12. Ethical Proactive Threat Research

    Science.gov (United States)

    Aycock, John; Sullins, John

    Through a provocative examination of the positive effects of computer security research on regular users, we argue that traditional security research is insufficient. Instead, we turn to a largely untapped alternative, proactive threat research, a fruitful research area but an ethical minefield. We discuss practices for ethical research and dissemination of proactive research.

  13. Being prepared: bioterrorism and mass prophylaxis: part II.

    Science.gov (United States)

    Weant, Kyle A; Bailey, Abby M; Fleishaker, Elise L; Justice, Stephanie B

    2014-01-01

    Although several biological agents have been recognized as presenting a significant threat to public health if used in a bioterrorist attack, those that are of greatest importance are known as the Category A agents: Bacillus anthracis (anthrax); variola major (smallpox); Yersinia pestis (plague); Francisella tularensis (tularemia); ribonucleic acid viruses (hemorrhagic fevers); and Clostridium botulinum (botulism toxin). In the previous issue, Part I of this review focused on the clinical presentation and treatment of anthrax, plague, and tularemia. In this second part of this 2-part review of these agents, the focus is on the clinical presentation and treatment of smallpox, viral hemorrhagic fevers, and botulism toxin. The utilization of mass prophylaxis to limit the morbidity and mortality associated with all these agents is also discussed along with the role emergency care personnel play in its implementation.

  14. Dental professionals' knowledge and perceived need for education in bioterrorism preparedness.

    Science.gov (United States)

    Bhoopathi, Vinodh; Mashabi, Samar Omar; Scott, Thayer E; Mascarenhas, Ana Karina

    2010-12-01

    Dental professionals should be well prepared to provide care during bioterrorist events. In this study, we assessed the knowledge, opinions about playing various roles during a bioterrorist event, and perceived need for education of dental professionals (dentists and dental hygienists) from one region (Oregon) that had been exposed to bioterrorism and from another region (New England) not exposed. This cross-sectional study used an eighteen-item pretested, self-administered questionnaire distributed at the 2005 Oregon Dental Conference (n=156) and 2005 Yankee Dental Conference (n=297). Dental professionals' knowledge and perceived need for education on bioterrorist preparedness were quantified by multivariate linear and logistic modeling. More than 90 percent of the dental professionals were willing to provide care during bioterrorist events. Perceived knowledge was high; however, actual knowledge was low. Dental professionals who wanted to attend a continuing education course and who thought dental professionals should play more roles during a bioterrorist attack had higher actual knowledge. Willingness to provide care was not supported by adequate knowledge. No significant differences between New England and Oregon dental professionals were observed in terms of actual knowledge or perceived need for bioterrorism education. Integrating training and education into the predoctoral dental and dental hygiene curricula and developing continuing education courses would improve knowledge and better prepare dental professionals to effectively perform American Dental Association-recommended roles during any future bioterrorism events.

  15. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  16. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  17. Social Anxiety-Linked Attention Bias to Threat Is Indirectly Related to Post-Event Processing Via Subjective Emotional Reactivity to Social Stress.

    Science.gov (United States)

    Çek, Demet; Sánchez, Alvaro; Timpano, Kiara R

    2016-05-01

    Attention bias to threat (e.g., disgust faces) is a cognitive vulnerability factor for social anxiety occurring in early stages of information processing. Few studies have investigated the relationship between social anxiety and attention biases, in conjunction with emotional and cognitive responses to a social stressor. Elucidating these links would shed light on maintenance factors of social anxiety and could help identify malleable treatment targets. This study examined the associations between social anxiety level, attention bias to disgust (AB-disgust), subjective emotional and physiological reactivity to a social stressor, and subsequent post-event processing (PEP). We tested a mediational model where social anxiety level indirectly predicted subsequent PEP via its association with AB-disgust and immediate subjective emotional reactivity to social stress. Fifty-five undergraduates (45% female) completed a passive viewing task. Eye movements were tracked during the presentation of social stimuli (e.g., disgust faces) and used to calculate AB-disgust. Next, participants gave an impromptu speech in front of a video camera and watched a neutral video, followed by the completion of a PEP measure. Although there was no association between AB-disgust and physiological reactivity to the stressor, AB-disgust was significantly associated with greater subjective emotional reactivity from baseline to the speech. Analyses supported a partial mediation model where AB-disgust and subjective emotional reactivity to a social stressor partially accounted for the link between social anxiety levels and PEP. PMID:27157031

  18. Patient Safety Threat - Syringe Reuse

    Science.gov (United States)

    ... HAIs HICPAC One & Only Campaign A Patient Safety Threat – Syringe Reuse Recommend on Facebook Tweet Share Compartir ... need to be aware of a very serious threat to their health - the reuse of needles or ...

  19. Historical precedence and technical requirements of biological weapons use : a threat assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Estes, Daniel P.; Vogel, Kathleen Margaret; Gaudioso, Jennifer Marie; Hickok, Lauren T.; Jung, Danielle F.; Barnett, Natalie Beth; Frerichs, Rebecca L.; Salerno, Reynolds Mathewson

    2004-05-01

    The threat from biological weapons is assessed through both a comparative historical analysis of the patterns of biological weapons use and an assessment of the technological hurdles to proliferation and use that must be overcome. The history of biological weapons is studied to learn how agents have been acquired and what types of states and substate actors have used agents. Substate actors have generally been more willing than states to use pathogens and toxins and they have focused on those agents that are more readily available. There has been an increasing trend of bioterrorism incidents over the past century, but states and substate actors have struggled with one or more of the necessary technological steps. These steps include acquisition of a suitable agent, production of an appropriate quantity and form, and effective deployment. The technological hurdles associated with the steps present a real barrier to producing a high consequence event. However, the ever increasing technological sophistication of society continually lowers the barriers, resulting in a low but increasing probability of a high consequence bioterrorism event.

  20. Modeling threat assessments of water supply systems using markov latent effects methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Consuelo Juanita

    2006-12-01

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  1. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  2. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  3. A decade of countering bioterrorism: incremental progress, fundamental failings.

    Science.gov (United States)

    Danzig, Richard

    2012-03-01

    The fear and disruption caused by the 2001 anthrax attacks understandably led Americans to seek enhanced biodefenses. However, the path followed since those attacks has left the country inadequately prepared to face further risks from biological attacks. Why has security against these threats been only partially achieved? This article suggests that our responses over the past decade can be sorted into 4 levels in order of increasing difficulty. First, we rapidly appropriated funds, augmented personnel, and mandated reorganization of agencies. Though not easy to accomplish, these steps were easily conceptualized and, whatever their imperfections, could rather assuredly be achieved. A second level was more demanding, but also quite achievable. It involved the amplification of ongoing efforts. These efforts sometimes suffered as they scaled up, but, though they were qualified by delays and uncertainties, we can point to real achievements at this level. A third level was more difficult: It required evolving new strategies to deal with this largely unprecedented problem. In this regard, we have so far had only glimmers of possibility. At a fourth level, our performance and our prospects are worse still. At this level, our problems stem from resistances inherent in our country's cultural and political framework. This article identifies some of these problems and suggests, regrettably, that they are not likely to be resolved until change is catalyzed by further, and more dramatically traumatic, attacks or natural disasters. If this situational assessment is correct, what remedial strategies should we pursue? The article distinguishes 3 strategic approaches: an evolutionary one in which the U.S. continues advancing along its present path; a radical approach that attempts to address the fourth-level issues; and a third approach that prepares for punctuated evolution. This third approach accepts the improbability of level 4 change either by gradual evolution or by radical

  4. Capripoxviruses: an emerging worldwide threat to sheep, goats and cattle.

    Science.gov (United States)

    Babiuk, S; Bowden, T R; Boyle, D B; Wallace, D B; Kitching, R P

    2008-09-01

    Capripoxviruses are the cause of sheeppox, goatpox and lumpy skin disease (LSD) of cattle. These diseases are of great economic significance to farmers in regions in which they are endemic and are a major constraint to international trade in livestock and their products. Although the distribution of capripoxviruses is considerably reduced from what it was even 50 years ago, they are now expanding their territory, with recent outbreaks of sheeppox or goatpox in Vietnam, Mongolia and Greece, and outbreaks of LSD in Ethiopia, Egypt and Israel. Increased legal and illegal trade in live animals provides the potential for further spread, with, for instance, the possibility of LSD becoming firmly established in Asia. This review briefly summarizes what is known about capripoxviruses, including their impact on livestock production, their geographic range, host-specificity, clinical disease, transmission and genomics, and considers current developments in diagnostic tests and vaccines. Capripoxviruses have the potential to become emerging disease threats because of global climate change and changes in patterns of trade in animals and animal products. They also could be used as economic bioterrorism agents. PMID:18774991

  5. Pre-PCR processing in bioterrorism preparedness: improved diagnostic capabilities for laboratory response networks.

    Science.gov (United States)

    Hedman, Johannes; Knutsson, Rickard; Ansell, Ricky; Rådström, Peter; Rasmusson, Birgitta

    2013-09-01

    Diagnostic DNA analysis using polymerase chain reaction (PCR) has become a valuable tool for rapid detection of biothreat agents. However, analysis is often challenging because of the limited size, quality, and purity of the biological target. Pre-PCR processing is an integrated concept in which the issues of analytical limit of detection and simplicity for automation are addressed in all steps leading up to PCR amplification--that is, sampling, sample treatment, and the chemical composition of PCR. The sampling method should maximize target uptake and minimize uptake of extraneous substances that could impair the analysis--so-called PCR inhibitors. In sample treatment, there is a trade-off between yield and purity, as extensive purification leads to DNA loss. A cornerstone of pre-PCR processing is to apply DNA polymerase-buffer systems that are tolerant to specific sample impurities, thereby lowering the need for expensive purification steps and maximizing DNA recovery. Improved awareness among Laboratory Response Networks (LRNs) regarding pre-PCR processing is important, as ineffective sample processing leads to increased cost and possibly false-negative or ambiguous results, hindering the decision-making process in a bioterrorism crisis. This article covers the nature and mechanisms of PCR-inhibitory substances relevant for agroterrorism and bioterrorism preparedness, methods for quality control of PCR reactions, and applications of pre-PCR processing to optimize and simplify the analysis of various biothreat agents. Knowledge about pre-PCR processing will improve diagnostic capabilities of LRNs involved in the response to bioterrorism incidents.

  6. The Threat of Captivity: Hollywood and the Sexualization of Race Relations in "The Girls of the White Orchid" and "The Bitter Tea of General Yen."

    Science.gov (United States)

    Marchetti, Gina

    1987-01-01

    Discusses the captivity tale as an outgrowth of two fundamental contradictions within patriarchal ideology. Considers American popular thought in relation to this tale. Relates xenophobia in the 1980s to the sexual and racial politics of "The Girls of the White Orchid." Discusses the racial, sexual, and textual ambivalence in "The Bitter Tea of…

  7. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  8. Review of a new molecular virus pathotyping method in the context of bioterrorism.

    Science.gov (United States)

    Leijon, Mikael; Belák, Sándor

    2013-09-01

    Avian influenza virus (AIV) and Newcastle disease virus (NDV) infect various avian species including domestic poultry. Clinical manifestations vary from subclinical or mild to severe multiorgan systemic disease with a near 100% mortality rate. Severe disease is caused by highly virulent specific virus strains, termed highly pathogenic AIV and velogenic NDV. Recent controversial influenza H5 adaptation studies in ferrets have highlighted the importance of preparedness against AIV as a bioterrorism agent. Furthermore, NDV also has zoonotic potential, although symptoms in humans are mild and self-limiting for naturally occurring viruses. Thus, both of these viruses pose a direct biothreat to domestic poultry but also indirectly to humans via zoonotic transmission. For diagnosis and rapid containment of disease, it is crucial to differentiate highly pathogenic AIVs and NDVs from frequently occurring low pathogenic variants. Recently, we developed a novel strategy for pathotyping of AIV and NDV that we review here. The method should be ideal for rapid testing and surveillance in food safety, for wild bird monitoring, and for combating acts of bioterrorism.

  9. A program against bacterial bioterrorism: improved patient management and acquisition of new knowledge on infectious diseases.

    Science.gov (United States)

    Kemp, Michael; Dargis, Rimtas; Andresen, Keld; Christensen, Jens Jørgen E

    2012-06-01

    In 2002 it was decided to establish laboratory facilities in Denmark for diagnosing agents associated with bioterrorism in order to make an immediate appropriate response to the release of such agents possible. Molecular assays for detection of specific agents and molecular and proteomic techniques for identification of bacteria were introduced as part of the program. All assays and techniques were made accessible for use in diagnosing patients, even when an intentional release was not suspected. Medical expertise on different diseases was established at the department as an integrated part of the program. The analyses included PCR assays for specific bacteria, identification of isolated bacteria by DNA sequencing, detection and identification of bacteria in clinical sample material by universal bacterial PCR and DNA sequencing, and identification of bacteria by mass spectrometry. The established analyses formed a basis on which a series of further developments was built. In addition to reducing the time for obtaining diagnoses and improving the accuracy of diagnosis of individual infected patients, the analyses provided new knowledge on the frequency and distribution of some bacterial infections, including Q fever, tularemia, trench fever, brucellosis, and melioidosis. The implementation of an antibioterrorism program in a clinical diagnostic setting improved the diagnostic possibilities for patients in Denmark and provided new epidemiologic information. It also introduced a number of diagnostic assays for bacterial infections not associated with bioterrorism that are difficult to culture or identify.

  10. When anticipation beats accuracy: Threat alters memory for dynamic scenes.

    Science.gov (United States)

    Greenstein, Michael; Franklin, Nancy; Martins, Mariana; Sewack, Christine; Meier, Markus A

    2016-05-01

    Threat frequently leads to the prioritization of survival-relevant processes. Much of the work examining threat-related processing advantages has focused on the detection of static threats or long-term memory for details. In the present study, we examined immediate memory for dynamic threatening situations. We presented participants with visually neutral, dynamic stimuli using a representational momentum (RM) paradigm, and manipulated threat conceptually. Although the participants in both the threatening and nonthreatening conditions produced classic RM effects, RM was stronger for scenarios involving threat (Exps. 1 and 2). Experiments 2 and 3 showed that this effect does not generalize to the nonthreatening objects within a threatening scene, and that it does not extend to arousing happy situations. Although the increased RM effect for threatening objects by definition reflects reduced accuracy, we argue that this reduced accuracy may be offset by a superior ability to predict, and thereby evade, a moving threat. PMID:26698159

  11. When anticipation beats accuracy: Threat alters memory for dynamic scenes.

    Science.gov (United States)

    Greenstein, Michael; Franklin, Nancy; Martins, Mariana; Sewack, Christine; Meier, Markus A

    2016-05-01

    Threat frequently leads to the prioritization of survival-relevant processes. Much of the work examining threat-related processing advantages has focused on the detection of static threats or long-term memory for details. In the present study, we examined immediate memory for dynamic threatening situations. We presented participants with visually neutral, dynamic stimuli using a representational momentum (RM) paradigm, and manipulated threat conceptually. Although the participants in both the threatening and nonthreatening conditions produced classic RM effects, RM was stronger for scenarios involving threat (Exps. 1 and 2). Experiments 2 and 3 showed that this effect does not generalize to the nonthreatening objects within a threatening scene, and that it does not extend to arousing happy situations. Although the increased RM effect for threatening objects by definition reflects reduced accuracy, we argue that this reduced accuracy may be offset by a superior ability to predict, and thereby evade, a moving threat.

  12. Integrating the Agents of Bioterrorism into the General Biology Curriculum: II. Mode of Action of the Biological Agents.

    Science.gov (United States)

    Pommerville, Jeffrey C.

    2003-01-01

    Integrates bioterrorism into the science curriculum and explains actions against serious agents such as anthrax, plague, smallpox, botulinum toxin, and ricin toxin. Uses the learning cycle as the instructional tool which is student-centered and has three phases that include exploring, explaining, and extending. (Contains 24 references.) (YDS)

  13. [Dimensional analysis of the concept of biosafety due to bioterrorism].

    Science.gov (United States)

    Bernard, Laurence; Shaha, Maya

    2014-03-01

    In recent years with the strengthening of the discourse surrounding the biological risk of bioterrorist nature, the concept of biosafety emerged gradually. A dimensional analysis was used to contextualize the concept. Initially, biosafety was essentially a technical term related to the risks of contamination in laboratories or food industry and then be used to protect biodiversity against the spread of genetically modified organisms (GMOs) into the environment. Now, it is increasingly used in reference to the prevention and infections control, even though its use remains marginal. However, biosecurity may be defined as the security of life and therefore affect the safety devices participating in the government of bodies and power over life. A more critical approach including social and political dimensions within a Foucauldian perspective is needed to expand the scope of the biosecurity concept up to biological hazards constructs. PMID:24830220

  14. [Dimensional analysis of the concept of biosafety due to bioterrorism].

    Science.gov (United States)

    Bernard, Laurence; Shaha, Maya

    2014-03-01

    In recent years with the strengthening of the discourse surrounding the biological risk of bioterrorist nature, the concept of biosafety emerged gradually. A dimensional analysis was used to contextualize the concept. Initially, biosafety was essentially a technical term related to the risks of contamination in laboratories or food industry and then be used to protect biodiversity against the spread of genetically modified organisms (GMOs) into the environment. Now, it is increasingly used in reference to the prevention and infections control, even though its use remains marginal. However, biosecurity may be defined as the security of life and therefore affect the safety devices participating in the government of bodies and power over life. A more critical approach including social and political dimensions within a Foucauldian perspective is needed to expand the scope of the biosecurity concept up to biological hazards constructs.

  15. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  16. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim;

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  17. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    NARCIS (Netherlands)

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  18. 41 CFR 60-300.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-300.22 Section 60-300.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  19. 41 CFR 60-250.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  20. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-741.22 Section 60-741.22 Public Contracts and Property Management Other Provisions Relating to Public... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor...

  1. Non fisheries threats - Risk, status and trends of non-fisheries threats in the California Current to groundfish species

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — We are calculating the risk of focal groundfish species to non-fisheries related threats (e.g. shipping activity, inorganic pollution) and comparing the relative...

  2. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  3. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  4. Global threat to agriculture from invasive species

    Science.gov (United States)

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  5. Global threat to agriculture from invasive species.

    Science.gov (United States)

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  6. The silent threat of low genetic diversity

    Science.gov (United States)

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  7. Summary and results of the joint WMD-DAC/Alameda County bioterrorism response plan exercise.

    Energy Technology Data Exchange (ETDEWEB)

    Manley, Dawn Kataoka; Lipkin, Joel; West, Todd H.; Tam, Ricky; Hirano, Howard H.; Ammerlahn, Heidi R.

    2003-11-01

    On June 12,2003, the Alameda County Public Health Department and Sandia National Laboratories/CA jointly conducted an exercise that used a Weapons of Mass Destruction-Decision Analysis Center (WMD-DAC) bioterrorism attack simulation to test the effectiveness of the county's emergency response plan. The exercise was driven by an assumed release (in the vicinity of the Berkeley Marina), and subsequent spread, of a small quantity of aerosolized, weapons-grade anthrax spores. The simulation used several key WMD-DAC capabilities, namely: (1) integration with an atmospheric dispersion model to calculate expected dose levels in the affected areas, (2) a individual-tracking capability for both infected and non-infected persons as they made decisions, sought treatment, and received prophylaxis drugs, and (3) a user interface that allows exercise participants to affect the scenario evolution and outcome. The analysis of the county's response plan included documenting and reviewing the decisions made by participants during the exercise. Twenty-six local and regional officials representing the health care system, emergency medical services and law enforcement were involved in responding to the simulated attack. The results of this joint effort include lessons learned both by the Alameda County officials regarding implementation of their bioterrorism response plan and by the Sandia representatives about conducting exercises of this type. These observations are reviewed in this report, and they form a basis for providing a better understanding of group/individual decision processes and for identifying effective communication options among decision makers.

  8. The sound of danger: threat sensitivity to predator vocalizations, alarm calls, and novelty in gulls.

    Directory of Open Access Journals (Sweden)

    Sarah A MacLean

    Full Text Available The threat sensitivity hypothesis predicts that organisms will evaluate the relative danger of and respond differentially to varying degrees of predation threat. Doing so allows potential prey to balance the costs and benefits of anti-predator behaviors. Threat sensitivity has undergone limited testing in the auditory modality, and the relative threat level of auditory cues from different sources is difficult to infer across populations when variables such as background risk and experience are not properly controlled. We experimentally exposed a single population of two sympatric gull species to auditory stimuli representing a range of potential threats in order to compare the relative threat of heterospecific alarm calls, conspecific alarms calls, predator vocalizations, and novel auditory cues. Gulls were able to discriminate among a diverse set of threat indicators and respond in a graded manner commensurate with the level of threat. Vocalizations of two potential predators, the human voice and bald eagle call, differed in their threat level compared to each other and to alarm calls. Conspecific alarm calls were more threatening than heterospecfic alarm calls to the larger great black-backed gull, but the smaller herring gull weighed both equally. A novel cue elicited a response intermediate between known threats and a known non-threat in herring gulls, but not great black-backed gulls. Our results show that the relative threat level of auditory cues from different sources is highly species-dependent, and that caution should be exercised when comparing graded and threshold threat sensitive responses.

  9. Heat Waves Are Health Threats

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and ... 2016 SATURDAY, July 2, 2016 (HealthDay News) -- Heat waves are more than uncomfortable, they can be deadly. ...

  10. End the nuclear threat

    International Nuclear Information System (INIS)

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  11. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  12. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  13. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  14. An integrated and dynamic optimisation model for the multi-level emergency logistics network in anti-bioterrorism system

    Science.gov (United States)

    Liu, Ming; Zhao, Lindu

    2012-08-01

    Demand for emergency resources is usually uncertain and varies quickly in anti-bioterrorism system. Besides, emergency resources which had been allocated to the epidemic areas in the early rescue cycle will affect the demand later. In this article, an integrated and dynamic optimisation model with time-varying demand based on the epidemic diffusion rule is constructed. The heuristic algorithm coupled with the MATLAB mathematical programming solver is adopted to solve the optimisation model. In what follows, the application of the optimisation model as well as a short sensitivity analysis of the key parameters in the time-varying demand forecast model is presented. The results show that both the model and the solution algorithm are useful in practice, and both objectives of inventory level and emergency rescue cost can be controlled effectively. Thus, it can provide some guidelines for decision makers when coping with emergency rescue problem with uncertain demand, and offers an excellent reference when issues pertain to bioterrorism.

  15. 美国应对地铁生物恐怖袭击的科技措施与启示%Technological response measures against subway bioterrorism in the United States:investigation and analysis

    Institute of Scientific and Technical Information of China (English)

    田德桥; 祖正虎; 刘健; 许晴; 朱联辉; 黄培堂; 沈倍奋; 郑涛

    2014-01-01

    Due to the large population and relatively closed space environment , the subway system is vulnerable to bioterrorist attacks.This paper analyzes the technological response measures against subway bioterrorism in the United States, including Detect to Protect program of Department of Homeland Security (DHS) and PROTECTS program of Depart-ment of Energy ( DOE) .We also put forward some proposals on how to improve China′s capability of prevention of and response to subway bioterrorism .%地铁系统由于人口流动性大和相对封闭的空间环境是遭受潜在生物恐怖袭击的一个重要目标。该文分析了美国防范和应对地铁系统生物恐怖袭击的一些科技措施,包括国土安全部提高地铁生物监测预警能力措施以及能源部开展的地铁化学和生物恐怖袭击应对与技术支持项目情况等,并提出了提高我国地铁生物恐怖应对能力的一些措施建议。

  16. Predicting Response to Reassurances and Uncertainties in Bioterrorism Communications for Urban Populations in New York and California

    OpenAIRE

    Vaughan, Elaine; Tinker, Tim L.; Truman, Benedict I.; Edelson, Paul; Morse, Stephen S.

    2012-01-01

    Recent national plans for recovery from bioterrorism acts perpetrated in densely populated urban areas acknowledge the formidable technical and social challenges of consequence management. Effective risk and crisis communication is one priority to strengthen the U.S.’s response and resilience. However, several notable risk events since September 11, 2001, have revealed vulnerabilities in risk/crisis communication strategies and infrastructure of agencies responsible for protecting civilian po...

  17. 生物恐怖袭击的救援策略%Rescue strategy against bioterrorism attack

    Institute of Scientific and Technical Information of China (English)

    常留栓; 李蓉; 张婷婷; 赵艳梅

    2015-01-01

    随着国际恐怖主义势力的抬头和生物科学技术的快速发展,生物恐怖袭击因其低廉的成本、巨大的破坏力、特殊的战斗性能等多种独特的优点逐渐成为恐怖分子实施恐吓或袭击的重要手段。当前,我国所面临的生物恐怖威胁非常不容乐观,防范和处置生物恐怖袭击事件仍是我国反恐工作中不可忽视的内容。防范和应对生物恐怖袭击,需整合卫生行政部门、疾病预防控制中心(CDC)、部队、医院、消防、交通等多个部门的力量,组建应急救援工作队。一旦发生疑似生物恐怖事件,应根据事件性质立即设立临时现场指挥部,并调配应急救援工作队,负责生物恐怖事件的现场处置。加强生物安全与反生物恐怖的基础和应用研究,针对未来可能遇到的生物恐怖袭击,强化统筹谋划,建立一支拉得出、打得赢的应急反应队伍,提高生物恐怖袭击突发事件处置能力,有效保护公众的生命和财产安全,仍是我国面临的重大问题。%Bioterrorism attack has been gradually becoming an important threat in the world and in China asa well. To prevent and dispose bioterrorist attack, an emergency rescue team that integrates multiple departments including administrative department of public health, Center for Disease Control and Prevention (CDC), army, hospital, fire department, traffic department, etc. should be established now. Once suspected bioterrorist incidents occurr a temporary headquarter at the scene should be set up and emergency rescue teams should be mobilized immediately. It is necessary to strengthen biosafety and conduct basic and applied counter-bioterrorist research , develop an overall project, establish an emergency response team so as to protect the life and property of the public effectively.

  18. Prior notice of imported food under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002. Final rule.

    Science.gov (United States)

    2008-11-01

    The Food and Drug Administration (FDA) is issuing a final regulation that requires the submission to FDA of prior notice of food, including animal feed, that is imported or offered for import into the United States. The final rule implements the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (the Bioterrorism Act), which required prior notification of imported food to begin on December 12, 2003. The final rule requires that the prior notice be submitted to FDA electronically via either the U.S. Customs and Border Protection (CBP or Customs) Automated Broker Interface (ABI) of the Automated Commercial System (ACS) or the FDA Prior Notice System Interface (FDA PNSI). The information must be submitted and confirmed electronically as facially complete by FDA for review no less than 8 hours (for food arriving by water), 4 hours (for food arriving by air or land/rail), and 2 hours (for food arriving by land/road) before the food arrives at the port of arrival. Food imported or offered for import without adequate prior notice is subject to refusal and, if refused, must be held. Elsewhere in this issue of the Federal Register, FDA is announcing the availability of a draft compliance policy guide (CPG) entitled "Sec. 110.310 Prior Notice of Imported Food Under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002." PMID:19112701

  19. Agriculture bioterrorism:risk and management%农业生物恐怖的风险及其防范

    Institute of Scientific and Technical Information of China (English)

    朱联辉; 田德桥; 郑涛

    2014-01-01

    In recent years , a series of agriculture biosecurity accidents have occurred ,such as mad cow disease , foot-and-mouth disease and avian influenza , which has aroused worldwide , concern over agriculture bioterrorist attacks .This paper comprehensively analyzes the history and impact of agriculture bioterrorism , the current status of international agricul-ture bioterrorism research , and important issues to be taken into account in future efforts to deal with agriculture bioterrorism .%近年来,疯牛病、口蹄疫和禽流感等重大农业安全事件不断发生,引起了国际社会的强烈关注,也更加引发了人们对农业生物恐怖袭击的担忧,如何应对农业生物恐怖威胁已成为国际社会无法回避的安全问题之一。该文通过综合分析农业生物恐怖的“历史”、实施后的危害效果以及国际上对农业生物恐怖的研究现状,提出加强农业生物恐怖防范的对策建议。

  20. Prior notice of imported food under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002. Final rule.

    Science.gov (United States)

    2008-11-01

    The Food and Drug Administration (FDA) is issuing a final regulation that requires the submission to FDA of prior notice of food, including animal feed, that is imported or offered for import into the United States. The final rule implements the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (the Bioterrorism Act), which required prior notification of imported food to begin on December 12, 2003. The final rule requires that the prior notice be submitted to FDA electronically via either the U.S. Customs and Border Protection (CBP or Customs) Automated Broker Interface (ABI) of the Automated Commercial System (ACS) or the FDA Prior Notice System Interface (FDA PNSI). The information must be submitted and confirmed electronically as facially complete by FDA for review no less than 8 hours (for food arriving by water), 4 hours (for food arriving by air or land/rail), and 2 hours (for food arriving by land/road) before the food arrives at the port of arrival. Food imported or offered for import without adequate prior notice is subject to refusal and, if refused, must be held. Elsewhere in this issue of the Federal Register, FDA is announcing the availability of a draft compliance policy guide (CPG) entitled "Sec. 110.310 Prior Notice of Imported Food Under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002."

  1. 49 CFR 1572.19 - Applicant responsibilities for a TWIC security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... threat assessment. 1572.19 Section 1572.19 Transportation Other Regulations Relating to Transportation... TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.19 Applicant responsibilities for a TWIC security threat assessment. (a) Implementation schedule. Except...

  2. Identifying key conservation threats to Alpine birds through expert knowledge.

    Science.gov (United States)

    Chamberlain, Dan E; Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  3. 28 CFR 36.208 - Direct threat.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) Direct threat means a...

  4. Comparative Environmental Threat Analysis: Three Case Studies.

    Science.gov (United States)

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  5. Costa Rica - An Army-less Nation Facing External Threats

    OpenAIRE

    Dall, Nana; Hammer Holm, Lasse; Kaas-Claesson, Kristina; McCay Martinez, Eamonn

    2013-01-01

    This project aims to explain how Costa Rica deal with external threats. Having abolished their military in 1948, the small state of Costa Rica situated in the conflict-ridden region of Central America, is internationally portrayed as an inspirational nation upholding peace and high morality. This has raised questions in regards to how Costa Rica upholds security in the event of threat. The project applies the International Relations theories of neo-liberalism and neo-realism to two cases: the...

  6. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  7. Game theory of pre-emptive vaccination before bioterrorism or accidental release of smallpox.

    Science.gov (United States)

    Molina, Chai; Earn, David J D

    2015-06-01

    Smallpox was eradicated in the 1970s, but new outbreaks could be seeded by bioterrorism or accidental release. Substantial vaccine-induced morbidity and mortality make pre-emptive mass vaccination controversial, and if vaccination is voluntary, then there is a conflict between self- and group interests. This conflict can be framed as a tragedy of the commons, in which herd immunity plays the role of the commons, and free-riding (i.e. not vaccinating pre-emptively) is analogous to exploiting the commons. This game has been analysed previously for a particular post-outbreak vaccination scenario. We consider several post-outbreak vaccination scenarios and compare the expected increase in mortality that results from voluntary versus imposed vaccination. Below a threshold level of post-outbreak vaccination effort, expected mortality is independent of the level of response effort. A lag between an outbreak starting and a response being initiated increases the post-outbreak vaccination effort necessary to reduce mortality. For some post-outbreak vaccination scenarios, even modest response lags make it impractical to reduce mortality by increasing post-outbreak vaccination effort. In such situations, if decreasing the response lag is impossible, the only practical way to reduce mortality is to make the vaccine safer (greater post-outbreak vaccination effort leads only to fewer people vaccinating pre-emptively).

  8. Unfinished business: efforts to define dual-use research of bioterrorism concern.

    Science.gov (United States)

    Zmorzynska, Anna; Suk, Jonathan E; Biederbick, Walter; Maidhof, Heinrich; Sasse, Julia; Semenza, Jan C; Hunger, Iris

    2011-12-01

    Biotechnological research poses a special security problem because of the duality between beneficial use and misuse. In order to find a balance between regulating potentially dangerous research and assuring scientific advancement, a number of assessments have tried to define which types of research are especially open to misuse and should therefore be considered dual-use research of special concern requiring rigorous oversight. So far, there has been no common understanding of what such activities are. Here we present a review of 27 assessments focusing on biological dual-use issues published between 1997 and 2008. Dual-use research activities identified by these assessments as being of special concern were compiled and compared. Moreover, from these 27 assessments, the primary research publications explicitly identified as examples of concerning research activities were extracted and analyzed. We extracted a core list of 11 activities of special concern and show that this list does not match with the reasons why primary research publications were identified as being of special concern. Additionally, we note that the 11 activities identified are not easily conducted or replicated, and therefore the likelihood of their being used in a high-tech mass casualty bioterrorism event should be reevaluated.

  9. Prefrontal inhibition of threat processing protects working memory from interference.

    Directory of Open Access Journals (Sweden)

    Robert James Clarke

    2013-05-01

    Full Text Available Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modelling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesised that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat-related

  10. Mass spectrometry for the detection of bioterrorism agents: from environmental to clinical applications.

    Science.gov (United States)

    Duriez, Elodie; Armengaud, Jean; Fenaille, François; Ezan, Eric

    2016-03-01

    In the current context of international conflicts and localized terrorist actions, there is unfortunately a permanent threat of attacks with unconventional warfare agents. Among these, biological agents such as toxins, microorganisms, and viruses deserve particular attention owing to their ease of production and dissemination. Mass spectrometry (MS)-based techniques for the detection and quantification of biological agents have a decisive role to play for countermeasures in a scenario of biological attacks. The application of MS to every field of both organic and macromolecular species has in recent years been revolutionized by the development of soft ionization techniques (MALDI and ESI), and by the continuous development of MS technologies (high resolution, accurate mass HR/AM instruments, novel analyzers, hybrid configurations). New possibilities have emerged for exquisite specific and sensitive detection of biological warfare agents. MS-based strategies for clinical application can now address a wide range of analytical questions mainly including issues related to the complexity of biological samples and their available volume. Multiplexed toxin detection, discovery of new markers through omics approaches, and identification of untargeted microbiological or of novel molecular targets are examples of applications. In this paper, we will present these technological advances along with the novel perspectives offered by omics approaches to clinical detection and follow-up. PMID:26956386

  11. Ebola Virus ─ A Global Threat

    OpenAIRE

    Mejbah Uddin Ahmed; Sushmita Roy

    2015-01-01

    Ebola virus is a filamentous, enveloped, non-segmented, single-stranded, negative-sense RNA virus. It belongs to the Filoviridae and was first recognized near the Ebola River valley in Zaire in 1976. Since then most of the outbreaks have occurred to both human and nonhuman primates in sub-Saharan Africa. Ebola virus causes highly fatal hemorrhagic fever in human and nonhuman primates. In addition to hemorrhagic fever, it could be used as a bioterrorism agent. Although its natural reservoir is...

  12. Attentional bias to threat: a perceptual accuracy approach.

    Science.gov (United States)

    Van Damme, Stefaan; Crombez, Geert; Notebaert, Lies

    2008-12-01

    To investigate attentional bias to threatening information, the authors propose a new version of the spatial cueing paradigm in which the focus is on perceptual accuracy instead of response speed. In two experiments, healthy volunteers made unspeeded discriminations between three visual targets presented left or right. Each target was preceded by a visual cue (colored rectangle) at either the same (valid) or opposite (invalid) location. By means of differential classical conditioning with aversive white noise, a threat cue and a control cue were created. Analyses of error rates showed that cueing effects (lower proportion of errors in valid trials relative to invalid trials) were more pronounced in threat trials than in neutral trials. This threat-related bias was particularly because of threat cues reducing accuracy in invalid trials, indicating difficulty disengaging attention from threatening information. Engagement of attention was not affected by threat, as threat cues did not facilitate the processing of targets in valid trials. The findings are discussed in light of the strengths and limitations of spatial cueing tasks.

  13. Threats in Optical Burst Switched Network

    Directory of Open Access Journals (Sweden)

    P. Siva Subramanian

    2011-05-01

    Full Text Available Optical network is a viable network for future communication, which transmits data at an average rate of 50Tb/s. Optical Burst Switching is a trusted mechanism used for Optical network. There is a good amount of research done in the area of security in Optical networks. In addition, the issues related to physical network security has been dealt with respect to Optical networks. Our proposed work is intend to find the possible security threats that may happen in Optical Burst Switched Networks and the counter measures are examined separately. The NS-2 simulator with modified OBS patch is used to verify and validate the proposed mechanism

  14. Is China Threat a Hoax?

    Institute of Scientific and Technical Information of China (English)

    Niu Weigan; Ma Zongshi

    2008-01-01

    The Beijing Olympics has focused unprecedented world attention on China this year. Many people hail the Games as an occasion that showcases China's growing contribution to world development and harmony. But intent on politicizing this global event, a few modern Cassandras still cling to the flawed China Threat theory. In this paper, the author traces the origins of this fallacious theory. He sees it as a product of Western empiricism viewed through an historical and philosophical prism. He argues that the assertion of threat arises from a generalization of historical facts. The assertion links China's growing clout with declining Western dominance in international affairs. Starting with the myth that peace is possible only among democracies, the theory predicts the inevitability of conflict between the West and China, a country with an alleged expansionist tradition and under an authoritarian system.

  15. Symbian `vulnerability' and Mobile Threats

    OpenAIRE

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one o...

  16. Subordinates as Threats to Leaders

    OpenAIRE

    Glazer, Amihai; Segendorff, Björn

    2001-01-01

    A leader of an organization may view a subordinate as threatening or weakening the leader's position. The threat may increase with the subordinate's ability and reduce the rents the leader wins. In particular, a leader who trains his subordinate reduces the cost to the owner of a firm in replacing the leader, and so reduces the leader's bargaining power. The leader therefore provides inefficiently low training for the subordinate.

  17. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, Lucas; O'Connor, Brian; Visconti, Piero;

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  18. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... this? Submit What's this? Submit Button Antibiotic Resistance Threats in the United States, 2013 Recommend on Facebook Tweet Share Compartir This report, Antibiotic resistance threats in the United States, 2013 gives a first- ...

  19. 美国生物防御对策研究与国家战略储备药物分析%U.S. bioterrorism countermeasures and strategic national stockpile

    Institute of Scientific and Technical Information of China (English)

    仇玮祎; 余云舟; 孙志伟; 黄培堂; 郑涛

    2012-01-01

    To address the increasingly severe bio-terrorism threats, the United States government issued a series of regulations and research plans. In this article, we discussed American national biological defense strategies and their derivative plans based on the core of Project BioShield, including Department of Health and Human Service ( DHHS)/Biomedical Advanced R&D Authority(BARDA) biological terrorist response plan and budget plan, the Centers for Disease Control and Prevention (CDC) pathogens based top priority chemical, biological, rediological and nuclear (CBRN) threat countermeasures scheme and other important pathogenic organisms defense plans. Atter that, we also discussed the trend of research and development of the Strategical National Stockpile.%美国政府为应对日趋严峻的生物恐怖威胁,出台了一系列针对生化袭击的法规和研究计划.本文研究了以生物盾牌计划为核心的美国国家生物防御应对策略及其衍生计划,包括卫生与公众服务部( DHHS)/生物医学高级研究发展局(BARDA)生物恐怖应对计划及预算方案、以疾控中心(CDC)病原体清单为基础的顶级核化生威胁对策方案及其他重要病原体生物防御治疗研究计划等.分析了目前以上述研究为依托纳入国家战略储备体系的药物及研发趋势.

  20. The role of threats in animal cooperation

    OpenAIRE

    Cant, Michael A.

    2010-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identi...

  1. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  2. A Bayesian belief network of threat anticipation and terrorist motivations

    Science.gov (United States)

    Olama, Mohammed M.; Allgood, Glenn O.; Davenport, Kristen M.; Schryver, Jack C.

    2010-04-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  3. Understanding and managing human threats to the coastal marine environment.

    Science.gov (United States)

    Crain, Caitlin M; Halpern, Benjamin S; Beck, Mike W; Kappel, Carrie V

    2009-04-01

    Coastal marine habitats at the interface of land and sea are subject to threats from human activities in both realms. Researchers have attempted to quantify how these various threats impact different coastal ecosystems, and more recently have focused on understanding the cumulative impact from multiple threats. Here, the top threats to coastal marine ecosystems and recent efforts to understand their relative importance, ecosystem-level impacts, cumulative effects, and how they can best be managed and mitigated, are briefly reviewed. Results of threat analysis and rankings will differ depending on the conservation target (e.g., vulnerable species, pristine ecosystems, mitigatable threats), scale of interest (local, regional, or global), whether externalities are considered, and the types of management tools available (e.g., marine-protected areas versus ecosystem-based management). Considering the cumulative effect of multiple threats has only just begun and depends on spatial analysis to predict overlapping threats and a better understanding of multiple-stressor effects and interactions. Emerging conservation practices that hold substantial promise for protecting coastal marine systems include multisector approaches, such as ecosystem-based management (EBM), that account for ecosystem service valuation; comprehensive spatial management, such as ocean zoning; and regulatory mechanisms that encourage or require cross-sector goal setting and evaluation. In all cases, these efforts require a combination of public and private initiatives for success. The state of our ecological understanding, public awareness, and policy initiatives make the time ripe for advancing coastal marine management and improving our stewardship of coastal and marine ecosystems. PMID:19432644

  4. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  5. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  6. Security of radioactive sources: Threats and answers

    International Nuclear Information System (INIS)

    The general issue of the security of radioactive sources is presented as a prime but constitutive element of radiation safety, focusing particularly on the perceived threats for the malevolent use of radioactive sources and on the possible answers to these threats. The paper discusses the source security threat and the possible international response, and presents an overall outlook for the future. (author)

  7. New Threat to World Economy

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The aggregate amount of money and credit in the global economy has risen sharply over the past 30 years,with its growth rate and stock far exceeding that of the real economy or real assets of the world.This is the view of Xiang Songzuo,professor at the Huazhong University of Science and Technology,whose opinion was first published in a recent article in China Business News.Xiang said this situation is a real threat to the world economy.Excerpts of his article are reprinted below:

  8. Symbian `vulnerability' and Mobile Threats

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.

  9. LAMP using a disposable pocket warmer for anthrax detection, a highly mobile and reliable method for anti-bioterrorism.

    Science.gov (United States)

    Hatano, Ben; Maki, Takayuki; Obara, Takeyuki; Fukumoto, Hitomi; Hagisawa, Kohsuke; Matsushita, Yoshitaro; Okutani, Akiko; Bazartseren, Boldbaastar; Inoue, Satoshi; Sata, Tetsutaro; Katano, Harutaka

    2010-01-01

    A quick, reliable detection system is necessary to deal with bioterrorism. Loop-mediated isothermal amplification (LAMP) is a DNA amplification method that can amplify specific DNA fragments in isothermal conditions. We developed a new highly mobile and practical LAMP anthrax detection system that uses a disposable pocket warmer without the need for electricity (pocket-warmer LAMP). In our tests, the detection limit of the pocket-warmer LAMP was 1,000 copies of Bacillus anthracis pag and capB gene fragments per tube. The pocket-warmer LAMP also detected B. anthracis genes from DNA extracted from 0.1 volume of a B. anthracis colony. The lower detection limit of the pocket-warmer LAMP was not significantly different from that of a conventional LAMP using a heat block, and was not changed under cold (4 degrees C) or warm (37 degrees C) conditions in a Styrofoam box. The pocket-warmer LAMP could be useful against bioterrorism, and as a sensitive, reliable detection tool in areas with undependable electricity infrastructures. PMID:20093760

  10. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  11. Threat sensitivity in bipolar disorder.

    Science.gov (United States)

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  12. The threat of illicit trafficking

    International Nuclear Information System (INIS)

    Intelligence services, the army, the navy, the air force and the police together work to avoid illicit trafficking around the world by taking actions as follows: examining the risks and threats of illicit trafficking of radioactive material by terrorists or criminals; gaining a better understanding of current and future patterns and trends in the illicit trafficking of radioactive material; determining progress on efforts to establish detection capabilities at borders and to exchange information on developments in detection technology and response methodologies through installation of radiation detection equipment; strengthening existing networks and cooperation for sharing information on illicit trafficking reports on incidents involving smuggling, theft, loss and illegal disposal, illegal possession and transfer, and attempted illegal sales of the material; examining how an enhanced export/import regime can assist in combating illicit trafficking control through unauthorized movement of radioactive material; sharing information on activities intended to implement international obligations, recommendations and guidance relevant to nuclear security; suggest actions by which the international effort, through the IAEA, would be strengthened. This paper examines the threat and context of illicit nuclear trafficking of radioactive material, what is being done to combat such trafficking and highlights where more needs to be done

  13. Actionable knowledge and strategic decision making for bio- and agroterrorism threats: building a collaborative early warning culture.

    Science.gov (United States)

    Mårtensson, Per-Åke; Hedström, Lars; Sundelius, Bengt; Skiby, Jeffrey E; Elbers, Armin; Knutsson, Rickard

    2013-09-01

    Current trends in biosecurity and cybersecurity include (1) the wide availability of technology and specialized knowledge that previously were available only to governments; (2) the global economic recession, which may increase the spread of radical non-state actors; and (3) recent US and EU commission reports that reflect concerns about non-state actors in asymmetric threats. The intersectoral and international nature of bioterrorism and agroterrorism threats requires collaboration across several sectors including intelligence, police, forensics, customs, and other law enforcement organizations who must work together with public and animal health organizations as well as environmental and social science organizations. This requires coordinated decision making among these organizations, based on actionable knowledge and information sharing. The risk of not sharing information among organizations compared to the benefit of sharing information can be considered in an "information sharing risk-benefit analysis" to prevent a terrorism incident from occurring and to build a rapid response capability. In the EU project AniBioThreat, early warning is the main topic in work package 3 (WP 3). A strategy has been generated based on an iterative approach to bring law enforcement agencies and human and animal health institutes together. Workshops and exercises have taken place during the first half of the project, and spin-off activities include new preparedness plans for institutes and the formation of a legal adviser network for decision making. In addition, a seminar on actionable knowledge was held in Stockholm, Sweden, in 2012, which identified the need to bring various agency cultures together to work on developing a resilient capability to identify early signs of bio- and agroterrorism threats. The seminar concluded that there are a number of challenges in building a collaborative culture, including developing an education program that supports collaboration and shared

  14. Parallel processing of general and specific threat during early stages of perception.

    Science.gov (United States)

    You, Yuqi; Li, Wen

    2016-03-01

    Differential processing of threat can consummate as early as 100 ms post-stimulus. Moreover, early perception not only differentiates threat from non-threat stimuli but also distinguishes among discrete threat subtypes (e.g. fear, disgust and anger). Combining spatial-frequency-filtered images of fear, disgust and neutral scenes with high-density event-related potentials and intracranial source estimation, we investigated the neural underpinnings of general and specific threat processing in early stages of perception. Conveyed in low spatial frequencies, fear and disgust images evoked convergent visual responses with similarly enhanced N1 potentials and dorsal visual (middle temporal gyrus) cortical activity (relative to neutral cues; peaking at 156 ms). Nevertheless, conveyed in high spatial frequencies, fear and disgust elicited divergent visual responses, with fear enhancing and disgust suppressing P1 potentials and ventral visual (occipital fusiform) cortical activity (peaking at 121 ms). Therefore, general and specific threat processing operates in parallel in early perception, with the ventral visual pathway engaged in specific processing of discrete threats and the dorsal visual pathway in general threat processing. Furthermore, selectively tuned to distinctive spatial-frequency channels and visual pathways, these parallel processes underpin dimensional and categorical threat characterization, promoting efficient threat response. These findings thus lend support to hybrid models of emotion.

  15. Evidence for unique threat-processing mechanisms in psychopathic and anxious individuals.

    Science.gov (United States)

    Lake, Allison J; Baskin-Sommers, Arielle R; Li, Wen; Curtin, John J; Newman, Joseph P

    2011-12-01

    Behaviorally, psychopathy and anxiety display opposite patterns of threat sensitivity and response inhibition. However, it is unclear whether this is due to shared or to separate underlying processes. To address this question, we evaluated whether the threat sensitivity of psychopathic and anxious offenders relates to similar or different components of Gray and McNaughton's (2000) Reinforcement Sensitivity Theory using a sample of 87 prisoners and a task that crossed threat onset with attentional focus. Psychopathy was associated with significantly weaker fear-potentiated startle (FPS) under conditions that presented threat cues after alternative, goal-directed cues. Conversely, anxiety was associated with significantly stronger FPS when threat appeared first and was the focus of attention. Furthermore, these differences were statistically independent. The results suggest that the abnormal sensitivity to threat cues associated with psychopathy and anxiety relate to different underlying processes and have implications for understanding the relationship between low- and high-anxious psychopathy. PMID:21590315

  16. Countering the Nuclear Terrorist Threat

    Energy Technology Data Exchange (ETDEWEB)

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things

  17. 生物恐怖对公众心理健康的影响及应对%Effects and Response of a Bioterrorism to Public Mental Health

    Institute of Scientific and Technical Information of China (English)

    梅霓

    2012-01-01

    In this article,the effects and response of a bioterrorism emergency to public mental health has introduced.Based on the characteristics of the bioterrorism,reviewed the effects to public mental health,the strategies for preparation and response to bioterrorism were suggested.Bioterrorism presents special challenges with psychological disorders or physical illnesses for the society.Initial psychosocial interventions also include effective psycho-education and the delivery of authoritative information,may release their fear of infection.So it was concluded that the effective response will reduce even eliminate the bioterrorism's effects to public mental health.%[目的]探讨生物恐怖突发公共卫生事件对公众心理健康的影响及应对。[方法]通过分析生物恐怖事件的特点,探讨其对公众心理健康的影响,并提出应对措施。[结果]生物恐怖事件的发生,必然会给社会公众带来不同程度的心理影响。通过健康教育的普及,权威信息的及时发布以及切实的心理干预,可以有效降低公众的恐惧心理。[结论]生物恐怖事件对公众心理健康的影响,可通过有效的应对措施予以减轻或消除。

  18. Do Current European Policies Prevent Soil Threats and Support Soil Functions?

    OpenAIRE

    Nadia Glæsner; Katharina Helming; Wim de Vries

    2014-01-01

    There is currently no legislation at the European level that focuses exclusively on soil conservation. A cross-policy analysis was carried out to identify gaps and overlaps in existing EU legislation that is related to soil threats and functions. We found that three soil threats, namely compaction, salinization and soil sealing, were not addressed in any of the 19 legislative policies that were analyzed. Other soil threats, such as erosion, decline in organic matter, loss of biodiversity and ...

  19. Geographical linkages between threats and imperilment in freshwater fish in the Mediterranean Basin

    OpenAIRE

    Clavero, Miguel; Hermoso, Virgilio; Levin, Noam; Kark, Salit

    2010-01-01

    Aim The level of imperilment of mediterranean freshwater fish is among the highest recorded for any group of organisms evaluated to date. Here, we describe the geographical patterns in the incidence of threats affecting mediterranean freshwater fish and test whether the effects of specific threats are spatially related to the degree of imperilment of fish faunas. Location The Mediterranean Basin Biome. Methods From the IUCN Red List, we recorded the six main threats to 232 e...

  20. Bias Adjusted Precipitation Threat Scores

    Directory of Open Access Journals (Sweden)

    F. Mesinger

    2008-04-01

    Full Text Available Among the wide variety of performance measures available for the assessment of skill of deterministic precipitation forecasts, the equitable threat score (ETS might well be the one used most frequently. It is typically used in conjunction with the bias score. However, apart from its mathematical definition the meaning of the ETS is not clear. It has been pointed out (Mason, 1989; Hamill, 1999 that forecasts with a larger bias tend to have a higher ETS. Even so, the present author has not seen this having been accounted for in any of numerous papers that in recent years have used the ETS along with bias "as a measure of forecast accuracy".

    A method to adjust the threat score (TS or the ETS so as to arrive at their values that correspond to unit bias in order to show the model's or forecaster's accuracy in extit{placing} precipitation has been proposed earlier by the present author (Mesinger and Brill, the so-called dH/dF method. A serious deficiency however has since been noted with the dH/dF method in that the hypothetical function that it arrives at to interpolate or extrapolate the observed value of hits to unit bias can have values of hits greater than forecast when the forecast area tends to zero. Another method is proposed here based on the assumption that the increase in hits per unit increase in false alarms is proportional to the yet unhit area. This new method removes the deficiency of the dH/dF method. Examples of its performance for 12 months of forecasts by three NCEP operational models are given.

  1. Zika Virus: Old Rival, New Threat

    Directory of Open Access Journals (Sweden)

    Huanyu Wang

    2016-04-01

    Full Text Available Zika virus (ZIKV, originally isolated in 1947, caused a worldwide epidemic between January 2014 and February 2016 in which a total of 39 countries have reported autochthonous circulation (33 or indirect evidence of local transmission (6. The total area affected by ZIKV infection is expanding steadily. ZIKV has become a new threat to public health, and the recent cluster of microcephaly and other neurologic disorders suspected to be due to ZIKV has lead the World Health Organization to announce that it is a Public Health Emergency of International Concern. Because of its current importance, this review summarizes the currently available data on the etiology, epidemiology, clinical features, laboratory diagnosis, and transmission of ZIKV and its related diseases.

  2. Transmitting the sum of all fears: Iranian nuclear threat salience among offspring of Holocaust survivors.

    Science.gov (United States)

    Shrira, Amit

    2015-07-01

    Many Israelis are preoccupied with the prospect of a nuclear-armed Iran, frequently associating it with the danger of annihilation that existed during the Holocaust. The current article examined whether offspring of Holocaust survivors (OHS) are especially preoccupied and sensitive to the Iranian threat, and whether this susceptibility is a part of their increased general image of actual and potential threats, defined as the hostile world scenario (HWS). Study 1 (N = 106) showed that relative to comparisons, OHS reported more preoccupation with the Iranian nuclear threat. Moreover, the positive relationship between the salience of the Iranian threat and symptoms of anxiety was stronger among OHS. Study 2 (N = 450) replicated these findings, while focusing on the Iranian nuclear threat salience and symptoms of psychological distress. It further showed that OHS reported more negative engagement with the HWS (i.e., feeling that surrounding threats decrease one's sense of competence), which in turn mediated their increased preoccupation with the Iranian threat. The results suggest that intergenerational transmission of the Holocaust trauma includes heightened preoccupation with and sensitivity to potential threats of annihilation, and that the specific preoccupation with threats of annihilation reflects a part of a more general preoccupation with surrounding threats. PMID:25793401

  3. Quality of life threats in recreational and competitive sport

    DEFF Research Database (Denmark)

    Støckel, Jan Toftegaard

    Quality of life threats in recreational and competitive sport Author: ass. Professor Jan Toftegaard Støckel Key words: sport, stress, depression, illness, Previous research has shown that personal issues (nutrition, injury, goals and expectations), coach-athlete issues (coach, coaching style......, depression or illness (SDI) by odds ratio 6,5 in elite sport compared to recreational sport. One in eight athletes reported SDI and highest associations are related to coach behavior. The key question for this abstract is to examine whether men and women are equally vulnerable to SDI at various sport levels...... and secondly what types of behaviors may pose the biggest threats to athlete welfare....

  4. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  5. Cognitive bias for pictorial and linguistic threat cues in children

    NARCIS (Netherlands)

    M. van den Hout; B. Hoekzema; P. de Jong; M. Kindt

    2000-01-01

    The present study was designed to test the conditions under which threat-related cognitive bias can be observed in anxious children. Measures of cognitive bias for threatening words and pictures were obtained from 55 spider fearful children and 58 non-fearful children (aged 8-11 yrs) in the 1st expe

  6. Cognitive bias for pictorial and linguistic threat cues in children

    NARCIS (Netherlands)

    Kindt, M; van den Hout, M; de Jong, Peter; Hoekzema, B

    2000-01-01

    The present study was designed to test the conditions under which threat-related cognitive bias can be observed in anxious children. Measures of cognitive bias for threatening words and pictures were obtained from spider fearful children (N = 55) and non-fearful children (N = 58) aged 8-11 in the fi

  7. A Proposed Data Mining Profiler Model to Fight Security Threats in Nigeria

    Directory of Open Access Journals (Sweden)

    Jackson AKPOJARO

    2013-01-01

    Full Text Available The growing insecurity challenges in Nigeria are of great concern to everyone and every effort must be employed to combat these security threats. Using the proposed data mining profiler model, our work distinguishes between information related threats and non-information related security threats. Information related threats are essentially attacks on computers and networks. That is, they are threats that damage electronic information. Non-information related terrorist threats include terrorist attacks, bombing, shooting and killing someone, vandalism, kidnapping, setting property on fire, etc. The questions asked by all stakeholders are: can the security agencies and their strategies fight the non-information related security threats in Nigeria? Do these agencies have appropriate Information Technology Infrastructure in place for the purpose of information gathering, sharing, dissemination, and decision making? Do they have adequate surveillance systems/equipment? These are some of the issues this research work attempts to address by proposing an automated data profiler model to detect terrorist activities. The work would be accomplished by using different machine learning methods, in particular, we would combine data mining algorithms with established (or experimental thresholds to profile users’ call data, combined with evidence from the profilers to construct a security detector system that would trigger alarm for prompt arrest and investigation of terrorists by law enforcement agencies. Our model can be generalised to handle other non-information related threats in different domains.

  8. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  9. The Moderating Role of Age-Group Identification and Perceived Threat on Stereotype Threat among Older Adults

    Science.gov (United States)

    Kang, Sonia K.; Chasteen, Alison L.

    2009-01-01

    Although research has shown that older adults are negatively affected by aging stereotypes, relatively few studies have attempted to identify those older adults who may be especially susceptible to these effects. The current research takes steps toward identifying older adults most susceptible to the effects of stereotype threat and investigates…

  10. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Science.gov (United States)

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS... 49 Transportation 3 2010-10-01 2010-10-01 false How does an operator identify potential threats...

  11. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology.

  12. [Counterfeit medicines: a growing threat].

    Science.gov (United States)

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world.

  13. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  14. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  15. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  16. Cosmic Impacts: The DoomsDay Threat

    Science.gov (United States)

    McGaha, J.

    1998-07-01

    Recent science fiction movies (Deep Impact and Armageddon) have brought public attention to the threat of possible impacts from space. Just how real is this threat and what would be the consequences of such an impact? Can we do anything to prevent it? The survival of civilization may depend on it.

  17. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  18. Threat by association : Do distant intergroup threats carry-over into local intolerance?

    NARCIS (Netherlands)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-01-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the thre

  19. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  20. The Threat of Terrorist Organizations in Cyberspace

    Directory of Open Access Journals (Sweden)

    Gabi Siboni

    2013-12-01

    Full Text Available This article discusses the threat of terrorism in cyberspace and examines the truth of the perceptions of this threat that have formed in recent years. It examines the capabilities that a non-state actor can achieve and whether these can constitute a real threat to the national security of states. For an analysis of the main threats facing a state from a multi-year perspective and in light of anticipated changes in a state’s strategic balance, the factors that threaten the state are presented and the roots of the threat are identified. The article thus examines whether terrorism, whose impact is generally tactical, could make (or perhaps has already made the transition to a cyber weapon capability with strategic impact. Specifically, the question is could terrorists develop cyber weapon capabilities that could inflict widespread damage or damage over time, of the sort that brings states to their knees and causes critical systems to crash.

  1. Insider threat to secure facilities: data analysis

    Energy Technology Data Exchange (ETDEWEB)

    1979-12-07

    This report is the culmination of a project in which data from several industries confronting internal security threats were collected and analyzed. The industries and threats involved are deemed to be analogous in one or more respects to potential threats confronting decision makers in the nuclear industry. The analog internal threats consist of bank frauds and embezzlements over $10,000, computer crimes of various types and insider drug thefts from drug manufactures and distributors. These data have been subjected to careful analysis utilizing both descriptive and formal statistical techniques. A number of findings are quite suggestive as to the general nature of the internal threat and are discussed and interpreted in terms of thenuclear industry analogy.

  2. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  3. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism. PMID:23390971

  4. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism.

  5. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  6. Distracted by the Unthought - Suppression and Reappraisal of Mind Wandering under Stereotype Threat.

    Directory of Open Access Journals (Sweden)

    Carolin Schuster

    Full Text Available Previous research has found that subtle reminders of negative stereotypes about one's group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests. This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women's math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking in stereotype threat (ST and no threat (NT situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT and cognitive regulation strategy (suppression, reappraisal, or no strategy and measured women's performance on a math and a concentration task (N = 113. We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants' math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss

  7. Distracted by the Unthought - Suppression and Reappraisal of Mind Wandering under Stereotype Threat.

    Science.gov (United States)

    Schuster, Carolin; Martiny, Sarah E; Schmader, Toni

    2015-01-01

    Previous research has found that subtle reminders of negative stereotypes about one's group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women's math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women's performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants' math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss implications for

  8. Sea Level Threat in Tuvalu

    Directory of Open Access Journals (Sweden)

    Than Aung

    2009-01-01

    Full Text Available Problem statement: Recently the impacts of climate change, in particular, sea level rise, had been a major concern for many Pacific island countries. In early 2000, there were a series of media coverage over sea level rise issues using Tuvalu as an example. The daily life of Tuvalu revolves around the ocean and the immediate threat on the islands people, economy, environment and its islands is of concern to the Tuvalu government. The Tuvalu government has concluded that Tuvalu was destined to become the first nation to be sunk by global warming because it is one of the smallest and lowest-lying countries in the world. Approach: In this study, sea level data from the Australian project will be focussed on despite the fact that the length of data is not sufficiently long. The AusAID funded South Pacific Sea Level and climate monitoring project was set up in response to concerns raised by Pacific island countries over the potential impacts of an enhanced greenhouse effect on climate and sea levels in the South Pacific for 20 years. Results: Based upon the 15½ years of sea level data from the project, the sea level rise rate in Tuvalu as at september 2008 was 5.9 mM year-1. This was about four times higher than the global average of 1-2 mm year-1. Sea level in the Tuvalu area had risen approximately 9.14 cm since the inception of the project 15½ years ago. However, it was to be noted that the land is quite stable and the rate of land sinking is -0.06 mM year-1 only. Accordingly, there was no significant impact on the sea level trends. Conclusion: Although the data length is just over 15 years, the sea level trend values do not fluctuate significantly since 1999. It simply indicated that the rate of sea level rise in the Tuvalu region was not accelerating as anticipated by the community.

  9. Threats to Feminist Identity and Reactions to Gender Discrimination.

    Science.gov (United States)

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists (Mage  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed.

  10. Threats to Feminist Identity and Reactions to Gender Discrimination.

    Science.gov (United States)

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists (M age  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed. PMID:23606785

  11. Public perception and risk communication in regard to bioterrorism against animals and plants.

    Science.gov (United States)

    Pearson, G S

    2006-04-01

    This paper examines the total international prohibition on the use of disease to attack humans, animals and plants, noting that in the past several countries had developed programmes for attacks on animals and plants as well as humans. Current activities undertaken by intergovernmental organisations - the World Health Organization (WHO), Food and Agricultural Organization (FAO) and World Organisation for Animal Health (OIE)--to counter the threat of attacks on humans, animals and plants are examined. Effective countermeasures to deliberate attacks need to be developed in harmony with existing measures to control natural or accidental outbreaks of disease. Finally the paper assesses the risk and the public perception of it, and considers what risk communication is needed and to whom. Clear mandates are needed for the FAO and OIE to be prepared to deal with outbreaks of disease, and with contamination of the food supply chain, whether accidental or intentional.

  12. Inclusion of Premeditated Threats in the Safety Methodology for NPPs

    International Nuclear Information System (INIS)

    During the last decade the global effort to prevent terrorism or to mitigate its harm, if prevention fails, has increased. The nuclear power community was involved in this effort trying to prevent terrorist attacks on NPPs (Nuclear Power Plants). A natural extension of terror restraining is the prevention of any premeditated damage to the plant, including acts of state. The pre-feasibility study of an Israeli NPP, conducted by the Ministry of National Infrastructures, has identified the risk of hostile damage to the NPP as a major obstacle to the establishment of nuclear power in Israel, second only to the refusal of nuclear exporting nations to sell an NPP to Israelv. The General Director of the Ministry and the Head of the IAEC (Israeli Atomic Energy Commission) have approved continuation of the pre-feasibility study. This synopsis presents a study, regarding premeditated threats to NPPs, commissioned by the Ministry of National Infrastructures as part of the continuation. It focuses on the safety aspect of premeditated threats originating outside the plant, although a significant part of the analysis can be extended to other subjects such as theft or diversion of strategic materials. The study deals only with methodology and does not encompass specific threats or protection measures. Conclusions and recommendations and marked by bold italics Arial font. The theory of nuclear safety regarding non-premeditated safety events (equipment failures, human errors, natural events, etc.) is well developed. The study refers to these events and the theory attached to them as classical, distinguishing them from premeditated events. The study defines two postulates, related to premeditated threats: Correspondence – We should adopt the classical methodology whenever possible. Regulation – The safety of an NPP from premeditated threats requires examination, approval and inspection by a regulator. Key issues of the methodology with substantial differences from the classical

  13. Controllability modulates the neural response to predictable but not unpredictable threat in humans.

    Science.gov (United States)

    Wood, Kimberly H; Wheelock, Muriah D; Shumen, Joshua R; Bowen, Kenton H; Ver Hoef, Lawrence W; Knight, David C

    2015-10-01

    Stress resilience is mediated, in part, by our ability to predict and control threats within our environment. Therefore, determining the neural mechanisms that regulate the emotional response to predictable and controllable threats may provide important new insight into the processes that mediate resilience to emotional dysfunction and guide the future development of interventions for anxiety disorders. To better understand the effect of predictability and controllability on threat-related brain activity in humans, two groups of healthy volunteers participated in a yoked Pavlovian fear conditioning study during functional magnetic resonance imaging (fMRI). Threat predictability was manipulated by presenting an aversive unconditioned stimulus (UCS) that was either preceded by a conditioned stimulus (i.e., predictable) or by presenting the UCS alone (i.e., unpredictable). Similar to animal model research that has employed yoked fear conditioning procedures, one group (controllable condition; CC), but not the other group (uncontrollable condition; UC) was able to terminate the UCS. The fMRI signal response within the dorsolateral prefrontal cortex (PFC), dorsomedial PFC, ventromedial PFC, and posterior cingulate was diminished during predictable compared to unpredictable threat (i.e., UCS). In addition, threat-related activity within the ventromedial PFC and bilateral hippocampus was diminished only to threats that were both predictable and controllable. These findings provide insight into how threat predictability and controllability affects the activity of brain regions (i.e., ventromedial PFC and hippocampus) involved in emotion regulation, and may have important implications for better understanding neural processes that mediate emotional resilience to stress.

  14. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  15. Acid Rain: The Silent Environmental Threat.

    Science.gov (United States)

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  16. Cyber threats in social networking websites

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sites are not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websi...

  17. Hydrology: Indo-Gangetic groundwater threat

    Science.gov (United States)

    Fendorf, Scott; Benner, Shawn G.

    2016-10-01

    Increasing groundwater extraction supports hundreds of millions of people across the Indo-Gangetic Basin. Data suggests that despite the increase in withdrawals, groundwater depletion is localized and the most widespread threat is contamination.

  18. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  19. Heat Waves Pose Big Health Threats

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_159744.html Heat Waves Pose Big Health Threats Kids, elderly among those ... can be inherently dangerous, but the initial heat waves every summer can be particularly perilous to those ...

  20. Cyber Threats In Social Networking Websites

    Directory of Open Access Journals (Sweden)

    Wajeb Ghari

    2012-02-01

    Full Text Available A social network is a social structure made up of individuals or organizations called nodes, which areconnected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sitesare not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websites.

  1. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

    OpenAIRE

    Mardiana Mohamad Noor; Wan Haslina Hassan

    2013-01-01

    This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellul...

  2. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  3. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  4. Environmental Health: Threats and their Interactions

    OpenAIRE

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurren...

  5. Neural correlates of threat perception: neural equivalence of conspecific and heterospecific mobbing calls is learned.

    Directory of Open Access Journals (Sweden)

    Marc T Avey

    Full Text Available Songbird auditory areas (i.e., CMM and NCM are preferentially activated to playback of conspecific vocalizations relative to heterospecific and arbitrary noise. Here, we asked if the neural response to auditory stimulation is not simply preferential for conspecific vocalizations but also for the information conveyed by the vocalization. Black-capped chickadees use their chick-a-dee mobbing call to recruit conspecifics and other avian species to mob perched predators. Mobbing calls produced in response to smaller, higher-threat predators contain more "D" notes compared to those produced in response to larger, lower-threat predators and thus convey the degree of threat of predators. We specifically asked whether the neural response varies with the degree of threat conveyed by the mobbing calls of chickadees and whether the neural response is the same for actual predator calls that correspond to the degree of threat of the chickadee mobbing calls. Our results demonstrate that, as degree of threat increases in conspecific chickadee mobbing calls, there is a corresponding increase in immediate early gene (IEG expression in telencephalic auditory areas. We also demonstrate that as the degree of threat increases for the heterospecific predator, there is a corresponding increase in IEG expression in the auditory areas. Furthermore, there was no significant difference in the amount IEG expression between conspecific mobbing calls or heterospecific predator calls that were the same degree of threat. In a second experiment, using hand-reared chickadees without predator experience, we found more IEG expression in response to mobbing calls than corresponding predator calls, indicating that degree of threat is learned. Our results demonstrate that degree of threat corresponds to neural activity in the auditory areas and that threat can be conveyed by different species signals and that these signals must be learned.

  6. Conditional health threats: health beliefs, decisions, and behaviors among adults.

    Science.gov (United States)

    Ronis, D L

    1992-01-01

    We combined the health belief model with the theory of subjective expected utility to derive hypotheses about the relations among health beliefs and preventive decisions. The central implication of this combination of theories is the importance of conceptualizing, measuring, and communicating about health threats in ways that are clearly conditional on action. It is important to distinguish, for example, between how susceptible to a disease a person thinks he or she would be if that person were and were not to take a preventive action. An experimental study of judgments about a hypothetical preventive action was conducted to test many of the theoretically derived hypotheses. A correlation study of dental flossing behavior was conducted to test the hypotheses as they apply to overt behavior rather than to judgment. Results of both studies supported most of the tested hypotheses, especially those related to the conditional conceptualization of health threats. Implications for theory, research methods, and practical applications are discussed. PMID:1582381

  7. A survey on top security threats in cloud computing

    Directory of Open Access Journals (Sweden)

    Muhammad Kazim

    2015-03-01

    Full Text Available Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.

  8. Nuclear threat. A clear and present danger

    International Nuclear Information System (INIS)

    It was disappointed at the discussion in the review conference of the NPT held in 2005. The fact may be caused by the estrangement between the international urgent issues related to the non-proliferation and the effectiveness of archaic measures through the NPT. However, it should not be recognized that the international obligation and worth of NPT has been gone. The NPT referred the typical international situation under the cold war era. Although several permanent issues of the nuclear non-proliferation exist in current discussions, the activities relevant to the NPT may not be effect against newly unstable situations after the September 11th of 2001. Urgent challenges to be taken are that we must strictly analyze the interventions between 'the clear and present danger' of our world and the nuclear herms, and must take appropriate actions toward them without influences from previous international situations that might be subsisted in current international treaties and agreements. This paper identified the features of nuclear threats based on the four categories and examined the possibilities of nuclear terrorism from previous facts with the inductive inference. The results identified the possibility of nuclear facility attack and of radioactive materials theft by the Polico-Religious Groups and others are stood out. The authors would suggest the important of urgent recognition to establish the certain security system against nuclear terrorism. (author)

  9. Disentangling Islamophobia: The Differential Effects of Symbolic, Realistic, and Terroristic Threat Perceptions as Mediators Between Social Dominance Orientation and Islamophobia

    Directory of Open Access Journals (Sweden)

    Fatih Uenal

    2016-04-01

    Full Text Available The aim of this paper is threefold. First, based on ongoing theoretical discussions on the dimensionality of Islamophobia, this study analyzes whether Islamophobia empirically constitutes a one-dimensional construct or rather a multidimensional construct consisting of anti-Muslim prejudice and anti-Islam sentiment. Second, the effects of symbolic, realistic, and terroristic (safety threats on Islamophobia were analyzed concurrently. Finally, within the framework of the revised Integrated Threat Theory (Stephan & Renfro, 2002, and in order to test the mediating effect of threats, SDO is tested as an antecedent of perceived threat and Islamophobia. Respondents from Berlin (N = 355 participated in an online survey. The results indicate that Islamophobia empirically constitutes a two-dimensional phenomenon, consisting of anti-Muslim and anti-Islam sentiment. Whereas symbolic threat is related to both types of Islamophobia, realistic threat is associated only with anti-Muslim prejudice, and terroristic threat is associated only with anti-Islam sentiment. Finally, the results indicate that the relationship between SDO and both dimensions of Islamophobia is mediated by threats. Symbolic threats mediate the relationships between SDO and both dimensions of Islamophobia. Realistic threats mediate the relationship between SDO and anti-Muslim prejudice and terroristic threats between SDO and anti-Islam sentiment.

  10. Group Threat and Policy Change: The Spatial Dynamics of Prohibition Politics, 1890-1919.

    Science.gov (United States)

    Andrews, Kenneth T; Seguin, Charles

    2015-09-01

    The authors argue that group threat is a key driver of the adoption of new and controversial policies. Conceptualizing threat in spatial terms, they argue that group threat is activated through the joint occurrence of (1) proximity to threatening groups and (2) the population density of threatened groups. By analyzing the adoption of county and state "dry laws" banning alcohol from 1890 to 1919, they first show that prohibition victories were driven by the relative strength of supportive constituencies such as native whites and rural residents, vis-à-vis opponents such as Irish, Italian, or German immigrants or Catholics. Second, they show that threat contributed to prohibition victories: counties bordering large immigrant or urban populations, which did not themselves contain similar populations, were more likely to adopt dry laws. Threat arises primarily from interactions between spatially proximate units at the local level, and therefore higher-level policy change is not reducible to the variables driving local policy.

  11. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat. PMID:19245886

  12. An Ecological Assessment of the Pandemic Threat of Zika Virus

    OpenAIRE

    Carlson, Colin J.; Dougherty, Eric R.; Getz, Wayne

    2016-01-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset fr...

  13. Disease-threat model explains acceptance of genetically modified products

    OpenAIRE

    Prokop Pavol; Ozel Murat; Usak Muhammet; Senay Ibrahim

    2013-01-01

    Natural selection favoured survival of individuals who were able to avoid disease. The behavioural immune system is activated especially when our sensory system comes into contact with disease-connoting cues and/or when these cues resemble disease threat. We investigated whether or not perception of modern risky technologies, risky behaviour, expected reproductive goals and food neophobia are associated with the behavioural immune system related to specific attitudes toward genetically ...

  14. Globalisation of water: Opportunities and threats of virtual water trade

    OpenAIRE

    Chapagain, A. K.

    2006-01-01

    Where the river basin is generally seen as the appropriate unit for analyzing freshwater availability and use, it becomes increasingly important to put freshwater issues in a global context. The book analyses the opportunities and threats of international virtual water trade in the context of solving national and regional problems of water shortages. Central questions addressed in the study are: What are the fluxes of virtual water related to the international trade of products? Is the import...

  15. Open literature review of threats including sabotage and theft of fissile material transport in Japan

    International Nuclear Information System (INIS)

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty

  16. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    Energy Technology Data Exchange (ETDEWEB)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-06-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

  17. Bichat guidelines for the clinical management of glanders and melioidosis and bioterrorism-related glanders and melioidosis.

    Science.gov (United States)

    Bossi, Philippe; Tegnell, Anders; Baka, Agoritsa; Van Loock, Frank; Hendriks, Jan; Werner, Albrecht; Maidhof, Heinrich; Gouvras, Georgios

    2004-12-15

    Glanders and melioidosis are two infectious diseases that are caused by Burkholderia mallei and Burkholderia pseudomallei respectively. Infection may be acquired through direct skin contact with contaminated soil or water. Ingestion of such contaminated water or dust is another way of contamination. Glanders and melioidosis have both been studied for weaponisation in several countries in the past. They produce similar clinical syndromes. The symptoms depend upon the route of infection but one form of the disease may progress to another, or the disease might run a chronic relapsing course. Four clinical forms are generally described: localised infection, pulmonary infection, septicaemia and chronic suppurative infections of the skin. All treatment recommendations should be adapted according to the susceptibility reports from any isolates obtained. Post-exposure prophylaxis with trimethoprim-sulfamethoxazole is recommended in case of a biological attack. There is no vaccine available for humans.

  18. Viral bioterrorism: Learning the lesson of Ebola virus in West Africa 2013-2015.

    Science.gov (United States)

    Cenciarelli, Orlando; Gabbarini, Valentina; Pietropaoli, Stefano; Malizia, Andrea; Tamburrini, Annalaura; Ludovici, Gian Marco; Carestia, Mariachiara; Di Giovanni, Daniele; Sassolini, Alessandro; Palombi, Leonardo; Bellecci, Carlo; Gaudio, Pasquale

    2015-12-01

    Among the potential biological agents suitable as a weapon, Ebola virus represents a major concern. Classified by the CDC as a category A biological agent, Ebola virus causes severe hemorrhagic fever, characterized by high case-fatality rate; to date, no vaccine or approved therapy is available. The EVD epidemic, which broke out in West Africa since the late 2013, has got the issue of the possible use of Ebola virus as biological warfare agent (BWA) to come to the fore once again. In fact, due to its high case-fatality rate, population currently associates this pathogen to a real and tangible threat. Therefore, its use as biological agent by terrorist groups with offensive purpose could have serious repercussions from a psychosocial point of view as well as on closely sanitary level. In this paper, after an initial study of the main characteristics of Ebola virus, its potential as a BWA was evaluated. Furthermore, given the spread of the epidemic in West Africa in 2014 and 2015, the potential dissemination of the virus from an urban setting was evaluated. Finally, it was considered the actual possibility to use this agent as BWA in different scenarios, and the potential effects on one or more nation's stability.

  19. Does parental anxiety cause biases in the processing of child-relevant threat material?

    OpenAIRE

    Cartwright-Hatton, Sam; Abeles, Paul; Dixon, Clare; Holliday, Christine; Hills, Becky

    2014-01-01

    OBJECTIVES: Anxiety leads to biases in processing personally relevant information. This study set out to examine whether anxious parents also experience biases in processing child-relevant material. DESIGN AND METHODS: Ninety parents acted as a control condition, or received a social anxiety or child-related anxiety induction. They completed a task examining attentional biases in relation to child-threat words and social-threat words, and a task examining ability to categorize e...

  20. Wealth a Threat to Health

    DEFF Research Database (Denmark)

    Nørgaard, Jørgen

    2006-01-01

    Overweight problems and related deseases are causing 400.000 death alone in the USA, and other countries are catching up. Together with too much food intake, too little use of the body energy is the main cause of the problem. It is shown how more physical exercise can help solving another big pro...

  1. Managing facility risk: external threats and health care organizations.

    Science.gov (United States)

    Reid, Daniel J; Reid, William H

    2014-01-01

    Clinicians and clinical administrators should have a basic understanding of physical and financial risk to mental health facilities related to external physical threat, including actions usually viewed as "terrorism" and much more common sources of violence. This article refers to threats from mentally ill persons and those acting out of bizarre or misguided "revenge," extortionists and other outright criminals, and perpetrators usually identified as domestic or international terrorists. The principles apply both to relatively small and contained acts (such as a patient or ex-patient attacking a staff member) and to much larger events (such as bombings and armed attack), and are relevant to facilities both within and outside the U.S. Patient care and accessibility to mental health services rest not only on clinical skills, but also on a place to practice them and an organized system supported by staff, physical facilities, and funding. Clinicians who have some familiarity with the non-clinical requirements for care are in a position to support non-clinical staff in preventing care from being interrupted by external threats or events such as terrorist activity, and/or to serve at the interface of facility operations and direct clinical care. Readers should note that this article is an introduction to the topic and cannot address all local, state and national standards for hospital safety, or insurance providers' individual facility requirements. PMID:24733720

  2. Disease-threat model explains acceptance of genetically modified products

    Directory of Open Access Journals (Sweden)

    Prokop Pavol

    2013-01-01

    Full Text Available Natural selection favoured survival of individuals who were able to avoid disease. The behavioural immune system is activated especially when our sensory system comes into contact with disease-connoting cues and/or when these cues resemble disease threat. We investigated whether or not perception of modern risky technologies, risky behaviour, expected reproductive goals and food neophobia are associated with the behavioural immune system related to specific attitudes toward genetically modified (GM products. We found that respondents who felt themselves more vulnerable to infectious diseases had significantly more negative attitudes toward GM products. Females had less positive attitudes toward GM products, but engaging in risky behaviours, the expected reproductive goals of females and food neophobia did not predict attitudes toward GM products. Our results suggest that evolved psychological mechanisms primarily designed to protect us against pathogen threat are activated by modern technologies possessing potential health risks.

  3. Threat to the point: improving the value of comparative extinction risk analysis for conservation action.

    Science.gov (United States)

    Murray, Kris A; Verde Arregoitia, Luis D; Davidson, Ana; Di Marco, Moreno; Di Fonzo, Martina M I

    2014-02-01

    Comparative extinction risk analysis is a common approach for assessing the relative plight of biodiversity and making conservation recommendations. However, the usefulness of such analyses for conservation practice has been questioned. One reason for underperformance may be that threats arising from global environmental changes (e.g., habitat loss, invasive species, climate change) are often overlooked, despite being widely regarded as proximal drivers of species' endangerment. We explore this problem by (i) reviewing the use of threats in this field and (ii) quantitatively investigating the effects of threat exclusion on the interpretation and potential application of extinction risk model results. We show that threat variables are routinely (59%) identified as significant predictors of extinction risk, yet while most studies (78%) include extrinsic factors of some kind (e.g., geographic or bioclimatic information), the majority (63%) do not include threats. Despite low overall usage, studies are increasingly employing threats to explain patterns of extinction risk. However, most continue to employ methods developed for the analysis of heritable traits (e.g., body size, fecundity), which may be poorly suited to the treatment of nonheritable predictors including threats. In our global mammal and continental amphibian extinction risk case studies, omitting threats reduced model predictive performance, but more importantly (i) reduced mechanistic information relevant to management; (ii) resulted in considerable disagreement in species classifications (12% and 5% for amphibians and mammals, respectively, translating to dozens and hundreds of species); and (iii) caused even greater disagreement (20-60%) in a downstream conservation application (species ranking). We conclude that the use of threats in comparative extinction risk analysis is important and increasing but currently in the early stages of development. Priorities for future studies include improving uptake

  4. Terrorism threats and preparedness in Canada: the perspective of the Canadian public.

    Science.gov (United States)

    Gibson, Stacey; Lemyre, Louise; Clément, Mélanie; Markon, Marie-Pierre L; Lee, Jennifer E C

    2007-06-01

    Although Canada has not experienced a major terrorist attack, an increased global pending threat has put preparedness at the top of the Canadian government's agenda. Given its strong multicultural community and close proximity to the recently targeted United States, the Canadian experience is unique. However, minimal research exists on the public's reactions to terrorism threats and related preparedness strategies. In order for response initiatives to be optimally effective, it is important that the public's opinions regarding terrorism and preparedness be considered. This qualitative study examined perceptions of terrorism threats among Canadians living in Central and Eastern Canada (N = 75) in the fall of 2004. Conceptualizations of terrorism threat, psychosocial impacts, and sense of preparedness were explored in a series of qualitative interviews. Findings revealed that the majority of Canadians did not feel overly threatened by terrorist attacks, due in part to a perception of terrorist threats as related to global sociopolitical events and a positive Canadian identity. In addition, while most respondents did not feel they were individually affected by the threat of terrorism, there was some concern regarding larger societal impacts, such as increased paranoia, discrimination, and threats to civil liberties. Participants' views on preparedness focused largely on the utility of emergency preparedness strategies and the factors that could mitigate or inhibit preparedness at the individual and institutional levels, with a specific focus on education. Finally, the significant relevance of these findings in shaping terrorism preparedness, both in Canada and generally, is discussed.

  5. Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids

    NARCIS (Netherlands)

    Vasenev, Alexandr; Montoya, Lorena; Ceccarelli, Andrea; Le, Anhtuan; Ionita, Dan

    2016-01-01

    Deriving value judgements about threat rankings for large and entangled systems, such as those of urban smart grids, is a challenging task. Suitable approaches should account for multiple threat events posed by different classes of attackers who target system components. Given the complexity of the

  6. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  7. Threat detection, precautionary responses, and anxiety disorders.

    Science.gov (United States)

    Stein, Dan J; Nesse, Randolph M

    2011-03-01

    Study of the anxiety disorders may be a particularly useful vehicle for demonstrating how foundational sciences (e.g. cognitive-affective neuroscience, evolutionary psychology) can advance psychiatric theory and research. Here we consider important potential advances and remaining future challenges when basic research on threat detection and precautionary responses is used to address the anxiety disorders. We emphasize the potential value of a model of threat detection and precautionary responses that integrates cognitive-affective neuroscience and evolutionary approaches for understanding the anxiety disorders. However, we also suggest that substantial additional work is needed in order to link systematically the psychobiological mechanisms posited by basic work on threat detection and precautionary responses to the complex phenomena seen in the clinic. PMID:21147162

  8. On the special status of "ego threats".

    Science.gov (United States)

    Schotte, D E

    1992-05-01

    This article comments on a recent article by Heatherton, Herman, and Polivy (1991) in which they suggest that ego threats are a prerequisite to affectively induced disinhibition of food intake in restrained eaters and current dieters. In contrast, the present review suggests that mood induction procedures that involve no apparent threat (e.g., viewing a frightening film) can also prompt disinhibition in restrained eaters. Thus, any mood induction procedure that does not directly physically threaten the S may disinhibit restrained eaters. It is concluded that recommendations to focus future research on ego threats are premature and may serve to obscure the mechanisms by which changes in affective state influence food intake in dieters. PMID:1507070

  9. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  10. 49 CFR 1540.203 - Security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to...

  11. 49 CFR 1572.5 - Standards for security threat assessments.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Standards for security threat assessments. 1572.5... CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.5 Standards for security threat assessments. (a) Standards. TSA determines that an applicant poses a security threat...

  12. EU conference - 'The microbial threat'

    DEFF Research Database (Denmark)

    Mevius, D.J.; Sprenger, M.J.W.; Wegener, Henrik Caspar

    1999-01-01

    A global or European strategy should be developed to deal with increasing antimicrobial resistance. This strategy includes surveillance of antimicrobial resistance and monitoring of the use of antimicrobial agents in animals and humans. In animals, surveillance should be focussed on potential...... transfer of resistant, zoonotic, food-born pathogens and resistance genes to humans. In humans the surveillance should be clinically relevant. Guidelines for rational therapy should be implemented and 'antibiotic teams' should be installed in each hospital to evaluate the prescription of antibiotics...... and its compliance with guidelines. Keeping animals for food production involves the responsibility for their well being. This includes treatment of infections. However, the use of feed additive, growth-promoting antimicrobials related to therapeutics in human medicine, should be banned immediately...

  13. Nash bargaining with a nondeterministic threat

    CERN Document Server

    Soileau, Kerry Michael

    2008-01-01

    We consider bargaining problems which involve two participants, with a nonempty closed, bounded convex bargaining set of points in the real plane representing all realizable bargains. We also assume that there is no definite threat or disagreement point which will provide the default bargain if the players cannot agree on some point in the bargaining set. However, there is a nondeterministic threat: if the players fail to agree on a bargain, one of them will be chosen at random with equal probability, and that chosen player will select any realizable bargain as the solution, subject to a reasonable restriction.

  14. Methods and procedures for the collection and disposal of bioterrorism agents at border ports%国境口岸生物恐怖剂标本采集和处理方法

    Institute of Scientific and Technical Information of China (English)

    陆琳; 车志军; 孙福军; 王飞; 刘国传

    2011-01-01

    本文建立了国境口岸生物恐怖剂标本采集和处理的规范程序和方法,对于提高国境口岸生物恐怖防控能力建设,有效防止生物恐怖有害因子入境,保障口岸安全具有重要意义.%This paper establishes standards, procedures, and methods of collecting and disposing of bioterrorism agents at border ports. The capacity for bioterrorism prevention and control should be enhanced at border ports, potential bioterrorism agents should be prevented from entering the country, and port security should be ensured.

  15. [Biosimilars--opportunity or threat?].

    Science.gov (United States)

    Swierkot, Jerzy

    2013-01-01

    Strong interest in biosimilars dates back several years. In the coming years the patent protection ends for subsequent biological drugs, including monoclonal antibodies. This paper organizes the most important facts related to the issue of biosimilars. A biosimilar is a biotherapeutic product which is similar in terms of quality, efficacy and safety to an already licensed reference biotherapeutic product'. It should be noted that biosimilars approved underthe current regulations of the European Medicines Agency (EMA) meet the stringent standards of safety, efficacy and immunogenicity. It is also important to realize that the biosimilar has the right to that name, if it is registered by regulatory authorities like EMA or FDA. One should not confuse biosimilar drugs with those which counterfeit or imitate. Clinical trials on the convertibility of innovative and biosimilar drugs are ongoing. Nevertheless,there is no regulatory framework and clear guidelines of conduct in this regard. In the near future, thanks to the registration of the first biosimilar monoclonal antibodies in rheumatology and gastroenterology the availability of biological treatment for patients should increase. PMID:25775818

  16. Raising consciousness about the nuclear threat through music

    Energy Technology Data Exchange (ETDEWEB)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field of peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.

  17. The effect of stereotype threat on performance of a rhythmic motor skill.

    Science.gov (United States)

    Huber, Meghan E; Seitchik, Allison E; Brown, Adam J; Sternad, Dagmar; Harkins, Stephen G

    2015-04-01

    Many studies using cognitive tasks have found that stereotype threat, or concern about confirming a negative stereotype about one's group, debilitates performance. The few studies that documented similar effects on sensorimotor performance have used only relatively coarse measures to quantify performance. This study tested the effect of stereotype threat on a rhythmic ball bouncing task, where previous analyses of the task dynamics afforded more detailed quantification of the effect of threat on motor control. In this task, novices hit the ball with positive racket acceleration, indicative of unstable performance. With practice, they learn to stabilize error by changing their ball-racket impact from positive to negative acceleration. Results showed that for novices, stereotype threat potentiated hitting the ball with positive racket acceleration, leading to poorer performance of stigmatized females. However, when the threat manipulation was delivered after having acquired some skill, reflected by negative racket acceleration, the stigmatized females performed better. These findings are consistent with the mere effort account that argues that stereotype threat potentiates the most likely response on the given task. The study also demonstrates the value of identifying the control mechanisms through which stereotype threat has its effects on outcome measures.

  18. Mental health problems in adolescence and the interpretation of unambiguous threat.

    Directory of Open Access Journals (Sweden)

    Julie D Henry

    Full Text Available Aberrant threat perception has been linked to paranoia, anxiety and other mental health problems, and is widely considered to be a core, transdiagnostic feature of psychopathology. However, to date there has been only limited investigation of whether mental health problems are associated with a biased interpretation of stimuli that have explicit (as opposed to ambiguous connotations of threat. In the present study, 41 adolescents diagnosed with a mental illness and 45 demographically matched controls were asked to provide danger ratings of stimuli normatively rated as being either low or high in potential threat. All participants were also asked to complete background measures of cognitive function, mental health and wellbeing. The results indicated that the two groups did not differ in their capacity to discriminate between low and high threat stimuli, nor did they differ in the absolute level of threat that they attributed to these stimuli. However, for the control group, the overall level of threat perceived in facial stimuli was correlated with two important indices of mental health (depression and anxiety. No associations emerged in the clinical group. These data are discussed in relation to their potential implications for the role of aberrant threat perception in transdiagnostic models of mental health.

  19. Defensive activation to (un)predictable interoceptive threat: The NPU respiratory threat test (NPUr).

    Science.gov (United States)

    Schroijen, Mathias; Fantoni, Simona; Rivera, Carmen; Vervliet, Bram; Schruers, Koen; van den Bergh, Omer; van Diest, Ilse

    2016-06-01

    Potentially life-threatening interoceptive sensations easily engage the behavioral defensive system. Resulting fear and anxiety toward interoceptive threat are functionally distinct states that are hypothesized to play a prominent role in the etiology of panic disorder. The present study aimed to investigate whether fear- and anxiety-potentiated startle responses occur to predictable and unpredictable interoceptive threat, respectively. Therefore, we modified the NPU threat test (Schmitz & Grillon, ) and replaced the aversive electrocutaneous stimulus with an aversive interoceptive stimulus (a breathing occlusion, making it briefly impossible to breathe). Healthy participants (N = 48) underwent three instructed conditions. A visual cue signaled the occlusion in the predictable condition (P), whereas another cue was unrelated to the occurrence of the occlusion in the unpredictable condition (U). The safe condition (N) also had a visual cue, but no occlusion. Both fear- and anxiety-potentiated startle blink responses were observed in response to predictable and unpredictable respiratory threat, respectively. The current study presents and validates the NPU respiratory threat test (NPUr) as an ecologically valid paradigm to study both anxiety and fear in response to a panic-relevant interoceptive threat. The paradigm allows future testing of contextual generalization, investigation of different clinical groups, and more explicit comparisons of defensive responding to interoceptive versus exteroceptive threats.

  20. Plasticity in pigmentation induced by conflicting threats from predation and UV radiation

    OpenAIRE

    Hansson, Lars-Anders

    2004-01-01

    In a variable and unpredictable environment, phenotypic plasticity in morphology or behavior may considerably improve an organism's protection against environmental threats and thereby its fitness. Here I demonstrate that common freshwater organisms, copepods (Crustacea), show a plastic response by adjusting pigmentation level in relation to two environmental threats: ultraviolet radiation (UV) and predation. The red pigment in copepods, astaxanthin, reduces damage caused by UV radiation,...

  1. Parental and Family Factors as Predictors of Threat Bias in Anxious Youth

    OpenAIRE

    Blossom, Jennifer B.; Ginsburg, Golda S.; Birmaher, Boris; Walkup, John T.; KENDALL, Philip C.; Keeton, Courtney P.; Langley, Audra K.; Piacentini, John C.; Sakolsky, Dara; Albano, Anne Marie

    2013-01-01

    The present study examined the relative predictive value of parental anxiety, parents' expectation of child threat bias, and family dysfunction on child's threat bias in a clinical sample of anxious youth. Participants (N = 488) were part of the Child/Adolescent Anxiety Multi-modal study (CAMS), ages 7–17 years (M = 10.69; SD = 2.80). Children met diagnostic criteria for generalized anxiety disorder, separation anxiety and/or social phobia. Children and caregivers completed questionnaires ass...

  2. Attentional Interference by Threat and Posttraumatic Stress Disorder: The Role of Thought Control Strategies

    OpenAIRE

    Wisco, Blair E.; Pineles, Suzanne L.; Shipherd, Jillian C.; Marx, Brian P.

    2013-01-01

    Attentional interference by threat is associated with PTSD, but the mechanisms of this relationship remain unclear. Attentional interference might be related to increased use of maladaptive thought control strategies, such as suppressing unwanted thoughts (thought suppression) or replacing threatening thoughts with everyday concerns (worry), which increase PTSD risk. Conversely, attentional interference might be associated with reduced use of adaptive strategies, such as talking about threate...

  3. Perceived threat mediates the relationship between psychosis proneness and aggressive behavior

    OpenAIRE

    Fanning, Jennifer Renee; Berman, Mitchell Eric; Mohn, Richard Samuel; McCloskey, Michael Sean

    2010-01-01

    Psychotic symptoms are associated with aggressive tendencies, but this relationship is both complex and imperfect. In contrast to psychotic disorders, little is known about aggressive behavior and sub-clinical psychotic symptoms (e.g., “psychosis proneness”), which are relatively common in the general population. Threat/control-override (TCO), which is the propensity to overestimate the likelihood that an outside agent will (1) inflict harm (threat) or (2) control one’s behaviors (control-ove...

  4. Cyber terrorism and cyber-crime – threats for cyber security

    OpenAIRE

    Ackoski, Jugoslav; Dojcinovski, Metodija

    2012-01-01

    This paper has aim to give contribution in supporting efforts against cyber threats recognized as a cyber terrorism and cyber crime. Also, it has aim to show future challenges related to cyber security and their emerging threats – cyber war, cyber terrorism and cyber crime. Accelerate weapon development called ICT (Information Communication Technology) which is developed every day faster and faster, and development of human conscious on higher level about consequences of ICT enormous pene...

  5. Neural activity associated with monitoring the oscillating threat value of a tarantula

    OpenAIRE

    Mobbs, Dean; Yu, Rongjun; Rowe, James B.; Eich, Hannah; FeldmanHall, Oriel; Dalgleish, Tim

    2010-01-01

    Phylogenetic threats such as spiders evoke our deepest primitive fears. When close or looming, such threats engage evolutionarily conserved monitoring systems and defense reactions that promote self-preservation. With the use of a modified behavioral approach task within functional MRI, we show that, as a tarantula was placed closer to a subject's foot, increased experiences of fear coincided with augmented activity in a cascade of fear-related brain networks including the periaqueductal gray...

  6. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We the

  7. Avoidance: From threat encounter to action execution

    NARCIS (Netherlands)

    I. Arnaudova

    2015-01-01

    Every day we encounter many threats to survival: a car speeding on a small street or an angry neighbor carrying an axe. Mostly, people go through their days not worrying that their chance of survival might be small. They avoid many dangers without even thinking about them (e.g., looking at both side

  8. Extensible threat taxonomy for critical infrastructures

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic thre

  9. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  10. Diversity, Racial Threat and Metropolitan Housing Segregation

    Science.gov (United States)

    DeFina, Robert; Hannon, Lance

    2009-01-01

    Previous studies have shown that as the percent black or percent Hispanic grows, that group's residential segregation from whites tends to increase as well. Typically, these findings are explained in terms of white discriminatory reaction to the perceived threat associated with minority population growth. The present analysis examines whether…

  11. The Missing Piece in Threat Intelligence

    Directory of Open Access Journals (Sweden)

    Frank Denis

    2016-03-01

    Full Text Available Common systems for sharing intelligence on security threats have not been designed to efficiently process feedback from infrastructure providers. In order to fill this gap, we introduce DIP, a new description language to expose changes being made on a network that are relevant to security research and prevention.

  12. Insider Threat - Material Control and Accountability Mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Danny H [ORNL; Elwood Jr, Robert H [ORNL; Roche, Charles T [ORNL

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  13. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    Directory of Open Access Journals (Sweden)

    Florian Erik Klonek

    2015-07-01

    Full Text Available Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT, threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT, threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI—an intervention aimed at increasing intrinsic motivation—can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group. We coded agents verbal threats and recipients’ verbal expressions of motivation. Recipients also rated agents’ level of confrontation and empathy (i.e., cognitive reactions. As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients’ expressed motivation (i.e., reasons to change. Contrary to our expectations, we found no relation between change agents’ verbal threats and change recipients’ verbally expressed self-defenses (i.e., sustain talk. Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  14. Posttraumatic stress disorder under ongoing threat: a review of neurobiological and neuroendocrine findings

    Directory of Open Access Journals (Sweden)

    Iro Fragkaki

    2016-08-01

    Full Text Available Background: Although numerous studies have investigated the neurobiology and neuroendocrinology of posttraumatic stress disorder (PTSD after single finished trauma, studies on PTSD under ongoing threat are scarce and it is still unclear whether these individuals present similar abnormalities. Objective: The purpose of this review is to present the neurobiological and neuroendocrine findings on PTSD under ongoing threat. Ongoing threat considerably affects PTSD severity and treatment response and thus disentangling its neurobiological and neuroendocrine differences from PTSD after finished trauma could provide useful information for treatment. Method: Eighteen studies that examined brain functioning and cortisol levels in relation to PTSD in individuals exposed to intimate partner violence, police officers, and fire fighters were included. Results: Hippocampal volume was decreased in PTSD under ongoing threat, although not consistently associated with symptom severity. The neuroimaging studies revealed that PTSD under ongoing threat was not characterized by reduced volume of amygdala or parahippocampal gyrus. The neurocircuitry model of PTSD after finished trauma with hyperactivation of amygdala and hypoactivation of prefrontal cortex and hippocampus was also confirmed in PTSD under ongoing threat. The neuroendocrine findings were inconsistent, revealing increased, decreased, or no association between cortisol levels and PTSD under ongoing threat. Conclusions: Although PTSD under ongoing threat is characterized by abnormal neurocircuitry patterns similar to those previously found in PTSD after finished trauma, this is less so for other neurobiological and in particular neuroendocrine findings. Direct comparisons between samples with ongoing versus finished trauma are needed in future research to draw more solid conclusions before administering cortisol to patients with PTSD under ongoing threat who may already exhibit increased endogenous

  15. On the early detection of threats in the real world based on open-source information on the internet

    NARCIS (Netherlands)

    Bouma, H.; Rajadell Rojas, O.; Worm, D.T.H.; Versloot, C.A.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activities of persons on the internet. Internet surveillance aims to detect threats in an early stage and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time con

  16. 29 CFR 458.38 - Deprivation of rights under the CSRA or FSA by violence or threat of violence.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Deprivation of rights under the CSRA or FSA by violence or threat of violence. 458.38 Section 458.38 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT... by violence or threat of violence. No labor organization or any officer, agent, shop steward,...

  17. Receiver Operating Characteristic Analysis for Detecting Explosives-related Threats

    Energy Technology Data Exchange (ETDEWEB)

    Oxley, Mark E; Venzin, Alexander M

    2012-11-14

    The Department of Homeland Security (DHS) and the Transportation Security Administration (TSA) are interested in developing a standardized testing procedure for determining the performance of candidate detection systems. This document outlines a potential method for judging detection system performance as well as determining if combining the information from a legacy system with a new system can signicantly improve performance. In this document, performance corresponds to the Neyman-Pearson criterion applied to the Receiver Operating Characteristic (ROC) curves of the detection systems in question. A simulation was developed to investigate how the amount of data provided by the vendor in the form of the ROC curve eects the performance of the combined detection system. Furthermore, the simulation also takes into account the potential eects of correlation and how this information can also impact the performance of the combined system.

  18. Study on a Threat-Countermeasure Model Based on International Standard Information

    Directory of Open Access Journals (Sweden)

    Guillermo Horacio Ramirez Caceres

    2008-12-01

    Full Text Available Many international standards exist in the field of IT security. This research is based on the ISO/IEC 15408, 15446, 19791, 13335 and 17799 standards. In this paper, we propose a knowledge base comprising a threat countermeasure model based on international standards for identifying and specifying threats which affect IT environments. In addition, the proposed knowledge base system aims at fusing similar security control policies and objectives in order to create effective security guidelines for specific IT environments. As a result, a knowledge base of security objectives was developed on the basis of the relationships inside the standards as well as the relationships between different standards. In addition, a web application was developed which displays details about the most common threats to information systems, and for each threat presents a set of related security control policies from different international standards, including ISO/IEC 27002.

  19. Securing Infrastructure from High Explosive Threats

    Energy Technology Data Exchange (ETDEWEB)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  20. Detecting underwater improvised explosive threats (DUIET)

    Science.gov (United States)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  1. Nonproliferation, Nuclear Security, and the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  2. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    2013-09-30

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke.  Created: 9/30/2013 by Division of Community Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 9/30/2013.

  3. Handsets Malware Threats and Facing Techniques

    CERN Document Server

    Elfattah, Marwa M A; Sarhan, Ebada

    2012-01-01

    Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

  4. Avian influenza: an emerging pandemic threat.

    Science.gov (United States)

    Jin, Xian Wen; Mossad, Sherif B

    2005-12-01

    While we are facing the threat of an emerging pandemic from the current avian flu outbreak in Asia, we have learned important traits of the virus responsible for the 1918 Spanish influenza pandemic that made it so deadly. By using stockpiled antiviral drugs effectively and developing an effective vaccine, we can be in a better position than ever to mitigate the global impact of an avian influenza pandemic. PMID:16392727

  5. Bot armies as threats to network security

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  6. Mere effort and stereotype threat performance effects.

    Science.gov (United States)

    Jamieson, Jeremy P; Harkins, Stephen G

    2007-10-01

    Although the fact that stereotype threat impacts performance is well established, the underlying process(es) is(are) not clear. Recently, T. Schmader and M. Johns (2003) argued for a working memory interference account, which proposes that performance suffers because cognitive resources are expended on processing information associated with negative stereotypes. The antisaccade task provides a vehicle to test this account because optimal performance requires working memory resources to inhibit the tendency to look at an irrelevant, peripheral cue (the prepotent response) and to generate volitional saccades to the target. If stereotype threat occupies working memory resources, then the ability to inhibit the prepotent response and to launch volitional saccades will be impaired, and performance will suffer. In contrast, S. Harkins's (2006) mere effort account argues that stereotype threat participants are motivated to perform well, which potentiates the prepotent response, but also leads to efforts to counter this tendency if participants recognize that the response is incorrect, know the correct response, and have the opportunity to make it. Results from 4 experiments support the mere effort but not the working memory interference account.

  7. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  8. High-angular Resolution Laser Threat Warner

    Directory of Open Access Journals (Sweden)

    Sushil Kumar

    2007-07-01

    Full Text Available In this paper, the design and development aspects of a high-angular resolution laser-threat Warner developed at the Laser Science & Technology Centre (LASTEC, Delhi are presented. It describes a high-angular resolution laser-threat warner capable of giving warning with a resolution of i 3" when it is exposed to laser radiation from visible and near-IR pulsed solid-state laser source. It has a field of view of 90' in the azimuth direction, whereas the elevation coverage is between -5" and + 25". It is capable of handling multiple types of laser threats covering wavelength from 400 nm to 1100 nm and has an operational range of 4 km for a Q-switched laser source energy (10 ns of 10 mJ/pulse and output beam divergence of 1 mrad. The paper also describes its simulated evaluation process and field-testing which it has undergone. The result of field-testing confirms that it meets all its performance specifications mentioned above.

  9. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  10. Riverine threat indices to assess watershed condition and identify primary management capacity of agriculture natural resource management agencies.

    Science.gov (United States)

    Fore, Jeffrey D; Sowa, Scott P; Galat, David L; Annis, Gust M; Diamond, David D; Rewa, Charles

    2014-03-01

    Managers can improve conservation of lotic systems over large geographies if they have tools to assess total watershed conditions for individual stream segments and can identify segments where conservation practices are most likely to be successful (i.e., primary management capacity). The goal of this research was to develop a suite of threat indices to help agriculture resource management agencies select and prioritize watersheds across Missouri River basin in which to implement agriculture conservation practices. We quantified watershed percentages or densities of 17 threat metrics that represent major sources of ecological stress to stream communities into five threat indices: agriculture, urban, point-source pollution, infrastructure, and all non-agriculture threats. We identified stream segments where agriculture management agencies had primary management capacity. Agriculture watershed condition differed by ecoregion and considerable local variation was observed among stream segments in ecoregions of high agriculture threats. Stream segments with high non-agriculture threats were most concentrated near urban areas, but showed high local variability. 60 % of stream segments in the basin were classified as under U.S. Department of Agriculture's Natural Resources Conservation Service (NRCS) primary management capacity and most segments were in regions of high agricultural threats. NRCS primary management capacity was locally variable which highlights the importance of assessing total watershed condition for multiple threats. Our threat indices can be used by agriculture resource management agencies to prioritize conservation actions and investments based on: (a) relative severity of all threats, (b) relative severity of agricultural threats, and (c) and degree of primary management capacity.

  11. When sexual threat cues shape attitudes toward immigrants: The role of insecurity and benevolent sexism

    Directory of Open Access Journals (Sweden)

    Oriane eSarrasin

    2015-07-01

    Full Text Available Drawing on psychological and political science research on individuals’ sensitivity to threat cues, the present study examines reactions to political posters that depict male immigrants as a sexual danger. We expect anti-immigrant attitudes to be more strongly predicted by feelings of insecurity or representations of men and women as strong and fragile, when individuals are exposed to sexual threat cues than when they are not. Results from two online experiments conducted in Switzerland and Germany largely confirmed these assumptions. Comparing two anti-immigrant posters (general and non-sexual threat vs. sexual threat, Experiment 1 (n = 142 showed that feelings of insecurity were related to an increased support for expelling immigrants from the host country in both cases. However, only in the sexual threat cues condition and among female participants, were perceptions of women as fragile—as measured with benevolent sexism items—related to support for expelling immigrants. Further distinguishing between different forms of violence threat cues, Experiment 2 (n = 181 showed that collective feelings of insecurity were most strongly related to support for expelling immigrants when a male immigrant was presented as a violent criminal. In contrast, benevolent sexist beliefs were related to anti-immigrant stances only when participants were exposed to a depiction of a male immigrant as a rapist. In both cases attitudes were polarized: On the one hand, representations of immigrants as criminals provoked reactance reactions—that is, more positive attitudes—among participants scoring low in insecurity feelings or benevolent sexism. On the other hand, those scoring high in these dimensions expressed slightly more negative attitudes. Overall, by applying social psychological concepts to the study of anti-immigrant political campaigning, the present study demonstrated that individuals are sensitive to specific threat cues in posters.

  12. When sexual threat cues shape attitudes toward immigrants: the role of insecurity and benevolent sexism.

    Science.gov (United States)

    Sarrasin, Oriane; Fasel, Nicole; Green, Eva G T; Helbling, Marc

    2015-01-01

    Drawing on psychological and political science research on individuals' sensitivity to threat cues, the present study examines reactions to political posters that depict male immigrants as a sexual danger. We expect anti-immigrant attitudes to be more strongly predicted by feelings of insecurity or representations of men and women as strong and fragile when individuals are exposed to sexual threat cues than when they are not. Results from two online experiments conducted in Switzerland and Germany largely confirmed these assumptions. Comparing two anti-immigrant posters (general and non-sexual threat vs. sexual threat), Experiment 1 (n = 142) showed that feelings of insecurity were related to an increased support for expelling immigrants from the host country in both cases. However, only in the sexual threat cues condition and among female participants, were perceptions of women as fragile-as measured with benevolent sexism items-related to support for expelling immigrants. Further distinguishing between different forms of violence threat cues, Experiment 2 (n = 181) showed that collective feelings of insecurity were most strongly related to support for expelling immigrants when a male immigrant was presented as a violent criminal. In contrast, benevolent sexist beliefs were related to anti-immigrant stances only when participants were exposed to a depiction of a male immigrant as a rapist. In both cases attitudes were polarized: on the one hand, representations of immigrants as criminals provoked reactance reactions-that is, more positive attitudes-among participants scoring low in insecurity feelings or benevolent sexism. On the other hand, those scoring high in these dimensions expressed slightly more negative attitudes. Overall, by applying social psychological concepts to the study of anti-immigrant political campaigning, the present study demonstrated that individuals are sensitive to specific threat cues in posters.

  13. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures.

  14. Zika Threat Calls for Extra Mosquito Protection This Summer

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_159168.html Zika Threat Calls for Extra Mosquito Protection This Summer ... THURSDAY, June 2, 2016 (HealthDay News) -- With the Zika threat growing in the United States, people need ...

  15. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  16. Threat Modeling-Oriented Attack Path Evaluating Algorithm

    Institute of Scientific and Technical Information of China (English)

    LI Xiaohong; LIU Ran; FENG Zhiyong; HE Ke

    2009-01-01

    In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms.

  17. The appraisal, emotion, and coping responses to the threat of nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Panos-Savicky, B.

    1989-01-01

    The purpose of this dissertation was to evaluate adults' responses to the threat of nuclear war and to investigate the interrelationships between adults' appraisal, emotion and coping responses to this environmental stressor. It was hypothesized that high threat appraisals of nuclear war would relate to high feelings of anxiety and helplessness about nuclear war. In turn, high feelings of anxiety and helplessness were hypothesized to relate to the use of passive forms of coping in relation to this potential danger. Moderate feelings of anxiety about nuclear war were hypothesized to relate to the use of action oriented coping in regard to this external threat. In addition, it was hypothesized that trait personality characteristics would contribute to adults' responses to the threat of nuclear war. The sample of this study was comprised of ninety-five parents who were members of Parent-Teacher Associations (PTA) in Suffolk County, New York. Six self-report questionnaires were distributed to PTA members. Correlation coefficients, multiple regression analysis and analysis of variance was used to analyze the data. The findings confirmed the hypotheses of this study in that statistically significant relationships were found between the variables in each hypothesis. However, trait personality factors, for the most part, did not contribute to adults' responses to the threat of nuclear war. Implications for social work practice address the importance of these findings for clinical practice, social policy, education and research.

  18. Persistent and novel threats to the biodiversity of Kazakhstan’s steppes and semi-deserts

    Science.gov (United States)

    Kamp, Johannes; Koshkin, Maxim A; Bragina, Tatyana M; Katzner, Todd Eli; Milner-Gulland, E J; Schreiber, Dagmar; Sheldon, Robert; Shmalenko, Alyona; Smelansky, Ilya; Terraube, Julien; Urazaliev, Ruslan

    2016-01-01

    Temperate grasslands have suffered disproportionally from conversion to cropland, degradation and fragmentation. A large proportion of the world’s remaining near-natural grassland is situated in Kazakhstan. We aimed to assess current and emerging threats to steppe and semi-desert biodiversity in Kazakhstan and evaluate conservation research priorities. We conducted a horizon-scanning exercise among conservationists from academia and practice. We first compiled a list of 45 potential threats. These were then ranked by the survey participants according to their perceived severity, the need for research on them, and their novelty. The highest-ranked threats were related to changes in land use (leading to habitat loss and deterioration), direct persecution of wildlife, and rapid infrastructure development due to economic and population growth. Research needs were identified largely in the same areas, and the mean scores of threat severity and research need were highly correlated. Novel threats comprised habitat loss by photovoltaic and wind power stations, climate change and changes in agriculture such as the introduction of biofuels. However, novelty was not correlated with threat severity or research priority, suggesting that the most severe threats are the established ones. Important goals towards more effective steppe and semi-desert conservation in Kazakhstan include more cross-sector collaboration (e.g. by involving stakeholders in conservation and agriculture), greater allocation of funds to under-staffed areas (e.g. protected area management), better representativeness and complementarity in the protected area system and enhanced data collection for wildlife monitoring and threat assessments (including the use of citizen-science databases).

  19. Threat model framework and methodology for personal networks (PNs)

    DEFF Research Database (Denmark)

    Prasad, Neeli R.

    2007-01-01

    is to give a structured, convenient approach for building threat models. A framework for the threat model is presented with a list of requirements for methodology. The methodology will be applied to build a threat model for Personal Networks. Practical tools like UML sequence diagrams and attack trees have...

  20. 49 CFR 1540.205 - Procedures for security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  1. 77 FR 1672 - Threat Reduction Advisory Committee; Notice of Meeting

    Science.gov (United States)

    2012-01-11

    ... of the Secretary Threat Reduction Advisory Committee; Notice of Meeting AGENCY: Department of Defense... Department of Defense announces the following Federal advisory committee meeting of the Threat Reduction.... William Hostyn, GS-15, DoD, Defense Threat Reduction Agency/SP-ACP, 8725 John J. Kingman Road, MS...

  2. 77 FR 27208 - Renewal of Threat Reduction Advisory Committee

    Science.gov (United States)

    2012-05-09

    ... of the Secretary Renewal of Threat Reduction Advisory Committee AGENCY: DoD. ACTION: Renewal of...), the Department of Defense gives notice that it is renewing the charter for the Threat Reduction... Biological Defense Programs), independent advice and recommendations on: a. Reducing the threat to the...

  3. 75 FR 30002 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Science.gov (United States)

    2010-05-28

    ... Office of the Secretary Federal Advisory Committee; Threat Reduction Advisory Committee AGENCY... the charter for the Threat Reduction Advisory Committee (hereafter referred to as the Committee). FOR... Acquisition, Technology and Logistics and the Director of the Defense Threat Reduction Agency on the...

  4. Legality of the threat or use of nuclear weapons

    International Nuclear Information System (INIS)

    This paper examines international treaties in relation to the threat or use of nuclear weapons including the 1968 Nuclear Non-Proliferation Treaty and the 1996 Comprehensive Test Ban Treaty. It can be concluded that the effect of the aforesaid international treaties is still in doubt without explicit enforcement mechanisms and penalty for non-compliance. This paper also reviews the International Court of Justice's advisory opinion on the legality of the threat or use of nuclear weapons and comments that a clear explanation on the legality of use of nuclear weapons in 'extreme circumstances of self-defence' is required. Examples from current state practice in relation to nuclear non-proliferation efforts are also provided, with special attention to China, North Korea and Iran. This paper suggests that China as a leader of developing countries should extend its efforts on nuclear non-proliferation and conduct communication between North Korea and Iran and other nuclear weapons states to reduce or prohibit nuclear weapons.

  5. Cyber Terrorism demands a Global Risks and Threats Strategic Management

    International Nuclear Information System (INIS)

    The world is in the third wave of development, which is digital managed and networked. Information, which creates the knowledge is transferring thorough the Internet by exponential function. The rapid advancement of the computer technology has a great influence over the development of the critical information infrastructure, thus changing the safety environment and the national values and interests. This advancement produces threats and risks from computer perspective which are sublimated in different forms of international terrorism and particularly in cyber terrorism. The main aim of this paper is based on a thorough analysis of what is scientifically known and practiced when nowadays critical information infrastructure is in the focus of the cyber terrorism. The rapid IT development demands changes in the strategic management focus. As a result of a time-consuming theoretical and empirical research this paper suggests a methodology for strategic managing of: threats, risks and vulnerabilities. The proposed methodology is seen as a mean to increase the human security conscious in every sense of the word, and to promote the need for rules, procedures and standards establishment from the aspect of the strategic management in the new information epoch concerning. In addition, through a scientific discourse, a short attempt is made to relate Macedonian reality with the phenomenon mentioned above. The most fundamental set phrase is that the efficiency and promptly made decisions during strategic planning are a projection of the systematic organization of functions and models for managing the risks and threats of the critical information infrastructure. Hence, this paper could be seen as a perspective when taking in consideration the regional strategic management, and the cyber space vital functioning. (author)

  6. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    Science.gov (United States)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  7. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  8. Handsets Malware Threats and Facing Techniques

    Directory of Open Access Journals (Sweden)

    Marwa M. A. Elfattah

    2011-12-01

    Full Text Available Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

  9. Assessing the global threat from Zika virus.

    Science.gov (United States)

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled.

  10. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  11. Assessing the global threat from Zika virus.

    Science.gov (United States)

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled. PMID:27417495

  12. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  13. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    Directory of Open Access Journals (Sweden)

    Ashley C. Banyard

    2014-08-01

    Full Text Available The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations.

  14. Identification of threats using linguistics-based knowledge extraction.

    Energy Technology Data Exchange (ETDEWEB)

    Chew, Peter A.

    2008-09-01

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe

  15. Analysis of volcanic threat from Nisyros Island, Greece, with implications for aviation and population exposure

    Science.gov (United States)

    Kinvig, H. S.; Winson, A.; Gottsmann, J.

    2010-06-01

    Nisyros island in the South Aegean volcanic arc, Greece, is a Quaternary composite volcano with a 3.8 km wide caldera that in 1996 entered a volcano-seismic crisis, which heralded the islands' return to a state of unrest. The caldera has been the locus of at least thirteen phreatic eruptions in historical times, the most recent in 1888, and the system is still presently affected by considerable hydrothermal activity. Although the recent unrest waned off without eruption, there are still open questions relating to the current threat of volcanic activity from the island. Here, we perform a detailed and systematic assessment of the volcanic threat of Nisyros using a threat analysis protocol established as part of the USGS National Volcano Early Warning System (NVEWS). The evaluation involves a methodical assessment of fifteen hazard and exposure factors, and is based on a score system, whereby the higher the score, the higher the threat is. Uncertainty in assessment criteria are expressed by allowing for a conservative and an extreme score for each factor. We draw our analysis from published data as well as from results of our research on Nisyros over the past years. Our analysis yields a conservative threat score of 163 and an extreme score of 262. The most adverse exposure factors include significant scores relating to aviation and population exposure to volcanic hazards from Nisyros. When looked at in comparison to US volcanoes both scores place Nisyros in the "Very High Threat (VHT)" category, grouping it with volcanoes such as Redoubt, Mount Ranier and Crater Lake. We identify a short-fall in recommended surveillance efforts for VHT volcanoes given existing monitoring capabilities on the island. We discuss potential pitfalls of applying the NVEWS scheme to Nisyros and suggest potential adaptation of analysis scheme to match industrial and societal conditions in Europe. At the same time, our findings indicate that that volcanic threat posed by Nisyros volcano may

  16. Ongoing Threats to Emerging Financial Entities

    Directory of Open Access Journals (Sweden)

    Bryce Alexander LYNCH

    2016-06-01

    Full Text Available In the twenty-first century the pace of technological advancement shows no signs of stopping. Old technologies are being discarded as obsolete or are transformed in ways that nobody could have foreseen even a half-decade ago. Along with these radical changes come vulnerabilities and threats to infrastructure, including informational and financial which must be considered and protected. This is not to say that basic security measures must continue to be neglected in favor of rapid development and deployment to provide a Minimum Viable Product to customers; basic security protocols become all the more important under these circumstances. Improving faster are attacks against the new infrastructure; technique and technology tend to change along generally accepted sets of rules while attackers follow no rules or guidelines. This fundamental asymmetry leaves defenders at a distinct advantage in several ways, including ethical concerns (“There are some lines we will not cross” versus “By any means necessary”, monetary considerations (“Return on investment” versus “The resources aren’t ours to begin with, so who cares” and pragmatism (“We exist to make money to improve shareholder value” versus “Because it’s there”. That said, measurable, repeatable, and effective countermeasures exist which can be deployed on an enterprise-wide basis to help level the playing field by deterring attackers. This paper will discuss these threats along with active and passive countermeasures for same.

  17. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  18. Threats to the consumer market of region

    Directory of Open Access Journals (Sweden)

    Gavriil Aleksandrovich Agarkov

    2012-09-01

    Full Text Available This papers reviews the main threats to the today's consumer market and offers a historic tour of their existence. The results of a comprehensive diagnostics technique of economic safety of the consumer market in the region taking into account the impact of threats are presented. In the basis of the procedure is an indicative method of analysis, in which diagnosis is carried out on a set of criterial parameters. Along with a comprehensive assessment, the paper offers a detailed analysis of one of the method's modules - evaluation of consumer protection as the most vulnerable category of participants in the consumer market. A classification of prejudice of consumers in accordance with international studies is considered. The conducted study showed that, in general, there is a positive trend of economic safety of the consumer market in the region for the period from 2003 to 2010, but, according to some modules (evaluation of consumer protection, the situation has worsened for the majority of the subjects discussed during the reviewed period. The results of economic safety diagnostics of the consumer market actors can be used in the formation of program-target events to neutralize the negative trends in the consumer market

  19. Passive acoustic threat detection in estuarine environments

    Science.gov (United States)

    Borowski, Brian; Sutin, Alexander; Roh, Heui-Seol; Bunin, Barry

    2008-04-01

    The Maritime Security Laboratory (MSL) at Stevens Institute of Technology supports research in a range of areas relevant to harbor security, including passive acoustic detection of underwater threats. The difficulties in using passive detection in an urban estuarine environment include intensive and highly irregular ambient noise and the complexity of sound propagation in shallow water. MSL conducted a set of tests in the Hudson River near Manhattan in order to measure the main parameters defining the detection distance of a threat: source level of a scuba diver, transmission loss of acoustic signals, and ambient noise. The source level of the diver was measured by comparing the diver's sound with a reference signal from a calibrated emitter placed on his path. Transmission loss was measured by comparing noise levels of passing ships at various points along their routes, where their distance from the hydrophone was calculated with the help of cameras and custom software. The ambient noise in the Hudson River was recorded under varying environmental conditions and amounts of water traffic. The passive sonar equation was then applied to estimate the range of detection. Estimations were done for a subset of the recorded noise levels, and we demonstrated how variations in the noise level, attenuation, and the diver's source level influence the effective range of detection. Finally, we provided analytic estimates of how an array improves upon the detection distance calculated by a single hydrophone.

  20. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  1. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment. PMID:17269710

  2. Polar marine ecosystems: major threats and future change

    Energy Technology Data Exchange (ETDEWEB)

    Clarke, A. [British Antarctic Survey, Cambridge (United Kingdom); Harris, C.M. [Environmental Research and Assessment, Grantchester (United Kingdom)

    2003-07-01

    This review of polar marine ecosystems covers both the Arctic and Antarctic, identifying the major threats and, where possible, predicting their possible state(s) in 2025. Although the two polar regions are similar in their extreme photoperiod, low temperatures, and in being heavily influenced by snow and ice, in almost all other respects they are very different. The Arctic Ocean is a basin surrounded by continental landmasses close to, and influenced by, large populations and industrial activities. In contrast, the Southern Ocean is contiguous with all the other great oceans and surrounds a single land mass; Antarctica is remote from major centres of population and sources of pollution. Marine environments in both Polar Regions have been highly disturbed by fishing activity, but, in terms of pollution, some areas remain among the most pristine in the world. There are, however, both local and global pressures. Over the 2025 time horizon, the greatest concern for the Arctic is probably the ecological implications of climate change, particularly insofar as sea ice extent and duration are likely to be affected. Such changes are not expected to be as pronounced in the Southern Ocean over this time period, and concerns are related more to direct threats from harvesting of marine living resources, and the ability to manage these fisheries sustainably. In both Polar Regions, the capacity of marine ecosystems to withstand the cumulative impact of a number of pressures, including climate change, pollution and overexploitation, acting synergistically is of greatest concern. (author)

  3. Sensitivity towards fear of electric shock in passive threat situations.

    Directory of Open Access Journals (Sweden)

    Patrick Ring

    Full Text Available Human judgment and decision-making (JDM requires an assessment of different choice options. While traditional theories of choice argue that cognitive processes are the main driver to reach a decision, growing evidence highlights the importance of emotion in decision-making. Following these findings, it appears relevant to understand how individuals asses the attractiveness or riskiness of a situation in terms of emotional processes. The following study aims at a better understanding of the psychophysiological mechanisms underlying threat sensitivity by measuring skin conductance responses (SCRs in passive threat situations. While previous studies demonstrate the role of magnitude on emotional body reactions preceding an outcome, this study focuses on probability. In order to analyze emotional body reactions preceding negative events with varying probability of occurrence, we have our participants play a two-stage card game. The first stage of the card game reveals the probability of receiving an unpleasant electric shock. The second stage applies the electric shock with the previously announced probability. For the analysis, we focus on the time interval between the first and second stage. We observe a linear relation between SCRs in anticipation of receiving an electric shock and shock probability. This finding indicates that SCRs are able to code the likelihood of negative events. We outline how this coding function of SCRs during the anticipation of negative events might add to an understanding of human JDM.

  4. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Science.gov (United States)

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  5. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Disaster Evacuees Keep It With You Drug and Medical Device Safety Immunizations Food & Water Safety and Hand Hygiene Clean Hands Save Lives Resources for Emergency Health Professionals Clinician Outreach ... Health Response," co-produced by the United States Army Medical Research Institute of Infectious Diseases (USAMRIID), the Food ...

  6. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... or is not supported by your browser. For this reason, some items on this page will be unavailable. For more information about this message, please visit this page: About CDC.gov . ...

  7. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... on this page will be unavailable. For more information about this message, please visit this page: About ... Emergency Preparedness and Response Emergency Preparedness and You Information on Specific Types of Emergencies Recent Outbreaks and ...

  8. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Biological Warfare and Terrorism: The Military and Public Health Response," co-produced by the United States Army Medical Research Institute of Infectious Diseases (USAMRIID), the Food and Drug Administration (FDA), and the Centers for Disease Control and ...

  9. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... With You Drug and Medical Device Safety Immunizations Food & Water Safety and Hand Hygiene Clean Hands Save ... Medical Research Institute of Infectious Diseases (USAMRIID), the Food and Drug Administration (FDA), and the Centers for ...

  10. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Drug and Medical Device Safety Immunizations Food & Water Safety and Hand Hygiene Clean Hands Save Lives Resources for Emergency Health Professionals Clinician Outreach (COCA) Crisis & Risk Communication (CERC) Laboratory Information Health Alert Network (HAN) Responders ...

  11. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Keep It With You Drug and Medical Device Safety Immunizations Food & Water Safety and Hand Hygiene Clean Hands Save Lives Resources ... Preventing Chain Saw Injuries During Tree Removal Electrical Safety and Generators Handling Human Remains After a Disaster ...

  12. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... diseases: smallpox, anthrax, botulism, plague, tularemia, and viral hemorrhagic fevers. If these germs were used to intentionally infect ... the Program Overview Anthrax Plague Smallpox Botulism Viral Hemorrhagic Fevers Tularemia Note: Parts of this video were adapted ...

  13. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Hygiene Clean Hands Save Lives Resources for Emergency Health Professionals Clinician Outreach (COCA) Crisis & Risk Communication (CERC) Laboratory Information Health Alert Network (HAN) Responders Disaster Relief Volunteers Preventing ...

  14. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... After a Disaster Evacuees Keep It With You Drug and Medical Device Safety Immunizations Food & Water Safety ... Institute of Infectious Diseases (USAMRIID), the Food and Drug Administration (FDA), and the Centers for Disease Control ...

  15. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Controls Search Form Controls Search The CDC Cancel Submit Search The CDC CDC A-Z Index MENU ... Controls Search Form Controls Search The CDC Cancel Submit Search The CDC Emergency Preparedness and Response Note: ...

  16. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... During Tree Removal Electrical Safety and Generators Handling Human Remains After a Disaster Public Health Assessment and ... 6348 Email CDC-INFO U.S. Department of Health & Human Services HHS/Open USA.gov

  17. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... Disaster Public Health Assessment and Surveillance Tools Training & Education Emergency Responder Health Monitoring & Surveillance (ERHMS) ERHMS Online ... co-produced by the United States Army Medical Research Institute of Infectious Diseases (USAMRIID), the Food and ...

  18. Bioterror Paper Gets Online

    Institute of Scientific and Technical Information of China (English)

    Erika; Check; 秦艳艳

    2005-01-01

    牛奶是大多数人每天必不可少的食品。如果有恐怖分子在牛奶中下毒,后果将不堪设想。美国国家科学院最近发表的一篇文章就提出了这一假设,这将成为潜伏在美国人生活中的新的恐怖危机。而这篇文章也招来了美国各界的激烈争议。

  19. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... as bioterrorist weapons. Watch the Complete Program "The History of Bioterroism" (26 min 38 sec) Watch ... Public Health Response," co-produced by the United States Army Medical Research Institute of Infectious Diseases (USAMRIID), the Food ...

  20. History of Bioterrorism: Botulism

    Medline Plus

    Full Text Available ... You Drug and Medical Device Safety Immunizations Food & Water Safety and Hand Hygiene Clean Hands Save Lives ... Public Health Response," co-produced by the United States Army Medical Research Institute of Infectious Diseases (USAMRIID), ...

  1. Attracted to power: Challenge / threat and promotion / prevention focus differentially predict the attractiveness of group power

    Directory of Open Access Journals (Sweden)

    Annika eScholl

    2015-04-01

    Full Text Available Depending on their motivation, individuals prefer different group contexts for social interactions. The present research sought to provide more insight into this relationship. More specifically, we tested how challenge / threat and a promotion / prevention focus predict attraction to groups with high or low power. As such, we examined differential outcomes of threat and prevention focus as well as challenge and promotion focus that have often been regarded as closely related. According to regulatory focus, individuals should prefer groups that they expect to feel right for them to join: Low-power groups should be more attractive in a prevention (than a promotion focus, as these groups suggest security-oriented strategies, which fit a prevention focus. High-power groups should be more attractive in a promotion (rather than a prevention focus, as these groups are associated with promotion strategies fitting a promotion focus (Sassenberg, Jonas, Shah, & Brazy, 2007. In contrast, under threat (vs. challenge, groups that allow individuals to restore their (perceived lack of control should be preferred: Low-power groups should be less attractive under threat (than challenge because they provide low resources which threatened individuals already perceive as insufficient and high-power groups might be more attractive under threat (than under challenge, because their high resources allow individuals to restore control. Two experiments (N = 140 supported these predictions. The attractiveness of a group often depends on the motivation to engage in what fits (i.e., prefer a group that feels right in the light of one’s regulatory focus. However, under threat the striving to restore control (i.e., prefer a group allowing them to change the statuts quo under threat vs. challenge overrides the fit effect, which may in turn guide individuals’ behavior in social interactions.

  2. Threat Interference Biases Predict Socially Anxious Behavior: The Role of Inhibitory Control and Minute of Stressor.

    Science.gov (United States)

    Gorlin, Eugenia I; Teachman, Bethany A

    2015-07-01

    The current study brings together two typically distinct lines of research. First, social anxiety is inconsistently associated with behavioral deficits in social performance, and the factors accounting for these deficits remain poorly understood. Second, research on selective processing of threat cues, termed cognitive biases, suggests these biases typically predict negative outcomes, but may sometimes be adaptive, depending on the context. Integrating these research areas, the current study examined whether conscious and/or unconscious threat interference biases (indexed by the unmasked and masked emotional Stroop) can explain unique variance, beyond self-reported anxiety measures, in behavioral avoidance and observer-rated anxious behavior during a public speaking task. Minute of speech and general inhibitory control (indexed by the color-word Stroop) were examined as within-subject and between-subject moderators, respectively. Highly socially anxious participants (N=135) completed the emotional and color-word Stroop blocks prior to completing a 4-minute videotaped speech task, which was later coded for anxious behaviors (e.g., speech dysfluency). Mixed-effects regression analyses revealed that general inhibitory control moderated the relationship between both conscious and unconscious threat interference bias and anxious behavior (though not avoidance), such that lower threat interference predicted higher levels of anxious behavior, but only among those with relatively weaker (versus stronger) inhibitory control. Minute of speech further moderated this relationship for unconscious (but not conscious) social-threat interference, such that lower social-threat interference predicted a steeper increase in anxious behaviors over the course of the speech (but only among those with weaker inhibitory control). Thus, both trait and state differences in inhibitory control resources may influence the behavioral impact of threat biases in social anxiety. PMID:26163713

  3. Biophysics and Structure to Counter Threats and Challenges

    CERN Document Server

    Margaris, Manolia

    2013-01-01

    This ASI brought together a diverse group of experts who span virology, biology, biophysics, chemistry, physics and engineering.  Prominent lecturers representing world renowned scientists from nine (9) different countries, and students from around the world representing eighteen (18) countries, participated in the ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU).   The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting chemical and bioterrorism agents, lead to cleaner environments and improved energy sources, and help propel development in NATO partner countries.  At the end of the ASI students had an appreciation of how to apply each technique to their own particular research problem and to demonstrate that multifaceted approaches and new technologies are needed to solve the biological challenges of our time.  The course...

  4. Assessing Local and Surrounding Threats to the Protected Area Network in a Biodiversity Hotspot: The Hengduan Mountains of Southwest China.

    Science.gov (United States)

    Ye, Xin; Liu, Guohua; Li, Zongshan; Wang, Hao; Zeng, Yuan

    2015-01-01

    Protected areas (PAs) not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitatively assessing local and surrounding threats to different types of PAs with gradient buffers, and to main ecoregions in the Hengduan Mountain Hotspot of southwest China. Our findings show that national protected areas (NPAs) have lower and significantly lower threat values (pareas (PPAs) and other protected areas (OPAs), respectively, which indicates that NPAs are lands with a lower threat level and higher levels of protection and management. PAs have clear edge effects, as the proportion of areas with low threat levels decline dramatically in the 5-kilometer buffers just outside the PAs. However, NPAs suffered greater declines (58.3%) than PPAs (34.8%) and OPAs (33.4%) in the 5-kilometer buffers. Moreover, a significant positive correlation was found between the size of PAs and the proportion of areas with low threat levels that they contained in both PAs and PA buffers (p<0.01). To control or mitigate current threats at the regional scale, PA managers often require quantitative information related to threat intensities and spatial distribution. The threat assessment in the Hengduan Mountain Hotspot will be useful to policy makers and managers in their efforts to establish effective plans and target-oriented management strategies.

  5. Assessing Local and Surrounding Threats to the Protected Area Network in a Biodiversity Hotspot: The Hengduan Mountains of Southwest China.

    Directory of Open Access Journals (Sweden)

    Xin Ye

    Full Text Available Protected areas (PAs not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitatively assessing local and surrounding threats to different types of PAs with gradient buffers, and to main ecoregions in the Hengduan Mountain Hotspot of southwest China. Our findings show that national protected areas (NPAs have lower and significantly lower threat values (p<0.05 than provincial protected areas (PPAs and other protected areas (OPAs, respectively, which indicates that NPAs are lands with a lower threat level and higher levels of protection and management. PAs have clear edge effects, as the proportion of areas with low threat levels decline dramatically in the 5-kilometer buffers just outside the PAs. However, NPAs suffered greater declines (58.3% than PPAs (34.8% and OPAs (33.4% in the 5-kilometer buffers. Moreover, a significant positive correlation was found between the size of PAs and the proportion of areas with low threat levels that they contained in both PAs and PA buffers (p<0.01. To control or mitigate current threats at the regional scale, PA managers often require quantitative information related to threat intensities and spatial distribution. The threat assessment in the Hengduan Mountain Hotspot will be useful to policy makers and managers in their efforts to establish effective plans and target-oriented management strategies.

  6. Global Threat Reduction Initiative Domestic Security Program

    International Nuclear Information System (INIS)

    The Global Threat Reduction Initiative (GTRI) is part of the Department of Energy’s National Nuclear Security Administration (DOE/NNSA). One of GTRI’s primary missions is to work throughout the United States to enhance security for radiological materials located at civilian sites such as hospitals and universities that could be potentially used in a radiological dispersal device (RDD). In partnership with other federal organizations such as the Nuclear Regulatory Commission (NRC), the Federal Bureau of Investigation (FBI), and the Department of Homeland Security (DHS), GTRI has assisted sites in enhancing security for thousands of radioactive sources located throughout the U.S. This paper provides an overview of GTRI’s partnership with the NRC, the FBI, DHS, and host sites to enhance the security of radioactive sources

  7. Threats from space: 20 years of progress

    CERN Document Server

    Remo, J L

    2014-01-01

    It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

  8. The expectancy of threat and peritraumatic dissociation

    Directory of Open Access Journals (Sweden)

    Pamela McDonald

    2013-12-01

    Full Text Available Background: Peritraumatic dissociation is one of the most critical acute responses to a traumatic experience, partly because it predicts subsequent posttraumatic stress disorder. Despite this, there is little understanding about the factors that influence peritraumatic dissociation. This study investigated the extent to which peritraumatic dissociation is predicted by the amount of perceived warning that participants had of the impact of the trauma. Method: Randomized eligible admissions to four major trauma hospitals (N =243 were assessed during hospital admission with the Peritraumatic Dissociation Experiences Questionnaire (PDEQ and the perceived warning that participants had before the trauma impact occurred. Results: Whereas female gender predicted both Awareness and Derealization subscale scores on the PDEQ, perceived warning also predicted scores on the Derealization subscale. Conclusions: This finding suggests that the degree of anticipated threat may contribute to peritraumatic dissociation.

  9. Bluetooth Security Threats And Solutions: A Survey

    Directory of Open Access Journals (Sweden)

    Nateq Be-Nazir Ibn Minar

    2012-02-01

    Full Text Available Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The security issues of Bluetooth have been an active area of research for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along with some past security threats and possible countermeasures as reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information.Finally, the paper concludes with some recommendations for future security enhancements that can be implemented in the Bluetooth standard.

  10. Scientific performance estimation of robustness and threat

    Science.gov (United States)

    Hoffman, John R.; Sorensen, Eric; Stelzig, Chad A.; Mahler, Ronald P. S.; El-Fallah, Adel I.; Alford, Mark G.

    2002-07-01

    For the last three years at this conference we have been describing the implementation of a unified, scientific approach to performance estimation for various aspects of data fusion: multitarget detection, tracking, and identification algorithms; sensor management algorithms; and adaptive data fusion algorithms. The proposed approach is based on finite-set statistics (FISST), a generalization of conventional statistics to multisource, multitarget problems. Finite-set statistics makes it possible to directly extend Shannon-type information metrics to multisource, multitarget problems in such a way that information can be defined and measured even though any given end-user may have conflicting or even subjective definitions of what informative means. In this presentation, we will show how to extend our previous results to two new problems. First, that of evaluating the robustness of multisensor, multitarget algorithms. Second, that of evaluating the performance of multisource-multitarget threat assessment algorithms.

  11. Nuclear terrorism: How real is the threat?

    International Nuclear Information System (INIS)

    After the end of the Cold War the threat of proliferation of weapons of mass destruction to non-state actors has increased and since non-territorial actors cannot be deterred as easily as states, new responses have to be found. The author offers a definition of nuclear terrorism which includes also attacks on, and sabotage of, nuclear reactors and the dispersal of radioactive waste, in addition to the possession or use of weapon-grade nuclear materials. It is held that the main bottleneck for would-be nuclear terrorists is not so much bomb design than access to nuclear material for which the territories of the former Soviet Union are a likely source, due to gaps in safety and security. The article discusses the smuggling of nuclear material from the former USSR's territories and lists seven possible methods of acquisition of nuclear materials by terrorists. The intentions of various types of groups to use weapons of mass destruction and their possible goals are analyzed and the question whether or not Osama Bin Laden has acquired nuclear materials is raised. A discussion of possible motivations for nuclear terrorism by non-state actors and a listing of facilitating and inhibiting factors with regard to terrorist use of weapons of mass destruction lead to the conclusion that nuclear terrorism by non-state actors is still a low probability event but that no risks can be taken and that a broad action plan to counter the threat is needed whereby the IAEA should stand in the forefront. (author)

  12. The CBRNE Threat Needs New Dedicated Analysers

    International Nuclear Information System (INIS)

    Introduction: After the 9-11 attack by terrorists several governments realized their vulnerability towards creative asymmetric attacks. Due to increasing complexity of our society we create more vulnerability towards terror attacks. More chemical substances than we realize can be misused to destabilize our modern society. Recently aircraft passengers were confronted with new regulations, which limit the amount of fluid, which a passenger can bring on board with hand luggage. How far should we go limiting the allowance to bring liquids and substances on board? It indicates that we need new analytic instruments for screening the safety of luggage in all types of transport. Study Design: An inventory was made of the present demand for safe transport and its vulnerability to terror attacks. Also the safety and safety awareness in public buildings, offices and industrial complexes was assessed. Knowing the demand for a certain safety level, an inventory was made to identify analytical equipment, which can be used to check passengers and luggage on possible threats. The same can be used for protecting public areas, offices and industrial complexes. Results And Discussion: It is amazing how some governments, financially driven, underestimate the consequences of CBRNE incidences and disasters. Both threats due to release of dangerous substances just by accident and deliberate abuse of chemicals and/or biologicals by terror organizations is underestimated. Financial rationales are often the cause that the preparedness is less that technically could be possible. Still some commercial companies realize the importance of safety and preparedness towards terror attacks and take their precautions. Several detection systems are now under development and a new market of safety devices comes into existence. Conclusion: Key question is how far we would like to go with defending us with technical devices against potential terror attacks. Also the design of buildings, transport

  13. Prejudice towards Muslims in The Netherlands: testing integrated threat theory.

    Science.gov (United States)

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-12-01

    This study uses integrated threat theory to examine Dutch adolescents' (N=1,187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators between antecedent factors (in-group identification, intergroup contact, and the endorsement of multiculturalism) and prejudice. Based on structural equation modelling, it was found that stereotypes and symbolic threats, but not realistic threats, predicted prejudice towards Muslims. Further, it was found that the effect of in-group identification on prejudice was fully mediated by symbolic threat, the effect of contact was partially mediated by stereotypes, and the effect of the endorsement of multiculturalism was mediated by both symbolic threat and stereotypes. In addition, contact and multiculturalism were directly associated with prejudice towards Muslims. The theoretical and practical implications of these findings are discussed.

  14. On the front lines: Stakeholder threat cues determine how identified employees cope with scandal.

    Science.gov (United States)

    Grandey, Alicia A; Krannitz, Morgan A; Slezak, Tyler

    2015-07-01

    When organizational identity is threatened as a result of scandal, highly identified members who represent the threatened organization to stakeholders have a particularly challenging and overlooked experience. Addressing a theoretical paradox, we propose that organizational identification interacts with the threat cues from stakeholders to determine employee responses. We conducted a multimethod, in vivo test of these ideas with university fundraising employees after events threatened the university's moral identity. Interview and archival data demonstrated that stakeholders expressed identity threat to fundraisers, who experienced their own identity-related distress and engaged in both group-dissociative and group-affirming responses. Surveys of professional and student university fundraisers demonstrated that more identified employees were more distressed (e,g., felt anxious, grief, betrayed) regardless of stakeholder threat cues. Yet, when employees perceived weak threat cues from stakeholders, more identified members were less likely to dissociate from the group and more likely to affirm the group's positive identity with stakeholders. These benefits of identification were not present when the stakeholder threat cues were strong. We discuss future research and practical implications of front-line employee identification and stakeholder cues during scandal. PMID:25602276

  15. The Impact of Work Stressors on Identity Threats and Perceived Stress

    Directory of Open Access Journals (Sweden)

    Sophie Berjot

    2013-09-01

    Full Text Available This aim of this study was to explore which kinds of working situations are regarded by psychologists as being particularly detrimental to their identity (personal and professional, how these situations are appraised in terms of threat and/or challenge, and what their impact is on perceived stress, work satisfaction, and perceived threat to occupational status. In all, 842 French psychologists answered an open format question requesting them to report a situation that was particularly difficult for them as a person and/or as a psychologist (analyzed by the way of a content analysis, and a questionnaire containing our dependant variables. Four major categories of situations were highlighted. While the first three were positively linked to threat, the “patient relations” category was negatively correlated with it. “Threat to personal identity” mediated the relationship between difficult situations and perceived stress. Situations appraised as being identity-threatening are mostly the same than those found in the stress literature and are stressful because of their impact on personal identity. Moreover, for psychologists, relations to patients, which are at the heart of the profession, seem to be protective regarding stress and identity threats.

  16. Moderate threat causes longer lasting disruption to processing in anxious individuals

    Directory of Open Access Journals (Sweden)

    Sophie eForster

    2014-08-01

    Full Text Available Anxiety is associated with increased attentional capture by threat. Previous studies have used simultaneous or briefly separated (< 1s presentation of threat distractors and target stimuli. Here, we tested the hypothesis that high trait anxious participants would show a longer time window within which distractors cause disruption to subsequent task processing, and that this would particularly be observed for stimuli of moderate or ambiguous threat value. A novel temporally separated emotional distractor task was used. Face or house distractors were presented for 250ms at short (~1.6s or long (~3s intervals prior to a letter string comprising Xs or Ns. Trait anxiety was associated with slowed identification of letter strings presented at long intervals after face distractors with part surprise / part fear expressions. In other words, these distractors had an impact on high anxious individuals’ speed of target identification seconds after their offset. This was associated with increased activity in the fusiform gyrus and amygdala and reduced dorsal anterior cingulate recruitment. This pattern of activity may reflect impoverished recruitment of reactive control mechanisms to damp down stimulus-specific processing in subcortical and higher visual regions. These findings have implications for understanding how threat-related attentional biases in anxiety may lead to dysfunction in everyday settings where stimuli of moderate, potentially ambiguous, threat value such as those used here are fairly common, and where attentional disruption lasting several seconds may have a profound impact.

  17. Threat perception and familiarity moderate the androgen response to competition in women

    Science.gov (United States)

    Oliveira, Gonçalo A.; Uceda, Sara; Oliveira, Tânia; Fernandes, Alexandre; Garcia-Marques, Teresa; Oliveira, Rui F.

    2013-01-01

    Social interactions elicit androgen responses whose function has been posited to be the adjustment of androgen-dependent behaviors to social context. The activation of this androgen response is known to be mediated and moderated by psychological factors. In this study we tested the hypothesis that the testosterone (T) changes after a competition are not simply related to its outcome, but rather to the way the subject evaluates the event. In particular we tested two evaluative dimensions of a social interaction: familiarity with the opponent and the subjective evaluation of the outcome as threat or challenge. Challenge/threat occurs in goal relevant situations and represent different motivational states arising from the individuals’ subjective evaluation of the interplay between the task demands and coping resources possessed. For challenge the coping resources exceed the task demands, while threat represents a state where coping resources are insufficient to meet the task demands. In this experiment women competed in pairs, against a same sex opponent using the number tracking test as a competitive task. Losers appraised the competition outcome as more threatening than winners, and displayed higher post-competition T levels than winners. No differences were found either for cortisol (C) or for dehydroepiandrosterone. Threat, familiarity with the opponent and T response were associated only in the loser condition. Moderation analysis suggests that for the women that lost the competition the effect of threat on T is moderated by familiarity with the opponent. PMID:23847564

  18. Threat perception and familiarity moderate the androgen response to competition in women.

    Science.gov (United States)

    Oliveira, Gonçalo A; Uceda, Sara; Oliveira, Tânia; Fernandes, Alexandre; Garcia-Marques, Teresa; Oliveira, Rui F

    2013-01-01

    Social interactions elicit androgen responses whose function has been posited to be the adjustment of androgen-dependent behaviors to social context. The activation of this androgen response is known to be mediated and moderated by psychological factors. In this study we tested the hypothesis that the testosterone (T) changes after a competition are not simply related to its outcome, but rather to the way the subject evaluates the event. In particular we tested two evaluative dimensions of a social interaction: familiarity with the opponent and the subjective evaluation of the outcome as threat or challenge. Challenge/threat occurs in goal relevant situations and represent different motivational states arising from the individuals' subjective evaluation of the interplay between the task demands and coping resources possessed. For challenge the coping resources exceed the task demands, while threat represents a state where coping resources are insufficient to meet the task demands. In this experiment women competed in pairs, against a same sex opponent using the number tracking test as a competitive task. Losers appraised the competition outcome as more threatening than winners, and displayed higher post-competition T levels than winners. No differences were found either for cortisol (C) or for dehydroepiandrosterone. Threat, familiarity with the opponent and T response were associated only in the loser condition. Moderation analysis suggests that for the women that lost the competition the effect of threat on T is moderated by familiarity with the opponent.

  19. Threat perception and familiarity moderate the androgen response to competition in women

    Directory of Open Access Journals (Sweden)

    Rui F Oliveira

    2013-07-01

    Full Text Available Social interactions elicit androgen responses whose function has been posited to be the adjustment of androgen dependent behaviors to social context. The activation of this androgen response is known to be mediated and moderated by psychological factors. In this study we tested the hypothesis that the testosterone (T changes after a competition are not simply related to its outcome, but rather to the way the subject evaluates the event. In particular we tested two evaluative dimensions of a social interaction: familiarity with the opponent and the subjective evaluation of the outcome as threat or challenge. Challenge/Threat occurs in goal relevant situations and represent different motivational states arising from the individuals’ subjective evaluation of the interplay between the task demands and coping resources possessed. For challenge the coping resources exceed the task demands, while threat represents a state where coping resources are insufficient to meet the task demands. In this experiment women competed in pairs, against a same sex opponent using the Number Tracking Test as a competitive task. Losers appraised the competition outcome as more threatening than winners, and displayed higher post-competition T levels than winners. No differences were found either for Cortisol (C or for dehydroepiandrosterone (DHEA. Threat, familiarity with the opponent and T response were associated only in the loser condition. Moderation analysis suggests that for the women that lost the competition the effect of threat on T is moderated by familiarity with the opponent.

  20. The smell of death: evidence that putrescine elicits threat management mechanisms.

    Science.gov (United States)

    Wisman, Arnaud; Shrira, Ilan

    2015-01-01

    The ability to detect and respond to chemosensory threat cues in the environment plays a vital role in survival across species. However, little is known about which chemical compounds can act as olfactory threat signals in humans. We hypothesized that brief exposure to putrescine, a chemical compound produced by the breakdown of fatty acids in the decaying tissue of dead bodies, can function as a chemosensory warning signal, activating threat management responses (e.g., heightened alertness, fight-or-flight responses). This hypothesis was tested by gaging people's responses to conscious and non-conscious exposure to putrescine. In Experiment 1, putrescine increased vigilance, as measured by a reaction time task. In Experiments 2 and 3, brief exposure to putrescine (vs. ammonia and a scentless control condition) prompted participants to walk away faster from the exposure site. Experiment 3 also showed that putrescine elicited implicit cognitions related to escape and threat. Experiment 4 found that exposure to putrescine, presented here below the threshold of conscious awareness, increased hostility toward an out-group member. Together, the results are the first to indicate that humans can process putrescine as a warning signal that mobilizes protective responses to deal with relevant threats. The implications of these results are briefly discussed.

  1. Modeling Human Behaviour with Higher Order Logic: Insider Threats

    DEFF Research Database (Denmark)

    Boender, Jaap; Ivanova, Marieta Georgieva; Kammuller, Florian;

    2014-01-01

    In this paper, we approach the problem of modeling the human component in technical systems with a view on the difference between the use of model and theory in sociology and computer science. One aim of this essay is to show that building of theories and models for sociology can be compared...... to and implemented in Higher Order Logic. We validate this working hypothesis by revisiting Weber’s understanding explanation. We focus on constructive realism in the context of logical explanation. We review Higher Order Logic (HOL) as a foundation for computer science and summarize its use of theories relating...... it to the sociological process of logical explanation. As a case study on modeling human behaviour, we present the modeling and analysis of insider threats as a Higher Order Logic theory in Isabelle/HOL. We show how each of the three step process of sociological explanation can be seen in our modeling of insider’s state...

  2. Emergency response and disease control--a discussion of alternative objectives for zoning in the age of agricultural bioterrorism.

    Science.gov (United States)

    Munroe, Fonda A

    2007-01-01

    Emergency planning activities in most developed countries have increased as a result of such events as the September 11, 2001 terrorist attacks and the emergence of the highly pathogenic Asian strain of avian influenza, H5N1. The threat of terrorist activities, combined with advances in science and technology, have resulted in an expanded spectrum of threat for humans, animals, plants and the environment. It is possible that an attack or disease incursion could be so catastrophic and devastating that the resources to combat it would be rapidly overwhelmed. In these cases, it may be necessary to develop an alternative strategy. The author discusses the concept of protective zoning. Protective zoning is a strategy to salvage or protect a smaller segment of an agriculture sector or geographic area when resources are insufficient to protect the entire sector or area. This change in orientation will be extremely controversial and the exact criteria to determine when the situation warrants a change in objective, as well as the precise activities to be performed, must be determined by all stakeholders well in advance. Changes to other activities in current emergency plans may be required. The impact on the recovery phase plans will be significant. PMID:20411521

  3. The effects of takeover threats of shareholders and firm value

    OpenAIRE

    Haan, Marco; Riyanto, Yohanes

    2000-01-01

    We study the role of takeover threats as a corporate control mechanism using Aghion and Tirole's (1997) model of formal and real authority. Shareholders do not monitor the manager's actions, since ownership is widely dispersed. A corporate raider may monitor, and steps in if a profit opportunity exists. In our model, a takeover threat decreases the manager's effort and does not benefit shareholders. The effect of a takeover threat on the expected value of the firm is ambiguous. It is in the i...

  4. Analysis of industrial threats on the chosen example

    OpenAIRE

    R. Nowosielski; M. Spilka; A. Kania

    2011-01-01

    Purpose: In this paper the analysis of influence of threats on the safety level in plastic processing industry was carried out. The effect of the proper risk management is increase of work safety and psychical comfort of employers. The necessity of threats monitoring and minimization of the occupational risk were showed.Design/methodology/approach: In this article the essence of industrial safety was presented. Identification of threats on the work position and determination of the risk accep...

  5. On the relationship between social distance and threat

    OpenAIRE

    Astrid C. Buba; de Hoog, Natascha

    2009-01-01

    We investigated the dependence of threat perception and reaction on social distance estimation. Social identity threat was imposed within a 2x2 between subjects design, with N=163 students reading a criticising comment about their ingroup assigned to originate from one of two possible outgroups. The participants completed parts of the scale Overlap of self, ingroup and outgroup (OSIO, Schubert and Otten, 2002) as a measure of social distance either before or after the threat manipulation. Res...

  6. The Reliability to Predict Threat in Social Networks

    Directory of Open Access Journals (Sweden)

    Aleksandrs Larionovs

    2014-11-01

    Full Text Available During the analysis and study it will be possible to create and describe information damping mechanism for transition of threats from one user group to another (within the parameters of portraits, which is the main cause of the massively spreading threat on social networks. Threat predictability in social networks is associated with an adequate scrutiny of system and user portrait, which has a direct correlation.

  7. 49 CFR 192.923 - How is direct assessment used and for what threats?

    Science.gov (United States)

    2010-10-01

    ... SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas... 49 Transportation 3 2010-10-01 2010-10-01 false How is direct assessment used and for what threats? 192.923 Section 192.923 Transportation Other Regulations Relating to Transportation...

  8. Illegitimacy and identity threat in (inter)action : Predicting intergroup orientations among minority group members

    NARCIS (Netherlands)

    Livingstone, Andrew G.; Spears, Russell; Manstead, Antony S. R.; Bruder, Martin

    2009-01-01

    We test the hypothesis that intergroup orientations among minority group members are shaped by the interaction between the perceived illegitimacy of intergroup relations and identity threat appraisals, as well as their main effects. This is because together they serve to focus emotion-mediated react

  9. Responding to Student Threats: Legal and Procedural Guidelines for High School Principals.

    Science.gov (United States)

    Stader, David L.

    2001-01-01

    Reviews some legal and procedural guidelines pertaining to freedom of expression and due process in how teachers and administrators handle student verbal or symbolic threats. Reviews school cases related to freedom of expression, written expression, verbal or written expression off school property, and Internet expression. Offers recommendations…

  10. Relativity

    CERN Document Server

    Brewster, Hilary D

    2009-01-01

    The theory of relativity has become a cornerstone of modern physics. Over the course of time it has been scrutinized in a multitude of experiments and has always been verified with high accuracy. The correctness of this theory can no longer be called into question. Right after its discovery by Albert Einstein in 1905, special relativity was only gradually accepted because it made numerous predictions contradicting common sense, fervently castigated by Einstein, and also defied experiment for too long a time. It was only with the advent of particle or high energy physics that matter could be ac

  11. Relativity

    CERN Document Server

    Einstein, Albert

    2013-01-01

    Time magazine's ""Man of the Century"", Albert Einstein is the founder of modern physics and his theory of relativity is the most important scientific idea of the modern era. In this short book, Einstein explains, using the minimum of mathematical terms, the basic ideas and principles of the theory that has shaped the world we live in today. Unsurpassed by any subsequent books on relativity, this remains the most popular and useful exposition of Einstein's immense contribution to human knowledge.With a new foreword by Derek Raine.

  12. Wetland Preservation in Australia: The Administrative and Policital Threats

    Institute of Scientific and Technical Information of China (English)

    Mark Yaolin Wang

    2008-01-01

    The wetlands in Australia are of great physical, chemical and biological variety due to the continent's age, geological history and climate. The traditional physical and biological threats remain as the main challenges for wetland preservation in Australia. However, it has been increasingly recognized that the immediate survival of wetlands are being affected by more subtle threats, such as administrative and political threats. This paper identifies these non-physical threats and discusses how and why they have become the major barriers for sustainable wetland preservation in Australia. Finally, this paper calls for more practical policies and solutions to be implemented for sustainable wetland preservation in Australia.

  13. Reverse Modeling and Autonomous Extrapolation of RF Threats

    Directory of Open Access Journals (Sweden)

    Sanguk Noh

    2015-11-01

    Full Text Available This paper addresses the investigation of the basic components of reverse modeling and autonomous extrapolation of radio frequency (RF threats in electronic warfare settings. To design and test our system, we first model RF threats using the radioactive parameters received. The enemy radar simulated with a transponder or emitter transmits electronic signals; next, the sensors of the system intercept those signals as radioactive parameters. We generate the attributes of RF threats during communication between the electronic emissions of RF threats and the receivers of our system in various electronic warfare scenarios. We then utilize the data acquired through our system to reversely model RF threats. Our system carries out the reverse extrapolation process for the purpose of identifying and classifying threats by using profiles compiled through a series of machine learning algorithms, i.e., naive Bayesian classifier, decision tree, and k-means clustering algorithms. This compilation technique, which is based upon the inductive threat model, could be used to analyze and predict what a real-time threat is. We summarize empirical results that demonstrate our system capabilities of reversely modeling and autonomously extrapolating RF threats in simulated electronic warfare settings.

  14. Suggestions about the ability to respond to bioterrorism in military hospitals%军队医院应对生物恐怖能力现状调查及能力提高的建议

    Institute of Scientific and Technical Information of China (English)

    王辉; 吴杰; 于弘; 郑涛; 孙建中

    2014-01-01

    根据军队医院在应对生物恐怖能力现状调查中获得的结果,针对现阶段军队医院存在的薄弱环节,提出应对生物恐怖能力的建议:平战结合,整体提高;立足自身,任务牵引;危机管理,分级响应;军地联动,依托社会。%According to the investigation about the current ability of military hospitals to cope with bioterrorism , we suggest that military hospitals improve the capability for bioterrorism response based on the research above by satisfying mission requirements , combining peacetime with wartime , carrying out crisis management , classifying response and cooperating with local sectors .

  15. Threats to sandy beach ecosystems: A review

    Science.gov (United States)

    Defeo, Omar; McLachlan, Anton; Schoeman, David S.; Schlacher, Thomas A.; Dugan, Jenifer; Jones, Alan; Lastra, Mariano; Scapini, Felicita

    2009-01-01

    We provide a brief synopsis of the unique physical and ecological attributes of sandy beach ecosystems and review the main anthropogenic pressures acting on the world's single largest type of open shoreline. Threats to beaches arise from a range of stressors which span a spectrum of impact scales from localised effects (e.g. trampling) to a truly global reach (e.g. sea-level rise). These pressures act at multiple temporal and spatial scales, translating into ecological impacts that are manifested across several dimensions in time and space so that today almost every beach on every coastline is threatened by human activities. Press disturbances (whatever the impact source involved) are becoming increasingly common, operating on time scales of years to decades. However, long-term data sets that describe either the natural dynamics of beach systems or the human impacts on beaches are scarce and fragmentary. A top priority is to implement long-term field experiments and monitoring programmes that quantify the dynamics of key ecological attributes on sandy beaches. Because of the inertia associated with global climate change and human population growth, no realistic management scenario will alleviate these threats in the short term. The immediate priority is to avoid further development of coastal areas likely to be directly impacted by retreating shorelines. There is also scope for improvement in experimental design to better distinguish natural variability from anthropogenic impacts. Sea-level rise and other effects of global warming are expected to intensify other anthropogenic pressures, and could cause unprecedented ecological impacts. The definition of the relevant scales of analysis, which will vary according to the magnitude of the impact and the organisational level under analysis, and the recognition of a physical-biological coupling at different scales, should be included in approaches to quantify impacts. Zoning strategies and marine reserves, which have not

  16. An Ecological Assessment of the Pandemic Threat of Zika Virus.

    Science.gov (United States)

    Carlson, Colin J; Dougherty, Eric R; Getz, Wayne

    2016-08-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset from Zika viral surveillance and serological surveys based in its native range, and construct ecological niche models to test basic hypotheses about its spread and potential establishment. The hypothesis that the outbreak of cases in Mexico and North America are anomalous and outside the native ecological niche of the disease, and may be linked to either genetic shifts between strains, or El Nino or similar climatic events, remains plausible at this time. Comparison of the Zika niche against the known distribution of dengue fever suggests that Zika is more constrained by the seasonality of precipitation and diurnal temperature fluctuations, likely confining autochthonous non-sexual transmission to the tropics without significant evolutionary change. Projecting the range of the diseases in conjunction with three major vector species (Aedes africanus, Ae. aegypti, and Ae. albopictus) that transmit the pathogens, under climate change, suggests that Zika has potential for northward expansion; but, based on current knowledge, our models indicate Zika is unlikely to fill the full range its vectors occupy, and public fear of a vector-borne Zika epidemic in the mainland United States is potentially informed by biased or limited scientific knowledge. With recent sexual transmission of the virus globally, we caution that our results only apply to the vector-borne transmission route of the pathogen, and while the threat of a mosquito-carried Zika pandemic may be overstated in the media

  17. An Ecological Assessment of the Pandemic Threat of Zika Virus.

    Science.gov (United States)

    Carlson, Colin J; Dougherty, Eric R; Getz, Wayne

    2016-08-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset from Zika viral surveillance and serological surveys based in its native range, and construct ecological niche models to test basic hypotheses about its spread and potential establishment. The hypothesis that the outbreak of cases in Mexico and North America are anomalous and outside the native ecological niche of the disease, and may be linked to either genetic shifts between strains, or El Nino or similar climatic events, remains plausible at this time. Comparison of the Zika niche against the known distribution of dengue fever suggests that Zika is more constrained by the seasonality of precipitation and diurnal temperature fluctuations, likely confining autochthonous non-sexual transmission to the tropics without significant evolutionary change. Projecting the range of the diseases in conjunction with three major vector species (Aedes africanus, Ae. aegypti, and Ae. albopictus) that transmit the pathogens, under climate change, suggests that Zika has potential for northward expansion; but, based on current knowledge, our models indicate Zika is unlikely to fill the full range its vectors occupy, and public fear of a vector-borne Zika epidemic in the mainland United States is potentially informed by biased or limited scientific knowledge. With recent sexual transmission of the virus globally, we caution that our results only apply to the vector-borne transmission route of the pathogen, and while the threat of a mosquito-carried Zika pandemic may be overstated in the media

  18. An Ecological Assessment of the Pandemic Threat of Zika Virus

    Science.gov (United States)

    Getz, Wayne

    2016-01-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset from Zika viral surveillance and serological surveys based in its native range, and construct ecological niche models to test basic hypotheses about its spread and potential establishment. The hypothesis that the outbreak of cases in Mexico and North America are anomalous and outside the native ecological niche of the disease, and may be linked to either genetic shifts between strains, or El Nino or similar climatic events, remains plausible at this time. Comparison of the Zika niche against the known distribution of dengue fever suggests that Zika is more constrained by the seasonality of precipitation and diurnal temperature fluctuations, likely confining autochthonous non-sexual transmission to the tropics without significant evolutionary change. Projecting the range of the diseases in conjunction with three major vector species (Aedes africanus, Ae. aegypti, and Ae. albopictus) that transmit the pathogens, under climate change, suggests that Zika has potential for northward expansion; but, based on current knowledge, our models indicate Zika is unlikely to fill the full range its vectors occupy, and public fear of a vector-borne Zika epidemic in the mainland United States is potentially informed by biased or limited scientific knowledge. With recent sexual transmission of the virus globally, we caution that our results only apply to the vector-borne transmission route of the pathogen, and while the threat of a mosquito-carried Zika pandemic may be overstated in the media

  19. The nuclear threat; La menace nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno

    2011-01-26

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  20. Fructose; a Hidden Threat for Chronic Diseases

    Directory of Open Access Journals (Sweden)

    Ahmet Korkmaz

    2008-08-01

    Full Text Available Incremental usage of the fructose derived from corn by processed-food manufacturers has become a crucial threat in terms of human health. Although it is known as fruit sugar, the most important source of dietary fructose is now, processed-food prepared by using high-fructose corn syrup. Basically, fructose is metabolized within liver and its energy load is equal to glucose. Nevertheless, it does not make up satiety and fullness. Therefore, fructose-rich foods and beverages can be consumed in large amount because the absence of satiety. Studies performed recently unveil a connection between amount of fructose consumed and metabolic disorders such as cardiovascular diseases, type 2 diabetes, hypertension and obesity. The incidence of metabolic diseases which are already affecting more than half of the adults has been increasing among children. Moreover, these types of foods are generally consumed by children. Therefore, in order to reduce the frequency of metabolic disorders in all ages, the amount of fructose in processed-foods and beverages should also be taken into consideration. [TAF Prev Med Bull 2008; 7(4.000: 343-346

  1. Gonococcal endocarditis: an ever-present threat

    Science.gov (United States)

    Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society’s poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient’s clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  2. Gonococcal endocarditis: an ever-present threat.

    Science.gov (United States)

    de Campos, Fernando Peixoto Ferraz; Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society's poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient's clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  3. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  4. Superluminous Supernovae: No Threat from Eta Carinae

    Science.gov (United States)

    Thomas, Brian; Melott, A. L.; Fields, B. D.; Anthony-Twarog, B. J.

    2008-05-01

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of 1044 Joules. It was proposed that the progenitor may have been a massive evolved star similar to η Carinae, which resides in our own galaxy at a distance of about 2.3 kpc. η Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma-Ray Burst oriented toward the Earth, η Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over 104 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae, endocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous” for other reasons. However, due to reddening and extinction by the interstellar medium, η Carinae is unlikely to trigger such effects to any significant degree.

  5. Superluminous supernovae: No threat from Eta Carinae

    CERN Document Server

    Thomas, Brian C; Fields, Brian D; Anthony-Twarog, Barbara J

    2007-01-01

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of ~10^44 Joules. It was proposed that the progenitor may have been a massive evolved star similar to Eta Carinae, which resides in our own galaxy at a (poorly determined) distance of ~2.5 kpc. Eta Carinae appears ready to detonate, and in fact had an outburst in 1843. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma Ray Burst oriented toward the Earth, Eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over ~10^4 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possib...

  6. Development and assessment of a landscape-scale ecological threat index for the Lower Colorado River Basin

    Science.gov (United States)

    Paukert, Craig P.; Pitts, K.L.; Whittier, Joanna B.; Olden, Julian D.

    2011-01-01

    Anthropogenic disturbances impact freshwater biota but are rarely incorporated into conservation planning due to the difficulties in quantifying threats. There is currently no widely accepted method to quantify disturbances, and determining how to measure threats to upstream catchments using disturbance metrics can be time consuming and subjective. We compared four watershed-scale ecological threat indices for the Lower Colorado River Basin (LCRB) using landscape-level threats of land use (e.g., agricultural and urban lands), waterway development and diversions (e.g., number of canals, dams), and human development (e.g., road and railroads density, pollution sites). The LCRB is an ideal region to assess ecological threat indices because of the increasing need for conservation to ensure the persistence of native fishes in highly altered habitat. Each threat was measured for severity (i.e., level of influence on the upstream watershed) and frequency throughout each watershed; both severity and frequency were measured using two different methods. Severity values were based either on peer-reviewed literature and weighted in accordance to their published ecological impact, or assumed equal severity across stressors. Threat frequency was calculated according to either the presence/absence of each stressor, or on the relative density of each stressor in the watershed. Each measure of severity was combined with a measure of frequency, creating four ecological threat indices, and transformed to a 0–100 scale. Threat indices were highly correlated (slopes of 0.94–1.63; R2 of 0.82–0.98), and were highest for watersheds close to urban centers, including Phoenix, Tucson, and Flagstaff, Arizona, and Las Vegas, Nevada. Road crossings and density appeared to be the most influential stressors in the index, but the removal of any individual stressor only changed the index by planning for the Lower Colorado River Basin.

  7. Anxiety and threat perception abnormalities in normal children.

    NARCIS (Netherlands)

    P. Muris; M. Kindt; S. Boegels; H. Merckelbach; B, Gadet; V. Moulaert

    2000-01-01

    Examined the relationship between childhood anxiety and threat perception abnormalities. 105 children (aged 8-13 yrs) were exposed to stories reflecting 3 types of anxiety: social anxiety, separation anxiety, and generalized anxiety. From children's reactions to the stories, a number of threat perce

  8. Threat Level High (School): Curriculum Reform with Violence in Mind

    Science.gov (United States)

    Hawkes, T. Elijah; Twemlow, Stuart W.

    2015-01-01

    When school communities are troubled by violence, or threats of violence, at the hands of young people, educators have an opportunity to learn about aggression and adolescent identity development. A disturbing threat incident provides the point of departure for this principal's reflection on how high school curriculum can better meet the identity…

  9. 78 FR 46782 - Federal Acquisition Regulation; Iran Threat Reduction

    Science.gov (United States)

    2013-08-01

    ... RIN 9000-AM44 Federal Acquisition Regulation; Iran Threat Reduction AGENCIES: Department of Defense... Revolutionary Guard Corps, as contained in titles II and III of the Iran Threat Reduction and Syria Human Rights... Federal Register at 77 FR 73516, on December 10, 2012, to implement sections of titles II and III of...

  10. 75 FR 60430 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Science.gov (United States)

    2010-09-30

    ... of the Secretary Federal Advisory Committee; Threat Reduction Advisory Committee AGENCY: Office of... announces a meeting of the Threat Reduction Advisory Committee (hereafter referred to as ``the Committee..., October 21, 2010, from 9 a.m. to 5 p.m. ADDRESSES: The meeting will be held at the Heritage...

  11. Superior Detection of Threat-Relevant Stimuli in Infancy

    Science.gov (United States)

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  12. Threats and protection for electronically-steered array radars

    NARCIS (Netherlands)

    Janssen, J.P.B.; Monni, S.; Maas, A.P.M.; Vliet, F.E. van

    2008-01-01

    Front-end power overload protection is a vital issue in any electro-magnetic sensor. The issues around active electronically-steered arrays are more recent and pose new threats. Different categories of threats can damage the sensitive electronics in the phased-array radar, like hostile high power el

  13. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  14. A Stereotype Threat Account of Boys' Academic Underachievement

    Science.gov (United States)

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged…

  15. Asymmetric Threat Assessment Using Electro-Optical Image Systems

    NARCIS (Netherlands)

    Schwering, P.B.W.; Schutte, K.

    2010-01-01

    Asymmetric threat assessment from military platforms, including early detection and classification by electro-optical means, is a complicated matter. These threats can be for instance explosives-packed rubber boats, minecarrying swimmers and divers in a marine environment or terrorists, improvised e

  16. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, Karen; Van der Gang, Ineke

    2007-01-01

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is t

  17. Gender-, Race-, and Income-Based Stereotype Threat: The Effects of Multiple Stigmatized Aspects of Identity on Math Performance and Working Memory Function

    Science.gov (United States)

    Tine, Michele; Gotlieb, Rebecca

    2013-01-01

    This study compared the relative impact of gender-, race-, and income-based stereotype threat and examined if individuals with multiple stigmatized aspects of identity experience a larger stereotype threat effect on math performance and working memory function than people with one stigmatized aspect of identity. Seventy-one college students of the…

  18. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat.

  19. Simultaneous Detection of CDC Category "A" DNA and RNA Bioterrorism Agents by Use of Multiplex PCR & RT-PCR Enzyme Hybridization Assays

    Directory of Open Access Journals (Sweden)

    Kelly J. Henrickson

    2009-10-01

    Full Text Available Assays to simultaneously detect multiple potential agents of bioterrorism are limited. Two multiplex PCR and RT-PCR enzyme hybridization assays (mPCR-EHA, mRT-PCR-EHA were developed to simultaneously detect many of the CDC category “A” bioterrorism agents. The “Bio T” DNA assay was developed to detect: Variola major (VM, Bacillus anthracis (BA, Yersinia pestis (YP, Francisella tularensis (FT and Varicella zoster virus (VZV. The “Bio T” RNA assay (mRT-PCR-EHA was developed to detect: Ebola virus (Ebola, Lassa fever virus (Lassa, Rift Valley fever (RVF, Hantavirus Sin Nombre species (HSN and dengue virus (serotypes 1-4. Sensitivity and specificity of the 2 assays were tested by using genomic DNA, recombinant plasmid positive controls, RNA transcripts controls, surrogate (spiked clinical samples and common respiratory pathogens. The analytical sensitivity (limit of detection (LOD of the DNA asssay for genomic DNA was 1×100~1×102 copies/mL for BA, FT and YP. The LOD for VZV whole organism was 1×10-2 TCID50/mL. The LOD for recombinant controls ranged from 1×102~1×103copies/mL for BA, FT, YP and VM. The RNA assay demonstrated LOD for RNA transcript controls of 1×104~1×106 copies/mL without extraction and 1×105~1×106 copies/mL with extraction for Ebola, RVF, Lassa and HSN. The LOD for dengue whole organisms was ~1×10-4 dilution for dengue 1 and 2, 1×104 LD50/mL and 1×102 LD50/mL for dengue 3 and 4. The LOD without extraction for recombinant plasmid DNA controls was ~1×103 copies/mL (1.5 input copies/reaction for Ebola, RVF, Lassa and HSN. No cross-reactivity of primers and probes used in both assays was detected with common respiratory pathogens or between targeted analytes. Clinical sensitivity was estimated using 264 surrogate clinical samples tested with the BioT DNA assay and 549 samples tested with the BioT RNA assay. The clinical specificity is 99.6% and 99.8% for BioT DNA assay and BioT RNA assay, respectively. The

  20. Factors influencing IUCN threat levels to orchids across Europe on the basis of national red lists.

    Science.gov (United States)

    Kull, Tiiu; Selgis, Ulvi; Peciña, Miguel Villoslada; Metsare, Mirjam; Ilves, Aigi; Tali, Kadri; Sepp, Kalev; Kull, Kalevi; Shefferson, Richard P

    2016-09-01

    The red list has become a ubiquitous tool in the conservation of species. We analyzed contemporary trends in the threat levels of European orchids, in total 166 species characterized in 27 national red lists, in relation to their reproductive biology and growth form, distribution area, and land cover where they occur. We found that species in central Europe are more threatened than those in the northern, southern, or Atlantic parts of Europe, while species were least threatened in southern Europe. Nectarless and tuberous species are significantly more threatened than nectariferous and rhizomatous taxa. Land cover (ratios of artificial land cover, area of pastures and grasslands, forests and inland wetlands) also significantly impacted the threat level. A bigger share of artificial land cover increases threat, and a bigger share of pasture and grassland lowers it. Unexpectedly, a bigger share of inland wetland area in a country increased threat level, which we believe may be due to the threatened nature of wetlands themselves relative to other natural land cover types. Finally, species occurring in multiple countries are on average less threatened. We believe that large-scale analysis of current IUCN national red lists as based on their specific categories and criteria may particularly inform the development of coordinated regional or larger-scale management strategies. In this case, we advocate for a coordinated EU protection and restoration strategy particularly aimed at central European orchids and those occurring in wetland area. PMID:27648240