WorldWideScience

Sample records for global threats sovereign

  1. Sovereign Credit Risk in Latin America and Global Common Factors

    OpenAIRE

    Manuel Agosin Trumper; Juan Díaz Maureira

    2012-01-01

    This paper studies the importance of global common factors in the evolution of sovereign credit risk in a group of emerging economies (15 countries in Latin America for which daily data are available on sovereign credit spreads and CDS quotations from the beginning of 2007 until February 2012). We arrive at three principal results. First, there is robust evidence for the existence of a common factor in the evolution of the two measurements of sovereign credit risk that we use. Second, the com...

  2. Legitimacy in global governance of sovereign default: the role of international investment agreements

    OpenAIRE

    Brahms, Lisa

    2013-01-01

    This paper analyzes the legitimacy of investor-state arbitration under international investment agreements in sovereign debt restructuring. The paper presents mechanisms governing sovereign default generally, namely collective action clauses and informal negotiation in the London and Paris clubs and then discusses how sovereign debt restructuring is governed by IIAs, looking at how the clauses affect restructuring. Taking the conception of legitimacy in global governance by Buchanan and Keoha...

  3. Sovereign Wealth Funds as Global Economic and Political Actors: Defining of Notions

    Directory of Open Access Journals (Sweden)

    Андрей Алексеевич Кинякин

    2014-12-01

    Full Text Available The article devoted to consideration of sovereign wealth funds (SWF as economic and political actors as well as analysis of different forms of their activity in the contemporary global economics and politics. The author comes to the conclusion, that sovereign wealth funds play not only the role of providers of interests of the national states, but being the special purpose vehicles (SPV, designated to fulfill the different tasks, turn out to be the new type of global actors.

  4. The Impact of Indonesia Sovereign Credit Rating Upgrades and Investment Grade Status on the Sovereign Spread Changes

    Directory of Open Access Journals (Sweden)

    Dwi Anggi Novianti

    2013-01-01

    Full Text Available Getting sovereign credit rating upgrades and achieving investment grade status are main goals for countries in order to gain lower yield spread and cost of borrowing. By using ordinary least square method, this research is aimed to analyze the impact of Indonesia sovereign credit rating up-grade and investment grade status on sovereign spread changes. The result shows that the sovereign credit rating upgrades within speculative grade category and investment grade status for Indonesia do not significantly impact sovereign spread reduction. On the other hand, the global condition, especially global risk appetite, has significant impact to Indonesia sovereign yield spread. The research also indicates that Indonesia macroeconomic fundamentals do not significantly explain the movement of sovereign yield spread. Keywords: Yield spread, sovereign credit rating, investment grade, Indonesia

  5. Modeling exchange rate volatility in CEEC countries: Impact of global financial and European sovereign debt crisis

    Directory of Open Access Journals (Sweden)

    Miletić Siniša

    2015-01-01

    Full Text Available The aim of this study is to envisage the impact of global financial (GFC and European sovereign debt crisis (ESDC on foreign exchange markets of emerg- ing countries in Central and Eastern Europe CEEC countries (Czech Republic, Hungary, Romania, poland and Serbia. The daily returns of exchange rates on Czech Republic koruna (CZK, Hungarian forint (HuF, Romanian lea (RoL, polish zloty (pLZ and Serbian dinar (RSD, all against the Euro are analyzed during the period from 3rd January 2000 to15th April 2013, in respect. To examine the impact of global financial crisis and European sovereign debt crisis, dummy variables were adopted. overall results imply that global financial crisis has no impact on exchange rate returns in selected CEEC countries, while European sovereign debt crisis inf luencing in depreciation of polish zloty by 8% and Roma- nian lea by 6%. obtained results by our calculation, imply that global financial crisis increased enhanced volatility on exchange rate returns of Czech koruna, Romanian lea and polish zloty. Moreover, results of empirical analysis imply that this impact has the strongest inf luence in volatility on exchange rate returns of polish zloty.

  6. The Effect of the Global Financial Crisis and the Sovereign Debt Crisis on Public Sector Accounting: A Contextual Analysis

    OpenAIRE

    Emmanuel Igbawase Abanyam; Paul Aondona Angahar

    2015-01-01

    This paper examines the effect of global financial crisis and the sovereign debt crisis on public sector accounting. The global financial crisis and sovereign debt crisis were contextually analysed bringing out clearly its effect on public sector accounting which include accounting issues related to public sector intervention, accounting for recapitalization of investment, accounting for fiscal support, accounting for financial guarantees. The paper found out that, the unresolved fiscal and d...

  7. Sovereign Wealth Funds: Issue of transparency

    Directory of Open Access Journals (Sweden)

    Petrović Daliborka

    2015-01-01

    Full Text Available Subject of the paper includes Sovereign Wealth Funds and the formation of the first regulatory framework for their investment activities. Sovereign Wealth Funds invested a significant amount of money in Western financial institutions during the global financial crisis and thus played a crucial role in the preservation and stabilization of the global financial system. However, at the same time, a large gap between the financial power of Sovereign Wealth Funds and the level of their transparency was noted. The need to improve the transparency of Sovereign Wealth Funds has been recognized by international institutions, the OECD and the IMF, which initiated the formulation of the first international regulatory framework regarding the operations of these types of funds. The current international regulatory framework represents a sufficient basis for the gradual improvement of transparency, but because of its non-binding and voluntary nature, certain issues such as the protection of national security interests remain open. Therefore, the solutions can be sought through a process of continuous improvement of international regulation as well as strengthening cooperation between Sovereign Wealth Funds and governments of countries in which they invest.

  8. The evolution of sovereign wealth funds and their influence in the global economy. The case of China

    Directory of Open Access Journals (Sweden)

    Ioana-Iulica MIHAI

    2013-05-01

    Full Text Available This paper, through the deductive analysis and the causal explanations, catches the positive and negative character of the Sovereign Wealth Funds development as a relatively new economic tool, but with a strong impact in the global economy, especially in the context of the current financial changes. The benefits brought by them to the global capital market, in terms of increasing liquidity and allotting financial resources, however cannot diminish the fears related to the states holding sovereign funds in the economy of other countries, and in order to give an example we present the case of China.

  9. REGIME SWITCHING DETERMINANTS OF SOVEREIGN CDS SPREADS: EVIDENCE FROM TURKEY

    Directory of Open Access Journals (Sweden)

    Umurcan Polat

    2017-12-01

    Full Text Available In this study, it is assessed the main determinants of sovereign CDS spreads in Turkey from January 2006 to December 2015. Before delving into the nonlinear Markov regime-switching model estimation, a conventional one-state linear model is estimated answering to what extent the sovereign credit risk is affected in between global and country-specific market variables and by credit ratings announcement changes. In broad strokes, the regime-switching analysis reveals that among domestic variables, it is the foreign exchange rate that affects the sovereign credit risk more in more volatile periods and among global variables, the indicators standing for global volatility risk premiums and international liquidity primarily influence the changes in the sovereign CDS spread in turbulent regimes whereas proxies for global risk free rate are significant more in tranquil regimes.

  10. Why do Investors Buy Sovereign Default Insurance?

    DEFF Research Database (Denmark)

    Augustin, Patrick; Sokolovski, Valeri; Subrahmanyam, Marti G.

    local and regional channels that may explain the trading in sovereign CDS: (a) country-specific credit risk shocks, including changes in a country's credit rating and related outlook changes, (b) the announcement and issuance of domestic and international debt, (c) macroeconomic sentiment derived from......We provide a comprehensive analysis of the determinants of trading in the sovereign credit default swaps (CDS) market, using weekly data for single-name sovereign CDS from October 2008 to September 2015. We describe the anatomy of the sovereign CDS market, derive a law of motion for gross positions...... of the variation in sovereign CDS net notional amounts outstanding. Moreover, unlike for CDS spreads, common global factors explain very little of the variation in sovereign CDS trading and net notional amounts outstanding, suggesting that it is driven primarily by idiosyncratic country risk. We analyze several...

  11. Sovereign Risk and Currently Returns

    DEFF Research Database (Denmark)

    Della Corte, Pasquale; Sarno, Lucio; Schmeling, Maik

    We empirically investigate the relation between sovereign risk and exchange rates for a broad set of currencies. An increase in the credit default swap (CDS) spread of a country is accompanied by a significant depreciation of the exchange rate. More generally, CDS spread changes have substantial...... explanatory power for currency returns which is largely driven by shocks to global credit risk. Consistent with the notion that sovereign risk is priced, we find that a country's exposure to global credit risk forecasts excess returns to trading exchange rates as well as to trading on the volatility, skewness...

  12. Sovereign Risk and Currency Returns

    DEFF Research Database (Denmark)

    Della Corte, Pasquale; Sarno, Lucio; Schmeling, Maik

    We empirically investigate the relation between sovereign risk and exchange rates for a broad set of currencies. An increase in the credit default swap (CDS) spread of a country is accompanied by a significant depreciation of the exchange rate. More generally, CDS spread changes have substantial...... explanatory power for currency returns which is largely driven by shocks to global credit risk. Consistent with the notion that sovereign risk is priced, we find that a country's exposure to global credit risk forecasts excess returns to trading exchange rates as well as to trading on the volatility, skewness...

  13. Regime-dependent determinants of Euro area sovereign CDS spreads

    NARCIS (Netherlands)

    Blommestein, H.J.; Eijffinger, Sylvester; Qian, Zongxin

    We study the determinants of sovereign CDS spreads of five Euro area countries (Greece, Ireland, Italy, Portugal, and Spain) after the collapse of Lehman Brothers. We find that global and/or European Monetary Union (EMU)-wide factors are the main drivers of changes in the sovereign CDS spreads in

  14. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  15. TOWARDS NEW MEANINGS OF SOVEREIGN DEBT

    Directory of Open Access Journals (Sweden)

    Deceanu Liviu

    2014-07-01

    Full Text Available In recent years, due in part to the sovereign debt crisis, the public (and scientific interest towards indebtedness increased significantly. Regardless of the level at which we analyze it – micro or macro – it is clear from the outset that this is often unavoidable, for various reasons, and that the indebtedness state is often one of normality (necessary to cover current needs or to ensure growth targets. Of course, when the debtor is the state itself, things seem, at least apparently, more simple. States have borrowed since their beginnings, and continue to do so today. Nothing more natural ... For a long time, being a creditor of a state, especially of a developed country, meant, above all, a very safe situation – not being exposed to any risk. Recent years have shown, however, that such an approach is flawed, and that sovereign risk is omnipresent in the contemporary globalized world. For about seven years, the word „crisis” seems to have become one that is commonly used in the economic analysis. Undoubtedly, in this period there was not only a „common” financial crisis that occured, but a series of crises: finance – economic crisis – sovereign debt issues. In mid-2008, the global financial system crisis (especially in Western countries asked for a sustained intervention from the state. It came sooner or later, with more or less pro-cyclical effects. Among the taken measures, we can evoke a massive support to banks and economic activity in general, in the context of the drastic reduction in global demand. Recovery policies required their toll, however, and in this case we can talk about a significant increase in budget deficits. If the evolution of private borrowing has taken the path of stagnation, public debt, already growing, became more and more significant. In this context, we intend to highlight some new facets of sovereign risk, and to provide some remarks about how this risk should be viewed and approached.

  16. Sovereign Credit Risk, Liquidity and ECB Intervention

    DEFF Research Database (Denmark)

    Pelizzon, Loriana; Subrahmanyam, Marti G.; Tomio, Davide

    This paper explores the interaction between credit risk and liquidity, in the context of the intervention by the European Central Bank (ECB), during the Euro-zone crisis. The laboratory for our investigation is the Italian sovereign bond market, the largest in the Euro-zone. We use a unique data...... between changes in Italian sovereign credit risk and liquidity in the secondary bond market, conditional on the level of credit risk, measured by the Italian sovereign credit default swap (CDS) spread. We demonstrate the existence of a threshold of 500 basis points (bp) in the CDS spread, above which...... there is a structural change in this relationship. Other global systemic factors also a ffect market liquidity, but the speci c credit risk of primary dealers plays only a modest role in a ffecting market liquidity, especially under conditions of stress. Moreover, the data indicate that there is a clear structural...

  17. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  18. Sovereign wealth funds as special international investors under global financial downfall

    Directory of Open Access Journals (Sweden)

    N. Drozd

    2013-02-01

    Full Text Available An overview of origin, functional orientation and characteristics of sovereign wealth funds is presented. Possibility and necessity of cooperation between Ukraine and such systemic investors is proven.

  19. Risk, ambiguity and sovereign rating

    OpenAIRE

    Di Caro, Paolo

    2014-01-01

    Decisions of investing in sovereign assets involve both risk and ambiguity. Ambiguity arises from unknown elements characterizing the value of a generic sovereign. In presence of ambiguity, ambiguity-averse investors are prone to pay for obtaining summary information such as ratings which reduces ambiguity. Ambiguity-neutral and ambiguity-averse investors, then, make decisions on the basis of different informative sources. By presenting a simple model of sovereign rating under ambiguity, thre...

  20. Joint default probabilities and sovereign risk

    NARCIS (Netherlands)

    Scholtens, Bert; Hameeteman, Daphne

    2007-01-01

    The assessment of sovereign risk is of crucial importance for international lenders and investors. Many existing sovereign risk approaches are opaque and heavily rely on subjective choices. In general, they lack a theoretical basis. To assess sovereign risk, we use the Merton model in which a loan

  1. IMPACT OF THE GLOBAL FINANCIAL CRISIS ON SOVEREIGN DEBT IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Condea Bogdan Virgil

    2014-07-01

    Full Text Available At European Union level, the global financial crisis intensified the issue of sovereign debts and member states had to implement a series of fiscal measures in order to reduce the budgetary deficit and public debts, that have peaked in the last decades. These changes were also imposed in the Romanian fiscal system and the effects were felt in particular through increased tax rates or even the introduction of new taxes. 2008 was the year that marked a turning point in the fiscal policy of member states of the European Union from multiple perspectives. The impact of the economic crisis was felt mainly through the drastic decrease in tax revenues for all member states, which led to an accelerated growth of the budgetary deficit and implicitly of the indebtedness degree. In this context, EU member states were forced to adopt measures that would reduce the budgetary deficit (increases in some taxes and reduction of certain public expenditures. In 2010, the sovereign debt crisis in the euro area exposed the weaknesses of the EU economic governance. In response, the so-called "six pack" regulations were introduced in December 2011. Moreover, many countries have intensified their consolidation efforts in an attempt to regain the confidence of financial markets. The new architecture of fiscal policy in the European area has undergone many changes in recent years, market not only by the fiscal harmonization process, but mainly by the temptation of fiscal coordination that aims mainly to achieve fiscal stability and reduce medium and long-term public debt. The excessive growth of countries' indebtedness degree in recent years led to the need to study the sustainability of the indebtedness policy, considering that maintaining the budgetary deficit at a prudent level would also ensure the sustainability of fiscal policy. The study analyzes the effects in budgetary plan of economic recovery measures by highlighting the evolution of public debt in EU member

  2. Financial Sector Linkages and the Dynamics of Bank and Sovereign Credit Spreads

    DEFF Research Database (Denmark)

    Kallestrup, René; Lando, David; Murgoci, Agatha

    of the risk arising from cross-border exposures. We also construct a measure which in addition takes into account the relative size and riskiness of bank exposures to domestic government bonds and other domestic residents. Both measures help explaining the dynamics of bank CDS premia after controlling...... for country specic and global risk factors. Finally, a dynamic measure of the size of the implicit guarantee, that the sovereign may be assumed to extend for the domestic banking system, strongly impacts sovereign CDS premia....

  3. Determinants of Complexity of Sovereign Debt Negotiation

    Directory of Open Access Journals (Sweden)

    Lidia Mesjasz

    2016-07-01

    Full Text Available The situation on all kinds of financial markets is determined by their increasing complexity. Negotiation of sovereign debt is also a complex endeavor. Its complexity results both from structural characteristics - number of actors, problems of coordination, communication, cooperation and conflict and from cognitive limitations. The survey of literature on sovereign debt management shows that no research has been done on complexity of sovereign debt management, and sovereign debt negotiation in particular. The aim of the paper is to provide initial framework concepts of complexity of sovereign debt restructuring negotiation referring to a universal collection of characteristics of negotiation. A model of debt restructuring negotiation is elaborated and a set of its complexity- related characteristics is proposed.

  4. The Microstructure of the European Sovereign Bond Market

    DEFF Research Database (Denmark)

    Pelizzon, Loriana; Subrahmanyam, Marti G.; Tomio, Davide

    We explore the interaction between credit risk and liquidity, during the Euro-zone crisis, in the Italian sovereign bond market, using a unique tick-by-tick dataset, from the period June 2011-December 2012. We document a strong, dynamic relationship between changes in sovereign credit risk...... and market liquidity, conditional on the credit default swap (CDS) spread: When the CDS is above 500 basis points (bp), market liquidity adjusts more rapidly and signicantly to changes in the credit risk. Other global systemic factors also aect market liquidity, while, surprisingly, the specic credit risk...... of primary dealers plays only a modest role, especially under conditions of stress. Further, the Long-Term Renancing Operations (LTRO) by the European Central Bank (ECB) on December 8, 2012, clearly attenuated the relationship between credit risk and liquidity....

  5. Inequality and Sovereign Default under Democracy

    Directory of Open Access Journals (Sweden)

    YONG KYUN KIM

    2017-06-01

    Full Text Available Do differences in the inequality of income affect the likelihood that democratic governments decide not to honor their foreign debt contracts? I argue that sovereign default involves an intertemporal tradeoff between an immediate consumption boost and a future tax increase. Since a poorer voter internalizes less of the future cost of default, as the median is poorer, the majority’s demand for default increases. Therefore, greater income inequality implies a higher default risk. I then present a signaling game that models strategic selection that a sovereign must go through to get to the default decision node. I show that sovereign default is most likely to actually occur when the level of income inequality is intermediate. The intuition is that sovereign default occurs when risky sovereigns successfully induce creditors to provide a loan, but the most risky ones are among those least able to do so. Empirical findings support the claim.

  6. Emerging influenza virus: A global threat

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    Emerging influenza virus: A global threat. 475. J. Biosci. ... pathogens and are of major global health concern. Recently, ..... cases among persons in 14 countries in Asia, the Middle ... of influenza, investment in pandemic vaccine research and.

  7. Sovereign immunity: Principles and application in medical malpractice.

    Science.gov (United States)

    Suk, Michael

    2012-05-01

    Tort law seeks accountability when parties engage in negligent conduct, and aims to compensate the victims of such conduct. An exception to this general rule governing medical negligence is the doctrine of sovereign immunity. Historically, individuals acting under the authority of the government or other sovereign entity had almost complete protection against tort liability. This article addressed the following: (1) the development of sovereign immunity in law, (2) the lasting impact of the Federal Tort Claims Act on sovereign immunity, and (3) the contemporary application of sovereign immunity to medical malpractice, using case examples from Virginia and Florida. I performed an Internet search to identify sources that addressed the concept of sovereign immunity, followed by a focused search for relevant articles in PubMed and LexisNexis, literature databases for medical and legal professionals, respectively. Historically, sovereign liability conferred absolute immunity from lawsuits in favor of the sovereign (ie, the government). Practical considerations in our democratic system have contributed to an evolution of this doctrine. Understanding sovereign immunity and its contemporary application are of value for any physician interested in the debate concerning medical malpractice in the United States. Under certain circumstances, physicians working as employees of the federal or state government may be protected against individual liability if the government is substituted as the defendant.

  8. Impact of international and local conditions on sovereign bond spreads: International evidence

    Directory of Open Access Journals (Sweden)

    Selma Izadi

    2018-03-01

    Full Text Available This paper examines the effect of international and domestic factors on the sovereign bond spreads for 22 developed countries in North America, Europe and Pacific Rim regions. First, for all the regions the impact of global factors on the sovereign bond spreads is more intense than regional factors. Second, the findings confirm that for the bond spreads of each region over its domestic government bonds, the countries’ local fundamentals are better determinants of the spreads compared to the spread over US government bonds as a safe haven. Third, the influence of worldwide factors in the Eurozone compared to other regions bond spreads is less. Fourth, the relationship of the market sentiment and the investor risk aversion with the sovereign bond spreads of all regions is positive. Equity market volatility plays significant role in yield speads in international bond markets.

  9. Exchange-traded funds of the eurozone sovereign debt

    Directory of Open Access Journals (Sweden)

    Drenovak Mikica

    2010-01-01

    Full Text Available Periods of high uncertainty bring liquidity concerns to the forefront for sovereign bond investors. Arguably the most liquid and cost-effective way for retail and small institutional investors to gain diversified sovereign bond exposure is through an exchange traded fund (ETF. In this paper we study the performance, country exposure, and replicating characteristics of a sample of 31 European index ETFs with exposure to eurozone sovereign debt. The obtained results are presented in the context of underlying index selection rules, types of replication, and movements in sovereign debt interest rates and sovereign CDS spreads. It is demonstrated that the ETFs focused on accurately track corresponding bond indices. This is consistent with earlier findings for equity index ETFs. Our results may be of interest for institutional investors, regulators, and everyone interested in sovereign debt investments.

  10. The Welfare Cost of Sovereign Default and Liquidity Injections

    OpenAIRE

    Guangling Liu

    2014-01-01

    This paper develops a dynamic general equilibrium model with endogenous default on entrepreneur loans and funds borrowed from the central bank (liquidity injections) and investigates the welfare cost of sovereign default. The results show that sovereign default affects production through households' investment decisions and the bank's asset portfolio adjustment. The effect of sovereign default on entrepreneurs tends to be in favor of production. Sovereign default reduces the variability of th...

  11. Sovereign bonds in developing countries: Drivers of issuance and spreads

    Directory of Open Access Journals (Sweden)

    Andrea F. Presbitero

    2016-06-01

    Full Text Available In the last decade there has been a new wave of sovereign bond issuances in Africa. What determines the ability of developing countries to issue bonds in international capital and what explains the spreads on these bonds? This paper examines these questions using a dataset that includes 105 developing countries during the period 1995–2014. We find that a country is more likely to issue a bond when, in comparison with non-issuing peers, it is larger in economic size, has higher per capita GDP, a lower public debt, and a more effective government. Spreads on sovereign bonds are lower for countries with strong external and fiscal positions, as well as robust economic growth and government effectiveness. We also find that primary spreads for the average Sub-Saharan African issuer are higher than in other regions. With regard to global factors, our results confirm the existing evidence that issuances are more likely during periods of global liquidity and high commodity prices, especially for Sub-Saharan African countries, and spreads are higher in periods of higher market volatility.

  12. Bank/sovereign Risk Spillovers in the European Debt Crisis

    NARCIS (Netherlands)

    De Bruyckere, V.; Gerhardt, M.; Schepens, G.

    2012-01-01

    Abstract: This paper investigates contagion between bank risk and sovereign risk in Europe over the period 2006-2011. Since this period covers various stages of the banking and sovereign crisis, it offers a fertile ground to analyze bank/sovereign risk spillovers. We define contagion as excess

  13. Modeling Banking, Sovereign, and Macro Risk in a CCA Global VAR

    OpenAIRE

    Dale F. Gray

    2013-01-01

    The purpose of this paper is to develop a model framework for the analysis of interactions between banking sector risk, sovereign risk, corporate sector risk, real economic activity, and credit growth for 15 European countries and the United States. It is an integrated macroeconomic systemic risk model framework that draws on the advantages of forward-looking contingent claims analysis (CCA) risk indicators for the banking systems in each country, forward-looking CCA risk indicators for sover...

  14. Bank and sovereign debt risk

    OpenAIRE

    Darracq Paries, Matthieu; Faia, Ester; Rodriguez-Palenzuela, Diego

    2013-01-01

    Euro area data show a positive connection between sovereign and bank risk, which increases with banks' and sovereign long run fragility. We build a macro model with banks subject to incentive problems and liquidity risk (in the form of liquidity based banks' runs) which provides a link between endogenous bank capital and macro and policy risk. Our banks also invest in risky government bonds used as capital buffer to self-insure against liquidity risk. The model can replicate the positive conn...

  15. Sovereign debt and corporate capital structure: The evidence from selected European countries during the Gglobal Financial and Economic Crisis

    Directory of Open Access Journals (Sweden)

    Natalia Mokhova

    2017-05-01

    Full Text Available The recent Global financial crisis and the following European debt crisis show the significance of country financial stability and its impact on the private sector. Moreover, the sovereign debt as an essential element of government macroeconomic policy influences the financial performances of the companies and their future development and growth. The capital structure and financing decisions represent one of the most significant parts of company’s financial policy and its key to financial strength. There are a lot of external factors influencing the capital structure; however, due to the European debt crisis the aim of this study is to indicate the influence of sovereign debt on capital structure of the private held companies in different European countries. This study examines the evidence from European developed countries and emerging markets for the period 2005–2012, in order to compare the level of its impact on the capital structure according to the countries’ specifics. We find that after Global Financial Crisis the sovereign debt has tendency to increase in all investigated countries. Greece and Italy have the highest level of debt and it exceeds their Gross Domestic Product (GDP. In addition to that, the Czech Republic has the lowest level of sovereign debt to GDP, but at the same time the corporate capital structure exceeds 100%. The sovereign debt levels are strongly and statistically significantly correlated with each other, however, Hungarian debt has weaker relation with other countries. The findings also show the integration and interdependence of European countries. Moreover, Hungarian, Czech and German private sectors are the most depended on the level of sovereign debt.

  16. Exchange rate policy under sovereign default risk

    OpenAIRE

    Schabert, Andreas

    2011-01-01

    We examine monetary policy options for a small open economy where sovereign default might occur due to intertemporal insolvency. Under interest rate policy and floating exchange rates the equilibrium is indetermined. Under a fixed exchange rate the equilibrium is uniquely determined and independent of sovereign default.

  17. THE SOVEREIGN DEBT CHALLANGE: AN OVERVIEW

    Directory of Open Access Journals (Sweden)

    Pop Stanca

    2011-07-01

    Full Text Available Recent years have seen profound changes in country risk and its components, in the context of crises multiplication and diversification; the sovereign risk, a main country risk component, has undergone important changes, mainly given by mutations in its determining factors; the economy of "indebtedness" represents a reality of the recent years. In this context, our paper aims to capture new issues related to sovereign risk and its manifestations, and to bring to the fore a number of relevant indicators concerning the indebtedness problems. Currently, the increasing sovereign obligations, the Greece 2010 episode and the real sovereign debt crisis testify the important implications that the national economic policy decisions have on entire nations. In general, the countries with servicing difficulties present a total external or public debt that overcomes the average of the emerging states; however, we can not accurately identify a threshold beyond which we can say that a state is overly indebted. Therefore, questions such as Starting from what point is a state overly indebted? or What is the cause of the excessive debts of a state? are fully justified and the answer or answers deserve being sought. Studies on the relationship between various economic variables and the countries ability to deal with external debt problems are present in the country risk literature since the 1970s; beginning with authors such as Frank and Cline (1971, which gave priority to external debt service indicators such as Exports, Imports / GDP, Imports / Reserves, and continuing with other specialists, among whom we mention Saini and Bates (1978, Abassi and Tafler (1982, Haque, Brewer and Rivoli (1990, North (2001 Bouchet (2003, Meunier (2005, Longueville (2010 and many others, many ratios and indicators were carefully analyzed. In our short study, we also present a number of recent aspects concerning sovereign risk, and we analyze some relevant indicators, using

  18. Nuclear security: A global response to a global threat

    International Nuclear Information System (INIS)

    Amano, Yukiya

    2016-01-01

    The threat of nuclear terrorism is real. The possibility of criminals getting hold of nuclear and other radioactive material cannot be ruled out. Much progress has been made in tackling this threat nationally, regionally and globally, but more needs to be done. International cooperation is vital. As the global platform for cooperation in nuclear security, the IAEA helps countries to establish and maintain robust and sustainable national nuclear security regimes. We help ensure that measures are taken to protect nuclear and other radioactive material, as well as the facilities in which such material is housed, from malicious acts. This has been an important year for nuclear security with the entry into force of the Amendment to the Convention on the Physical Protection of Nuclear Material. This establishes legally binding commitments for countries to protect nuclear facilities as well as nuclear material in domestic use, storage and transport. I encourage all countries that have not yet done so to adhere to this Amendment and thereby contribute to a stronger global nuclear security regime. In this edition of the IAEA Bulletin, you will learn about the different areas of security where our work is making a real difference. We highlight the progress made in a number of countries.

  19. The globalization of public health, I: Threats and opportunities.

    Science.gov (United States)

    Yach, D; Bettcher, D

    1998-01-01

    The globalization of public health poses new threats to health but also holds important opportunities in the coming century. This commentary identifies the major threats and opportunities presented by the process of globalization and emphasizes the need for transnational public health approaches to take advantage of the positive aspects of global change and to minimize the negative ones. Transnational public health issues are areas of mutual concern for the foreign policies of all countries. These trends indicate a need for cross-national comparisons (e.g., in the areas of health financing and policy development) and for the development of a transnational research agenda in public health. PMID:9585736

  20. 31 CFR 357.23 - Judicial proceedings-sovereign immunity.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Judicial proceedings-sovereign immunity. 357.23 Section 357.23 Money and Finance: Treasury Regulations Relating to Money and Finance... Securities System (Legacy Treasury Direct) § 357.23 Judicial proceedings—sovereign immunity. (a) Department...

  1. China's Sovereign Wealth Fund Investments in overseas energy: The energy security perspective

    International Nuclear Information System (INIS)

    Sun, Xiaolei; Li, Jianping; Wang, Yongfeng; Clark, Woodrow W.

    2014-01-01

    Sovereign Wealth Funds (SWFs) are state-owned investment funds that invest in real and financial assets. Since the global financial crisis in 2008, SWFs' investments have resulted in national security concerns of host countries because SWFs continue to expand rapidly and have become increasingly active in real-time strategic transactions. Given this background, China, which has the biggest SWF in the world, is facing severe challenges of energy resources shortages while its plan is to accomplish social and economic development goals. Energy security is a key driving force of the energy investment policy of China's SWFs. This makes the SWF investments more complicated and more politically sensitive. The combination of sovereign rights and the strategic importance of energy also makes geopolitics more complicated and brings more uncertainty to SWF investments. This article explores the relationship between energy security and energy investments of China's SWFs. It is recognised that the energy investment of SWFs must follow a sustainable path to coordinate energy security, economic growth, return on investment and national security concerns. Government policymakers are urged to balance the financial and political returns on SWFs against potential negative effects. The conclusion presents insights for policymakers, energy scholars and SWF researchers. - Highlights: • Sovereign Wealth Funds (SWFs) are government-owned and may pursue geopolitical power. • SWF investment in energy is necessary for commercial and strategic interests. • China's SWFs are active in energy investment to support a “going global” strategy. • Sovereign rights are inevitable to integrate the strategic property of energy. • SWF investments in energy suffer negative impacts due to sovereign rights

  2. Sovereign wealth funds: Investment objectives and asset allocation strategies

    Directory of Open Access Journals (Sweden)

    Daniil Wagner

    2014-05-01

    Full Text Available Sovereign Wealth Funds (SWFs have steadily increased their importance in the global financial system in the last decade and especially during the financial crisis period. Although the objectives and investment strategies of SWFs are quite diverse, I propose to sort them into three main groups, depending on their sponsor countries’ endowment with resources and investment objectives. I present case studies and empirical analyses that reflect SWF investment activities and try to elaborate on the special role of each SWF group. Special emphasis is given to the recent financial crisis, where SWFs also acted as bailout investors by injecting substantial capital into global financial institutions, filling a financing gap that other institutional investors could not close

  3. Macroeconomic Considerations and Motives of Sovereign Wealth Funds Activity

    Directory of Open Access Journals (Sweden)

    Dariusz Urban

    2011-06-01

    Full Text Available Sovereign wealth funds are entities regarded as an institutional innovation in the international financial market. Due to the nature of the ownership rights, the investment activity of such entities is still highly controversial. Objections against sovereign wealth funds included the alleged extraeconomic goals of their activity. This article attempts to show that the establishment development and operation of sovereign wealth funds are determined by economic factors. The study presents a description of the international monetary system and the motives for building foreign exchange reserves by countries. It has been evidenced on the basis of the most recent data that some countries have reserves considerably exceeding the level regarded as optimal for the economy. The article presents benefits for the economy from the use of sovereign wealth funds to manage excessive foreign exchange reserves.

  4. A new estimation technique of sovereign default risk

    Directory of Open Access Journals (Sweden)

    Mehmet Ali Soytaş

    2016-12-01

    Full Text Available Using the fixed-point theorem, sovereign default models are solved by numerical value function iteration and calibration methods, which due to their computational constraints, greatly limits the models' quantitative performance and foregoes its country-specific quantitative projection ability. By applying the Hotz-Miller estimation technique (Hotz and Miller, 1993- often used in applied microeconometrics literature- to dynamic general equilibrium models of sovereign default, one can estimate the ex-ante default probability of economies, given the structural parameter values obtained from country-specific business-cycle statistics and relevant literature. Thus, with this technique we offer an alternative solution method to dynamic general equilibrium models of sovereign default to improve upon their quantitative inference ability.

  5. Essays on sovereign bond pricing and inflation-linked products

    NARCIS (Netherlands)

    Simon, Zorka

    2016-01-01

    This doctoral dissertation consists of three chapters on the pricing of sovereign debt and inflation-linked products. The first chapter examines the relative pricing of nominal and inflation-linked debt of the three largest Eurozone sovereign issuers. Its main contribution is to present evidence of

  6. The Bank-Sovereign Nexus: Evidence from a non-Bailout Episode

    DEFF Research Database (Denmark)

    Caporin, Massimiliano; Natvik, Gisle J.; Ravazzolo, Francesco

    We explore the interplay between sovereign and bank credit risk in a setting where Danish authorities first let two Danish banks default rather than bail them out and then left the country's largest bank, Danske Bank, to recapitalize privately. We find that the correlation between bank...... and sovereign credit default swap (CDS) rates changed with these events, indicating that the non-bailout decisions and recapitalization helped to curb the feedback loop between bank and sovereign risk. Following the non-bailout events, the sensitivity to external shocks declined both for Danske Bank...... and private bank debt indicates that the non-bailout policies succeeded in breaking the vicious circle generated by the risks on the bank and sovereign debts. Our results are reinforced by the use of an indirect testing approach and by focusing on CDS-quantiles....

  7. Incentive-Compatible Sovereign Debt

    DEFF Research Database (Denmark)

    Bersem, Mario R. C.

    This paper presents a theory of sovereign borrowing and lending when there is no court to enforce repayment obligations. Specifically, I extend the costly state verification approach in financial contracting to include an ex-post repayment decision in which the borrower repays creditors to avoid...

  8. Managing sovereign credit risk in bond portfolios

    OpenAIRE

    Bruder, Benjamin; Hereil, Pierre; Roncalli, Thierry

    2011-01-01

    With the recent development of the European debt crisis, traditional index bond management has been severely called into question. We focus here on the risk issues raised by the classical market-capitalization weighting scheme. We propose an approach to properly measure sovereign credit risk in a fixed-income portfolio. For that, we assume that CDS spreads follow a SABR process and we derive a sovereign credit risk measure based on CDS spreads and duration of portfolio bonds. We then consider...

  9. Sovereign debt threatens the Union: the genesis of a federation

    NARCIS (Netherlands)

    Loubert, A.

    2012-01-01

    Eurozone sovereign debt crisis - Europe's ‘Alexander Hamilton Moment’ - American sovereign debt crisis of 1780s - Articles of Confederation - U.S. Constitution - Assumption of states' debt - Constitutional transformation key factor in enabling Alexander Hamilton's debt restructuring.

  10. Asymmetric correlation of sovereign bond yield dynamics in the Eurozone

    Directory of Open Access Journals (Sweden)

    Dajcman Silvo

    2013-01-01

    Full Text Available This paper examines the symmetry of correlation of sovereign bond yield dynamics between eight Eurozone countries (Austria, Belgium, France, Germany, Ireland, Italy, Portugal, and Spain in the period from January 3, 2000 to August 31, 2011. Asymmetry of correlation is investigated pair-wise by applying the test of Yongmiao Hong, Jun Tu, and Guofu Zhou (2007. Whereas the test of Hong, Tu, and Zhou (2007 is static, the present paper provides also a dynamic version of the test and identifies time periods when the correlation of Eurozone sovereign bond yield dynamics became asymmetric. We identified seven pairs of sovereign bond markets for which the null hypothesis of symmetry in correlation of sovereign bond yield dynamics can be rejected. Calculating rolling-window exceedance correlation, we found that the time-varying upper- (i.e. for positive yield changes and lower-tail correlations (i.e. for negative yield changes for pair-wise observed sovereign bond markets normally follow each other closely, yet during some time periods (for most pair-wise observed countries, these periods are around the September 11 attack on the New York City WTC and around the start of the Greek debt crisis the difference in correlation does increase. The results show that the upper- and lower-tail correlation was symmetric before the Eurozone debt crisis for most of the pair-wise observed sovereign bond markets but has become much less symmetric since then.

  11. Sovereign default risk assessment

    NARCIS (Netherlands)

    Rijken, H.A.; Altman, E.I.

    2013-01-01

    We propose a new approach toward assessing sovereign risk by examining rigorously the health and aggregate default risk of a nation's private corporate sector. Models can be utilised to measure the probability of default of the non-financial sector cumulatively for five years, both as an absolute

  12. Threats from urban expansion, agricultural transformation and forest loss on global conservation priority areas

    Science.gov (United States)

    Moilanen, Atte; Di Minin, Enrico

    2017-01-01

    Including threats in spatial conservation prioritization helps identify areas for conservation actions where biodiversity is at imminent risk of extinction. At the global level, an important limitation when identifying spatial priorities for conservation actions is the lack of information on the spatial distribution of threats. Here, we identify spatial conservation priorities under three prominent threats to biodiversity (residential and commercial development, agricultural expansion, and forest loss), which are primary drivers of habitat loss and threaten the persistence of the highest number of species in the International Union for the Conservation of Nature (IUCN) Red List, and for which spatial data is available. We first explore how global priority areas for the conservation of vertebrate (mammals, birds, and amphibians) species coded in the Red List as vulnerable to each threat differ spatially. We then identify spatial conservation priorities for all species vulnerable to all threats. Finally, we identify the potentially most threatened areas by overlapping the identified priority areas for conservation with maps for each threat. We repeat the same with four other well-known global conservation priority area schemes, namely Key Biodiversity Areas, Biodiversity Hotspots, the global Protected Area Network, and Wilderness Areas. We find that residential and commercial development directly threatens only about 4% of the global top 17% priority areas for species vulnerable under this threat. However, 50% of the high priority areas for species vulnerable to forest loss overlap with areas that have already experienced some forest loss. Agricultural expansion overlapped with ~20% of high priority areas. Biodiversity Hotspots had the greatest proportion of their total area under direct threat from all threats, while expansion of low intensity agriculture was found to pose an imminent threat to Wilderness Areas under future agricultural expansion. Our results

  13. Global threat reduction initiative (GTRI)

    International Nuclear Information System (INIS)

    Chamberlain, Travis

    2009-01-01

    The Global Threat Reduction Initiative (GTRI) is a vital part of the global efforts to combat nuclear terrorism. GTRI's unique mission to reduce and protect vulnerable nuclear and radiological material located at civilian sites both in the United States and abroad directly addresses recommendations of the bipartisan 9/11 Commission. GTRI efforts are focused on the first line of defense, namely securing or removing vulnerable nuclear and radiological material at the source. The international community has promulgated guidance on the best practice on the technical and administrative aspects of radiological source security, and the GTRI seeks to provide technical assistance to national bodies and individual facilities to adopt this best practice. This presentation will discuss security concepts that are implemented by the GTRI in cooperation with the Australian Nuclear Science and Technology Organization's Regional Security of Radioactive Sources Project. (author)

  14. Credit ratings and the pricing of sovereign debt during the euro crisis

    OpenAIRE

    Joshua Aizenman; Mahir Binici; Michael Hutchison

    2013-01-01

    This paper investigates the impact of credit rating changes on the sovereign spreads in the European Union and investigates the macro and financial factors that account for the time-varying effects of a given credit rating change. We find that changes of ratings are informative, economically important, and highly statistically significant in panel models, even after controlling for a host of domestic and global fundamental factors and investigating various functional forms, time and country g...

  15. Identifying species threat hotspots from global supply chains.

    Science.gov (United States)

    Moran, Daniel; Kanemoto, Keiichiro

    2017-01-04

    Identifying hotspots of species threat has been a successful approach for setting conservation priorities. One important challenge in conservation is that, in many hotspots, export industries continue to drive overexploitation. Conservation measures must consider not just the point of impact, but also the consumer demand that ultimately drives resource use. To understand which species threat hotspots are driven by which consumers, we have developed a new approach to link a set of biodiversity footprint accounts to the hotspots of threatened species on the IUCN Red List of Threatened Species. The result is a map connecting consumption to spatially explicit hotspots driven by production on a global scale. Locating biodiversity threat hotspots driven by consumption of goods and services can help to connect conservationists, consumers, companies and governments in order to better target conservation actions.

  16. The global threat of antimicrobial resistance: science for intervention

    Directory of Open Access Journals (Sweden)

    I. Roca

    2015-07-01

    Full Text Available In the last decade we have witnessed a dramatic increase in the proportion and absolute number of bacterial pathogens resistant to multiple antibacterial agents. Multidrug-resistant bacteria are currently considered as an emergent global disease and a major public health problem. The B-Debate meeting brought together renowned experts representing the main stakeholders (i.e. policy makers, public health authorities, regulatory agencies, pharmaceutical companies and the scientific community at large to review the global threat of antibiotic resistance and come up with a coordinated set of strategies to fight antimicrobial resistance in a multifaceted approach. We summarize the views of the B-Debate participants regarding the current situation of antimicrobial resistance in animals and the food chain, within the community and the healthcare setting as well as the role of the environment and the development of novel diagnostic and therapeutic strategies, providing expert recommendations to tackle the global threat of antimicrobial resistance.

  17. On the efficiency of sovereign bond markets

    Science.gov (United States)

    Zunino, Luciano; Fernández Bariviera, Aurelio; Guercio, M. Belén; Martinez, Lisana B.; Rosso, Osvaldo A.

    2012-09-01

    The existence of memory in financial time series has been extensively studied for several stock markets around the world by means of different approaches. However, fixed income markets, i.e. those where corporate and sovereign bonds are traded, have been much less studied. We believe that, given the relevance of these markets, not only from the investors', but also from the issuers' point of view (government and firms), it is necessary to fill this gap in the literature. In this paper, we study the sovereign market efficiency of thirty bond indices of both developed and emerging countries, using an innovative statistical tool in the financial literature: the complexity-entropy causality plane. This representation space allows us to establish an efficiency ranking of different markets and distinguish different bond market dynamics. We conclude that the classification derived from the complexity-entropy causality plane is consistent with the qualifications assigned by major rating companies to the sovereign instruments. Additionally, we find a correlation between permutation entropy, economic development and market size that could be of interest for policy makers and investors.

  18. Reducing the global threat of radiological terrorism in Central Asia and Caucus regions. The global threat reduction initiative approach to radioactive source security

    International Nuclear Information System (INIS)

    Smith, E.

    2010-01-01

    The security of radioactive sources is of worldwide concern, due to their wide use in civilian commerce and the potentially devastating effects of their misuse. In cooperation with host countries and international partners, the Global Threat Reduction Initiative has utilized a proven process for providing technical and financial assistance to protect radioactive sources in diverse uses and unique circumstances at hundreds of sites worldwide. The mission of the Department of Energy, National Nuclear Security Administration's program includes reducing the risk posed by vulnerable radiological materials that could be used in a Radioactive Dispersal Device). The program's objectives are to identify, consolidate, secure, and/or dispose of high-activity radiological materials to prevent their theft and malicious use. The Global Threat Reduction Initiative Program's scope is global, with projects in over 100 countries at more than 755 radiological sites, including industrial, medical and commercial facilities. In addition to working bilaterally, the Program works closely with the International Atomic Energy Agency (IAEA) and other partner countries. (author)

  19. Argentina’s Sovereign Debt’s Crisis before Different Fora

    Directory of Open Access Journals (Sweden)

    Agustina Noeli Vazquez

    2016-08-01

    Full Text Available On 10 September 2015, the United Nations general assembly voted on nine principles concerning the restructuring of sovereign debts. It has been largely related with the ongoing economic Greek crisis, however it is more accurate to consider this resolution as one of the latest outcomes of the long Argentinean debt crisis and its international repercussions.For over 20 years Argentina has been in the centre of international scene when talking about sovereign debt. It survived the 2001 crisis and its recovery, is one of the fewest in world history. However, its sovereign debt restructuration in 2006 ended up before courts all over the world. This produced an unthinkable effect: it showed us how much has international law developed over these last years in order to adapt itself to this new reality were States are no longer the only big players in the international arena. This paper pretends to focus on the Argentinean cases before International Courts. Having proved its value to the International Law field, this paper might be considered a small contribution in the tumultuous path to understand sovereign debt’s regulation.

  20. Foucault Comes to Bakur: Sovereign Power and Collective Punishment

    Directory of Open Access Journals (Sweden)

    Mümtaz Murat Kök

    2016-07-01

    Full Text Available The Solution Process in Turkey has come to an abrupt end and along with it came an unprecedented violence in Bakur (Northern Kurdistan. This paper argues that the violence ravaging the region – especially in those areas where curfews have been declared – can be considered as a practice of punishment that is being employed indiscriminately. In line with this thought, the paper adopts a Foucauldian approach for comprehending the motivations behind the practice of collective punishment. In doing so, the paper revolves around the concepts of sovereign power and punishment introduced and argued by Michel Foucault. The paper argues that success of a pro-Kurdish party (HDP in June 7 elections and following declarations of self-rule in the region constituted an obstacle in Erdoğan’s desire for presidency but more importantly he took it as an act of dissent to his sovereign will. As can be seen in the functioning of sovereign power, he therefore punishes those people who are HDP’s main constituent while making an example out of them for potential challengers to his sovereign will.

  1. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  2. Sovereign Immunity in a Constitutional Government: The Federal Employment Discrimination Cases

    Science.gov (United States)

    Abernathy, Charles F.

    1975-01-01

    Considers employment discrimination suits against federal officers where application of the sovereign immunity doctrine has generated considerable confusion and attendant injustice, and develops the separation of powers rationale for sovereign immunity, showing how the immunity principles adopted by the Supreme Court implicitly define the…

  3. Sovereign ratings in the post-crisis world : an analysis of actual, shadow and relative risk ratings

    OpenAIRE

    Basu, Kaushik; De, Supriyo; Ratha, Dilip; Timmer, Hans

    2013-01-01

    This paper analyzes the evolution of sovereign credit ratings in the wake of the global financial crisis by studying changes in actual, shadow, and relative ratings between 2008 and 2012. For countries that do not have a rating from the major rating agencies, shadow ratings are estimated as a function of macroeconomic, structural, and governance variables. The shadow rating exercise confir...

  4. SOME ASPECTS CONCERNING SOVEREIGN DEBT AND THE RELATIVITY OF INDEBTEDNESS INDICATORS

    Directory of Open Access Journals (Sweden)

    Deceanu Liviu-Daniel

    2015-07-01

    Full Text Available For quite a while, the economic world was concerned more and more about sovereign debt. Taking a brief look at economic history, we see that we are not dealing with anything new. Episodes in which states have entered into default occurred, even centuries ago. Moments like the one where Edward III refused to pay the debt to Italian bankers, the Mexican default of August 1982 or the Argentine one back in 2001, aiming at nearly 100 billion dollars, are well known. The current discussion about sovereign debt started with the so-called sovereign debt crisis, which has in the foreground the problem of the Greek state. In 2010 it became acute, Greece being unable to honor its external obligations. It took a strong intervention, supported internationally mainly by the European Union (and also the IMF, but the situation is not resolved even today. This crisis, which we would put on the account of the governance inconsistency and errors, starting with the unprepared entry in the European Union and hasty adoption of the Euro, and continuing with the serious fiscal disorder in the economy, put in difficulty even the single European currency and the economic and monetary union.Shortly after the start of the Greek crisis, which had as a "catalyst" the violent and pro-cyclical reaction of rating agencies, we found that the problem is much deeper, some other countries (the so-called "PIIGS", for example being affected by massive indebtedness. In this context, the construction of indicators, of alert thresholds and “early warning” mechanisms is an important gain for policy-makers, as well as for the various economic operators. The study of sovereign debt can take many forms; on one hand, using data covering a long period, we may create models containing key indicators: sovereign debt, GDP, inflation, foreign trade, economic growth. Assumptions about the relationship between variables and their testing will be done as a second phase. On the other hand, the

  5. Sovereign defaults, business cycles and economic growth in Latin America, 1870-2012

    NARCIS (Netherlands)

    Boonman, Tjeerd M.

    2013-01-01

    Sovereign debt crises have regained attention since the recent crises in several European countries. This paper focuses on a particular aspect of the debt crisis literature: the impact of sovereign default on economic growth. Previous research agrees on the negative impact, but not on size and

  6. The rise of Asian sovereign wealth funds

    OpenAIRE

    Borst, Nicholas

    2015-01-01

    This Asia Focus provides an overview of sovereign wealth funds, evaluates the structure and activities of major funds in Asia, and compares the transparency of Asian funds relative to international best practices.

  7. International organizations and their exercise of sovereign powers

    CERN Document Server

    Sarooshi, Dan

    2005-01-01

    This book considers the exercise of sovereign powers by international organizations that include the United Nations, the World Trade Organization, and the European Union in order to answer fundamental questions about the relationship between an international organization and its member states. In their membership of international organizations, states must confer some of their sovereign powers upon those organizations. This book develops a three-tiered typology of conferrals which ranges from agency relationships, to delegations of authority, to full transfers of power. The legal aspects of these conferrals are examined, and their implications for the growing importance of international organizations in international relations are assessed.

  8. Toward a psychology of human survival: Psychological approaches to contemporary global threats

    International Nuclear Information System (INIS)

    Walsh, R.

    1989-01-01

    Nuclear weapons, population explosion, resource and food-supply depletion, and environmental deterioration have been posing increasing threats to human survival. Moreover, for the first time in history, all these major global threats are human caused and can, therefore, be traced in large part to psychological origins. After a brief overview of the nature and extent of current threats, this paper suggests criteria for an adequate psychology of human survival. The causes and effects of the threats are examined from various psychological perspectives and the psychological principles underlying effective responses are deduced. The ways in which mental health professionals may contribute to this most crucial task are discussed. 76 references

  9. Sovereign Wealth and Pension Funds Controlling Canadian Businesses: Tax-Policy Implications

    Directory of Open Access Journals (Sweden)

    Vijay Jog

    2013-02-01

    Full Text Available In a world without taxes, investors that take over companies would do so because they expect to be able to operate the business efficiently and at a high rate of return. But in Canada today, some acquirers enjoy tax advantages over others. And that could mean that certain buyers, who may not be best suited to owning a particular company, are able to outbid those who are better positioned to run that company at optimal efficiency. That is a problem not just for investors who end up outbid, due to Canada’s uneven tax policy, but for the Canadian economy, which suffers from the resulting economic inefficiency. With respect to registered pension plans, the so-called 30-per-cent rule puts a cap on the amount of voting equity in a company that they are permitted to own. Meanwhile, however, sovereign wealth funds — whether controlled by China or Australia — face no such limit when purchasing stakes in Canadian firms. The number and size of sovereign wealth funds, globally, is only growing — and rapidly. But as Canada increasingly attracts foreign capital, with foreign-controlled government-affiliated funds seeking out Canadian takeover targets, much of the discussion around public policy has focused primarily on the Investment Canada Act and the “net benefit test” for foreign direct investment. Another component in ensuring that Canadian interests are preserved, however, is the question of whether Canadian institutional investors can operate on a level playing field with foreign sovereign wealth funds. With the 30-per-cent rule limiting equity purchases for one but not the other, it would appear that they are not. The most appealing remedy to this imbalance is a tax solution: limiting the corporate deductions on interest, fees, royalties, rents, and the like, that so often factor in to the takeover calculation, as part of a tax-minimization strategy. This would not only put pension funds and sovereign wealth funds on equal footing, but it

  10. Financial fragility, sovereign default risk and the limits to commercial bank bail-outs

    NARCIS (Netherlands)

    van der Kwaak, C.G.F.; van Wijnbergen, S.J.G.

    2014-01-01

    We show that with intertwined weak banks and weak sovereigns, bank recapitalizations become much less effective. We construct a DSGE model with leverage constrained banks lending to firms and holding domestic government bonds. Bond prices reflect endogenously generated sovereign risk. This

  11. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends and describes NNSA’s integrated threat reduction strategy.

  12. From debt crisis to sovereign risk

    NARCIS (Netherlands)

    Lukkezen, Jasper

    2014-01-01

    Recent experience taught us that advanced economies can be subject to debt crises, with tremendous impact on the economy. Such crises are -fortunately- rare events with which policy makers do not have to deal on a daily basis. They do have to incorporate sovereign risk, the probability that such a

  13. Efficiency or speculation? A time-varying analysis of European sovereign debt

    Science.gov (United States)

    Ferreira, Paulo

    2018-01-01

    The outbreak of the Greek debt crisis caused turmoil in European markets and drew attention to the problem of public debt and its consequences. The increase in the return rates of sovereign debts was one of these consequences. However, like any other asset, sovereign debt returns are expected to have a memoryless behaviour. Analysing a total of 15 European countries (Eurozone and non-Eurozone), and applying a time-varying analysis of the Hurst exponent, we found evidence of long-range memory in sovereign bonds. When analysing the spreads between each bond and the German one, it is possible to conclude that Eurozone countries' spreads show more evidence of long-range dependence. Considering the Eurozone countries most affected by the Eurozone crisis, that long-range dependence is more evident, but started before the crisis, which could be interpreted as possible speculation by investors.

  14. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  15. The Impact of Sovereign Credit Rating Changes on Emerging Stock Markets

    OpenAIRE

    YIN, WEIGUO

    2008-01-01

    This study investigate the impact of sovereign rating change in emerging markets by using 42 sample counties over the period Jan. 1999 to Aug. 2008. The concurrent relationship between sovereign rating changes and the associated stock market spread can be established: the spreads tend to rise (fall) when upgrades (downgrades) occur. Surprisingly, according to Fitch report regarding the emerging market liquidity, we divide the whole time line into two sub-periods. It is found that rating chang...

  16. Sovereign debt and bank fragility in Spain

    NARCIS (Netherlands)

    van der Kwaak, C.; van Wijnbergen, S.

    In May 2012 the Spanish government announced a debt-financed recapitalization of the undercapitalized Spanish banking system. Although there was a wide consensus among economists and policymakers that this was key to solving Spain’s economic troubles, both bank CDS and sovereign CDS further

  17. 14 CFR 375.26 - Waiver of sovereign immunity.

    Science.gov (United States)

    2010-01-01

    ... that are engaged in proprietary of commercial activities waive any defense of sovereign immunity from suit in any action or proceeding instituted against any of them in any court or other tribunal in the...

  18. Understanding Emerging Market Sovereign Bond Yield Spread: Role of Default and Non-Default Determinants

    Directory of Open Access Journals (Sweden)

    Adelia Surya Pratiwi

    2015-04-01

    Full Text Available This paper is motivated by the fact that emerging market assets size has been expanding and trying to use sovereign debt market as part of capital market as main research focus. It is highlighting the distinction between default and non-default determinants and examining their significance in explaining emerging market sovereign bond yield spread. Using Cross-Sectional Fixed-Effect Panel Estimator, we found that both default (as proxied by Credit Rating and Outlook Index and non-default (as proxied by 3-month Fed Funds Futures determinants has significant explanatory power to sovereign bond yield spread. Extensively, we also found the significance to add volatility of 3-month Fed Funds Futures and Fed Target Rate basis and volatility of advanced stock markets as variables to stand for non-default determinants in the model. The significance of the latter model is strengthened by higher forecasting as well as indicates the significant role of US market to emerging market sovereign bond market.

  19. The Crisis of the Existing Global Paradigm of Governance and Political Economy

    Directory of Open Access Journals (Sweden)

    Winston P. Nagan

    2014-05-01

    Full Text Available This article seeks to underline the central challenges to world order that are outcomes of our current system of global, social, power and constitutional processes. The article outlines these major problems which it is suggested represent a crisis for the future trajectory of human survival and well-being. The paper then uses the problem of the emergence of transnational criminal activity in order to underline the limits of the current global paradigm of governance. In effect, in the criminal law context the jurisdiction of sovereign states to attack the problem of transnational crime is hedged with severe limitations. The most important of these limitations is the fact that the jurisdiction over crimes by sovereigns is limited by the territorial character of the definition of sovereignty. Thus a sovereign has a limited capacity to control and police criminal activity whose main locus of operation is generated outside of the territorial reach of the sovereign state. This essentially means that the element of global governance generates a juridical vacuum which permits organized crime to flourish outside of the boundaries of the state but at the same time, having the capacity to penetrate and corrupt the social, political and juridical processes of the sovereign state. The article explores the effort of the UN to provide some form of response to this crisis in the form of an international agreement.

  20. STATE OBLIGATION ON VIRUS SAMPLE SHARING;FROM COMMON HERITAGE OF MANKIND TO STATE’S SOVEREIGN RIGHT

    Directory of Open Access Journals (Sweden)

    Nurul Barizah

    2015-06-01

    Full Text Available The tradition of free international exchange of viruses have been developed by the World Health Organization (WHO probably based on the principle of “Common Heritage of Mankind”.  This tradition lead to legal uncertainty and unfairness in the movement of resources among states and provides an opportunity for developed countries to obtain easy access to viruses of developing countries. Then, International Law has introduced a new regime of “State’s Sovereign Right.” This research focuses on whether Member States have an obligation to share pathogen materials, including viruses for preventing global public health emergency, and whether WHO Collaborating Centers has a right to  share viruses to private sectors. It examines the reason why States should apply that principle. This research is normative legal research by using conceptual approach and  statute approach. This research finds that viruses are part of genetic resources under the meaning of CBD Convention. Accordingly, there is no state obligation under International Law to share it. However, if there is an international human rights obligation to share virus, there should also be an international human rights obligation to assure the access of affordability of drugs and vaccines. Thus, each state will have an equal obligation to enhance the global public health.Key Words : Intellectual Property, Virus Sample Sharing, Common Heritage of Mankind, and State’s Sovereign Right

  1. Empirical Studies on Sovereign Fixed Income Markets

    NARCIS (Netherlands)

    J.G. Duyvesteyn (Johan)

    2015-01-01

    markdownabstractAbstract This dissertation presents evidence of five studies showing that sovereign fixed income markets are not always price efficient. The emerging local currency debt market has grown to a large size of more than 1.5 trill ion US Dollars at the end of 2012. The factors

  2. The Significance of Blackstone's Understanding of Sovereign Immunity for America's Public Institutions of Higher Education.

    Science.gov (United States)

    Snow, Brian A.; Thro, William E.

    2001-01-01

    Asserts that from the perspective of America's public institutions of higher education, Blackstone's greatest legacy is his understanding of sovereign immunity. Explores the similarities between Blackstone's understanding of sovereign immunity and the current jurisprudence of the U.S. Supreme Court. (EV)

  3. Measuring Sovereign Risk in Turkey; An Application of the Contingent Claims Approach

    OpenAIRE

    Christian Keller; Peter J Kunzel; Marcos R Souto

    2007-01-01

    Improved macroeconomic conditions and changes to the asset-liability structure on Turkish balance sheets since the 2001 crisis have improved Turkey's overall sovereign risk profile. Nonetheless, the country remains subject to bouts of volatility, as evidenced most recently in the May/June 2006 market turbulence. This paper examines these changes in Turkey's risk profile using the Contingent Claims Approach (CCA), to quantify the evolution of Turkey's sovereign risk, relate risk indicators to ...

  4. The rise of sovereign wealth funds: the new geography of wealth

    International Nuclear Information System (INIS)

    Du Granrut, Ch.

    2008-01-01

    For some time now states have been 'making a comeback' in the management of certain strategic areas of the economy, such as energy, as in the case of Russia that was covered in the January 2008 issue of Futuribles. Some emergent countries or countries whose main source of income is their oil revenues are also moving into strategic sectors through the financial markets, using so-called 'sovereign' investment funds. Charles du Granrut describes what sovereign funds are, what they represent in terms of international economic relations and the investment strategies they apply etc. He first recalls the substantial accumulation of trading surpluses that underlies these funds in the Asian countries and the oil-exporting nations. An accumulation of currency reserves ensues, conferring substantial power on these countries with regard to the management of exchange rates and the possibility of managing a part of these reserves dynamically through sovereign funds (funds for the international investment of national savings that come under the authority of the states or central banks of these countries). After giving an account of the main existing sovereign funds, their scope and their strategy, Charles du Granrut shows what the consequences of their development might be, particularly for the international monetary system: among other things, a lasting rise in exchange rates against the US dollar, generating a transfer of wealth from the United States to its creditor countries, foremost among them the emerging Asian nations and the oil exporting states. (author)

  5. Wait Up!: Attachment and Sovereign Power.

    Science.gov (United States)

    Duschinsky, Robbie; Greco, Monica; Solomon, Judith

    2015-09-01

    Sociologists and feminist scholars have, over many decades, characterised attachment as a social construction that functions to support political and gender conservatism. We accept that attachment theory has seen use to these ends and consider recent deployments of attachment theory as justification for a minimal State within conservative political discourse in the UK since 2009. However, we contest that attachment is reducible to its discursive construction. We consider Judith Butler's depiction of the infant attached to an abusive caregiver as a foundation and parallel to the position of the adult citizen subjected to punitive cultural norms and political institutions. We develop and qualify Butler's account, drawing on the insights offered by the work of Lauren Berlant. We also return to Foucault's Psychiatric Power lectures, in which familial relations are situated as an island of sovereign power within the sea of modern disciplinary institutions. These reflections help advance analysis of three important issues: the social and political implications of attachment research; the relationship between disciplinary and sovereign power in the affective dynamic of subjection; and the political and ethical status of professional activity within the psy disciplines.

  6. Contagion during the Greek sovereign debt crisis

    NARCIS (Netherlands)

    Mink, M.; de Haan, J.

    We examine the impact of news about Greece and news about a Greek bailout on bank stock prices in 2010 using data for 48 European banks. We identify the twenty days with extreme returns on Greek sovereign bonds and categorise the news events during those days into news about Greece and news about

  7. Using Probabilistic Models to Appraise and Decide on Sovereign Disaster Risk Financing and Insurance

    OpenAIRE

    Ley-Borrás, Roberto; Fox, Benjamin D.

    2015-01-01

    This paper presents an overview of the structure of probabilistic catastrophe risk models, discusses their importance for appraising sovereign disaster risk financing and insurance instruments and strategy, and puts forward a model and a process for improving decision making on the linked disaster risk management strategy and sovereign disaster risk financing and insurance strategy. The pa...

  8. SOVEREIGN DEBT RESTRUCTURING AND “VULTURE FUNDS”

    Directory of Open Access Journals (Sweden)

    Emilia Cornelia STOICA

    2016-06-01

    Full Text Available Defining sovereign debt - debt issued or guaranteed by a public entity: central and / or regional public authorities, central banks, public institutions or enterprises - must include the risks that its management may generate, mainly the risk of default. If an medium period of time - 3-5 years – the macroeconomic growth of a state, and as the result the increase of the public revenues constantly lies below the growth of sovereign debt, these will cause an insolvability risk to cover it, and that state should proceed to restructure its debt. Financial stability of public authorities and sovereign debt occurred since the beginning of the creation of democratic states, and instruments for debt restructuring have been continuously adapted to economic and social conjuncture. Initially, states faced a necessity of funding were borrowed from foreign governments and / or large consortia bank, and when their debts had to be restructured it has been created the international institutional framework to negotiate between debtor countries and public creditors - Paris Club - and to coordinate negotiations between public authorities and major debtor consortia - London Club. In the last decade 'vulture funds' occurred, which are hedge funds acquiring from the secondary financial market debt the securities, including public debt, to a much lower share nominal value. Subsequently, vulture funds claim states issuing debt repayment at values close or equal to the face value - in this way can make a profit of more than 100% of the financial investment they made it on the secondary market. If these countries do not comply, generally being unable to honor their public debt, vultures funds act the countries in international courts, which usually prevails because vultures funds’ action is legal under current conditions.

  9. Sovereign cat bonds and infrastructure project financing.

    Science.gov (United States)

    Croson, David; Richter, Andreas

    2003-06-01

    We examine the opportunities for using catastrophe-linked securities (or equivalent forms of nondebt contingent capital) to reduce the total costs of funding infrastructure projects in emerging economies. Our objective is to elaborate on methods to reduce the necessity for unanticipated (emergency) project funding immediately after a natural disaster. We also place the existing explanations of sovereign-level contingent capital into a catastrophic risk management framework. In doing so, we address the following questions. (1) Why might catastrophe-linked securities be useful to a sovereign nation, over and above their usefulness for insurers and reinsurers? (2) Why are such financial instruments ideally suited for protecting infrastructure projects in emerging economies, under third-party sponsorship, from low-probability, high-consequence events that occur as a result of natural disasters? (3) How can the willingness to pay of a sovereign government in an emerging economy (or its external project sponsor), who values timely completion of infrastructure projects, for such instruments be calculated? To supplement our treatment of these questions, we use a multilayer spreadsheet-based model (in Microsoft Excel format) to calculate the overall cost reductions possible through the judicious use of catastrophe-based financial tools. We also report on numerical comparative statics on the value of contingent-capital financing to avoid project disruption based on varying costs of capital, probability and consequences of disasters, the feasibility of strategies for mid-stage project abandonment, and the timing of capital commitments to the infrastructure investment. We use these results to identify high-priority applications of catastrophe-linked securities so that maximal protection can be realized if the total number of catastrophe instruments is initially limited. The article concludes with potential extensions to our model and opportunities for future research.

  10. The Correlation of Sovereign Rating and Bonds’ Interest Rate in EU Member States

    Directory of Open Access Journals (Sweden)

    Emilian-Constantin MIRICESCU

    2015-06-01

    Full Text Available The importance of borrowing is fundamental for central public administration and it consists in sources of f nancing budget def cit and ref nanc-ing government debt. In the last years, a lot of countries had diff culties regarding the payment of public loans at their maturity due to the burden of government debt to GDP ratio. In this situa-tion, investors lose their conf dence not only in the country that is facing problems, but also in other states that pay their debt at maturity. For this reason, they are careful at any change that affects sovereign rating. From our investigation we found that sover-eign rating has a negative inf uence on bonds’ interest rate. As such, decision makers from central public administration should focus on improving sovereign ratings in order to decrease interest rates.

  11. Evaluating Strategies for Achieving Global Collective Action on Transnational Health Threats and Social Inequalities

    OpenAIRE

    Hoffman, Steven Justin

    2015-01-01

    This dissertation presents three studies that evaluate different strategies for addressing transnational health threats and social inequalities that depend upon or would benefit from global collective action. Each draws upon different academic disciplines, methods and epistemological traditions. Chapter 1 assesses the role of international law in addressing global health challenges, specifically examining when, how and why global health treaties may be helpful. Evidence from 90 quantitati...

  12. Problems of globalization

    Directory of Open Access Journals (Sweden)

    Telebaković Boško

    2011-01-01

    Full Text Available The world has been going through the process of economical, political and cultural integration for a long time. At the end of the 20th century, the integration received a new meaning. In the world’s policy, sovereign countries were in conflict or collaborated earlier. A stricter hierarchy of economical and political power hubs is being established now. In such processes of globalization, differences in development, wealth and power arise, people are less safe, the sovereignity of national states is being violated. The story of equality remains in the sense of disappearance of cultural differences in floods of non-cultural culture. It is difficult to talk about democracy when the world’s power is getting stronger and stronger. Is it possible to have a globalization which would not affect human rights, and which would not prevent people from taking care of truth, freedom and happiness?

  13. PECULIARITIES OF PERFORMANCE MEASUREMENT IN SOVEREIGN WEALTH FUNDS

    Directory of Open Access Journals (Sweden)

    M. Onopko

    2014-01-01

    Full Text Available Sovereign wealth funds as the subjects of economic relations are analyzed and the main approaches to the assessment of their activities are discussed. The dependence of the performance measurement system and the strategic objectives of the funds and economic policy objectives of the government is indicated.

  14. Does Central Bank Quality Determine Sovereign Ratings and Credit Default Swap Spreads: Evidence from the World?

    Directory of Open Access Journals (Sweden)

    Ramlall Indranarain

    2016-09-01

    Full Text Available This study innovates from prior research which focuses on the determinants of sovereign ratings and credit default swap spreads for a large sample of countries by incorporating the quality of central banks, let alone refined proxies. Findings show that the explanatory power of both sovereign ratings and CDS spreads model improve by a hefty 11 percent in case of sovereign ratings and 6 to 9 percent in the case of CDS spreads when central bank quality is incorporated. Such a finding bolters the notion that institutional quality does play a preponderant role when it comes to assessing country risk, making it a systematic component of institutional quality. The effect of labour participation implies that countries buffeted by stronger effects of an ageing population have greater propensity of increases in CDS spreads. Evidence is also found as to the driving dynamics of CDS spreads and sovereign ratings to be distinct. Our results hold robust post tackling for endogeneity problem.

  15. THE CONTAGION EFFECT AND THE RESPONSE OF THE EUROZONE TO THE SOVEREIGN DEBT PROBLEM

    Directory of Open Access Journals (Sweden)

    Claudiu Peptine

    2013-09-01

    Full Text Available This paper addresses a number of phenomena that characterize the euro area, one of them being the contagion effect. This is one of the mechanisms by which financial instability becomes so widespread that the crisis reached global dimensions. The following lines argue that contagion plays a crucial role in exacerbating the sovereign debt problems in the Eurozone. Consequently, the management of the crisis by the competent authorities should focus on policy measures that are able to mitigate the contagion. Therefore, many of the European Central Bank interventions (ECB in the European Union were motivated by the need for understanding and mitigating the contagion phenomenon.

  16. The Sovereign as Educator: Thomas Hobbes's National Curriculum.

    Science.gov (United States)

    Parry, Geraint

    1998-01-01

    Focuses on Thomas Hobbes, an English political philosopher who argued that the solution to civil disorders lay in a sovereign authority backed with force. Argues that education should be seen at the center of Hobbes's project of rescuing society from the disorders threatening civilization throughout 17th-century Europe. (CMK)

  17. Sovereign Risk and Natural Disasters in Emerging Markets

    NARCIS (Netherlands)

    Klomp, Jeroen

    2015-01-01

    In this article, we explore the effect of large-scale natural disasters on sovereign default risk. We use a heterogeneous dynamic panel model including a set of more than 380 large-scale natural disasters for about forty emerging market countries in the period 1999-2010. After testing for the

  18. At a global scale, do climate change threatened species also face a greater number of non-climatic threats?

    Science.gov (United States)

    Fortini, Lucas B.; Dye, Kaipo

    2017-01-01

    For many species the threats of climate change occur in a context of multiple existing threats. Given the current focus of global change ecology in identifying and understanding species vulnerable to climate change, we performed a global analysis to characterize the multi-threat context for species threatened by climate change. Utilizing 30,053 species from the International Union for Conservation of Nature’s (IUCN) Red List of Threatened Species, we sought to evaluate if species threatened by climate change are more likely threatened by a greater number of non-climatic threats than species not threatened by climate change. Our results show that species threatened by climate change are generally impacted by 21% more non-climatic threats than species not threatened by climate change. Across all species, this pattern is related to IUCN risk status, where endangered species threatened by climate change face 33% more non-climatic threats than endangered species not threatened by climate change. With the clear challenges of assessing current and projected impacts of climate change on species and ecosystems, research often requires reductionist approaches that result in downplaying this multi-threat context. This cautionary note bears relevance beyond climate change threatened species as we also

  19. At a global scale, do climate change threatened species also face a greater number of non-climatic threats?

    Directory of Open Access Journals (Sweden)

    Lucas B. Fortini

    2017-07-01

    Full Text Available For many species the threats of climate change occur in a context of multiple existing threats. Given the current focus of global change ecology in identifying and understanding species vulnerable to climate change, we performed a global analysis to characterize the multi-threat context for species threatened by climate change. Utilizing 30,053 species from the International Union for Conservation of Nature’s (IUCN Red List of Threatened Species, we sought to evaluate if species threatened by climate change are more likely threatened by a greater number of non-climatic threats than species not threatened by climate change. Our results show that species threatened by climate change are generally impacted by 21% more non-climatic threats than species not threatened by climate change. Across all species, this pattern is related to IUCN risk status, where endangered species threatened by climate change face 33% more non-climatic threats than endangered species not threatened by climate change. With the clear challenges of assessing current and projected impacts of climate change on species and ecosystems, research often requires reductionist approaches that result in downplaying this multi-threat context. This cautionary note bears relevance beyond climate change threatened species as we also found other (but not all anthropogenic threats are also similarly associated with more threats. Our findings serve as a reminder that ecological research should seriously consider these potential threat interactions, especially for species under elevated conservation concern.

  20. Sovereignty and Nuclear Weapons: The Need for Real Sovereign Authority Rooted in the People’s Global Expectations about Survival, Peace and Security

    Directory of Open Access Journals (Sweden)

    Winston P. Nagan

    2012-10-01

    Full Text Available The current international security framework is based on an incomplete, anachronistic conception of sovereignty shaped largely by historical circumstance rather than principles of universal justice. Evolution of the global community over the past half century necessitates a reformulation of the concept to justly represent the rights of individual citizens and the global community as a whole. The reconceptualization of sovereignty is an essential condition for the elimination of major threats to global security, most especially those arising from the continued existence and proliferation of nuclear weapons and other weapons of mass destruction.

  1. The impact of news ans the SMP on realized (co)variances in the Eurozone sovereign debt market

    NARCIS (Netherlands)

    Beetsma, R.; de Jong, F.; Giuliodori, M.; Widijanto, D.

    2014-01-01

    We use realized variances and covariances based on intraday data from Eurozone sovereign bond market to measure the dependence structure of eurozone sovereign yields. Our analysis focuses on the impact of news, obtained from the Eurointelligence newsash, on the dependence structure. More news raises

  2. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    Science.gov (United States)

    Dabova, E. L.

    2013-11-01

    In addition to facilitating peaceful trade and economic development, sovereign territory, territorial waters and international waters are being used by various criminal groups that pose threats to governments, businesses and civilian population in Southeast Asia. Nonstate criminal maritime activities were not receiving appropriate attention as they were overshadowed by traditional military security challenges. Yet more and more frequently, the non-traditional actors challenge lines of communication, jeopardize access to strategic resources, complicate traditional defence tasks, and harm the environment. Understanding the nature of non-traditional threats, and the ways to combat them, requires international legal, historical and political science analysis within a united problem-oriented approach. A fair critique to pure interest, power and knowledge -based theories of regime formation was developed by E.K. Leonard's1, who explained the evolution of the international system from the global governance perspective. The present study is based on the premise that pure nation-state approaches are incapable of providing a theoretical ground for addressing the growing influence of international criminal networks in South East Asia. From an international relations theory perspective, the author of this study agrees with D.Snidal2 that the hegemonic stability theory has "limits" and is insufficient in describing modern challenges to sustainable international security regime, including non-traditional threats, where collective action is more efficient from an interest and capability standpoint. At the same time the author of this study does not share the viewpoint on "marginalization"3 of international law in current international order due to its fragmentation and regionalization4 and "global power shifts"5 . The United Nations, as a global institution at the top of the vertical hierarchy of international legal order, and the EU as an example of "self-contained" regime along

  3. Sovereign default and the stability of inflation targeting regimes

    NARCIS (Netherlands)

    Schabert, A.; van Wijnbergen, S.J.G.

    2011-01-01

    We analyse the impact of interactions between monetary and fiscal policy on macroeconomic stability. We find that in the presence of sovereign default beliefs a monetary policy, which aims to stabilize inflation through an active interest rate policy, will destabilize the economy if the feedback

  4. Co-investments of sovereign wealth funds in private equity

    NARCIS (Netherlands)

    Mc Cahery, Joseph; de Roode, Alexander

    2016-01-01

    Direct investments are the preferred vehicle for large institutional investors to have control over their portfolio investments. We study the deal structure of direct investments by sovereign wealth funds (SWFs) in private equity transactions. We find that SWFs shift from investing in private equity

  5. Competence to stand trial evaluations of sovereign citizens: a case series and primer of odd political and legal beliefs.

    Science.gov (United States)

    Parker, George F

    2014-01-01

    Sovereign citizens hold a variety of beliefs that challenge the legitimacy of the United States government and criminal justice system. In criminal cases, sovereign citizens typically raise a variety of seemingly strange objections to the proceedings that can cause court participants to believe the defendant is not competent to stand trial. The author's case files were reviewed to identify all defendants who espoused sovereign citizen beliefs during a court-ordered competence-to-stand-trial evaluation. This case series consisted of nine evaluations completed between 2003 and 2012. A review of the outcomes in these cases showed that sovereign citizens typically have the capacity to understand criminal proceedings and assist an attorney. © 2014 American Academy of Psychiatry and the Law.

  6. Simulated ICJ Judgment : Revisiting the Lawfulness of the Threat or Use of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Winston P. Nagan

    2012-04-01

    Full Text Available The author prepared this simulated judgment at the request of Cadmus editors to demonstrate that there is ample ground for revisiting and revising the landmark 1996 advisory opinion of the ICJ on the legality of nuclear weapons. The ICJ failed to anticipate the proliferation of nuclear weapons, which expands the evolution of the concept of sovereignty, the potential cataclysmic impact of nuclear war on climate change, the multiplication of nuclear-weapon-free zones as evidence of a widespread rejection, mounting evidence regarding the physical and psychological harm, and unwillingness of the nuclear weapons states to fulfill their obligations under the NPT. This article challenges the notion that a few sovereign states should be the sole arbiters of international law and affirms the legitimate claim of the global community of protection from the existential threat posed by nuclear weapons. The use or threat of use undermines foundational values of the international legal system and the specific rules of self-defense and humanitarian law. The contribution seeks to give an accentuated role for the explicit use of the fundamental values of international legal order, in crafting an innovative methodology for the formulation of the judgment. The very existence of these weapons undermines the rights of all of humanity. The ICJ should be moved to categorically declare the use and possession of nuclear weapons a crime against humanity.

  7. Dynamic Correlations of Sovereign Bond Yield Spreads in the Euro zone and the Role of Credit Rating Agencies' Downgrades

    OpenAIRE

    Antonakakis, Nikolaos

    2012-01-01

    The European debt crisis that followed the global financial crisis, erupting first with Greece, then Ireland, Portugal, Italy and Spain, has threatened the very existence of the Euro zone. In this paper we examine the evolution of dynamic co-movements of sovereign bond yield spreads (BYS) in the Euro zone and the role of credit rating agency downgrades on those co-movements. Estimation results from a multivariate DCC-GARCH model on daily BYS data for nine Euro zone countries over the period 2...

  8. Skin bleaching: A neglected form of injury and threat to global skin ...

    African Journals Online (AJOL)

    Skin bleaching: A neglected form of injury and threat to global skin. JC Street, K Gaska, KM Lewis, ML Wilson. Abstract. Skin bleaching is the use of creams, gels, or soaps to lighten the skin and is known to cause a number of injuries, many of which are potentially life-threatening. Despite the growing body of research ...

  9. Long term government debt, financial fragility, and sovereign default risk

    NARCIS (Netherlands)

    van der Kwaak, C.; van Wijnbergen, S.

    2013-01-01

    We analyze the interaction between bank rescues, financial fragility and sovereign debt discounts. To that end we set up a model that contains balance sheet constrained financial intermediaries financing both capital expenditure of intermediate goods producers and government deficits. The financial

  10. A multi-layered network of the (Colombian) sovereign securities market

    NARCIS (Netherlands)

    Renneboog, Luc; Leon Rincon, Carlos; Pérez, Jhonatan; Alexandrova-Kabadjova, Bilana; Diehl, Martin; Heuver, Richard; Martinez-Jaramillo, Serafín

    2015-01-01

    We study the network of Colombian sovereign securities settlements. With data from the settlement market infrastructure we study financial institutions’ transactions from three different trading and registering individual networks that we combine into a multi-layer network. Examining this network of

  11. Determinants of sovereign wealth fund investment in private equity

    NARCIS (Netherlands)

    Johan, S.A.; Knill, A.M.; Mauck, N.

    2010-01-01

    This paper examines investment patterns of 50 sovereign wealth funds (SWFs) in nations around the world. We study investment by SWFs in 903 public and private firms over the period 1984-2009. As expected, we observe SWFs investments are more often in private firms when the market returns of target

  12. Determinants of sovereign debt yield spreads under EMU: Pairwise approach

    NARCIS (Netherlands)

    Fazlioglu, S.

    2013-01-01

    This study aims at providing an empirical analysis of long-term determinants of sovereign debt yield spreads under European EMU (Economic and Monetary Union) through pairwise approach within panel framework. Panel gravity models are increasingly used in the cross-market correlation literature while

  13. Global financial reform since 2008: Achievements and shortcomings

    Directory of Open Access Journals (Sweden)

    Šoškić Dejan

    2015-01-01

    Full Text Available The global financial crisis that started in the U.S. had an immediate spillover to the rest of the world financial markets. Next, a decrease in real economic output throughout the developed world occurred simultaneously with high bailout costs for the salvaging of banks and other financial institutions. This vicious combination was at the core of the bank-sovereign interdependence and the sovereign debt crisis of the eurozone. As early as 2008, the G20 announced a thorough global reform agenda with an aim to tackle the root causes of the crises and to transform the system of global financial regulation. Some important reform steps have been made; still, more than six years on, the job is not finished. Where are we in terms of global financial reform, and are we close to creating a more secure global financial system significantly less prone to crisis and bailouts with taxpayers’ money? [Projekat Ministarstva nauke Republike Srbije, br. 179005: Risks of Financial Institutions and Markets in Serbia - A Microeconomic and Macroeconomic Approach

  14. Revisiting sovereign bond spreads’ determinants in the EMU

    OpenAIRE

    Afonso, António; Reis, Manuel

    2016-01-01

    We study the determinants of 10-year sovereign bond yield spreads of 11 EMU member states, covering the lifetime of the euro, up until the end of 2014. Panel and SUR analyses coupled with qualitative variables show that the pricing of European debt has not been static across time and EMU countries, and market participants became increasingly aware of macro- economic and fiscal fundamentals.

  15. 22 CFR 213.3 - Loans, guarantees, sovereign and interagency claims.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Loans, guarantees, sovereign and interagency claims. 213.3 Section 213.3 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT CLAIMS COLLECTION... thereof, or any public international organization; (d) Claims where the CFO determines that the...

  16. The Elephant in The Ground: Managing Oil and Sovereign Wealth

    NARCIS (Netherlands)

    van den Bremer, T.; van der Ploeg, F.; Wills, S.

    2016-01-01

    One of the most important developments in international finance and resource economics in the past twenty years is the rapid and widespread emergence of the $6 trillion sovereign wealth fund industry. Oil exporters typically ignore below-ground assets when allocating these funds, and ignore

  17. THE EUROPEAN UNION EXPOSED TO THE RISK OF THE SOVEREIGN DEBT CRISIS. CASE STUDY: SPAIN AND PORTUGAL

    Directory of Open Access Journals (Sweden)

    Ioana-Iulica, MIHAI

    2013-12-01

    Full Text Available The global economic crisis, intensely debated, started almost six years ago, subjected the EU to new resistance tests because of the macroeconomic imbalances in the Euro Zone, generated by the increase of sovereign debts, especially in the PIIGS countries (Portugal, Ireland, Italy, Greece, Spain. The situation has degenerated because of the lack of legal leverages through which the member countries should be forced to correct the fiscal imbalances and to meet the macroeconomic convergence criteria imposed. The Treaty on Fiscal Governance in the EU, signed on 2 March 2012, appears to be the key to the macroeconomic recovery in the Euro Zone, due to the more severe budgetary discipline it imposes. This paper, by means of deductive analysis and causal explanations, outlines the current economic situation of the Euro Zone, under the impact of the member countries’ sovereign debt crisis, focusing on Spain and Portugal. In addition to reliable statistics, the paper also presents the EU’s economic recovery strategy that anticipates its future. Unfortunately, the perspective of the Euro Zone is still in a fairly high degree of uncertainty, strongly influenced by the economic development of the member countries and by solving the problems they face. Spain and Portugal are the actual example.

  18. The Mirage of Global Democracy

    NARCIS (Netherlands)

    de Wilde, J.H.

    The literature about global democracy deals with two different types of democratization: Type 1 is about spreading democracy across sovereign states as the basis for good governance. It focuses on the quality of the state/society-nexus: the balance between coercion, reward and identity. Type 2 is

  19. Socio-Economic Correlates of Information Security Threats and Controls in Global Financial Services Industry: An Analysis

    OpenAIRE

    Princely Ifinedo

    2015-01-01

    Threats to data and information assets of Global Financial Services Industry (GFSI) are ever-present; such problems, if not well understood, could lead to huge negative impact. To some extent, the environment where a business operates does matter for its success. This study presents information about the relationships between selected socio-economic factors and information security threats and controls in the financial services industry. Essentially, it seeks to enrich the information provide...

  20. Europeanization and social movement mobilization during the European sovereign debt crisis

    DEFF Research Database (Denmark)

    Bourne, Angela; Chatzopoulou, Sevasti

    2015-01-01

    The article addresses Europeanization of social movements in the context of the European Sovereign Debt Crisis. Europeanization occurs when movements collaborate, or make horizontal communicative linkages with movements in other countries, contest authorities beyond the state, frame issues...

  1. Government spending shocks, sovereign risk and the exchange rate regime

    NARCIS (Netherlands)

    Bonam, D.; Lukkezen, J.H.J.

    2014-01-01

    Keynesian theory predicts output responses upon a fiscal expansion in a small open economy to be larger under fixed than floating exchange rates. We analyse the effects of fiscal expansions using a New Keynesian model and find that the reverse holds in the presence of sovereign default risk. By

  2. Greek Sovereign Debt Crisis: Causes, Fiscal Adjustment Programs and Lessons for Croatia

    Directory of Open Access Journals (Sweden)

    Mislav Brkić

    2016-06-01

    Full Text Available This paper investigates the factors that have led to the Greek sovereign debt crisis in order to derive policy lessons for Croatia and other highly indebted countries. In the first years after euro adoption, it seemed that membership in the monetary union facilitated a catching-up process for Greece, given that it enjoyed high growth rates and a rapid convergence of per capita income. However, the global crisis has revealed that the previous economic expansion was an unsustainable process based on excessive inflow of debt-creating foreign capital. In this paper, it is argued that the government sector contributed the most to the rising vulnerability of the Greek economy. Data are presented showing that extensive government borrowing was the main factor behind the rapid accumulation of Greece's external debt, which made it highly vulnerable to external shocks. Besides the procyclical fiscal policy, some other factors also contributed to the overheating of economic activity in Greece. Hence, this paper reviews the literature that deals with the compression of peripheral countries' sovereign bond yields after the creation of the monetary union, the doubtful suitability of the ECB's expansionary policy stance from the perspective of then booming peripheral states, and the institutional shortcomings of the EMU. The main motivation of this paper is to identify the key roots of the Greek debt crisis in order to derive lessons for policy-makers in Croatia. Since the beginning of the recession in 2008, Croatia has seen a significant deterioration in fiscal fundamentals, with high public debt becoming the main source of macroeconomic vulnerability. Reducing the debt-to-GDP ratio has emerged as a key policy challenge that needs to be addressed in order to reduce the likelihood of a debt crisis.

  3. Sovereign risk and macroeconomic fluctuations in an emerging market economy

    NARCIS (Netherlands)

    Kirchner, M.; Rieth, M.

    2010-01-01

    This paper assesses the role of sovereign risk in explaining macroeconomic fluctuations in Turkey. We estimate two versions of a simple New Keynesian small open economy model on quarterly data for the period 1994Q3-2008Q2: a basic version and a version augmented by a default premium on government

  4. Limits to Arbitrage in Sovereign Bonds

    DEFF Research Database (Denmark)

    Pelizzon, Loriana; Subrahmanyam, Marti G.; Tomio, Davide

    the recent Euro-zone sovereign bond crisis and, surprisingly, find that: (i) even though the futures market leads the cash market in price discovery, the cash market leads the futures market in liquidity discovery, i.e., the willingness of market makers to trade (measured by market depth and bid-ask spread......), and (ii) the liquidity in the cash market, and not in the futures market, has a significant impact on the basis between the price of the futures contract and that of the cash bond that is cheapest to deliver. However, the interventions of the European Central Bank (ECB), during the Euro-zone crisis, had...

  5. Sovereign Default Analysis through Extreme Events Identification

    Directory of Open Access Journals (Sweden)

    Vasile George MARICA

    2015-06-01

    Full Text Available This paper investigates contagion in international credit markets through the use of a novel jump detection technique proposed by Chan and Maheuin (2002. This econometrical methodology is preferred because it is non-linear by definition and not a subject to volatility bias. Also, the identified jumps in CDS premiums are considered as outliers positioned beyond any stochastic movement that can and is already modelled through well-known linear analysis. Though contagion is hard to define, we show that extreme discrete movements in default probabilities inferred from CDS premiums can lead to sound economic conclusions about the risk profile of sovereign nations in international bond markets. We find evidence of investor sentiment clustering for countries with unstable political regimes or that are engaged in armed conflict. Countries that have in their recent history faced currency or financial crises are less vulnerable to external unexpected shocks. First we present a brief history of sovereign defaults with an emphasis on their increased frequency and geographical reach, as financial markets become more and more integrated. We then pass to a literature review of the most important definitions for contagion, and discuss what quantitative methods are available to detect the presence of contagion. The paper continues with the details for the methodology of jump detection through non-linear modelling and its use in the field of contagion identification. In the last sections we present the estimation results for simultaneous jumps between emerging markets CDS and draw conclusions on the difference of behavior in times of extreme movement versus tranquil periods.

  6. Sovereign wealth funds as a new instrument of climate protection policy? A case study of Norway as a pioneer of ethical guidelines for investment policy

    Energy Technology Data Exchange (ETDEWEB)

    Reiche, Danyel [American University of Beirut (AUB), Faculty of Arts and Sciences, Department of Political Studies and Public Administration (PSPA), Jesup Hall, Room 205, P.O.Box 11-0236, Riad El Solh, Beirut 1107 2020 (Lebanon); Wuppertal Institute (Germany)

    2010-09-15

    In 1990 a sovereign wealth fund was founded in Norway in which the country invests surpluses from oil and gas industry sales. The fund is designed to secure the state's ability to act in a post-petroleum era. At the end of the 1990's the voice of Norwegian civil society insisted that the sovereign wealth fund should not only ensure intergenerational justice, but should also contribute to the implementation of values and norms of the present country. At the end of 2004 the parliament finally agreed upon ethical regulations for the investment of the sovereign wealth fund. Now the second largest sovereign wealth fund in the world only invests in businesses that adhere to those ethical regulations. In the present paper, I seek to illustrate the emergence and outcomes of this new development in the Norwegian sovereign wealth fund. (author)

  7. The global threat reduction initiative's radiological security cooperation with Russia - 59361

    International Nuclear Information System (INIS)

    Blanchard, Tiffany A.; Abramson, William J.; Russell, James W. Jr.; Roberts, Catherine K.

    2012-01-01

    The United States (U.S.) Department of Energy (DOE) / National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) supports both U.S. and international threat reduction goals by securing vulnerable nuclear and radiological material located at civilian sites throughout the world. GTRI's approach to reducing the threat posed by vulnerable, high-activity radioactive sources includes removing and disposing of orphan or disused radioactive sources; implementing physical security upgrades at civilian sites containing radioactive sources; and establishing a cooperative sustainability program at sites to ensure that upgrades are maintained. For many years GTRI has collaborated successfully with the Russian Federation and international partners to improve radiological security in Russia. This paper provides a synopsis of GTRI's accomplishments and cooperation with Russia in the following areas: 1.) recovering and disposing of orphan and disused radioactive sources, 2.) recovering and disposing of radioisotope thermoelectric generators (RTGs), and 3.) providing physical security upgrades at civilian sites that contain vulnerable radiological material. The success of GTRI's program to secure radiological material in the Russian Federation over the past decade is due largely to the hard work, technical expertise, and tenacity of the U.S. laboratory teams and the Russian partner organizations with whom GTRI has worked. GTRI plans to continue building on this history of cooperation in order to recover and secure additional, vulnerable radioactive sources in locations throughout Russia. GTRI also is committed to sustainability efforts so that facilities in Russia receiving physical protection equipment and training are prepared to eventually assume responsibility for those security upgrades. In the years to come, GTRI will combine financial support with capacity building to enhance Russia's domestic programs to address these challenges. Through

  8. Antimicrobial resistance: A global emerging threat to public health systems.

    Science.gov (United States)

    Ferri, Maurizio; Ranucci, Elena; Romagnoli, Paola; Giaccone, Valerio

    2017-09-02

    Antimicrobial resistance (AMR) became in the last two decades a global threat to public health systems in the world. Since the antibiotic era, with the discovery of the first antibiotics that provided consistent health benefits to human medicine, the misuse and abuse of antimicrobials in veterinary and human medicine have accelerated the growing worldwide phenomenon of AMR. This article presents an extensive overview of the epidemiology of AMR, with a focus on the link between food producing-animals and humans and on the legal framework and policies currently implemented at the EU level and globally. The ways of responding to the AMR challenges foresee an array of measures that include: designing more effective preventive measures at farm level to reduce the use of antimicrobials; development of novel antimicrobials; strengthening of AMR surveillance system in animal and human populations; better knowledge of the ecology of resistant bacteria and resistant genes; increased awareness of stakeholders on the prudent use of antibiotics in animal productions and clinical arena; and the public health and environmental consequences of AMR. Based on the global nature of AMR and considering that bacterial resistance does not recognize barriers and can spread to people and the environment, the article ends with specific recommendations structured around a holistic approach and targeted to different stakeholders.

  9. Measuring the default risk of sovereign debt from the perspective of network

    Science.gov (United States)

    Chuang, Hongwei; Ho, Hwai-Chung

    2013-05-01

    Recently, there has been a growing interest in network research, especially in the fields of biology, computer science, and sociology. It is natural to address complex financial issues such as the European sovereign debt crisis from the perspective of network. In this article, we construct a network model according to the debt-credit relations instead of using the conventional methodology to measure the default risk. Based on the model, a risk index is examined using the quarterly report of consolidated foreign claims from the Bank for International Settlements (BIS) and debt/GDP ratios among these reporting countries. The empirical results show that this index can help the regulators and practitioners not only to determine the status of interconnectivity but also to point out the degree of the sovereign debt default risk. Our approach sheds new light on the investigation of quantifying the systemic risk.

  10. The Secret, the Sovereign, and the Lie: Reading Derrida’s Last Seminar

    Directory of Open Access Journals (Sweden)

    Charles Barbour

    2013-02-01

    Full Text Available This paper takes up the question of secrecy and sovereignty in Derrida’s final seminar on The Beast and the Sovereign. Focusing primarily on Derrida’s readings of Lacan and Celan in Volume I, it argues that, for Derrida, we should distinguish between the lie (or what Lacan calls ‘trickery’ or ‘feigning feint’, and the secret (or what Celan calls ‘the secret of an encounter’, and understand the sense in which the former implies an intentional and sovereign human subject, while the latter represents a limit to such a thing, and, arguably, to the concept of sovereignty as such. This explains, or helps explain, why, in his discussions of sovereignty, Derrida spends so much time examining the animal, on the one hand, and poetry, on the other. For, on his account, these both configure secrecy, and specifically what I refer to as the absolute secret.

  11. Essays on globalization, monetary policy and financial crisis'

    NARCIS (Netherlands)

    Qian, Z.

    2012-01-01

    This thesis focuses on three interlinked topics. Chapter 2 studies the determinants of sovereign CDS spreads in Greece, Ireland, Italy, Portugal and Spain during the recent global financial crisis and European debt crisis. Chapter 3 introduces a model on the interactions between monetary policy

  12. Procyclicality and path dependence of sovereign credit ratings: The example of Europe

    NARCIS (Netherlands)

    Freitag, L.

    2014-01-01

    This paper investigates empirically the behavior of Credit Rating Agencies (CRAs) when assessing sovereign solvency for European countries. Using Probit regressions I find that even after controlling for macroeconomic factors, CRAs take the business cycle into account. Also, there is a clear case of

  13. Sovereign Wealth Funds – the New Challenge for Corporate Governance

    Directory of Open Access Journals (Sweden)

    Dariusz Urban

    2010-10-01

    Full Text Available The article discusses Sovereign Wealth Funds with reference do the process of corporate governance. In the first part the paper presents the rise, growth and current investment activity of those funds. In the second section the author consider reasons for implementation of corporate governance best practices. The last part of the paper compares Santiago Principles with OECD principles of corporate governance.

  14. Financial fragility, sovereign default risk and the limits to commercial bank bail-outs

    NARCIS (Netherlands)

    van Wijnbergen, S.; van der Kwaak, C.

    2013-01-01

    We analyse the poisonous interaction between bank rescues, financial fragility and sovereign debt discounts. In our model balance sheet constrained financial intermediaries finance both capital expenditure of intermediate goods producers and government deficits. The financial intermediaries face the

  15. Financial Sector Linkages and the Dynamics of Bank and Sovereign Credit Spreads

    DEFF Research Database (Denmark)

    Kallestrup, René; Lando, David; Murgoci, Agatha

    We show that banks' foreign asset holdings are significant determinants of bank and sovereign CDS premia. Our analysis uses detailed data on the composition and risk of banks' foreign exposures. For the largest banks, a one standard deviation change in our foreign- exposure risk measure leads...

  16. The role of sovereign credit ratings in fiscal discipline

    OpenAIRE

    Duygun, Meryem; Ozturk, Huseyin; Shaban, Mohamed

    2016-01-01

    This paper investigates several aspects of the relationship between sovereign credit ratings and fiscal discipline. The analysis of over one thousand country–year observations for 93 countries during the 1999–2010 period reveals that a country’s debt level is likely to increase with higher ratings, confirming the existence of pro–cyclicality and path dependence of ratings. In addition, the study finds no evidence to support the theory of Political Business Cycle, which implies that political ...

  17. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  18. Financial Sector Linkages and the Dynamics of Bank and Sovereign Credit Spreads

    DEFF Research Database (Denmark)

    Kallestrup, Rene; Lando, David; Murgoci, Agatha

    2016-01-01

    We show that CDS premiums of sovereigns are significantly affected by the foreign exposures of their domestic banks. Our analysis uses a simple risk-weighted exposure measure which aggregates detailed data on the composition and risk of banks’ foreign exposures. A 1 basis point change in our risk...

  19. Sovereign Wealth Funds and Socially Responsible Investing: Do’s and Don’ts

    NARCIS (Netherlands)

    Zee, van der E.L.

    2012-01-01

    A sovereign wealth fund (SWF) is a long-term investment fund owned by the state. The oldest is the Kuwait Investment Corporation, which was established in 1953. However, because most SWFs were established in 2004 or later, SWFs are, generally speaking, a fairly new phenomenon. Depending on the

  20. Diplomatic advantages and threats in global health program selection, design, delivery and implementation: development and application of the Kevany Riposte.

    Science.gov (United States)

    Kevany, Sebastian

    2015-05-27

    Global health programs, as supported by organizations such as the Global Fund to Fight AIDS, Tuberculosis and Malaria and the President's Emergency Plan for AIDS Relief (PEPFAR), stand to make significant contributions to international medical outcomes. Traditional systems of monitoring and evaluation, however, fail to capture downstream, indirect, or collateral advantages (and threats) of intervention selection, design, and implementation from broader donor perspectives, including those of the diplomatic and foreign policy communities, which these programs also generate. This paper describes the development a new métier under which assessment systems designed to consider the diplomatic value of global health initiatives are described and applied based on previously-identified "Top Ten" criteria. The "Kevany Riposte" and the "K-Score" were conceptualized based on a retrospective and collective assessment of the author's participation in the design, implementation and delivery of a range of global health interventions related to the HIV/AIDS epidemic. Responses and associated scores reframe intervention worth or value in terms of global health diplomacy criteria such as "adaptability", "interdependence", "training," and "neutrality". Response options ranged from "highly advantageous" to "significant potential threat". Global health initiatives under review were found to generate significant advantages from the diplomatic perspective. These included (1) intervention visibility and associations with donor altruism and prestige, (2) development of international non-health collaborations and partnerships, (3) adaptability and responsiveness of service delivery to local needs, and (4) advancement of broader strategic goals of the international community. Corresponding threats included (1) an absence of formal training of project staff on broader political and international relations roles and responsibilities, (2) challenges to recipient cultural and religious practices

  1. The Greek sovereign debt: Are there really any options?

    OpenAIRE

    Papanikos, Gregory T.

    2014-01-01

    Debt Overhang is a controversial issue in the eurozone countries and is considered as one of the factors which created the current economic crisis. How to deal with sovereign debt has been debated both at the theoretical and policy making level. This paper looks at the Greek debt and four options are discussed: (a) unilateral default (b) unilaterally imposed austerity measures (c) restructuring through negotiating and (d) a tax on wealth to pay for the debt. Optimal options depend on the borr...

  2. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  3. Does the European financial stability bail out sovereigns or banks : An event study

    NARCIS (Netherlands)

    Horváth, Bálint; Huizinga, Harry

    2015-01-01

    On May 9, 2010 euro zone countries announced the creation of the European Financial Stability Facility. This paper investigates the impact of this announcement on bank share prices, bank credit default swap (CDS) spreads, and sovereign CDS spreads. The main private beneficiaries were bank creditors.

  4. Global threats from invasive alien species in the twenty-first century and national response capacities

    Science.gov (United States)

    Early, Regan; Bradley, Bethany A.; Dukes, Jeffrey S.; Lawler, Joshua J.; Olden, Julian D.; Blumenthal, Dana M.; Gonzalez, Patrick; Grosholz, Edwin D.; Ibañez, Ines; Miller, Luke P.; Sorte, Cascade J. B.; Tatem, Andrew J.

    2016-01-01

    Invasive alien species (IAS) threaten human livelihoods and biodiversity globally. Increasing globalization facilitates IAS arrival, and environmental changes, including climate change, facilitate IAS establishment. Here we provide the first global, spatial analysis of the terrestrial threat from IAS in light of twenty-first century globalization and environmental change, and evaluate national capacities to prevent and manage species invasions. We find that one-sixth of the global land surface is highly vulnerable to invasion, including substantial areas in developing economies and biodiversity hotspots. The dominant invasion vectors differ between high-income countries (imports, particularly of plants and pets) and low-income countries (air travel). Uniting data on the causes of introduction and establishment can improve early-warning and eradication schemes. Most countries have limited capacity to act against invasions. In particular, we reveal a clear need for proactive invasion strategies in areas with high poverty levels, high biodiversity and low historical levels of invasion. PMID:27549569

  5. Global Mechanisms for Sustaining and Enhancing PES Schemes

    OpenAIRE

    Farley, Josh; Aquino, Andre; Daniels, Amy; Moulaert, Azur; Lee, Dan; Krause, Abby

    2010-01-01

    An international payment for ecosystem service (IPES) schemes may be one of the only mechanisms available to stimulate the provision of vital non-marketed ecosystem services at the global level, as those nations that benefit from global ecosystem services (GES) cannot readily force other sovereign nations to provide them. Currently, international trade offers trillions of dollars in incentives for countries to convert natural capital into marketable goods and services, and few payments to ent...

  6. Sovereign Credit Risk and Stock Markets–Does the Markets’ Dependency Increase with Financial Distress?

    Directory of Open Access Journals (Sweden)

    Paulo Pereira da Silva

    2014-03-01

    Full Text Available This paper addresses the relationship between stock markets and credit default swaps (CDS markets. In particular, I aim to gauge if the co-movement between stock prices and sovereign CDS spreads increases with the deterioration of the credit quality of sovereign debt. The analysis of correlations, Granger causality, cointegration, and the results of an error-correction model represented in a state space form show a close link between these markets, but do not evidence that the co-movement increases in periods of financial distress. I also analyze the transmission of volatility between the two markets. The results do not support the hypothesis that volatility propagation surges during financial distress periods. On the contrary, for some cases, the data suggests that the lead-lag relationships between the two markets volatility are stronger during stable periods.

  7. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  8. A Stay-Rich View of the New Global Economy

    Science.gov (United States)

    Trusteeship, 2011

    2011-01-01

    Major demographic changes around the world. Disproportionate sovereign debt. A shift from North America, Western Europe, and Japan to emerging economies as centers of growth. Unprecedented levels of market risk and volatility. The structure of the global economy is undergoing significant changes. Michael Oyster, managing principal of Fund…

  9. Unemployment and sovereign debt crisis in the Eurozone: A k-means- r analysis

    Science.gov (United States)

    Dias, João

    2017-09-01

    Some southern countries in Europe, together with Ireland, were particularly affected by the sovereign debt crises in the Eurozone and were obliged to implement tough corrective measures which proved to be very recessive in nature. As a result, not only GDP declined but unemployment jumped to very high levels as well. This paper uses a modified version of k-means (restricted k-means) to analyze the clustering of the Eurozone countries during the recent sovereign debt crisis, combining monthly data on unemployment and government bond yield rates. Our method shows that the separation of southern Europe from the other Eurozone is not necessarily a good characterization of this area before the crisis but the group of externally assisted countries plus Italy gains consistence as the crisis evolved, although there is no perfect homogeneity in this group, since the problems they faced, the type of response requested, the speed of reaction to the crisis and the lasting effects were not the same for all these countries.

  10. Sovereign Credit Risk, Liquidity, and European Central Bank Intervention

    DEFF Research Database (Denmark)

    Pelizzon, Loriana; Subrahmanyam, Marti G.; Tomio, Davide

    2016-01-01

    We examine the dynamic relation between credit risk and liquidity in the Italian sovereign bond market during the eurozone crisis and the subsequent European Central Bank (ECB) interventions. Credit risk drives the liquidity of the market. A 10% change in the credit default swap (CDS) spread leads...... to a 13% change in the bid-ask spread, the relation being stronger when the CDS spread exceeds 500 basis points. The Long-Term Refinancing Operations of the ECB weakened the sensitivity of market makers’ liquidity provision to credit risk, highlighting the importance of funding liquidity measures...

  11. Sovereign wealth fund investments and the need to undertake socially responsible investment

    OpenAIRE

    Yin, Wei

    2017-01-01

    There is an increasing consensus that, beyond financial returns, investors should also consider the environmental and social impacts of their business activities. Major institutional investors currently are entering the realm of socially responsible investment (SRI), which incorporates environmental, social, and governance (ESG) factors into decision-making based on internationally recognized standards and principles. As influential institutional investors, sovereign wealth funds ...

  12. Migrants and emerging public health issues in a globalized world: threats, risks and challenges, an evidence-based framework.

    Science.gov (United States)

    Gushulak, Bd; Weekers, J; Macpherson, Dw

    2009-01-01

    International population mobility is an underlying factor in the emergence of public health threats and risks that must be managed globally. These risks are often related, but not limited, to transmissible pathogens. Mobile populations can link zones of disease emergence to lowprevalence or nonendemic areas through rapid or high-volume international movements, or both. Against this background of human movement, other global processes such as economics, trade, transportation, environment and climate change, as well as civil security influence the health impacts of disease emergence. Concurrently, global information systems, together with regulatory frameworks for disease surveillance and reporting, affect organizational and public awareness of events of potential public health significance. International regulations directed at disease mitigation and control have not kept pace with the growing challenges associated with the volume, speed, diversity, and disparity of modern patterns of human movement. The thesis that human population mobility is itself a major determinant of global public health is supported in this article by review of the published literature from the perspective of determinants of health (such as genetics/biology, behavior, environment, and socioeconomics), population-based disease prevalence differences, existing national and international health policies and regulations, as well as inter-regional shifts in population demographics and health outcomes. This paper highlights some of the emerging threats and risks to public health, identifies gaps in existing frameworks to manage health issues associated with migration, and suggests changes in approach to population mobility, globalization, and public health. The proposed integrated approach includes a broad spectrum of stakeholders ranging from individual health-care providers to policy makers and international organizations that are primarily involved in global health management, or are influenced

  13. Suverénní fondy - hrozba nebo přínos?

    OpenAIRE

    Šplíchal, David

    2017-01-01

    This bachelor thesis focuses on sovereign wealth funds, which belong to important state investment entities. The main objective of the thesis is to assess the activity of sovereign wealth funds as a whole and assess, whether their activity is rather benefit or threat to economy. In the first part there is considered a genereal characteristic of sovereign wealth funds, particularly their definition, history and function. The second part aims at the assets of sovereign wealth funds, especially ...

  14. INFORMATION THREATS IN A GLOBALIZED WORLD: ECONOMICS, POLITICS, SOCIETY (EXPERIENCE OF UKRAINE

    Directory of Open Access Journals (Sweden)

    Anatoliy Holovka

    2016-11-01

    Full Text Available The scientific article deals with both integral vision of the contemporary informative risks in the globalized world and their classification. The essence of the informative security is exposed, which is one of main factors of steady development of the modern informative society. In consideration of the foreign practice, the experience of Ukraine is also analyzed in counteraction to the contemporary informative threats. The effective policy of safety and counteraction to the informative threats is one of the basic constituents of the state national safety system and at the same time testifies to the correct character of connections between the public organs and the society. Under the conditions of unrestrained progress of information technologies and general informatization in all sectors of people’s life (politics, economy, defense, energy etc., providing of control and defense of informative space of the country becomes much more difficult task. Modern Ukrainian realities certify convincingly, that Ukraine is in an extremely difficult political situation that influences all spheres of Ukrainians’ life. The key reason of such situation is a military-informative aggression against Ukraine from Russia, which is the fact of waging a «hybrid war». As it is known, this type of war combines the application of both classic soldiery instruments (military technique, firearms, regular troops and methods of informative influence (cyber-attack, informative diversions, aggressive propaganda, impact on public opinion. This factor encourages such research. The object of the study is the phenomenon of information risks in the modern world. Subject of research – is the impact of modern information threats to the state and society, namely the economic, political and social spheres. For a holistic analysis of the subject of research was used appropriate methodology – systematic approach, method of comparative analysis, general scientific methods

  15. Dealing with risk: Underwriting sovereign bond issues in London 1870-1914

    OpenAIRE

    Mikkelsen, Anders L.

    2014-01-01

    Using the records of several leading 19th century issuing houses, this paper analyses the transformation of underwriting practices in London's primary sovereign bond market from 1870 to 1914. It shows how underwriting risk developed from being a liability, which market intermediaries sought to avoid, to becoming a valuable financial commodity. The impetus for this development was increased competition in the loan business from the 1880s onwards, which weakened the negotiating position of issu...

  16. How has sovereign bond market liquidity changed? : an illiquidity spillover analysis

    OpenAIRE

    Schneider, Michael; Lillo, Fabrizio; Pelizzon, Loriana

    2016-01-01

    Amid increasing regulation, structural changes of the market and Quantitative Easing as well as extremely low yields, concerns about the market liquidity of the Eurozone sovereign debt markets have been raised. We aim to quantify illiquidity risks, especially such related to liquidity dry-ups, and illiquidity spillover across maturities by examining the reaction to illiquidity shocks at high frequencies in two ways: a) the regular response to shocks using a variance decomposition and, b) the ...

  17. A comparison of threats, vulnerabilities and management approaches in global seagrass bioregions

    International Nuclear Information System (INIS)

    Grech, Alana; Chartrand-Miller, Katie; McKenzie, Len; Rasheed, Michael; Taylor, Helen; Coles, Rob; Erftemeijer, Paul; Fonseca, Mark

    2012-01-01

    Global seagrass habitats are threatened by multiple anthropogenic factors. Effective management of seagrasses requires information on the relative impacts of threats; however, this information is rarely available. Our goal was to use the knowledge of experts to assess the relative impacts of anthropogenic activities in six global seagrass bioregions. The activities that threaten seagrasses were identified at an international seagrass workshop and followed with a web-based survey to collect seagrass vulnerability information. There was a global consensus that urban/industrial runoff, urban/port infrastructure development, agricultural runoff and dredging had the greatest impact on seagrasses, though the order of relative impacts varied by bioregion. These activities are largely terrestrially based, highlighting the need for marine planning initiatives to be co-ordinated with adjacent watershed planning. Sea level rise and increases in the severity of cyclones were ranked highest relative to other climate change related activities, but overall the five climate change activities were ranked low and experts were uncertain of their effects on seagrasses. The experts’ preferred mechanism of delivering management outcomes were processes such as policy development, planning and consultation rather than prescriptive management tools. Our approach to collecting expert opinion provides the required data to prioritize seagrass management actions at bioregional scales. (letter)

  18. The Crisis of the Sovereign Debt - Interdependencies, Responsibilities and Risks

    Directory of Open Access Journals (Sweden)

    Georgeta Dragomir

    2015-05-01

    Full Text Available The increase of government debt continues and maintains the financial crisis as an additional risk factor at national, regional or global level. The causes which lead to the raise of the national debt can be found in the effects of a major crisis but, in turn, this phenomenon feeds imbalances generating economic and financial crisis. The importance of this topic is defined by its magnitude and dynamics, in the long-term effects on the economy, finances, policies and, ultimately, on the completeness of a state. Solutions are available to the national public authorities in the context of regional policy, but they are circumscribed also to the imperatives imposed by the international lenders. Not infrequently, their efficiency was affected by subjective factors, along with the lack of preventive actions or of proper long-term vision. There have been made references to the analysis of international bodies or financial authorities, at authors dedicated to this complex problem. As method of approach we have used the bibliographic study, processing and analysis of data, and previous researches. The results are the analysis and explanation of specific developments of sovereign debt crisis, of interactions, highlighting the effects and solutions. The research is an important basis for specialists, public authorities and academics. As value, the work is a synthesis and a comparative analysis so as to identify trends, responsibilities and solutions.

  19. Following Hegel’s Sovereign Beast: An Excursus on the Right of Heroes

    Directory of Open Access Journals (Sweden)

    Joshua Ben David Nichols

    2013-01-01

    Full Text Available In The Beast and the Sovereign, Derrida addresses an association that is as paradoxical as it is common. On the one hand, it seems as if the sovereign is, or at least should be, the furthest from the beast. And yet, as soon as we consult the various archives of political mythology––myth, theology, philosophy, art, etc.––we find them together, inseparable despite their distance. The seminar itself is a continuation of his previous explorations of the host concepts and figures that populate the political and philosophical history of sovereignty. The course takes him through a series of texts that stretches from Plato, Machiavelli, Hobbes and Rousseau, to Freud, Heidegger, Lacan and Schmitt, among others, but his engagement with Hegel is limited. The few times that Hegel’s name does appear, it is almost exclusively a reference or aside within other more substantial engagements (Lacan and Heidegger, in particular. This absence is at least somewhat curious given the extent of Derrida’s previous engagements with Hegel’s corpus. I am not suggesting that this absence constitutes some essential oversight; rather, it is an opportunity to set out on an excursion from the course of The Beast and the Sovereign without leaving its territory. After all, Hegel also has an account of the origins of law. He, too, has a character that is set apart by his (almost animal quality. This figure arrives on stage before history begins. His role––and indeed his “right”––is to found the most basic elements of the state. We are told that his “right” is absolute. He is no Lord. He is not driven by a desire for the recognition of the other. However, who confers this “absolute” right? If his actions are not bound by any measure or proportion, how do we distinguish between the hero and the criminal?

  20. The impact of sovereign credit rating downgrade to foreign direct investment in South Africa

    Directory of Open Access Journals (Sweden)

    Virimai Mugobo

    2016-02-01

    Full Text Available Foreign Direct Investment (FDI has grown to be an attractive alternative to borrowing from multilateral institutions such as the World Bank and the International Monetary Fund for emerging economies. Global investors prefer investing in countries which have received a Sovereign Credit Rating (SCR as they perceive it as a good measure of risk allocation. This research applied an event study methodology to SCR downgrades from the three international CRAs (Moody, Standard and Poor and Fitch over the period 2004 to 2014 to investigate the impact of SCR change on FDI flow into South Africa. Empirical findings show that there is a statistically significant relationship between FDI and SCR downgrades. Evidence also shows that not all downgrades from the three CRAs equally affect investors’ decisions as Moody’s downgrades tend to dominate, causing FDI to reaction at with a higher magnitude. However, not only SCR downgrade determines FDI flow into SA but there is a host of other fundamentals that government should address to attract investment and stabilise financial markets

  1. Piercing the sovereign ceiling: Issues in oil and gas project financing

    International Nuclear Information System (INIS)

    Coleman, T.S.

    1998-01-01

    In the oil and gas sector, corporations and governments face huge capital spending requirements in order to transform large resource discoveries into producing, cash-generating assets. A significant portion of this funding is expected to be done on a project finance basis, where bank lenders or bond investors take a secured position in financing a discrete project, with the expectation of being paid back by the cash flows from that project after completion. This trend is increasing demand for crediting rating services to provide credit ratings for these project financings. A key challenge is to analyze and rate credit-worthy projects in countries that have relatively low foreign currency sovereign ceilings due to economic, political, and financial risks. In most cases, the credit ratings for projects financed in currencies outside the host country are capped at the country''s foreign currency ceiling. However, in a few instances, mainly in the oil and gas sector, Moody''s has pierced the foreign currency ceiling or rated certain projects above the sovereign ratings of the countries where they are domiciled. The purpose of this article is to briefly explain some of the qualitative factors and considerations that have allowed Moody''s to pierce the ceiling in the oil and gas sector, with a focus on two recent and noteworthy projects: Ras Laffan Liquefied Natural Gas in Qatar and Petrozuata in Venezuela

  2. Rating agencies : Role and influence of their sovereign credit risk assessment in the Eurozone

    NARCIS (Netherlands)

    Eijffinger, S.C.W.

    2012-01-01

    In this article, the role of credit rating agencies (CRAs) during the 2010–11 EU sovereign debt crisis is assessed. It is concluded that rating agencies lag behind markets, that their business model is flawed, and that the lack of competition renders the big three CRAs with too strong a market

  3. Limits to Arbitrage in Sovereign Bonds Price and Liquidity Discovery in High Frequency Quote Driven Markets

    DEFF Research Database (Denmark)

    Pelizzon, Loriana; Subrahmanyam, Marti G.; Tomio, Davide

    The progressively stronger linkages across markets, due to faster access to information and trade execution, cause market liquidity to be rapidly transmitted across markets. In contrast to the resultant commonality of liquidity across markets that are affected by common market-wide factors...... between markets, and liquidity discovery, the transmission of liquidity shocks, through changes in the quotes posted by market makers and the reactions of arbitrageurs. Our analysis is in the context of the Italian sovereign bond cash and future markets, during the recent Euro-zone sovereign bond crisis...... discovery, the cash market leads the futures market in liquidity discovery, i.e., the willingness of the market makers to trade (measured by market depth as the key liquidity measure). More specifically, the liquidity in the cash market also has a significant impact on the changes in the basis (and...

  4. Paved with good intentions: global financial integration and the eurozone’s response

    NARCIS (Netherlands)

    Underhill, G.R.D.

    2011-01-01

    Regional governance systems may resolve the dilemmas of global financial integration, and the Eurozone is the most advanced attempt to do so. The Euroland sovereign debt crisis is a test of this proposition but the outcome finds the EU wanting. The first section places EMU in the broader context of

  5. Identifying the Species Threat Hotspots from Global Supply Chains

    OpenAIRE

    Moran, Daniel; Kanemoto, Keiichiro

    2016-01-01

    Identifying species threat hotspots has been a successful approach for setting conservation priorities. One major challenge in conservation is that in many hotspots export industries continue to drive overexploitation. Conservation measures must consider not just the point of impact, but also the consumer demand that ultimately drives resource use. To understand which species threat hotspots are driven by which consumers, we have developed a new approach to link a set of biodiversity footprin...

  6. Deconstructing the Leviathan: Derrida’s The Beast and the Sovereign

    Directory of Open Access Journals (Sweden)

    Jacques de Ville

    2012-12-01

    Full Text Available Derrida’s The Beast & the Sovereign, volume I, explores the contradictory appearance of animals in political discourse. Sometimes, as he points out, political man and the sovereign state appear in the form of an animal and, at other times, as superior to animals of which he is the master. In session two of the Seminar, the main focus of this essay, Derrida explores the ‘origin’ of this contradictory logic inter alia with reference to animal fables which he contends draw on unconscious forces in their invocation of images. They pretend to make known something that cannot be the object of knowledge. In the same vein, Derrida shows how Hobbes’s Leviathan and sovereignty itself are constructed and maintained through an uncanny fear, a fear not in the first place of one’s fellow man, but of the wolf within the self, i.e., the drive to self-destruction. It is the repression of this wolf, Derrida suggests, which leads to the further contradictory logic (in Hobbes of excluding both beast and God from the covenant whilst maintaining God as the model of sovereignty. God, in other words, ‘is’ the beast repressed and can therefore hardly serve as the foundation of sovereignty. The self, and ultimately sovereignty, it can be said in view of Derrida’s analysis, is never purely present to itself but instead arrives at itself by way of the ‘binding’ of unconscious forces. Sovereignty in this way ultimately shows itself to be divisible.

  7. Environmental, Social and Governance (ESG) performance and sovereign bond spreads : an empirical analysis of OECD countries

    NARCIS (Netherlands)

    Capelle-Blancard, Gunther; Crifo, Patricia; Oueghlissi, Rim; Scholtens, Bert

    2017-01-01

    What are the determinants of borrowing cost in international capital markets? Apart from macroeconomic fundamentals, are there any qualitative factors that might capture sovereign bond spreads? In this paper we consider to what extent Environmental, social and governance (ESG) performance can affect

  8. Global and local threats to coral reef functioning and existence: review and predictions

    Energy Technology Data Exchange (ETDEWEB)

    Wilkinson, C.R. [Australian Institute of Marine Sciences, Townsville, Qld. (Australia)

    1999-07-01

    Factors causing global degradation of coral reefs are examined briefly as a basis for predicting the likely consequences of increases in these factors. The earlier consensus was that widespread but localized damage from natural factors such as storms, and direct anthropogenic effects such as increased sedimentation, pollution and exploitation, posed the largest immediate threat to coral reefs. Now truly global factors associated with accelerating Global Climate Change are either damaging coral reefs or have the potential to inflict greater damage in the immediate future e.g. increases in coral bleaching and mortality, and reduction in coral calcification due to changes in sea-water chemistry with increasing carbon dioxide concentrations. Rises in sea level will probably disrupt human communities and their cultures by making coral cays uninhabitable, whereas coral reefs will sustain minimal damage from the rise in sea level. The short-term (decades) prognosis is that major reductions are almost certain in the extent and biodiversity of coral reefs, and severe disruptions to cultures and economies dependent on reef resources will occur. The long-term (centuries to millennia) prognosis is more encouraging because coral reefs have remarkable resilience to severe disruption and will probably show this resilience in the future when climate changes either stabilize or reverse.

  9. Organic pollution of rivers: Combined threats of urbanization, livestock farming and global climate change.

    Science.gov (United States)

    Wen, Yingrong; Schoups, Gerrit; van de Giesen, Nick

    2017-02-23

    Organic pollution of rivers by wastewater discharge from human activities negatively impacts people and ecosystems. Without treatment, pollution control relies on a combination of natural degradation and dilution by natural runoff to reduce downstream effects. We quantify here for the first time the global sanitation crisis through its impact on organic river pollution from the threats of (1) increasing wastewater discharge due to urbanization and intensification of livestock farming, and (2) reductions in river dilution capacity due to climate change and water extractions. Using in-stream Biochemical Oxygen Demand (BOD) as an overall indicator of organic river pollution, we calculate historical (2000) and future (2050) BOD concentrations in global river networks. Despite significant self-cleaning capacities of rivers, the number of people affected by organic pollution (BOD >5 mg/l) is projected to increase from 1.1 billion in 2000 to 2.5 billion in 2050. With developing countries disproportionately affected, our results point to a growing need for affordable wastewater solutions.

  10. Organic pollution of rivers: Combined threats of urbanization, livestock farming and global climate change

    Science.gov (United States)

    Wen, Yingrong; Schoups, Gerrit; van de Giesen, Nick

    2017-02-01

    Organic pollution of rivers by wastewater discharge from human activities negatively impacts people and ecosystems. Without treatment, pollution control relies on a combination of natural degradation and dilution by natural runoff to reduce downstream effects. We quantify here for the first time the global sanitation crisis through its impact on organic river pollution from the threats of (1) increasing wastewater discharge due to urbanization and intensification of livestock farming, and (2) reductions in river dilution capacity due to climate change and water extractions. Using in-stream Biochemical Oxygen Demand (BOD) as an overall indicator of organic river pollution, we calculate historical (2000) and future (2050) BOD concentrations in global river networks. Despite significant self-cleaning capacities of rivers, the number of people affected by organic pollution (BOD >5 mg/l) is projected to increase from 1.1 billion in 2000 to 2.5 billion in 2050. With developing countries disproportionately affected, our results point to a growing need for affordable wastewater solutions.

  11. The NNSA global threat reduction initiative's efforts to minimize the use of highly enriched uranium for medical isotope production

    International Nuclear Information System (INIS)

    Staples, Parrish

    2010-01-01

    The mission of the National Nuclear Security Administration's (NNSA) Office of Global Threat Reduction (GTRI) is to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. GTRI is a key organization for supporting domestic and global efforts to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civilian nuclear applications. GTRI implements the following activities in order to achieve its threat reduction and HEU minimization objectives: Converting domestic and international civilian research reactors and isotope production facilities from the use of HEU to low enriched uranium (LEU); Demonstrating the viability of medical isotope production technologies that do not use HEU; Removing or disposing excess nuclear and radiological materials from civilian sites worldwide; and Protecting high-priority nuclear and radiological materials worldwide from theft and sabotage. This paper provides a brief overview on the recent developments and priorities for GTRI program activities in 2010, with a particular focus on GTRI's efforts to demonstrate the viability of non-HEU based medical isotope production technologies. (author)

  12. THREE MODELS OF NATIONAL CRIMINAL POLICY IN THE CONTEXT OF GLOBALIZATION

    Directory of Open Access Journals (Sweden)

    Ivan Kleymenov

    2017-01-01

    Full Text Available The author identifies three models of national criminal policy: the sovereign, reformist and experimental. The main criteria of such differentiation are the exposure to global influence, the criminological soundness and stability of criminal policy. Identification of the model of criminal policy in a particular state is a complex task that requires independent research.The subject. The article is devoted to modeling of the national criminal policy in modern conditions of globalization. The article discusses various models of criminal policy in the conditions of globalization.The purpose of the author is to describe the basic models of national criminal policy in modern conditions of globalization.The methodology. The author uses the method of analysis and synthesis, formal legal method as well as sociological methods (survey.The results, scope of application. The author identifies three models of national criminal policy: the sovereign, reformist and experimental. The main criteria of such differentiation are the exposure to global influence, the criminological soundness and stability of criminal policy. The sovereign model is based on doctrine of weak state and a strong combat criminal activity. It is distinguished by the pursuit of the realization of the equality of all before the law, criminal strategic and political planning system with a clear definition of goals and objectives; criminological security. The reform of criminal policy is characterized byuncertainty goals and objectives, utopianism and pretentiousness, dependence on standards of the international organization, the lower prestige of criminology, reduction of social programs, lobbying of group interests, permanent amendments to the criminal and criminal procedure legislation. Experimental model of criminal policy is connected with approbation of such technologies of management of society that are criminal and contrary to human experience in fighting crime.Conclusions. Criminal

  13. Global patterns in threats to vertebrates by biological invasions

    Science.gov (United States)

    Bellard, C.; Genovesi, P.; Jeschke, J. M.

    2016-01-01

    Biological invasions as drivers of biodiversity loss have recently been challenged. Fundamentally, we must know where species that are threatened by invasive alien species (IAS) live, and the degree to which they are threatened. We report the first study linking 1372 vertebrates threatened by more than 200 IAS from the completely revised Global Invasive Species Database. New maps of the vulnerability of threatened vertebrates to IAS permit assessments of whether IAS have a major influence on biodiversity, and if so, which taxonomic groups are threatened and where they are threatened. We found that centres of IAS-threatened vertebrates are concentrated in the Americas, India, Indonesia, Australia and New Zealand. The areas in which IAS-threatened species are located do not fully match the current hotspots of invasions, or the current hotspots of threatened species. The relative importance of biological invasions as drivers of biodiversity loss clearly varies across regions and taxa, and changes over time, with mammals from India, Indonesia, Australia and Europe are increasingly being threatened by IAS. The chytrid fungus primarily threatens amphibians, whereas invasive mammals primarily threaten other vertebrates. The differences in IAS threats between regions and taxa can help efficiently target IAS, which is essential for achieving the Strategic Plan 2020 of the Convention on Biological Diversity. PMID:26817767

  14. Ratings of Sovereign Risk and the Macroeconomics Fundamentals of the countries: a Study Using Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Osvaldo Cândido da Silva Filho

    2009-05-01

    Full Text Available To minimize the consequences of asymmetric information, the sovereign risk ratings are instruments that constitute a key piece in the determination of credit market conditions, essential to the growth of developing countries like Brazil. In the present work we studied based on macroeconomics foundations, a classification to sovereign risk ratings realized by the ratings agencies finding the classification using Artificial Neural Networks. We observed homogeneity degree between the attributions of agencies and macroeconomics foundations in the countries of sample which four of foundations seem to be more directly connected with these attributions. After, in a comparative static exercise, we use the model to make simulations of scenarios of the credit external conditions for the Brazilian economy, changing the macroeconomics foundations which we noted that agencies expected for more per capita income increasing and decrease of public debt. (Full article in Portuguese only

  15. Why borrowers pay premiums to larger lenders: Empirical evidence from sovereign syndicated loans

    OpenAIRE

    Hallak, Issam

    2002-01-01

    All other terms being equal (e.g. seniority), syndicated loan contracts provide larger lending compensations (in percentage points) to institutions funding larger amounts. This paper explores empirically the motivation for such a price design on a sample of sovereign syndicated loans in the period 1990-1997. I find strong evidence that a larger premium is associated with higher renegotiation probability and information asymmetries. It hardly has any impact on the number of lenders though. Thi...

  16. Global analysis of threat status reveals higher extinction risk in tropical than in temperate bird sister species

    Directory of Open Access Journals (Sweden)

    Reif Jiří

    2016-06-01

    Full Text Available Given increasing pressures upon biodiversity, identification of species’ traits related to elevated extinction risk is useful for more efficient allocation of limited resources for nature conservation. Despite its need, such a global analysis was lacking in the case of birds. Therefore, we performed this exercise for avian sister species using information about their global extinction risk from IUCN Red List. We focused on 113 pairs of sister species, each containing a threatened and an unthreatened species to factor out the effects of common evolutionary history on the revealed relationship. We collected data on five traits with expected relationships to species’ extinction risk based on previous studies performed at regional or national levels: breeding habitat (recognizing forest, grassland, wetland and oceanic species, latitudinal range position (temperate and tropics species, migration strategy (migratory and resident species, diet (carnivorous, insectivorous, herbivorous and omnivorous species and body mass. We related the extinction risk using IUCN threat level categories to species’ traits using generalised linear mixed effects models expecting lower risk for forest, temperate, omnivorous and smaller-bodied species. Our expectation was confirmed only in the case of latitudinal range position, as we revealed higher threat level for tropical than for temperate species. This relationship was robust to different methods of threat level expression and cannot be explained by a simple association of high bird species richness with the tropical zone. Instead, it seems that tropical species are more threatened because of their intrinsic characteristics such as slow life histories, adaptations to stable environments and small geographic ranges. These characteristics are obviously disadvantageous in conditions of current human-induced environmental perturbations. Moreover, given the absence of habitat effects, our study indicates that such

  17. International forum on nuclear and biological decommissioning: Management of global security threats

    International Nuclear Information System (INIS)

    Aslanian, G.; Kouzminov, V.; Martellini, M.; Santesso, R.

    1998-01-01

    The Forum on Nuclear and Biological Decommissioning: Management of Global Security Threats was organized by the Landau Network-Centro Volta (LNCV) with the support of the UNESCO Venice Office, the Italian Ministry of Foreign Affairs, the Italian National Board for Alternative Energy Sources (ENEA), the Lombardy Region and the Municipality of Como. Subjects dealt with at the conference included the reconversion of nuclear and biological military equipment produced in the 50 years of the Cold War period and the effects of radio contamination on the environment and on human life. This conference was the most recent of a number of initiatives on reconversion organized in collaboration with the UNESCO Venice Office. The issues dealt with at the conference will be among the subjects for discussion at the UNESCO International School Science for Peace, which will be set up at the 'A. Volta' Center for Scientific Culture

  18. Sovereign funds: energy products and investors in energy

    International Nuclear Information System (INIS)

    Bertin Delacour, Caroline

    2009-01-01

    Energy, especially oil, is the source of wealth of two-thirds of SWFs, located in the Middle East, Africa, America, Russia and Norway. The countries exporting natural resources use these investment vehicles to fight against the drawbacks of their rent economy: price volatility, non-renewal of resources, resource curse and 'dutch disease'. SWFs can indeed stabilize export earnings, preserve wealth for future generations and diversify the economy. Energy is also a prime area for investment of sovereign wealth funds, which have different objectives depending on their origin. The funds of the Persian Gulf, already rich in fossil resources, form partnerships with leading groups in the field of energy to acquire the technology they lack. The funds from countries lacking natural resources, such as China, seek to take control of foreign companies operating or processing raw materials with a view to secure energy independence of their country

  19. Health system strengthening: prospects and threats for its sustainability on the global health policy agenda.

    Science.gov (United States)

    Naimoli, Joseph F; Saxena, Sweta; Hatt, Laurel E; Yarrow, Kristina M; White, Trenton M; Ifafore-Calfee, Temitayo

    2018-01-01

    In 2013, Hafner and Shiffman applied Kingdon's public policy process model to explain the emergence of global attention to health system strengthening (HSS). They questioned, however, HSS's sustainability on the global health policy agenda, citing various concerns. Guided by the Grindle and Thomas interactive model of policy implementation, we advance and elaborate a proposition: a confluence of developments will contribute to maintaining HSS's prominent place on the agenda until at least 2030. Those developments include (1) technical, managerial, financial, and political responses to unpredictable public health crises that imperil the routine functioning of health systems, such as the 2014-2015 Ebola virus disease (Ebola) epidemic in West Africa; (2) similar responses to non-crisis situations requiring fully engaged, robust health systems, such as the pursuit of the new Sustainable Development Goal for health (SDG3); and (3) increased availability of new knowledge about system change at macro, meso, and micro levels and its effects on people's health and well-being. To gauge the accuracy of our proposition, we carried out a speculative assessment of credible threats to our premise by discussing all of the Hafner-Shiffman concerns. We conclude that (1) the components of our proposition and other forces that have the potential to promote continuing attention to HSS are of sufficient strength to counteract these concerns, and (2) prospective monitoring of HSS agenda status and further research on agenda sustainability can increase confidence in our threat assessment. © The Author 2017. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  20. Overlapping consensus versus discourse in climate change policy: The case of Norway's Sovereign Wealth Fund

    International Nuclear Information System (INIS)

    Nilsen, Heidi Rapp

    2010-01-01

    This paper is motivated by the mismatch between emission of greenhouse gases and effective mitigation policies. Science now calls for every tool to be considered in order for radical changes to mitigate the situation more effectively. This paper considers Norway's huge Sovereign Wealth Fund which, although withdrawing investment from firms causing severe environmental damage, does not categorize climate change as 'severe environmental damage'. The main reason is a basis of overlapping consensus, which also hinders argumentation for this practice. Overlapping consensus is part of the broader theory 'Justice as Fairness' as conceived by John Rawls. The consensus is with regard to having a socially just system. The word 'overlapping' refers to people having different reasons for supporting the system. However using overlapping consensus for investment-strategies represents an extension beyond its original intention, and moreover, removes mitigating climate change from the agenda. Removing the basis of overlapping consensus opens up scope for value-based discourse conceived by Habermas' communicative action and discourse ethics. The immense severity of climate change demands value-based and substantial arguments from powerful sovereign wealth funds, to consider the acceptability of their practice.

  1. Global Threat Reduction Initiative International Partners' Conference. Summary of the proceedings and findings of the conference

    International Nuclear Information System (INIS)

    2004-01-01

    The Global Threat Reduction Initiative (GTRI) International Partners' Conference took place in Vienna, Austria, from September 18-19, 2004. More than 590 representatives from 100 International Atomic Energy Agency (IAEA) Member States attended the GTRI International Partners' Conference on September 18-19, 2004, in Vienna, Austria. Representatives from ten non-governmental and international organizations were also present during the conference. The Governments of the United States and the Russian Federation co-sponsored the International Partners Conference, with support from the International Atomic Energy Agency. The purpose of the International Partners' Conference was to build and broaden international support for efforts by national authorities to identify, secure, recover, and/or facilitate the disposition of high-risk nuclear and radioactive materials that pose a potential threat to the international community. One of the significant outcomes of the International Partners Conference was reaching agreement on the Findings of the Conference (enclosed in this document) by participating Member States that outlined a broadly shared opinion of participating Member States on efforts to reduce the potential threat posed by vulnerable, unsecured nuclear and other radioactive material. It is hoped that this document can be used as a framework to consolidate, expand, and accelerate domestic, regional, and IAEA programs that address unsecured vulnerable nuclear and radioactive materials, as deemed necessary by Member States. As a first step, participating members states urged the international community to note additional opportunities to further build support for activities related to GTRI

  2. Antibiotic resistance as a global threat: Evidence from China, Kuwait and the United States

    Directory of Open Access Journals (Sweden)

    Rotimi Vincent

    2006-04-01

    Full Text Available Abstract Background Antimicrobial resistance is an under-appreciated threat to public health in nations around the globe. With globalization booming, it is important to understand international patterns of resistance. If countries already experience similar patterns of resistance, it may be too late to worry about international spread. If large countries or groups of countries that are likely to leap ahead in their integration with the rest of the world – China being the standout case – have high and distinctive patterns of resistance, then a coordinated response could substantially help to control the spread of resistance. The literature to date provides only limited evidence on these issues. Methods We study the recent patterns of antibiotic resistance in three geographically separated, and culturally and economically distinct countries – China, Kuwait and the United States – to gauge the range and depth of this global health threat, and its potential for growth as globalization expands. Our primary measures are the prevalence of resistance of specific bacteria to specific antibiotics. We also propose and illustrate methods for aggregating specific "bug-drug" data. We use these aggregate measures to summarize the resistance pattern for each country and to study the extent of correlation between countries' patterns of drug resistance. Results We find that China has the highest level of antibiotic resistance, followed by Kuwait and the U.S. In a study of resistance patterns of several most common bacteria in China in 1999 and 2001, the mean prevalence of resistance among hospital-acquired infections was as high as 41% (with a range from 23% to 77% and that among community- acquired infections was 26% (with a range from 15% to 39%. China also has the most rapid growth rate of resistance (22% average growth in a study spanning 1994 to 2000. Kuwait is second (17% average growth in a period from 1999 to 2003, and the U.S. the lowest (6% from

  3. Threat of plastic pollution to seabirds is global, pervasive, and increasing.

    Science.gov (United States)

    Wilcox, Chris; Van Sebille, Erik; Hardesty, Britta Denise

    2015-09-22

    Plastic pollution in the ocean is a global concern; concentrations reach 580,000 pieces per km(2) and production is increasing exponentially. Although a large number of empirical studies provide emerging evidence of impacts to wildlife, there has been little systematic assessment of risk. We performed a spatial risk analysis using predicted debris distributions and ranges for 186 seabird species to model debris exposure. We adjusted the model using published data on plastic ingestion by seabirds. Eighty of 135 (59%) species with studies reported in the literature between 1962 and 2012 had ingested plastic, and, within those studies, on average 29% of individuals had plastic in their gut. Standardizing the data for time and species, we estimate the ingestion rate would reach 90% of individuals if these studies were conducted today. Using these results from the literature, we tuned our risk model and were able to capture 71% of the variation in plastic ingestion based on a model including exposure, time, study method, and body size. We used this tuned model to predict risk across seabird species at the global scale. The highest area of expected impact occurs at the Southern Ocean boundary in the Tasman Sea between Australia and New Zealand, which contrasts with previous work identifying this area as having low anthropogenic pressures and concentrations of marine debris. We predict that plastics ingestion is increasing in seabirds, that it will reach 99% of all species by 2050, and that effective waste management can reduce this threat.

  4. Threat of plastic pollution to seabirds is global, pervasive, and increasing

    Science.gov (United States)

    Wilcox, Chris; Van Sebille, Erik; Hardesty, Britta Denise

    2015-01-01

    Plastic pollution in the ocean is a global concern; concentrations reach 580,000 pieces per km2 and production is increasing exponentially. Although a large number of empirical studies provide emerging evidence of impacts to wildlife, there has been little systematic assessment of risk. We performed a spatial risk analysis using predicted debris distributions and ranges for 186 seabird species to model debris exposure. We adjusted the model using published data on plastic ingestion by seabirds. Eighty of 135 (59%) species with studies reported in the literature between 1962 and 2012 had ingested plastic, and, within those studies, on average 29% of individuals had plastic in their gut. Standardizing the data for time and species, we estimate the ingestion rate would reach 90% of individuals if these studies were conducted today. Using these results from the literature, we tuned our risk model and were able to capture 71% of the variation in plastic ingestion based on a model including exposure, time, study method, and body size. We used this tuned model to predict risk across seabird species at the global scale. The highest area of expected impact occurs at the Southern Ocean boundary in the Tasman Sea between Australia and New Zealand, which contrasts with previous work identifying this area as having low anthropogenic pressures and concentrations of marine debris. We predict that plastics ingestion is increasing in seabirds, that it will reach 99% of all species by 2050, and that effective waste management can reduce this threat. PMID:26324886

  5. Additive threats from pathogens, climate and land-use change for global amphibian diversity

    DEFF Research Database (Denmark)

    Hof, Christian; Bastos Araujo, Miguel; Jetz, Walter

    2011-01-01

    Amphibian population declines far exceed those of other vertebrate groups, with 30% of all species listed as threatened by the International Union for Conservation of Nature. The causes of these declines are a matter of continued research, but probably include climate change, land-use change...... to be found in Africa, parts of northern South America and the Andes. Regions with the highest projected impact of land-use and climate change coincide, but there is little spatial overlap with regions highly threatened by the fungal disease. Overall, the areas harbouring the richest amphibian faunas...... and spread of the pathogenic fungal disease chytridiomycosis. Here we assess the spatial distribution and interactions of these primary threats in relation to the global distribution of amphibian species. We show that the greatest proportions of species negatively affected by climate change are projected...

  6. The global threat reduction initiative and conversion of isotope production to LEU targets

    International Nuclear Information System (INIS)

    Kuperman, A. J.

    2005-01-01

    The U.S. Global Threat Reduction Initiative (GTRI) has given a decisive impetus to the RERTR program's longstanding goal of converting worldwide production of medical radioisotopes from reliance on bomb-grade, highly enriched uranium (HEU) to low-enriched uranium (LEU) unsuitable for weapons. Although the four major; isotope producers continue to resist calls for conversion, they face mounting pressure from a variety of fronts including: (1) GTRI; (2) a related, multilateral U.S. initiative to forge agreement on conversion among the states that are home to the major producers; (3) an IAEA effort to provide technical assistance that will facilitate large-scale production of medical isotopes using LEU by producers who seek to do so; (4) planned production in the United States of substantial quantities of medical isotopes using LEU; and (5) pending U.S. legislation that would prohibit the export of HEU for production of isotopes as soon as alternative, LEU-produced isotopes are available. Accordingly, it now appears inevitable that worldwide isotope production will be converted from reliance on HEU to LEU. The only remaining question is which producers will be the first to reliably deliver sizeable quantities of LEU-produced isotopes and thereby capture global market share from the others. (author)

  7. Global Health Solidarity.

    Science.gov (United States)

    West-Oram, Peter G N; Buyx, Alena

    2017-07-01

    For much of the 20th century, vulnerability to deprivations of health has often been defined by geographical and economic factors. Those in wealthy, usually 'Northern' and 'Western', parts of the world have benefited from infrastructures, and accidents of geography and climate, which insulate them from many serious threats to health. Conversely, poorer people are typically exposed to more threats to health, and have lesser access to the infrastructures needed to safeguard them against the worst consequences of such exposure. However, in recent years the increasingly globalized nature of the world's economy, society and culture, combined with anthropogenic climate change and the evolution of antibiotic resistance, has begun to shift the boundaries that previously defined the categories of person threatened by many exogenous threats to health. In doing so, these factors expose both new and forgotten similarities between persons, and highlight the need for global cooperative responses to the existential threats posed by climate change and the evolution of antimicrobial resistance. In this article, we argue that these emerging health threats, in demonstrating the similarities that exist between even distant persons, provides a catalyst for global solidarity, which justifies, and provides motivation for, the establishment of solidaristic, cooperative global health infrastructures.

  8. Hybrid Wars: The 21 st -Century's New Threats to Global Peace and ...

    African Journals Online (AJOL)

    cyber-terrorism' and 'cyber-war' against the backdrop of Russia's 'Ukrainian Spring' and the continuing threat posed by radical Islamist groups in Africa and the Middle East. It also discusses the findings of an on-going hybrid threat project by ...

  9. Ebola virus – new threat to global health

    Directory of Open Access Journals (Sweden)

    Rina K. Kusumaratna

    2015-12-01

        The Ebola virus outbreak constitutes a serious warning that epidemics may occur anywhere and places every afflicted nation at risk. Therefore it is essential to institute measures to stop its spread and its future threat, which is a moral obligation of members of the health profession, whether academicians, researchers, or health ministry officials.

  10. Fluidics and heat generation of Alcon Infiniti and Legacy, Bausch & Lomb Millennium, and advanced medical optics sovereign phacoemulsification systems.

    Science.gov (United States)

    Floyd, Michael S; Valentine, Jeremy R; Olson, Randall J

    2006-09-01

    To study heat generation, vacuum, and flow characteristics of the Alcon Infiniti and Bausch & Lomb Millennium with results compared with the Alcon Legacy and advanced medical optics (AMO) Sovereign machines previously studied. Experimental study. Heat generation with continuous ultrasound was determined with and without a 200-g weight. Flow and vacuum were determined from 12 to 40-ml/min in 2-ml/min steps. The impact of a STAAR Cruise Control was also tested. Millennium created the most heat/20% of power (5.67 +/- 0.51 degrees C unweighted and 6.80 +/- 0.80 degrees C weighted), followed by Sovereign (4.59 +/- 0.70 degrees C unweighted and 5.65 +/- 0.72 degrees C weighted), Infiniti (2.79 +/- 0.62 degrees C unweighted and 3.96 +/- 0.31 degrees C weighted), and Legacy (1.99 +/- 0.49 degrees C unweighted and 4.27 +/- 0.76 degrees C weighted; P Infiniti vs Legacy, both weighted). Flow studies revealed that Millennium Peristaltic was 17% less than indicated (P < .0001 to all other machines), and all other machines were within 3.5% of indicated. Cruise Control decreased flow by 4.1% (P < .0001 for same machine without it). Millennium Venturi had the greatest vacuum (81% more than the least Sovereign; P < .0001), and Cruise Control increased vacuum in a peristaltic machine 35% more than the Venturi system (P < .0001). Percent power is not consistent in regard to heat generation, however, flow was accurate for all machines except Millennium Peristaltic. Restriction with Cruise Control elevates unoccluded vacuum to levels greater than the Venturi system tested.

  11. Paved with good intentions: global financial integration, the eurozone, and the hellish road to the fabled gold standard

    NARCIS (Netherlands)

    Underhill, G.R.D.; Claes, D.H.; Knutsen, C.H.

    2011-01-01

    Regional systems of governance may resolve some of the dilemmas of global financial integration, and the eurozone is among the most advanced examples of attempts to do so. This paper argues that the recent Euroland sovereign debt crisis is a test of this proposition, and the outcome leaves the EU

  12. Paved with good intentions: global financial integration, the eurozone, and the imaginary road to the fabled gold standard

    NARCIS (Netherlands)

    Underhill, G.R.D.

    2010-01-01

    Regional systems of governance may resolve some of the dilemmas of global financial integration, and the eurozone is among the most advanced examples of attempts to do so. This paper argues that the recent Euroland sovereign debt crisis is a test of this proposition, and the outcome leaves the EU

  13. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  14. Realized (co)variances of eurozone sovereign yields during the crisis: The impact of news and the Securities Markets Programme

    NARCIS (Netherlands)

    Beetsma, R.M.W.J.; de Jong, Frank; Giuliodori, M.; Widijanto, D.

    We use realized variances and covariances based on intraday data to measure the dependence structure of eurozone sovereign yields. Our analysis focuses on the impact of news, obtained from the Eurointelligence newsflash, on the dependence structure. More news tends to raise the volatility of yields

  15. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  16. Mercury contamination, a potential threat to the globally endangered aquatic warbler Acrocephalus paludicola.

    Science.gov (United States)

    Pacyna, Aneta Dorota; Martínez, Carlos Zumalacárregui; Miguélez, David; Jiguet, Frédéric; Polkowska, Żaneta; Wojczulanis-Jakubas, Katarzyna

    2017-12-01

    Mercury (Hg) contamination is considered a global concern for humans and wildlife, and although the number of studies dealing with that issue continues to increase, some taxonomic groups such as small passerine birds are largely understudied. In this paper, concentration of mercury in the aquatic warbler (Acrocephalus paludicola) feathers, a globally threatened passerine species, was examined. The concentration differences between two ages and sexes were investigated. The comparison of feathers taken on autumn migrants of two age categories act as a comparison of the species' exposure within the two different areas (European breeding or African wintering grounds). The average Hg concentration for all sampled individuals [2.32 μg/g dw (range 0.38-12.76)] is relatively high, compared with values found in other passerine species. An age difference was found, with first-year individuals displaying higher mercury concentrations than adults. This indicates that birds are exposed to mercury pollution during the breeding season, i.e., in the continental floodplains of eastern Europe. The average Hg concentration in feathers grown on the breeding grounds was 3.88 ± 2.59 μg/g dw, closer to the critical value of 5 μg/g dw, which is considered to impair the health of individuals. The findings suggest that mercury pollution may constitute a threat so far neglected for the endangered aquatic warbler.

  17. Paradise lost: Sovereign State Interest, Global Resource Exploitation and the Politics of Human Rights

    OpenAIRE

    Augenstein, Daniel

    2016-01-01

    Taking its cue from the US Supreme Court judgment in Kiobel that restricted the extraterritorial reach of the Alien Tort Claims Act, this article explores how sovereignty structures the relationship between global resource exploitation and the localization of human rights in the international order of states. The argument situates international human rights law in an area of tension between national political self-determination and the global economic exploitation of natural resources. Global...

  18. Al Qaeda: Profile and Threat Assessment

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2005-01-01

    .... interests abroad, and against Western countries. But many believe that the Al Qaeda organization and its leadership are no longer as relevant to assessing the global Islamic terrorist threat as they were on September 11, 2001. Some believe U.S...

  19. Global demand for gold is another threat for tropical forests

    International Nuclear Information System (INIS)

    Alvarez-Berríos, Nora L; Mitchell Aide, T

    2015-01-01

    The current global gold rush, driven by increasing consumption in developing countries and uncertainty in financial markets, is an increasing threat for tropical ecosystems. Gold mining causes significant alteration to the environment, yet mining is often overlooked in deforestation analyses because it occupies relatively small areas. As a result, we lack a comprehensive assessment of the spatial extent of gold mining impacts on tropical forests. In this study, we provide a regional assessment of gold mining deforestation in the tropical moist forest biome of South America. Specifically, we analyzed the patterns of forest change in gold mining sites between 2001 and 2013, and evaluated the proximity of gold mining deforestation to protected areas (PAs). The forest cover maps were produced using the Land Mapper web application and images from the MODIS satellite MOD13Q1 vegetation indices 250 m product. Annual maps of forest cover were used to model the incremental change in forest in ∼1600 potential gold mining sites between 2001–2006 and 2007–2013. Approximately 1680 km 2 of tropical moist forest was lost in these mining sites between 2001 and 2013. Deforestation was significantly higher during the 2007–2013 period, and this was associated with the increase in global demand for gold after the international financial crisis. More than 90% of the deforestation occurred in four major hotspots: Guianan moist forest ecoregion (41%), Southwest Amazon moist forest ecoregion (28%), Tapajós–Xingú moist forest ecoregion (11%), and Magdalena Valley montane forest and Magdalena–Urabá moist forest ecoregions (9%). In addition, some of the more active zones of gold mining deforestation occurred inside or within 10 km of ∼32 PAs. There is an urgent need to understand the ecological and social impacts of gold mining because it is an important cause of deforestation in the most remote forests in South America, and the impacts, particularly in aquatic systems

  20. Major threats of pollution and climate change to global coastal ecosystems and enhanced management for sustainability.

    Science.gov (United States)

    Lu, Yonglong; Yuan, Jingjing; Lu, Xiaotian; Su, Chao; Zhang, Yueqing; Wang, Chenchen; Cao, Xianghui; Li, Qifeng; Su, Jilan; Ittekkot, Venugopalan; Garbutt, Richard Angus; Bush, Simon; Fletcher, Stephen; Wagey, Tonny; Kachur, Anatolii; Sweijd, Neville

    2018-08-01

    Coastal zone is of great importance in the provision of various valuable ecosystem services. However, it is also sensitive and vulnerable to environmental changes due to high human populations and interactions between the land and ocean. Major threats of pollution from over enrichment of nutrients, increasing metals and persistent organic pollutants (POPs), and climate change have led to severe ecological degradation in the coastal zone, while few studies have focused on the combined impacts of pollution and climate change on the coastal ecosystems at the global level. A global overview of nutrients, metals, POPs, and major environmental changes due to climate change and their impacts on coastal ecosystems was carried out in this study. Coasts of the Eastern Atlantic and Western Pacific were hotspots of concentrations of several pollutants, and mostly affected by warming climate. These hotspots shared the same features of large populations, heavy industry and (semi-) closed sea. Estimation of coastal ocean capital, integrated management of land-ocean interaction in the coastal zone, enhancement of integrated global observation system, and coastal ecosystem-based management can play effective roles in promoting sustainable management of coastal marine ecosystems. Enhanced management from the perspective of mitigating pollution and climate change was proposed. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. Sovereign Wealth Fund investments in Europe as an instrument of Chinese energy policy

    International Nuclear Information System (INIS)

    Kamiński, Tomasz

    2017-01-01

    Chinese Sovereign Wealth Funds (SWFs) are new instruments of Chinese ‘Go Global’ strategy and the politics of maintaining raw materials and energy security. Europe has lured 60% of the total USD 27.3 billion invested by Chinese SWFs in the energy sector globally, which provokes the question as to how important SWF investments are in the political sense and what security concerns they bring. This paper is the first that presents a comprehensive picture of Chinese SWF investments in the European energy market and one of the very few papers about SWFs based on multiannual, comprehensive empirical data. The author argues that Chinese SWFs are different players on the energy market than private investors, could be potentially harmful for some European interests. By installing representatives on the company boards, China gains access to sensitive information that could be then transferred to Chinese competitors. Moreover, through its SWFs China could take control over energy companies or critical infrastructure and increase its political influence in European countries, making them more vulnerable to political pressure. Therefore, the European policy-makers should consider taking special steps to monitor and maybe limit Chinese SWFs expansion in the energy sector. - Highlights: • The energy sector account for almost half of Chinese's SWF investments in the EU. • SWFs should be treated differently on the energy market than private investors. • SWFs' representatives on company boards may create a conflict of interests.

  2. Avian Influenza: a global threat needing a global solution

    Directory of Open Access Journals (Sweden)

    Koh GCH

    2008-11-01

    Full Text Available Abstract There have been three influenza pandemics since the 1900s, of which the 1919–1919 flu pandemic had the highest mortality rates. The influenza virus infects both humans and birds, and mutates using two mechanisms: antigenic drift and antigenic shift. Currently, the H5N1 avian flu virus is limited to outbreaks among poultry and persons in direct contact to infected poultry, but the mortality rate among infected humans is high. Avian influenza (AI is endemic in Asia as a result of unregulated poultry rearing in rural areas. Such birds often live in close proximity to humans and this increases the chance of genetic re-assortment between avian and human influenza viruses which may produce a mutant strain that is easily transmitted between humans. Once this happens, a global pandemic is likely. Unlike SARS, a person with influenza infection is contagious before the onset of case-defining symptoms which limits the effectiveness of case isolation as a control strategy. Researchers have shown that carefully orchestrated of public health measures could potentially limit the spread of an AI pandemic if implemented soon after the first cases appear. To successfully contain and control an AI pandemic, both national and global strategies are needed. National strategies include source surveillance and control, adequate stockpiles of anti-viral agents, timely production of flu vaccines and healthcare system readiness. Global strategies such as early integrated response, curbing the disease outbreak at source, utilization of global resources, continuing research and open communication are also critical.

  3. Rating agencies: role and influence of their sovereign credit risk assessment in the Euro area

    OpenAIRE

    Sibert, Anne

    2012-01-01

    Credit ratings have a huge impact on the access to and costs of funding, regardless whether the rated entity is a private enterprise or a sovereign borrower. Since the beginning of the financial crisis there has been a vivid and controversial debate about methods, timing and procedures used by these agencies. In this compilation of five notes provided by members of the Monetary Expert Panel the role of the rating agencies and their influence on the euro area is discussed in more detail.

  4. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  5. Mobilising Uncertainty and the Making of Responsible Sovereigns

    NARCIS (Netherlands)

    Aalberts, T.E.; Werner, W.G.

    2011-01-01

    The past few decades have witnessed a fundamental change in the perception of threats to the security of states and individuals. Issues of security are no longer primarily framed in terms of threats posed by an identifiable, conventional enemy. Instead, post-Cold War security policies have

  6. Taxation in the Sovereign State of Tolima, 1863 – 1885

    Directory of Open Access Journals (Sweden)

    Joaquín Pinto

    2017-05-01

    Full Text Available The Sovereign State of Tolima was one of the poorest and most conflictive of Federalist Colombia 1863-1886. Its main sources of wealth were the exports of tobacco and indigo which had short periods of prosperity, complimented by the Antioqueño colonization that introduced a growth dynamic to the north of the State. Its geographical diversity and of its regional elites created frequent armed conflicts, compounded by the contagion of Colombian civil wars, since its territory was right in the middle of the country and besides the main river that communicated most of it. All these factors weighed heavily and made it difficult for state building at the regional level; in spite of them, as we will show, Tolima achieved some advances in its political organization, in its finances and, above all, in the coverage of its public educational system.

  7. International trade drives biodiversity threats in developing nations.

    Science.gov (United States)

    Lenzen, M; Moran, D; Kanemoto, K; Foran, B; Lobefaro, L; Geschke, A

    2012-06-06

    Human activities are causing Earth's sixth major extinction event-an accelerating decline of the world's stocks of biological diversity at rates 100 to 1,000 times pre-human levels. Historically, low-impact intrusion into species habitats arose from local demands for food, fuel and living space. However, in today's increasingly globalized economy, international trade chains accelerate habitat degradation far removed from the place of consumption. Although adverse effects of economic prosperity and economic inequality have been confirmed, the importance of international trade as a driver of threats to species is poorly understood. Here we show that a significant number of species are threatened as a result of international trade along complex routes, and that, in particular, consumers in developed countries cause threats to species through their demand of commodities that are ultimately produced in developing countries. We linked 25,000 Animalia species threat records from the International Union for Conservation of Nature Red List to more than 15,000 commodities produced in 187 countries and evaluated more than 5 billion supply chains in terms of their biodiversity impacts. Excluding invasive species, we found that 30% of global species threats are due to international trade. In many developed countries, the consumption of imported coffee, tea, sugar, textiles, fish and other manufactured items causes a biodiversity footprint that is larger abroad than at home. Our results emphasize the importance of examining biodiversity loss as a global systemic phenomenon, instead of looking at the degrading or polluting producers in isolation. We anticipate that our findings will facilitate better regulation, sustainable supply-chain certification and consumer product labelling.

  8. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  9. European Sovereign Bond-Backed Securities – a Proposal to Mitigate Risks Arisen from the Lack of an Euro Area Common Fiscal Policy

    Directory of Open Access Journals (Sweden)

    Munteanu Bogdan

    2017-01-01

    Full Text Available “European Sovereign Bond-Backed Securities” explores the complexities of having a fiscal unionfor Euro Area. All measures taken for fiscal integration are elements that need cohesion in order tobreak the vicious circle of unsustainable public debt affecting the balance sheets of banks anddeepening the need for rescue, which signals a further deterioration in asset valuation and marketsshrinking, worsening further the economic conditions. The need for a synthetic bond obtained bysecuritization of Euro Area governments’ debts emerges as viable proposal to break this public debt– private debt circle. Furthermore, it explores the “impossible trinity” (Mundell-Flemming and thetranslation into the Euro Area. The conclusions point to the need for institutionalized and officialapproach of introducing such derivative products like European Sovereign Bond-Backed Securitiesin the quest for safe assets, aiming to break the circle of debt (effect by substituting the absence of acommon fiscal policy (cause.

  10. Gender and globalization. A century in retrospect.

    Science.gov (United States)

    Chinkin, C

    2000-01-01

    In the past, power structures of the nation-State have been organized around patriarchal assumptions, granting men monopoly over power, authority, and wealth. A number of structures have been erected to achieve this imbalance, which have disguised its inequity by making it appear as natural and universal. However, with globalization, this centralization of power within the Sovereign State has been fragmented. Although globalization opens up new spaces by weakening the nation-State, subsequently making possible the undermining of traditional gender hierarchies and devising new bases for gender relations, the reality that the State is no longer the sole institution that can define identity and belonging within it has denied women the space to assert their own claims to gendered self-determination. In this regard, globalization has impacted upon gender relations in complex and contradictory ways. This paper discusses such impacts of globalization on gender relations. Overall, it has become apparent that forms of inequality still exist regardless of a State's prevailing political ideology. Their manifestations may differ, but the reality of women's subordination remains constant.

  11. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  12. The new challenges for oil-based sovereign wealth funds

    International Nuclear Information System (INIS)

    Aoun, Marie-Claire; Boulanger, Quentin

    2015-02-01

    Sovereign wealth funds (SWFs) are often presented as an effective instrument for managing hydrocarbon rents, reducing the impact of the volatility of oil or gas revenues on the economy, separating expenditure from income, and promoting a more transparent management of the rent. The asset allocation strategy has become more complex with the rapid rise in oil prices between 2007 and 2014, and the substantial financial reserves accumulated in hydrocarbon-producing countries, switching from an approach of wealth management to an approach of investment and financial optimisation. Hence, these funds have become major players on the international financial and industrial scene. Moreover, with the discovery of new hydrocarbon resources in recent years, particularly in Africa, the strategies of new funds appear to be moving towards a new goal of local economic development. But the unforeseen collapse of crude oil prices in recent months poses a new risk for some SWFs based on hydrocarbon revenues, which has to come to the aid of their economies and focus on their main principle of macro-economic stabilisation. (author)

  13. Global Policing and the Case of Kim Dotcom

    Directory of Open Access Journals (Sweden)

    Darren Palmer

    2013-11-01

    Full Text Available In early 2012, 76 heavily armed police conducted a raid on a house in Auckland, New Zealand. The targets were Kim Dotcom, a German national with a NZ residency visa, and several colleagues affiliated with Megaupload, an online subscription-based peer-to-peer (P2P file sharing facility. The alleged offences involved facilitating unlawful file sharing and United States federal criminal copyright violations. Following the raid, several court cases provide valuable insights into emerging ‘global policing’ practices (Bowling and Sheptycki 2012 based on communications between sovereign enforcement agencies.  This article uses these cases to explore the growth of ‘extraterritorial’ police powers that operate ‘across borders’ (Nadelmann 1993 as part of several broader transformations of global policing in the digital age.

  14. Global Warming: Threat to Sundarbans and the Silence of Indo-Bangladesh Mass Media

    Directory of Open Access Journals (Sweden)

    Moumita Basu

    2018-02-01

    Full Text Available The Sundarbans or the ‘beautiful forest’ is a cluster of low-lying islands in the Bay of Bengal, considered as one of the natural wonders of the world, which is facing the problem of global warming since the past few decades. Global warming, climate change, increasing water level and salinity of the river as well as inlet areas are some recognized threats to the Sundarbans. This is threatening species survival, the health of natural systems and causing extinction of biodiversity. This study is a modest attempt to examine the factors because of which the burning issues of Sundarbans are almost excluded from the attention of the media in India as well as Bangladesh. This is despite the fact that various initiatives have been taken by the governments and at the private level in these two countries to conserve the Sundarbans ecosystem. The research paper summarizes findings of newspaper reports on Sundarbans, from Earth Day to World Environment Day 2017 (22 April to 5 June of two reputed broadsheets dailies i.e. The Daily Prothom Alo (Dhaka, Bangladesh and The Ei Samay Sangbadpatra (Kolkata, India. The youngest member of the mass communication family, the film has also been included in this paper. This is because the joint production of the two Bengali film industries has already made a lot of cinema. There is going to be more in the near future, where many issues of India and Bangladesh are getting priority, but the destruction of Sundarbans has never been the subject of any such media intervention.

  15. Souverinity Wealth Funds (Swfs): Kapitalisme Baru oleh Negara?

    OpenAIRE

    -, Ambarwati

    2011-01-01

    A sovereign wealth funds (SWFs) is a state-owned investment fund composed of financial assets such as stocks, bonds, property, precious metals or other financial instruments. Its invest globally and have been around for decades but since 2000, the number of sovereign wealth funds has increased dramatically. This article try to understand what is SWFs, Why does a nation need SWFs, and try to understand the position of SWFs in the global financial market. Key words: sovereign wealth funds a...

  16. Cyber Terrorism demands a Global Risks and Threats Strategic Management

    International Nuclear Information System (INIS)

    Gareva, R.

    2007-01-01

    The world is in the third wave of development, which is digital managed and networked. Information, which creates the knowledge is transferring thorough the Internet by exponential function. The rapid advancement of the computer technology has a great influence over the development of the critical information infrastructure, thus changing the safety environment and the national values and interests. This advancement produces threats and risks from computer perspective which are sublimated in different forms of international terrorism and particularly in cyber terrorism. The main aim of this paper is based on a thorough analysis of what is scientifically known and practiced when nowadays critical information infrastructure is in the focus of the cyber terrorism. The rapid IT development demands changes in the strategic management focus. As a result of a time-consuming theoretical and empirical research this paper suggests a methodology for strategic managing of: threats, risks and vulnerabilities. The proposed methodology is seen as a mean to increase the human security conscious in every sense of the word, and to promote the need for rules, procedures and standards establishment from the aspect of the strategic management in the new information epoch concerning. In addition, through a scientific discourse, a short attempt is made to relate Macedonian reality with the phenomenon mentioned above. The most fundamental set phrase is that the efficiency and promptly made decisions during strategic planning are a projection of the systematic organization of functions and models for managing the risks and threats of the critical information infrastructure. Hence, this paper could be seen as a perspective when taking in consideration the regional strategic management, and the cyber space vital functioning. (author)

  17. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  18. Global Threat Reduction Initiative Fuel Thermo-Physical Characterization Project: Sample Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Casella, Amanda J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pereira, Mario M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Steen, Franciska H. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2013-01-01

    This sample management plan provides guidelines for sectioning, preparation, acceptance criteria, analytical path, and end-of-life disposal for the fuel element segments utilized in the Global Threat Reduction Initiative (GTRI), Fuel Thermo-Physical Characterization Project. The Fuel Thermo-Physical Characterization Project is tasked with analysis of irradiated Low Enriched Uranium (LEU) Molybdenum (U-Mo) fuel element samples to support the GTRI conversion program. Sample analysis may include optical microscopy (OM), scanning electron microscopy (SEM) fuel-surface interface analysis, gas pycnometry (density) measurements, laser flash analysis (LFA), differential scanning calorimetry (DSC), thermogravimetry and differential thermal analysis with mass spectroscopy (TG /DTA-MS), Inductively Coupled Plasma Spectrophotometry (ICP), alpha spectroscopy, and Thermal Ionization Mass Spectroscopy (TIMS). The project will utilize existing Radiochemical Processing Laboratory (RPL) operating, technical, and administrative procedures for sample receipt, processing, and analyses. Test instructions (TIs), which are documents used to provide specific details regarding the implementation of an existing RPL approved technical or operational procedure, will also be used to communicate to staff project specific parameters requested by the Principal Investigator (PI). TIs will be developed, reviewed, and issued in accordance with the latest revision of the RPL-PLN-700, RPL Operations Plan. Additionally, the PI must approve all project test instructions and red-line changes to test instructions.

  19. Terrorism threats and preparedness in Canada: the perspective of the Canadian public.

    Science.gov (United States)

    Gibson, Stacey; Lemyre, Louise; Clément, Mélanie; Markon, Marie-Pierre L; Lee, Jennifer E C

    2007-06-01

    Although Canada has not experienced a major terrorist attack, an increased global pending threat has put preparedness at the top of the Canadian government's agenda. Given its strong multicultural community and close proximity to the recently targeted United States, the Canadian experience is unique. However, minimal research exists on the public's reactions to terrorism threats and related preparedness strategies. In order for response initiatives to be optimally effective, it is important that the public's opinions regarding terrorism and preparedness be considered. This qualitative study examined perceptions of terrorism threats among Canadians living in Central and Eastern Canada (N = 75) in the fall of 2004. Conceptualizations of terrorism threat, psychosocial impacts, and sense of preparedness were explored in a series of qualitative interviews. Findings revealed that the majority of Canadians did not feel overly threatened by terrorist attacks, due in part to a perception of terrorist threats as related to global sociopolitical events and a positive Canadian identity. In addition, while most respondents did not feel they were individually affected by the threat of terrorism, there was some concern regarding larger societal impacts, such as increased paranoia, discrimination, and threats to civil liberties. Participants' views on preparedness focused largely on the utility of emergency preparedness strategies and the factors that could mitigate or inhibit preparedness at the individual and institutional levels, with a specific focus on education. Finally, the significant relevance of these findings in shaping terrorism preparedness, both in Canada and generally, is discussed.

  20. Nuclear theft and sabotage. Priorities for reducing new threats

    International Nuclear Information System (INIS)

    Bunn, Matthew; Bunn, George

    2001-01-01

    The appalling attacks of 11 September 2001 in the United States make clear that the threat of large, well-organized global terrorist groups bent on causing mass destruction is not hypothetical but real. The attackers achieved horrifying destruction with box-cutters. The results could have been even more horrific if the attackers would have had access to, and used, weapons of mass destruction. Ensuring that technologies and materials for weapons of mass destruction - especially weapons-usable nuclear materials, whose acquisition is the most difficult part of making a nuclear bomb - do not fall into the hands of terrorist groups or hostile States must be a central element of the coming global effort to prevent catastrophic terrorism. At the same time, nuclear facilities and materials - along with a wide range of other especially hazardous facilities and materials must be protected from mass-consequence sabotage. Securing these materials and facilities must be a top priority on the international agenda - pursued at every opportunity, at every level of authority, until the job is done. At the same time, the threats against which we must defend have to be fundamentally reconsidered. On 11 September, the threat revealed itself to be bigger, smarter, better organized, and more deadly than the threats most of the world's security systems were designed to defend against. We must ensure that our defensive response is every bit as intelligent and capable as the September attackers. And we may have to rethink some of the approaches to nuclear energy that the world has been pursuing or contemplating. Every reasonable effort must be made to ensure that nuclear materials and facilities are effectively secured. In the past, many scenarios with enormously high consequences were dismissed as too unlikely to contribute much to overall risk - but now many of these probability estimates will have to be revised. A far-reaching new effort is needed to strengthen security for nuclear

  1. Sovereign wealth funds – public investment vehicles, foreign policy element. Comparative evolution in the international context

    Directory of Open Access Journals (Sweden)

    Doina Drăniceanu

    2014-09-01

    Full Text Available Sovereign funds are an important actor occurring on international financial markets in the last decade, being, in fact, state controlled international investments. Generally, they are financed from foreign currency reserves of the emergent countries they are constituted in, being managed apart of the official reserves and used for external expansion; they are likely to be detrimental to certain strategic interests. As public financial vehicles, they own, endorse or manage public funds of some emergent countries, freely invested by them in a great number of assets, being seen as a foreign policy element.

  2. Digital danger: a review of the global public health, patient safety and cybersecurity threats posed by illicit online pharmacies

    Science.gov (United States)

    Mackey, Tim K.; Nayyar, Gaurvika

    2016-01-01

    Background Amidst the rise of e-commerce, there has been a proliferation of illicit online pharmacies that threaten global patient safety by selling drugs without a prescription directly to the consumer. Despite this clear threat, little is known about the key risk characteristics, central challenges and current legal, regulatory and law enforcement responses. Sources of data A review was conducted of the English literature with search terms ‘online pharmacies’, ‘Internet pharmacies’, ‘cyber pharmacies’, ‘rogue pharmacies’, and ‘e-pharmacies’ using PubMed, JSTOR, and Google Scholar from 1999–2005. Areas of agreement Illicit online pharmacies are a rapidly growing public health threat and are characterized by a number of complex and interrelated risk factors. Areas of controversy Solutions are varied and are of questionable utility in the face of evolving technology that enables this form of transnational cybercrime. Growing points Legal, regulatory and technology solutions must address the entire illicit online pharmacy ecosystem in order to be effective. Areas timely for developing research There is a critical need to build international consensus, conduct additional research and develop technology to combat illicit online pharmacies. PMID:27151957

  3. Digital danger: a review of the global public health, patient safety and cybersecurity threats posed by illicit online pharmacies.

    Science.gov (United States)

    Mackey, Tim K; Nayyar, Gaurvika

    2016-06-01

    Amidst the rise of e-commerce, there has been a proliferation of illicit online pharmacies that threaten global patient safety by selling drugs without a prescription directly to the consumer. Despite this clear threat, little is known about the key risk characteristics, central challenges and current legal, regulatory and law enforcement responses. A review was conducted of the English literature with search terms 'online pharmacies', 'Internet pharmacies', 'cyber pharmacies', 'rogue pharmacies', and 'e-pharmacies' using PubMed, JSTOR, and Google Scholar from 1999-2005. Illicit online pharmacies are a rapidly growing public health threat and are characterized by a number of complex and interrelated risk factors. Solutions are varied and are of questionable utility in the face of evolving technology that enables this form of transnational cybercrime. Legal, regulatory and technology solutions must address the entire illicit online pharmacy ecosystem in order to be effective. There is a critical need to build international consensus, conduct additional research and develop technology to combat illicit online pharmacies. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  4. "Islamic State Of Iraq And The Levant ("ISIL" As A Threat To The World Community

    Directory of Open Access Journals (Sweden)

    Nina V. Volodina

    2015-03-01

    Full Text Available In the present article author examines illegal activities of ISIS. Territory of victorious monotheism is so-called by experts and proclaimed in June 2014 "Islamic state" with the original name of "Islamic State of Iraq and the Levant", in other words "Caliphate" in a particular area of the modern states of Syria and Iraq. Founded illegally on the territory of the sovereign State of Iraq and Syria, "IS" with a sharia form of government, it is the first step of creating a global "caliphate", which do not recognize borders. Author notes that the creation of the "Islamic state", that poses a threat to the constitutional security of many countries of Asia, as well as the Russian Federation, both in terms of the "capture" of Islamic extremists and terrorists, and includes part of the territory of present Russia. Author concludes that: first, the creation of the world "Caliphate", no borders - the main goal of the Islamists, raising fears in the world, including the Russian Federation and the long term threaten to the country's sovereignty. Second, law enforcement authorities should be attentive to the problems that arose in the Russian Federation related to the Islamic radical organizations. Recruiters, Islamic radicals operate illegally in our country. Thirdly, important but insufficient measures taken, such as the steps to revive the Russian Islam the idea of a "single Russian muftiat", in particular to the Russian ummah was proposed "rigid vertical of power" and Sufism as a means of radicalism. Fourth, not enough attention is paid to the States to the Islamic States (IS in the Russian Federation and analysis of the problems associated with the radical Islam, which is no longer seen as a phenomenon inherent only in the Arab world. Fifth, there are opposing views on the "IS".

  5. Forest Distribution on Small Isolated Hills and Implications on Woody Plant Distribution under Threats of Global Warming

    Directory of Open Access Journals (Sweden)

    Chi-Cheng Liao

    2012-09-01

    Full Text Available Treelines have been found to be lower in small isolated hilltops, but the specific dynamics behind this unique phenomenon are unknown. This study investigates the distribution patterns of woody plants in Yangmingshan National Park (YMSNP, Northern Taiwan in search of the limitation mechanisms unique to small isolated hills, and to evaluate potential threats under global warming. Forests distributed between 200 to 900 m above sea level (ASL. Remnant forest fragments between 400 and 900 m ASL, have the highest species richness, and should be protected to ensure future forest recovery from the former extensive artificial disturbance. The lower boundary is threatened by urban and agricultural development. The lack of native woody species in these low elevation zones may cause a gap susceptible to invasive species. A consistent forest line at 100 m below mountain tops regardless of elevation suggests a topography-induced instead of an elevation-related limiting mechanism. Therefore, upward-shift of forests, caused by global warming, might be limited at 100 m below hilltops in small isolated hills because of topography-related factors. The spatial range of woody plants along the altitudinal gradient, thus, is likely to become narrower under the combined pressures of global warming, limited elevation, exposure-related stress, and artificial disturbance. Management priorities for forest recovery are suggested to include preservation of remnant forest fragments, increasing forest connectivity, and increasing seedling establishment in the grasslands.

  6. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  7. Assessing the Biological Threat Posed by Suicide Bombers

    Science.gov (United States)

    2016-02-01

    the test by about 350’, it is clear some aerosol particles “ surfed ” the shockwave from the blast and were carried a distance upwind. Had the sampling...projectiles implantation in victims of suicide bombings and implications for health and emergency care provideres: the 7/7 experience, Ann R Coll Surg Engl...Ebola in East Africa and Implications for Global Health and Security, Global Policy 2013. (8) Ustun, C.; Ozgurler, O., Ebola: A Significant Threat as

  8. Situating globality : African agency in the appropriation of global culture

    NARCIS (Netherlands)

    Binsbergen, van W.M.J.; Dijk, van R.A.

    2004-01-01

    The papers in this volume were earlier presented at the conference 'Globalization and new questions of ownership', which was held in Leiden, The Netherlands, from 26-27 April 2002. The volume challenges the dominant view that globalization is a primary threat to African societies. Instead, it

  9. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  10. The tundra - a threat to global climate?

    International Nuclear Information System (INIS)

    Roejle Christensen, T.

    1997-01-01

    The tundra biome has an important direct influence on the global climate through its exchange of radiatively active 'greenhouse gases', carbon dioxide and methane. A number of suggestions have been raised as to how a changing climate may alter the natural state of this exchange causing significant feedback effects in a changing climate. This paper provides a brief discussion of three different issues relating to the interaction between tundra and climate. It is concluded that release of methane hydrates, permafrost degradation and major biome changes are processes which in the long term may have important effects on further development of the global climate. (au) 32 refs

  11. Global Challenges and Threats: European and US Approaches

    Directory of Open Access Journals (Sweden)

    Antonio Marquina

    2010-01-01

    Full Text Available Este artículo presenta las similitudes y diferencias que existen en las aproximaciones de seguridad entre la Unión Europea y los Estados Unidos, así como sus implicaciones para la OTAN. La Estrategia de Seguridad Europea enfatiza los desafíos y amenazas globales, dejando en un segundo plano los problemas de seguridad tradicional existentes en la periferia europea. Los Estados Unidos, por su parte, que es una potencia militar global tiende a considerar los problemas de seguridad europea en un contexto más global. El artículo hace un recorrido por las políticas puestas en pie por la Unión Europea y los Estados Unidos para hacer frente a los desafíos globales y explica las similitudes y diferencias en orden a entender los problemas cruciales que los estados miembros de la OTAN tienen que abordar para dar consistencia y permanencia al nuevo concepto estratégico de la OTAN que se está elaborando.

  12. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  13. Coral reefs: threats and conservation in an era of global change.

    Science.gov (United States)

    Riegl, Bernhard; Bruckner, Andy; Coles, Steve L; Renaud, Philip; Dodge, Richard E

    2009-04-01

    Coral reefs are iconic, threatened ecosystems that have been in existence for approximately 500 million years, yet their continued ecological persistence seems doubtful at present. Anthropogenic modification of chemical and physical atmospheric dynamics that cause coral death by bleaching and newly emergent diseases due to increased heat and irradiation, as well as decline in calcification caused by ocean acidification due to increased CO(2), are the most important large-scale threats. On more local scales, overfishing and destructive fisheries, coastal construction, nutrient enrichment, increased runoff and sedimentation, and the introduction of nonindigenous invasive species have caused phase shifts away from corals. Already approximately 20% of the world's reefs are lost and approximately 26% are under imminent threat. Conservation science of coral reefs is well advanced, but its practical application has often been lagging. Societal priorites, economic pressures, and legal/administrative systems of many countries are more prone to destroy rather than conserve coral-reef ecosystems. Nevertheless, many examples of successful conservation exist from the national level to community-enforced local action. When effectively managed, protected areas have contributed to regeneration of coral reefs and stocks of associated marine resources. Local communities often support coral-reef conservation in order to raise income potential associated with tourism and/or improved resource levels. Coral reefs create an annual income in S-Florida alone of over $4 billion. Thus, no conflict between development, societal welfare, and coral-reef conservation needs to exist. Despite growing threats, it is not too late for decisive action to protect and save these economically and ecologically high-value ecosystems. Conservation science plays a critical role in designing effective strategies.

  14. Term structure of sovereign spreads: a contingent claim model

    Directory of Open Access Journals (Sweden)

    Katia Rocha

    2007-12-01

    Full Text Available This paper proposes a simple structural model to estimate the termstructure and the implied default probability of a selected group of emerging countries, which account for 54% of the JPMorgan EMBIG index on average for the period 2000-2005. The real exchange rate dynamic, modeled as a pure diffusion process, is assumed to trigger default. The calibrated model generates sovereign spread curves consistent to market data. The results suggest that the market is systematically overpricing spreads for Brazil in 100 basis points, whereas for Mexico, Russia and Turkey the model is able to reproduce the market behavior.Este trabalho propõe um modelo estrutural para estimar a estrutura a termo e a probabilidade implícita de default de países emergentes que representam, em média, 54% do índice EMBIG do JPMorgan no período de 2000-2005. A taxa de câmbio real, modelada como um processo de difusão simples, é considerada como indicativa de default. O modelo calibrado gera a estrutura a termo dos spreads consistente com dados de mercado, indicando que o mercado sistematicamente sobre-estima os spreads para o Brasil em 100 pontos base na média, enquanto para México, Rússia e Turquia reproduz o comportamento do mercado.

  15. Global Climate Change: Threat Multiplier for AFRICOM?

    National Research Council Canada - National Science Library

    Yackle, Terri A

    2007-01-01

    .... Whatever the catalyst for this abrupt climate change, stability for Africa hinges upon mitigating the effects of global climate change to prevent future conflicts such as Darfur, and the instability...

  16. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  17. Evolution of the perception of the threats to security in Spain

    Directory of Open Access Journals (Sweden)

    Rafael Grasa

    1993-07-01

    Full Text Available security was internal, in other words, subversion and opposition to the regime. Public opinion, however, revealed that characteristics very different to those in the context of the western block existed, such as a void perception of the soviet threat as opposed to a marked antiamericanism for its support of the regime.This legacy of threats weighed heavily during the transition together with the existence of a cleavage between the armed forces, the political actors and public opinion regarding the real necessity of intergration into NATO. In the eighties there exists a clear differentiation between the threats perceived by public opinion and those considered by the political elites. With regard to the former,serious threats to Spain do not exist. only certain concerns when the subject of security took on importance in the field of public opinion, such as during the referendum campaign over NATO in 1986 which was mixed with the scarce perception of the soviet threat, theconstant danger represented by the United States and the slight rise in those who believed in the Moroccan threat, and the impact of the Gulf War in 1991 and the consequent increase of the threat represented by the arab countries. For the political actors, the mainthreat contemplated was the protection of territorial integrity on a stage closer to the western Mediterranean instead of a global threat to the western block something only considered at a theoretical level with the strategic concept of Spanish defence within the framework of participation in NATO.From 1992 onwards with the Defence Directive, the threat concept is replaced by that of risk and which recovers the importance given over to North Africa. It is argued in the belief that security is indivisible and must be shared not only with the European members. A greater convergence is also initiated in the nineties between the political actors and public opinion with respect to considering what are the risks in a global

  18. The BMD threat: when and how to intercept - Opinion

    NARCIS (Netherlands)

    Bouquet, F.

    2007-01-01

    NATO and the US are involved in developing Ballistic missile defense (BMD) capabilities that must provide protection against various threats, which has received global attention. One needs to carefully consider the consequences of employing the defensive missiles. It is assumed that there will be no

  19. Think Globally, Act Locally -- Global Maritime Partnership Initiative and the Necessity for Cooperation and Coalition

    National Research Council Canada - National Science Library

    Reller, Jason S

    2008-01-01

    ... to "police the global commons and suppress common threats." The Global Maritime Partnership Initiative, or GMPI, is intended to play a major role in this effort as one embodiment of the cooperation envisioned...

  20. Paradise lost : Sovereign State Interest, Global Resource Exploitation and the Politics of Human Rights

    NARCIS (Netherlands)

    Augenstein, Daniel

    Taking its cue from the US Supreme Court judgment in Kiobel that restricted the extraterritorial reach of the Alien Tort Claims Act, this article explores how sovereignty structures the relationship between global resource exploitation and the localization of human rights in the international order

  1. Financial Contagion in the BRICS Stock Markets: An empirical analysis of the Lehman Brothers Collapse and European Sovereign Debt Crisis

    Directory of Open Access Journals (Sweden)

    DIRCEU PEREIRA

    2018-01-01

    Full Text Available This research analyzes and extends the study of contagion for BRICS emerging stock markets in the context of the last two international financial crises: the Lehman Brothers Bankruptcy Crisis and the European Sovereign Debt Crisis. We investigate changes in the relationship and the co-movements between BRICS markets in response to international shocks that are originated in advanced markets like USA and Europe. Employing data of daily stock market indices of BRICS countries, this research tests for contagion, examining the interactions and characteristics of price movements of BRICS stock markets by applying cointegration, causality and VECM/Gonzalo-Granger statistic and variance decomposition methodology on stock returns as a measure of perceived country risk. The results exhibit that both long-run and short-run relationships patterns exist between BRICS stock markets and have drastically changed during turbulent periods compared with tranquil period, pointing towards the occurrence of contagion phenomenon among BRICS markets during the last two crises. These findings also indicate that changes in the USA and the Euro Zone indices affect BRICS stock markets in the short-run, acting as a leading indicator for investing in BRICS markets. Also imply an increasing degree of global market integration, bringing major implications for portfolio diversification and policy makers.

  2. Analytical Research to Determine the effects of the Components of ONGABO on the Viability of HepG2 Cancer Cells by Using the Sovereign, Minister, Assistant and Courier Principle ().

    Science.gov (United States)

    Shin, Jeong-Hun; Jun, Seung-Lyul; Hwang, Sung-Yeoun; Ahn, Seong-Hun

    2012-12-01

    This study used the basic principle of Oriental medicine, the sovereign, minister, assistant and courier principle () to investigate the effects of the component of ONGABO, which is composed of Ginseng Radix (Red Ginseng), Angelica Gigantis Radix, Schisandrae Fructus, Cuscuta Semen and Curcumae tuber on the viability of HepG2 cells. Single and mixed extracts of the component of ONGABO were prepared by lypohilizing powder of Red Ginseng (6-year root from Kanghwa), Angelica Gigantis Radix, Schisandrae Fructus, Cuscuta Semen, Curcumae Tuber (from Omniherb Co., Ltd., Korea) at the laboratory of herbal medicine in Woosuk University and were eluted after being macerated with 100% ethanol for three days. The cell viability of HepG2 was determined by using an absorptiometric analysis with PrestoBlue (Invitrogen) reagent after the plate had been incubated for 48 hours. All of the experiments were repeated three times to obtain the average value and standard deviation. The statistical analysis was done and the correlation factor was obtained by using Microsoft Office Excel 2007 and Origin 6.0 software. Although Ginseng Radix (Red Ginseng) and Schisandrae Fructus did not enhance the viability of HepG2 cells, they were shown to provide protection of those cells. On the other hand, Angelica Gigantis Radix decreased the viability of HepG2 cells significantly, Cuscuta Semen and Curcumae Tuber had a small or no effect on the viability of HepG2 cells. In the sovereign, minister, assistant and courier principle (), Ginseng Radix (Red Ginseng) corresponds to the sovereign component because it provides cell protection effects, Angelica Gigantis Radix corresponds to minister medicinal because it kills cells, Schisandrae Fructus corresponds to the assistant medicinal to help red ginseng having cell protect effects. Cuscuta Semen and Curcumae Tuber correspond to the courier medicinal having no effect in cell viability in HepG2. We hope this study provides motivation for advanced research

  3. Greece – in the centre of sovereign debt crisis. Consequences on the evolution of Euro Zone economies

    Directory of Open Access Journals (Sweden)

    Cristina Bâlgăr

    2011-10-01

    Full Text Available The purpose of this paper is to present the evolution of economic and financial crisis in Greece. We will examine the effect of Hellenic crisis on deepening the sovereign debt crisis in Euro zone and the possible consequences across the entire European economy. The research also aims to present possible scenarios of evolution for the Greek crisis and their potential consequences for the stability and economic growth perspectives in European Union. Our research concludes by highlighting the consequences of economic measures imposed to Greece by the European Union for the consolidation and fiscal stabilization of Hellenic economy.

  4. A case of socialist cantonalism: the Asturias & León sovereign council

    Directory of Open Access Journals (Sweden)

    Daniel GUERRA SESMA

    2017-06-01

    Full Text Available In the second year of Spanish Civil War, with the advance of francoists troops in the North, the Asturias region rested isolated. With the capital, Oviedo, occupied by the rebels, republican parties decided to keep the fight until the end. Anyway, the isolation with the Government of the Republic has provided a separation in fact that, with the creation of Sovereign Council, became in situation of right. Not all left parties shared the decision, because they wanted to keep the relation, although its difficulties, with central Government. Historically, the linkage between and nationalities question has been troubled and diverse, between the theoretical internationalism and the reality of some national facts clearly expressed. This is the case of a cantonal and separatist movement not involved by a nationalist party but just by several lefts who pleaded the international solidarity with its fight. The geographical conditions of Asturian region and the war’s way contributed firmly to this fact happens.

  5. Global Insurgency: A Prescription for Imposing Strategic Paralysis

    National Research Council Canada - National Science Library

    Katka, Michael B

    2008-01-01

    .... Some argue that this threat constitutes a global insurgency. This Strategy Research Project examines the nature of this 21st century threat and analyzes the option of "strategic paralysis" to counter...

  6. Intentional cargo disruption by nefarious means: Examining threats, systemic vulnerabilities and securitisation measures in complex global supply chains.

    Science.gov (United States)

    McGreevy, Conor; Harrop, Wayne

    2015-01-01

    Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined.

  7. Unemployment in Greece: Econometric Evidence after the Athens 2004 Olympics and before the Global Financial Crisis of 2007–2009

    OpenAIRE

    Rodokanakis, Stavros

    2012-01-01

    This paper investigates the probability of employment in Greece and focuses on 2006, namely, well after the Athens 2004 Olympics and its fiscal stimulus and before the eruption of the global financial crisis of 2007–2009 that transformed into an economic and sovereign debt crisis with unprecedented consequences in the country's postwar economic history. Based on microdata from the Labour Force Survey, the analysis depicts the impact of gender, age, marital status, area of residence, level of ...

  8. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  9. GLOBAL GOVERNANCE VS. NATIONAL SOVEREIGNTY IN A GLOBALIZED WORLD

    Directory of Open Access Journals (Sweden)

    Sabina TUCA

    2015-03-01

    Full Text Available The global economic and financial crisis of 2007 highlighted the risks, threats and enormous costs of a global economy in the absence of a global government. The aim of this paper is to emphasize the importance of global governance in a world in which states are facing the erosion of national sovereignty. The two concepts are being analyzed from various points of view, including current challenges and future scenarios. Despite the fact that states, especially major powers, are not prepared to accept some elements of global governance and the limits that they would put on their national sovereignty, recent developments seem to make global governance a key component of the international scene.

  10. Global warming and the challenge of international cooperation: an interdisciplinary assessment

    International Nuclear Information System (INIS)

    Bryner, G.C.

    1992-01-01

    The book aims to explore the nature of potential climatic change. It seeks to assess the scientific, economic legal and political issues related to the threat of global warming from an interdisciplinary perspective. The seven chapters have the following titles: the challenge of global warming; global warming and ozone depletion - certainties and uncertainties; consequences of global climate change for Earth's biosphere; global energy use and global warming; problems and prospects of institutionalizing ecological interdependence in a world of local independence; political institutions and climate change; and policy options for responding to the threat of global warming. Six chapters are abstracted separately. 158 refs

  11. VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION

    OpenAIRE

    Elena Vladimirovna Batueva

    2014-01-01

    The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is sh...

  12. Globalisation of water: opportunities and threats of virtual water trade

    NARCIS (Netherlands)

    Chapagain, A.K.

    2006-01-01

    Where the river basin is generally seen as the appropriate unit for analyzing freshwater availability and use, it becomes increasingly important to put freshwater issues in a global context. The book analyses the opportunities and threats of international virtual water trade in the context of

  13. Importance of rapid testing to combat the global threat of bird flu.

    NARCIS (Netherlands)

    Meijer, A.

    2006-01-01

    One of the important outcomes of the recently held meeting of the World Heatlh Organization (EHO), the Food and Agriculture Organization (FAO) of the United Nations, the World Organization of Animal Heath (OIE) and the World Bank in Genevan November 7- 9, 2005, on the threat of avian inluenza

  14. Threat and Guilt Aspects of Internalized Antilesbian and Gay Prejudice: An Application of Personal Construct Theory

    Science.gov (United States)

    Moradi, Bonnie; van den Berg, Jacob J.; Epting, Franz R.

    2009-01-01

    Building on G. A. Kelly's (1991a, 1991b) personal construct theory, this study introduced concepts of threat and guilt as different manifestations of internalized antilesbian and gay prejudice. Results with 102 lesbian and gay participants indicated that internalized threat and guilt each accounted for unique variance in global internalized…

  15. Global warming and extinctions of endemic species from biodiversity hotspots.

    Science.gov (United States)

    Jay R. Malcolm; Canran Liu; Ronald P. Neilson; Lara Hansen; Lee. Hannah

    2006-01-01

    Global warming is a key threat to biodiversity, but few researchers have assessed the magnitude of this threat at the global scale. We used major vegetation types (biomes) as proxies for natural habitats and, based on projected future biome distributions under doubled-C02 climates, calculated changes in habitat areas and associated extinctions of...

  16. A horizon scan of future threats and opportunities for pollinators and pollination

    Directory of Open Access Journals (Sweden)

    Mark J.F. Brown

    2016-08-01

    Full Text Available Background. Pollinators, which provide the agriculturally and ecologically essential service of pollination, are under threat at a global scale. Habitat loss and homogenisation, pesticides, parasites and pathogens, invasive species, and climate change have been identified as past and current threats to pollinators. Actions to mitigate these threats, e.g., agri-environment schemes and pesticide-use moratoriums, exist, but have largely been applied post-hoc. However, future sustainability of pollinators and the service they provide requires anticipation of potential threats and opportunities before they occur, enabling timely implementation of policy and practice to prevent, rather than mitigate, further pollinator declines. Methods.Using a horizon scanning approach we identified issues that are likely to impact pollinators, either positively or negatively, over the coming three decades. Results.Our analysis highlights six high priority, and nine secondary issues. High priorities are: (1 corporate control of global agriculture, (2 novel systemic pesticides, (3 novel RNA viruses, (4 the development of new managed pollinators, (5 more frequent heatwaves and drought under climate change, and (6 the potential positive impact of reduced chemical use on pollinators in non-agricultural settings. Discussion. While current pollinator management approaches are largely driven by mitigating past impacts, we present opportunities for pre-emptive practice, legislation, and policy to sustainably manage pollinators for future generations.

  17. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  18. Moving towards global health equity: Opportunities and threats: An ...

    African Journals Online (AJOL)

    Background: The theme of the 13th World Congress on Public Health, “Moving Towards Global Health Equity: Opportunities and Threats”, strikes an optimistic note as the gaps within and between countries are greater than at any time in recent history. There is no consensus on what globalization is, but most agree that it will ...

  19. Chytridiomycosis: a global threat to amphibians.

    Science.gov (United States)

    Pereira, P L L; Torres, A M C; Soares, D F M; Hijosa-Valsero, M; Bécares, E

    2013-12-01

    Chytridiomycosis, which is caused by Batrachochytrium dendrobatidis, is an emerging infectious disease of amphibians. The disease is one of the main causes of the global decline in amphibians. The aetiological agent is ubiquitous, with worldwide distribution, and affects a large number of amphibian species in several biomes. In the last decade, scientific research has substantially increased knowledge of the aetiological agent and the associated infection. However, important epidemiological aspects of the environment-mediated interactions between the aetiological agent and the host are not yet clear. The objective of the present review is to describe chytridiomycosis with regard to the major features of the aetiological agent, the host and the environment.

  20. Currency crises with the threat of an interest rate defence

    NARCIS (Netherlands)

    Daniels, T.R.; Jager, H.; Klaassen, F.

    2011-01-01

    While virtually all currency crisis models recognise that the decision to abandon a peg depends on how tenaciously policy makers defend it, this is seldom modelled explicitly. We add the threat of an interest rate defence to the global game model of Morris and Shin (American Economic Review 88,

  1. Global safety

    Directory of Open Access Journals (Sweden)

    Dorien J. DeTombe

    2010-08-01

    Full Text Available Global Safety is a container concept referring to various threats such as HIV/Aids, floods and terrorism; threats with different causes and different effects. These dangers threaten people, the global economy and the slity of states. Policy making for this kind of threats often lack an overview of the real causes and the interventions are based on a too shallow analysis of the problem, mono-disciplinary and focus mostly only on the effects. It would be more appropriate to develop policy related to these issues by utilizing the approaches, methods and tools that have been developed for complex societal problems. Handling these complex societal problems should be done multidisciplinary instead of mono-disciplinary. In order to give politicians the opportunity to handle complex problems multidisciplinary, multidisciplinary research institutes should be created. These multidisciplinary research institutes would provide politicians with better approaches to handle this type of problem. In these institutes the knowledge necessary for the change of these problems can be created through the use of the Compram methodology which has been developed specifically for handling complex societal problems. In a six step approach, experts, actors and policymakers discuss the content of the problem and the possible changes. The framework method uses interviewing, the Group Decision Room, simulation models and scenario's in a cooperative way. The methodology emphasizes the exchange of knowledge and understanding by communication among and between the experts, actors and politicians meanwhile keeping emotion in mind. The Compram methodology will be further explained in relation to global safety in regard to terrorism, economy, health care and agriculture.

  2. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  3. [Globalization and infectious diseases].

    Science.gov (United States)

    Mirski, Tomasz; Bartoszcze, Michał; Bielawska-Drózd, Agata

    2011-01-01

    Globalization is a phenomenon characteristic of present times. It can be considered in various aspects: economic, environmental changes, demographic changes, as well as the development of new technologies. All these aspects of globalization have a definite influence on the emergence and spread of infectious diseases. Economic aspects ofglobalization are mainly the trade development, including food trade, which has an impact on the spread of food-borne diseases. The environmental changes caused by intensive development of industry, as a result of globalization, which in turn affects human health. The demographic changes are mainly people migration between countries and rural and urban areas, which essentially favors the global spread of many infectious diseases. While technological advances prevents the spread of infections, for example through better access to information, it may also increase the risk, for example through to create opportunities to travel into more world regions, including the endemic regions for various diseases. The phenomenon ofglobalization is also closely associated with the threat of terrorism, including bioterrorism. It forces the governments of many countries to develop effective programs to protect and fight against this threat.

  4. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  5. The Global Threat Reduction Initiative's Return of Highly Enriched Uranium from Chile

    Energy Technology Data Exchange (ETDEWEB)

    Messick, C.E.; Dickerson, S.L.; Greenberg, R.F. Jr. [U.S. Department of Energy, National Nuclear Security Administration, Washington D.C. (United States); Andes, T.C. [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2011-07-01

    In March 2010, the U.S. National Nuclear Security Administration's Office of Global Threat Reduction (GTRI), in collaboration with the Chilean Nuclear Energy Commission (CCHEN), completed a shipment of 18.2 kilograms of non-U.S.-origin highly enriched uranium (HEU) to the United States. The HEU was in the form of 71 aluminium-clad material test reactor (MTR) fuel elements and was the first GTRI Gap Program shipment that included non-U.S. origin irradiated nuclear fuel. Although shipments of research reactor fuels are not unique, this shipment served as a cornerstone to the first Presidential Nuclear Security Summit held in Washington, D.C., in April 2010. Carrying out the shipment became critical when a severe earthquake struck Chile just one day before the shipment was to occur. As the fuel had already been packaged in casks and the ocean vessels were nearing the port, U.S. and Chilean officials decided that it was most imperative that the shipment continue as planned. After careful analysis of the situation, inspection of the transportation packages, roadways, and port services, the shipment team was able to make the shipment occur in a safe and secure manner. This paper describes the loading activities at both the RECH-1 and RECH-2 reactors as well as the transportation of the loaded casks to the port of departure. (author)

  6. Catalunya a l'aldea global

    OpenAIRE

    Pes, Àngel

    1999-01-01

    Small societies must also adapt to an increasingly integrated world, econmmically, culturally and politically. Globalization is a polifaceted phenomenon transforming the world into a global village. Three examples of globalisation are the rapidly extended financial crisis, with the threat of global recession; the arrest of Pinochet in London on a Spanish warrant, marking the birth of a global public opinion; and the acceptance of differences as a way to solve conflicts both in Nor...

  7. Emerging viral infectious disease threat: Why Tanzania is not in a ...

    African Journals Online (AJOL)

    Emerging diseases are global threat towards human existence. Every country is exposed to potentially emergence of infectious diseases. Several factor such as changes in ecology, climate and human demographics play different roles in a complex mechanism contributing to the occurrence of infectious diseases. Important ...

  8. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  9. The Euro area sovereign debt crisis: safe haven, credit rating agencies and the spread of the fever from Greece, Ireland and Portugal

    OpenAIRE

    De Santis, Roberto A.

    2012-01-01

    Since the intensification of the crisis in September 2008, all euro area long-term government bond yields relative to the German Bund have been characterised by highly persistent processes with upward trends for countries with weaker fiscal fundamentals. Looking at the daily period 1 September 2008 - 4 August 2011, we find that three factors can explain the recorded developments in sovereign spreads: (i) an aggregate regional risk factor, (ii) the country-specific credit risk and (iii) the sp...

  10. Taking chances in the face of threat: romantic risk regulation and approach motivation.

    Science.gov (United States)

    Cavallo, Justin V; Fitzsimons, Gráinne M; Holmes, John G

    2009-06-01

    Four studies examine the hypothesis that goals adopted by high and low self-esteem people (HSEs and LSEs) to manage risk in romantic relationships may reflect global shifts in approach motivation and subsequently affect risk taking in nonsocial domains. In Studies 1 and 2, threats to participants' romantic relationships heightened HSEs' self-reported general approach motivation while lowering LSEs' approach motivation. In Studies 2 through 4, HSEs exhibited riskier decision making (i.e., a greater tendency to pursue rewards and ignore risks) in nonsocial domains following a relationship threat manipulation whereas LSEs made more conservative decisions. These results suggest that the romantic risk regulation may be inherently linked to a broader approach and avoidance system and that specific risk regulation behaviors may be driven by global motivational shifts to a greater degree than previously theorized.

  11. Zika Virus: An Emerging Global Health Threat

    Science.gov (United States)

    Mittal, Rahul; Nguyen, Desiree; Debs, Luca H.; Patel, Amit P.; Liu, George; Jhaveri, Vasanti M.; S. Kay, Sae-In; Mittal, Jeenu; Bandstra, Emmalee S.; Younis, Ramzi T.; Chapagain, Prem; Jayaweera, Dushyantha T.; Liu, Xue Zhong

    2017-01-01

    Zika virus (ZIKV) is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS) and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV), and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease. PMID:29276699

  12. Chronic illness in the workplace: stigma, identity threat and strain.

    Science.gov (United States)

    McGonagle, Alyssa K; Barnes-Farrell, Janet L

    2014-10-01

    Chronic illness affects a large and growing number of workers in the United States and globally. Stigmatization (devaluation) at work based on chronic illness may be stressful for individuals and therefore may lead to negative psychological consequences (i.e. strains). In order to better understand stressful experiences of stigma for workers with chronic illnesses, a model of stigma-related identity threat (perceptions that one is at risk of being treated negatively at work because of chronic illness) was tested on a sample of 203 working adults with chronic illnesses. The following variables related to workers' perceptions of chronic illness-related identity threat: workers' boundary flexibility (flexibility in managing their work and life), their meta-perceptions of devaluation (perceptions of others' devaluation of them based on illness) and their job self-efficacy (feelings of confidence related to performing their job). In turn, perceptions of identity threat related to both feelings of psychological strain and (lower levels of) perceived work ability. Surprisingly, neither stigma centrality (how fundamental illness is to one's identity) nor supervisor support related to workers' identity threat perceptions. Copyright © 2013 John Wiley & Sons, Ltd.

  13. Climate change and the World Bank: opportunity for global governance?

    International Nuclear Information System (INIS)

    Boehmer-Christiansen, S.A.

    1999-01-01

    The direct and indirect efforts of the World Bank and its off-spring, the Global Environment Facility (GEF), to become leading international agents of global environmental 'governance' and 'sustainable development' are described and analysed politically with reference to the development of an implementation regime of the Framework Convention on Climate Change (FCCC). The Bank/GEF are seen as engaging in a potentially dangerous experiment of 'global ecological modernisation', or industrial transformation, in 'emerging economies', an experiment legitimised by reference to the catastrophic threat of man-made 'global warming'. This threat is already being translated into political, commercial and bureaucratic benefits accruing to a small global elite. How was this achieved and what are the likely political implications? (author)

  14. War Journalism in the Threat Society: Peace journalism as a strategy for challenging the mediated culture of fear?

    Directory of Open Access Journals (Sweden)

    Stig Arne Nohrstedt

    2008-10-01

    Full Text Available The possible development of the Risk Society into what could be called the Threat Society, in which threat perceptions are exploited in politics to a degree seldom seen in modernity, seriously challenges conflict and peace journalism in many new ways. The context of the Global War on Terror as the dominant global discursive order, and the lack of a consistent strategy for democratisation in post-conflict countries, together with visual war propaganda, perception management and psychological operations as part of the media wars conducted alongside of military operations, all make it urgent to discuss the relevance, reach and applicability of the peace journalism model and/or philosophy in the present international situation. This article outlines points of departure for such a discussion in the Threat Society.

  15. Global Warming: A Reduced Threat?.

    Science.gov (United States)

    Michaels, Patrick J.; Stooksbury, David E.

    1992-10-01

    One popular and apocalyptic vision of the world influenced by increasing concentrations of infrared-absorbing trace gases is that of ecological disaster brought about by rapidly rising temperatures, sea level, and evaporation rates. This vision developed from a suite of climate models that have since considerably changed in both their dynamics and their estimates of prospective warming. Observed temperatures indicate that much more warming should already have taken place than predicted by earlier models in the Northern Hemisphere, and that night, rather than day, readings in that hemisphere show a relative warming. A high-latitude polar-night warming or a general night warming could be either benign or beneficial. A large number of plant species show both increased growth and greater water-use efficiency under enhanced carbon dioxide.An extensive body of evidence now indicates that anthropo-generated sulfate emissions are mitigating some of the warming, and that increased cloudiness as a result of these emissions will further enhance night, rather than day, warming. The sulfate emissions, though, are not sufficient to explain all of the night warming. However, the sensitivity of climate to anthropogenerated aerosols, and the general lack of previously predicted warming, could drastically alter the debate on global warming in favor of less expensive policies.

  16. Global Financial Crisis – Policy Response

    Directory of Open Access Journals (Sweden)

    Dakić Milojica

    2014-01-01

    Full Text Available Six years after the outbreak of the financial crisis that had shaken the global financial system, experts and analysts all over the world continue discussing the effectiveness, scope and adequacy of mechanisms and measures implemented in the meantime, as well as the adequacy of the underlying theoretical concept. A global consent has been reached on ensuring financial stability through the interaction of monetary, fiscal and prudential policy to ensure the necessary macroprudential dimension of regulatory and supervisory frameworks. The USA crisis spilled over to Europe. Strong support of governments to bail out banks quickly resulted in sovereign debt crises in some peripheral EU Member States. Fiscal insolvency of these countries strongly shook the EU and increased doubts in the monetary union survival. The European Union stood united to defend the euro and responded strongly with a new complex and comprehensive financial stability framework. This supranational framework is a counterpart to the global financial stability framework created by the G20 member countries. Starting from the specific features of the monetary policy whose capacities are determined by euroisation, available instruments and resources for preventive supervisory activities, as well as the role of the government in crisis management, Montenegro created a framework for maintaining financial stability and prescribed fostering and maintaining financial stability as the main objective of the Central Bank of Montenegro.

  17. Infrastructure, Attitude and Weather: Today’s Threats to Supply Chain Security

    Directory of Open Access Journals (Sweden)

    Stephen Blank

    2016-06-01

    Full Text Available The global economy can be viewed today as a myriad of border-crossing supply chain networks of production, supply, distribution and marketing systems. Given the enormous value embodied in these systems, and an environment increasingly characterized by uncertainty and vulnerability, it is not surprising that concern about supply chain security has intensified. Concern takes many forms. For example, how supply chains might be used as vehicles for criminal activity (smuggling, trafficking of narcotics and importing counterfeit goods or acts of terrorism (radio-active materials, bombs, even nukes in containers. Technology-based threats to supply chains, such as cybercrimes, data breaches and IT failures, now appear more frequently in the literature on supply chain security. These threats could result in substantial disruption to supply chains and damage to companies and their customers.Clima But larger storms are brewing, whose menace to supply chain security is greater still – and where actions to protect supply chains move more slowly. These include the continued deterioration of transportation infrastructure, a new posture on trade which views supply chains as threats to jobs and wages, and the impact of climate change. These threats do not lie off in the distant future; they are threats of today and tomorrow.

  18. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  19. The Cooperative Threat Reduction Program and Russian-American Relations in the Late 1990s: Power vs. Institutions

    National Research Council Canada - National Science Library

    Weaver, Brent

    2000-01-01

    .... Despite the fact that Chechnya is geographically a part of sovereign Russia, the United States government stridently protests what it considers to be the wholesale slaughter and displacement of the Chechen people...

  20. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  1. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  2. Analytical Research to Determine the effects of the Components of ONGABO on the Viability of HepG2 Cancer Cells by Using the Sovereign, Minister, Assistant and Courier Principle (君臣佐使論

    Directory of Open Access Journals (Sweden)

    Shin Jeong-Hun

    2012-12-01

    Full Text Available Objectives: This study used the basic principle of Oriental medicine, the sovereign, minister, assistant and courier principle (君臣佐使論 to investigate the effects of the component of ONGABO, which is composed of Ginseng Radix (Red Ginseng, Angelica Gigantis Radix, Schisandrae Fructus, Cuscuta Semen and Curcumae tuber on the viability of HepG2 cells. Methods: Single and mixed extracts of the component of ONGABO were prepared by lypohilizing powder of Red Ginseng (6-year root from Kanghwa, Angelica Gigantis Radix, Schisandrae Fructus, Cuscuta Semen, Curcumae Tuber (from Omniherb Co., Ltd., Korea at the laboratory of herbal medicine in Woosuk University and were eluted after being macerated with 100% ethanol for three days. The cell viability of HepG2 was determined by using an absorptiometric analysis with PrestoBlue (Invitrogen reagent after the plate had been incubated for 48 hours. All of the experiments were repeated three times to obtain the average value and standard deviation. The statistical analysis was done and the correlation factor was obtained by using Microsoft Office Excel 2007 and Origin 6.0 software. Results: Although Ginseng Radix (Red Ginseng and Schisandrae Fructus did not enhance the viability of HepG2 cells, they were shown to provide protection of those cells. On the other hand, Angelica Gigantis Radix decreased the viability of HepG2 cells significantly, Cuscuta Semen and Curcumae Tuber had a small or no effect on the viability of HepG2 cells. Conclusions: In the sovereign, minister, assistant and courier principle (君臣佐使論, Ginseng Radix (Red Ginseng corresponds to the sovereign component because it provides cell protection effects, Angelica Gigantis Radix corresponds to minister medicinal because it kills cells, Schisandrae Fructus corresponds to the assistant medicinal to help red ginseng having cell protect effects. Cuscuta Semen and Curcumae Tuber correspond to the courier medicinal having no effect in

  3. Zika Virus: An Emerging Global Health Threat

    Directory of Open Access Journals (Sweden)

    Rahul Mittal

    2017-12-01

    Full Text Available Zika virus (ZIKV is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV, and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease.

  4. Do Economic Growth, Human Development and Political Stability favour sovereign Creditworthiness of a Country? A Cross Country Survey on Developed and Developing Countries

    OpenAIRE

    Bundala, Ntogwa

    2012-01-01

    One of the challenges face a country or firm when deciding to lend a foreign country or firm is how to appraise the creditworthiness of that firm or country? It is experienced and commonly use of credit ratings established by Credit Rating Agencies (Moody’s, Standard and Poor’s and Pitch) as the yardstick for sovereign creditworthiness appraisal, these will be the secondary or an appeal instrument for appraising creditworthiness. This study established local based factors that will ...

  5. Interest rate risk measurement in Brazilian sovereign markets

    Directory of Open Access Journals (Sweden)

    Caio Ibsen Rodrigues de Almeida

    2004-06-01

    Full Text Available Fixed income emerging markets are an interesting investment alternative. Measuring market risks is mandatory in order to avoid unexpected huge losses. The most used market risk measure is the Value at Risk, based on the profit-loss probability distribution of the portfolio under consideration. Estimating this probability distribution requires the prior estimation of the probability distribution of term structures of interest rates. An interesting possibility is to estimate term structures using a decomposition of the spread function into a linear combination of Legendre polynomials. Numerical examples from the Brazilian sovereign fixed income international market illustrate the practical use of the methodology.Os mercados emergentes de renda fixa são alternativas interessantes para investimentos. Devido ao elevado nível de incerteza existente em tais mercados, a mensuração dos riscos de mercado de uma carteira de investimentos é fundamental para que se evite um nível elevado de perdas. Uma das medidas de risco de mercado mais utilizadas é o Value at Risk, baseado na distribuição de probabilidades de perdas-ganhos da carteira sob análise. A estimação desta distribuição requer, no entanto, a estimação prévia da distribuição de pro-babilidades das variações da estrutura a termo da taxa de juros. Uma possibilidade interessante para a estimação de tal distribuição é efetuar uma decomposição da função de spread da estrutura a termo em uma combinação linear de Polinômios de Legendre. Exemplos numéricos do mercado internacional de títulos soberanos brasileiros são apresentados para ilustrar o uso prático desta nova metodologia.

  6. Who launched what, when and why; trends in global land-cover observation capacity from civilian earth observation satellites

    Science.gov (United States)

    Belward, Alan S.; Skøien, Jon O.

    2015-05-01

    This paper presents a compendium of satellites under civilian and/or commercial control with the potential to gather global land-cover observations. From this we show that a growing number of sovereign states are acquiring capacity for space based land-cover observations and show how geopolitical patterns of ownership are changing. We discuss how the number of satellites flying at any time has progressed as a function of increased launch rates and mission longevity, and how the spatial resolutions of the data they collect has evolved. The first such satellite was launched by the USA in 1972. Since then government and/or private entities in 33 other sovereign states and geopolitical groups have chosen to finance such missions and 197 individual satellites with a global land-cover observing capacity have been successfully launched. Of these 98 were still operating at the end of 2013. Since the 1970s the number of such missions failing within 3 years of launch has dropped from around 60% to less than 20%, the average operational life of a mission has almost tripled, increasing from 3.3 years in the 1970s to 8.6 years (and still lengthening), the average number of satellites launched per-year/per-decade has increased from 2 to 12 and spatial resolution increased from around 80 m to less than 1 m multispectral and less than half a meter for panchromatic; synthetic aperture radar resolution has also fallen, from 25 m in the 1970s to 1 m post 2007. More people in more countries have access to data from global land-cover observing spaceborne missions at a greater range of spatial resolutions than ever before. We provide a compendium of such missions, analyze the changes and shows how innovation, the need for secure data-supply, national pride, falling costs and technological advances may underpin the trends we document.

  7. EU Banking Union: Lessons for non-eurozone transition countries

    Directory of Open Access Journals (Sweden)

    Šoškić Dejan

    2015-01-01

    Full Text Available Eurozone has gone through turmoil of sovereign debt crisis just after the detrimental effect of global financial crises of 2007/2008. Sovereign debt crisis of the eurozone was caused by bank-sovereign interdependence and lack of fiscal union in the eurozone. Financial fragmentation in the eurozone financial markets was an immediate outcome. Banking union of the EU is a regulatory and institutional remedy for main financial problems of the eurozone post global financial crisis. It is clear signal that lessons have been learned from the two crises. Stricter regulation (single rule book aims to increase the quality of banks. Single Supervisory Mechanism (SRM, and Single Resolution Mechanism (SRM aim to unify and better the standards of supervision and resolution in the EU. With emphasis on bail-ins, and EU level backstops, bank-sovereign interdependence should be dismantled and chances of financial crisis reoccurrence with huge costs for taxpayers should be significantly lower. There are important elements of Banking Union that could be introduced in non-eurozone transition countries both members and nonmembers of the EU.

  8. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  9. The role of lenders' trust in determining borrowing conditions for sovereign debt: An analysis of one-period government bonds with default risk

    OpenAIRE

    Guo, Yanling

    2015-01-01

    In this paper, the author considers the sovereign debt in the form of one-period government bonds with default risk, which can be purchased by and traded among domestic and foreign investors. She shows that the weight assigned to the lenders' interest by the borrowing government at the time of debt repayment, which captures the lenders' trust in the government's propensity to repay the debt and is denoted as », also determines the default risk: a higher » means a lower default risk ceteris pa...

  10. The politics of global warming

    International Nuclear Information System (INIS)

    Moss, N.

    1991-01-01

    The probable warming of the world over the next few decades due to human activity presents a unique threat. The threat of global warming has been brought about by the activities of the entire human race, and only action by a large part of the human race can slow down the process or halt it. Other unwanted effects of industrial activity are trans-national, and require international agreements to regulate them, most obviously radioactivity from nuclear power accidents, acid rain and river pollution; but climatic change, unlike these, is global. International negotiations are going on now to deal with the problem of global warming, mostly by reducing the emission of gases that contribute to it. These are preliminary, yet already different perceptions and conflicting interests are emerging. The aim of the present negotiations is a convention for the UN Conference on Environment and Development (UNCED) to be held in June 1992, the so-called ''Earth Summit''. (author)

  11. Threat bias, not negativity bias, underpins differences in political ideology.

    Science.gov (United States)

    Lilienfeld, Scott O; Latzman, Robert D

    2014-06-01

    Although disparities in political ideology are rooted partly in dispositional differences, Hibbing et al.'s analysis paints with an overly broad brush. Research on the personality correlates of liberal-conservative differences points not to global differences in negativity bias, but to differences in threat bias, probably emanating from differences in fearfulness. This distinction bears implications for etiological research and persuasion efforts.

  12. Supply Chain Risk Management: An Introduction to the Credible Threat

    Science.gov (United States)

    2016-08-01

    van.poindexter@dau.mil. Figure 3. Trusted Suppliers Source: “ Managing Information Communications Technology Global Supply Chain Risk Awareness...Defense AT&L: July-August 2016 18 Supply Chain Risk Management An Introduction to the Credible Threat Heath Ferry n Van Poindexter 19...cybersecurity breach. This article examines the elements of supply chain risk management , the national security risks associated with exploitation, and

  13. Environmental and health impacts of fine and ultrafine metallic particles: Assessment of threat scores

    Energy Technology Data Exchange (ETDEWEB)

    Goix, Sylvaine [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Lévêque, Thibaut [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); ADEME (French Agency for Environment and Energy Management), 20 Avenue du Grésillé, BP 90406, 49004 Angers Cedex 01 (France); Xiong, Tian-Tian [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Schreck, Eva [Géosciences Environnement Toulouse (GET), Observatoire Midi Pyrénées, Université de Toulouse, CNRS, IRD, 14 Avenue E. Belin, F-31400 Toulouse (France); and others

    2014-08-15

    This study proposes global threat scores to prioritize the harmfulness of anthropogenic fine and ultrafine metallic particles (FMP) emitted into the atmosphere at the global scale. (Eco)toxicity of physicochemically characterized FMP oxides for metals currently observed in the atmosphere (CdO, CuO, PbO, PbSO{sub 4}, Sb{sub 2}O{sub 3}, and ZnO) was assessed by performing complementary in vitro tests: ecotoxicity, human bioaccessibility, cytotoxicity, and oxidative potential. Using an innovative methodology based on the combination of (eco)toxicity and physicochemical results, the following hazard classification of the particles is proposed: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}. Both cadmium compounds exhibited the highest threat score due to their high cytotoxicity and bioaccessible dose, whatever their solubility and speciation, suggesting that cadmium toxicity is due to its chemical form rather than its physical form. In contrast, the Sb{sub 2}O{sub 3} threat score was the lowest due to particles with low specific area and solubility, with no effects except a slight oxidative stress. As FMP physicochemical properties reveal differences in specific area, crystallization systems, dissolution process, and speciation, various mechanisms may influence their biological impact. Finally, this newly developed and global approach could be widely used in various contexts of pollution by complex metal particles and may improve risk management. - Highlights: • Seven micro- and nano- monometallic characterized particles were studied as references. • Bioaccessibility, eco and cytotoxicity, and oxidative potential assays were performed. • According to calculated threat scores: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}.

  14. Global conservation priorities for marine turtles.

    Directory of Open Access Journals (Sweden)

    Bryan P Wallace

    Full Text Available Where conservation resources are limited and conservation targets are diverse, robust yet flexible priority-setting frameworks are vital. Priority-setting is especially important for geographically widespread species with distinct populations subject to multiple threats that operate on different spatial and temporal scales. Marine turtles are widely distributed and exhibit intra-specific variations in population sizes and trends, as well as reproduction and morphology. However, current global extinction risk assessment frameworks do not assess conservation status of spatially and biologically distinct marine turtle Regional Management Units (RMUs, and thus do not capture variations in population trends, impacts of threats, or necessary conservation actions across individual populations. To address this issue, we developed a new assessment framework that allowed us to evaluate, compare and organize marine turtle RMUs according to status and threats criteria. Because conservation priorities can vary widely (i.e. from avoiding imminent extinction to maintaining long-term monitoring efforts we developed a "conservation priorities portfolio" system using categories of paired risk and threats scores for all RMUs (n = 58. We performed these assessments and rankings globally, by species, by ocean basin, and by recognized geopolitical bodies to identify patterns in risk, threats, and data gaps at different scales. This process resulted in characterization of risk and threats to all marine turtle RMUs, including identification of the world's 11 most endangered marine turtle RMUs based on highest risk and threats scores. This system also highlighted important gaps in available information that is crucial for accurate conservation assessments. Overall, this priority-setting framework can provide guidance for research and conservation priorities at multiple relevant scales, and should serve as a model for conservation status assessments and priority

  15. SOVEREIGN: An autonomous neural system for incrementally learning planned action sequences to navigate towards a rewarded goal.

    Science.gov (United States)

    Gnadt, William; Grossberg, Stephen

    2008-06-01

    How do reactive and planned behaviors interact in real time? How are sequences of such behaviors released at appropriate times during autonomous navigation to realize valued goals? Controllers for both animals and mobile robots, or animats, need reactive mechanisms for exploration, and learned plans to reach goal objects once an environment becomes familiar. The SOVEREIGN (Self-Organizing, Vision, Expectation, Recognition, Emotion, Intelligent, Goal-oriented Navigation) animat model embodies these capabilities, and is tested in a 3D virtual reality environment. SOVEREIGN includes several interacting subsystems which model complementary properties of cortical What and Where processing streams and which clarify similarities between mechanisms for navigation and arm movement control. As the animat explores an environment, visual inputs are processed by networks that are sensitive to visual form and motion in the What and Where streams, respectively. Position-invariant and size-invariant recognition categories are learned by real-time incremental learning in the What stream. Estimates of target position relative to the animat are computed in the Where stream, and can activate approach movements toward the target. Motion cues from animat locomotion can elicit head-orienting movements to bring a new target into view. Approach and orienting movements are alternately performed during animat navigation. Cumulative estimates of each movement are derived from interacting proprioceptive and visual cues. Movement sequences are stored within a motor working memory. Sequences of visual categories are stored in a sensory working memory. These working memories trigger learning of sensory and motor sequence categories, or plans, which together control planned movements. Predictively effective chunk combinations are selectively enhanced via reinforcement learning when the animat is rewarded. Selected planning chunks effect a gradual transition from variable reactive exploratory

  16. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  17. Threat of plastic pollution to seabirds is global, pervasive, and increasing

    OpenAIRE

    Wilcox, C; Van Sebille, E; Hardesty, BD

    2015-01-01

    Plastic pollution in the ocean is a rapidly emerging global environmental concern, with high concentrations (up to 580,000 pieces per km2) and a global distribution, driven by exponentially increasing production. Seabirds are particularly vulnerable to this type of pollution and are widely observed to ingest floating plastic. We used a mixture of literature surveys, oceanographic modeling, and ecological models to predict the risk of plastic ingestion to 186 seabird species globally. Impacts ...

  18. Global nuclear cleanout initiative 2004

    International Nuclear Information System (INIS)

    Edlow, J.; Gruber, G.

    2004-01-01

    Full text: During more than 50 years of Atoms for Peace programmes nuclear materials were spread out worldwide. Stranded nuclear materials from nuclear research are left over without any safe back-end solution. 'Dirty Bombs' or so-called 'Radioactive Dispersal Devices (RDD)' are no longer science fiction since the world experienced the 9/11 attack. Governmental, NGO's and private industry organizations having discussed Global Nuclear Cleanout since then and start to take actions. The US Department of Energy (DOE) has announced to establish a dedicated organization in cooperation with IAEA and start the 'Global Threat Reduction Initiative (GTRI)'. The US government will allocate to that program USD 450 M over the next 10 years. Besides the historical development the paper will focus on the progress of the different initiatives and perspectives to threat reduction. (author)

  19. NON-TRADITIONAL SECURITY THREATS IN CENTRAL ASIA REGIONAL PERSPECTIVE OF COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Ramakant Trivedi

    2011-01-01

    Full Text Available Abstract: The article explores the roots and current state of religious extremism in Central Asia, as well as investigates its connections with the global salafi movement. It evaluates attempts of the regional players and external stakeholders to address the existing threats, and provides recommendations for their advancement.

  20. Local Reasons to Give Globally: Identity Extension and Global Cooperation.

    Science.gov (United States)

    Buchan, Nancy R; Jeong, Sophia Soyoung; Ward, A K

    2017-11-14

    Recent political events across the world suggest a retrenchment from globalization and a possible increase in parochialism. This inward-looking threat from parochialism occurs just as the global community faces growing challenges that require trans-national cooperation. In this research, we question if strong identification with an in-group necessarily leads to parochialism and ultimately is detrimental to global cooperation. Building on research on global social identification, we explore whether strong local identification can expand in inclusiveness to global identification, and among whom this is likely to happen. The results of our global public goods study - conducted in South Korea and the United States - show that high levels of social identification with a local group can extend to the global collective, particularly for individuals who are also high in concern-for-others. Furthermore, this identification translates into behavior that benefits the global, anonymous group at a cost to oneself. These results shed light on how to avoid the trap of parochialism and instead engender cooperative behavior with the broader global community.

  1. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  2. Development and the global environment

    International Nuclear Information System (INIS)

    Colombo, U.

    1992-01-01

    The development of the Third World and the protection of the environment are two major global problems interconnected by energy - the motor of economic growth and the main cause of deterioration of the global environment. They can no longer be separated. The threats of ozone, acid rain, and global warming are global in scope and solutions must involve energy consumption, conservations, and renewable resources. The precept that development should hinge on sound management of natural resources and the environment no longer has merely local or regional significance. It is a global concern and each person should feel a sense of ethical commitment as a world citizen

  3. Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues

    National Research Council Canada - National Science Library

    Lipson, Howard

    2002-01-01

    .... The anonymity enjoyed by today's cyber-attackers poses a grave threat to the global information society, the progress of an information-based international economy, and the advancement of global...

  4. Medical Tourism, Medical Migration, and Global Justice: Implications for Biosecurity in a Globalized World.

    Science.gov (United States)

    Cohen, I Glenn

    2017-05-01

    We live in the age of globalization. In medicine, that globalization has brought many benefits such as the diffusion of technology and the spread of health care training, but it has also brought threats to biosecurity. This article examines how medical tourism and medical migration pose risks to biosecurity. It also argues that designing legal responses to these risks requires not only technical competence but also a theory of global justice to guide that design. © The Author 2017. Published by Oxford University Press; all rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  6. Security Requirements for New Threats at International Airports

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2018-03-01

    Full Text Available The paper refers to security requirements for new threats international airports, taking specifically into consideration current challenges within processing of passengers, in light of types of current major threats, in a way ensuring positive passenger experience within their journey. In addition, within the scope of this paper, presented initial outcome of study research among professional aviation stakeholder?s environment, on current threats in the area of security and protection of airport infrastructure. The airports are a very demanding environment: seasonal traffic, fluctuating passenger volumes and last minute changes mean there is a lot of flexibility required in order to meet specific needs of airport authorities and their clients or the passengers (Dolnik, 2009. Therefore, security in aviation sector has been a big issue for civil aviation authorities, as airports are susceptible targets for terrorist attacks. The list of incidents is extensive and gets longer every year despite strict security measures. Within decades, aviation has become the backbone of our global economy bringing people to business, tourists to vacation destinations and products to markets. Statistically flying remains the safest mode of travelling compared to other modes of transportation. However, simultaneously terrorists and criminals continue in their quest to explore new ways of disrupting air transportation and the challenge to secure airports and airline assets remain real. This calls for greater awareness of security concerns in the aviation sector. The key element, how to protects against terrorist modus operandi, is to stay ahead of recent threats, incidents and breaches occurring worldwide. It requires implementation of effective data sharing systems, in order to proactively monitor potential risks and vulnerabilities within different type of aviation ecosystems.

  7. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  8. Biological diversity, ecology and global climate change

    International Nuclear Information System (INIS)

    Jutro, P.R.

    1991-01-01

    Worldwide climate change and loss of biodiversity are issues of global scope and importance that have recently become subjects of considerable public concern. Their perceived threat lies in their potential to disrupt ecological functioning and stability rather than from any direct threat they may pose to human health. Over the last 5 years, the international scientific community and the general public have become aware of the implications that atmospheric warming might have for world climate patterns and the resulting changes in the persistence, location, and composition of ecosystems worldwide. Human activities are currently responsible for a species loss rate that is the most extreme in millions of years, and an alarmingly increasing rate of transformation and fragmentation of natural landscapes. In the case of both global warming and reduction of biological diversity, man is affecting nature in an unprecedented fashion, on a global scale, and with unpredictable and frequently irreversible results

  9. Global warming

    CERN Document Server

    Hulme, M

    1998-01-01

    Global warming-like deforestation, the ozone hole and the loss of species- has become one of the late 20the century icons of global environmental damage. The threat, is not the reality, of such a global climate change has motivated governments. businesses and environmental organisations, to take serious action ot try and achieve serious control of the future climate. This culminated last December in Kyoto in the agreement for legally-binding climate protocol. In this series of three lectures I will provide a perspective on the phenomenon of global warming that accepts the scientific basis for our concern, but one that also recognises the dynamic interaction between climate and society that has always exited The future will be no different. The challenge of global warning is not to pretend it is not happening (as with some pressure groups), nor to pretend it threatens global civilisation (as with other pressure groups), and it is not even a challenge to try and stop it from happening-we are too far down the ro...

  10. THE U.S. AS THE NEW ROME: DISPUTING THE NEW WORLD ORDER

    Directory of Open Access Journals (Sweden)

    O. I. Ivonina

    2016-01-01

    Full Text Available The starting point of the conclusions of politicians and experts was the recognition of the changed nature of threats to the New World Order. In post-Westfalia system of international relations the main actors are not sovereigns, but transnational actors of world politics, including transnational terrorist and criminal networks. In this situation, the support of global security threat serves the underground world – terrorists, shady business structures, failed states. The unconventional nature of the threat to peace and stability of the New World Order requires an equally innovative response which transcends the formal constraints of international law and the traditional doctrine of deterrence. An analysis of the U.S. foreign policy concepts suggests that today’s academic and political community has promoted consensus of neoliberals and neoconservatives, supporters of the institutional functionalism and representatives of the school of Realpolitik. This consensus was based on the recognition of the admissibility of pre-emptive strikes on the territory of failed states, sponsoring international terrorism, or the implementation of open interference in the internal affairs of “rogue states” for human rights and democratic freedoms guarantee.

  11. FACTORS OF FOREIGN MILITARY INTERVENTION RISK ASSESSMENT IN THE MODERN WORLD

    Directory of Open Access Journals (Sweden)

    A. A. Ivanov

    2016-01-01

    Full Text Available The starting point of the conclusions of politicians and experts was the recognition of the changed nature of threats to the New World Order. In post-Westfalia system of international relations the main actors are not sovereigns, but transnational actors of world politics, including transnational terrorist and criminal networks. In this situation, the support of global security threat serves the underground world – terrorists, shady business structures, failed states. The unconventional nature of the threat to peace and stability of the New World Order requires an equally innovative response which transcends the formal constraints of international law and the traditional doctrine of deterrence. An analysis of the U.S. foreign policy concepts suggests that today’s academic and political community has promoted consensus of neoliberals and neoconservatives, supporters of the institutional functionalism and representatives of the school of Realpolitik. This consensus was based on the recognition of the admissibility of pre-emptive strikes on the territory of failed states, sponsoring international terrorism, or the implementation of open interference in the internal affairs of “rogue states” for human rights and democratic freedoms guarantee.

  12. Introductory remarks at the Global Threat Reduction Initiative Partners Conference (GTRI). 18 September 2004, Vienna, Austria

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    The security of nuclear and other radioactive material has taken on dramatically heightened significance in recent years, due to a number of factors: first, the increasing awareness that nuclear weapons related 'know-how' is no longer confined to a relatively few countries; second, the uncovering of an illicit procurement network capable of supplying nuclear designs and equipment; and third, the rise of extremist groups that have demonstrated an interest in obtaining and using nuclear and radiological weapons. Against this background, the need to protect nuclear material and facilities, and to control nuclear material and radioactive sources, has become an ever more global priority. The IAEA has been active in the field of nuclear security for many years, but the urgency and scope of our efforts underwent a 'sea-change' in the months following September 2001. International cooperation has become the hallmark of these security efforts. While nuclear security is and should remain a national responsibility, many countries still lack the programmes and the resources to respond properly to the threat of nuclear and radiological terrorism. International efforts are focused both on assisting these countries in strengthening their programmes, and on building global networks for combating cross-border threats. The Agency's work has three main points of focus: prevention, detection and response. Our first objective is to assist States in preventing any illicit or non-peaceful use of nuclear or other radioactive materials - including acts of terrorism. This requires effective physical protection of nuclear materials in use, storage and transport, as well as protection of related nuclear facilities. It demands strong State programmes for accounting and control of nuclear material. It recognizes the benefits of the conversion of research reactors to use low enriched uranium a process that requires substantial funding and, in some cases, the development of technological

  13. Global Inventory of Methane Hydrate: How Large is the Threat? (Invited)

    Science.gov (United States)

    Buffett, B. A.; Frederick, J. M.

    2010-12-01

    Methane hydrate is a dark horse in the science of climate change. The volume of methane sequestered in marine sediments is large enough to pose a potential threat, yet the expected contribution to future warming is not known. Part of the uncertainty lies in the poorly understood details of methane release from hydrate. Slow, diffusive loss of methane probably results in oxidation by sulfate and precipitation to CaCO3 in the sediments, with little effect on climate. Conversely, a direct release of methane into the atmosphere is liable to have strong and immediate consequences. Progress in narrowing the possibilities requires a better understanding of the mechanisms responsible for methane release. Improvements are also needed in our estimates of the hydrate inventory, as this sets a limit on the possible response. Several recent estimates of the hydrate inventory have been constructed using mechanistic models. Many of the model parameters (e.g. sedimentation rate and sea floor temperature) can be estimated globally, while others (e.g. vertical fluid flow) are not well known. Available observations can be used to estimate the poorly known parameters, but it is reasonable to question whether the results from a limited number of sites are representative of other locations. Fluid flow is a case in point because most hydrate locations are associated with upward flow. On the other hand, simple models of sediment compaction predict downward flow relative to the sea floor, which acts to impede hydrate formation. A variety of mechanisms can produce upward flow, including time-dependent sedimentation, seafloor topography, subsurface fractures, dehydration of clay minerals and gradual burial of methane hydrate below the stability zone. Each of these mechanisms makes specific predictions for the magnitude of flow and the proportion of sea floor that is likely to be affected. We assess the role of fluid flow on the present-day inventory and show that the current estimates for

  14. Algal blooms: an emerging threat to seawater reverse osmosis desalination

    KAUST Repository

    Villacorte, Loreen O.

    2014-08-04

    Seawater reverse osmosis (SWRO) desalination technology has been rapidly growing in terms of installed capacity and global application over the last decade. An emerging threat to SWRO application is the seasonal proliferation of microscopic algae in seawater known as algal blooms. Such blooms have caused operational problems in SWRO plants due to clogging and poor effluent quality of the pre-treatment system which eventually forced the shutdown of various desalination plants to avoid irreversible fouling of downstream SWRO membranes. This article summarizes the current state of SWRO technology and the emerging threat of algal blooms to its application. It also highlights the importance of studying the algal bloom phenomena in the perspective of seawater desalination, so proper mitigation and preventive strategies can be developed in the near future. © 2014 © 2014 Balaban Desalination Publications. All rights reserved.

  15. Algal blooms: an emerging threat to seawater reverse osmosis desalination

    KAUST Repository

    Villacorte, Loreen O.; Tabatabai, S. Assiyeh Alizadeh; Dhakal, N.; Amy, Gary L.; Schippers, Jan Cornelis; Kennedy, Maria Dolores

    2014-01-01

    Seawater reverse osmosis (SWRO) desalination technology has been rapidly growing in terms of installed capacity and global application over the last decade. An emerging threat to SWRO application is the seasonal proliferation of microscopic algae in seawater known as algal blooms. Such blooms have caused operational problems in SWRO plants due to clogging and poor effluent quality of the pre-treatment system which eventually forced the shutdown of various desalination plants to avoid irreversible fouling of downstream SWRO membranes. This article summarizes the current state of SWRO technology and the emerging threat of algal blooms to its application. It also highlights the importance of studying the algal bloom phenomena in the perspective of seawater desalination, so proper mitigation and preventive strategies can be developed in the near future. © 2014 © 2014 Balaban Desalination Publications. All rights reserved.

  16. Drylands face potential threat under 2 °C global warming target

    Science.gov (United States)

    Huang, Jianping; Yu, Haipeng; Dai, Aiguo; Wei, Yun; Kang, Litai

    2017-06-01

    The Paris Agreement aims to limit global mean surface warming to less than 2 °C relative to pre-industrial levels. However, we show this target is acceptable only for humid lands, whereas drylands will bear greater warming risks. Over the past century, surface warming over global drylands (1.2-1.3 °C) has been 20-40% higher than that over humid lands (0.8-1.0 °C), while anthropogenic CO2 emissions generated from drylands (~230 Gt) have been only ~30% of those generated from humid lands (~750 Gt). For the twenty-first century, warming of 3.2-4.0 °C (2.4-2.6 °C) over drylands (humid lands) could occur when global warming reaches 2.0 °C, indicating ~44% more warming over drylands than humid lands. Decreased maize yields and runoff, increased long-lasting drought and more favourable conditions for malaria transmission are greatest over drylands if global warming were to rise from 1.5 °C to 2.0 °C. Our analyses indicate that ~38% of the world's population living in drylands would suffer the effects of climate change due to emissions primarily from humid lands. If the 1.5 °C warming limit were attained, the mean warming over drylands could be within 3.0 °C therefore it is necessary to keep global warming within 1.5 °C to prevent disastrous effects over drylands.

  17. Global warming and extinctions of endemic species from biodiversity hotspots.

    Science.gov (United States)

    Malcolm, Jay R; Liu, Canran; Neilson, Ronald P; Hansen, Lara; Hannah, Lee

    2006-04-01

    Global warming is a key threat to biodiversity, but few researchers have assessed the magnitude of this threat at the global scale. We used major vegetation types (biomes) as proxies for natural habitats and, based on projected future biome distributions under doubled-CO2 climates, calculated changes in habitat areas and associated extinctions of endemic plant and vertebrate species in biodiversity hotspots. Because of numerous uncertainties in this approach, we undertook a sensitivity analysis of multiple factors that included (1) two global vegetation models, (2) different numbers of biome classes in our biome classification schemes, (3) different assumptions about whether species distributions were biome specific or not, and (4) different migration capabilities. Extinctions were calculated using both species-area and endemic-area relationships. In addition, average required migration rates were calculated for each hotspot assuming a doubled-CO2 climate in 100 years. Projected percent extinctions ranged from hotspots were the Cape Floristic Region, Caribbean, Indo-Burma, Mediterranean Basin, Southwest Australia, and Tropical Andes, where plant extinctions per hotspot sometimes exceeded 2000 species. Under the assumption that projected habitat changes were attained in 100 years, estimated global-warming-induced rates of species extinctions in tropical hotspots in some cases exceeded those due to deforestation, supporting suggestions that global warming is one of the most serious threats to the planet's biodiversity.

  18. Dogs That Haven't Barked: Towards an Understanding of the Absence of Expected Technological Threats Workshop Bibliography

    Energy Technology Data Exchange (ETDEWEB)

    Roseman, Mallory [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Zikry, Fareeda [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-12-13

    Lawrence Livermore National Laboratory’s Center for Global Security Research hosted a workshop to investigate why some consistently predicted threats from science and technology (S&T) have not manifested with the impacts to international security as forecasted. During the workshop, “Dogs That Haven’t Barked: Towards an Understanding of the Absence of Expected Technological Threats,” participants used two specific cases to focus the discussion: biotechnology and man-portable air defense systems (MANPADS).

  19. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  20. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  1. The emergence of Ebola as a global health security threat: From ′lessons learned′ to coordinated multilateral containment efforts

    Directory of Open Access Journals (Sweden)

    Sarathi Kalra

    2014-01-01

    Full Text Available First reported in remote villages of Africa in the 1970s, the Ebolavirus was originally believed to be transmitted to people from wild animals. Ebolavirus (EBOV causes a severe, frequently fatal hemorrhagic syndrome in humans. Each outbreak of the Ebolavirus over the last three decades has perpetuated fear and economic turmoil among the local and regional populations in Africa. Until now it has been considered a tragic malady confined largely to the isolated regions of the African continent, but it is no longer so. The frequency of outbreaks has increased since the 1970s. The 2014 Ebola outbreak in Western Africa has been the most severe in history and was declared a public health emergency by the World Health Organization. Given the widespread use of modern transportation and global travel, the EBOV is now a risk to the entire Global Village, with intercontinental transmission only an airplane flight away. Clinically, symptoms typically appear after an incubation period of approximately 11 days. A flu-like syndrome can progress to full hemorrhagic fever with multiorgan failure, and frequently, death. Diagnosis is confirmed by detection of viral antigens or Ribonucleic acid (RNA in the blood or other body fluids. Although historically the mortality of this infection exceeded 80%, modern medicine and public health measures have been able to lower this figure and reduce the impact of EBOV on individuals and communities. The treatment involves early, aggressive supportive care with rehydration. Core interventions, including contact tracing, preventive initiatives, active surveillance, effective isolation and quarantine procedures, and timely response to patients, are essential for a successful outbreak control. These measures, combined with public health education, point-of-care diagnostics, promising new vaccine and pharmaceutical efforts, and coordinated efforts of the international community, give new hope to the Global effort to eliminate Ebola

  2. The Emergence of Ebola as a Global Health Security Threat: From ‘Lessons Learned’ to Coordinated Multilateral Containment Efforts

    Science.gov (United States)

    Kalra, Sarathi; Kelkar, Dhanashree; Galwankar, Sagar C.; Papadimos, Thomas J.; Stawicki, Stanislaw P.; Arquilla, Bonnie; Hoey, Brian A.; Sharpe, Richard P.; Sabol, Donna; Jahre, Jeffrey A.

    2014-01-01

    First reported in remote villages of Africa in the 1970s, the Ebolavirus was originally believed to be transmitted to people from wild animals. Ebolavirus (EBOV) causes a severe, frequently fatal hemorrhagic syndrome in humans. Each outbreak of the Ebolavirus over the last three decades has perpetuated fear and economic turmoil among the local and regional populations in Africa. Until now it has been considered a tragic malady confined largely to the isolated regions of the African continent, but it is no longer so. The frequency of outbreaks has increased since the 1970s. The 2014 Ebola outbreak in Western Africa has been the most severe in history and was declared a public health emergency by the World Health Organization. Given the widespread use of modern transportation and global travel, the EBOV is now a risk to the entire Global Village, with intercontinental transmission only an airplane flight away. Clinically, symptoms typically appear after an incubation period of approximately 11 days. A flu-like syndrome can progress to full hemorrhagic fever with multiorgan failure, and frequently, death. Diagnosis is confirmed by detection of viral antigens or Ribonucleic acid (RNA) in the blood or other body fluids. Although historically the mortality of this infection exceeded 80%, modern medicine and public health measures have been able to lower this figure and reduce the impact of EBOV on individuals and communities. The treatment involves early, aggressive supportive care with rehydration. Core interventions, including contact tracing, preventive initiatives, active surveillance, effective isolation and quarantine procedures, and timely response to patients, are essential for a successful outbreak control. These measures, combined with public health education, point-of-care diagnostics, promising new vaccine and pharmaceutical efforts, and coordinated efforts of the international community, give new hope to the Global effort to eliminate Ebola as a public

  3. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  4. Population mobility, globalization, and antimicrobial drug resistance.

    Science.gov (United States)

    MacPherson, Douglas W; Gushulak, Brian D; Baine, William B; Bala, Shukal; Gubbins, Paul O; Holtom, Paul; Segarra-Newnham, Marisel

    2009-11-01

    Population mobility is a main factor in globalization of public health threats and risks, specifically distribution of antimicrobial drug-resistant organisms. Drug resistance is a major risk in healthcare settings and is emerging as a problem in community-acquired infections. Traditional health policy approaches have focused on diseases of global public health significance such as tuberculosis, yellow fever, and cholera; however, new diseases and resistant organisms challenge existing approaches. Clinical implications and health policy challenges associated with movement of persons across barriers permeable to products, pathogens, and toxins (e.g., geopolitical borders, patient care environments) are complex. Outcomes are complicated by high numbers of persons who move across disparate and diverse settings of disease threat and risk. Existing policies and processes lack design and capacity to prevent or mitigate adverse health outcomes. We propose an approach to global public health risk management that integrates population factors with effective and timely application of policies and processes.

  5. Patterns and biases of climate change threats in the IUCN Red List.

    Science.gov (United States)

    Trull, Nicholas; Böhm, Monika; Carr, Jamie

    2018-02-01

    International Union for Conservation of Nature (IUCN) Red List assessments rely on published data and expert inputs, and biases can be introduced where underlying definitions and concepts are ambiguous. Consideration of climate change threat is no exception, and recently numerous approaches to assessing the threat of climate change to species have been developed. We explored IUCN Red List assessments of amphibians and birds to determine whether species listed as threatened by climate change display distinct patterns in terms of habitat occupied and additional nonclimatic threats faced. We compared IUCN Red List data with a published data set of species' biological and ecological traits believed to infer high vulnerability to climate change and determined whether distributions of climate change-threatened species on the IUCN Red List concur with those of climate change-threatened species identified with the trait-based approach and whether species possessing these traits are more likely to have climate change listed as a threat on the IUCN Red List. Species in some ecosystems (e.g., grassland, shrubland) and subject to particular threats (e.g., invasive species) were more likely to have climate change as a listed threat. Geographical patterns of climate change-threatened amphibians and birds on the IUCN Red List were incongruent with patterns of global species richness and patterns identified using trait-based approaches. Certain traits were linked to increases or decreases in the likelihood of a species being threatened by climate change. Broad temperature tolerance of a species was consistently related to an increased likelihood of climate change threat, indicating counterintuitive relationships in IUCN assessments. To improve the robustness of species assessments of the vulnerability or extinction risk associated with climate change, we suggest IUCN adopt a more cohesive approach whereby specific traits highlighted by our results are considered in Red List

  6. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  7. The Sickening Implications of Globalization.

    Science.gov (United States)

    Keigher, Sharon M.; Lowery, Christine T.

    1998-01-01

    "We are all in this together..." begins this review of the threats of globalization. Topics discussed include malnutrition, infectious diseases, urbanization, border protection, poverty, "lifestyle" diseases, the risks of technology, and war. Alternatives to the present trend toward capitalist transformation, possible and practical reforms are…

  8. Indigenous ExtrACTIVISM in Boreal Canada: Colonial Legacies, Contemporary Struggles and Sovereign Futures

    Directory of Open Access Journals (Sweden)

    Anna J. Willow

    2016-07-01

    Full Text Available This article approaches contemporary extractivism as an environmentally and socially destructive extension of an enduring colonial societal structure. Manifested in massive hydroelectric developments, clearcut logging, mining, and unconventional oil and gas production, extractivism removes natural resources from their points of origin and dislocates the emplaced benefits they provide. Because externally imposed resource extraction threatens Indigenous peoples’ land-based self-determination, industrial sites often become contested, politicized landscapes. Consequently, I also illuminate the struggles of those who strive to turn dreams for sovereign futures into reality through extrACTIVIST resistance to extractivist schemes. Presenting four case synopses—from across Canada’s boreal forest and spanning a broad range of extractive undertakings—that highlight both sides of the extractivism/ACTIVISM formulation, this article exposes the political roots of resource-related conflicts and contributes to an emerging comparative political ecology of settler colonialism. While extractivism’s environmental effects are immediate and arresting, these physical transformations have significant cultural consequences that are underlain by profound political inequities. I ultimately suggest that because extractivism is colonial in its causal logic, effective opposition cannot emerge from environmentalism alone, but will instead arise from movements that pose systemic challenges to conjoined processes of social, economic, and environmental injustice.

  9. Historical evolution of human anthrax from occupational disease to potentially global threat as bioweapon.

    Science.gov (United States)

    D'Amelio, Enrico; Gentile, Bernardina; Lista, Florigio; D'Amelio, Raffaele

    2015-12-01

    Anthrax is caused by Bacillus anthracis, which can naturally infect livestock, wildlife and occupationally exposed humans. However, for its resistance due to spore formation, ease of dissemination, persistence in the environment and high virulence, B. anthracis has been considered the most serious bioterrorism agent for a long time. During the last century anthrax evolved from limited natural disease to potentially global threat if used as bioweapon. Several factors may mitigate the consequences of an anthrax attack, including 1. the capability to promptly recognize and manage the illness and its public health consequences; 2. the limitation of secondary contamination risk through an appropriate decontamination; and 3. the evolution of genotyping methods (for microbes characterization at high resolution level) that can influence the course and/or focus of investigations, impacting the response of the government to an attack. A PubMed search has been done using the key words “bioterrorism anthrax”. Over one thousand papers have been screened and the most significant examined to present a comprehensive literature review in order to discuss the current knowledge and strategies in preparedness for a possible deliberate release of B. anthracis spores and to indicate the most current and complete documents in which to deepen. The comprehensive analysis of the two most relevant unnatural anthrax release events, Sverdlovsk in the former Soviet Union (1979) and the contaminated letters in the USA (2001), shows that inhalational anthrax may easily and cheaply be spread resulting in serious consequences. The damage caused by an anthrax attack can be limited if public health organization, first responders, researchers and investigators will be able to promptly manage anthrax cases and use new technologies for decontamination methods and in forensic microbiology.

  10. [The global climate: a sick patient

    DEFF Research Database (Denmark)

    Lidegaard, O.; Lidegaard, M.

    2008-01-01

    , and major climatic disasters, including health threats to millions of people, are probable if the CO2 emission increases further. Therefore, serious global initiatives should be taken now in order to prevent global over heating. Denmark should be at the forefront of these initiatives Udgivelsesdato: 2008/8/25......Over the last 100 years the human use of fossil fuel has increased the atmospheric CO2 content from 280 parts per million (ppm) to 380 ppm. This increase is expected to increase the global average temperature by a few degrees. The global climate is very sensitive to an increase in temperature...

  11. Inclusion of Premeditated Threats in the Safety Methodology for NPPs

    International Nuclear Information System (INIS)

    Levanon, I.

    2014-01-01

    During the last decade the global effort to prevent terrorism or to mitigate its harm, if prevention fails, has increased. The nuclear power community was involved in this effort trying to prevent terrorist attacks on NPPs (Nuclear Power Plants). A natural extension of terror restraining is the prevention of any premeditated damage to the plant, including acts of state. The pre-feasibility study of an Israeli NPP, conducted by the Ministry of National Infrastructures, has identified the risk of hostile damage to the NPP as a major obstacle to the establishment of nuclear power in Israel, second only to the refusal of nuclear exporting nations to sell an NPP to Israelv. The General Director of the Ministry and the Head of the IAEC (Israeli Atomic Energy Commission) have approved continuation of the pre-feasibility study. This synopsis presents a study, regarding premeditated threats to NPPs, commissioned by the Ministry of National Infrastructures as part of the continuation. It focuses on the safety aspect of premeditated threats originating outside the plant, although a significant part of the analysis can be extended to other subjects such as theft or diversion of strategic materials. The study deals only with methodology and does not encompass specific threats or protection measures. Conclusions and recommendations and marked by bold italics Arial font. The theory of nuclear safety regarding non-premeditated safety events (equipment failures, human errors, natural events, etc.) is well developed. The study refers to these events and the theory attached to them as c lassical , distinguishing them from premeditated events. The study defines two postulates, related to premeditated threats: Correspondence – We should adopt the classical methodology whenever possible. Regulation – The safety of an NPP from premeditated threats requires examination, approval and inspection by a regulator. Key issues of the methodology with substantial differences from the

  12. From Avoidance to Activism: The Responsible Investment Frameworks of the Norwegian Government Pension Fund Global, the New Zealand Superannuation Fund and California Public Employees’ Retirement System 2000 – 2016

    OpenAIRE

    Kristensen, Maren Diesen

    2016-01-01

    Socially responsible investing (SRI) has since the late 1990s, grown to become an important concept in the global financial industry. This growth has mainly been led by institutional investors, such as pension funds and sovereign wealth funds (SWFs) who, in the early 2000s, became aware of the necessity of behaving as real owners of companies and of adopting a long-term view of investing. As these investors started to embrace SRI, they steered the understanding of SRI away from the original e...

  13. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  14. Admitting Syrian Refugees: Is The Threat of Islamic State Infiltration Justified

    Science.gov (United States)

    2017-06-01

    discrimination from their hosts, radical Islamic ideology may find a receptive audience , particularly among second- and third-generation children of...theatricality, suspense, and threat of danger inherent in terrorism enhance its attention- getting qualities.”163 Furthermore, “As the audience grows larger...IS has grown in size and scope, unique from Al Qaeda in that it “coerces local populations while advertising to a global audience .”174 Its caliphate

  15. Globalization and psychology.

    Science.gov (United States)

    Chiu, Chi-Yue; Kwan, Letty Yan-Yee

    2016-04-01

    In globalized societies, people often encounter symbols of diverse cultures in the same space at the same time. Simultaneous exposure to diverse cultures draws people's attention to cultural differences and promotes catergorical perceptions of culture. Local cultural identification and presence of cultural threat increase the likelihood of resisting inflow of foreign cultures (exclusionary reactions). When cultures are seen as intellectual resources, foreign cultural exposure affords intercultural learning and enhances individual creativity (integrative reactions). Psychological studies of globalization attest to the utility of treating cultures as evolving, interacting systems, rather than static, independent entities. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Moving towards global health equity: Opportunities and threats: An ...

    African Journals Online (AJOL)

    MESKE

    time in recent history. ... Results: Equity has been a long quest in public health and global health equity could be seen as part of ... Sub-Saharan Africa will remain an enduring preoccupation ..... In recent years, “Equity as a shared vision for health and ..... skilled workers is evolving as a policy position in the US and Europe.

  17. Higher Education in the Global Market: Opportunities and Threats

    Science.gov (United States)

    Singh, Navin

    2011-01-01

    The world is marked by the twin processes of economic and cultural globalization in an era of information technology. The identities of all societies are evolving as social and political boundaries are shrinking day-by-day. As a result of significant economic and political changes, cross-cultural contact is at an all-time high in human history.…

  18. Economic liberalization and globalization vs. India's poor

    OpenAIRE

    Oschinski, Matthias

    2003-01-01

    Today, many in the national and international NGO community perceive globalization and economic liberalization as a threat claiming that it widens inequalities and increases overall poverty. While it is true that inequality is on the rise in a rapidly globalizing world the real culprit is not globalization itself but rather a lack of economic reforms and economic liberalization. This paper aims to show that many in the international NGO community confuse cause and effect. The root cause of po...

  19. RECENT THREATS TO CLOUD COMPUTING DATA AND ITS PREVENTION MEASURES

    OpenAIRE

    Rahul Neware*

    2017-01-01

    As the cloud computing is expanding day by day due to its benefits like Cost, Speed Global Scale, Productivity, Performance, Reliability etc. Everyone, like Business vendors, governments etc are using the cloud computing to grow fast. Although Cloud Computing has above mentioned and other benefits but security of cloud is problems and due to this security problem adoption of cloud computing is not growing. This paper gives information about recent threats to the cloud computing data and its p...

  20. Economic optimization of a global strategy to address the pandemic threat.

    Science.gov (United States)

    Pike, Jamison; Bogich, Tiffany; Elwood, Sarah; Finnoff, David C; Daszak, Peter

    2014-12-30

    Emerging pandemics threaten global health and economies and are increasing in frequency. Globally coordinated strategies to combat pandemics, similar to current strategies that address climate change, are largely adaptive, in that they attempt to reduce the impact of a pathogen after it has emerged. However, like climate change, mitigation strategies have been developed that include programs to reduce the underlying drivers of pandemics, particularly animal-to-human disease transmission. Here, we use real options economic modeling of current globally coordinated adaptation strategies for pandemic prevention. We show that they would be optimally implemented within 27 y to reduce the annual rise of emerging infectious disease events by 50% at an estimated one-time cost of approximately $343.7 billion. We then analyze World Bank data on multilateral "One Health" pandemic mitigation programs. We find that, because most pandemics have animal origins, mitigation is a more cost-effective policy than business-as-usual adaptation programs, saving between $344.0.7 billion and $360.3 billion over the next 100 y if implemented today. We conclude that globally coordinated pandemic prevention policies need to be enacted urgently to be optimally effective and that strategies to mitigate pandemics by reducing the impact of their underlying drivers are likely to be more effective than business as usual.

  1. Global warming and north-south solidarity

    International Nuclear Information System (INIS)

    Islam, S.

    1998-01-01

    The discussion on climate change is based on 'contradictory certainties'. All sides claim to have found the truth. Much has been written and said about the connection between global warming, biodiversity and over population. The impoverished countries of the South se the insatiable intentions of the North as the major threat to the environment; and global warming as an excuse for stopping the economic development of the south

  2. H1N1, globalization and the epidemiology of inequality.

    Science.gov (United States)

    Sparke, Matthew; Anguelov, Dimitar

    2012-07-01

    This paper examines the lessons learned from the 2009 H1N1 pandemic in relation to wider work on globalization and the epidemiology of inequality. The media attention and economic resources diverted to the threats posed by H1N1 were significant inequalities themselves when contrasted with weaker responses to more lethal threats posed by other diseases associated with global inequality. However, the multiple inequalities revealed by H1N1 itself in 2009 still provide important insights into the future of global health in the context of market-led globalization. These lessons relate to at least four main forms of inequality: (1) inequalities in blame for the outbreak in the media; (2) inequalities in risk management; (3) inequalities in access to medicines; and (4) inequalities encoded in the actual emergence of new flu viruses. Copyright © 2011 Elsevier Ltd. All rights reserved.

  3. Major issues in threat analysis and resolving such problems: an addendum to the GAP analysis

    Directory of Open Access Journals (Sweden)

    T.D. Surasinghe

    2012-04-01

    Full Text Available Identification of regions that warrant conservation attention is a top priority among global environmental concerns. Conventionally, this objective was achieved via recognizing natural landscapes based on the number of IUCN Red Listed species, percentage of endemism and species diversity. A recent innovation in conservation biology is the use of GIS-based threat analysis models to identify key areas of conservation importance. Compared with GAP Analysis, which only identifies biodiversity-rich unprotected lands, threat analysis serves as a rigorous tool in conservation planning which specifically recognizes threats and habitat suitability to different taxa based on a spatially-explicit analysis. Threat analysis is a highly flexible process which involves building up a model with multiple independent (without autocorrelations variables that both positively and negatively affect distribution and population persistence of a concerned species. Parameters include rate of land-use change, population density, population growth rate, land management regimes, protection status, habitat suitability and land stewardship. Threat analysis models can be used to understand the current status of a particular species (or a community and can be used to project future trends about the species under consideration. This publication provides an overview of uses of GIS-based threat analyses in conservation biology and provides insights on the limitations of these models and the directions that should be taken in future.

  4. Cyber Threats for Organizations of Financial Market Infrastructures

    Directory of Open Access Journals (Sweden)

    Natalia Georgievna Miloslavskaya

    2016-03-01

    Full Text Available Abstract: In the global informatization era the reliable and efficient financial market infrastructure of the Russian Federation (RF FMI plays an important role in the financial system and economy of the country. New cyber risks have acquired the status of the FR FMI systemic risk’s components, the importance of which is constantly growing due to the increase in the possible consequences of their implementation. The article introduces the basic concepts of cyber security, cyber space and cyber threats for the RF FMI and analyzes the specific features of cyber attacks against the RF FMI organizations.

  5. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  6. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  7. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  8. Economic optimization of a global strategy to address the pandemic threat

    Science.gov (United States)

    Pike, Jamison; Bogich, Tiffany; Elwood, Sarah; Finnoff, David C.; Daszak, Peter

    2014-01-01

    Emerging pandemics threaten global health and economies and are increasing in frequency. Globally coordinated strategies to combat pandemics, similar to current strategies that address climate change, are largely adaptive, in that they attempt to reduce the impact of a pathogen after it has emerged. However, like climate change, mitigation strategies have been developed that include programs to reduce the underlying drivers of pandemics, particularly animal-to-human disease transmission. Here, we use real options economic modeling of current globally coordinated adaptation strategies for pandemic prevention. We show that they would be optimally implemented within 27 y to reduce the annual rise of emerging infectious disease events by 50% at an estimated one-time cost of approximately $343.7 billion. We then analyze World Bank data on multilateral “One Health” pandemic mitigation programs. We find that, because most pandemics have animal origins, mitigation is a more cost-effective policy than business-as-usual adaptation programs, saving between $344.0.7 billion and $360.3 billion over the next 100 y if implemented today. We conclude that globally coordinated pandemic prevention policies need to be enacted urgently to be optimally effective and that strategies to mitigate pandemics by reducing the impact of their underlying drivers are likely to be more effective than business as usual. PMID:25512538

  9. EURO BÖLGESİ BORÇ KRİZİ İLE AVRUPA DÖVİZ KURU MEKANİZMASI KRİZİNİN KARŞILAŞTIRMALI ANALİZİ

    OpenAIRE

    BAYAR, Yrd.Doç.Dr.Yılmaz

    2014-01-01

    European integration process has reached stage of economic and monetary union nowadays. European Union met European Exchange-Rate Mechanism crisis and the ongoing Eurozone sovereign debt crisis during this integration process. Although European Exchange-Rate Mechanism crisis is a currency crisis which arose from a speculative attacks to foreign exchange rates and Eurozone sovereign debt crisis is a debt crisis which has arisen from the negative effects of global financial crisis, differences ...

  10. Coastal life is not under threat by the carbon dioxide emissions

    Directory of Open Access Journals (Sweden)

    Albert Parker

    2014-03-01

    Full Text Available The near future of coastal life is threated by the claim of global warming alarmist that sea levels will rise by one to seven metres by 2100, destroying many coastal cities and habitats. This paper shows that sea levels will more likely rise no more than just a few centimetres during this century as the Earth defrosts from the Little Ice Age 500 years ago with a mild warming.

  11. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  12. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  13. Determinants and Drivers of Infectious Disease Threat Events in Europe.

    Science.gov (United States)

    Semenza, Jan C; Lindgren, Elisabet; Balkanyi, Laszlo; Espinosa, Laura; Almqvist, My S; Penttinen, Pasi; Rocklöv, Joacim

    2016-04-01

    Infectious disease threat events (IDTEs) are increasing in frequency worldwide. We analyzed underlying drivers of 116 IDTEs detected in Europe during 2008-2013 by epidemic intelligence at the European Centre of Disease Prevention and Control. Seventeen drivers were identified and categorized into 3 groups: globalization and environment, sociodemographic, and public health systems. A combination of >2 drivers was responsible for most IDTEs. The driver category globalization and environment contributed to 61% of individual IDTEs, and the top 5 individual drivers of all IDTEs were travel and tourism, food and water quality, natural environment, global trade, and climate. Hierarchical cluster analysis of all drivers identified travel and tourism as a distinctly separate driver. Monitoring and modeling such disease drivers can help anticipate future IDTEs and strengthen control measures. More important, intervening directly on these underlying drivers can diminish the likelihood of the occurrence of an IDTE and reduce the associated human and economic costs.

  14. Major threats of pollution and climate change to global coastal ecosystems and enhanced management for sustainability

    NARCIS (Netherlands)

    Lu, Y.; Yuan, J.; Lu, X.; Su, Chao; Zhang, Y.; Wang, C.; Cao, X.; Li, Q.; Su, Jilan; Ittekkot, Venugopalan; Garbutt, Richard Angus; Bush, S.R.; Fletcher, Stephen; Wagey, Tonny; Kachur, Anatolii; Sweijd, Neville

    2018-01-01

    Coastal zone is of great importance in the provision of various valuable ecosystem services. However, it is also sensitive and vulnerable to environmental changes due to high human populations and interactions between the land and ocean. Major threats of pollution from over enrichment of nutrients,

  15. Nuclear Smuggling and Threats to Lithuanian Security

    Directory of Open Access Journals (Sweden)

    Murauskaitė Eglė

    2016-12-01

    Full Text Available The article explores threats related to illicit trafficking of radioactive materials and dual-use goods applicable in state level nuclear programs, actualizing the global trends for the Baltic region. The article points to Eastern Europe’s changing risk profile in this respect, as increasing penetration of Russian criminal groups inside Ukraine and the destabilized situations in neighboring countries create an environment where the risk of nuclear smuggling is on the rise. Criminal entities can be seen forming new bonds, with trafficking routes intersecting and zones of influence shifting - consequently, an unusual level of criminal involvement in nuclear smuggling is observed, alongside a geographic shift of smuggling patterns. In addition, states seeking materials and technologies for their military programs have taken a notable interest in this region as a way of circumventing international transit regulations. The article looks at the likely implications of these new nuclear smuggling trends for the security of the Baltic states. It suggests that Lithuania may soon be facing a relatively new threat, and one that it is ill-prepared to counter. The article discusses the risk factors and indicators to watch before that risk becomes reality, and offers ways for Lithuania to contribute to addressing these increasingly acute problems on a regional level.

  16. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  17. Ionospheric threats to the integrity of airborne GPS users

    Science.gov (United States)

    Datta-Barua, Seebany

    The Global Positioning System (GPS) has both revolutionized and entwined the worlds of aviation and atmospheric science. As the largest and most unpredictable source of GPS positioning error, the ionospheric layer of the atmosphere, if left unchecked, can endanger the safety, or "integrity," of the single frequency airborne user. An augmentation system is a differential-GPS-based navigation system that provides integrity through independent ionospheric monitoring by reference stations. However, the monitor stations are not in general colocated with the user's GPS receiver. The augmentation system must protect users from possible ionosphere density variations occurring between its measurements and the user's. This study analyzes observations from ionospherically active periods to identify what types of ionospheric disturbances may cause threats to user safety if left unmitigated. This work identifies when such disturbances may occur using a geomagnetic measure of activity and then considers two disturbances as case studies. The first case study indicates the need for a non-trivial threat model for the Federal Aviation Administration's Local Area Augmentation System (LAAS) that was not known prior to the work. The second case study uses ground- and space-based data to model an ionospheric disturbance of interest to the Federal Aviation Administration's Wide Area Augmentation System (WAAS). This work is a step in the justification for, and possible future refinement of, one of the WAAS integrity algorithms. For both WAAS and LAAS, integrity threats are basically caused by events that may be occurring but are unobservable. Prior to the data available in this solar cycle, events of such magnitude were not known to be possible. This work serves as evidence that the ionospheric threat models developed for WARS and LAAS are warranted and that they are sufficiently conservative to maintain user integrity even under extreme ionospheric behavior.

  18. Infant circumcision: the last stand for the dead dogma of parental (sovereignal) rights.

    Science.gov (United States)

    Van Howe, Robert S

    2013-07-01

    J S Mill used the term 'dead dogma' to describe a belief that has gone unquestioned for so long and to such a degree that people have little idea why they accept it or why they continue to believe it. When wives and children were considered chattel, it made sense for the head of a household to have a 'sovereignal right' to do as he wished with his property. Now that women and children are considered to have the full complement of human rights and slavery has been abolished, it is no longer acceptable for someone to have a 'right' to completely control the life of another human being. Revealingly, parental rights tend to be invoked only when parents want to do something that is arguably not in their child's best interest. Infant male circumcision is a case in point. Instead of parental rights, I claim that parents have an obligation to protect their children's rights as well as to preserve the future options of those children so far as possible. In this essay, it is argued that the notion that parents have a right to make decisions concerning their children's bodies and minds-irrespective of the child's best interests-is a dead dogma. The ramifications of this argument for the circumcision debate are then spelled out and discussed.

  19. Globalization and Health: Exploring the opportunities and constraints for health arising from globalization

    Science.gov (United States)

    Yach, Derek

    2005-01-01

    The tremendous benefits which have been conferred to almost 5 billion people through improved technologies and knowledge highlights the concomitant challenge of bringing these changes to the 1 billion people living mostly in sub-Saharan Africa and South Asia who are yet to benefit. There is a growing awareness of the need to reduce human suffering and of the necessary participation of governments, non-government organizations and industry within this process. This awareness has recently translated into new funding mechanisms to address HIV/Aids and vaccines, a global push for debt relief and better trade opportunities for the poorest countries, and recognition of how global norms that address food safety, infectious diseases and tobacco benefit all. 'Globalization and Health' will encourage an exchange of views on how the global architecture for health governance needs to changes in the light of global threats and opportunities. PMID:15847700

  20. Globalization and Health: Exploring the opportunities and constraints for health arising from globalization.

    Science.gov (United States)

    Yach, Derek

    2005-04-22

    The tremendous benefits which have been conferred to almost 5 billion people through improved technologies and knowledge highlights the concomitant challenge of bringing these changes to the 1 billion people living mostly in sub-Saharan Africa and South Asia who are yet to benefit. There is a growing awareness of the need to reduce human suffering and of the necessary participation of governments, non-government organizations and industry within this process. This awareness has recently translated into new funding mechanisms to address HIV/Aids and vaccines, a global push for debt relief and better trade opportunities for the poorest countries, and recognition of how global norms that address food safety, infectious diseases and tobacco benefit all. 'Globalization and Health' will encourage an exchange of views on how the global architecture for health governance needs to changes in the light of global threats and opportunities.

  1. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  2. The nuclear threat. 6. enl. ed.

    International Nuclear Information System (INIS)

    Anders, G.

    1993-01-01

    This is the sixth edition of 'The last days and end of time', augmented by a foreword, which was first published in 1972. The reflections it contains cannot become outdated because their object: the risk of global catastrophe, persists. But it continues to exist not only because we can never now hope to efface what knowledge we have of self-annihilation methods, but also because we have become frighteningly used to the fact of being threatened. What we fight is not this or that adversary who attacks, or might be got rid of, by nuclear means, but the nuclear situation as such. Since this enemy is the enemy of all human beings, those who up to now have considered each other as adversaries should rally as allies against the common threat. (orig./HP) [de

  3. SOVEREIGN WEALTH FUNDS IN CENTRAL AND EASTERN EUROPE: SCOPE AND METHODS OF FINANCIAL PENETRATION

    Directory of Open Access Journals (Sweden)

    Piotr Wiśniewski

    2015-08-01

    Full Text Available The Central and Eastern European (CEE capital markets (of Poland, Lithuania, Latvia, Estonia, the Czech Republic, Slovakia, Hungary, Ukraine and, to a limited extent, Belarus are gradually evolving towards increased breadth (diversity and depth (liquidity, however, they are still exposed to considerable cross-country volatility and interdependence spill-overs – especially in times of capital flight to more established asset classes (“safe havens”. Sovereign Wealth Funds (SWFs have widely been censured for their undesirable political interference and chronic operational opacity. This paper demonstrates that in CEE, contrary to widespread perceptions attributable to developed markets, SWFs can act as natural and powerful risk mitigators (contributing to a more stable capital base and reduced systemic volatility. Such a proposition is premised on several factors specific to SWFs oriented to CEE. They comprise: strategic long-termism and patience in overcoming interim pricing deficiencies, commitments to elements of a broadly interpreted infrastructure, and absence of overt conflicts of interest with the CEE host economies. The paper, besides reviewing the utilitarianism of SWFs in the CEE’s risk mitigation context, highlights regulatory and technical barriers to more SWF funding for CEE. It also recommends policy measures to the CEE economies aimed at luring more host-friendly SWF investment into the region.

  4. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  5. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  6. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  8. Hydrological threats to riparian wetlands of international importance – a global quantitative and qualitative analysis

    Directory of Open Access Journals (Sweden)

    C. Schneider

    2017-06-01

    Full Text Available Riparian wetlands have been disappearing at an accelerating rate. Their ecological integrity as well as their vital ecosystem services for humankind depend on regular patterns of inundation and drying provided by natural flow regimes. However, river hydrology has been altered worldwide. Dams cause less variable flow regimes and water abstractions decrease the amount of flow so that ecologically important flood pulses are often reduced. Given growing population pressure and projected climate change, immediate action is required. However, the implementation of counteractive measures is often a complex task. This study develops a screening tool for assessing hydrological threats to riparian wetlands on global scales. The approach is exemplified on 93 Ramsar sites, many of which are located in transboundary basins. First, the WaterGAP3 hydrological modeling framework is used to quantitatively compare current and future modified flow regimes to reference flow conditions. In our simulations current water resource management seriously impairs riparian wetland inundation at 29 % of the analyzed sites. A further 8 % experience significantly reduced flood pulses. In the future, eastern Europe, western Asia, as well as central South America could be hotspots of further flow modifications due to climate change. Second, a qualitative analysis of the 93 sites determined potential impact on overbank flows resulting from planned or proposed dam construction projects. They take place in one-third of the upstream areas and are likely to impair especially wetlands located in South America, Asia, and the Balkan Peninsula. Third, based on the existing legal/institutional framework and water resource availability upstream, further qualitative analysis evaluated the capacity to preserve overbank flows given future streamflow changes due to dam construction and climate change. Results indicate hotspots of vulnerability exist, especially in northern Africa and the

  9. The global partnership: its achievements, missed opportunities and potential to address future threats from the spread of CBRN materials and expertise - 59335

    International Nuclear Information System (INIS)

    Heyes, Alan; Bowen, Wyn; Chalmers, Hugh

    2012-01-01

    Document available in abstract form only. Full text of publication follows: In 2002, the G8 launched the Global Partnership (GP) against the Spread of Weapons and Materials of Mass Destruction. The partnerships budget was placed at $20 billion over 10 years, and it was supported by some 23 countries and the European Union (EU).Though it has had little public recognition, the partnership has been one of the G8's most successful initiatives and has led to many benefits, including improved international security and addressing a sizeable proportion of the Cold War nuclear and chemical weapons arsenal in the Former Soviet Union. Its future, however, remains undecided, as its funding is set to expire in less than two years. In 2009 and 2010 Kings College London with generous funding support from the US John D. and Catherine T. MacArthur Foundation, carried out a detailed evaluation of the achievements and benefits of the GP to date, its failings and lost opportunities, and potential future direction. Our findings indicate that the partnership has aided security in the Former Soviet Union and had a significant number of wider benefits with the potential to continue to do the same on a broader geographic level in future. As such, it is a valuable tool to assist the international community to work together to address global threats relating to chemical, biological, radiological and nuclear materials and related expertise and the G8 should take steps to renew its funding. (authors)

  10. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. A Poggean passport for fairness? Why Rawls’ Theory of Justice did not become global

    Directory of Open Access Journals (Sweden)

    Shmuel Nili

    2010-11-01

    Full Text Available Thomas Pogge has been challenging liberal thinking on global politics, often through critical engagement with John Rawls’ work. Pogge presents both normative and empirical arguments against Rawls: normatively, Rawls’ domestic Theory of Justice (TJ and global Law of Peoples (LP are incompatible ideal theories; empirically, LP is too removed from the actual world to guide the foreign policy of liberal societies. My main purpose here is to contest the first, ideal theory criticism in order to direct more attention to the second, non-ideal objection. I argue against Pogge that TJ and LP can be read as coherent, once one employs a Rousseauian rather than Pogge's economic Kantian reading of TJ. The first two sections present Pogge's view of TJ and contrast it with a Rousseauian alternative that is less cosmopolitan and economic and much more focused on the democratic and sovereign context of justice as fairness. The third section seeks to refute Pogge's incoherence arguments, which encompass the identity of the parties to the international original position, their motivations and their decisions. Instead of a conclusion, the last section emphasizes LP's non-ideal problems, and suggests that insofar as LP is the most robust liberal ideal theory of global politics, its empirical failure indicates the need to shift global justice theorizing even more to the non-ideal realm.

  12. Ultrasensitive microchip based on smart microgel for real-time online detection of trace threat analytes.

    Science.gov (United States)

    Lin, Shuo; Wang, Wei; Ju, Xiao-Jie; Xie, Rui; Liu, Zhuang; Yu, Hai-Rong; Zhang, Chuan; Chu, Liang-Yin

    2016-02-23

    Real-time online detection of trace threat analytes is critical for global sustainability, whereas the key challenge is how to efficiently convert and amplify analyte signals into simple readouts. Here we report an ultrasensitive microfluidic platform incorporated with smart microgel for real-time online detection of trace threat analytes. The microgel can swell responding to specific stimulus in flowing solution, resulting in efficient conversion of the stimulus signal into significantly amplified signal of flow-rate change; thus highly sensitive, fast, and selective detection can be achieved. We demonstrate this by incorporating ion-recognizable microgel for detecting trace Pb(2+), and connecting our platform with pipelines of tap water and wastewater for real-time online Pb(2+) detection to achieve timely pollution warning and terminating. This work provides a generalizable platform for incorporating myriad stimuli-responsive microgels to achieve ever-better performance for real-time online detection of various trace threat molecules, and may expand the scope of applications of detection techniques.

  13. Pollution from Fossil-Fuel Combustion is the Leading Environmental Threat to Global Pediatric Health and Equity: Solutions Exist

    Science.gov (United States)

    Perera, Frederica

    2017-01-01

    Fossil-fuel combustion by-products are the world’s most significant threat to children’s health and future and are major contributors to global inequality and environmental injustice. The emissions include a myriad of toxic air pollutants and carbon dioxide (CO2), which is the most important human-produced climate-altering greenhouse gas. Synergies between air pollution and climate change can magnify the harm to children. Impacts include impairment of cognitive and behavioral development, respiratory illness, and other chronic diseases—all of which may be “seeded“ in utero and affect health and functioning immediately and over the life course. By impairing children’s health, ability to learn, and potential to contribute to society, pollution and climate change cause children to become less resilient and the communities they live in to become less equitable. The developing fetus and young child are disproportionately affected by these exposures because of their immature defense mechanisms and rapid development, especially those in low- and middle-income countries where poverty and lack of resources compound the effects. No country is spared, however: even high-income countries, especially low-income communities and communities of color within them, are experiencing impacts of fossil fuel-related pollution, climate change and resultant widening inequality and environmental injustice. Global pediatric health is at a tipping point, with catastrophic consequences in the absence of bold action. Fortunately, technologies and interventions are at hand to reduce and prevent pollution and climate change, with large economic benefits documented or predicted. All cultures and communities share a concern for the health and well-being of present and future children: this shared value provides a politically powerful lever for action. The purpose of this commentary is to briefly review the data on the health impacts of fossil-fuel pollution, highlighting the

  14. Pollution from Fossil-Fuel Combustion is the Leading Environmental Threat to Global Pediatric Health and Equity: Solutions Exist.

    Science.gov (United States)

    Perera, Frederica

    2017-12-23

    Fossil-fuel combustion by-products are the world's most significant threat to children's health and future and are major contributors to global inequality and environmental injustice. The emissions include a myriad of toxic air pollutants and carbon dioxide (CO₂), which is the most important human-produced climate-altering greenhouse gas. Synergies between air pollution and climate change can magnify the harm to children. Impacts include impairment of cognitive and behavioral development, respiratory illness, and other chronic diseases-all of which may be "seeded" in utero and affect health and functioning immediately and over the life course. By impairing children's health, ability to learn, and potential to contribute to society, pollution and climate change cause children to become less resilient and the communities they live in to become less equitable. The developing fetus and young child are disproportionately affected by these exposures because of their immature defense mechanisms and rapid development, especially those in low- and middle-income countries where poverty and lack of resources compound the effects. No country is spared, however: even high-income countries, especially low-income communities and communities of color within them, are experiencing impacts of fossil fuel-related pollution, climate change and resultant widening inequality and environmental injustice. Global pediatric health is at a tipping point, with catastrophic consequences in the absence of bold action. Fortunately, technologies and interventions are at hand to reduce and prevent pollution and climate change, with large economic benefits documented or predicted. All cultures and communities share a concern for the health and well-being of present and future children: this shared value provides a politically powerful lever for action. The purpose of this commentary is to briefly review the data on the health impacts of fossil-fuel pollution, highlighting the neurodevelopmental

  15. Global malaria connectivity through air travel

    OpenAIRE

    Huang, Zhuojie; Tatem, Andrew J

    2013-01-01

    Background Air travel has expanded at an unprecedented rate and continues to do so. Its effects have been seen on malaria in rates of imported cases, local outbreaks in non-endemic areas and the global spread of drug resistance. With elimination and global eradication back on the agenda, changing levels and compositions of imported malaria in malaria-free countries, and the threat of artemisinin resistance spreading from Southeast Asia, there is a need to better understand how the modern flow...

  16. Are Sovereign Wealth Funds a Threat to Australia’s National Security?

    Science.gov (United States)

    2008-12-12

    to conduct cost and price transfer along the vertically owned production process to avoid Australian taxation and to destabilize the price of...economic 70 conditions to profit from exacerbating the Asian financial crisis. The Malaysian Prime Minister and officials in Thailand referred to Soros as

  17. Zika virus: Global health challenge, threat and current situation.

    Science.gov (United States)

    Aziz, Hafsa; Zia, Aadarash; Anwer, Amania; Aziz, Muneeba; Fatima, Shazia; Faheem, Muhammad

    2017-06-01

    ZIKV has emerged as grave global health issue in the past few years. ZIKV was firstly isolated in 1947 from a rhesus sentinel monkey in the Zika forest in Uganda. It is usually transmitted by the bite of infected mosquitoes and infects skin fibroblasts, skin keratinocytes, etc. ZIKV until now was under reported because of its clinical similarity with the dengue and chikungunya. It is usually spread through the course of the sylvatic cycle. In this cycle, the virus or pathogen lifespan is spent between the wild animal and vectors. The intrinsic incubation period is not yet fully known but it is observed that the very first symptoms of ZIKV infection can appear or develop within 3-12 days of time period and usually subside within 7 days of time. There is a strong relationship between prenatal Zika virus infection and microcephaly; other serious brain anomalies to the infant or newborn are Guillain-Barré syndrome. To date no vaccines are available for ZIKV prevention hence only symptomatic treatment is recommended in infected patients. Usually ZIKV is detected by serologic (IgM ELISA), plaque reduction neutralization test (PRNT) along with in-house" molecular techniques (RT-PCR). ZIKV infection being imminent global health issue warrants strong protective measures to prevent it from becoming an epidemic. Early detection and prevention is the key to tackle this grave potential health hazard. J. Med. Virol. 89:943-951, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  18. Comprehensive effective and efficient global public health surveillance

    Directory of Open Access Journals (Sweden)

    McNabb Scott JN

    2010-12-01

    Full Text Available Abstract At a crossroads, global public health surveillance exists in a fragmented state. Slow to detect, register, confirm, and analyze cases of public health significance, provide feedback, and communicate timely and useful information to stakeholders, global surveillance is neither maximally effective nor optimally efficient. Stakeholders lack a globa surveillance consensus policy and strategy; officials face inadequate training and scarce resources. Three movements now set the stage for transformation of surveillance: 1 adoption by Member States of the World Health Organization (WHO of the revised International Health Regulations (IHR[2005]; 2 maturation of information sciences and the penetration of information technologies to distal parts of the globe; and 3 consensus that the security and public health communities have overlapping interests and a mutual benefit in supporting public health functions. For these to enhance surveillance competencies, eight prerequisites should be in place: politics, policies, priorities, perspectives, procedures, practices, preparation, and payers. To achieve comprehensive, global surveillance, disparities in technical, logistic, governance, and financial capacities must be addressed. Challenges to closing these gaps include the lack of trust and transparency; perceived benefit at various levels; global governance to address data power and control; and specified financial support from globa partners. We propose an end-state perspective for comprehensive, effective and efficient global, multiple-hazard public health surveillance and describe a way forward to achieve it. This end-state is universal, global access to interoperable public health information when it’s needed, where it’s needed. This vision mitigates the tension between two fundamental human rights: first, the right to privacy, confidentiality, and security of personal health information combined with the right of sovereign, national entities

  19. Comprehensive effective and efficient global public health surveillance.

    Science.gov (United States)

    McNabb, Scott J N

    2010-12-03

    At a crossroads, global public health surveillance exists in a fragmented state. Slow to detect, register, confirm, and analyze cases of public health significance, provide feedback, and communicate timely and useful information to stakeholders, global surveillance is neither maximally effective nor optimally efficient. Stakeholders lack a globa surveillance consensus policy and strategy; officials face inadequate training and scarce resources.Three movements now set the stage for transformation of surveillance: 1) adoption by Member States of the World Health Organization (WHO) of the revised International Health Regulations (IHR[2005]); 2) maturation of information sciences and the penetration of information technologies to distal parts of the globe; and 3) consensus that the security and public health communities have overlapping interests and a mutual benefit in supporting public health functions. For these to enhance surveillance competencies, eight prerequisites should be in place: politics, policies, priorities, perspectives, procedures, practices, preparation, and payers.To achieve comprehensive, global surveillance, disparities in technical, logistic, governance, and financial capacities must be addressed. Challenges to closing these gaps include the lack of trust and transparency; perceived benefit at various levels; global governance to address data power and control; and specified financial support from globa partners.We propose an end-state perspective for comprehensive, effective and efficient global, multiple-hazard public health surveillance and describe a way forward to achieve it. This end-state is universal, global access to interoperable public health information when it's needed, where it's needed. This vision mitigates the tension between two fundamental human rights: first, the right to privacy, confidentiality, and security of personal health information combined with the right of sovereign, national entities to the ownership and stewardship

  20. From biodefence to biosecurity: the Obama administration's strategy for countering biological threats.

    Science.gov (United States)

    Koblentz, Gregory D

    2012-01-01

    The Seventh Review Conference of the Biological Weapons Convention (BWC), the first international treaty to outlaw an entire class of weapons, was held in Geneva in December 2011. On 7 December, Secretary of State Hillary Clinton became the highest-ranking US government official to address a BWC meeting. Secretary Clinton told the assembled delegation that ‘we view the risk of bioweapons attack as both a serious national security challenge and a foreign policy priority’. At the same time, she warned that a large-scale disease outbreak ‘could cripple an already fragile global economy’. Secretary Clinton's speech reflected a new understanding that the range of biological threats to international security has expanded from state-sponsored biological warfare programmes to include biological terrorism, dual-use research and naturally occurring infectious diseases such as pandemics. Recognizing these changes, President Barack Obama released a new national strategy for countering biological threats in 2009. This strategy represents a shift in thinking away from the George W. Bush administration's focus on biodefence, which emphasized preparing for and responding to biological weapon attacks, to the concept of biosecurity, which includes measures to prevent, prepare for and respond to naturally occurring and man-made biological threats. The Obama administration's biosecurity strategy seeks to reduce the global risk of naturally occurring and deliberate disease outbreaks through prevention, international cooperation, and maximizing synergies between health and security. The biosecurity strategy is closely aligned with the Obama administration's broader approach to foreign policy, which emphasizes the pragmatic use of smart power, multilateralism and engagement to further the national interest. This article describes the Obama administration's biosecurity strategy; highlights elements of continuity and change from the policies of the Bush administration; discusses

  1. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  2. Globalization, domestic politics, and transatlantic relations

    NARCIS (Netherlands)

    Burgoon, B.; Oliver, T.; Trubowitz, P.

    For two decades after the fall of the Berlin Wall, globalization functioned as a unifying force in the West. In the absence of a common security threat, the United States and Europe found common ground in a neoliberal agenda calling for the freer movements of capital, goods, services, and peoples

  3. Stewardship to tackle global phosphorus inefficiency

    DEFF Research Database (Denmark)

    Withers, Paul J. A.; Dijk, Kimo van; Neset, Tina-Simone

    2015-01-01

    The inefficient use of phosphorus (P) in the food chain is a threat to the global aquatic environment and the health and well-being of citizens, and it is depleting an essential finite natural resource critical for future food security and ecosystem function. We outline a strategic framework of 5R...

  4. Stewardship to tackle global phosphorus inefficiency

    NARCIS (Netherlands)

    Withers, P.J.A.; Dijk, van K.C.; Neset, T.S.S.; Nesme, Thomas; Oenema, Oene; Rubæk, G.H.; Schoumans, O.F.; Smit, Bert; Pellerin, Sylvain

    2015-01-01

    The inefficient use of phosphorus (P) in the food chain is a threat to the global aquatic environment and the health and well-being of citizens, and it is depleting an essential finite natural resource critical for future food security and ecosystem function. We outline a strategic framework of

  5. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  6. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  7. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  8. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  9. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  10. Ebola and Its Global Research Architecture—Need for an Improvement

    OpenAIRE

    Quarcoo, David; Brüggmann, Dörthe; Klingelhöfer, Doris; Groneberg, David A.

    2015-01-01

    Abstract: The current Ebola outbreak poses a threat to individual and global public health. Although the disease has been of interest to the scientific community since 1976, an effective vaccination approach is still lacking. This fact questions past global public health strategies, which have not foreseen the possible impact of this infectious disease. To quantify the global research activity in this field, a scientometric investigation was conducted. We analyzed the research output of count...

  11. Responding to Globalization and Urban Conflict: Human Rights City Initiatives

    OpenAIRE

    Jackie Smith

    2018-01-01

    Expanding globalization and urbanization have intensified the threats to human rights for many vulnerable groups and have restricted resources available to the primary guarantors of these rights—local authorities. Human rights cities initiatives are bottom-up efforts to advance human rights implementation in local contexts. They are emerging around the world in response to the global pressures on cities that intensify urban inequality and conflict. In this article I discuss how global changes...

  12. Canada’s Foreign Direct Investment Challenge: Reducing Barriers and Ensuring a Level Playing Field in the Face of Sovereign Wealth Funds and State-Owned Enterprises

    Directory of Open Access Journals (Sweden)

    Matt Krzepkowski

    2010-10-01

    Full Text Available Recent takeovers – and attempted takeovers – of strategic resource companies have renewed concerns that some of Canada’s prized corporate players are falling into foreign hands. However, data shows that Canada has not been a significant attractor of multinational investment, lagging behind a number of developed and developing nations. Indeed, since the mid-1990s, Canada has been a net exporter of capital in world markets, as foreign direct investment by Canadian companies far outpaced the inflow of foreign capital. Rather than being hollowed out, we are hollowing out other countries. As a general policy, Canada should reduce barriers to foreign direct investment and welcome our growing role in international markets. As many studies have shown, foreign direct investment brings significant net benefits to the Canadian economy, including knowledge transfers, new management, better wages and productivity. Only in limited circumstances, such as in the case of protecting Canada’s national security, should Canada block foreign takeovers of Canadian companies. In the interest of neutrality and minimizing economic distortions, takeovers of Canadian companies by foreign sovereign wealth funds or state-owned enterprises should be reviewed on a case-by-case basis. When state-owned enterprises have similar commercial objectives and operate on a level-playing field without financial support by state owners, they could also provide net benefits to the Canadian economy. One important area that requires further consideration is with respect to the tax-exempt status of sovereign wealth funds and state-owned companies. Canadian tax treaties should be reviewed to ensure that Canadian withholding taxes maintain an even playing field among private and state-owned businesses operating in Canada.

  13. Hybrid threats, cyber warfare and NATO's comprehensive approach for countering 21st century threats: mapping the new frontier of global risk and security management

    OpenAIRE

    Bachmann, Sascha

    2011-01-01

    The end of the so-called ‘Cold War’ has seen a change in the nature of present threats and with it to the overall role and mission of NATO, the North Atlantic Treaty Organization. The collapse of the Soviet Union and the Warsaw Pact in 1991 also removed the original raison d’etre of the Alliance: the prospect of having to repel a Soviet led attack by the Warsaw Pact on the West through the so called ‘Fulda gap’ in Germany (referring to the German lowlands between Frankfurt am Main and the for...

  14. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  15. A horizon scanning assessment of current and potential future threats to migratory shorebirds

    Science.gov (United States)

    Sutherland, William J.; Alves, José A.; Amano, Tatsuya; Chang, Charlotte H.; Davidson, Nicholas C.; Finlayson, C. Max; Gill, Jennifer A.; Gill, Robert E.; González, Patricia M.; Gunnarsson, Tómas Grétar; Kleijn, David; Spray, Chris J.; Székely, Tamás; Thompson, Des B.A.

    2012-01-01

    We review the conservation issues facing migratory shorebird populations that breed in temperate regions and use wetlands in the non-breeding season. Shorebirds are excellent model organisms for understanding ecological, behavioural and evolutionary processes and are often used as indicators of wetland health. A global team of experienced shorebird researchers identified 45 issues facing these shorebird populations, and divided them into three categories (natural, current anthropogenic and future issues). The natural issues included megatsunamis, volcanoes and regional climate changes, while current anthropogenic threats encompassed agricultural intensification, conversion of tidal flats and coastal wetlands by human infrastructure developments and eutrophication of coastal systems. Possible future threats to shorebirds include microplastics, new means of recreation and infectious diseases. We suggest that this review process be broadened to other taxa to aid the identification and ranking of current and future conservation actions.

  16. What Recent History Has Taught Us About Responding to Emerging Infectious Disease Threats.

    Science.gov (United States)

    Paules, Catharine I; Eisinger, Robert W; Marston, Hilary D; Fauci, Anthony S

    2017-12-05

    Presidential administrations face any number of unexpected crises during their tenure, and global pandemics are among the most challenging. As of January 2017, one of the authors had served under 5 presidents as the director of the National Institute of Allergy and Infectious Diseases at the National Institutes of Health. During each administration, the government faced unexpected pandemics, ranging from the HIV/AIDS pandemic, which began during the Reagan administration, to the recent Zika outbreak in the Americas, which started during the Obama administration. These experiences underscored the need to optimize preparation for and response to these threats whenever and wherever they emerge. This article recounts selected outbreaks occurring during this period and highlights lessons that were learned that can be applied to the infectious disease threats that will inevitably be faced in the current presidential administration and beyond.

  17. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  18. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  19. Moldova Quo Vadis: Neutrality and European Integration? Problems of Policy

    Science.gov (United States)

    2008-03-01

    refer to their sovereign for protection against foreign threats, is anarchic.11 Subsequent realists, debating against the supporters of Kantian and...UN authority in security matters, and Austria’s contribution of troops within the EU under a UN mandate would be considered entirely ethical ...political and economic interdependence, ambiguity is the only realistic way of joining self-interest to ethical principle.” See Bill McSweeney, “The

  20. VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  1. Virtual Reality: U.S. Information Security Threats Concept And Its International Dimension

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  2. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  3. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  4. The future role of nuclear power in addressing global environmental problems

    International Nuclear Information System (INIS)

    Stumpf, W.

    1995-01-01

    Decision makers have to increasingly balance the costs versus benefits of various energy choices against a background of global environmental deterioration. This is particularly so in the choice of long term electricity production strategies where these have to be balanced against the potential of a very severe disruption of the world's climate due to global warming. In this presentation, the threat of global warming is quantified and scenarios are developed of future predicted energy consumption patterns and their impact on international policies to curb global warming, are analyzed. The conclusion is reached that the threat of global warming is so severe that, on the macro level, an international accepted strategy of utilising a proper balance between all forms of electricity production, is a matter of priority and that all national energy choices should be taken against this framework. Such strategic decisions on the macro level must, however, also translate into the micro level of energy production on topics which include: - more efficient plant utilisation; - more effective risk management; correct choice and application of technology; and - better understanding of issues concerning safety, quality and environmental impact. (author)

  5. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  6. Combating healthcare corruption and fraud with improved global health governance.

    Science.gov (United States)

    Mackey, Tim K; Liang, Bryan A

    2012-10-22

    Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of "global health corruption" and development of a treaty protocol to combat this crucial issue.

  7. Preventing radiological threat in the Republic of Azerbaijan

    International Nuclear Information System (INIS)

    Gabulov, I.A.

    2005-01-01

    Full text: Azerbaijan is a developing and transit country in the Caucasus, connecting East and West. In addition, Azerbaijan is neighboring countries with pronounced political instability, some of which have extensive nuclear infrastructure or try to develop nuclear infrastructure. Furthermore, in the recent past fundamentalist religious terrorism has taken roots in some of these countries. Therefore, in spite of the fact that the Republic of Azerbaijan has no nuclear facilities or nuclear materials in its own territory, it could be interesting for terrorist groups trying to develop a crude radiological dispersal device using radioactive sources that are widely used in everyday life especially in such areas as oil industry, medicine, agriculture and scientific researches. The issues of reduction and prevention of both radiological and nuclear terrorism threat are one of the main global challenges around the world. The Republic of Azerbaijan is a part of world community and so we are concerned that radioactive sources used for peaceful applications could be stolen by the terrorist groups and used in the development of radiological dispersal devices sometimes referred to as a 'dirty bomb'. It is obvious that using highly radioactive materials in radiological dispersal devices could be very disruptive to society, causing panic, environmental contamination, and large financial losses. One of the ways for reduction and prevention of radiological threat for the countries like Azerbaijan with underdeveloped nuclear security and radiation safety infrastructure is closely participation in the international cooperation programs. As an example of such cooperation, I would like to present the United States Department of Energy's International Radiological Threat Reduction (IRTR) Program. Good progress has made in the field of radiological security within the framework of this program that was started 2003. Actually, in comparison with any IAEA programs, the progress reached by

  8. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  9. Global change in marine ecosystems: implications for semi-enclosed Arabian seas

    KAUST Repository

    Duarte, Carlos M.

    2015-12-07

    Global Change has been defined as the impact of human activities on the key processes that determine the functioning of the Biosphere. Global Change is a major threat for marine ecosystems and includes climate change as well as other global impacts such as inputs of pollutants, overfishing and coastal sprawl. The Semi-enclosed Arabian Seas, including the Arabian Gulf and the Red Sea, have supported human livelihoods in the Arabian Peninsula over centuries and continue to do so, but are also threatened by Global Change. These threats are particularly severe as Semi-enclosed Arabian Seas already present rather extreme conditions, in terms of temperature, salinity and oxygen concentration. The vulnerability of the unique marine ecosystems of the Semi-enclosed Arabian Seas to Global Change vectors is largely unknown, but predictions based on first principles suggest that they may be at or near the tipping point for many pressures, such as warming and hypoxia. There is an urgent need to implement international collaborative research programs to accelerate our understanding of the vulnerability of Semi-enclosed Arabian Seas to Global Change vectors in order to inform conservation and management plans to ensure these Seas continue to support the livelihoods and well-being of the Arab nations.

  10. Medical Providers as Global Warming and Climate Change Health Educators: A Health Literacy Approach

    Science.gov (United States)

    Villagran, Melinda; Weathers, Melinda; Keefe, Brian; Sparks, Lisa

    2010-01-01

    Climate change is a threat to wildlife and the environment, but it also one of the most pervasive threats to human health. The goal of this study was to examine the relationships among dimensions of health literacy, patient education about global warming and climate change (GWCC), and health behaviors. Results reveal that patients who have higher…

  11. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  12. Illicit trafficking of nuclear and other radioactive material: The 'net' security threat

    International Nuclear Information System (INIS)

    Zaitseva, L.; Steinhausler, F.

    2006-01-01

    Illicit trafficking in nuclear and other radioactive material, which could be used for building a nuclear weapon or a radiological dispersal device, has been a subject of concern for more than a decade. A major obstacle to assessing the actual security threat due to nuclear trafficking is the inclusion in the analysis of incidents that do not represent a security threat, in the sense of being a possible pre-stage to a clandestine nuclear weapons programme or a terrorist operation involving a crude nuclear device or a radiological dispersal device. International transport of contaminated scrap metal, or discovery of lost or abandoned radioactive sources are examples of such incidents, which have little or no security relevance. This paper analyses the global data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (DSO) using special filters to discriminate between incidents that are of security relevance and those that are not. (author)

  13. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  14. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  15. Pharmaceutical digital marketing and governance: illicit actors and challenges to global patient safety and public health

    Science.gov (United States)

    2013-01-01

    Background Digital forms of direct-to-consumer pharmaceutical marketing (eDTCA) have globalized in an era of free and open information exchange. Yet, the unregulated expansion of eDTCA has resulted in unaddressed global public health threats. Specifically, illicit online pharmacies are engaged in the sale of purportedly safe, legitimate product that may in fact be counterfeit or substandard. These cybercriminal actors exploit available eDTCA mediums over the Internet to market their suspect products globally. Despite these risks, a detailed assessment of the public health, patient safety, and cybersecurity threats and governance mechanisms to address them has not been conducted. Discussion Illicit online pharmacies represent a significant global public health and patient safety risk. Existing governance mechanisms are insufficient and include lack of adequate adoption in national regulation, ineffective voluntary governance mechanisms, and uneven global law enforcement efforts that have allowed proliferation of these cybercriminals on the web. In order to effectively address this multistakeholder threat, inclusive global governance strategies that engage the information technology, law enforcement and public health sectors should be established. Summary Effective global “eHealth Governance” focused on cybercrime is needed in order to effectively combat illicit online pharmacies. This includes building upon existing Internet governance structures and coordinating partnership between the UN Office of Drugs and Crime that leads the global fight against transnational organized crime and the Internet Governance Forum that is shaping the future of Internet governance. Through a UNODC-IGF governance mechanism, investigation, detection and coordination of activities against illicit online pharmacies and their misuse of eDTCA can commence. PMID:24131576

  16. Pharmaceutical digital marketing and governance: illicit actors and challenges to global patient safety and public health.

    Science.gov (United States)

    Mackey, Tim K; Liang, Bryan A

    2013-10-16

    Digital forms of direct-to-consumer pharmaceutical marketing (eDTCA) have globalized in an era of free and open information exchange. Yet, the unregulated expansion of eDTCA has resulted in unaddressed global public health threats. Specifically, illicit online pharmacies are engaged in the sale of purportedly safe, legitimate product that may in fact be counterfeit or substandard. These cybercriminal actors exploit available eDTCA mediums over the Internet to market their suspect products globally. Despite these risks, a detailed assessment of the public health, patient safety, and cybersecurity threats and governance mechanisms to address them has not been conducted. Illicit online pharmacies represent a significant global public health and patient safety risk. Existing governance mechanisms are insufficient and include lack of adequate adoption in national regulation, ineffective voluntary governance mechanisms, and uneven global law enforcement efforts that have allowed proliferation of these cybercriminals on the web. In order to effectively address this multistakeholder threat, inclusive global governance strategies that engage the information technology, law enforcement and public health sectors should be established. Effective global "eHealth Governance" focused on cybercrime is needed in order to effectively combat illicit online pharmacies. This includes building upon existing Internet governance structures and coordinating partnership between the UN Office of Drugs and Crime that leads the global fight against transnational organized crime and the Internet Governance Forum that is shaping the future of Internet governance. Through a UNODC-IGF governance mechanism, investigation, detection and coordination of activities against illicit online pharmacies and their misuse of eDTCA can commence.

  17. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  18. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  19. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  20. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  1. Internationalization by State-owned Enterprises (SOEs and Sovereign Wealth Funds (SWFs after the 2008 Crisis. Looking for Generalizations

    Directory of Open Access Journals (Sweden)

    Götz Marta

    2016-06-01

    Full Text Available This paper seeks to detect (post crisis tendencies in the international activities of state-owned enterprises (SOE and sovereign wealth funds (SWF and identify the main challenges posed in exploring this topic. In doing so it draws on the inductive approach and qualitative method and discusses available studies on recent internalization trends in SOEs and SWFs. The number of SWFs worldwide has been rising since 2008, despite the 2008 crisis which brought heavy losses and negative publicity that caused a rerouting of funds towards domestic purposes. The long-term perspective adopted by SWFs is expected to make less vulnerable to financial market volatility, which should stimulate FDI. SOTNCs are a minority among SOEs in general, i.e. only a fraction of SOEs worldwide can be labeled as state-owned transnational companies; and no exceptional impact of the 2008 crisis is apparent in their functioning The review of selected literature and UNCTAD survey reports is the basis for our conclusions and suggestions for future research avenues.

  2. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  3. Globalization and Its Impact on the Middle East

    Science.gov (United States)

    2008-12-01

    some 200 years ago. It began in 1798 when the Ottoman rule was weak. Then under control of Britain and France , the post- World War I colonial era came...existing government rather than lose their power to the forces of globalization. An independent bourgeoisie will be the partner of the state in order...region. Globalization poses threat to the authoritarian states as well as to the bourgeoisie classes aligned with the state. There is a need to resolve

  4. Self-esteem threat combined with exposure to thin media images leads to body image compensatory self-enhancement.

    Science.gov (United States)

    Jarry, Josée L; Kossert, Amy L

    2007-03-01

    This study examined the effect of a self-esteem threat combined with exposure to thin images on body image (BI) satisfaction and investment. Female participants (N=94) received a self-esteem threat consisting of false failure feedback or received false success feedback on an intellectual task allegedly highly predictive of academic and professional success. They then viewed media images featuring thin models or products. After viewing thin models, women who had received failure feedback declared themselves more satisfied about their appearance and less invested in it than did women who had received success feedback. These results suggest that exposure to the thin ideal may inspire women experiencing self-esteem threats to use appearance as an alternative source of worth, thus maintaining their global esteem through BI compensatory self-enhancement. Potential long-term implications of this strategy, such as a paradoxical increase in BI investment and the development of eating pathology, are discussed.

  5. Shrinkage of body size of small insects: A possible link to global warming?

    International Nuclear Information System (INIS)

    He Jihuan

    2007-01-01

    The increase of global mean surface temperature leads to the increase of metabolic rate. This might lead to an unexpected threat from the small insect world. Global warming shrinks cell size, shorten lifespan, and accelerate evolution. The present note speculates on possible connections between allometry and E-infinity theory

  6. The Global Quest to Build World-Class Universities: Toward a Social Justice Agenda

    Science.gov (United States)

    Rhoads, Robert A.; Li, Shuai; Ilano, Lauren

    2014-01-01

    This chapter provides a critical perspective on the global quest to build world-class universities (WCUs), including global "ranking mania," excessive emphasis on university branding, and the attending threats to the traditional public good mission of the university. Alternatively, we offer suggestions on how rankings may be used to…

  7. School manuals for teaching geography at the Sovereign State of Santander: 1868-1879

    Directory of Open Access Journals (Sweden)

    Jorge Alejandro Aguirre Rueda

    2015-07-01

    Full Text Available This article presents at least three objectives. The irst of them:to evidence the legislative aspects of the Organic Decree of Public Primary Instruction –ODPPI– of 1870 in relation to the topic of school manuals, the school knowledge of geography and the way in which it was evaluated. Secondly, this paper presents an identiication and description of the content and dissemination of some of the geography school manuals that existed in the Sovereign State of Santander during the last three decades of the 19th century. Finally, we present the ways in which some teachers from Santander resisted the initiative to consolidate the printed text as the main reference for the dissemination of school knowledge. Based on the previous information, this article comprises four sections which deal with the aforementioned topics. Therefore, it was conirmed that ODPPI regulated the subject of school manuals, to the point of identifying some of the directly responsible agents of its achievement and monitoring. Likewise, geography, as school knowledge, was regulated within the curricula. Besides, evidence shows that geography school manuals did not include as much printed material as subjects like arithmetic or reading. Equally, geography was found to be taught under the following categories: Universal and Colombian and Regional. Finally, even though the State taught the importance of the print text, other voices emerged in defense of oral teaching methods, which made it possible to identify that the consolidation of printing as a diffusion system for culture was not an easy lineal task.

  8. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  9. From the international geophysical year to global change

    International Nuclear Information System (INIS)

    Fleagle, R.G.

    1992-01-01

    A series of major scientific programs carried out over the past 40 years has greatly increased understanding of our global environment and has led to the present concern over global change. Each program responded to a specific and urgent scientific need or opportunity. In each case, institutions and resources were created that provided the foundation for later programs. Increased scientific understanding has exposed threats to future welfare and has raised serious policy implications for governments. Institutions for responding to global policy issues need to be created or strengthened. Recommendations for better procedures and institutional structures are provided in this article. 39 refs

  10. A globally integrated climate policy for Canada

    International Nuclear Information System (INIS)

    Bernstein, S.; Brunnee, J.; Duff, D.G.; Green, A.J.

    2008-01-01

    This book explored policy ideas and options from various perspectives, including science, law, political science, economics and sociology. The costs, opportunities and imperatives to participate in international diplomatic initiatives were considered along with the opportunities of regional global carbon markets. Canada's current policy on climate change negotiations have been focused on domestic regulation and incentives for technological responses and the setting of a domestic carbon price. The sense of urgency about global warming was discussed and the need for action to respond to the threat of global climate change was emphasized. The book also reviewed Canada's role in international climate policies and presented parameters and imperatives for global regime building in Canada. Domestic policy tools were also reviewed along with policy obstacles and opportunities. refs., tabs., figs.

  11. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  12. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    Science.gov (United States)

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  13. The global safety regime - Setting the stage

    International Nuclear Information System (INIS)

    Meserve, R.A.

    2005-01-01

    The existing global safety regime has arisen from the exercise of sovereign authority, with an overlay of voluntary international cooperation from a network of international and regional organizations and intergovernmental agreements. This system has, in the main, served us well. For several reasons, the time is ripe to consider the desired shape of a future global safety regime and to take steps to achieve it. First, every nation's reliance on nuclear power is hostage to some extent to safety performance elsewhere in the world because of the effects on public attitudes and hence there is an interest in ensuring achievement of common standards. Second, the world is increasingly interdependent and the vendors of nuclear power plants seek to market their products throughout the globe. Efficiency would arise from the avoidance of needless differences in approach that require custom modifications from country to country. Finally, we have much to learn from each other and a common effort would strengthen us all. Such an effort might also serve to enhance public confidence. Some possible characteristics of such a regime can be identified. The regime should reflect a global consensus on the level of safety that should be achieved. There should be sufficient standardization of approach so that expertise and equipment can be used everywhere without significant modification. There should be efforts to ensure a fundamental commitment to safety and the encouragement of a safety culture. And there should be efforts to adopt more widely the best regulatory practices, recognizing that some modifications in approach may be necessary to reflect each nation's legal and social culture. At the same type, the regime should have the characteristics of flexibility, transparency, stability, practicality, and encouragement of competence. (author)

  14. Open Educational Resources: American Ideals, Global Questions

    Science.gov (United States)

    Weiland, Steven

    2015-01-01

    Educational relations between societies and cultures that begin with benevolent intentions can come to be seen as threats to national autonomy and local preferences. Indeed, side by side with the growth since the first years of this century of Open Educational Resources (OER) there has been worry about their impact on global educational…

  15. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  16. The emerging response of the insurance industry to the threat of climate change

    International Nuclear Information System (INIS)

    Leggett, J.

    1994-01-01

    The insurance industry is waking up fast to the threat anthropogenic enhancement of the greenhouse effect poses to its future market security. This has been in large measure because of a suspicious escalation in losses from windstorms and drought-related wildfire in recent years. Articulating worst-case analysis fears of a global-warming future, senior industry figures in London, Zurich, Munich, Tokyo and New York have spoken of the potential for a global collapse of the insurance industry. Such an eventuality would have negative consequences in many areas of economic activity. These consequences have been little explored or appreciated in the climate-change debate to date. In some developing countries, meanwhile, withdrawal of catastrophe insurance cover is already threatening development. (author). 16 refs

  17. Increasing Participation and Compliance in International Climate Change Agreements

    International Nuclear Information System (INIS)

    Barrett, S.; Stavins, R.

    2002-11-01

    Scientific and economic consensus increasingly points to the need for a credible and cost-effective approach to address the threat of global climate change, but the Kyoto Protocol to the U.N. Framework Convention on Climate Change appears incapable of inducing significant participation and compliance. We assess the Protocol and thirteen alternative policy architectures that have been proposed, with particular attention to their respective abilities to induce participation and compliance. We find that those approaches that offer cost-effective mitigation are unlikely to induce significant participation and compliance, while those approaches that are likely to enjoy a reasonably high level of implementation by sovereign states are sorely lacking in terms of their anticipated cost effectiveness. The feasible set of policy architectures is thus limited to second-best alternatives. Much more attention needs to be given - both by scholarly research and by international negotiations - to aspects of future international climate agreements that will affect the degrees of participation and compliance that can reasonably be expected to be forthcoming

  18. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  19. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  20. HIV scale-up in Mozambique: Exceptionalism, normalisation and global health

    Science.gov (United States)

    Høg, Erling

    2014-01-01

    The large-scale introduction of HIV and AIDS services in Mozambique from 2000 onwards occurred in the context of deep political commitment to sovereign nation-building and an important transition in the nation's health system. Simultaneously, the international community encountered a willing state partner that recognised the need to take action against the HIV epidemic. This article examines two critical policy shifts: sustained international funding and public health system integration (the move from parallel to integrated HIV services). The Mozambican government struggles to support its national health system against privatisation, NGO competition and internal brain drain. This is a sovereignty issue. However, the dominant discourse on self-determination shows a contradictory twist: it is part of the political rhetoric to keep the sovereignty discourse alive, while the real challenge is coordination, not partnerships. Nevertheless, we need more anthropological studies to understand the political implications of global health funding and governance. Other studies need to examine the consequences of public health system integration for the quality of access to health care. PMID:24499102

  1. Forced Shortsightedness: Security Force Assistance Missions

    Science.gov (United States)

    2014-06-01

    accomplished something no other al-Qaeda franchise has ever been able to pull off: conquering and governing a broad swath of a sovereign country, then...marginalized and disadvantaged .”58 Boko Haram has capitalized on the increasing north-south divide and subsequently has increased the frequency and...groups.”70 VENs, such as AQIM and Boko Haram, are internal threats competing for victory over the people and taking advantage of the lack of

  2. Global health security and the International Health Regulations

    Directory of Open Access Journals (Sweden)

    Oliva Otavio

    2010-12-01

    Full Text Available Abstract Global nuclear proliferation, bioterrorism, and emerging infections have challenged national capacities to achieve and maintain global security. Over the last century, emerging infectious disease threats resulted in the development of the preliminary versions of the International Health Regulations (IHR of the World Health Organization (WHO. The current HR(2005 contain major differences compared to earlier versions, including: substantial shifts from containment at the border to containment at the source of the event; shifts from a rather small disease list (smallpox, plague, cholera, and yellow fever required to be reported, to all public health threats; and shifts from preset measures to tailored responses with more flexibility to deal with the local situations on the ground. The new IHR(2005 call for accountability. They also call for strengthened national capacity for surveillance and control; prevention, alert, and response to international public health emergencies beyond the traditional short list of required reporting; global partnership and collaboration; and human rights, obligations, accountability, and procedures of monitoring. Under these evolved regulations, as well as other measures, such as the Revolving Fund for vaccine procurement of the Pan American Health Organization (PAHO, global health security could be maintained in the response to urban yellow fever in Paraguay in 2008 and the influenza (H1N1 pandemic of 2009-2010.

  3. Combating healthcare corruption and fraud with improved global health governance

    Science.gov (United States)

    2012-01-01

    Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of “global health corruption” and development of a treaty protocol to combat this crucial issue. PMID:23088820

  4. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  5. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  6. GLOBAL RISKS AND INSTRUMENTS OF ITS MINIMIZATION

    Directory of Open Access Journals (Sweden)

    O. Havryliuk

    2014-06-01

    Full Text Available It is argued that economic globalization leads to the formation of macro-economic, political and other risks that are able to grow into global risks affecting, without exception, all national economies, creating a serious threat to national economic security. The emphasis is on the negative elements of a set of global risks, their development and minimize the possibility of using a number of tools. Ensuring firmness of the state to external risks demands continuous monitoring and forecasting of world processes and usage of economic instruments of rapid response for prevention of negative consequences. The essence of the category of "risk" is revealed and deepened. The global risks that can not affect the economic security of Ukraine is disclosed. It is shown that the emergence of these global risks has negative impact on the economic security of Ukraine.

  7. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  8. Global Perspectives on Resilience in Children and Youth

    Science.gov (United States)

    Masten, Ann S.

    2014-01-01

    Global concerns about the consequences of disasters, political violence, disease, malnutrition, maltreatment, and other threats to human development and well-being have sparked a surge of international interest in resilience science. This article highlights progress and issues in research that aims to understand variations in human adaptation to…

  9. The End of Investment Bank Capitalism? An Economic Geography of Financial Jobs and Power

    Directory of Open Access Journals (Sweden)

    Dariusz Wójcik

    2017-10-01

    Full Text Available This article investigates employment patterns, remuneration, and power relations in the U.S. financial sector between 1978 and 2008. It demonstrates that investment banking has played a central part in the securities industry, which has been by far the most expansive segment of the U.S. financial sector and a significant contributor to growing income inequality. The power of investment banking has risen over the past 30 years under the conditions of the growing demand for investment services, technological changes, deregulation, and globalization. Investment banks were at the heart of the shadow banking system, inventing many of the products used by it and often disguising its operation, thus contributing decisively to the outbreak of the global financial crisis of 2007–9. With leading U.S. investment banks converted into bank holding companies and the threat of reregulation, the future of investment banking is uncertain. One area of uncertainty is the banks’ relationship with sovereign wealth funds, which involves both opportunities and challenges. The article identifies the economic geography of investment banking as one of the keys to understanding the dynamics of the contemporary world economy and promotes a mesolevel approach to geographies of finance.

  10. Global health security: the wider lessons from the west African Ebola virus disease epidemic

    Science.gov (United States)

    Heymann, David L; Chen, Lincoln; Takemi, Keizo; Fidler, David P; Tappero, Jordan W; Thomas, Mathew J; Kenyon, Thomas A; Frieden, Thomas R; Yach, Derek; Nishtar, Sania; Kalache, Alex; Olliaro, Piero L; Horby, Peter; Torreele, Els; Gostin, Lawrence O; Ndomondo-Sigonda, Margareth; Carpenter, Daniel; Rushton, Simon; Lillywhite, Louis; Devkota, Bhimsen; Koser, Khalid; Yates, Rob; Dhillon, Ranu S; Rannan-Eliya, Ravi P

    2018-01-01

    The Ebola virus disease outbreak in West Africa was unprecedented in both its scale and impact. Out of this human calamity has come renewed attention to global health security—its definition, meaning, and the practical implications for programmes and policy. For example, how does a government begin to strengthen its core public health capacities, as demanded by the International Health Regulations? What counts as a global health security concern? In the context of the governance of global health, including WHO reform, it will be important to distil lessons learned from the Ebola outbreak. The Lancet invited a group of respected global health practitioners to reflect on these lessons, to explore the idea of global health security, and to offer suggestions for next steps. Their contributions describe some of the major threats to individual and collective human health, as well as the values and recommendations that should be considered to counteract such threats in the future. Many different perspectives are proposed. Their common goal is a more sustainable and resilient society for human health and wellbeing. PMID:25987157

  11. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  12. Spatial congruence in language and species richness but not threat in the world's top linguistic hotspot.

    Science.gov (United States)

    Turvey, Samuel T; Pettorelli, Nathalie

    2014-12-07

    Languages share key evolutionary properties with biological species, and global-level spatial congruence in richness and threat is documented between languages and several taxonomic groups. However, there is little understanding of the functional connection between diversification or extinction in languages and species, or the relationship between linguistic and species richness across different spatial scales. New Guinea is the world's most linguistically rich region and contains extremely high biological diversity. We demonstrate significant positive relationships between language and mammal richness in New Guinea across multiple spatial scales, revealing a likely functional relationship over scales at which infra-island diversification may occur. However, correlations are driven by spatial congruence between low levels of language and species richness. Regional biocultural richness may have showed closer congruence before New Guinea's linguistic landscape was altered by Holocene demographic events. In contrast to global studies, we demonstrate a significant negative correlation across New Guinea between areas with high levels of threatened languages and threatened mammals, indicating that landscape-scale threats differ between these groups. Spatial resource prioritization to conserve biodiversity may not benefit threatened languages, and conservation policy must adopt a multi-faceted approach to protect biocultural diversity as a whole.

  13. The global energy challenge: new challenges and threats, the ways to overcome them

    OpenAIRE

    Alexandr N. Zakharov

    2017-01-01

    The article describes key aspects of global energy issues, with an emphasis on energy security. The Russian Federation is to face three inter-related challenges: provide energy security, stimulate economic growth and protect the environment, reducing emissions of greenhouse gases that will reduce the level of air pollution and contribute to the global improvement of the atmosphere. The author analyzes the status and prospects of world energy markets and the forecast of their development for t...

  14. The rise and manifestation of globalism and its implications for science

    Directory of Open Access Journals (Sweden)

    E.J. van Niekerk

    1995-03-01

    Full Text Available The rise and manifestation of globalism and its implicationsfor science. The concept globalism refers to the interdependent and interconnected character of the contemporary world. One of the characteristics of the globalistic world order is that it is a threat unto itself This threat is manifested in numerous global crises such as the population explosion, the extensive developmental disparities between First and Third World countries, the energy crisis, atomic warfare and the environmental crisis. Humanity has brought these and other global crises upon itself by the advancement of the modern (Western industrial civilisation which emanated from the absolutised application of the natural scientific mode of thought. In order to defend the thesis that the phenomenon of globalisation has profound implications for scientific practice, it is necessary to present a historical overview of the rise of globalism and an interpretation of its current manifestation. From these aspects one can deduce the significant implications that this phenomenon has for scientific practice. General features of a more accountable mode of scientific thought are also presented. Finally, Temporality Agogics, a paradigm within the context o f History of Education, is discussed as an example o f such a more accountable mode of scientific practice.

  15. MANAGING THE IMAGE OF CITIES IN THE “GLOBAL VILLAGE:” City Branding As An Opportunity Against Globalization

    Directory of Open Access Journals (Sweden)

    Gözdem Çelikkanat Aysu

    2013-07-01

    Full Text Available In this article the strong effect of forming a corporate identity in city branding is  studied. It is emphasized that by strong identity and image acquisition cities distinguish by their unique branding elements rather than global city imposition  hat is carried out by globalization pressure. According to the opinions that perceive globalization as an absolute fact, cities like Istanbul have to articulate  to this new system. In this way of thinking, it is inevitable to suffer in McLuhan’s  “global village”. However creating strategies for powerful image and branding of a city can be a leading factor against global city imposition. Keeping up with the same method of creating a “corporate” identity, the image of the cities has to be managed by the symmetric communication with all the actors. By this way  globalization can be used as an opportunity instead of threat.

  16. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  17. CYBER ATTACKS, MAJOR THREATS AND VULNERABILITIES AGAINST STATES, ORGANIZATIONS AND CITIZENS

    Directory of Open Access Journals (Sweden)

    Constantin MINCU

    2016-06-01

    Full Text Available The author briefly tries to bring to the attention of those interested the complex issue developed globally on cyber risks, threats and vulnerabilities reaching to the "cyber warfare" with direct involvement of some state actors. Some means and vectors of attack are presented, as well as countermeasures to protect the individual users, companies, governmental and military structures. In the end, the article presents the situation in Romania with respect to some measures already taken and others that will be probably taken in the future, particularly in the legislative and administrative sector regarding cyber protection.

  18. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  19. Developing Strategies for Islamic Banks to Face the Future Challenges of Financial Globalization

    OpenAIRE

    Al Ajlouni, Ahmed

    2004-01-01

    Developing Strategies for Islamic Banks to Face the Future Challenges of Financial Globalization Ahmed Al-Ajlouni Abstract This study aims at forming strategic response to assess the ability of Islamic banks in benefiting from the opportunities that may be provided by financial globalization and limits its threats, through assessing the capability of Islamic banks to meet the requirements and challenges of financial globalization, then suggests the suitable strategies that may be ...

  20. New records of the Japanese seahorse Hippocampus mohnikei in Southeast Asia lead to updates in range, habitat and threats.

    Science.gov (United States)

    Aylesworth, L; Lawson, J M; Laksanawimol, P; Ferber, P; Loh, T-L

    2016-04-01

    New records of the Japanese seahorse Hippocampus mohnikei from Cambodia, Malaysia, Thailand and Vietnam, along with recently published studies from India and Singapore, have greatly expanded the known range of H. mohnikei within Southeast Asia. These new records reveal novel habitat preferences and threats to H. mohnikei in the region. Although the global conservation status of H. mohnikei is classified as Data Deficient according to the IUCN Red List of Threatened Species, new sightings indicate that this species is found in similar habitats and faces similar threats as other Hippocampus species that are considered Vulnerable. © 2016 The Fisheries Society of the British Isles.

  1. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  2. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  3. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    Science.gov (United States)

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  4. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    OpenAIRE

    Anatoliy Petrovich Sterkhov

    2015-01-01

    From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identi...

  5. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  6. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  7. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  8. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  9. Nuclear power in the context of global warming

    International Nuclear Information System (INIS)

    Bodansky, D.

    1989-01-01

    The paper examines the extent to which nuclear power could help ameliorate the greenhouse problem. Topics discussed include: (1) How serious is the environmental threat posed by the greenhouse effect? (2) How large a part do fossil fuels play in producing greenhouse gases? (3) Is it possible to prevent or abate the anticipated global warming? (4) Can nuclear power play a significant role? (5) What overall approached might best reduce greenhouse emissions? Global cooperativeness in addressing the problem will be essential. 14 refs., 5 tabs

  10. LINK BETWEEN SUSTAINABLE DEVELOPMENT AND GLOBALIZATION OF CONTEMPORARY ECONOMY

    Directory of Open Access Journals (Sweden)

    Adriana Grigorescu

    2014-11-01

    Full Text Available Sustainable development requires a fundamental change in lifestyle. A fully break detachment by the past requires a major reorientation of public and private behavior and mentality. The challenge lies in linking economic growth with social issues and positioning the environmental degradation. The process of globalization is connected also with environmental degradation, which is now extended as a concept of threat and security, considered individually and in connection. It has already started recognizing new global threats as well as from non -state groups and individuals. The security is being defined to include, among others, the wars between and within states, international organizations of organized crime, nuclear weapons development, poverty, viral diseases, climatic events and environmental degradation. The concerns about the global market and the global environment protection will become more related, through their mutual dependency. The relationship of global economy and environment, from a market perspective, means stimulating economic growth, a process that generates higher revenues, funds and wealth, on one hand and political will to improve environmental conservation and protection, on the other hand. But it could be seen that the developed countries have made the greatest progress in environmental protection, and even so the poor quality of the environment continues to deteriorate. In this context it is important to consider the opinion of experts on the interaction between globalization and sustainable development. The paper aims to present the views of experts from the Regional Agency for Environmental Protection (South Muntenia. The study is an empirical research based on a questionnaire applied to a sample of over 300 subjects. The research aims to set out the existence of the link between sustainable development and globalization, to identify the main advantages and disadvantages of globalization and to prioritize the main

  11. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  12. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  13. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  14. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  15. Habitats at Risk. Global Warming and Species Loss in Globally Significant Terrestrial Ecosystems

    International Nuclear Information System (INIS)

    Malcolm, J.R.; Liu, Canran; Miller, L.B.; Allnutt, T.; Hansen, L.

    2002-02-01

    In this study, a suite of models of global climate and vegetation change is used to investigate three important global warming-induced threats to the terrestrial Global 200 ecoregions: (1) Invasions by new habitat types (and corresponding loss of original habitat types); (2) Local changes of habitat types; (3) High rates of required species migration. Seven climate models (general circulation models or GCMs) and two vegetation models (BIOME3 and MAPSS) were used to produce 14 impact scenarios under the climate associated with a doubling of atmospheric CO2 concentrations, which is expected to occur in less than 100 years. Previous analyses indicated that most of the variation among the impact scenarios was attributable to the particular vegetation model used, hence the authors provide results separately for the two models. The models do not provide information on biodiversity per se, but instead simulate current and future potential distributions of major vegetation types (biomes) such as tundra and broadleaf tropical rain forest

  16. Polar marine ecosystems: major threats and future change

    Energy Technology Data Exchange (ETDEWEB)

    Clarke, A. [British Antarctic Survey, Cambridge (United Kingdom); Harris, C.M. [Environmental Research and Assessment, Grantchester (United Kingdom)

    2003-07-01

    This review of polar marine ecosystems covers both the Arctic and Antarctic, identifying the major threats and, where possible, predicting their possible state(s) in 2025. Although the two polar regions are similar in their extreme photoperiod, low temperatures, and in being heavily influenced by snow and ice, in almost all other respects they are very different. The Arctic Ocean is a basin surrounded by continental landmasses close to, and influenced by, large populations and industrial activities. In contrast, the Southern Ocean is contiguous with all the other great oceans and surrounds a single land mass; Antarctica is remote from major centres of population and sources of pollution. Marine environments in both Polar Regions have been highly disturbed by fishing activity, but, in terms of pollution, some areas remain among the most pristine in the world. There are, however, both local and global pressures. Over the 2025 time horizon, the greatest concern for the Arctic is probably the ecological implications of climate change, particularly insofar as sea ice extent and duration are likely to be affected. Such changes are not expected to be as pronounced in the Southern Ocean over this time period, and concerns are related more to direct threats from harvesting of marine living resources, and the ability to manage these fisheries sustainably. In both Polar Regions, the capacity of marine ecosystems to withstand the cumulative impact of a number of pressures, including climate change, pollution and overexploitation, acting synergistically is of greatest concern. (author)

  17. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  18. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  19. What About the Children? The Threat of Nuclear War and Our Responsibility to Preserve this Planet for Future Generations.

    Science.gov (United States)

    Hawkes, Glenn W.

    Part of a global effort, this brochure was written to increase understanding of the threat nuclear war poses to children. Several issues are raised and briefly discussed, including (1) the present capacity for annihilating the next generation or ending human life on this planet, (2) the inadequacy of deterrence, (3) the suffering of children after…

  20. IMPLICATIONS OF BANKING SUPERVISION ACROSS THE EUROPEAN MONETARY UNION, A SOVEREIGN DEBT CRISIS UPDATE

    Directory of Open Access Journals (Sweden)

    Simona Elena IAGAR

    2015-09-01

    Full Text Available The current paper analyses the latest measures taken by the main European governing bodies with regard to the banking supervision across the European Monetary Union (EMU following the ‘sovereign debt crisis’ phenomenon and its continuing effects throughout the Euro zone for the last five years. Officially preaching financial integration in order to ensure stability of the European banking system, most often the European governing bodies amplify the exact phenomena they expect to reduce doing more harm to both creditors and depositors and ultimately leading to a more fragile business banking environment. The importance of banks is acknowledged at European institutional level as main channel through which the monetary policy is triggered across EMU, therefore active measures have been taken in this regard. Questioning the extent to which these measures are legitimate and meet the purposes that they claim, constitutes the aim of the present paper. Another close linked purpose is a better understanding of what stability means, why it is important and what makes stability occur in a banking system. Having understood and set the theoretical grounds, it therefore follows easily to analyse through this glance the latest actions pursued by the European financial governing bodies focusing on the ones addressing supervision of the banking sector within EMU. The paper concludes and provides a set of recommendations by reminding the nature and role of banks for the real economy, the same objective the European financial governing bodies’ target, but which they consistently fail to meet.

  1. GLOBALIZATION AND TRADE LIBERALIZATION: “A THREAT OR AN OPPORTUNITY”?

    Directory of Open Access Journals (Sweden)

    Andrei-Stefan Enghiş

    2006-07-01

    Full Text Available The present paper attempts to evaluate the global economic system through the perspective of neoliberalism, which advocates for the continuous liberalization of trade and the progressive opening of the markets in different economic sectors. Seeking to observe the neoliberal vision on the world economy, the study relies on two speeches delivered by the former European Union’s Trade Commissioner, Pascal Lamy in a time span of four years, between 2000 and 2004, a period marked by two important WTO Ministerial Conferences: the Doha 2001 WTO Ministerial Conference and the Cancun 2003 WTO Ministerial Conference. Nonetheless, in order to provide a balanced analysis of the world economic system, the study provides a brief introspection into the other theoretical vision, alterglobalism, which advocates for a different understanding of the relations between trade liberalization, state intervention in the economy and the reduction of the existent economic disparities. The analysis is divided into three sections: the first section portrays the two antithetical visions, neoliberalism and alterglobalism, while the second one focuses exclusively on the person of Pascal Lamy and on the speeches that represent the core of this study. The third section consists in a comparative analysis of the two divergent economic perspectives, trying to identify the main opposing points, as well as those points on which the two economic perspectives may converge. The conclusion looks closely at the relations between globalization and trade liberalization and the criticism brought about by alterglobalism, the archrival of neoliberalism and trade liberalization. It also considers the relation between the two neoliberal speeches of the former EU Trade Commissioner, attempting to identify potential links or divergent attitudes between the two.

  2. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  3. Development of transnational corporations in the world: opportunities and threats

    Directory of Open Access Journals (Sweden)

    Alexandra NICULA

    2015-06-01

    Full Text Available Transnational corporations (TNCs are incorporated or unincorporated enterprises comprising parent enterprises and their foreign affiliates. Transnational Corporations exert a great deal of power in the globalized world economy. Many corporations are richer and more powerful than the states that seek to regulate them. Through mergers and acquisitions corporations have been growing very rapidly and some of the largest TNCs now have annual profits exceeding the GDPs of many low and medium income countries. TNCs dominate the global economy and exert their influence over global policymaking. Worldwide companies start the trend in many domains having a big range of competitors. Trade is an important development tool. Trade between developing and industrialized countries has expanded and borrowing from rich countries to the poor areas of this world increased. The links between these differing groups of economies intensified subsequently and made these two groups increasingly dependent from each other. TNCs based their activity around this idea. In this paper, we try to emphasize the role of the TNCs in the worldwide economy, the advantages and disadvantages these corporations bring to the countries they activate in and even to the entire world and what effect they have on globalization. Some opportunities and threats of TNS activity are presented, exemplifying through some well known corporations which succeded in this competitive world. The authors wanted in this way to show the positive and negative aspects of their performance and give the reader the opportunity to develop the own opinion.

  4. The Strategic Implications of Chinese Companies Going Global

    Science.gov (United States)

    2011-03-29

    enterprises’ moves into foreign markets . Plus, the sovereign wealth fund, China Investment Corporation (CIC), began a targeted campaign to expand purchases...stature of Coca - Cola , Microsoft, or McDonald’s. The five Chinese players whose name recognition is beginning to garner some attention are PC maker Lenovo...investor amongst developing countries as well as the world’s sixth largest overseas investor overall with U.S. $150 billion invested in foreign markets

  5. Factors driving the global decline of cycad diversity.

    Science.gov (United States)

    Mankga, Ledile T; Yessoufou, Kowiyou

    2017-07-01

    Mounting evidence indicates that we are witnessing the sixth mass extinction period. Given the important goods and services biodiversity delivers to humans, there is a need for a continued commitment to investigate what pre-disposes some taxa to greater risk of extinction. Here, we investigate this question using a phylogenetic comparative method and fitting a cumulative link mixed effect model on biological, ecological and evolutionary data of cycads, the most threatened lineage in the plant kingdom. We identified nine groups of threats to cycads, with habitat loss, over-collection, fire and reproduction failure being the most prominent, but only four of these threats (habitat loss, over-collection, medicinal uses and reproduction failure) clustered on the cycad tree of life. This clustering suggests that closely related species may be exposed to similar threats, perhaps because of geographic regionalization of cycad genera. Nonetheless, the diversity of threats and several variables linked to the biology and ecology of cycads correlate with extinction risk (e.g. altitude, height, diameter, geographic range), and different variables seem to be linked to different IUCN status of cycads. Although their predictive power is generally extinction risk in cycads and, since most threats that we identified as drivers of extinction risk of cycads are anthropogenically mediated, we recommend stronger legislation to regulate human-cycad interactions and the commitment of all governments globally to implement this regulation.

  6. Interfacing a biosurveillance portal and an international network of institutional analysts to detect biological threats.

    Science.gov (United States)

    Riccardo, Flavia; Shigematsu, Mika; Chow, Catherine; McKnight, C Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray

    2014-01-01

    The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an

  7. Heating GLOBAL vs LOCAL Contamination. Problematic National

    International Nuclear Information System (INIS)

    Turtos Carbonell, Leonor; Fernandez Rondon, Manuel; Meneses Ruiz, Elieza; Rivero Oliva, Jesus; Diaz Rivero, Norberto; Sanchez Gacita, Madeleine; Curbelo Garea, Lariza

    2007-01-01

    The tendency of growth year after year of the half temperature of the planet in correspondence with the increase of the concentrations of gases of greenhouse effect in the atmosphere, is an unequivocal sign that the greenhouse effect and its consequence, the one global heating, is a threat that hangs on the Earth. At national level and international conscience of this situation is won and the actions are increased directed to to mitigate it. The contribution of the energy sector to these emissions is considerable. The work it analyzes the contribution from Cuba to the global climatic change

  8. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  9. Global mechanisms for sustaining and enhancing PES schemes

    International Nuclear Information System (INIS)

    Farley, Josh; Moulaert, Azur; Lee, Dan; Krause, Abby; Aquino, Andre; Daniels, Amy

    2010-01-01

    An international payment for ecosystem service (IPES) schemes may be one of the only mechanisms available to stimulate the provision of vital non-marketed ecosystem services at the global level, as those nations that benefit from global ecosystem services (GES) cannot readily force other sovereign nations to provide them. Currently, international trade offers trillions of dollars in incentives for countries to convert natural capital into marketable goods and services, and few payments to entice countries to conserve natural capital in order to sustain critical non-marketed ecosystem services. We examine the biophysical characteristics of climate change and biodiversity to understand the obstacles to developing effective IPES schemes. We find that none of the existing schemes for providing GES are adequate, given the scale of the problem. A cap and auction scheme for CO 2 emissions among wealthy nations could fund IPES and simultaneously deter carbon emissions. To disburse funds, we should adapt Brazil's ICMS ecologico, and apportion available funds to targeted countries in proportion to how well they meet specific criteria designed to measure the provision of GES. Individual countries can then develop their own policies for increasing provision of these services, ensured of compensation if they do so. Indirect IPES should include funding for freely available technologies that protect or provide GES, such as the low carbon energy alternatives that will be essential for curbing climate change. Markets rely on the price mechanism to generate profits, which rations technology to those who can afford it, reducing adoption rates, innovation and total value. (author)

  10. Earthquake Loss Assessment for the Evaluation of the Sovereign Risk and Financial Sustainability of Countries and Cities

    Science.gov (United States)

    Cardona, O. D.

    2013-05-01

    Recently earthquakes have struck cities both from developing as well as developed countries, revealing significant knowledge gaps and the need to improve the quality of input data and of the assumptions of the risk models. The quake and tsunami in Japan (2011) and the disasters due to earthquakes in Haiti (2010), Chile (2010), New Zealand (2011) and Spain (2011), only to mention some unexpected impacts in different regions, have left several concerns regarding hazard assessment as well as regarding the associated uncertainties to the estimation of the future losses. Understanding probable losses and reconstruction costs due to earthquakes creates powerful incentives for countries to develop planning options and tools to cope with sovereign risk, including allocating the sustained budgetary resources necessary to reduce those potential damages and safeguard development. Therefore the use of robust risk models is a need to assess the future economic impacts, the country's fiscal responsibilities and the contingent liabilities for governments and to formulate, justify and implement risk reduction measures and optimal financial strategies of risk retention and transfer. Special attention should be paid to the understanding of risk metrics such as the Loss Exceedance Curve (empiric and analytical) and the Expected Annual Loss in the context of conjoint and cascading hazards.

  11. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  12. Globalization and the Military Industrial Base: Where Should U.S. Policy Go?

    National Research Council Canada - National Science Library

    Sundell, Dennis R

    2007-01-01

    .... military industrial base. While the prospects of globalization have provided the defense industrial base with rewards including reduced costs as a result of competition and greater access to foreign technologies it has also created some threats...

  13. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  14. Towards Global Jihadism: Al-Qaeda's Strategic, Ideological and Structural Adaptations since 9/11

    Directory of Open Access Journals (Sweden)

    Bill Braniff

    2011-05-01

    Full Text Available In recent years, Al-Qaeda has suffered a number of setbacks, but has also successfully spawned an expansionist global jihadist movement that will survive the death of Osama bin Laden. This article describes how the multifaceted threat posed by global jihadism has evolved over the last decade. It first recounts some of the more salient examples of Al-Qaeda’s post-9/11 strategic, ideological, and structural adaptations, and then offers a balance sheet of Al-Qaeda’s contemporary strengths and weaknesses. Al-Qaeda continues to enable the violence of others, orient that violence towards the United States and its allies in a distributed game of attrition warfare, and foster a dichotomous “us versus them” narrative between the Muslim world and the rest of the international community. Despite this overarching consistency, Al-Qaeda shepherds a different phenomenon than it did ten years ago. The aggregation of the movement’s strategic, ideological, and structural adaptations has fundamentally changed the nature of the jihadist threat to the West. This evolved threat is not inherently more dangerous, as counterterrorism efforts today focus on and disrupt capability earlier and more consistently than prior to September 2001. This multifaceted global jihad will, however, continue to produce greater numbers of attacks in more locations, from a more diverse cadre of individuals spanning a wider ideological spectrum.   

  15. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  16. Nuclear proliferation and the potential threat of nuclear terrorism. 8 November 2004, Sydney, Australia, Asia-Pacific Nuclear Safeguards and Security Conference

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Today, the focus of the world is on nuclear proliferation and the potential threat of nuclear terrorism in Asia and the Pacific, and this address is presenting the perspectives on the challenges IAEA faces, and how the IAEA is working to strengthen nuclear security and the nuclear non-proliferation regime. But one would emphasize at the outset that, while much of our work must begin locally and regionally, we must not forget to think globally, because ultimately the existence of a nuclear threat anywhere is a threat everywhere, and as a global community, we will win or lose this battle together. This presentation, discusses cooperation, assistance, regional and international networks, and the importance of learning from each other. In effect, the focal subject is 'security culture', a mindset that, while providing the impetus for local and regional action, thinks globally and is fully capable of extending across borders. Sixty years ago, on a day in August, the dawn of the Nuclear Age in Asia left nearly a quarter of a million people dead, with two devices considered crude by modern standards. For six decades, we have managed to avoid a repeat of that event, but remain haunted by the prospect. It is my firm belief that we cannot move out from under the shadow of Hiroshima and Nagasaki until we are ready to make that move collectively, and build a system of security that transcends borders, that focuses on the equal value of every human life, and in which nuclear weapons have no place. May it not ultimately be said of our civilization that we created the inventions that led to our own demise

  17. Lab-to-Lab Cooperative Threat Reduction

    Science.gov (United States)

    Hecker, Siegfried S.

    2017-11-01

    It is difficult to imagine today how dramatically global nuclear risks changed 25 years ago as the Soviet Union disintegrated. Instead of the threat of mutual nuclear annihilation, the world became concerned that Russia and the other 14 former Soviet states would lose control of their huge nuclear assets - tens of thousands of nuclear weapons, more than a million kilograms of fissile materials, hundreds of thousands of nuclear workers, and a huge nuclear complex. I will describe how scientists and engineers at the DOE laboratories, with a focus on Los Alamos, Lawrence Livermore and Sandia national laboratories, joined forces with those at the Russian nuclear weapon institutes for more than 20 years to avoid what looked like the perfect nuclear storm - a story told in the two-volume book Doomed to Cooperate1 published in 2016. Due to an internal processing error, an incorrect version of this article was published on 15 November 2017 that omitted the footnotes. AIP Publishing apologizes for this error. An updated version of this article, including the missing footnotes, was published on 21 November 2017.

  18. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  19. Impacts of Dams and Global Warming on Fish Biodiversity in the Indo-Burma Hotspot.

    Science.gov (United States)

    Kano, Yuichi; Dudgeon, David; Nam, So; Samejima, Hiromitsu; Watanabe, Katsutoshi; Grudpan, Chaiwut; Grudpan, Jarungjit; Magtoon, Wichan; Musikasinthorn, Prachya; Nguyen, Phuong Thanh; Praxaysonbath, Bounthob; Sato, Tomoyuki; Shibukawa, Koichi; Shimatani, Yukihiro; Suvarnaraksha, Apinun; Tanaka, Wataru; Thach, Phanara; Tran, Dac Dinh; Yamashita, Tomomi; Utsugi, Kenzo

    2016-01-01

    Both hydropower dams and global warming pose threats to freshwater fish diversity. While the extent of global warming may be reduced by a shift towards energy generation by large dams in order to reduce fossil-fuel use, such dams profoundly modify riverine habitats. Furthermore, the threats posed by dams and global warming will interact: for example, dams constrain range adjustments by fishes that might compensate for warming temperatures. Evaluation of their combined or synergistic effects is thus essential for adequate assessment of the consequences of planned water-resource developments. We made projections of the responses of 363 fish species within the Indo-Burma global biodiversity hotspot to the separate and joint impacts of dams and global warming. The hotspot encompasses the Lower Mekong Basin, which is the world's largest freshwater capture fishery. Projections for 81 dam-building scenarios revealed progressive impacts upon projected species richness, habitable area, and the proportion of threatened species as generating capacity increased. Projections from 126 global-warming scenarios included a rise in species richness, a reduction in habitable area, and an increase in the proportion of threatened species; however, there was substantial variation in the extent of these changes among warming projections. Projections from scenarios that combined the effects of dams and global warming were derived either by simply adding the two threats, or by combining them in a synergistic manner that took account of the likelihood that habitat shifts under global warming would be constrained by river fragmentation. Impacts on fish diversity under the synergistic projections were 10-20% higher than those attributable to additive scenarios, and were exacerbated as generating capacity increased-particularly if CO2 emissions remained high. The impacts of dams, especially those on river mainstreams, are likely to be greater, more predictable and more immediately pressing for

  20. Impacts of Dams and Global Warming on Fish Biodiversity in the Indo-Burma Hotspot.

    Directory of Open Access Journals (Sweden)

    Yuichi Kano

    Full Text Available Both hydropower dams and global warming pose threats to freshwater fish diversity. While the extent of global warming may be reduced by a shift towards energy generation by large dams in order to reduce fossil-fuel use, such dams profoundly modify riverine habitats. Furthermore, the threats posed by dams and global warming will interact: for example, dams constrain range adjustments by fishes that might compensate for warming temperatures. Evaluation of their combined or synergistic effects is thus essential for adequate assessment of the consequences of planned water-resource developments. We made projections of the responses of 363 fish species within the Indo-Burma global biodiversity hotspot to the separate and joint impacts of dams and global warming. The hotspot encompasses the Lower Mekong Basin, which is the world's largest freshwater capture fishery. Projections for 81 dam-building scenarios revealed progressive impacts upon projected species richness, habitable area, and the proportion of threatened species as generating capacity increased. Projections from 126 global-warming scenarios included a rise in species richness, a reduction in habitable area, and an increase in the proportion of threatened species; however, there was substantial variation in the extent of these changes among warming projections. Projections from scenarios that combined the effects of dams and global warming were derived either by simply adding the two threats, or by combining them in a synergistic manner that took account of the likelihood that habitat shifts under global warming would be constrained by river fragmentation. Impacts on fish diversity under the synergistic projections were 10-20% higher than those attributable to additive scenarios, and were exacerbated as generating capacity increased-particularly if CO2 emissions remained high. The impacts of dams, especially those on river mainstreams, are likely to be greater, more predictable and more